Data Security
Vanta, the trust management platform announced new investments in the United Kingdom and Ireland, including new compliance frameworks, product features, and the opening of its London office. These initiatives reflect Vanta’s ongoing commitment to helping UKI and European businesses easily achieve compliance and scale security programmes by providing the technology, local expertise, and trusted partnerships needed to compete on a global stage. Support for the EU AI Act The ra...
Luminys Systems Corp. (Luminys), a provider of smart, sustainable, and connected technology solutions, is advancing its strategic roadmap as it transitions to the supply chain network of Foxlink, a global pioneer in electronics manufacturing and the parent company of Luminys. This transition marks a significant step forward as Luminys positions itself for long-term growth in the North American market. Cybersecurity and data privacy Manufactured by Foxlink and its affiliates, Luminys&rsqu...
Logpoint is announcing the appointment of Frank Koelmel as Chief Revenue Officer (CRO), underscoring Logpoint’s dedication to establishing itself as a European cybersecurity powerhouse. The appointment will enable Logpoint to continue to focus on market growth by providing high-impact cybersecurity solutions that make it easier for security teams to defend against cyberattacks and for organisations to navigate the compliance and threat landscape. Cybersecurity industry Frank Koelme...
Entrust, a global pioneer in trusted payments, identities, and data security, announced it has been positioned by Gartner in the Leaders’ Quadrant for the inaugural Gartner Magic Quadrant for Identity Verification (IDV). The Magic Quadrant evaluated vendors across the identity verification market and recognised Entrust as a Leader. This recognition comes after the acquisition of Onfido earlier this year. Gartner Magic Quadrant The Gartner Magic Quadrant for IDV evaluates vend...
Robotic Assistance Devices Residential, Inc. (RAD-R), a subsidiary of Artificial Intelligence Technology Solutions, Inc. announced the purchase of 1 million unique MAC addresses. These addresses will be assigned to RADCam units as the Company ramps up production and deployment of its innovative residential security device. MAC (Media Access Control) address RAD-R’s acquisition of these MAC addresses ensures that each RADCam deployed in the coming months will be equipped with i...
Illumio Inc., the Zero Trust Segmentation (ZTS) company, announced it has achieved ISO/IEC 27001:2022 (ISO27001) certification. This certification represents Illumio’s continued commitment to meeting the highest levels of global security standards. Certification was issued by Schellman Compliance LLC following an extensive audit of Illumio’s ZTS platform, which includes Illumio Core®, Illumio Endpoint, Illumio CloudSecure® and Illumio for Microsoft Azure Firewall. FedRAMP&...
News
Ataccama, an AI-powered data management company, has bolstered its data security for its AI-powered data management platform, adding automated data hiding and centralised credential management. Enterprise data security Enterprise data security is critical for regulatory compliance and reputation management. The 2024 Forrester Research Total Economic Impact Study for Ataccama found $1.3 million worth of value is derived from risk mitigation and avoidance of fines associated with compliance. Ataccama ONE Ataccama ONE also provides automatic data hiding to prevent misuse, unauthorised access, and data leakage To tackle this, Ataccama has enhanced security functionality to ensure high-quality and trustworthy data to enable organisations to protect sensitive and PII data by managing access and applying appropriate security controls. Ataccama ONE also provides automatic data hiding to prevent misuse, unauthorised access, and data leakage or breaches, so data samples are only available to relevant users. Centralised credential management The further enhance security, the platform uses Centralised credential management as an extension of existing integration with Microsoft Azure Key Vault, data teams can now connect their HashiCorp directly. This streamlines management and removes the need to share the credentials with other services. Addressing data challenges "Data leaders are focused on maximising the power of quality data to boost productivity and support better decision-making across their enterprises. With v15.3, we focused on delivering the tools and functionality our users need to deliver clean data that can generate reliable insights and establish a culture of data trust throughout the business," said Jessie Smith, VP of Data Quality at Ataccama. "In this release, we've focused on what our customers want and what will help them solve real data challenges and automate data tasks for increased efficiency." Fast, accurate, and cost-effective This latest version delivers powerful new capabilities and enhancements designed to boost productivity, strengthen security, and empower users to derive greater business value from their data assets: Ataccama ONE v15.3 provides unparalleled fast, accurate, and cost-effective processing performance for even the heaviest data processing cases. This ensures users have the most up-to-date and accurate data to work from at all times, helping them move business initiatives forward successfully. Ataccama ONE v15.3 is available now.
Cohesity, a pioneer in AI-powered data security and management introduced a patent-pending visual data exploration capability to Cohesity Gaia, its first-to-market AI-powered search assistant launched earlier in 2024. By providing customers with a visual categorisation of the themes across documents and files within a data set, the visual data explorer brings new context to the data and suggests queries that help users gain insights faster. Challenges with the traditional approach With traditional approaches, enterprises often struggle to gain insights across unstructured data and text. This challenge only grows as the amount of unstructured data increases. With unstructured data representing more than 80 percent of all corporate data, companies are often forced to run queries and compile reports based on a small subset of data, the information stored in structured systems. As a result, reports and analyses may be incomplete or inaccurate, with valuable insight still locked inside disparate unstructured systems. Cohesity Gaia The solution indexes and provides insight based on data stored in many popular formats Cohesity Gaia brings the power of generative AI to enterprise data, dramatically improving the speed and quality of insights available for a variety of use cases. The solution indexes and provides insight based on data stored in many popular formats, including emails, documents, PDFs, text files, spreadsheets, HTML, XML, and presentations. Gain insights faster with auto-generated themes and topics One of the biggest challenges users face when working with vast datasets is having access to data but not knowing where to begin or what valuable insights can be retrieved. Cohesity Gaia overcomes this by automatically providing a visual representation of the data, sorted by themes, giving users a clear starting point. New visual explorer The new visual explorer uses topic modeling, a set of advanced AI techniques with natural language processing, to instantly identify hidden thematic structures across documents and files. This deep insight and context into the nature of the data offer a framework for better understanding, empowering users to ask more informed and targeted questions as they search. Context-aware prompts Gaia gives customers insight into their data while keeping it secure and compliant with regulatory requirements The Gaia data explorer further simplifies this process by allowing users to click through each theme, ask conversational questions, and interact with intelligent, context-aware prompts to quickly find the most relevant information. Aligned with Cohesity’s responsible AI commitment, Gaia gives customers insight into their data while keeping it secure and compliant with regulatory requirements. Cohesity will host a series of AI workshops to give customers and prospects a hands-on look at the first-of-its-kind data explorer and learn more about how Cohesity Gaia can help unlock new insights from their business. Data accessibility “By addressing the challenge of managing and extracting insights from unstructured data across disparate systems, Cohesity Gaia and its new visual data explorer have the potential to revolutionise data accessibility for enterprises,” said Chirag Mehta, Principal Cybersecurity Analyst with Constellation Research. “This innovation not only could enhance data security and compliance but could also empower business users of enterprise customers with deeper, more contextual insights, significantly benefiting the decision-making process and operational efficiency.” Access vast amounts with Generative AI Cohesity Gaia uses RAG AI and LLMs to help business users take advantage of information Cohesity has also expanded support for new workloads and data sources within Gaia. Cohesity customers can analyse corporate data protected on the Cohesity platform from Microsoft 365 Mail, Microsoft 365 Sharepoint, and Microsoft 365 OneDrive, as well as on-prem or cloud-based file servers, including popular systems like Dell EMC Isilon, Netapp NAS, physical file servers, and Cohesity Smartfiles. Introduced in February, Cohesity Gaia uses retrieval augmented generation (RAG) AI and large language models (LLMs) to help business users take advantage of the information contained in the data a company has generated. Valuable insights “We developed Cohesity Gaia because we believe that companies should be able to unlock valuable insights from the data they’re spending so much time and so many resources to protect,” said Craig Martell, CTO, of Cohesity. “It should be easy for business users to ask a question about their data and get an accurate, useful result, even if the data resides in disparate locations and different systems or how far back in history it goes. That is the promise of what Cohesity Gaia will deliver.” Artificial intelligence category Cohesity Gaia was recently recognised as a 2024 Tech Innovator by CRN in the artificial intelligence category. The awards spotlight innovative products and services that provide significant technology advances - and partner growth opportunities - across a range of technology categories, including AI and AI infrastructure. The visual data explorer and support for new data sources and workloads will be available in the October release of Cohesity Gaia.
