SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6

Counter terror

  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • White papers
Physical and cyber security precautions when travelling

Physical and cyber security precautions when travelling

Expert commentary
Mass security screening technology for large events

Mass security screening technology for large events

Expert commentary
2018 FIFA World Cup Russia integrates safety, security and service

2018 FIFA World Cup Russia integrates safety, security and service

Editor's opinion
What role does social media play in promoting security?

What role does social media play in promoting security?

Expert panel
Preventing terror threats: Lockdown procedures for public spaces

Preventing terror threats: Lockdown procedures for public spaces

Expert commentary

News

Figen Murray OBE joins as Chair of International Security Expo
Figen Murray OBE joins as Chair of International Security Expo

International Security Expo is thrilled to announce that it has appointed a new chair. Figen Murray OBE, initiator and lead campaigner for Martyn's Law, will be taking on the role effective immediately. As chair, Figen will help steer the future direction and growth of International Security Expo, whilst also ensuring it best serves the needs of the industry. She will also lead the Advisory Council that is comprised of an outstanding selection of the industry’s foremost experts, representing a broad range of sectors and Government. Figen will take over from Angela Essel, senior account director – national security at Thales UK, and former head of JSaRC, Home Office, who has held the position for the past two years. Counter terrorism legislation Having transformed her grief into a powerful movement for change, Figen is the initiator behind the campaign to introduce counter terrorism legislation – the Terrorism (Protection of Premises) Act 2025 – informally known as Martyn’s Law, after her son, Martyn Hett, was tragically killed alongside 21 others at the Manchester Arena terrorist attack on 22 May 2017. Her tireless campaigning has secured national support from cross-party politicians, the security industry, businesses and the public, to introduce legislation that will better protect venues and the public from the potential impact of a terrorist attack. Homeland and international security Beyond Figen’s legislative work, she has achieved a distinction in a counter terrorism master’s degree from the University of Lancashire. Figen’s expertise and dedication to making Britain safer saw her awarded an OBE in the 2022 New Year’s Honours List. There are very few people who have been able to bring together all elements of the security industry in such a unifying manner, whilst at the same time effecting change at a legislative level. This sees Figen ideally placed to take on the role of chair, as International Security Expo brings together Government, Industry, Academia and the entire end-user community from all corners of the world, with a key focus on both homeland and international security, and countering terrorism. Global security industry Speaking about her appointment to the role Figen says, “It is a real privilege and honour to become chair of International Security Expo. For many years it has been clear how important this event is to the global security industry – from the wealth of innovation on display to the incredible speakers who impart their knowledge and experience, along with the unique opportunity to engage with the UK Government.” “I know first-hand just how valuable this has been in the long journey to get Martyn's Law signed into legislation. The event is one of my highlights of the year and I am extremely excited to take on this prestigious role, lead the Advisory Council and help steer the direction of International Security Expo so it continues as one of the world's leading events for countering terrorism and keeping us all safe.” Ensuring public safety Angela Essel says: “It has been a great pleasure to serve as chairwoman for this fantastic event and to see how many people view it as a must-attend date in their calendar. These past two editions of International Security Expo have been the best ever and I am delighted to have helped contribute towards their success. Figen’s drive and resolve is awe-inspiring and I have no doubt she will make a superb chair and I wish her the best of luck in the role.” Rachael Shattock, Group Event Director, added: “We are extremely honoured to welcome Figen as chair of International Security Expo. Watching her tireless campaigning over the years has been truly inspirational and I cannot think of anyone better to bring the energy and passion for ensuring public safety to the event. As the event continues to go from strength to strength, this is the ideal time to welcome Figen aboard and the whole team and I are very excited to work with her. I would also like to thank Angela for the fantastic work she has done as chairwoman over the past two years in helping make the event unmissable.”

DeterTech & Torchlight extend AmTag partnership
DeterTech & Torchlight extend AmTag partnership

DeterTech and Torchlight Technologies are pleased to announce a five-year strategic partnership for AmTag, the chemical tagging solution that disrupts the illicit arms trade and prevents the diversion of state-held ammunition.  The deal follows a successful pilot programme to develop and deploy AmTag delivered by Torchlight Technologies, Conflict Armament Research (CAR), the UK Foreign Office (FCDO), and Somalia’s Office of National Security (ONS). This resulted in the Federal Government of Somalia becoming the first country in the world to render part of its national ammunition stockpile fully traceable.  The Somalia pilot project signified a global milestone in Weapons and Ammunition Management (WAM), demonstrating that forensic science is an effective method at tackling arms division and corruption, an issue notorious for being difficult to combat. Mission to make ammunition traceability “This extended partnership represents a pivotal, ongoing mission to make ammunition traceability a global norm,” explained Marcus Wilson, CEO of Torchlight Technologies. “The success of the Somalia pilot was just the beginning, and we are thrilled to continue working with DeterTech to scale that success. Together, we aim to work with governments, industry, law enforcement, and responsible end-users to prevent diversion, deter illegal activity, and support investigations.”  Developed in partnership by DeterTech, Torchlight Technologies and Conflict Armament Research, AmTag uses a blend of rare earth elements and fluorescent compounds to create a unique, identifiable forensic “code” detectable under UV light. Redefining ammunition governance It can easily be applied within existing weapon stores or as part of the initial manufacturing processes. The underlying technology, SmartWater, has been used for 30 years to tackle other forms of acquisitive crime and retains a 100% conviction rate in contested court cases. “AmTag is redefining ammunition governance, and we’re thrilled to extend our partnership with Torchlight Technologies. We’re proud to support governments and global partners committed to reducing illicit arms proliferation through robust, evidence-based solutions.” Rebecca Millership, Forensic & Product Category Manager at DeterTech.  Looking ahead, DeterTech and Torchlight Technologies will continue to promote ammunition traceability, expand deployments, refine technology, and support governments in adopting best-in-class WAM practices. This will ensure global ammunition supply that is responsible, accountable, and traceable.

