SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision attains ISO 37301 Certification for Compliance Management System
    • SentriGuard's role in sustainable security solutions
    • Axis joins CISA Secure by design for cybersecurity
    • Xtract One's SmartGateway enhances Nova Scotia security
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

    Enhancing physical access control using a self-service model

    Enhancing physical access control using a self-service model

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check out our special report on casino security

Get it now!

The future is here: ADT’s innovation lab evaluating robots and indoor drones

The future is here: ADT’s innovation lab evaluating robots and indoor drones
Larry Anderson
Larry Anderson
Contact company
Contact Fidelity ADT Commercial
icon Add as a preferred source Download PDF version
Related Links
  • Which security trend is here to stay?
  • The right to privacy in the age of digital eyes
  • Userful enhances cyber security operations centres using software approach

New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the new technologies’ value to customers and some typical use cases.

The Innovation Lab has been in place for just under a year and just moved into a 2,000-square-foot facility that is staffed with four dedicated ADT Commercial employees and teams from various commercial innovation partners.

The idea of the lab is to close the gap between the incubation of new technologies and the needs and realities of the ultimate customer. The goal is to adapt the design of a product to meet the customer’s need, instead of forcing the customer to adapt their use of the technology to meet its limitations.

Addressing a problem

Every project or investment at the innovation lab starts with the identification of the problem, never the solution"

"Every project or investment at the innovation lab starts with the identification of the problem, never the solution," says Ed Bacco, Vice President, Enterprise Security Risk Group for ADT Commercial. “Then we develop detailed functional requirements to address what this technology needs to do to address the problem.”

“Then – and only then – do we move toward developing the technical specifications to answer how the technology needs to operate to address the problem,” he adds.

Prioritising innovation

The approach sets ADT Commercial apart from most labs. The last item they focus on is the creation of a business model to address how they can sell the technology.

“Early on, the company recognised that if we truly want to focus on innovation, we need to prioritise invention over profits, which is why the lab doesn’t operate under a profit-and-loss model,” says Bacco. This article will describe two recent technologies the Innovation Lab has been working with, and how they can impact the future of the security industry.

Halodi Humanoid Robotics

Unlike other competitive robot solutions, Halodi Humanoid Robotics can interact with the built environment

The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions.

Unlike some other competitive robot solutions, Halodi Humanoid Robotics can interact with the built environment, meaning that they can autonomously open doors, call elevators, present security badges, operate pins pads, and more.

Observe and report functionality

The basic use case for the bot is based on the fact that the role of 98% of all security guards is to “observe and report.” There is often a misconception in the public that guards are widely permitted to engage hands-on with alleged offenders, but most guarding contracts restrict that ability.

Humanoid robots

Therefore, given the mundane and routine nature of guarding, humans find it a challenge to maintain the high degree of awareness that is needed, whereas the bots never waiver, never rest and never lose awareness.  

Alternative to human guards

If a bot is to serve as an alternative to human guards, then it needs to interact with the human environment

The bot wasn’t designed to be “human-like.” There is a general concept in humanoid robotics called the “uncanny valley” that defines a tipping point when humans become uncomfortable with humanoid robots if their design resembles humans too closely.

However, if a bot is to serve as an alternative to human guards, then it needs to be capable of interacting with an environment that was designed for humans. That means opening doors, riding elevators, bending down, picking up items, etc.

Remotely operated

Current robotic devices are skilled at sensing/analysing the environments they are deployed in, but their ability to interact with them is limited.

The other advantage of a humanoid robot is when it’s being remotely operated in the avatar mode, meaning virtually, the human operator finds the experience familiar and intuitively knows what to do.

Access, intrusion, and VMS integration

The bots can be integrated with access control, intrusion, and video management systems and can conduct patrols autonomously and report anomalies and/or respond to alarms via those same systems.

The bots can be equipped with other sensors to constantly analyse the environment for threats to human life such as carbon monoxide, smoke, hazardous chemicals, or poor air quality.

IR capabilities

IR capabilities also enable the bot to detect the possible failing or overheating of equipment

They are capable of “seeing” in the Infrared Range (IR), which makes them suitable for responding to the source of fire/smoke alarms while humans evacuate.

IR capabilities also enable the bot to detect the possible failing or overheating of equipment. Although designed to operate autonomously, the bot can also be controlled by a simple point-and-click mapping device or using the avatar control system.

Applications

“The biggest challenge we’ve seen with customers who are conducting in-field pilots is aligning their excitement of how the bots can improve their traditionally non-security applications with the current capabilities,” says Bacco.

These applications include using the bots to conduct safety audits of items like fire extinguishers and Automated External Defibrillators (AEDs), serving as a fire watch, greeting visitors in the lobby, and automating gates at industrial and distribution sites.

Autonomous Indoor Drones

COVID-19 has shown that customers are looking for predictable and repeatable solutions to meet their security needs"

As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards.

“The COVID-19 pandemic has shown that customers are looking for predictable and repeatable solutions to meet their security needs that aren’t dependent on humans,” says Bacco. The three use cases for the drones are automated alarm response, random tours, and directed missions.

Automated response mode

In the automated response mode, when an alarm is triggered, the drone will automatically initiate a mission to the point of alarm and report any anomalies (i.e., people, heat signature, etc.).

It can also be programmed to fly random patrols as a deterrent to a possible breach, and an operator can remotely initiate a mission using a simple point-and-click map interface. 

Drone mobility

An obvious comparison is to fixed camera systems, which are an important component of any security system.

But, unlike a fixed device, the mobility of a drone enables a view of an environment that is more easily understood by humans, meaning that we think and see in 3D, whereas fixed views are limited to 2D. Added to that, there is a deterrence factor that a mobile surveillance device has over a fixed.

Noise consideration and applications

Customers want to fly drones 24/7 in minimally manned locations such as data centres, warehouses

The drone is designed to operate in environments that are being shared with humans. As an example, it will not initiate a mission if a person is standing under it, and it will autonomously alter course if a person is in its flight path.

However, like all drones, the noise factor is a consideration, and the best applications in offices are after hours. Customers want to fly them 24/7 in more minimally manned locations such as data centres, warehouses, and manufacturing facilities, where noise is less a factor.

Stand-alone and integrated system

An indoor drone can be operated as a stand-alone system with its user interface, or it can be integrated fully with traditional security and VMS systems.

“We are also developing additional computer vision-based analytics that will leverage the cameras on the drone,” says Bacco.

Learn why leading casinos are upgrading to smarter, faster, and more compliant systems

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Remote surveillance
  • Retail surveillance
  • Remote video surveillance
  • Residential security systems
  • Office security
  • Industrial security
  • Commercial security
  • Factory security
  • Security management
  • Security cameras
  • Covert cameras
  • Security camera systems
  • Security monitoring system
  • Radio frequency Identification
  • Video analytics
  • Remote video monitoring
  • Intrusion detection
  • Security guards
  • Facility security
  • Security software
  • Industrial surveillance
  • Mobile surveillance
  • Green security
  • Indoor surveillance
  • Day/Night surveillance
  • Covert Surveillance
  • Integration software
  • Cyber security
  • Video Management System
  • Corporate Security
  • Outdoor Security
  • Indoor Security
  • Home Security Systems
  • Data Security
  • Network Video Recorders
  • Warning Devices
  • Home automation
  • Cloud security
  • Robotics
  • Drones
  • COVID-19
  • Mergers & Acquisitions
  • Related links
  • 2022 security trends
  • Related categories
  • IP cameras
  • Access control cards/ tags/ fobs
  • Gates
  • Barriers
  • Guard booths
  • Video motion detectors
Related white papers
Aligning physical and cyber defence for total protection

Aligning physical and cyber defence for total protection

Download
Combining security and networking technologies for a unified solution

Combining security and networking technologies for a unified solution

Download
System design considerations to optimize physical access control

System design considerations to optimize physical access control

Download
Related articles
How physical security consultants ensure cybersecurity for end users

How physical security consultants ensure cybersecurity for end users

How managed detection and response enhances cybersecurity management in organisations

How managed detection and response enhances cybersecurity management in organisations

Drawbacks of PenTests and ethical hacking for the security industry

Drawbacks of PenTests and ethical hacking for the security industry

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Security beat
About this page

Discover ADT's Innovation Lab's future, exploring robotic security technology for efficient, data-driven and comprehensive safety solutions. Stay ahead with cutting-edge security innovations.

See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec