COVID-19
iDenfy, a Lithuanian-based RegTech company best known for its identity verification tools, has announced a new partnership with SetFreaks, the world’s first pre-release service for DJs in the dance music industry. This collaboration will enhance regulated compliance and automate user identity verification on the SetFreaks platform while adding an extra layer of security to internal fraud prevention measures. SetFreaks, the world’s first pre-release service for DJs in the dance...
Many airports have been affected by the 100ml liquid limitation being reimposed for some 3D X-ray screening equipment, requiring passengers to remove any liquid, gel, or aerosol above 100ml from their bags and have it screened separately. X-ray screener training Airport security personnel play a crucial role in safeguarding passengers and preventing potential terrorist threats, and given that the world is entering peak summer travel season, with ever-increasing threats from around the world, i...
Inflation, the rise in prices of goods and services over time, can result from a multitude of factors. It happens when there is more money chasing a limited supply of goods. It happens when the cost of producing and transporting goods increases. It can even happen because expectations of future inflation heighten current demand to avoid higher prices. During and after the COVID pandemic, supply chain disruptions, shifting consumer demand, and government stimulus all contributed to higher inflati...
A new report from Novaira Insights reveals that the global video surveillance hardware and software market experienced a 3.4% growth in 2023. However, the report, “The World Market for Video Surveillance Hardware and Software”, also reveals this growth was characterised by a decline of 2.7% in the Chinese market. The rest of the world (excluding China) saw an 8.2% growth. A slower rate than the 13.2% growth achieved in 2022. Supply chain distribution According to lead analyst and...
NDI, the plug-and-play connectivity standard, announced it has been named an official Crestron Integrated Partner. Crestron, a pioneering global provider of workplace collaboration technology, offers NDI support on the Crestron 1 Beyond line of broadcast-quality PTZ cameras and Automate VX multi-camera speaker tracking solution. These products are designed to bring equity and boost interactivity to meeting room applications, a critical use case for pro AV. The integration allows Crest...
Over one-third (35 percent) of Chief Information Security Officers (CISOs) admit to ignoring the National Cyber Security Centre’s (NCSC’s) cybersecurity guidance. This finding and others were revealed in a new survey and report from Absolute Security, a global pioneer in enterprise cyber resilience. Cyber Resilience Report 2024 This finding was despite 48 percent of respondents revealing that their organisation was hit by a ransomware attack over the past year. The NCSC has issued...
News
Current UK Managing Director Andy Madge will retire, effective 1 July 2024, handing over responsibility for the UK and Ireland subsidiary to Mike Garrod. Mike Garrod, with extensive experience in the aerospace and defence sectors, joined Frequentis UK on 13 May to begin a phased handover to close Andy’s seven successful years as Managing Director of the UK and Ireland subsidiary. Frequentis UK Frequentis UK operates across all five Frequentis business segments, including civil and military air traffic control, public transport, public safety, and maritime. Under Andy Madge’s leadership, the company has experienced remarkable market growth, transforming from a small branch into a key contributor to the international success of the Frequentis Group, as well as successfully navigating challenging times, including Brexit and the COVID-19 pandemic. Mike Garrod's experience Mike has held various leadership roles in engineering, programme management, and business development Before joining Frequentis, Mike Garrod served as the Managing Director of MKC Training, where he has overseen operations since September 2019. With a career spanning 16 years at the UK-based defence technology company QinetiQ, Mike has held various leadership roles in engineering, programme management, and business development, working on projects ranging from global navigation systems to electronic warfare. Next phase of development “The Frequentis Executive Board expresses its sincere gratitude to Andy for his contributions over the last seven years. Under Andy’s Leadership Frequentis UK gained prominent contracts including the Metropolitan Police Service, West Yorkshire Fire Service, Maritime and Coastguard Agency, and UK Ambulance Radio Programme, as well as fostering relationships with the long-term partners Ministry of Defence and National Air Traffic Services (NATS)." "We wish Andy all the best in his retirement and would like to warmly welcome Mike to continue to lead the company into its next phase of development,” says Norbert Haslacher, CEO of Frequentis. The transition between Andy Madge and Mike Garrod will be managed from May until the end of July 2024.
Databarracks, the technology and business resilience specialist has acquired Glasgow-based PlanB Consulting to enhance its Operational Resilience and Cyber Continuity consulting practice. PlanB Consulting Chris Butler, Resilience Director, Databarracks commented, “We are thrilled to have PlanB join us. PlanB has been a powerhouse in Business Continuity and Resilience for almost two decades. They’re widely known, highly respected, and one of the true thought pioneers in our industry." "Led by the highly respected Charlie and Kim Maclean-Bristol, they are a multi-award-winning Business Continuity Consulting business and stalwarts of the resilience community.” Cyber Resilience services Kim Maclean-Bristol, Co-Founder and Director of PlanB explained, “We’re pleased to find a home with an organisation that gives us a broader market reach and shares our values and vision for changing the way we make organisations resilient." "Together we bring a wide range of consulting skills, and real-world expertise and can now offer a complete range of Business Continuity, Crisis Management, and Cyber Resilience services.” End-to-end operational resilience Customers of the combined business can benefit from a full suite of end-to-end operational resilience services Customers of the combined business can benefit from a full suite of end-to-end operational resilience services. From data protection, disaster recovery, business continuity, and incident response, to cyber incident exercises from a National Cyber Security Centre Assured Service Provider. Mike Osborne, Chairman, Databarracks, “There is no better independent Business Continuity Consultancy than PlanB. I’ve spent 30+ years in the industry and over the last few years the market has fundamentally changed." Data protection, technology recovery “The old guard of BC specialists has been absorbed by generalist IT service providers. Sungard Availability Services sadly went into administration in the UK. Throughout the pandemic, many of the smaller consulting providers took in-house roles, leaving ‘the big four’ as an expensive alternative." “The Operational Resilience market has become fractured across Cyber, Data Protection, IT Recovery, and Business Continuity Planning, now leaving few, if any, genuine specialists dedicated to end-to-end resilience. This acquisition creates a market-pioneering Data Protection, Technology Recovery, Business Continuity, and Cyber Resilience business offering in one.” Cyber arms race Chris Butler further comments “The world is undoubtedly more volatile and uncertain. Supply chains have come under extreme pressure and business interruptions remain highly likely. The cyber arms race shows little sign of peaking, and by the end of the decade, there will likely be few businesses that haven’t been targeted and impacted." “The organisations that thrive will be those who are prepared for this changing environment. PlanB strengthens this integrated approach, cultivating dynamic leadership, adaptive operations, robust technology, and supportive supply chains to enable businesses to survive and prosper.”
The GSMA, a global organisation that conducts the world's largest exhibition and conference for the mobile ecosystem across different continents — the annual Mobile World Congress (MWC) — has selected Regula as an identity verification provider for its event in Barcelona. In 2024 alone, the company’s solutions provided smooth and quick access for more than 100,000 attendees of the congress. MWC attracts tens of thousands of visitors, including representatives of mobile operators, device manufacturers, technology providers, vendors, and content owners. To ensure everyone's safety, the GSMA has traditionally conducted thorough registration and ID validation processes for each attendee. Efficiency of the registration process For many years, the ID validation process was done on-site at the venue, which caused queues and long wait times. With the advent of the pandemic in 2020, and attendance now regularly exceeding 100,000, the GSMA had to find a contactless solution to remove the need to have attendees wait in large numbers to collect badges and have their ID validated. The ID validation process was done on-site at the venue, which caused queues and long wait times To address these issues and improve the efficiency of the registration process, the GSMA decided to make it totally remote and digital, so that all attendees could swiftly get access to the venue through the entry gates. Any solution would also need to enable quick and efficient international document recognition, because attendees come from all over the world. Single-vendor solution by Regula To achieve their goal, the GSMA ran an extensive competitive tender process to find the best technology solution. Ultimately, they chose a complete, single-vendor solution by Regula which includes Regula Document Reader SDK and Regula Face SDK. Natively integrated, these solutions facilitate a smooth customer journey and rapid onboarding through seamless and secure identity verification, eliminating the possibility of fraud. This long-term coalition led to a significant enhancement of the visitor roll process Having successfully piloted Regula products during MWC Barcelona 2021, the GSMA fully transitioned to digital visitor registration and ID validation. After several years of collaboration, this long-term partnership led to a significant enhancement of the visitor registration process, enabling a fast and convenient user experience. Now, Regula Document Reader SDK and Regula Face SDK are easily integrated into the MWC’s existing registration platform for full-fledged production use. Regula Document Reader SDK Now, as part of the registration process, an MWC visitor simply uploads their ID on the official website. The identity document is automatically scanned by Regula Document Reader SDK. The solution instantly recognises the document type, reads its data, and verifies its authenticity with multiple cross-checks. Not only does it streamline the verification process (checks are completed in seconds), but it also minimises the chance of missing compromised IDs. Further, an MWC attendee has the opportunity to provide their selfie, which is rapidly captured by Regula Face SDK for user verification. Regula’s complete IDV solution GSMA managed to create a custom, smooth, and seamless roll experience for all MWC attendees With the industry’s largest and most comprehensive identity document template database, which contains over 13,600 templates from 249 countries and territories, Regula supports the verification of nearly any identity document from any part of the world. Taking into account MWC attendees’ geographical spread, this ability significantly facilitates the registration process. With Regula’s complete IDV solution, the GSMA managed to create a custom, smooth, and seamless registration experience for all MWC attendees. During the Barcelona event in 2024, Regula Solutions helped to efficiently validate more than 100,000 visitors – all of them registered online beforehand, so there was no need to queue at the venue. Advanced ID verification technologies "Our collaboration with GSMA for MWC highlights the power of digital transformation in handling large-scale international events. By integrating our advanced ID verification technologies, not only did we enhance the security and efficiency of the registration process, but also ensured a seamless experience for attendees," says Ihar Kliashchou, Chief Technology Officer at Regula. “The digital identity verification process has revolutionised the visitor experience, allowing more than 100,000 individuals to register and access the world’s pioneering connectivity event swiftly, safely, and without interruption," states Xavi Casals, Director of Technology, Innovation & Customer Experience at GSMA.