Vismo's Checkpoints at GSX 2025: Enhance security
Vismo's Checkpoints at GSX 2025: Enhance security

At GSX 2025 –Ernest N. Morial Convention Centre, New Orleans, September 29 to October 1, booth #3619 - Vismo will demonstrate its new “Checkpoints”, which uses QR codes at key points in a building or venue to create timestamped logs of presence. Not requiring a GPS location, Checkpoints’ QR code readings are automatically recorded in Vismo’s secure portal immediately the codes are scanned by phone. Vismo Protect App’s panic button “Checkpoints enables employers to know exactly where their staff have been - and when,” says Vismo Director of Global Sales, Colin Dale. “That’s critical for ensuring safety and maintaining operational oversight - including where security companies’ clients require verification for ensuring accountability and attendance by security personnel as legally agreed." “Checkpoints also raises the bar for safety of personnel, who can use the Vismo Locate & Protect App’s panic button on their phone if in danger. That will alert admin teams, who will contact emergency services if necessary.” Webinar: Prior to GSX 2025, Vismo will run a 30-minute free webinar, on Teams, about Checkpoints on September 24 with Colin.  Supports new laws Checkpoints will support the Terrorism Act 2025, also known as Martyn’s Law, when it comes into effect Checkpoints supports Intro. 0991 - the Safe Hotels Act - a new law of New York City for stronger standards for safety and staffing, including when cleaning on their own in hotel rooms.   Similarly, the tool can also be used for supporting lone healthcare workers, a sector shocked by the murder of nurse Joyce Grayson during a scheduled check at a Connecticut halfway house in 2023. In the UK, Checkpoints will support the Terrorism (Protection of Premises) Act 2025, also known as Martyn’s Law, when it comes into effect. The act is designed to improve security and preparedness for potential terrorist attacks at public premises and events, following the attack. It’s named after Martyn Hett, who died in the 2017 Manchester Arena terrorism attack.  mSafety smart watch Also on booth #3619, Vismo will demonstrate Sony’s mSafety smart watch that can be used for addressing the needs of workers in specific roles and industries.  Vismo is integrating mSafety with its own backoffice operations, secure portal included, to ensure that mSafety’s location tracking, panic button and “man down” detection are supported by Vismo.

UVision's new AI COS for advanced warfare systems
UVision's new AI COS for advanced warfare systems

UVision Air Ltd., a global pioneer in loitering munition systems, is unveiling a major advancement in autonomous warfare: an AI-based Common Operating System (COS) that serves as a unified platform for operating multiple loitering munitions of various classes, mission types, and deployment levels. Designed for full interoperability, the COS enables seamless integration of rotary-wing platforms, such as the Viper system by SpearUAV – operated at tactical team levels including squad, platoon, battalion, and beyond – alongside Uvision’s fixed-wing HERO family, including the long-range, high-payload HERO-120 and HERO-400. The result is a truly heterogeneous ecosystem, all operating under a single AI-powered control layer. Real-time adaptability to evolving threats At the core of the system is a multi-layered AI engine that autonomously manages complex mission execution At the core of the system is a multi-layered AI engine that autonomously manages complex mission execution across a heterogeneous array of assets. Tasks are intelligently allocated: one munition may penetrate and disrupt electronic warfare defences, another performs ISR and real-time target acquisition, and a third executes a coordinated precision strike.  This mission-centric distribution ensures real-time adaptability to evolving threats, delivering both terrain dominance and operational superiority. Command-and-control ecosystems The COS performs continuous optimisation based on target profile, terrain, and platform availability, maximising effect, while minimising resource expenditure. This allows commanders to make data-driven decisions on how many and which types of munitions to deploy for maximum mission effectiveness and cost-efficiency. With an open-architecture design, UVision’s COS integrates seamlessly into existing command-and-control ecosystems, reducing barriers to adoption and enhancing cross-platform synergy. New Common Operating System Dr. Ran Gozali, CEO of UVision Air Ltd., stated: "This new Common Operating System transforms loitering munitions into a smart, coordinated system-of-systems. It reflects UVision’s strategic shift toward integrated, modular combat solutions that are both operationally decisive and cost-effective." Dr. Ran Gozali adds, "Forces no longer need to expend high-end weapons for every target. Instead, they can deploy the right capability for each mission and dominate the battlespace with agility and intelligence."

View all

Expert commentary

Martyn’s Law is here: Is your organisation ready?
Martyn’s Law is here: Is your organisation ready?

The terrorism threat in the UK is very real. In fact, since July 2019, the threat level has never dropped lower than “substantial” or “severe.” To ensure preparedness across public places and events, the UK government has introduced the new Terrorism (Protection of Premises) Act 2025, more commonly known as Martyn’s Law in memory of Martyn Hett, a victim of the 2017 Manchester Arena bombing. Overarching aim The new legislation requires operators of public spaces and events to immediately assess and improve their readiness to respond to a terrorist attack. The overarching aim: being better prepared, protected and ready to respond should an attack occur.  Everything from busy shopping centres to large stadiums must comply with Martyn’s Law by April 2027, and the Security Industry Authority (SIA) is charged with enforcing the rules. Upgraded security systems The smaller venues and events are only required to enforce low-cost solutions with no physical measures There are different rules depending on the capacity of public premises or the event, ranging from a standard-duty premises (200 – 799 people, including staff) to an enhanced-duty premise (over 800). The smaller venues and events are only required to implement low-cost solutions with no physical measures. Enhanced environments, however, must provide monitoring in and around the facility and document public protection measures. Many organisations will likely invest in upgraded security systems. However, effective responses depend not only on hardware but also on situational awareness and training, helping staff identify potential threats and respond effectively under pressure. Physical security information management systems Terror-related attacks are rare and unpredictable, and the most experienced personnel are not always on shift when something does occur. Even if they are, the most seasoned security professionals can’t ensure every decision they make is the right one. One solution gaining attention is physical security information management (PSIM) systems, which integrate siloed security tools — such as CCTV, access control and fire sensors — into a unified platform. PSIMs enable rapid information processing, automated workflows and coordinated responses to incidents, whether routine or critical. Use PSIMs to handle emergencies PSIM systems have been around for many years and have been embraced by large airports and mass transit organisations PSIM systems have been around for many years and have been embraced by large airports, mass transit organisations and critical infrastructure companies. However, these systems are ideally suited to any larger scale environment, such as those classified as an enhanced-duty premise by Martyn’s Law. For example, airports use PSIMs to handle emergencies, locate missing persons or assess potential threats like unattended luggage. Similarly, PSIMs can improve situational awareness for stadiums, shopping centres and event venues, aiding crowd management, emergency evacuations and collaboration with police or emergency services. External stakeholder intervention Should an incident require external stakeholder intervention, the PSIM becomes a mission-critical collaboration tool, enabling real-time information (including video footage) to be shared with decision-makers, emergency control rooms and first responders en route to the scene. This ensures they arrive with the appropriate resources and can deploy faster to the right places. PSIM systems also facilitate post-incident analysis, helping organisations improve protocols, demonstrate compliance and fulfil their duty of care. Impacted by terror-related tragedies Martyn’s Law aims to eliminate the complacent mindset of “it won’t happen here” when assessing the risks associated with public gatherings. Communities impacted by terror-related tragedies serve as a stark reminder that such incidents can and do occur. Within the security sector, it is crucial to promote discussions on how new approaches, technologies, and training can enhance preparedness. Equally important is the responsibility to raise awareness about Martyn’s Law and its role in fostering safer public spaces.

Understanding and implementing integrated security
Understanding and implementing integrated security

Integrated security solutions are so often recommended by security specialists, while this sounds impressive, what does it actually mean? The short answer is: combining all aspects of security in a layered approach that leaves no vulnerable points. In this article, I will unpick the meaning behind this well used phrase, exploring the key components that make up an effective integrated security solution, while also revealing my top tips when it comes to maintenance and how to specify a solution that will provide real value for money. Integrated security solution When we think of integrated security, we tend to think it’s something that only applies to ultra-high security sites that are entirely inaccessible to the public. We generally picture towering fences topped with barbed wire, guard dogs and security patrols, glaring floodlights, deafening alarms, and warning signs. In actuality, the integrated security approach can be applied to any type of site that needs protecting In actuality, the integrated security approach can be applied to any type of site that needs protecting. This could be a high security data centre or a water treatment plant that needs to be protected for public safety. It could also be a business park that requires open access during the day yet security at night, or even a school, where trespassing, truancy and theft of valuable equipment needs to be deterred, while welcoming environment is also necessary. Even residential properties require integrated security such as front and back garden fencing, CCTV, alarms, and security lights. The bread and butter To hone in on the ins and outs of an effective integrated security solution, it is helpful to follow the ‘5 Ds’ model of perimeter security. This covers the main components required to create a truly robust security strategy covering fencing and deterrents, surveillance and detection systems, access control, and personnel. Forming the first line of defence against unauthorised persons gaining access by freely walking onto, burrowing, climbing, or cutting through to the site is crucial but not the sole purpose of perimeter security. The type of perimeter security will also impact visitors’ first impressions of the premises, so while fencing and security toppings outlining a boundary act as a deterrent, they can also contribute to branding for the company by use of colour or style, or if logos or other signs are fixed to it. This is especially important for schools, who want to create a secure but welcoming environment. Sensor-triggered lighting Hostile Vehicle Mitigation (HVM) barriers should be deployed in the form of stand-off fencing Access control measures, such as gates, bollards, and rising arm traffic barriers, work best when used in conjunction with monitoring. Even on their own, they delay people from entering, however CCTV and other surveillance measures greatly improve their efficiency. Perimeter Intrusion Detection Systems (PIDS) are ideal for discreet monitoring and alert to any unwanted movement, and don’t underestimate the power of sensor-triggered lighting to deter trespassers.  For sites with a threat of vehicle-borne attacks, Hostile Vehicle Mitigation (HVM) barriers should be deployed in the form of stand-off fencing around the main perimeter and barriers, bollards, and gates which restrict vehicle movement. Finally, nothing deters criminals more than the presence of other humans. Employing security patrols and access control staff will remove any sense of opportunity from intruders. Most appropriate protection A risk assessment will help site managers assess the most appropriate protection while also considering factors beyond security, including aesthetics, privacy, and noise reduction. The location of the premises will impact certain elements such as coatings. As a base standard, steel fencing must be hot dip galvanised or Galfan® zinc alloy coated to protect it from rust and corrosion. A risk assessment will help site managers assess the most appropriate protection To add colour, polyester powder coating is the most durable, low maintenance option which does not chip or crack, Marine coating, is recommended for providing extra durability in coastal areas. If privacy is an important consideration for the site, opt for a solid fence type, however bear in mind this will hinder any line of sight and opens up spaces for intruders to hide behind, so assess the site’s needs accordingly. Tip top condition The maintenance of security measures is also an important element when considering an integrated approach, to check the system is working as it should be. Splitting a site into zones is a helpful way to map out where security is needed most and identify if there might be areas that require lower protection to prevent over-specifying. For example, higher-level security measures may be required in a zone that takes security staff longer to reach, to help deter or delay intruders as much as possible. Yet in clear lower-risk areas, it is possible to save budget by installing more frugal measures. Save vs splurge To get expert advice it is well worth taking advantage of free site consultations To get expert advice it is well worth taking advantage of free site consultations and counter terror initiatives where appropriate. Their input will help ensure the right, quality products are being specified where they should be, thus limiting the need to spend more money again in the future. If you’re still unsure, I would recommend testing temporary barriers on the site before installing permanent measures, this will help deduce what works and what doesn’t on the premises in question. However, if your risk assessment returned a ‘high risk’ result, it is best to not leave it months before implementing the final plan. Safety and security of buildings Finally, though it may seem counterintuitive, spending more upfront could help you save money overall - remember that quality fencing is going to serve you for a long time. It will need less maintenance and replacing, costing less in the long run. Budget is not an excuse for poor security which compromises the safety and security of buildings It is also worth checking the fencing specified comes with a long guarantee, this will ensure it is covered if defects arise as a result of manufacturing processes. Budget is not an excuse for poor security which compromises the safety and security of buildings, people and assets, particularly in the public realm. Instead, focus on getting it right from the very beginning, rather than risk having to spend the money twice. Full risk assessment There is no single solution when it comes to securing a site. Every situation must be considered individually, starting with a full risk assessment. We recommend an integrated approach to property security wherever appropriate. Along with a secure perimeter, this might also include effective lighting in shaded areas and at doors, gates, and shop windows, Perimeter Intrusion Detection Systems (PIDS), and well-placed CCTV. These measures can hinder entry and escape, or increase the chance of discovery and detection. The key message to take away, is that as helpful as modern electronic technology is, in the event of a power failure or malfunction, a site is left vulnerable if this is the only protection you have. Combining electronic measures with traditional, physical security fencing and gates is the only way to have guaranteed protection 24/7.

Why people will power business security in 2022
Why people will power business security in 2022

In the era of the ‘Great Resignation’, it may seem counterintuitive to say that people will power business security in 2022. However, a convergence of challenges over the past few years has led to an undeniable trend in the security industry: With more technology comes the need for more people to monitor, analyse and leverage the data that technology produces. Always-on approach to security Since businesses were forced into lockdown two years ago, we’ve seen technology adoption accelerate at an unparalleled rate, as leaders navigate the new working world. In fact, according to survey data published in STANLEY Security’s 2022 Industry Trends Report, more than three in four businesses (78%) report rapidly adopting new technologies due to the pandemic. Cloud security technology is among the tech that has experienced high rates of adoption; 91% of businesses report that they have implemented cloud security technology – such as cloud video surveillance and cloud access control – and nearly half (48%) say that this was due to the pandemic. Importance of remote security solutions Many businesses learned that remote security solutions have become a necessity To gain greater oversight and visibility into their security operations, many businesses learned that remote security solutions have become a necessity, in order to help protect their people, property, and assets, especially when their facilities aren’t fully occupied. However, an ‘always-on’ approach to security isn’t just about implementing cloud technology, artificial intelligence (AI), machine learning, and the like. Security still remains a question of people, particularly when it comes to creating a healthier, safer, and more efficient environment for businesses. Making sense of the data With an influx of data coming from various security systems and sources, businesses have a clear opportunity to appoint an expert, in order to oversee these new technologies. Many businesses already recognise the value in doing so: 65% expect to hire a leader this year to oversee new technologies they implemented, as a result of the COVID-19 pandemic. Over the next five years, more than one-third of businesses (38%) expect to hire a senior leader, in order to oversee security, data and privacy. Identifying emerging training needs Such a leader would play an integral part in helping businesses to unlock the wealth of insights currently stored within their security infrastructure. For example, the data stored in security systems could inform talent management – identifying emerging training needs and ultimately, resulting in improved employee satisfaction and reduced attrition. In the retail sector, executives can extract data on footfall from CCTV and sensors In the retail sector, executives can extract data on footfall from CCTV and sensors, and directly correlate that to sales volume and value – thereby building a picture of how external factors impact revenues. This can be used to formulate predictions on consumer behaviours, promotions, and other sales activity. As we look to the future of the workplace and how organisations are using security systems to drive health, safety, and efficiencies – having an executive who is dedicated to this area will be critical in driving business growth and resilience. Doing more with less Around the world employees are quitting their jobs at a record pace, creating what has been dubbed the Great Resignation. In the United Kingdom, people are resigning at the highest rate in over a decade. In the United States of America, more than a fifth of the total workforce has left their positions, since April 2021. As businesses struggle to retain and recruit staff, they are looking for ways to overcome the labour shortage and optimise their operations, without compromising health, safety, and security. While leveraging technology and automation is certainly part of the solution, many are also turning to partners to support certain business functions, including security. Monitored security services Monitored security services, for example, allow businesses to gain 360-degree visibility into on-site operations, without hiring any new personnel. Instead, by partnering with a security provider that offers monitored security services, businesses have access to a professional team around the clock, in order to help spot potential threats, reduce risks, and increase efficiencies on-site. With monitored security, businesses can leverage the support of a whole team of security professionals With monitored security, businesses can leverage the support of a whole team of security professionals, working 24 hours a day, 365 days a year, regardless of the number of facilities they operate, their occupancy levels, or hours of operation. As businesses have increasingly limited resources, including time and labour, professional monitored security services can help them do more with less. Building business resilience Ultimately, a strong business security programme is powered by people. Beyond technological progress, organisations need accountable experts to actively monitor their operations, make the call when there’s a threat, and unlock the invaluable insights stored within security systems. People, not technology alone, can build business resilience, by leveraging technologies and the data they produce, so as to create safer, healthier, and more efficient environments.

View all

Security beat

ISC West 2022 promotes innovation, reflects resilience and dedication
ISC West 2022 promotes innovation, reflects resilience and dedication

Technology is driving new opportunities in the security industry. Innovation trends include artificial intelligence (AI), edge-based systems, mobile systems, a greater focus on software, and efforts to simplify operation of security systems, even as capabilities become more complex. ISC West 2022 reflected these changing trends. “In addition to emphasising technology innovation, ISC West also reflected an industry that is resilient, dedicated and passionate,” said Mary Beth Shaughnessy, the Event Director of ISC Security Events. ISC West 2022 “Almost 12,000 dealers, installers, integrators, end users and consultants reconnected at ISC West 2022, and there were nearly 20,000 total industry professionals in attendance (including manufacturers),” adds Mary Beth Shaughnessy. The 550 exhibitors and brands on display reflected an industry that has come through the COVID-19 pandemic in better shape than ever, poised for even greater success in the years ahead. Turning video and access control into knowledge Deployment of AI to ‘watch video’ can inform users of what’s happening in real-time Motorola Solutions emphasized several themes that were heard repeatedly throughout the show. “One trend is fulfilling the need to turn video and access control into sources of knowledge, inside the enterprise,” said John Kedzierzski, Motorola Solutions’ Senior Vice President of Video Security and Access Control. Deployment of AI to ‘watch video’ can inform users of what’s happening in real-time, while monitoring access control yields the equivalent of an operating system inside a building. Using the Cloud offers consumer ease-of-use to systems The second trend listed by Motorola Solutions is working to bring the consumer ease-of-use experience into enterprise security solution applications. Professional security systems were previously complicated to buy, install, manage and upgrade. However, using the Cloud, even distributed enterprises can bring consumer ease-of-use to systems, from improving the out-of-box installation experience to boosting the ability to manage the system. Transition to ‘mobile first’ interfaces The third trend emphasised by Motorola Solutions is transition to ‘mobile first’ interfaces, reflecting the need for busy security executives to be on-the-go, but with full access to their systems, without being chained to their desks. Since the last springtime ISC West show in 2019, Motorola Solutions has grown rapidly, both organically and through acquisition of IndigoVision, Pelco, Openpath, Envysion, and Ava Security. Cloud-based Orchestrate system Integration is simple through a ‘drag-and-drop’ approach that doesn’t involve writing code In addition, the company is making it easier to integrate video and access control systems with Motorola’s radio systems, typically carried by security guards. The cloud-based Orchestrate system translates ‘events’ from access control and video, to trigger notifications on a mobile radio. Integration is simple through a ‘drag-and-drop’ approach that doesn’t involve writing code. Simplifying implementation of AI Artificial Intelligence (AI) has traditionally been associated with the use of large servers or even intelligence in the Cloud. Several exhibitors at ISC West helped to change that misconception. For example, Oosto offers a simpler and more economical approach. They supply edge appliances for AI. The purpose-built Vision AI appliance, a small box, puts intelligence at the ‘near edge’, by connecting to up to five cameras. Easy and dependable ‘failover’ ensures redundancy without a big investment, and the system can work with any IP camera, including an end user’s installed base of cameras. Oosto’s TCO (total cost of ownership) calculator Oosto’s TCO (total cost of ownership) calculator spells out how much a customer can save versus using a big server, including lower costs such and power and cooling. AI was probably the biggest buzzword at ISC West, but there was also emphasis on the practical results of applying AI to physical security. Artificial Intelligence (AI) - the biggest buzzword at ISC West I believe our purpose is to bring buzzwords, like Cloud and AI together in a way that is useful to end-users" “What surprises me (at the show) is that there is a lot of generic marketing of AI, but we are trying to step back from our analytics and look at applications that serve certain end-users,” said Jeff Corrall, Vice President - Product Management at March Networks, adding “As an industry, we are still at the stage of AI as a buzzword.” Jeff Corrall further said, “I believe our purpose is to bring buzzwords, like Cloud and AI together in a way that is useful to end-users. We have to live with the buzzwords, but what we really want is to apply them. That creates a stickiness with the end-user — when high technology is making a difference.” March Networks Labs address specific end-user problems and then apply their systems to provide a solution. Jeff Corrall adds, “A lot of AI is responding to what the customer is asking for, and we are stepping back and making sure the end-user will use it on a consistent basis.” ‘Edge versus cloud’ was a common theme at ISC West Edge versus Cloud ‘Edge versus cloud’ was a common theme at ISC West, pondering where in a system the ‘intelligence’, such as AI and machine learning, as well as other functionality, should reside. Among the companies addressing the quandary was Axis Communications, which focused on the issue using a racing theme at their presentation to the industry press. The winner of the ‘race?’ - The combination of both approaches working together as a team, of course. AXIS Speed Monitor on exhibit One introduction at the show was the AXIS Speed Monitor, a speed detection app available using ACAP Axis Communications also highlighted the deep learning analytics of the ARPEC 8 camera chip (introduced during the COVID-19 pandemic), which will be deployed across their camera line. One introduction at the show was the AXIS Speed Monitor, a speed detection app available using ACAP (Axis Camera Application Platform), the capability to load ‘apps’ onto camera chips at the edge. They also introduced the D4100-E Network strobe siren (a smart edge device), the Audio Manager Pro (a cloud-based software system enabling zoning and callouts for specific areas in a building), the W101 body worn cameras with GPS capabilities, and a Barcode Reader for doorstop applications (another ACAP app). ‘App Store’ approach to expanding applications Azena is at the centre of expanding applications at the edge, promoting new applications through an ‘App Store’ approach that sells software apps that can be loaded onto cameras that are equipped with Azena’s operating system. In the last couple of years, the company (formerly known as Security and Safety Things) has expanded its offerings. There are currently 108 apps in the store from 30 to 40 app developers. There are 14 camera models (from six manufacturers) that are commercially available and run their operating system. The newest camera is a fisheye model from Vivotek. “What we have seen is that a lot of the use cases are pretty unique,” said Fabio Marti, Vice President - Marketing for Azena. Two examples are an application that monitors a flame to ensure it is burning cleanly (no smoke). Another system monitors nets covering fish farms to avoid birds getting tangled up in the nets. Fabio Marti said “A challenge is to find new business avenues for integrators. Everybody is not eager to look beyond their comfort zone.” Focusing on software to ensure user experience Software systems are one of the major focal points for innovation in security systems Software systems are one of the major focal points for innovation in security systems and Verkada is focusing on how software innovation can improve systems. “For decades, innovation was on the hardware front,” said Filip Kaliszan, Verkada’s Founder and Chief Executive Officer (CEO), adding “We saw an opportunity for more innovation on the software side. The customer experience revolves around software.” Ensuring an end-to-end experience “We want to guarantee an end-to-end experience,” adds Filip Kaliszan. As a new company with a ‘hybrid cloud’ approach, Verkada focused on appealing to end users to convince them of the value proposition. Once an end user was convinced, Verkada brought in an integrator partner to deliver the solution. In effect, Verkada finds demand and brings that demand to the integrator. Software-centric operation of a modern building Verkada is broadly focused on ‘software-centric operation of a modern building.’ After starting out in video, Verkada has since expanded into systems for access control, alarm systems, and other categories. They use a combination of third-party hardware and equipment that is custom designed to work seamlessly with their software systems. Verkada’s end goal is to put the various systems together into a platform. They will continue building each product category, which will eventually be unified into ‘the operating system for the building of the future.’

CES 2020 to focus on security’s intersection with consumer electronics
CES 2020 to focus on security’s intersection with consumer electronics

Security’s intersection with consumer electronics is on view at CES 2020, the world’s largest technology event, Jan. 7-10 in Las Vegas. The giant show features more than 170,000 attendees, 4,500 exhibitors and 1,100 industry thought-leaders featured on the CES stage. A range of technologies will be on display, from artificial intelligence (AI) to 5G, vehicle technology to AR/VR (augmented and virtual reality), robotics to home automation. Security plays a prominent role, too.The impact of this event for the smart home could be about delivering home analytics and enhancing privacy" Smart home market on the forefront The smart home market is a major focus. “For the smart home market at CES this year, we expect to see numerous announcements regarding home awareness,” says Blake Kozak, Senior Principal Analyst at IHS Markit. “This will include brands offering up additional analytics for consumer security cameras with a focus on edge-based solutions.” “The impact of this [event] for the smart home could be about delivering home analytics and enhancing privacy through cloudless architectures and new electronic door lock approaches,” he adds. An example of cloud analytics is the Resideo Home app, introduced in December, which will make whole-home monitoring possible for four critical networks of the home – water, air, energy and security. Resideo promises a “simplified and integrated smart home experience.” Video is also prominent at the show. “For cameras, we can expect to see more cameras focused on the outdoor space and possibly new form factors for video doorbells,” says Kozak. Familiar security industry brands exhibiting at CES 2020 include ADT, Ring, August Home and Yale (both part of ASSA ABLOY), Bosch and Alarm.com. Focus on Cybersecurity In 2020, companies will continue to focus on solutions for protecting consumer data" Cybersecurity is an aspect of many of the devices on display at CES. “Device security and data privacy play a key role in the adoption of connected devices,” says Elizabeth Parks, President, Parks Associates. “Consumer security concerns for smart home products will continue to be a barrier to adoption in the U.S. and Europe, and these concerns can actually intensify with device adoption-71% of U.S. smart home households are concerned about cybersecurity. In 2020, companies will continue to focus on solutions for protecting consumer data. One big area of interest is protection on the network router, providing whole home solutions, which are very appealing to consumers.” “At CES we will see the traditional players introducing new DIY (do-it-yourself) products, as well as new players announcing new product features, services, and partnerships,” Parks adds. Smart access control Smart locks will be among the security products at CES 2020. For example, PassiveBolt, a lock company, will show the Shepherd Lock, a touch-enabled smart lock with enhanced security through sensors and AI. The add-on lock converts existing locksets into touch-activated devices. Another lock manufacturer is Kwikset, whose door locks and door hardware include Wi-Fi-enabled smart locks, Bluetooth-enabled smart locks, keyless and keyway-less locks and connected home technology. Video doorbells, including industry-innovator Ring, have been a hit in the consumer market. At CES, Ring will expand the mission to make neighbourhoods safer by creating a “Ring of Security” around homes and communities with a suite of home security products and services. The “Neighbors by Ring” app enables affordable, complete, proactive home and neighbourhood security. Homeguard offers a range of affordable CCTV solutions for home and small business DIY CCTV demonstrations DIY security systems are another market. Homeguard is a leading DIY consumer brand offering a range of affordable CCTV solutions for home and small business, including wired and wireless CCTV kits, smart cameras, home alarm systems and wire-free HD CCTV kits. Swann Communications is also at the forefront of surveillance and monitoring with new products developments including wire-free HD cameras and doorbells, professional CCTV video surveillance systems, and 1080p full HD systems with “True Detect” heat and motion sensing. AVTECH, and subsidiary YesGo Tech, will demonstrate a compact Wi-Fi home security set, a series of special cameras with face recognition, thermal detection and license plate recognition, customised central management software and a university ID tag that is compatible with access control, OEM and ODM opportunities. Security and automation solutions D-Link’s home networking, security and automation solutions will help consumers connect, view, share, entertain, work and play. SECO-LARM, manufacturer of a Room Occupancy Monitor that shows whether a room is in use, has a line of keypads and proximity readers with built-in Bluetooth for convenient access. Another smart home security solutions provider, Climax Technology, integrates wireless security, home automation, energy management, home emergency monitoring and live visual monitoring. Personal safety mobile application Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens" WaryMe designs and develops a personal safety mobile application to improve a user’s security in public places, schools, transports and companies by addressing major risks such as terrorism attacks, intrusion, fire and even industrial accidents. An all-in-one mobile application integrates alerting, crisis management and mass notification features. “Market players are looking to expand beyond established smart home devices like smart thermostats and networked cameras to products like smart water leak detectors, smart pet feeders, and smart air purifiers,” says Elizabeth Parks. “Manufacturers are positioning outdoor cameras as deterrents to theft before a burglary happens. This trend is part of a broader security marketing effort to extend the perimeter of home security beyond traditional home access points.” “Familiarity with smart home devices lags behind familiarity with smart entertainment products; it even lags that of smart speakers, which are quite new in the market,” adds Parks. “In 2020, we will see players working to advance the visibility and marketing around device integration, and specifically focus on use case scenarios around safety, security, and convenience, which have always been the primary drivers of adoption of these types of products.”