Colt Technology Services, the digital infrastructure company publishes new research featured in its latest annual Digital Infrastructure Report in its fifth year surveying 1500 CIOs across 10 countries in the Americas, Asia, Europe, and the Middle East. Sustainability planning The research finds just 18% of UK businesses surveyed have a multi-year plan to minimise their environmental impact, compared with more than twice as many in the Netherlands (42%) and Hong Kong (41%). Most countries surveyed, however, are still in the early stages of sustainability planning, with 39% about to embark on a multi-year plan. Environmental strategies 38% say environmental impact and governance drive all strategic digital infrastructure decisions The research reveals that the responsibility for organisations’ environmental strategies is likely to sit with CIOs with 71% of those surveyed either having direct roles in shaping sustainability strategies or owning them entirely. This ownership is influencing technology buying decisions: 38% say environmental impact and governance drive all strategic digital infrastructure decisions, rising to 60% in Belgium, 52% in the Netherlands, and 50% in Hong Kong. ESG initiatives The findings come as technologies such as AI are under increasing scrutiny for their impact on businesses’ ESG initiatives. In the study, 42% of respondents highlight the positive contribution AI technologies make towards achieving environmental impacts and governance strategies. AI’s influence The CIOs surveyed cite AI’s positive influence in use cases such as investing in greater network security More than one in five (22%) go a step further and say AI facilitates these strategies, increasing to 36% in Hong Kong, 32% in the Netherlands, and 29% in the US, dropping to 13% in Italy. The CIOs surveyed cite AI’s positive influence in use cases such as investing in greater network security (cited by 61%); processing more data at the network edge (58%); and using more Network as a Service (NaaS) capabilities (58%). Contribution to carbon reduction Buddy Bayer, Chief Operating Officer, of Colt Technology Services, said, “To truly make a difference and reduce our impact on the environment takes more than a quick fix. Surprisingly, more than 80% of the UK businesses surveyed don’t have multi-year plans in place to drive sustainability, but I’m encouraged that they are now building their long-term sustainability journeys to drive real change. It’s also heartening to hear the positive contribution tech is making towards carbon reduction.” Buddy continued, “The Digital Infrastructure report holds a lens to the tech industry. It’s become an invaluable source of truth and this year’s is the most profound and insightful we’ve ever published." More key findings 21% of the IT pioneers questioned struggle to demonstrate the benefits or prove the ROI of their environmental impact and governance strategy; 20% face a lack of executive commitment and 19% are constrained by budgets. Businesses are still inhibited by legacy technology: 19% find legacy technology is a barrier to progressing environmental and governance goals around their infrastructure; by country, Luxembourg (26%) and Germany (24%) are most likely to be held back by legacy tech. When asked to cite which technologies were most impactful in achieving carbon reduction goals, 83% highlighted the retirement of legacy technologies. 83% of respondents mentioned ‘temporal optimisation’, e.g. conducting software updates out of working hours to make better use of energy; 82% cited Zero Trust; 81% cited NaaS and 81% cited smart office technologies as having the biggest impact on meeting carbon reduction goals. 81% cited NaaS and 81% cited smart office technologies as having an impact on meeting carbon reduction goals. The adoption of end-to-end intelligent infrastructure has grown to 40% in 2024, compared to 34% in 2023, comprising features such as on-demand connectivity, self-healing networks, and traditional or generative AI. Sustainability report Colt has secured the highest EcoVadis rating for the second consecutive year; and achieved ‘A-‘ and ‘A’ CDP Earlier in 2024 Colt published its third Sustainability Report. The report tracks progress for Colt Group - comprising Colt Technology Services and Colt Data Centre Services against targets in the areas of Environmental, Social, and Governance (ESG), and longer-term targets to net zero. Colt has secured the highest EcoVadis rating for the second consecutive year; and achieved ‘A-‘ and ‘A’ CDP (Carbon Disclosure Project) ratings for sustainability and supplier engagement. Methodology The research was conducted by Censuswide on behalf of Colt Technology Services, among a sample of 1,501 CIOs (in the UK, USA, Italy, France, Germany, UAE, Singapore, Hong Kong, Japan and Benelux. These pioneers work at businesses that employ between 2,500 and 15,000+ employees, with annual IT spending in the range of less than €100,000 to €500m and over. Censuswide abides by and employs members of the Market Research Society and follows the MRS code of conduct and ESOMAR principles. Censuswide is also a member of the British Polling Council.
Hexagon’s Safety, Infrastructure & Geospatial division announced the award of two patents by the United States Patent and Trademark Office for technologies designed to improve incident management and emergency response. The newly patented solutions extend access to security video footage and enable secure data sharing across organisations, empowering public safety agencies, security personnel, and other responders to better protect communities. U.S. Patent No.12,010,389 U.S. Patent No.12,010,389 covers Hexagon’s advanced web player technology, which is used within the Qognify VMS video management solution, enabling simultaneous streaming and playback of footage from multiple cameras via a standard web browser. Users can synchronise playback across multiple sources and ensure privacy masking. The player also allows for frame-by-frame analysis, enabling extremely accurate results during incident management, investigation, and review processes. U.S. Patent No.11,973,810 Using configurable rules, users can share the data they want to share, and with whom they want to share it U.S. Patent No.11,973,810 covers data-sharing capabilities within Hexagon’s cloud-based collaboration portal, HxGN Connect. Connect allows users from disparate organisations to rapidly and securely share a common operating picture and critical information while not compromising overall data security. Using configurable rules, users can share the data they want to share, with whom they want to share it, and under the conditions they set. Public safety and security “As greater demands are placed on public safety and security operations, new, groundbreaking technologies will be vital for protecting people, places, and assets,” said Kalyn Sims, chief technology officer at Hexagon’s Safety, Infrastructure & Geospatial division. “Hexagon is committed to innovating solutions that make our world safer. These patents are evidence of our dedication.”Hexagon is a world pioneer in safety and security, with over three decades of experience. Hexagon’s public safety solutions help to protect 1 billion people, and more than 4,000 organisations worldwide trust Hexagon’s physical security solutions.
Quanergy Solutions, Inc., a pioneering provider of 3D LiDAR solutions, has solidified a strategic partnership with Florida Drawbridges, Inc. (FDI), a premier operator and maintainer of movable bridges across seven states, with a seven-figure contract. This collaboration marks a significant milestone in the integration of Quanergy's cutting-edge 3D LiDAR technology into FDI's bridge monitoring systems, aimed at enhancing safety, reducing accidents, and streamlining operations. To date, more than 10 FDI-monitored bridges have already been equipped with Quanergy’s 3D LiDAR technology, with further installations planned in the near future. Enhancing safety with LiDAR technology The integration of Quanergy's LiDAR sensors will provide real-time 3D monitoring of bridge environments, offering several safety benefits: Accurate Object Detection: 3D LiDAR's high-resolution scanning capabilities enable precise detection of vehicles and pedestrians on or near the bridge, ensuring timely alerts for potential hazards. Improved Situational Awareness: Continuous 360-degree monitoring allows for comprehensive awareness of the bridge surroundings, aiding in real-time decision-making for bridge operators. Reduced False Alarms: Advanced perception software minimises false alarms, ensuring that operators are alerted only to genuine safety concerns Commitment to Public Safety By leveraging Quanergy's LiDAR technology, FDI aims to enhance its bridge operation protocols This collaboration underscores both companies' dedication to public safety. By leveraging Quanergy's LiDAR technology, FDI aims to enhance its bridge operation protocols, thereby reducing the risk of accidents and fatalities. “We chose Quanergy’s 3D LiDAR solution for the movable bridges that FDI manages because of its unmatched accuracy in detecting pedestrians, even in complex environments, " said Daniel Porter, President, FDI Inc. FDI’s exceptional team Porter added: "The Q-Track LR sensors and QORTEX perception software provided flawless coverage, significantly reducing the risk of accidents. Quanergy’s ability to integrate with existing FDI solutions and minimise false alarms made it the ideal choice for this critical safety application,” said Daniel Porter, President, FDI Inc. Adam Andres, Global VP of Sales Quanergy added: "We’re thrilled to partner with the Florida Drawbridges Inc. (FDI) team on this critical initiative. This collaboration marks a significant advancement in enhancing public safety and operational efficiency on moveable bridges. We look forward to ongoing work with FDI’s exceptional team to deploy this cutting-edge technology at additional sites across the country."
Ivanti, the tech company that breaks down barriers between IT and security so that Everywhere Work can thrive, introduced Ivanti Neurons for App Control, which safeguards devices from unauthorised applications. Patch Management In addition, Ivanti released new analytics in the Ivanti Neurons platform and new features for Ivanti Neurons for Patch Management to enhance security and ensure compliance. With Ivanti’s innovations and focus on exposure management, organisations can proactively safeguard themselves in the current complex and evolving threat landscape. Detecting and managing threats More than one in three IT professionals say they are less prepared to detect threats and respond to incidents Organisations are witnessing a fast-growing ecosystem of IT assets on their networks making attack surfaces bigger and more complex than ever. According to Ivanti research, more than one in three IT professionals say they are less prepared to detect threats and respond to incidents compared to one year ago. In a rapidly evolving threat landscape, organisations must prioritise staying ahead of the escalating threats they face by proactively managing their exposure and controlling their applications. Ivanti Neurons for App Control Ivanti Neurons for App Control plays a crucial role in preventing malware and zero-day attacks by blocking the launch of suspicious and unauthorised applications. Examining file ownership and applying granular privilege management, prevents unknown applications from running, helping ensure a secure and controlled environment. Leveraging cloud-based architecture, enables remote management of endpoints, even those outside the corporate network. Proactive exposure management In addition to Neurons for App Control, the Ivanti Neurons platform has released many innovations offering proactive exposure management: Enhanced customisation and reporting: To improve security and compliance posture, Ivanti Neurons for Patch Management’s new reporting engine streamlines and automates reporting ensuring alignment with regulatory standards, proactively mitigating non-compliance risks, and streamlining the audit process. In addition, improved deploy-by-risk customisation allows administrators to define more precise and robust criteria for diverse remediation tasks, enabling a rapid and targeted response to potential threats. Increased visibility with new analytics: New actionable analytics across the Ivanti Neurons platform equip teams with critical KPIs to optimise IT New actionable analytics across the Ivanti Neurons platform equip teams with critical KPIs to optimise IT and security operations while improving decision-making. This includes a customisable dashboard designer, out-of-the-box device, and patch deployment reports. Visibility and control “In today's evolving threat landscape, organisations require visibility and control over their applications and endpoints. Our launch of Ivanti Neurons for App Control and recent updates to existing solutions provide customers with the necessary tools to proactively defend against threats, ensure compliance, and make informed decisions to enhance their overall security posture,” said Dr. Srinivas Mukkamala, Ivanti's Chief Product Officer. "These advancements showcase our dedication to delivering comprehensive and innovative solutions that effectively aid organisations in managing their cyber risks."
Expert commentary
As urban populations grow and security challenges evolve, Californian cities have increasingly turned to advanced surveillance systems to enhance public safety. Surveillance infrastructure Between 2022 and 2024, these cities have made significant strides in upgrading their surveillance infrastructure, driven by concerns over crime, public safety, and the need for more sophisticated emergency response systems. This article explores how California's urban areas are improving surveillance technologies and practices, with a focus on citywide initiatives, partnerships with technology firms, and the integration of AI-driven systems. Introduction of smart city surveillance The push toward smart city technology has reshaped the security landscape in California The push toward smart city technology has reshaped the security landscape in California. With the state being home to some of the world's most innovative technology firms, cities such as Los Angeles (LA), San Francisco, and San Diego are leveraging this expertise to develop and implement advanced surveillance systems. Citywide surveillance initiatives Since 2022, the state has seen an increase in citywide surveillance initiatives aimed at addressing rising crime rates, enhancing traffic management, and improving emergency response. These systems include AI-enhanced video analytics, high-definition cameras, and real-time monitoring centers, helping law enforcement track and respond to incidents more efficiently. Key surveillance developments across Californian cities 1. Los Angeles: AI and Facial Recognition Integration Los Angeles has led the way in deploying state-of-the-art surveillance systems, particularly in high-crime areas and transportation hubs. In 2023, the Los Angeles Police Department (LAPD) expanded its use of artificial intelligence (AI) in crime prevention. The department integrated AI-enhanced video analytics with its existing network of over 30,000 surveillance cameras throughout the city, a move designed to improve real-time crime detection and automate the identification of suspicious activity. Privacy law compliance The city government has enacted measures to restrict the application of facial recognition to high-priority cases Facial recognition technology has also been a controversial but increasingly used tool in the city’s surveillance strategy. While privacy concerns remain, LA has implemented strict regulations to ensure that this technology is used in compliance with privacy laws. In response to public concerns, the city government has enacted measures to restrict the application of facial recognition to high-priority cases such as locating missing persons or identifying known offenders. According to a 2023 Los Angeles Times report, these technologies have helped reduce violent crime in areas where the systems are deployed, with a notable 15% reduction in crime rates in Downtown LA. 2. San Francisco: Data-Driven Crime Prevention San Francisco, a tech hub, has similarly embraced advanced surveillance systems, with a focus on predictive policing. The city's law enforcement agencies have adopted data-driven approaches that rely on vast amounts of data collected through surveillance cameras and other sensors placed around the city. Pilot programme In 2022, the San Francisco Police Department (SFPD) introduced a pilot programme that integrated predictive analytics with its citywide surveillance system. By analysing patterns of criminal activity, the system can forecast potential hotspots and allocate resources more effectively. Although controversial due to concerns over profiling and civil liberties, the system has been credited with helping police prevent several large-scale crimes. Transparency in the use of surveillance data Measures include annual audits and public reporting, ensuring that the system adheres to standards Moreover, the city has implemented stringent oversight measures to ensure transparency in the use of surveillance data. This includes annual audits and public reporting, ensuring that the system adheres to legal and ethical standards. A 2023 report from The San Francisco Chronicle indicated that this initiative has led to a 10% improvement in response times to major incidents, particularly in high-density areas like the Financial District. 3. San Diego: Smart Traffic and Public Safety Surveillance San Diego has also taken significant steps to upgrade its urban surveillance capabilities. One of the key focuses of the city has been integrating surveillance systems into its transportation infrastructure. The city’s Smart Streetlights programme, which began as a traffic monitoring initiative, was expanded in 2022 to include surveillance capabilities aimed at improving public safety. Smart Streetlights programme Under this programme, thousands of streetlights equipped with cameras and sensors have been installed throughout San Diego. These lights not only monitor traffic conditions but also detect suspicious activities, accidents, and emergencies. The data collected is transmitted in real-time to the city’s public safety command center, where law enforcement can respond to incidents more quickly. A 2023 evaluation by the San Diego Union-Tribune revealed that the Smart Streetlights programme had helped reduce traffic-related accidents by 12% and had become a vital tool in aiding crime investigations. Cybersecurity measures All data collected through its surveillance network is secure from potential breaches or unauthorised access Additionally, San Diego has focused on enhancing its cybersecurity measures to protect the integrity of its surveillance data. The city government partnered with local cybersecurity firms to ensure that all data collected through its surveillance network is secure from potential breaches or unauthorised access. Key technologies driving city surveillance in California The success of these surveillance initiatives can be attributed to the rapid advancement of several key technologies, which have transformed traditional security systems into sophisticated, AI-driven solutions. 1. AI-Powered Video Analytics AI-powered video analytics is at the forefront of city surveillance efforts in California. This technology enables the automatic detection of unusual patterns or activities, significantly enhancing the ability of law enforcement agencies to identify potential threats in real time. AI systems can analyse vast amounts of video footage quickly, reducing the need for manual monitoring. 2. Facial Recognition Technology Despite its controversial nature, facial recognition technology has been adopted in several Californian cities for high-priority security applications. While cities like San Francisco have restricted its use, other cities such as Los Angeles have integrated it into their surveillance networks under strict legal frameworks. 3. Predictive Analytics This technology allows police departments to focus their resources more effectively by identifying potential hotspots Predictive analytics, used prominently in San Francisco, relies on data collected from various surveillance systems to predict potential criminal activity. This technology allows police departments to focus their resources more effectively by identifying potential hotspots based on past crime patterns. 4. Smart Sensors and IoT Integration Cities like San Diego have embraced the Internet of Things (IoT) by embedding smart sensors into urban infrastructure. These sensors, connected to central monitoring systems, help cities track everything from traffic conditions to air quality. They also play a crucial role in public safety by identifying anomalies and triggering alerts for law enforcement. Challenges and controversies While the benefits of enhanced surveillance are clear, Californian cities face several challenges in the implementation of these technologies. 1. Privacy Concerns The increased use of surveillance technologies, particularly AI and facial recognition, has raised significant privacy concerns. Advocacy groups have called for stricter regulations to prevent misuse and protect individual privacy rights. In response, cities like San Francisco and Los Angeles have implemented oversight committees and enacted laws to govern the use of these technologies. 2. Data Security The risk of cyberattacks targeting sensitive data has prompted cities to invest in robust cybersecurity As cities collect vast amounts of surveillance data, ensuring its security is a major challenge. The risk of cyberattacks targeting sensitive data has prompted cities to invest in robust cybersecurity measures. San Diego's partnership with local tech firms to secure its surveillance infrastructure is an example of proactive steps being taken to address this issue. 3. Balancing Surveillance and Civil Liberties Striking a balance between effective surveillance and the protection of civil liberties continues to be a contentious issue. Critics argue that predictive policing and AI-driven surveillance systems can lead to biased decision-making and discriminatory practices. California cities have responded by introducing transparency measures, including public audits and open-data initiatives, to maintain public trust. California Urban Surveillance: A Model Worth Emulating The last couple of years have seen Californian cities making significant progress in upgrading their surveillance and security systems. By integrating AI, predictive analytics, and IoT technologies into their urban infrastructures, cities like Los Angeles, San Francisco, and San Diego are setting new standards for public safety and crime prevention. However, as these technologies continue to evolve, cities must also address the ethical and legal challenges they present, particularly in the areas of privacy and data security. With careful planning and regulation, California’s approach to urban surveillance could serve as a model for other cities worldwide.
As the backbone of community welfare, healthcare facilities cater to crucial public needs from emergency care to specialised medical treatments, and due to its position as a significant facet of the world's critical infrastructure, the healthcare sector faces a multitude of challenges in ensuring patient and visitor security, managing high traffic, and safeguarding sensitive data. Medical sites, such as large hospitals and urgent care clinics, see a wide variety of patients, medical staff, administrative teams, and visitors throughout the day. In addition to protecting patients, visitors, and staff, healthcare environments must protect medical and patient data, ensure immediate response to urgent medical events, and maintain 24/7 operations. Security challenges Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability Addressing the security challenges presented by 24/7 availability and high patient and visitor traffic calls for a merging of technology, processes, and security strategies that go beyond what a typical security infrastructure would look like. Cloud-based solutions have made their mark on healthcare security, offering unparalleled scalability, accessibility, and integration capabilities. These advancements address the multifaceted demands of healthcare organisations, ensuring seamless around-the-clock operations while prioritising patient care and safety. Enhancing operational efficiency to save lives Cloud-based access control solutions have revolutionised how healthcare security professionals approach collaboration within medical facilities. These solutions offer unparalleled accessibility and insight into patient and visitor security information and access logs, improving coordination among security teams and leading to more accurate monitoring and response to developing medical events. By managing and operating access control solutions via the cloud, healthcare facilities can implement effective physical security measures while ensuring seamless collaboration among staff to deliver the highest medical care possible to patients across facilities. Physical access controls Cloud-based access control systems allow users to securely access and manage physical access controls Cloud-based access control systems allow multiple users to securely access and manage physical access controls and visitor management data simultaneously, enabling them to keep track of patient movements as they are transferred throughout the facility or between different facilities. For larger hospitals or medical campuses with multiple facilities hosting access controls via the cloud empowers users with the ability to find patients and patient data in an instant, as well as opening the door to collaborate with teams separated by long distances, ensuring all team members have access to the information they need to continue saving lives. Scaling the way to top-notch care Healthcare institutions are constantly growing and changing in response to evolving industry regulations and standards, and the access control solutions these organisations rely on should be able to scale to meet their changing needs. To ensure their access control systems can keep up with these growing demands, healthcare security professionals can invest in access control solutions hosted in the cloud to avoid the tedious hardware constraints that come with traditional on-premises solutions. Cloud solutions offer significant levels of scalability, enabling healthcare organisations to adjust their storage requirements and computing resources based on changing requirements on the fly. This capability for flexibility ensures users can manage large amounts of data without significant upfront investments in hardware. Cloud-based access control solutions Cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access In addition to compliance with changing regulations, cloud-based access control solutions provide healthcare organisations with the flexibility they need to expand their access control platform across a growing campus or multiple buildings. Larger healthcare facilities typically consist of multiple sites of varying sizes across diverse landscapes, each with distinctive security needs. Systems hosted in the cloud provide scalability and flexibility for user organisations, allowing security teams to modify or expand upon their security infrastructure as needed without spending on costly new hardware. This adaptability is crucial for helping address varying risks over multiple sites, providing security personnel the flexibility they need to ensure patient safety over long distances. Ease of use for security teams To truly understand the value of a cloud-based access control system, healthcare security professionals must consider the long-term savings and ROI these solutions provide by bolstering operational efficiencies and enabling unprecedented scalability. These systems ensure compliance with changing standards and deliver a simplified user experience across platforms, prioritising security and ease of use for security teams across the healthcare sector.
As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres empowered by a new generation of data-driven technologies are emerging as an effective force multiplier. Real-time crime centres Real-time crime centres (RTCCs) serve as centralised hubs where dedicated personnel leverage pioneering-edge technologies to analyse diverse data streams and provide critical support to law enforcement and emergency operations. These 24/7 facilities are transforming how agencies gather, process, and act upon information, enabling more proactive and efficient policing strategies. The core functions of RTCCs These centres provide officers with unprecedented situational awareness and real-time intelligence At their core, RTCCs are tasked with three primary objectives: enhancing safety, facilitating identification, and supporting apprehension. By integrating data from a wide range of data sources, these centres provide officers with unprecedented situational awareness and real-time intelligence. Integrated data approach This integrated data approach allows RTCCs to alert officers to potential threats, quickly identify suspects, and guide responders during critical incidents. For instance, in the event of a robbery, RTCC operators can rapidly search camera and licence plate data to track suspect vehicles, significantly improving the chances of a swift arrest. According to the Bureau of Justice Assistance at the U.S. Department of Justice, the mission of an RTCC is to centralise a broad range of current and evolving technologies, coordinate sworn and non-sworn human resources, and direct the attention to high-crime areas, active crimes in progress, high-profile or highly recidivistic offenders, and large-scale public events that may require law enforcement presence or response. The technology powering RTCCs The effectiveness of an RTCC hinges on its ability to seamlessly integrate a wide array of technologies: Open Platform Video Technology: At the heart of many crime centres is an open platform video management software (VMS) that serves as the central nervous system, unifying diverse data streams into a cohesive operational picture. By leveraging open APIs and SDKs, the VMS can incorporate a wide range of cameras, sensors, and analytics tools. This data-driven approach to video technology enables seamless alert distribution to both the RTCC and field officers via mobile applications. IP Camera Networks: The eyes of an RTCC, these systems combine fixed, PTZ, multi-sensor, thermal, and other specialty cameras to provide continuous city monitoring. Strategically placed throughout urban areas, cameras offer comprehensive coverage of critical locations such as transportation hubs, commercial districts, and high-crime zones. This network forms the foundation for real-time monitoring and incident response. Sensor Arrays: Beyond visual data, RTCCs employ various sensor technologies. Acoustic sensors can detect sounds such as gunshots, shouts for help, breaking glass, and other sounds instantly alerting officers and cueing nearby cameras. Environmental sensors monitor air quality for gasses, smoke, and other non-visible hazards. Licence Plate Recognition (LPR): LPR systems act as a force multiplier, continuously scanning for vehicles of interest. By generating real-time alerts for stolen or wanted vehicles, these systems significantly enhance the ability to track suspects and recover stolen property, contributing to reduced auto theft rates. Aerial Surveillance: Many RTCCs incorporate drone technology, providing on-demand aerial perspectives of developing situations. This capability is particularly valuable for monitoring large-scale events, assessing natural disasters, supporting operations in hard-to-reach areas, and serving as a powerful first response for crime scene situational awareness. AI-Powered Analytics: At the heart of many RTCC operations are sophisticated AI algorithms that analyse video data in real-time. These systems can identify a range of suspicious activities, from unattended packages to unauthorised intrusions. By rapidly processing vast amounts of video data, they help operators focus on potential threats and anomalies. Geospatial Mapping: To make sense of the influx of data, RTCCs rely on advanced mapping software. These tools visualise events, alerts, and data streams geographically, allowing operators to quickly identify patterns, clusters of activity, and relationships between incidents. Database Integration: RTCCs maintain direct connections to various law enforcement databases, including local, state, and federal resources like the National Crime Information centre (NCIC). This integration allows for rapid background checks and threat assessments, providing crucial context for ongoing operations. Cloud Infrastructure: The scalability and flexibility of cloud computing are revolutionising RTCC capabilities. Cloud and hybrid solutions offer secure, off-site storage and facilitate easy data sharing between agencies. This approach not only reduces initial costs but also allows for incremental upgrades, making advanced RTCC functionality accessible even to agencies with limited budgets. Real-world impact RTCC operators tracked shooting suspects via camera feeds, guiding officers to their location The proliferation of RTCCs across the United States with over 80 centres in operation speaks to their proven effectiveness. Cities that have implemented these high-tech command centres are reporting significant improvements in response times, clearance rates, and overall public safety. Real-time surveillance In Winston-Salem, North Carolina, the local RTCC leverages over 1,300 live video feeds to provide real-time surveillance across the city. This extensive network, combined with gunshot detection technology and licence plate readers, has already demonstrated its value. In a recent incident, RTCC operators were able to track shooting suspects via camera feeds, guiding officers to their location for a quick apprehension. Video analysis by RTCC Similarly, Newport News, Virginia, saw an immediate impact after launching its RTCC in 2021. The centre has played a crucial role in solving homicides caught on video and rapidly closing a series of carjacking cases. These success stories underscore the game-changing potential of RTCCs when it comes to solving crimes and gathering evidence. In Memphis, Tennessee, video analysis by RTCC detectives helped identify a shooter in custody following an incident at a community basketball court even when no witnesses had come forward. Identifying suspects with RTCC Officers and analysts can view street and body camera footage to monitor crowds at parades The Jackson Police Department in Mississippi has seen similar benefits since building an RTCC in 2019, part of a broader effort that included deploying 100 cameras and 271 body cams. Officers and analysts can view street and body camera footage to monitor crowds at parades and other events. During pursuits, the cameras provide extra surveillance, allowing officers to identify suspects or witnesses to help solve crimes. Enhancing crime mitigation and emergency response While RTCCs have proven their worth in responding to active incidents, their true potential lies in proactive crime prevention and enhanced emergency preparedness. By leveraging advanced analytics and integrated data sources, RTCCs are evolving into powerful predictive tools for law enforcement. Pattern recognition algorithms For instance, pattern recognition algorithms can analyse historical crime data alongside real-time video feeds to identify potential hotspots for criminal activity. This allows law enforcement to strategically deploy resources, increasing visible presence in high-risk areas before crimes occur. Similarly, anomaly detection systems can alert RTCC operators to unusual behaviors or suspicious activities, enabling early intervention in potentially dangerous situations. Asset and property protection, automated alerts RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7 Asset and property protection is another area where RTCCs excel. By integrating with access control systems and using AI-powered video analytics, RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7. Automated alerts for perimeter breaches, unauthorised access attempts, or suspicious objects left in restricted areas allow for an immediate response, significantly enhancing security postures. Emergency response and preparedness In terms of emergency response and preparedness, RTCCs serve as vital command and coordination centres during crises. Whether facing natural disasters, major accidents, or other large-scale emergencies, RTCCs provide a centralised hub for information gathering and dissemination. Real-time video streams from affected areas, combined with data from environmental sensors and emergency service communications, allow for rapid situational assessment and coordinated response efforts. Post-incident investigation and analysis RTCCs can also play an active role in post-incident investigation and analysis. The ability to quickly compile and analyse vast amounts of data from multiple sources can significantly accelerate case resolution and help identify patterns to prevent future incidents. As RTCCs continue to evolve, their capacity for integrating diverse data streams and leveraging advanced analytics positions them as indispensable tools in modern law enforcement strategy. The future of technology-driven policing The integration of artificial intelligence and machine learning promises to enhance video analytics As RTCCs continue to evolve, they are likely to incorporate even more advanced technologies. The integration of artificial intelligence and machine learning promises to enhance video analytics capabilities, enabling faster and more accurate threat detection. Additionally, the expanding use of drones, subject to FAA regulations, could provide RTCCs with cost-effective aerial surveillance options. Effective and ethical operations However, the implementation of RTCCs is not without challenges. Agencies must navigate issues of privacy, data security, and community trust. Ongoing training for personnel and careful planning is essential to ensure these centres operate effectively and ethically. Data-driven approach Despite these hurdles, the trend toward technology-driven policing shows no signs of slowing. RTCCs represent a shift from reactive to proactive law enforcement strategies, offering a data-driven approach to crime prevention and response. As these centres become more prevalent, they will play an increasingly vital role in helping agencies maximise their resources and make informed decisions, ultimately contributing to safer communities for all.
Security beat
Casinos face multiple security issues caused by potential bad actors, everything from cheating to vandalism, from theft to vagrancy. A new intelligent technology can monitor for specific keywords and behaviours. The technology scans the entire casino premises constantly for potential threats and notifies key personnel when they happen. Casinos are among the environments deploying the OpticSense system by Huvr Inc., which uses special fibre optic technology called an interferometer to secure large areas. Imagine a very sensitive loop made of fibre-optic cables placed around the perimeter of a facility. System’s artificial intelligence Basically, it converts the entire facility into a highly sensitive microphone, detecting any slight disturbances, such as an unusual movement or sound. When the system senses something out of the ordinary, it immediately triggers cameras to look at the disturbance and record a short video. The system’s artificial intelligence (AI) then analyses both the sound and video to determine what's happening. It compiles a detailed report and immediately sends the information to security teams. OpticSense OpticSense can hear, see, and analyse potential threats automatically before they get out of control. “This makes it possible for fewer people to do more,” says Herman C. DeBoard III, CEO and Founder of Huvr Inc, adding “When you don’t need as many personnel to monitor video feeds and analyse data, you can drastically reduce your labour costs. Best of all, when you optimise your resource allocation, your security teams can respond more effectively to each threat.” The system’s AI analyses sound and video to define what's happening. Combining fibre optics and AI Huvr was originally designed as a platform to provide immersive virtual travel experiences Huvr was originally designed as a platform to provide immersive virtual travel experiences. However, with the acquisition of OpticSense and Grip Places, the company pivoted to integrate advanced fibre-optic technology and AI-driven analytics into a comprehensive security system. The system’s artificial intelligence and fibre-optic interferometer technology work together to detect and analyse real-time threats. When the Fibre Optic Ring Interferometer (FoRi) detects even minute audio abnormalities, it triggers AI analysis. In split seconds, the AI directs cameras to record 60 seconds of video, compiles a detailed report, and then texts the real-time intelligence to security teams and authorities. Intelligent security solutions The growing need for intelligent security solutions can help to drive Huvr's entry into the security marketplace. Advanced technology enables the company to meet the increasing concerns surrounding public safety and the growing need for real-time threat analysis. The AI system classifies each detected anomaly according to its severity and stores data from various incidents to improve its risk assessment abilities over time. This continuous learning enables the AI to become more adept at accurately identifying and responding to threats specific to the casino environment. AI system classifies each detected anomaly according to its severity. Simple and discreet installation The system involves installing fibre optic cables around the casino’s perimeter The system involves installing fibre optic cables around the casino’s perimeter. It’s a simple job that typically requires less than a day. “These cables allow the casino to establish a smart perimeter detection system without significant infrastructure alterations,” says DeBoard Casinos typically employ upwards of 6,000 cameras, but human security teams cannot feasibly monitor all the incoming data at once. Huvr's OpticSense product becomes like the brain of the casino, constantly monitoring disturbances and responding in real time. Huvr’s fibre optic cables Huvr’s advanced detection algorithms work in tandem with a casino’s existing camera infrastructure, simply adding a layer of security that converts traditional security measures into an intelligent system that continuously monitors and analyses video footage. With Huvr’s fibre optic cables easily hidden or buried and the server roughly the size of a shoe box, the system is designed to be extremely discreet. It can be operated by a single person using a small handheld device. The security system is simple to scale and manage without disrupting casino operations. Security system is simple to work without disrupting casino operations. Autonomy boosts productivity Huvr automates surveillance and anomaly detection to decrease the load on security teams Autonomy is an important aspect of this new technology. Traditional security systems have required constant human monitoring, but Huvr automates surveillance and anomaly detection to decrease the load on security teams. “Without any human direction, Huvr detects minute disturbances, triggering the AI system to direct cameras and analyse video footage instantaneously,” says DeBoard. He adds, “The intelligent system rapidly monitors every anomaly and accurately decides which present potential threats. When it detects an issue, it compiles a detailed report that includes the number of individuals involved, their appearances, direction of movement, and licence plates. It takes only seconds to text this report to security teams and authorities.” Applications beyond casinos Beyond casinos, Huvr already provides proactive security in a wide variety of settings. In banks, the system monitors parking lots and ATM machines for suspicious activity. In large stadiums, it proactively detects target words such as “help” or “gun.” In schools, Huvr’s fibre optic ring interferometer secures campuses against unauthorised intrusions. In hospitals, it alerts medical staff when patients need immediate care. In airport terminals, it monitors for suspicious behaviour. In restaurants or construction sites, the system learns to monitor for safety violations and health hazards. Smart perimeters around critical infrastructure The fibre optic cables also form smart perimeters around critical infrastructure like power grids, cell towers, and bridges to watch for physical disturbances or tampering. “Because the system can be customised to each new environment and can learn quickly, the applications are virtually limitless,” says DeBoard. {##Poll1728555696 - Do you believe AI-driven perimeter detection systems will significantly reduce security labour costs?##}
The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years. There is a higher demand for integrated solutions that go beyond just security at the device and software level, and manufacturers have been continuously developing improved application programming interfaces (APIs), and hybrid and cloud-connected solutions. Artificial intelligence (AI) Also, artificial intelligence (AI) plays an important role in modern intrusion systems by helping enable automated threat detection, real-time response, and predictive analysis. AI algorithms can analyse vast amounts of data to identify patterns and anomalies that may indicate security breaches. Security solutions are being developed with a focus on AI and machine learning to provide more proactive and resilient defences against increasingly sophisticated cyber threats. Benefits of AI AI-driven security solutions can continuously learn and adapt to new threats, providing more robust protection “The practical benefits of AI in security systems include enhanced accuracy in detecting threats, reduced response times through automation, and the capability to anticipate and prevent potential vulnerabilities before they are exploited,” says Sergio Castillejos, President, of Commercial Security at Honeywell. Additionally, AI-driven security solutions can continuously learn and adapt to new threats, providing businesses with more robust and dynamic protection. Unified Intelligent Command user interface Honeywell meets the challenge of better-integrated systems with a unified Intelligent Command user interface (UI). Castillejos says Honeywell continually innovates with the latest analytics and encryption to keep up with evolving threats. Honeywell’s products integrate with many offerings for partners to construct a robust and modern system relevant to their security needs. Advanced cloud-based security Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection, and remote management, essential for hybrid work environments, says Castillejos. “These solutions enhance scalability, improve data analytics capabilities, and provide seamless updates reducing significant maintenance costs that help companies to respond swiftly to emerging threats and enable robust, adaptive security measures.” Physical and digital security The best security systems are a combination of physical, digital, and national security, says Castillejos. While Honeywell focuses on providing the best in physical and digital security within their solutions, protecting sensitive and/or personal information must also be within the responsibility of the organisational policy. Cybersecurity for connected devices Some of the challenges in the next five years will likely include integrating advanced technologies Security systems can safeguard this information by being highly configurable while also notifying users of unwanted activity. Sometimes, just restricting access to sensitive areas can be enough. However, in the world of data analysis and machine learning, security systems can audit and report on users who have accessed data to ensure that the protections are in place. Some of the challenges in the next five years will likely include integrating advanced technologies such as AI and the Internet of Things (IoT) while securing cybersecurity for connected devices, notes Castillejos. Balancing act “Additionally, there will be a growing need for skilled professionals to manage and maintain these complex, connected systems,” he says. “Balancing cost-effectiveness with the demand for resilient security solutions will also pose a significant challenge, especially for smaller businesses.” Legacy systems that are susceptible to vulnerabilities like cloning or unauthorised access present the largest challenge to overcome. “However, as technology evolves, it becomes more challenging for a customer to manage a unified security system rather than a collection of unique solutions that all operate independently,” says Castillejos. Disruptive technology But investing in the newest analytics, AI and IoT will not improve a company’s physical security systems if they do nothing with the data. “They are not a replacement for the devices that keep people and property safe,” says Castillejos. “They can enhance a user’s experience and speed up the time to respond when they are planned correctly.” The best security systems will look at disruptive technology as another tool in the overall system. However, the focus should remain on the user experience. If the latest technology is not properly integrated or configured, it will turn into more noise that most operators will ignore. {##Poll1720586145 - Which is the most useful benefit of artificial intelligence (AI) in security systems?##}
In the competitive world of physical access control, Big Tech companies are seeking to play a larger role. Physical access competition Apple Wallet continues to stake its claim on mobile credentialing. Amazon One Enterprise is pushing a palm-based identity service. Google/Nest offers smart locks for home access control, with identity and access management provided in the Google Cloud. The entry of these big companies in the historically fragmented physical access control market is causing disruption and foreboding new levels of competition. Apple Wallet impacting credentialing trends The popularity of mobile wallets and contactless technologies in general has grown, creating more demand At Apple’s Worldwide Developer Conference in June 2021, the company announced support for home, office and hotel keys, including corporate badges and student ID cards, in Apple Wallet. Later, the company announced Hyatt as the first hotel partner to support the technology. Since then, the popularity of mobile wallets and contactless technologies in general has grown, creating more demand for a seamless solution such as Apple Wallet. Easy access In 2023, HID Global announced the availability of their employee badge in Apple Wallet, allowing staff and guests to easily access corporate spaces with their iPhone or Apple Watch, including doors, elevators, turnstiles, etc. Employees just need to hold their iPhone or Apple Watch near the reader to unlock. Factors affecting the rate of adoption However, implementing and maintaining an Apple Wallet-based access control system can incur costs for hardware updates, software licencing, and ongoing maintenance. Factors affecting the rate of adoption include the need to upgrade existing infrastructures to accommodate the technology, and the necessity for access control manufacturers to develop and implement integrations with Apple Wallet. Benefits of adoption Keys in Apple Wallet take full advantage of the privacy and security built into the iPhone and Apple Watch With larger companies leading the way, some smaller ones might take longer to catch up. There is also a need to educate building owners and administrators to see the value and benefits of switching to Apple Wallet-based access control. Convenience and greater security can accelerate adoption. Keys in Apple Wallet take full advantage of the privacy and security built into iPhone and Apple Watch. Sensitive data protection A compatible app, specific to the building’s access control system, is needed. Once added, credentials are securely stored in the iPhone's Secure Enclave, a dedicated hardware chip designed for sensitive data protection. Holding an iPhone near an NFC-enabled reader enables transmission of encrypted credentials. In addition to Near Field Communication (NFC), some systems also utilise Bluetooth Low Energy (BLE) for added security, longer read range, and hands-free unlocking. Phones need sufficient battery charge to function. Amazon One Enterprise Enables Palm-Based Biometrics In November 2023, Amazon Web Services Inc. (AWS) announced an identity service providing comprehensive and easy-to-use authentication for physical and digital access control. The system enables users to employ their palm as an access control credential, allowing organisations to provide a fast and contactless experience for employees and others to gain access to physical locations as well as digital assets. Physical and digital locations Physical locations include data centres, office and residential buildings, airports, hotels, resorts Physical locations include data centres, office and residential buildings, airports, hotels, resorts, and educational institutions. IT and security administrators can easily install Amazon One devices and manage users, devices, and software updates using AWS’s Management Console. Elimination of physical credentials An advantage of the Amazon approach is the elimination of physical credentials such as fobs and badges, and digital elements such as personal identification numbers (PINs) and passwords. AWS says security is built into every stage of the service, from multi-layered security controls in the Amazon One device, which is the same technology used in the Amazon Go retail stores, where shoppers can pay for purchases by scanning the palm of their hands. The devices combine palm and vein imagery for biometric matching and deliver an accuracy rate of 99.9999%, which exceeds the accuracy of other biometric alternatives, says the company. AI and ML The palm-recognition technology uses artificial intelligence and machine learning to create a “palm signature” that is associated with identification credentials such as a badge, employee ID or PIN. Boon Edam, a revolving door and turnstile manufacturer, offers Amazon’s palm biometric technology on its equipment, and IHG Hotels & Resorts uses the technology to provide employees a convenient way to identify themselves and gain access to software systems. Google and Nest Devices in Access Control When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone Google’s Nest devices include smart locks for home access control. The Google Nest × Yale Lock allows access control via both physical keys and passcodes accessible through the Google Home app. When the Nest × Yale Lock is connected to the Nest app, a resident can unlock a door from their phone. Passcodes can be created for family, guests, and other trusted persons. Alerts can be provided whenever someone unlocks and locks the door. When Nest “knows” a resident is away, the door can lock automatically. Voice control, Google Home app Voice control, using Google Assistant integrated with various Nest devices, enables use of voice commands to lock and unlock doors, thus adding another level of convenience. Smart home devices from various manufacturers can be controlled through the Google Home app. SMART Monitoring ADT’s Self Setup smart home security systems integrate Google Nest smart home products with ADT security and life safety technology, including SMART Monitoring technology. Microsoft Azure is another company that could impact access control. The Microsoft Azure Active Directory is an identity and access management platform that could be extended to physical access control, leveraging existing user credentials. Long-Range Impact on the Security Marketplace Big Tech companies are creating platforms for managing access control data, integrating with other security systems Increasingly, Big Tech companies are creating platforms for managing access control data, integrating with other security systems, and offering analytics for optimising security and building operations. Big Tech is also actively researching and developing new technologies for access control, such as facial recognition, voice authentication, and AI-powered anomaly detection. Access control communication and integration As their involvement in physical access control grows, Big Tech companies could potentially gain more influence in setting industry standards for access control communication and integration, similar to how they have become dominant in other areas such as mobile platforms. Given their expertise in user interface design and data analysis, Big Tech companies could help to direct how future access control systems are managed and how users interact with them, including more intuitive and user-friendly operations. Future of physical access control Existing concerns about privacy, security, and potential dominance by a few Big Tech companies could spill over into physical access control. However, traditional security companies, startups, and industry consortiums are also actively developing innovative solutions. Ultimately, the future of physical access control will likely be shaped by a combination of many different players and technologies – large and small.
Case studies
The office of the Additional Director General of Police (ADG) and Inspector General (IG) of Prisons oversees the management and security of all prisons in the Indian state. This includes ensuring the safety of prison facilities, implementing rehabilitation programs for inmates, and managing prison staff. Creating a fair environment The ADG and IG focus on improving prison conditions and ensuring legal standards are met. Their goal is to create a secure and fair environment, balancing safety with efforts to reform and rehabilitate prisoners for their eventual return to society. Scenario The need for a robust solution became clear after issues like hidden illegal items and unmonitored inmate movements The absence of a security video surveillance system created critical security blind spots, making it difficult to monitor key areas effectively. The need for a robust solution became clear after issues like hidden illegal items and unmonitored inmate movements posed significant risks to prison security. New security video surveillance system To comply with government regulations, the new security video surveillance system had to adhere to stringent standards established by the Bureau of Indian Standards (BIS). This included specific sections detailing the specifications for camera performance and image quality and covering safety guidelines for IT equipment. The system required STQC certification to meet high security and data privacy standards, crucial for government installations. OWASP ASVS 4.0 L2 standards Additionally, it needed to comply with OWASP ASVS 4.0 L2 standards to ensure robust cybersecurity, safeguarding against common vulnerabilities. High-resolution cameras were essential for clear image capture, and tamper-proof storage was required to securely retain footage for 30 to 90 days. The system also had to align with the National Cyber Security Policy to protect sensitive data from cyber threats. Compliance with these standards was vital for maintaining security and operational integrity within the prison. Challenges Due to the absence of a security video surveillance system, the Prison Department faced numerous challenges such as: Struggled to monitor blind spots in the prison yard where fights and disputes frequently occurred. Detecting the smuggling of drugs and mobile phones during visitations was nearly impossible with manual checks alone. Staff couldn’t always be present to monitor isolated areas like back rooms, corridors, and staircases, leading to security gaps. Identifying the individuals involved in riots or brawls was difficult due to the lack of visual evidence. Inmate escape attempts often went unnoticed until too late, especially during night shifts. Ensuring round-the-clock monitoring of high-risk zones like solitary confinement was a constant challenge. Coordinating emergency responses, such as medical help during violent outbreaks, was delayed without instant visual updates. Matrix solution Matrix security video surveillance systems comprising Matrix Network Cameras and NVRs were installed across four prisons statewide, providing robust security for over 10,000 inmates. Matrix PTZ Cameras were deployed in larger spaces like the prison yard, where they could pan, tilt, and zoom to follow suspicious activities or fights, providing dynamic coverage and ensuring swift responses to incidents. Mini Dome Cameras were placed inside cells and common areas to provide constant, wide-angle surveillance, keeping tabs on inmate behaviour and reducing the chances of fights or smuggling illegal items. These cameras were also installed in cafeterias and recreation areas to monitor inmate interactions. Mini Bullet Cameras were installed in corridors and cellblock hallways to keep a close eye on inmate movement, ensuring no blind spots in these high-traffic zones. They were also installed in less-visited areas like storage rooms and staff offices to prevent unauthorised access and maintain control. Project Bullet Cameras were mounted along the prison yard and perimeter walls, providing long-range surveillance to prevent escape attempts and monitor outdoor activity. They were also installed at entry and exit points to keep tabs on everyone going in and out, securing access to the facility. 24x7 real-time monitoring All Matrix Network Cameras were centrally monitored with Matrix 64 Channel NVRs All Matrix Network Cameras were centrally monitored with Matrix 64 Channel NVRs. This setup enabled 24x7 real-time monitoring, recording, and playback of video from different areas of the prison, ensuring complete coverage and prompt incident response. Similarly, the prison departments in three other cities of the state were also secured with Matrix Network Cameras and NVRs. Products offered Matrix MIDR20FL36CWS P2 (800+): 2MP IR Mini Dome Camera with 3.6 mm Fixed Lens Matrix MIBR20FL36CWS P2 (600+): 2MP IR Mini Bullet Camera with 3.6 mm Fixed Lens Matrix CIBR20FL36CWS P2 (800+): 2MP IR Project Bullet Camera with 3.6 mm Fixed Lens Matrix PZCR20ML25CWP P2 (70+): 2MP IR PTZ Camera with 25x Optical Zoom Matrix NVR6408X P2 (40+): 64 Channel NVR with 8 SATA Ports Solution diagram Benefits They ensured round-the-clock surveillance of high-risk zones, such as solitary confinement and cell blocks The installation of the Matrix security video surveillance system effectively eliminated critical security blind spots in the prison yard, reducing the risk of fights and disturbances. They ensured round-the-clock surveillance of high-risk zones, such as solitary confinement and cell blocks, preventing inmate escapes and unauthorised movements. Centralised monitoring Matrix security video surveillance systems enabled accurate monitoring during visitations, significantly enhancing the detection of smuggling attempts for drugs and mobile phones. Centralised monitoring via the 64-Channel NVR allowed for quick identification and response to disturbances, ensuring timely intervention during riots or medical emergencies. Regulation safety and data privacy High-resolution camera footage provided reliable documentation of inmate interactions and incidents, supporting investigations and enhancing overall prison security management. Matrix security video surveillance system meets BIS and STQC standards, ensuring compliance with government regulations for safety and data privacy. It also complies with OWASP ASVS 4.0 L2 standards, enhancing data security and protecting against cyber threats.
Baydale Control Systems has taken control of its stock management using a BigChange 6-in-1 system. Specialising in electronic security and fire alarm systems, Baydale moved to the cloud-based solution to improve its client record management, provide visibility of the mobile workforce, and offer digital certification. Since implementing, BigChange has allowed Baydale to improve profitability by allocating routine jobs and ad-hoc call-outs 80 percent faster and boosting engineer productivity by 33 percent. Security design, installation, and integration Established in 1999, Baydale is at the forefront of security system design, installation, and integration. Working primarily with public and community sector organisations such as Local Authorities, Police Forces, Educational Institutions, NHS Trusts, and Housing Associations, Baydale’s core services include CCTV, door entry, security doors, gates and barriers, and fire detection and alarms. Baydale operates a 24-hour-a-day, 7-day-a-week engineering operation with more than 40 specialists operating nationwide. Digital certification “Our previous system, a server-based platform, had served us well for almost 20 years, however, as we expanded and our client base expected more, it just wasn’t keeping pace,” commented Tina Lunnon, Service Admin Manager and BigChange ambassador within Baydale. “We knew we wanted a system that was cloud-based, we also knew we wanted a system that would allow us to keep track of stock, have visibility of engineers’ movements, and offer digital certification.” BigChange job management system BigChange job management system, which incorporates a mobile workforce app, CRM, job scheduling One of Baydale’s primary objectives for implementing the BigChange job management system, which incorporates a mobile workforce app, customer relationship management (CRM), job scheduling, live tracking, financial management, and business intelligence tools in one system, was control and visibility of its mobile workforce. “We reviewed several systems before we looked at BigChange and fell in love!” she continued. Colour-coded job progress icon “Being able to see where our engineers are, in real-time, alongside a colour-coded job progress icon, means it’s much easier to pick up work and allocate an appropriate and available resource." "This means each engineer can complete more jobs per day making them on average 33 percent more productive.” Stock control Another driver for the big change in job management at Baydale was stock control. “Having our stock records managed digitally has taken some time to get up and running but we are seeing a clear benefit of those hours invested as knowing what an engineer has on their vehicle means jobs can be allocated 80 percent faster.” CRM features Baydale has also transformed up to 95 percent of its workflows to digital, improving the speed Baydale has also transformed up to 95 percent of its workflows to digital, improving the speed of customer updates and reducing the admin resource required to duplicate information from paper to digital. The CRM features are clear and simple to navigate, and, being able to add custom fields allows Baydale to share detailed customer and site information between the back office and field teams. The ability to add notes and link to quotes and additional documents and actions such as text messages sent, provides evidence for audit trails and customer clarification if required. Job cards “Overall, we have noticed a vast improvement in the way we communicate with our clients." "The job cards produced by BigChange are clearer, holding just the right information including time and date stamped photos, and the ability to set up auto send has made a massive difference in the number of emails we generate and calls we make.” Job completion reporting Using the BigChange booking site, some of Baydale’s larger clients can also self-serve information Digital certification and job completion reporting is important for Bedale’s clients and these have boosted customer service as worksheets and certificates can be shared with the client as soon as a job has been completed. Using the BigChange booking site, some of Baydale’s larger clients can also self-serve information and schedule routine appointments. Control and awareness “BigChange has transformed the management of our mobile operation,” Lunnon concluded. “We now have much more control and awareness, we have seen an improvement in our compliance obligations, and we achieved our most profitable year ever – some of which can, without doubt, be attributed to the use of BigChange.”
In Japan nearly two in five office workers work from home a minimum of once a week, particularly if they work in IT or consultancy, according to Nikkei research undertaken in 2023. When a global IT company announced they would be leasing out four floors in their Tokyo office last year, in response to changing working habits following Covid, G4S approached them to be their security provider. They had already been doing access control and meet and greet at the eight-storey building for the last 10 years. New access control systems Eiki Hata, Representative Director of G4S Secure Solutions Japan, says: “The security requirements for a multiple tenancy building are quite different from a single occupancy. You have more people coming and going, companies have different requirements – more sophisticated and robust protocols are needed.” After being awarded the new contract, G4S doubled its headcount onsite and configured new access control systems for each floor; some of the new tenants wanted to keep their existing passes, which G4S was able to accommodate. Health and safety Security officers are also trained in first aid, which includes administering CPR and using a defibrillator Eiki says that 40% of G4S’s remit is health and safety and they will provide support during natural disasters, such as earthquakes or flooding. This includes checking if there is any damage to the building alongside the facilities team and offering assistance to local residents who may take refuge there. They will also hold regular evacuation drills for the whole building. Security officers are also trained in first aid, which includes administering CPR and using a defibrillator. They will also call for an ambulance if required and direct them once onsite. The officers are also responsible for ensuring everyone shows their ID at reception and all guests are booked in, as per the company’s global policy. Customer service skills Eiki explains: “Japan is one of the safest countries in the world: if you leave your wallet somewhere, it’s likely that you’ll get it back without losing any money." "However, that also means that Japan has a very low awareness of risk and our security officers need to be able to explain why these protocols are in place when questioned. When you just have one company in a building it’s easy to enforce operational rules, but with multiple tenants that’s less easy to do - customer service skills are really important.” Flexibility and adaptability The company is one of a number of multinationals spanning sectors that G4S provides security This company is one of a number of multinationals, spanning various sectors, that G4S provides security for in Japan. Other business lines include close protection and risk consulting. Eiki explains that part of the appeal is that G4S can more readily recruit staff that speak English than local companies, which many multinationals require. He says: “Less than 5% of the Japanese population speak English, we are not like Hong Kong or Singapore which are international hubs in APAC.” Smallest business within G4S Eiki continues: “Another advantage that G4S has is that we can speak to other countries and ask them to share their experiences, helping us to create a seamless security consultancy for our clients.” Eiki says that flexibility and adaptability are other trademarks: “We are the smallest business within G4S; we are growing the business and want to fulfil our clients’ requests even if it’s difficult or not straightforward.”
A prestigious sports club recognised for its premium offerings and high-end facilities caters to a distinguished clientele, including business pioneers, corporate professionals, and other elite members. Committed to maintaining its reputation, the organisation continually strives to enhance security and streamline operations, ensuring an exceptional experience for its members. Face recognition-based approach Confronted with rising security concerns and operational bottlenecks, the sports club sought a sophisticated solution to integrate physical access control with its existing membership management system. The preference was for a face recognition-based approach that would automate access based on subscription validity, improve process efficiency, and elevate member experience. Matrix provided a solution that centralised membership management, automated access procedures, and delivered real-time insights. Challenges Security Vulnerabilities: The club faced increasing challenges related to unauthorised access and potential security threats. Ensuring that only legitimate members could enter the premises was a critical requirement, leading to a preference for advanced face recognition-based access control. Operational Inefficiencies: Manual verification of subscription statuses created significant delays, particularly for the finance team, which had to cross-check member records frequently. The process was error-prone, creating workflow bottlenecks and hampering productivity. Enhancing Member Experience: Delays due to manual verification detracted from the overall member experience. The club aimed to improve efficiency in facility access to ensure that members enjoyed a seamless and trouble-free experience. Matrix solution Matrix implemented a robust face recognition-based access control system that seamlessly integrated with the club's membership management software. The solution offered the following capabilities: Centralised Management: All member information, including access rights and subscription details, was consolidated within a single platform, enabling centralised oversight. This allowed for real-time updates and streamlined control over member access. Automated Access Control: The system automatically authenticated members based on their subscription status, allowing only those with valid memberships to access the facilities. This automation eliminated the need for manual checks, greatly enhancing operational efficiency. Real-Time Monitoring and Reporting: With real-time access monitoring, staff could immediately respond to unauthorised access attempts. Detailed reports on access trends and member behavior supported informed decision-making and further optimisation of services. Deployment scenario Results Heightened Security: The implementation of high-speed face recognition-based access control significantly improved security by effectively blocking unauthorised access and mitigating the risk of breaches. Members felt reassured by the enhanced safety measures. Optimised Operations: Automating access control eliminated manual subscription verification, allowing the finance team to focus on more value-added tasks. The streamlined process improved the accuracy and speed of operations. Superior Member Experience: Members experienced faster and more efficient facility access, boosting overall satisfaction and engagement with the club. Actionable Data Insights: The system provided detailed data on member activity, allowing the organisation to make data-driven improvements to its offerings and facilities. Products deployed COSEC ARGO FACE: Facial Recognition Access Control System with EM Proximity Card Compatibility COSEC PANEL200P: Centralised Access Controller Hub COSEC PLATFORM: Software Platform Licence COSEC PLT: Platform Licence for 17,000 Users COSEC FR: Facial Recognition Licence for 17,000 Users COSEC ACM: Access Control Licence for 17,000 Users Matrix’s solution effectively addressed the sports club’s security concerns, streamlined operational processes, and enhanced the member experience, setting a benchmark for access control in the industry.
VIVOTEK successfully partnered with CMS, a pioneering provider of solar radiation measuring and analysis solutions, to implement an innovative Cloud Detection and All Sky Measurement system. The project aimed at delivering accurate and reliable data for applications such as weather and cloud observations, atmospheric and climate research, solar irradiance monitoring, and irradiance nowcasting for photovoltaic plants. Challenge CMS faced the challenge of developing a robust Cloud Detection and All Sky Measurement system with wide temperature and weather range and capabilities for varied harsh environmental conditions. It has to include a high-quality camera, but also a variety of internal and external environment sensors and actors. Solution Focusing on giving precise data for applications ranging from remote sensing to atmospheric study The project, focusing on delivering precise data for applications ranging from remote sensing to atmospheric research, encountered a significant hurdle in the form of the camera's mounting position–facing upward toward the sky. This orientation exposed the system to direct sunlight, snow and ice, demanding unparalleled reliability. The VIVOTEK 360 Fisheye camera, FE9382-EHV-v2, was chosen for its high-quality imaging, reliability, and durability, particularly in extreme conditions. The system All Sky Imager, featuring this VIVOTEK 360 Fisheye camera, emerged as a pivotal component in mitigating the impact of environmental extremes. Automatic Full Sky Imaging: ASI-16 provided a 360° field of sky view, automated and scheduled capturing of high-resolution images, transmission of data and images to one or two SFTP server(s), backup of data to internal memory in case of server/network problems, and video life streams. Environmental Monitoring: Temperature, humidity, and solar irradiance data were captured by high-precision external sensors and are stored in datalogger-like files as well as within the jpg images. Rugged Design: Double shielding, forced ventilation, strong air heating, and a coated quartz glass dome ensured reliable operation in harsh environments. Heating is controlled by external temperature and dew point. Extended Temperature Range: Successfully tested under an extended temperature range of −40°C to +70 °C, with a tolerance of ±3°C. Amongst others, the system is installed on two icebreaker research vessels, one operated by Australia in Antarctic, and one operated by Canada in the Arctic. VADP Integration for Bespoke UI: CMS utilised VIVOTEK Application Development Platform (VADP) to craft a bespoke user interface–a seamless, user-friendly design offering a clean and intuitive experience. References: Solution is embraced by Institutes, Universities, Scientific Research, and the Energy Sector, including maritime and Icebreaker Deployment. Conclusion The collaborative efforts between CMS Ing. Dr. Schreder GmbH and VIVOTEK have resulted in an innovative Cloud Detection and All Sky Measurement system that effectively addresses the challenges of environmental extremes. This enhanced solution not only ensures reliability in demanding conditions but also contributes significantly to scientific research and environmental monitoring. Gerhard Papst, Head of Development at CMS, is highly impressed and deeply satisfied with the performance of VIVOTEK's cameras. The scale of this collaborative project now spans over 300 sites and continues to expand.
Matsuo Sake Brewery in Arita Town, Saga Prefecture, is one of the historic breweries in Japan. Since its founding by the seventh generation head, Matsuo Sake Brewery has been producing sake in the Arita region, which has been blessed with clear water and abundant nature for over 150 years. Cloud-based security In the pursuit of operational excellence, Matsuo Sake Brewery embarked on a transformation journey on physical security by utilising VIVOTEK’s cloud-based security service - VORTEX. This improvement initiative aims to enhance security measures streamline workflows and maximise operational efficiency, all in pursuit of sustainable improvements for the brewery. Brewery's challenges Before utilising VORTEX, Matsuo Sake Brewery faced some hurdles and hoped to maximise product safety. Security Risks within the Winery: Concerns existed about security risks such as unauthorised access and theft, particularly regarding protecting valuable wine inventory. Measures were needed to prevent external intrusion and unauthorised access. Real-Time monitoring: In numerous instances, remote monitoring and real-time video retrieval prove challenging, if not entirely unattainable. This lack of real-time access significantly hampers the ability to respond to site conditions promptly. Challenges in Proper Resource Utilisation: Insufficient information regarding the proper allocation and utilisation of resources, including personnel and equipment, hindered efficient resource utilisation. Reasons for VORTEX integration VORTEX can provide comprehensive monitoring capabilities with high-definition video and audio feeds, allowing administrators to remotely monitor the operation of the brewery without interruption. The ability to access live and recorded video footage from smartphones empowers managers to monitor operations from anywhere, at any time, facilitating swift decision-making. Leveraging VORTEX's advanced AI features enhances security measures such as intrusion detection and attribute search, while also improving operational efficiency. Benefits of VORTEX By utilising VORTEX, Matsuo Sake Brewery streamlines workflows, reducing operational complexities and enhancing productivity. Real-time insights provided by VORTEX empower administrators to make informed decisions promptly, enabling proactive responses to operational challenges. Optimisation of resource utilisation and streamlined workflows contribute to cost savings, enhancing the brewery's profitability and sustainability. VORTEX's advanced security features, including intrusion detection and real-time alerts, minimise security risks and ensure regulatory compliance. Results and customer feedback The implementation of VORTEX at Matsuo Sake Brewery maximised operational efficiency and optimised workflows. By addressing key challenges and leveraging advanced technology solutions, the brewery enhanced productivity and cost-effectiveness while strengthening security measures. This initiative established a robust foundation for future growth and success in the competitive brewing industry.
Round table discussion
The Internet of Things (IoT) has revolutionised many industries, including physical security. By connecting physical devices to the internet, IoT technology offers significant enhancements to security systems. Benefits include real-time monitoring, remote access, and the utility of new devices such as temperature and humidity sensors. At the same time, IoT devices come with challenges, including greater cybersecurity vulnerability. We asked this week's Expert Panel Roundtable: How is the Internet of Things (IoT) impacting the physical security marketplace?
Migrating to the Cloud can be a cultural shift for some organisations, especially when it comes to physical security systems. Challenges such as concerns about data security and compliance, cost management, and a skills gap can make adopting the Cloud seem onerous. But the benefits are there, aren't they? We asked this week's Expert Panel Roundtable: Will the impact of the Cloud on physical security integrators be net-positive or net-negative?
The economic fallout of the COVID-19 epidemic was felt in supply chain disruptions, higher prices, and shortages of certain goods. The physical security industry was not spared, although the epidemic also presented opportunities for security companies. Changing access control trends triggered by the pandemic are still reverberating throughout the industry, for example. Four years later, the impact of the pandemic is still being felt in the security market, lingering like the symptoms of "long COVID." We asked this week's Expert Panel Roundtable: Four years after the start of the COVID-19 pandemic, what is its lingering impact on the physical security industry?
Products
White papers
Cybersecurity for enterprise: The essential guide to protecting your business
DownloadThe security challenges of data centers
DownloadAccess control system planning phase 2
DownloadHoneywell GARD USB threat report 2024
DownloadAccess control system planning phase 1
DownloadThe truth behind 9 mobile access myths
Download2024 trends in video surveillance
DownloadHow intelligent video is transforming banking and financial institutions
DownloadSecuring data centres: Varied technologies and exacting demands
DownloadBest practices for asset management
DownloadUnderstanding the IT needs of video surveillance
DownloadAI in security solution
DownloadManaging security in the age of boundaryless working
DownloadEffectively branding a multifamily property
DownloadIntegrating control access and security
DownloadVideos
Data Security: Manufacturers & Suppliers
The key to unlocking K12 school safety grants
DownloadCybersecurity for enterprise: The essential guide to protecting your business
DownloadSelecting the right network video recorder (NVR) for any vertical market
DownloadHoneywell GARD USB threat report 2024
Download5 surprising findings from OT vulnerability assessments
Download