Chief Security Officers (CSOs), Chief Information Security Officers (CISOs), and Chief Information Officers (CIOs) play pivotal roles in steering organisations toward resilience. Up until recently, they were mostly technical roles responsible for protecting organisations from either physical or cyber threats. This has changed. Many security pioneers are becoming involved in the key business operations and aligning security and technology policy with overall business objectives. Security executives are playing a more critical role at the C-level. Shift to AI Yet recent data from Brivo shows that limited budgets and lack of authority may still hinder the C-level security pioneers' full potential. At the same time, a huge shift is occurring. Artificial Intelligence (AI) promises change in everything from biometrics to proactive security models. But given the risk that comes with change, security officers have a responsibility to ensure AI is only used within safe parameters in their organisations. This technology is set to seriously disrupt security, and the pioneers in charge of it. The rising importance of security officers in business policy Brivo's recent study Top Global Security Trends for 2024 found that nearly three-quarters of security professionals recognise CSOs have had a more important role in recent years. This recognition is likely a result of various factors: Seismic shifts induced by events like the COVID-19 pandemic. Significant job cuts and resignations following the pandemic and the subsequent recession in some parts of the world. The escalating threat landscape, including nation-state attacks. Mobile device policies Collaboration between HR and security departments is arguably one of the most important There are also signs of growing collaboration between Security Officers and other parts of their organisation. 82% agreed HR and security are more closely aligned on mobile device policies than they were three years ago. The trend is similar for alignment on workspace management (79%) and creating a culture of security awareness (79%). Collaboration between these two departments is arguably one of the most important for securing a business. Controlling workplace access For example, successfully controlling workplace access requires security teams to work closely with HR so they’re aware of anyone who has left the business. Their access must be revoked, effective immediately. The same applies to providing immediate access to new starters for a smooth transition into the business. Employee experience falters and risk increases significantly if these teams aren’t communicating. Current challenges It also discovered CSOs are typically only responsible for 42% of an organisation’s security budget Yet there is still work to be done. HR and security are a great example of collaborative working, but the rest of the organisation is still playing catch-up. The report found that 46% of security professionals see the lack of alignment between security and other departments as a barrier to the adoption of new physical security technology. It also discovered CSOs are typically only responsible for 42% of an organisation’s security budget. They are more likely to be part of the team making security procurement decisions than the ultimate decision-maker. This raises an important question: can CSOs truly be effective without more control over resources and decisions? The dawn of AI AI is both a threat and a useful tool for the security industry. Planning budgets and fully understanding the potential of this technology will be crucial for organisations to benefit from AI as soon as possible. This won’t be possible if CSOs do not have a credible seat at the table and the power to make decisions about how AI is used. Top four challenges Take the industry’s biggest AI concerns as proof that Security Officers are vital to aligning policy and managing risk. The top four challenges for adoption according to security professionals are seen as: Lack of budget. Cost of maintaining AI. Risk around inputting data into AI models. Limited AI expertise. Investment in training Investment in training around AI to build up expertise needs to be a top consideration and driven by both departments It’s clear security teams need reassurance that the right investment is made, and there is dedication to maintaining this evolving technology safely. Security teams need to be sure that their Security Officer is a key decision-maker so that risks are understood and accounted for. Again, HR and security collaboration is a must. Investment in training around AI to build up expertise needs to be a top consideration and driven by both departments. AI and automation investment The good news is that significant budgets have already been put aside for AI. In the UK over a quarter (27%) of enterprises with over a thousand employees expect to invest between £1m and £5m in AI and automation over the next three years. It’s up to organisations to make sure their CSO wields control over more than just a fraction of this budget. Path to improved security While budget constraints and silos continue to stand in the way of CSO success, it’s clear that users are on the path to greater authority for security pioneers, with support and collaboration from other teams. This will undoubtedly lead to improved security for those organisations that can better navigate the complexities of tomorrow’s disruptive technologies.
ASIS International, the world’s largest association for security management professionals, has announced its programming lineup for Global Security Exchange (GSX) 2024 with in-person and digital experiences taking place 23-25 September at the Orange County Convention Centre in Orlando, FL and via the online GSX event platform. "Pioneering this year’s Selection Committee has been a privilege," said Dr. Diana M. Concannon, PsyD, PCI, CTM, 2024 GSX Selection Committee Chair. "Our exceptional educational lineup at this year’s event reflects the collective dedication of our globally diverse team of volunteers who served alongside me in a highly rigorous review process. Together, we've meticulously curated over 200 sessions, diving deep into contemporary security challenges, and pioneering innovative solutions. I look forward to connecting with you there!” General session presentations GSX will offer timely general session presentations from acclaimed global keynote speakers. This year’s general session lineup is: Monday 23 September Strategic Diplomacy: Charting Paths in a Rapidly Changing World|Sanna Marin, Former Prime Minister of Finland Marin highlights the indispensable role of democratic alliances in facing significant threats As the youngest Prime Minister globally, Sanna Marin expertly guided Finland through a dynamic geopolitical arena. From navigating the global pandemic to swiftly pioneering Finland into NATO after the Russian invasion of Ukraine and addressing the urgent climate crisis, Ms. Marin’s tenure encapsulates pivotal moments in contemporary history. In this insightful discussion, Marin delves into the intricate facets of key geopolitical challenges, notably the Russian assault on Ukraine and Finland’s consequential entry into NATO. With a keen focus on security and international relations, Marin highlights the indispensable role of democratic alliances in facing significant threats. She articulates strategies for mitigating dependencies on authoritarian regimes while advocating for the reinforcement of partnerships, resilience, and trust as essential components in adapting to the ever-evolving geopolitical landscape. Tuesday 24 September Shields Ready – Why Resilience is the Most Important Security Measure for Critical Infrastructure|Jenn Easterly, Director, Cybersecurity and Infrastructure Security Agency (CISA) Impacts of such malicious cyber activity would likely go beyond network intrusion and data theft The U.S. intelligence community and closest geopolitical allies are in resounding agreement on who is the largest global security threat of the twenty-first century: The People’s Republic of China (PRC). They’ve warned that the PRC is almost certainly capable of launching cyberattacks that could disrupt the critical infrastructure Americans rely on daily, such as oil and gas pipelines, rail systems, and healthcare facilities. The impacts of such malicious cyber activity would likely go beyond network intrusion and data theft – with the potential to jeopardise the physical security of the institutions and the public. And in a Presidential election year, the PRC’s attempts to influence U.S. election operations is anticipated to exceed those already detected from previous cycles. As America’s cyber defence agency and the national coordinator for critical infrastructure security and resilience, CISA is driving proactive risk reduction efforts in the face of these most pressing threats. Join CISA Director Jen Easterly for a discussion on how they can broaden the resilience investments and utilise collaborative partnerships – across industry, government, and communities – to ensure the nation is secure and increase the ability to respond and recover to the ever-evolving threat landscape presented by the greatest adversaries. Wednesday 25 September Leadership and Accountability When It Matters|Commander Kirk Lippold, United States Navy (RET.) Navigating the dual facets of privilege and burden in leadership demands a level of accountability that many aspire to achieve. In the aftermath of a harrowing suicide terrorist attack, Commander Kirk Lippold intricately weaves the principle of integrity into a narrative that extends beyond crisis management. He reveals how this principle fosters a diverse and inclusive environment, empowering his crew with a profound sense of ownership. In this crucible of combat, personal accountability and leadership become guiding principles. Lippold’s “Pillars of Leadership” emerge not only as invaluable business tenets but essential foundations for any team weathering challenges. GSX’s multi-faceted approach Newly announced GSX session lineup includes in-depth looks at timely issues Encompassing 200+ sessions tackling vital issues in the security profession, the newly announced GSX session lineup includes in-depth looks at timely issues within the following focus areas: Crime, Digital Transformation, Information Security, Law and Ethics, Managing Organisations, National Security, Physical and Operational Security, Professional Development, and Risk Management. “GSX is a crucial global gathering for security professionals,” said Cy A. Oatridge, CPP, 2024 ASIS International President. “GSX’s multi-faceted approach with best-in-class education, an industry-pioneering exhibit hall featuring innovative solution providers, ample networking opportunities, and digital programming allows our attendees from across the globe the chance to elevate their knowledge, skills, and networks.” GSX education sessions GSX 2024 will feature multiple pre-conference events on Saturday and Sunday In addition to the conference’s primary programming, GSX 2024 will feature multiple pre-conference events on Saturday and Sunday, including two-day workshops on facility security design and ESRM, APP, CPP, and PSP certification reviews, and Secure Horizons: An Immersive Experience for Senior Security Executives. Sunday’s pre-conference programming will include workshops on ESRM and stakeholder communication, ASIS Volunteers’ Day, and the ASIS Awards of Excellence and the Outstanding Security Performance Awards (OSPAs). GSX education sessions include expert-led deep dives that can improve the practice of security professionals at any stage of their career, covering topics such as artificial intelligence, ESRM best practices, diversity, equity and inclusion (DEI), active assailants and workplace violence, cybersecurity, business continuity and crisis management, crime prevention, and more. All-Access Pass registrants can earn up to 22 CPEs toward their recertification whether they attend the in-person or digital experience. Advanced-level Game Changer session Each day of the conference will also feature an advanced-level Game Changer session designed to explore trends that will shape the security industry’s future. Monday’s session is titled “Knocked Down, Not Knocked Out: Building Organisational Resilience,” Tuesday’s session is “Do You Trust Me? How to Thrive in a Mistrustful Era,” and “When Chaos Reigns: The Critical Role of Security in Global Crises” will cap the game changer sessions on Wednesday. Digital attendees will be able to access online GSX session recordings through 31 December. In-person attendees can add digital access to captured content to their registration. The complete digital session lineup will be announced shortly. More details about the GSX 2024 exhibit hall, which will feature approximately 500 companies highlighting drones, cybersecurity, robotics, and uncrewed systems; Career HQ, which will focus on career development; and the digital programming slate will be announced in the coming weeks.
Arcules, the pioneering provider of unified, intelligent cloud-based video surveillance solutions, is set to showcase its innovations in partnerships, artificial intelligence, and cloud solutions at this week’s ISC West. The company will highlight its commitment to the continuous success of its integrators, concentrating on a cohesive sales and consulting strategy to offer immediate and long-term benefits to end users through cloud services and video and business intelligence. Modern security strategies Arcules’ partnership model extends beyond the conventional transactional approach, acknowledging the essential role of IT resellers and systems integrators in deploying and selecting cloud services. Arcules empowers partners with the knowledge, tools, and support necessary for fostering long-term relationships with end users, ensuring systems integrators and IT resellers are prepared to address the evolving needs of their clients. This strategic positioning helps solidify their role as trusted advisors amidst an increasingly digital and intricate landscape. Arcules will also spotlight the transformative journey of cloud technology within the industry At ISC West 2024, Arcules will also spotlight the transformative journey of cloud technology within the industry. The company will showcase the journey of cloud technology from its initial adoption challenges through the surge in acceptance during the pandemic, to its current critical importance in modern security strategies. It will offer insights into forthcoming developments and trends that will impact the industry further. Updates to enhance user experience Arcules will also discuss their recent updates to enhance the user's cloud video experience. The company’s spring update introduces: Enhanced evidence collection and proactive deterrence with two-way audio capability, enabling Axis camera users to monitor live audio, playback synced audio, and use audio talk-down options. Axis and Hanwha cameras are more intelligent when combined with Arcules, adding the ability to ingest on-camera video detection to build alarm rules, dashboard widgets, and forensic video search. New consumer-like experiences in the Arcules mobile app enhance its usability, including a new easy-to-use video timeline and one-handed portrait mode. Organised and sequenced live viewing of large numbers of video feeds with the newly released playlist mode. Adding multiple interface options empowers users with more powerful rule creation, alarming, and extended automated data sharing automation with third-party devices, sensors and systems. A new micro gateway option offers cost-effective edge capability for smaller camera deployments. Technological breakthroughs As part of its commitment to enhancing market understanding of the cloud and showcasing technological breakthroughs, Arcules will contribute to several educational panels throughout SIA Education at ISC West, including: On Tuesday, April 9, at 9 a.m., "Driving Business Results through Culture and Technology" will feature Arcules CEO Andreas Pettersson and Jody McClure, Vice President, of Risk Management & Insurance with ABC Fine Wine & Spirits. The panel “What is Decision Intelligence and What the Heck Does it Have to Do With the Security Industry?" is set for Tuesday, April 9, at 11:15 a.m. This session will feature Arcules’ Senior Director of Product Cindy Chang and Senior UX Designer Andrew Deen, with contributions from Matt Powers, Vice President of Global Technology and Support Services for Wesco, and Mark Schweitzer, Portfolio Manager, Innovation, with Convergint. "Privacy in the Age of AI" will include Ben Rowe, Head of Emerging Technologies at Arcules, scheduled for Wednesday, April 10 at 8 a.m. The discussion will also feature Axis Communications and the Security Industry Association. On Wednesday, April 10, at 3:30 p.m., “It’s All About the Journey: Understanding the Evolving Customer Experience in a Cloud-based World" includes Arcules’ Vice President of Customer Experience Mike Sherwood and Director of Customer Experience Julie McGregor, along with Bobby Louissant, Head of Technical Partnership Engagement, Meta, Joshua Chin, Founder and Managing Partner with Net Force, and McClure from ABC Fine Wine & Spirits. The discussion “Everything You Never Knew You Wanted to Know About VSaaS … But Were Afraid to Ask," occurring on Thursday, April 11, 2024, at 1 p.m., will include Sherwood and Maureen Carlo, Global Director of Strategic Partnerships, from Arcules, together with George Howard, Business Architect, IOT/Digital Transformation - Physical and Video Security with CDW, and Bryan Bossle, Security Product Portfolio Manager Region Americas with Siemens. IT and security integrators "We are excited to have an opportunity to share our ongoing story about the cloud journey and the critical role IT and security integrators play in the world of cloud adoption at this year's ISC West,” said Steve Prodger, CRO, Arcules. “As always, we aim to educate the market on the value the cloud delivers while paving the way for new use cases and ideas of what it can accomplish. It's about building a safer world through flexible solutions that enable users to boost business and security intelligence — that's what we ultimately aim for." Visit Arcules at ISC West at booth #32051.
Expert commentary
In the early stages of childhood education, kindergarten imparts foundational principles that shape future behaviour. Today, you can think about cloud computing in a similar manner: it has become a fundamental element in the architecture of modern technology. The cloud now plays a critical role in digital interaction, security, and infrastructure development. Far from being just another tool, the cloud is a cornerstone, providing essential support for the intricate network that supports today's digital ecosystem. Vomplex digital systems Much as kindergarten lessons lay the groundwork for cognitive development, the cloud offers base capabilities that are vital for constructing and operating complex digital systems. Recent advancements in cloud-based security — particularly in access control and video surveillance — emphasise the importance of cloud computing. It has been instrumental in unifying fragmented security systems, similar to how basic social principles taught in kindergarten help diverse children come together as a unit. The role of cloud computing in our technological world is multifaceted and continuously growing The role of cloud computing in our technological world is multifaceted and continuously growing. It has evolved into a space where innovation is cultivated and security commitments are maintained with vigilance. The fusion of artificial intelligence and analytics into cloud services signifies a concerted effort toward a future that is more cohesive, intelligent, and secure. Significant technological progress As we delve deeper into this topic, it will become evident that cloud computing, like the pivotal lessons of kindergarten, is indispensable. It quietly enables significant technological progress, mirroring the foundational principles taught in our formative years in both its essential nature and its growing influence. Play Fair: Technological Developments in Cloud-Based Security The past year has been a period of significant innovation in cloud-based access control and video surveillance. Cloud computing has evolved into a robust platform that fosters the creation of integrated security systems. These systems consolidate access control and video surveillance into a unified experience, demonstrating the cloud's potential to seamlessly combine disparate systems. Substantial industry progression The advent of edge computing has boosted bandwidth efficiency and accelerated data processing The incorporation of artificial intelligence and analytics into cloud services marks a substantial industry progression. This development provides businesses with advanced tools for in-depth analysis and intelligent decision-making, enabling them to not only gather comprehensive insights but also strengthen their security measures. The cloud has eased the transition to new technologies and emphasised a commitment to cybersecurity, with encryption protecting data integrity in transit and at rest. Simultaneously, the advent of edge computing has boosted bandwidth efficiency and accelerated data processing, highlighting a consistent drive to refine and adapt. The trend of integrating cloud security systems with other business platforms help create unified ecosystems, reflecting a broader narrative of security professionals’ pursuit of progress and enhancement. Potential future disruptions Wash Your Hands: Pandemic-Induced Transformation in Cloud Services As we all know, the COVID-19 pandemic necessitated a swift transition to remote operations, with cloud computing forming the backbone. i The urgent need for cloud solutions was apparent as businesses adopted remote collaboration tools, work-from-home policies, and virtual workspaces. This transition increased the demand for cloud services and prompted more adaptable and cost-effective pricing models. Recognising the critical role of cloud services, organisations enhanced their investment to safeguard operations against potential future disruptions. The pandemic fundamentally altered the perception and valuation of cloud computing, emphasising its critical role in sustaining business operations. Scaleable digital infrastructures The growing demand for SaaS has led integrators to create scaleable digital infrastructures Share Everything: Systems Integrators and the Adoption of Cloud Systems integrators have done much to realise the cloud’s potential. The growing demand for Software as a Service (SaaS) has led integrators to create scaleable digital infrastructures tailored to specific business needs.. The use of the cloud for data backup has improved efficiency and increased organisations’ ability to cope with disruptions. Although there has been a gradual shift among integrators toward cloud solutions, effectively marketing and supporting SaaS business models remains a challenge. But the possibility of continuous revenue streams through managed services is promoting broader adoption of cloud technologies. Cloud-based security solutions Live, Learn, Think: Enterprise-Level Cloud Adoption There is an increasing trend among large enterprises to adopt cloud-based security solutions. The shift toward VSaaS indicates a move towards subscription models that offer financial and scalability advantages. This transition is more than a mere operational change. Rather, it represents a commitment to the expansive potential for growth and innovation that the cloud offers. But let’s face it: the ‘cloud’ journey is accompanied by challenges, particularly concerning data security. Providers must deliver robust data protection measures to ensure the success of cloud-based security services, which depends not just on technological progress but also on fostering trust with clients. Addressing cybersecurity concerns The hybrid model offers a balanced solution for businesses looking to merge these two environments Baby Steps: Hybrid Cloud and On-Premises Infrastructure The hybrid model, which combines cloud with on-premises infrastructure, continues to be a strategic choice for many organisations. While the cloud provides flexibility and ease of access, on-premises solutions offer control over data security and comply with regulatory demands. The hybrid model offers a balanced solution for businesses looking to merge these two environments. Be Trustworthy: Cybersecurity Measures and Communication Transparent communication is key in addressing cybersecurity concerns with customers and partners. Companies that are transparent about their security protocols, including encryption and regular updates, build trust. Certifications such as SOC 2 Type II affirm a dedication to security, and proactive educational resources ensure that users are well-informed about best practices. Decision-making processes Cloud computing has become the cornerstone of modern security strategies Look: The Future Outlook for Cloud-Based Security Solutions Looking forward 5-10 years, cloud-based security solutions are expected to become even more central to organisational decision-making processes. The cloud is poised to become the hub for predictive decision-making, using AI algorithms and extensive data to proactively manage security risks. This vision of an intelligent, integrated approach to security, with the cloud enabling swift, collaborative responses to threats, is almost at hand. Cloud computing has become the cornerstone of modern security strategies, moving beyond its initial role as a digital transformation tool. As we look to the future, the cloud is set to redefine security paradigms and anchor a new era of intelligent, predictive security operations.
When a bomb detonated in the Port of Beirut, I had hundreds of employees under my care inside the blast zone. Within just two hours, I was able to determine who was impacted, understand their safety conditions, and share resources for on-the-ground support—all thanks to mobile technology. For Chief Security Officers, receiving calls like these launches a variety of protocols and necessary decision-making with the safety and security of people and assets as a top priority. And these calls are only becoming more common. Dependence on threat intelligence Mobile phones have dominated the post-COVID environment where people work from anywhere Threats ranging from natural disasters to geopolitical conflicts are becoming more frequent and complicate the responsibility organisations have in keeping their people safe. To meet these needs CSO’s are staying ahead of negative outcomes through creating a greater dependence on threat intelligence. In these times, effective, real-time risk management depends on hyper-local data from technology that is accessible, portable, and dynamic–such as cell phones. Mobile phones have revolutionised the way people live and work. They allow us all to walk around with a computer in our pocket, bringing the world to our fingertips and eliminating digital borders for over 90% of the world's population. Mobile phones have dominated the post-COVID environment where people work from anywhere and have geographically distributed teams but are also more vulnerable to threatening events. Mobile-friendly risk management platforms Mobile technology assigns workers with easy entry to data that can help keep them and their teams safe As we approach 2024, many organisations are adopting comprehensive risk management tools that empower personnel across the organisation with the intelligence and knowledge they need to stay safe wherever they are. Mobile-friendly risk management platforms, such as Crisis24 Horizon, provide always-on awareness, on-hand threat intelligence, and immediate communications and distress signalling through location monitoring. Users receive location risk assessments and push notifications directly to their devices about nearby issues and threats no matter if they are on or off the job. While only select risk managers have complete control of the platform and all sensitive employee data is protected through encryption, the app distributes critical intel to foster a culture of shared awareness and responsibility. Thus, mobile technology empowers employees with easy access to information that can help keep them and their teams safe. Creating a culture of mobile technology adoption In the last few years, the world has proven the importance of being well-informed of risks and mitigation plans to minimise harm. However, psychological barriers tend to trump physical barriers when it comes to accessing the vast array of tools our mobile devices offer. World has proven the matter of being well-informed of risks and relief plans to minimise harm Adopting this technology and establishing a culture that enforces risk management across an organisation is a daunting challenge that demands substantial commitment from leadership to be successful. Some companies have tackled this challenge by positioning security technology as part of the organisation’s employee benefits package, such as commuter benefits and health insurance, to encourage people to take advantage of these resources and learn how to use them. Cohesive risk management culture Technology is only as effective as the people whose actions it informs, which is why adoption and integration are so important. When a cohesive risk management culture meets a powerful technology platform, individuals are enabled to receive threat alerts and counter their impacts, letting others know when and how to take the necessary precautions to protect themselves and their team. For more information on mobile technology and other security trends, check out the Global Risk Forecast, an annual report by Crisis24 that provides a comprehensive analysis of key events around the world most likely to affect operations in the coming year.
If you were to ask people outside our industry what door and access security entails, chances are their answers would reflect their common encounters with locks, security guards, cameras, and maybe metal detectors, badges, or automatic doors. But if they were curious enough, they’d probably be astounded to learn how extensive, intricate, and interesting the business can be and, of course, how vital it is to life safety, physical security, and cybersecurity. Integrated, interoperable solutions They’d also discover that it’s not just about levers, deadbolts, and other products. Instead, it’s a system of many systems, integrated, interoperable security solutions that cover everything from access control, video surveillance, fire alarms, and communications to server rooms, IT networks, energy efficiency, and more. Partnerships to keep up with changing needs A manufacturer’s support of their customers is how prepared they are to respond with high-quality advice Integral to the future success of the openings solutions industry is how well manufacturers and security experts keep up with the changing threat landscape and their customers’ evolving needs. Part of a manufacturer’s support of their customers is how prepared they are to respond with high-quality advice, service, and innovations that address the questions and concerns that arise. That’s why more developers, designers, and end-users alike are leaning on partnerships with visionary manufacturing companies and systems integrators who proactively keep their ear to the ground and an eye on the future. Caution: curves ahead As we look toward that future here in North America, there will always be forces of change to contend with and the accompanying impact on people’s safety, security, health, and livelihoods that our industry will need to address. The forces range from the incessantly unfolding threat scenarios in our country and the world’s geo-political dynamics to climate change and a host of other shifting factors, including the ways we want to work post-pandemic. Bypassing tailored approach Commoditisation poses risks to customised systems integration, good design, the environment Like many industries, ours has seen a change in the level of commoditisation in recent years. While this may give some customers access to cheaper door products in the short term, it usually means bypassing a tailored and more effective approach to security solutions that better meet risk assessment needs for the long haul. It can also get in the way of fulfilling a customer’s forward-thinking requirements for sustainable and aesthetic building materials. In other words, commoditisation, with its tendency toward “sameness” and dependency on less sustainable, corner-cutting materials and processes, poses risks to customised systems integration, good design, the environment, and potentially security itself. Change for the better Fortunately, change has its upside, especially as it applies to innovation, the counterforce to commoditisation. It’s the primary reason why progressive architects, integrators, and security professionals in North America keep gravitating to manufacturers with the instincts and resources to make bold investments in people, new ideas, and processes that produce advanced, planet-friendly solutions. From our view of the door security industry, sustainability will be a central component of innovation from here on out, where the development of new solutions and products is guided by practices and values that reduce their environmental footprint and increase their positive impact. Sustainably-made solutions Transparency in the form of documentation and third-party certifications to back up sustainability claims Along with being a top-down priority for certain manufacturers, sustainably made solutions and products are in higher demand than ever from the design, building, security, and end-user communities. They want to know about the carbon footprint and health impact of product ingredients, their recyclability, and how responsibly things are being made, packaged, and delivered. And they expect transparency in the form of documentation and third-party certifications to back up sustainability claims. Resilience Along with sustainability, a greater focus on resilience has emerged. Climate change is being looked at as a key contributor to the increase in wildfires and the intensity of windstorms and flooding. There will continue to be an expanding need moving forward for FEMA-rated storm shelters, fire- and water-resistive doors, and even blast-resistant openings for certain locations. On the near horizon Facial recognition has long been in use in government and other high-security applications The door security industry is also seeing a fusion of technologies, including newer touchless/contactless opening solutions that incorporate improved biometric access credentials like facial recognition. Facial recognition has long been in use in government and other high-security applications, and we’re starting to see more adoption and willingness to use advanced biometrics devices for door access. Video sensing data and analytics Fortunately, there are new strides regarding the transparency of the algorithms relating to facial recognition. Reassurances about the prevention of bias will help further that adoption. Voice and video will also soon become more prevalent for building and security management by using video sensing data and analytics to inform door security solutions. These developments often stem from the convergence of application engineering and systems integration. Application engineering It also advances the de-commoditisation of security and access control solutions Openings solutions innovators and manufacturers receive vital feedback and insight from both channel partners and customers about the characteristics of a vertical market and/or region. Not only does this partnership require trust and close working relationships, but it yields near and longer-term advantages to all participants. It also advances the de-commoditisation of security and access control solutions. Serving underserved communities Smaller businesses need to manage the security and safety of their personnel and assets just as larger operations do. The challenge has been how to offer the right fit of robust door security solutions that also fit these organisations’ budgets. Historically, they’ve been caught between having to choose an enterprise system that would provide the security they need but comes with a high price tag or settling for mechanical locking doors and a fire alarm system that will at least satisfy a certificate of occupancy requirement. Smart lock system Many small business owners want technology that’s simple to install, even DIY in some cases Many small business owners would like to add a smart lock system to enhance their company’s security which also gives them the flexibility to issue mobile credentials and manage employee and visitor access remotely. Ultimately, they’re looking for a higher level of functionality than what’s available at the low end but something with far less infrastructure and at a lower cost than what’s inherent with higher-end solutions. They also want technology that’s simple to install, even DIY in some cases. Scalable electronic access control Supporting these underserved customers requires developing scaled solutions to match the fewer doors, employees, and amount of space that smaller businesses need. This unique approach to electronic access control is new, but it’s already proving to be successful in helping organisations better manage their time, resources, and security. Training The need for expanded solutions awareness, product knowledge, and installation training is also growing The need for expanded solutions awareness, product knowledge, and installation training is also growing. Retirements and other changes within the locksmithing, systems integration, and facilities management sectors continue to affect how our industry needs to recruit, develop, and retain talent. So do technological advancements in electronic access control and door security hardware overall. Change, innovation, and learning A manufacturer or organisation that can offer comprehensive training led by seasoned professionals will go a long way toward expediting the onboarding of new hires and providing continuing education for experienced professionals at all levels and from all disciplines connected to safety and security. Ultimately, door security experts and companies who embrace change, innovation, and learning will gain the extra edge customers are always looking for to add value to their investments in security.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Well attended and generating levels of excitement not seen since before the pandemic, ISC West may provide just the shot of adrenaline we need to drive industry success through the uncertain economic times ahead. Buzzwords like artificial intelligence (AI) and the cloud were still prevalent at the conference and exhibition in Las Vegas, but the hype of yesteryear seemed more subdued. Rather than breakthroughs to be celebrated, AI and cloud were discussed more as ways systems can realise even greater potential. Rampant cybersecurity attacks Rather than hype, discussions seemed much more practical and down-to-earth, encompassing shifting customer needs and how to address pain points. There was more discussion of the shift of security from a cost center to a profit center, where industry technologies can contribute to an enterprise’s bottom line. More companies seemed to be vigorously addressing the challenges of cybersecurity More companies seemed to be vigorously addressing the challenges of cybersecurity, although perpetually an obstacle. The industry seems more devoted than ever to protecting physical security systems in an age of rampant cybersecurity attacks. But more than in years past, it was the ISC West event itself that generated the most buzz. The crowded aisles of the exhibition seemed both reminiscent of the pre-covid past and prescient of the industry’s even brighter future. From booth to booth and attendee to attendee, the enthusiasm was both conspicuous and contagious. Everybody was thinking: ‘Wow! What a show!’ Pushing technology to the edge “The practice of physical security is about more than understanding threats, and end users are thinking now about the bigger picture of security and how networks work in the broader context of the business,” said Andrew Elvish, Vice President, Marketing at Genetec. Problems of latency and miscommunication are elements pushing technology to the network edge, he says. For example, in an access control scenario, decision-making should be as close to the door as possible to avoid network congestion, delays, or failure. Andrew Elvish, Vice President, Marketing at Genetec, displays Axis network door controller ‘powered by Genetec’ Elements pushing technology Reflecting the philosophy is a new collaboration introduced at the show called ‘Axis Powered by Genetec,’ an enterprise-level access control offering that combines Genetec Synergis software with A1210 and A1610 network door controllers by Axis Communications. Elvish says lines are blurring when it comes to edge versus cloud technologies. Rather than choosing ‘either-or,’ a blending of approaches is optimum, always ensuring that “Decision-making is close to the point of actuation,” he says. On-premise versus cloud systems Elvish also points to changing assumptions about the industry roles of on-premise versus cloud systems Elvish also points to changing assumptions about the industry roles of on-premise versus cloud systems. Historically, the assumption was that on-premise systems are most appropriate for enterprise customers, while the cloud is the best approach for small- to medium businesses (SMBs). Depending on the end customer’s needs, a system can be either or both at the same time. Rather than debate cloud versus edge, customers should consider the outcomes they seek, and how technologies can be merged to provide those outcomes. “They should consider a solution where they do both, with the gradation of controls provided at their fingertips,” says Elvish. Combining security into one platform Unifying security and related functions on a single platform was a widely evident trend at ISC West. An example is Verkada which now offers a unified platform that includes video, access control, and intrusion detection, as well as other functions such as air quality sensors, visitor management, and a door intercom. David Tsang, Product Director of Verkada, predicts demand to combine technologies into a single platform will grow in the industry. Furthermore, as data is collected in the single system, enterprises will find new ways to ‘connect the dots’ to provide better business intelligence. Air quality sensors Verkada’s cloud-based system enables fast deployment of the single platform “Our approach to building products is based around the idea that every company has different needs, and they want technologies to integrate seamlessly and operate off the same platform,” says Tsang. In addition to seamless integration, each product must also be able to stand on its own. Tsang manages Verkada’s various product categories, including access control, air quality sensors, intercoms, etc. Verkada’s cloud-based system enables fast deployment of the single platform, and the company works with dealers to ensure delivery of a 'better partner experience.' What happens after a binge of acquisitions? Acre Security unveiled a new corporate ‘identity’ and a big booth highlighting the technology brands the company has acquired over the last several years. Brands such as Feenics, ACTMobile, Comnet, Razberi, and others reflect Acre’s acquisition of these companies but are now being promoted as technology choices under the ‘one Acre’ approach. Don Joos, CEO of Acre Security, looked ahead to the future of the company at ISC West Visitor management product categories Change is in the air, and the booth’s unified visual design signifies the new direction for the company, says Don Joos, Acre’s CEO. Various technologies can be delivered via the cloud, through an on-premise installation, or using a hybrid approach Acre is highlighting ACTMobile’s mustering capability, useful in the K-12 market In tying technologies together, the ACTMobile product will play a key role in two major verticals -- command-and-control and K-12 schools. Acre is highlighting ACTMobile’s mustering capability, useful in the K-12 market, which was adapted from a technology used in the cruise industry. The Acre approach is to embrace the variety of opportunities available in the access control, intrusion, and visitor management product categories within a broad definition of ‘security’ that embraces both core capabilities and ‘adjacencies,’ says Joos. Acre seeks to enable customers to protect people, facilities, and critical assets. They manage customers’ security data and provide the insights they need. Ensuring a cohesive security system A challenge in the industry is combining various single products into a cohesive whole. “There are many products that do one thing well, but it’s harder to build a cohesive security platform,” says Ryan Schonfeld, Founder and CEO of Hivewatch. Hivewatch is a software platform that performs the functions previously associated with a ‘PSIM,’ which is a physical security information management system. The term PSIM has earned a questionable reputation in the industry, plagued by added costs and the perpetual challenges of integrating with ever-changing software platforms. Information management system Hivewatch seeks to bypass other software systems and to integrate as closely as possible with devices Hivewatch seeks to bypass other software systems and to integrate as closely as possible with devices on the edge, thus avoiding the impact of software system changes. They integrate with data in a ‘different way’ that eliminates the need to conform to other software systems. In today’s climate, the term ‘security’ could be seen as limiting when it comes to the various functions our industry’s systems can perform in the broader enterprise, says Schonfeld. Traditional enterprise reporting structures that have physical security reporting to the facilities or real estate department are limiting the broader role security can play in the enterprise. Positioning physical security Changing norms are positioning physical security to report to the CIO or CISO, thus reflecting physical security’s role in collecting and analysing data. Higher visibility within the enterprise can help security expand its influence and impact. “Security is too limiting, and it can keep us from getting a seat at the table,” says Schonfeld. “We need to shift from being a cost center to generating revenue and/or driving business — and data is the key. Rather than leading by fear, we need to show the value security can drive.”
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Case studies
Cybersecurity threats targeting organisations' industrial control systems (ICS) are not always direct. Instead, the most vulnerable entries to an ICS can start with external partners, like suppliers and vendors. Honeywell's customer, a global pharmaceutical company, realised that potential vulnerabilities like these might be in its partner ecosystem. Therefore, the pharmaceutical company wanted to get ahead of a potential breach so they trusted Honeywell to do a thorough assessment of its suppliers’ operational technology (OT) cybersecurity gaps. Why did the customer choose Honeywell? First, Honeywell's OT cybersecurity experts took the time to understand the customer’s processes at more than 100 sites around the globe. Second, Honeywell experts used their knowledge and experience along with the customer process insight to conduct assessments that met their unique needs. Many of the competitors are simply IT vendors dabbling in the world of OT. Honeywell, however, has the knowledge and the experience to better meet the demands of OT. The pharmaceutical company chose Honeywell over the competitors based on the quality and wealth of OT knowledge the experts provided. Spreading security The Cybersecurity Vulnerability Assessment is part of a global two to three-phase project that covers over 100 sites This was not to be a small or limited undertaking. This Cybersecurity Vulnerability Assessment is part of a global two to three-phase project that covers more than 100 sites. The first assessment was completed for the company’s site in India with other sites being covered in later phases. Vulnerability assessment Honeywell’s OT cybersecurity experts conducted the vulnerability assessment to help capture the customer’s control system vulnerabilities and potential weak spots. The assessment performed was a holistic technical review of the ICS infrastructure. It focused on analysing their cybersecurity processes, procedures, and safeguards to better protect their industrial control systems(ICS) from internal and external threats. Because Honeywell focuses on OT as opposed to IT only, Honeywell experts are skilled in considering the entirety of an ecosystem. This means including people, processes, and any technical issues that can impact the ICS cybersecurity posture. Digging in to reduce risks The Honeywell team was able to holistically assess the customer’s ICS environment, documenting observations The Honeywell team has deep expertise across IEC 62443 standards and other industry-specific guidelines, as well as invaluable experience with control systems. Because of this expertise, the Honeywell team was able to holistically assess the customer’s ICS environment, documenting observations and recommendations to help reduce cybersecurity risks. Physical site review Honeywell team first conducted a physical site review to assess to uncover issues such as control room doors left unlocked, passwords in the line of sight, and other security compliance violations. The team also reviewed the customer’s network equipment from third parties such as switches, routers, and firewalls; reviewed the infrastructure configurations; and checked installation processes. Site-specific recommendations The report detailed best practices and site-specific recommendations to help the customer help mitigate and prioritise All the vulnerabilities, severity levels, and remediation details were included in the Cybersecurity Vulnerability Assessment report. The report also detailed best practices and site-specific recommendations to help the customer help mitigate and prioritise any identified threats or vulnerabilities and notes regarding how and where each step can serve as a foundation for the best practice architecture. Challenges and successes Honeywell experts remained diligent in exceeding the customer’s expectations despite the shutdown in India due to the pandemic and the unexpected need to assess and remediate assets. Honeywell also had one secret weapon: one of the OT cybersecurity experts had real-life experience in the pharmaceutical industry. This made it possible for the team to better tailor the assessment (and recommendations) to this particular customer.
Overview: Due to the pandemic and Delta cases in Israel, the first hospital in Israel for treating coronavirus patients was established. The hospital needed to offer more beds and create more special wards for the infected patients. The head of the hospital requested for an advanced system that could monitor patients on-site or remotely to protect the doctors and nurses from cross-infection in the hospital. Non-contact communication Challenges: Lack of devices for contactless communication: The hospital did not have enough equipment to realise non-contact communication between staff and patients, which could have increased the risk of cross infection. Insufficient remote surveillance: The hospital needed to build larger wards for infected patients, which a 24/7 monitoring system must cover. Installing the right cameras for such a large space could be very challenging. Video intercom solution Highlights: Video intercom solution: The patient’s bed is equipped with Dahua's VTO. Once an emergency occurs, the patient can directly call the VTS management device at the nurse’s station through the VTO. At the same time, through the real-time preview function of VTO, the staff in the nurse station can remotely monitor the patient's condition and communicate with the patient in real-time to provide necessary care. Monitoring & management system: Through Dahua's DSS management platform, the entire CCTV monitoring system and video intercom system in the hospital can be unified and managed. For the hospital managers, it not only improves the efficiency of monitoring and management, but also provides additional security for hospital workers to a great extent! Professional CCTV devices Significance: Dahua provided the hospital with video intercom products and Dahua professional CCTV devices that greatly helped them prevent direct contact with patients to reduce cross-infection inside their premises. With the help of Dahua’s solution, the hospital was able to centralise all their surveillance systems for easy management.
There are two truisms of K-12 schools that exist currently; first, safety and security are core objectives, and second, school budgets are tight. K-12 schools have traditionally been perceived as safe havens where children can learn and develop as they begin their life journeys. Violence, vandalism, and theft Unfortunately, K-12 schools are increasingly being subjected to violence, vandalism, and theft. Teachers are expressing growing concerns about their safety as they intervene in physical conflicts within schools while also encountering students carrying firearms or other weapons on school premises. Even more sobering, more than 352,000 students in the U.S. have experienced gun violence at school in the past 23 years. Schools on tight budgets With pandemic aid coming to an end, school districts are having to do more with less Further compounding the situation, schools and their administrators are on tight budgets. Pandemic relief funding has kept many school initiatives afloat over the past few years, but in the rush to spend on new high-tech solutions, many of the basics were left behind. With pandemic aid coming to an end, school districts are having to do more with less. Need for cost-effective security solutions These two truisms offer more questions than answers for superintendents, principals, teachers, board members, and parents. What school security solutions can we deploy that actively combat rising violence? How can we cost-effectively implement such tools? We want to improve school security and efficiency at the same time, but how? Key Control in a K-12 environment Key control systems are an integral piece of the larger security puzzle helping schools of all sizes manage security At their most basic level, school key control systems are designed to securely protect keys in an electronic key cabinet. At their most complex, key control systems are an integral piece of the larger security puzzle helping schools of all sizes manage security and operations effectively during times of both emergencies and daily operations. Authorised access In a traditional school key control system, keys are securely stored within individual compartments with each key uniquely assigned and tracked. Authorised users gain access to specific keys by providing their credentials, such as a PIN or biometric authentication, which permits them to remove a key from its designated compartment. This enables schools to effectively manage and track access to various areas throughout a building and/or campus, thus minimising the risk of unauthorised entry or loss of keys. Integrated software A user-friendly interface allows administrators to manage and configure access permissions Integrated software further enhances the functionality of the key control system. A user-friendly interface allows administrators to manage and configure access permissions, generate detailed reports, and receive notifications about key-related activities. Additionally, the software can be integrated with other security systems, such as access control or video surveillance, creating a holistic security solution for schools. Key Control reduces security expenses What’s more, key control systems are a cost-effective solution that proactively reduces a school’s security spend. By reducing the possibility of lost keys and limiting access to master keys to authorised individuals, school districts can save thousands in unforeseen re-keying costs. School asset manager solutions integrated with a key control system likewise safeguard critical assets ranging from laptops to sensitive files, reducing the opportunity for theft and improving compliance. Key access control systems for schools also improve campus security for a lower cost than that of armed security guards and contracted off-duty police. Key Control improves school security By utilising a centralised key control system, schools can ensure that emergency keys are securely housed A key control system in schools offers significant security benefits, particularly when it comes to emergencies such as active shooter events. By utilising a centralised key control system, schools can ensure that emergency keys are securely housed and readily accessible to local first responders. Rapid first responder key accessibility Responding officers can swiftly retrieve the required keys, such as those for locked classrooms or secured areas, enabling them to enter and address the situation promptly. Rapid first responder key accessibility significantly improves response times and effectiveness during critical incidents and gives parents peace of mind, knowing that their children's school is equipped with robust security measures to handle emergencies efficiently. Emergency Key Grab (EKG) kit Morse Watchmans has designed a new solution exclusively designed for K-12 Schools called the Emergency Key Grab (EKG) kit. The new EKG kit is designed to provide first responders with easy access to keys in the event of a lockdown or emergency. The Morse Watchmans EKG kit contains: A 1-module or greater KeyWatcher Touch System. Colour-coded SmartKeys and KeyRing with Hubs. Unique KeyWatcher System First Response KeyRing Identification Label. Educational Materials: Implementing Key Control in K-12 Schools Tip Sheet and K-12 Schools Key Control Playbook Hardcopies. One-on-one Educational Training from Morse Watchmans. Template and Guidelines for Writing a K-12 School District Key Control Policy. The EKG can save a life! Enhances general security protocols These systems enable schools to centralise key management, ensuring that keys are always properly secured In addition to facilitating emergency response, a key control system in K-12 schools enhances general security protocols. These systems enable schools to centralise key management, ensuring that keys are always properly secured and accounted for, and only accessible by authorised personnel. This comprehensive key management solution can significantly reduce the likelihood of security breaches, vandalism, and theft at K-12 schools. Real-time visibility and monitoring Furthermore, the system provides administrators with real-time visibility and monitoring capabilities, allowing them to track who has accessed keys, when, and for what purpose. This helps schools better comply with regulatory requirements such as the Family Educational Rights and Privacy Act (FERPA) which requires schools to closely control access to private medical and academic files. Enforcing employee accountability effectively strengthens security measures and fosters a safer environment for students, faculty, and staff. Key Control improves school operations By providing a streamlined process for accessing keys, maintenance teams can promptly respond Beyond enhancing security, a key control and asset management system can significantly improve the efficiency of school maintenance teams. With a centralised key control system, maintenance personnel can quickly access the keys necessary for completing their required tasks, eliminating time-consuming searches for the right key or reliance on multiple key copies. By providing a streamlined process for accessing keys, maintenance teams can promptly respond to maintenance requests while ensuring that doors are secured and unlocked as needed, thus minimising disruptions to the school's operations. Flexibility of localised access Key control systems additionally provide the flexibility of localised access for contracted workers. Contractors, such as HVAC repairmen or IT technicians, can receive access to individual keys with location-specific access granted only for areas they need to work over specific periods. The school key control software keeps a record of their key usage, allowing administrators to track a worker’s activities and ensure accountability. This granular level of key control allows school administrators to grant temporary access to contracted workers while maintaining overall security. System benefits Fleet management software for schools provides a clear record of who has used a specific vehicle key Key control systems also offer significant benefits for the management of a school’s fleet of vehicles, such as buses and other vehicles. With school bus fleet management software integrated into a key control system, administrators can effectively track and control the usage of school buses district-wide. Administrators can retrieve data on the status of any bus, shuttle, or other vehicle at any time. Fleet management software for schools provides a clear record of who has used a specific vehicle key, enabling administrators to monitor vehicle availability, maintenance schedules, and overall fleet utilisation. Reliable and cost-effective solution By deploying Morse Watchmans' key control and asset management systems, schools can effectively address security concerns, optimise operations, and make efficient use of resources. Its proven implementation of key control systems in K -12 environments offers schools a reliable and cost-effective solution that promotes a safe and efficient educational environment.
Like most stadiums worldwide, the Alsancak Mustafa Denizli Stadium suffers from vandalism and riots by individual fans. To be able to better identify and track perpetrators and thus reduce financial and non-material damage, the operator opted for a video security solution from the German manufacturer Dallmeier. The Alsancak Mustafa DenizIi Stadium in Izmir–named after former Turkish football player and current football coach Mustafa Denizli–is a multipurpose stadium that mainly hosts football matches. With over 15,000 seats, it is one of the medium-sized stadiums in Türkiye. Originally built in 1929, it was demolished in 2015 and reopened after reconstruction in November 2021. Up to 15% fewer spectators due to riots Outcomes have been painful, ranging from classic fines to the closure of an entire block of viewers In Türkiye, stadiums are usually owned by the Ministry of Sport, which then grants the rights of use to an operator. In the case of the Alsancak stadium, the operator is “Altay Izmir”, an Izmir-based football club that currently plays in Türkiye’s top professional league. The club, like so many other football stadiums, has had its fair share of repeated incidents and threats to spectators and players. These have included verbal abuse and even the throwing of objects onto the pitch. In addition to the intangible damage to the image, the consequences have been painful, ranging from traditional fines to the closure of an entire block of spectators–a loss of 1,000 to 2,000 spectators per home game, and that on a regular basis. How is image quality defined to recognise perpetrators? Under these conditions, the operators were looking for a solution that would allow them to reliably detect and track potential offenders. The tender specified a minimum resolution density of 144 pixels per metre (px/m), which is also required by law. This means that there must be at least 144 pixels in the camera image to represent every metre of “reality” in the stands. This value is between the “recognition” (125 px/m) and “identification” (250 px/m) qualities specified in the IEC EN 62676-4 standard for video surveillance systems. Only ten cameras to monitor the stands The Ministry of Sports decided to invite various manufacturers to a comparative test To find the most suitable solution for the Alsancak Stadium, the Ministry of Sports decided to invite various manufacturers to a comparative test. After receiving the proofs of concept (PoCs) of several companies, the owner chose a solution from the German manufacturer Dallmeier Electronic. In addition to around 140 single-sensor cameras for corridors, outdoor areas and entrances, only ten “Panomera®” multifocal sensor systems are required for the particularly critical grandstand surveillance. 39% more resolution than required The low number of camera systems required for grandstand surveillance is due to the patented multifocal sensor technology: Panomera® cameras combine the images from up to seven detail sensors and one overview sensor in a single camera system. This provides the user with a high-resolution overview of the entire area to be monitored, which acts as a single image of a vast environment. Within this overall picture, system operators can now open any number of detail views at the same time, while the overall scene is always available in high resolution–even during recording, which is essential for possible prosecution. This provides an optimal overview of the situation and ensures that all events can be followed in real-time, in high resolution and in detail. Thanks to this technology, a minimum of 200 px/m is now available throughout the Alsancak stadium instead of the required 144 px/m – 39 percent more than originally required. No surprises: Remote “FAT” and training from Dallmeier Türkiye Due to the COVID-19 pandemic, the stadium's technicians were unable to travel to Dallmeier's headquarters in Regensburg, Germany, to commission the system and attend classroom training. For this reason, the so-called Dallmeier Factory Acceptance Test (FAT) took place online. The entire system was set up, configured and remotely accepted in the FAT centre in Regensburg. The training of the technicians and operators was carried out by Dallmeier Türkiye experts on-site The training of the technicians and operators was carried out by Dallmeier Türkiye experts on site. Serkan Atalar, CEO of RESA Construction Electromechanical Inc. Co, the installer company that implemented the project, is very pleased: “Dallmeier's sincere and collaborative approach, as well as the high-tech products and after-sale support they offered were very impressive. We thank Dallmeier Türkiye for the great cooperation.” Author's quote “The customer is very satisfied with the Panomera® systems. The benefits are equivalent to combining a powerful megapixel camera with any number of high-resolution 'virtual' PTZ cameras. At the same time, the systems reduce the total cost of ownership for infrastructure, cables, masts, screens, workstations, etc.,” Serkan Atalar summarises. “Alsancak Stadium only needs three system operators with one monitor each. They also have two workstations for the police and management. The solution always gives them 100% control of the security situation in the stadium, allowing them to react immediately and reliably track down perpetrators. And all this at a low total cost of ownership and with minimal manpower thanks to the unique multifocal sensor technology.”
As businesses strive to rapidly recover and resume in the post-pandemic era, offline activities increase, and how to manage visitors efficiently has become a critical focus. Intelligent upgraded access control, integrated with the cloud system, offers a solution for managing the entry and tracking of personnel and visitors automatically. The customer Dürr, founded in 1896, is a pioneering mechanical and plant engineering firm in the world. As one of the Dürr Group’s biggest sites, the Dürr China site covers a production area of 33,000 m². The modern office complex of Dürr China covers a total building area of 20,000 m² and around 2500 employees work together in there. The challenge Dürr needs a more flexible and time-saving solution that could manage a diverse workforce After the epidemic, many offline visit activities resumed. Dürr needs a more flexible and time-saving solution that could manage a diverse workforce with different access levels and permissions, including employees, contractors, and especially visitors. In addition, tracking and recording personnel's entry and exit has become a challenge for so many employees in such a large enterprise campus. Therefore, Dürr is searching for an efficient way to manage visitors at a lower cost. The solution Strengthen security while simplifying visitor management with a maximum volume of 50,000 people, FaceDeep5 can easily meet Dürr’s requirements. Based on AI deep learning biometrics algorithms, FaceDeep5 provides precise face recognition and verification for factory workers. The visitor management of the data-rich management platform has greatly enhanced the efficiency of security guards. Visitors now only need to upload their photos to the cloud system before their visit, while the administrator sets the access validity period. Key benefits Convenient and time-saving access experience Upgraded visitor system ensures a smooth and efficient entry experience. Visitors need no more waiting time to contact the administrator at the factory entrance. Reduced cost of security team Visitors need no more waiting time to contact the administrator at the factory entrance After the installation of this system, each entrance only needs two people to work in 12-hour shifts, and one person in the central office supervises the emergency and handles emergencies with the guards of the factory at any time. In this way, the security guard team downsized from 45 to 10. The company assigned those 35 people to the production line after training and solved the labour shortage in the factory. This system, which saves nearly three million RMB per year, requires an overall investment of less than one million yuan, and the cost recovery period is less than one year. Author's quote "I think working with Anviz again is a good idea. The installation process was extremely convenient as it was fully supported by the service staff," said the IT Manager of Dürr's factory, who has worked there for over 10 years. "The function is upgraded. Now visitors can simply upload their own photos into the system and easily enter and exit within a certain time frame," Alex added.
The importance of space exploration is increasing, and more and more astronauts are cavorting in space. But what effects does weightlessness have on the ageing of the human body? How do certain cells develop under milligravity and microgravity conditions, such as those found on small moons and asteroids? The Swiss Artificial Gravity Experiment (SAGE) is dedicated to this research task. Construction of a satellite platform A team of students from various Swiss universities (Academic Space Initiative Switzerland, ARIS) wants to investigate how the ageing process in humans changes in space and how cellular senescence influences the development of ageing and age-related disorders. The young researchers are currently designing the construction of a satellite platform for a corresponding biological experiment, which must meet extreme requirements. The fully automated system will serve as a long-lasting test field under the required space conditions and act as a centrifuge for the human cell lines to be studied. At the heart of this CubeSat solution is a fluorescence microscope equipped with a microfluidic chip and a high-resolution USB3 camera from the uEye XLE family. Ageing processes In the human body, ageing processes take place at the cellular level is referred to as senescence In the human body, ageing processes take place at the cellular level, which is referred to as senescence. This is a phenomenon where cells stop dividing and secrete inflammatory factors. "Building on research by NASA and many other groups around the world, there is reason to believe that cells age more slowly in microgravity than on Earth. This effect can be measured by certain proteins and mRNA, which are emitted during cell ageing." "Messenger RNAs (mRNAs) have emerged as essential factors contributing to or preventing cellular senescence. With a fluorescent marker, this mRNA can be labelled and, when irradiated with the right light, it is made to glow. The complete experiment is carried out over a period of two months in a volume of only ten cubic centimetres. To measure and analyse the necessary processes under these conditions, we need a particularly reliable and compact fluorescence microscope," explains SAGE Payload Engineer Jonas Schlör. Use of microfluidic channels For the laboratory tests, a U3-38J1XLE-C-HQ was used in the microscope. The camera captures fluorescent mRNA from human cells placed on a microfluidic chip. Microfluidic chips enable the miniaturisation and integration of complex laboratory functionalities on a single chip. This saves space and reduces the need for samples. Microfluidic chips contain engraved or shaped microchannels through which the fluid to be analysed can flow. The use of microfluidic channels allows samples in very small volumes. Due to the high resolution of the camera with the rolling shutter sensor IMX415 from Sony, individual cells can be distinguished from each other. The high pixel density of the sensor in particular makes it possible to display individual cells with a diameter of only 15 μm. A blue LED energises the cells in a microfluidic chip. These emit green light of varying intensity depending on the rate of senescence. Cells with a higher senescence rate emit more fluorescent proteins and are therefore brighter. An optical filter allows only the green light from the cells to pass through the lens onto the camera. This allows not only the general senescence rate of the cells to be determined, but also the specific number of living cells. Demands of the external environment Camera also features numerous software-related setting options, such as exposure times "The data obtained is thus very meaningful and scientifically relevant, as comparable research has not been conducted in this way before," explains Jonas Schlör. In addition, a complex apparatus, which is otherwise necessary for fluorescence microscopes, can be dispensed with and a lot of space can be saved. "The camera also features numerous software-related setting options, such as exposure times or colour filters, which means that a high degree of flexibility can be maintained throughout the design process." It also has to meet the tough demands of the external environment. These include the rocket launch with its very intense vibrations and, of course, the conditions in orbit under vacuum and cosmic radiation. U3-38J1XLE Rev.1.1 and IMX415 With 8.41 MPixels and 4K resolution, the U3-38J1XLE Rev.1.1 is particularly suitable for this type of visualisation task. With the 2×2 binning feature, it is possible, if necessary, to reduce the amount of data to be transmitted by a factor of four and thus increase both the light sensitivity and the frame rate. Sony's IMX415 rolling shutter sensor delivers high-resolution data for detailed image analysis. Due to its extremely space-saving design, the IDS camera can be optimally integrated into this embedded application. The camera is controlled by a microcontroller, which processes and compresses the data while still on the satellite, after which it is to be sent to Earth. The software as well as the control algorithms are developed and tested by the students of the Swiss Academic Space Initiative themselves. Demands for subsystems and components All components must withstand the physical stresses generated by the launch vehicle The demands on the system or the CubeSat are high: The latter must both provide the attachment points for the subsystems and components and ensure the structural stability of the satellite - from insertion into its launch vehicle to the end of its service life. All components must withstand the physical stresses generated by the launch vehicle during ascent and later the radiation and temperature fluctuations in space, while being as light as possible. The satellite prototype has already delivered first promising results. Outlook The experiment is designed to run for 3 years. Based on the research results, various scenarios are conceivable. First, for example, scientists would like to find out whether certain therapies could improve the astronauts' well-being. But senescent cells can also be drivers of various diseases that make life difficult for people, especially in old age - such as dementia, arteriosclerosis, diabetes and arthritis. In addition, they are suspected of contributing to tumour progression. According to one study, SARS-CoV-2 may also be a trigger for senescence - a possible explanation for Long Covid's persistent symptoms. The Swiss Artificial Gravity Experiment could provide interesting approaches for possible therapies. More and more IDS cameras are thus making a contribution to health promotion worldwide. "A field of application that is close to our hearts," emphasises IDS founder and owner Jürgen Hartmann. Camera uEye XLE USB3 Vision - consistently cost-optimised Interface: USB 3 Model: U3-38J1XLE-C-HQ Sensor type: CMOS colour Manufacturer: Sony Frame rate: 25.1 fps Resolution: 3864 × 2176 px Shutter: Rolling-shutter Optical class: 1/3" Resolution: 8.41 MPixel Dimensions: 36.0 × 36.0 × 21.0 mm Weight: 13 g Connector: USB Type-C Client ARIS brings together students from Swiss universities who are passionate about space exploration. Formed around ETH Zurich, the members address technical challenges by combining theory and practice. Not only are rockets being built, but with SAGE (Swiss Artificial Gravity Experiment) their first 3U-CubeSat satellite is also being developed.
Round table discussion
The economic fallout of the COVID-19 epidemic was felt in supply chain disruptions, higher prices, and shortages of certain goods. The physical security industry was not spared, although the epidemic also presented opportunities for security companies. Changing access control trends triggered by the pandemic are still reverberating throughout the industry, for example. Four years later, the impact of the pandemic is still being felt in the security market, lingering like the symptoms of "long COVID." We asked this week's Expert Panel Roundtable: Four years after the start of the COVID-19 pandemic, what is its lingering impact on the physical security industry?
Frictionless systems provide access to a building without interfering at all with a user’s entry experience. Frictionless access means you can automatically pass through a gate without showing a credential or otherwise engaging, and with the system recognising who you are and allowing you to pass. In true frictionless access, everything works seamlessly, with unauthorised people obviously barred. But how close are we to realising frictionless access control? We asked this week’s Expert Panel Roundtable: Is frictionless access control a reality or an empty promise?
Sharing data between security and building management devices can provide a route to maximise building usage and minimise costs. In today's Internet of Things (IoT) environment, tying together a variety of systems is easier than ever. For an update, we asked this week's Expert Panel Roundtable: What are the benefits of integrating security technology with building management systems (BMS)?
Products
White papers
The wireless access control report 2023
DownloadSchool security moves to the cloud
DownloadCloud-based access control and occupancy management to safeguard workplaces
DownloadDelivering a smart, secure and healthy workplace with cloud
DownloadThe role of access control in a safe return to the workplace
Download5 security lessons for navigating COVID-19
DownloadHow end-to-end video security solutions can help your organisation with social distancing
DownloadHow doorhandles and levers with antimicrobial treatment reduce disease spread
DownloadBuilding a safe ecosystem for visitors post COVID-19
DownloadThermal cameras: Can they accurately detect body temperatures?
DownloadHoneywell GARD USB threat report 2024
DownloadThe role of artificial intelligence to transform video imaging
DownloadAccess control system planning phase 1
DownloadKey Findings from the 2024 Thales Cloud Security Study
DownloadFacial recognition
Download