UK Government releases strategy to tackle growing security threat of drones
UK Government releases strategy to tackle growing security threat of drones

The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centres on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximising benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximising the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.”  The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.

View all

Case studies

Delta’s DSC501 stops unauthorised vehicle at FBI building
Delta’s DSC501 stops unauthorised vehicle at FBI building

Delta Scientific, the pioneering manufacturer of counter-terrorist vehicle control systems used globally, announced that on Monday, April 1st, a DSC501 High-Security Barricade stopped an unauthorised vehicle from entering an FBI field facility in Atlanta, Georgia. According to officials, the orange Buick Encore tried to follow an FBI employee’s car into the facility before being stopped by the Delta DSC501 barrier. The driver was then apprehended by special agents who were in the immediate area. Strength and reliability of Delta “Delta has a long history of thwarting attempts by unauthorised vehicles trying to enter facilities where they could potentially cause serious harm to civilians and structures,” states Greg Hamm, Delta Vice President of Sales and Marketing.  “We are extremely proud to celebrate our 50th anniversary this year protecting the world’s most important institutions. The strength and reliability of Delta barriers is unrivalled.” FBI field office On June 27th, 2006, the DSC501 was tested to the most extreme parameters on record The DSC501’s protecting the FBI field office are the strongest in the world. On June 27th, 2006, the DSC501 was tested to the most extreme parameters on record. A 65,120-pound dump truck hit the DSC501 at 50mph and was stopped at the barrier.  At the time of the test, this would have roughly equated to a K54 rating with the crash energy equalling 54,000,000 foot-pounds. ASTM M50 testing level How impressive is this? The current highest ASTM M50 testing level requires 12,500,000 foot-pounds of energy when impacting the barrier. This is a factor of over 4x which is extremely impressive considering the magnitude of the current M50 test.  Contact Delta Scientific if they want to make sure the facility has the strongest, most reliable barriers on the market. They are celebrating 50 years in business in 2024.

Philadelphia Police Department announces pilot programme with Databuoy Corporation
Philadelphia Police Department announces pilot programme with Databuoy Corporation

Databuoy Corporation, a gunshot localisation and real-time emergency alert intelligence system, and the Philadelphia Police Department announced that SHOTPOINT, Databuoy’s life-saving gunshot localisation and detection system, has been selected by the Department for a pilot programme to help to reduce gun violence throughout the city. With gun violence on the rise, officials sought a solution that could accurately detect a gunshot and localise where it came from, to prosecute more offenders and hopefully lessen the number of incidents. When public safety is at risk, having real-time systems that seamlessly communicate vital information is key for first responders. Databuoy's SHOTPOINT system Databuoy's SHOTPOINT system can be deployed in nearly any environment with near-perfect results. SHOTPOINT eliminates false positives, without human intervention, and provides accurate, quickly deployed reports to first responders. “Our system works reliably in high noise environments and around vehicular traffic without false detections,” Kathleen Griggs, Databuoy CEO said. “The system is automated and gets information to responding officers instantly and has supported police response and investigations for multiple homicides in the years we have been installed.”  Game-changing technology SHOTPOINT is becoming more accessible to cities since it has been awarded MAS contract by GSA SHOTPOINT is a game-changing technology that is unsurpassed in its detection and location accuracy and one that law enforcement and security clients can trust. “We are deployed in some of the most volatile environments in the country, like the Fremont Street Experience in Las Vegas,” says former CBP Commissioner, David Aguilar, one of Databuoy Corporation’s Board of Advisor Members. “We are confident it will do the same for the City of Philadelphia.” SHOTPOINT is becoming more accessible to cities since it has been awarded a Multiple Award Schedule (MAS) contract by the General Services Administration (GSA) on a Service-Disabled Veteran-Owned Small Business (SDVOSB) contracting vehicle and is available on The Interlocal Purchasing System (TIPS) through a Minority Owned 8(a) Small Business. Pilot programme “We are committed to the safety of our citizens,” Robert Keehfuss, Philadelphia Police Department, Public Safety Technology Program Manager said. “Philadelphia needs a system that will instantly give us the precise location where the shot occurred. Every second counts when it comes to saving lives and catching shooters, so the faster we get the detailed information, the better chance we have of protecting our citizens.” The pilot programme between Databuoy and the Philadelphia Police Department will be ongoing for the next several months and cover one of the city’s heaviest gun violence areas. If the system performs to the goals outlined in the pilot, there is support for a larger rollout plan.

Safetyflex anti-terrorist bollards have now been installed in the heart of Melbourne, Australia
Safetyflex anti-terrorist bollards have now been installed in the heart of Melbourne, Australia

More than 2,000 innovative Safetyflex anti-terrorist bollards have now been installed in the heart of Melbourne, Australia, as part of a local government scheme launched in response to a fatal vehicle attack. Coventry-based Safetyflex Barriers has installed its spring steel bollard system across the Melbourne Central Business District (CBD) with the help of its Australian distributer, Ezi Security Systems. Most prominent pedestrian The city was rocked by a vehicle attack in January 2017 when a car was deliberately driven into pedestrians along Bourke Street, killing six people and leaving 27 seriously injured. In the aftermath, a AUS$52.5 million security upgrade at Melbourne's busiest and most prominent pedestrian sites was commissioned by The City of Melbourne, with hostile vehicle mitigation predominantly featuring Safetyflex’s advanced spring steel bollards. More than 2,000 of the slimline bollards have now been installed across key sites within the CBD, in addition to further sites in Australia, helping to keep high-risk crowded places safe from the threat of vehicle attacks. Anti-terrorist bollard system The unique thing about our bollards is they only require shallow foundations around 200mm deep" Marcus Gerrard, Director at Safetyflex Barriers, said: “Our patented anti-terrorist bollard system has been game-changing, providing unprecedented crash test certified performance in an attractive, slimline design. We are the only company in the world to use this type of technology in anti-terrorist bollards and crash rated street furniture.” He adds, “The unique thing about our bollards is they only require shallow foundations around 200mm deep, which is key in helping cities such as Melbourne navigate around in-ground obstructions, whilst still providing high-level security systems. The installation of the 2,000th spring steel bollard is of great satisfaction and pride, and reflects our strong experience and expertise in securing busy cities and centres worldwide. Our bollards will help ensure the safety of residents and visitors to Melbourne and Australia for years to come.” Stopping vehicle attacks The spring steel technology means the bollards can be installed in fixed, removable or retractable versions, while the elegant stainless-streel shrouds are also fitted with reflective bands to provide night-time visibility. The bollards have already proved their worth in stopping vehicle attacks, when in 2021 a stolen car fleeing police in Melbourne CBD was halted in its tracks by a Safetyflex bollard before the drivers could inflict any damage. Pedestrians were able to retreat to the protection offered by the line of Safetyflex bollards, ensuring nobody was hurt. Safetyflex has now become one of the biggest suppliers of anti-terrorist bollards in Australia, protecting high-profile locations in Brisbane, Melbourne and Sydney from the threat of vehicle attacks.

Cozaint BOBBY kiosk implemented as safe zone security tower at Arizona Tribal Police Station
Cozaint BOBBY kiosk implemented as safe zone security tower at Arizona Tribal Police Station

Cozaint Corp, the developers of intelligent surveillance solutions, has been selected by the Pascua Yaqui Tribe Police Department in Tucson, AZ, to deliver the BOBBY physical security tower to provide a “safe zone” location for local citizens to conduct sales transactions, custody transfers, or other dealing where a security monitored area would provide a safe setting. Cozaint’s BOBBY platform of physical security kiosk tower provides 24/7 situational awareness for organisations of all sizes with various IoT security sensors, constant video surveillance, and tied to a remote monitoring centre. Cozaint BOBBY kiosk tower The Cozaint BOBBY kiosk tower also has a 27” interactive display that displays information about local tribal activities as well as allowing for visitors to activate a “panic button” if they feel threatened. The BOBBY “safe zone” tower is connected to the tribal police department where officers can see and speak with the user to determine if an emergency exists and how best to respond. “With certain transactions occurring between complete strangers —such as online sales— sometimes our community may wish to meet at a more secure location where video surveillance and the ability to reach one of our officers in an emergency is all in one safe zone,” said LT. Elizabeth Esparza of the Pascua Yaqui Police Department. BOBBY safe zone tower BOBBY safe zone tower delivers peace of mind to Pascua Yaqui Police Department and its citizens With 360-degree video surveillance coverage and 24/7 video recording, the BOBBY safe zone tower delivers the peace of mind that the Pascua Yaqui Police Department and its citizens are looking for to safely meet others with eBay or other sales transactions, when custody transfer events occur, or other interactions where a safe and monitored location is preferred. “Our BOBBY tower unit is an ideal community safe zone security platform, where users can rest assured that they are being monitored for safety and security reasons when dealing with various transactions with others in the community,” stated Jay Jason Bartlett, CEO, Cozaint, adding “Interacting with the Pascua Yaqui Police team in the event of an emergency provides an additional level of security for the local community.” BOBBY tower unit The BOBBY tower unit also displays local community information as well as current events, helping to keep the community up to date on what is happening throughout the tribe. This particular BOBBY tower unit is located on tribal land in the desert of Tucson, AZ, where the summer rains and high temperatures create harsh operational conditions for an outside device such as this.

View all

Round table discussion

How important will body-worn cameras be moving forward?
How important will body-worn cameras be moving forward?

The death of Michael Brown at the hands of police in Ferguson, Missouri, in August 2014, highlighted to the public, the importance of body-worn cameras. There was no bodycam footage of the Ferguson tragedy. Arguably, it would have shed additional light on the shooting. Since then, body cameras have become a tangible legacy of Ferguson, Missouri. Bodycam footage is seen as providing greater accountability and ensuring an impartial record that can support, or debunk, any claims of police misconduct. Body-worn cameras are also finding their way into broader usage, even including customer service applications. We asked this week’s Expert Panel Roundtable: How important will body-worn cameras be moving forward? 

Emerging jobs & career opportunities in the security industry
Emerging jobs & career opportunities in the security industry

A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labour pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?

What are the security challenges of protecting critical infrastructure?
What are the security challenges of protecting critical infrastructure?

Many of us take critical infrastructure for granted in our everyday lives. We turn on a tap, flip a switch, push a button, and water, light, and heat are all readily available. But it is important to remember that computerised systems manage critical infrastructure facilities, making them vulnerable to cyber-attacks. The recent ransomware attack on the Colonial Pipeline is an example of the new types of threats. In addition, any number of physical attacks is also possibilities. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting critical infrastructure?

View all

White papers

Monitoring traffic flow: Everywhere, all the time

Monitoring traffic flow: Everywhere, all the time

Download
The critical importance of Trusted Execution Environment in access control

The critical importance of Trusted Execution Environment in access control

Download
How to ramp up perimeter security with license plate reader technology

How to ramp up perimeter security with license plate reader technology

Download
Access control & intelligent vehicle screening

Access control & intelligent vehicle screening

Download
View all

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Counter terror
About this page

In-depth coverage of counter terror news and the latest security trends in counter terrorism. Read announcements from companies involved in counter terror initiatives and solutions. Experts and thought leaders share their insights and recommendations on counter terrorism matters.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec