Incident Management
Renowned global intelligence and cyber security consultancy - S-RM has promoted Casey O’Brien to Global Head of Incident Response (IR). Casey’s appointment reflects the firm’s continued investment in its international cyber practice and its ability to support clients worldwide, around the clock. Casey will work closely with Joani Green, Chief Information Officer, to deepen collaboration between regional teams, streamline ways of working, and enhance the firm’s use...
Artificial Intelligence Technology Solutions, Inc., a pioneer in AI-driven security and productivity solutions, along with its wholly owned subsidiaries, Robotic Assistance Devices, Inc. (RAD), and Robotic Assistance Devices Group (RAD-G), announced that CEO/CTO and founder Steve Reinharz will present at ISC East in New York City Wednesday afternoon on the rise of agentic AI in real time security. His session will feature SARA™ (Speaking Autonomous Responsive Agent), the Company...
An Open Integration Platform is a software that integrates several unconnected security systems, controlling them via a unified user adapter. This enables the user to detect occuring situations and to resolve them in an optimal way. Such a solution is often also called a PSIM or security and building management system. WinGuard is an Open Integration Platform reaching far beyond the common scope, offering the possibility for cross-domain integration of the complete security, building and commun...
Semperis, a pioneer in identity-driven cyber resilience, announced the release of Ready1 for Identity Crisis Management—which combines its innovative Active Directory Forest Recovery (ADFR), Disaster Recovery for Entra Tenant (DRET), and Identity Forensics and Incident Response (IFIR) services with its expert-built enterprise crisis management system, Ready1—to help organisations quickly return to normal business operations after identity-related cyberattacks. The ground-breaking sol...
Radiflow, a pioneering provider of cybersecurity solutions for industrial automation networks, announced that the company has launched the new Radiflow360, a unified, AI-enhanced OT cybersecurity platform that delivers full visibility, risk management and streamlined incident response for mid-sized industrial enterprises. Radiflow360 now enables mid-sized industrial operators to gain full visibility and control over their OT networks and risks, and is supported by an AI analyst assistant that s...
Kyocera Cyber – a new, specialist business operating from Kyocera UK’s headquarters in Reading – has been launched. Backed by the wider Kyocera family, the boutique brand has invested from the ground up in enterprise-grade architecture to build an ultra-resilient, next-generation managed security operations centre (M-SOC), which will protect customers against new adversaries. Kyocera Cyber focuses on a tailored, comprehensive offering with an emphasis on managed security servi...
News
Trackforce, the globally renowned security workforce management platform, announced the launch of ReportPro AI within its TrackTik platform, an industry-first enhancement to incident reporting designed for guards, supervisors, and compliance teams. By combining real-time language support, instant executive summaries, and transparent audit trails, ReportPro AI enables security teams to save time, improve accuracy, and meet rising client and regulatory expectations. Security operations “Security operations generate thousands of reports every day, but ensuring those reports are consistent, professional, and compliant is a constant challenge,” said Chatura Liyanage, Vice President of Product Management, at Trackforce. Chatura Liyanage adds, “With ReportPro AI, we’re giving guards the ability to create polished reports effortlessly, supervisors the speed to review incidents in seconds, and compliance officers the transparency they need for accountability — ultimately raising the standard of reporting across the industry.” AI-enhanced reports Farnsworth, Vice President at Citadel Security USA, said the new abilities are transforming daily functions Customers are already seeing results. Chad Farnsworth, Vice President of Integrations and Technology at Citadel Security USA, said the new capabilities are transforming daily operations. "The AI-enhanced reports have been a game-changer for both our staff and clients," said Chad Farnsworth, adding "Not only has our reporting quality significantly improved, but our teams can now focus more on addressing customer needs rather than being bogged down by technology to produce subpar reports." He continues, "Our clients have praised the transparency of the new reports, which has boosted their confidence in the services we provide." Smarter reporting for every role ReportPro AI introduces three core capabilities designed to reduce reporting burdens, while improving oversight: Real-Time Report Enhancement – Guards receive AI-powered assistance that transforms informal notes into clear, compliance-ready documentation. The feature is available both in the web portal and mobile app, supporting use in the office or in the field. Report Summary Generation – Supervisors can instantly generate AI-created executive summaries that distil lengthy reports into concise insights. This feature speeds triage, strengthens client communications, and helps operations teams identify issues and trends more efficiently. Report Field Audit Logs – Every AI-assisted modification is logged, with original and enhanced content available for side-by-side comparison. This ensures supervisors can monitor performance, compliance teams can maintain defensible audit trails, and quality control teams can assess AI usage patterns. Built for transparency and trust Every AI capability within ReportPro AI is designed with compliance at its core: Clear Labelling: All AI-enhanced text is marked so users can distinguish human and AI input. Preserved History: Original content remains stored alongside AI modifications for regulatory and client requirements. User Control: Clients opt in to enhancements, supervisors generate summaries on demand, and all AI activity is fully visible. Data Security: Sensitive client data is never used to train AI models, protecting both privacy and trust. Real-time intelligence with full transparency “ReportPro AI is the first of many AI innovations we have planned at Trackforce,” said Chatura Liyanage, adding “By combining real-time intelligence with full transparency, we’re equipping field teams and supervisors to work at peak efficiency while maintaining the highest standards of compliance.” That innovation roadmap is resonating with clients. Evan Nardone, Chief Technology Officer at St. Moritz Security Services Inc., said Trackforce’s approach reflects the future of the industry. Integration of AI within TrackTik “The integration of AI within TrackTik is already delivering measurable efficiencies in workforce management, and its roadmap reflects a strong vision for continued innovation that will enhance scalability and value across our operations,” said Evan Nardone. ReportPro AI will be available to all TrackTik users in early October.
Atos, a global AI-powered technology pioneer, announces that it has been awarded a significant contract under Lot 1 (Technical Operations Services) of the European Commission's CLOUD II Dynamic Purchasing System (DPS 2) Mini-Competition 17 (MC17) for Cybersecurity. Valued at a maximum of €326 million, this contract marks one of the most important cybersecurity service agreements within Europe. As the first in the “cascade” mechanism, Atos will prioritise the delivery of essential cybersecurity services to European Union institutions, agencies, and bodies. CLOUD II DPS II MC17 contract This initiative is managed by the European Commission's Directorate-General for Digital Services The “CLOUD II DPS II MC17” contract is designed to procure professional services related to cloud and information systems, with a keen focus on operational support, advisory guidance, and capability development in cybersecurity. This initiative is managed by the European Commission's Directorate-General for Digital Services (DG DIGIT). "This award is a strong recognition of Atos’ trusted partnership with the European Commission and our long-standing track record of delivering secure, resilient digital services across Europe," stated Punit Sehgal, Head of Atos Belux, Netherlands & Nordics, adding "It underscores institutions’ confidence in Atos to safeguard their critical operations and to deliver innovation at scale." Cybersecurity services David Dewulf, Cybersecurity Director at Atos Belux, Netherlands & Nordics, said, "This new contract is a continuation of the cybersecurity services we have been proudly delivering to European Institutions for many years." He adds, "Being entrusted once again as lead partner in this highly strategic area reflects both the great responsibility we carry and the extended capabilities we have to strengthen Europe’s cyber resilience at a time of unprecedented challenges." Lead contractor The framework contract, which may extend for up to 48 months, specifically encompasses Technical Operations Services, including: Incident Response and Digital Forensics Threat Intelligence and Monitoring Malware Analysis Offensive Security (Vulnerability Management, Penetration Testing, Red Team) Atos will serve as the lead contractor, in collaboration with Leonardo as a consortium partner. This collaboration will provide the European Commission with a unique blend of Atos’ recognised innovations in cybersecurity and Leonardo’s complementary expertise, ensuring the highest standards of resilience and operational excellence.
Allied Universal®, the world’s pioneering security and facility services company, announced that its Unified Command Centre Solution has been named a runner up for the 2025 Project of the Year by Security Distributing and Marketing (SDM) magazine. SDM’s annual Project of the Year Award recognises exceptional commercial security projects in North America and the dealers and integrators behind them. Integrates real-time video analytics The solution optimises logistics, enhances decision-making, and enables threat detection and response The Unified Command Centre Solution is a rapidly deployable security hub that integrates real-time video analytics, seamless communication, and intelligent incident management. The solution optimises logistics, enhances decision-making, and enables swift threat detection and response, delivering comprehensive situational awareness and adaptable security. Advancing technology innovation “We are honoured to receive recognition for our Unified Command Centre Solution, which reflects our continued leadership and commitment to advancing technology innovation in the security industry,” said Steve Jones, global chairman and CEO of Allied Universal. “The acknowledgment underscores our focus on delivering intelligent, integrated solutions that enhance operational efficiency and informed decision-making while upholding the highest standards of safety and security for our clients.” SDM Project of the Year Award submissions are reviewed and recipients are selected by SDM’s editorial staff based on the project demonstrating one of these criteria: extraordinary resources; unique applications or integrations; interesting customer story; or an intriguing challenge solved by the dealer or integrator.
Integrity360, one of Europe and EMEA’s pioneering cyber security specialists, has been named as a Representative Vendor in the 2025 Gartner Market Guide for Digital Forensics and Incident Response (DFIR). The Gartner Market Guide provides security and risk management pioneers with insights to understand the DFIR market, evaluate trends, refine requirements and identify market players. Integrity360 is listed among 40 vendors globally which, according to Gartner, best represent the DFIR market and attract the most client interest through Gartner.com searches and inquiries. Cyber insurance policies and regulations DFIR retainers are increasingly viewed as a cornerstone of cyber resilience, providing organisations with rapid access to expert teams who can investigate malicious activity, conduct forensic analysis, support recovery and perform post-incident reviews. According to Gartner, these retainers are now often required by cyber insurance policies and certain regulations, such as the Digital Operational Resilience Act (DORA). Rising security incidents The guide also highlights that the DFIR market persists to grow in response to rising security incidents The guide also highlights that the DFIR market continues to grow in response to rising security incidents, with AI integration significantly reducing investigation times and improving incident context. It emphasises the value of providers offering both reactive services - such as breach investigation and ransomware negotiation - and proactive measures including tabletop exercises, penetration testing and readiness assessments. DFIR services “We are pleased to be recognised by Gartner as a Representative Vendor in the DFIR market,” said Richard Ford, CTO at Integrity360. He adds, “As organisations face tighter regulatory mandates and increasingly sophisticated threats, we’re proud to offer DFIR services, which are designed to minimise impact, support recovery and strengthen defences against future threats.” Forensic investigation Integrity360’s DFIR services give clients 24/7 access to incident response specialists across multiple regions, enabling rapid deployment when needed. These services include forensic investigation, malware analysis and breach containment to help strengthen long-term resilience.
360 Privacy announced a partnership with Ontic to integrate industry-pioneering digital executive protection capabilities directly into the Ontic Platform. This integration gives security teams a single, connected system to proactively detect, assess, and act on threats across the full spectrum of risk. Through this alliance, Ontic enhances its offering for executive protection teams by embedding 360 Privacy’s proven personal data removal and monitoring technologies—without requiring a second platform or additional system to manage. Executive security “Ontic has emerged as the industry standard for threat monitoring and executive security,” said Ben Barrontine, Vice President of Partnerships at 360 Privacy. “We’re excited to combine our digital privacy expertise with their proven platform and end-to-end services to deliver unmatched protection for high-risk individuals around the world.” “360 Privacy is the clear leader in eliminating personal data exposure online,” said Harris Maidenbaum, Director of Partnership Development at Ontic. “Their proven digital privacy technology strengthens our platform, giving executive protection teams a unified view of digital and physical risk—something that’s long been missing in the market.” Threat management 360 Privacy’s technology strengthens Ontic’s ability to unify threat management by enabling security teams to detect compromised personal information, control digital footprints, and minimise risk to high-profile individuals—all within Ontic’s centralised workflows. Capabilities now embedded into the Ontic Platform include: 360 Delete: Removes PII from hundreds of data broker websites and continuously monitors and deletes to control data repopulation, keeping personal information out of the hands of physical and digital threat actors. 360 Monitor: Scans and monitors the Deep Web and Dark Web to identify compromised PII, including sensitive information such as social security numbers, login credentials, and credit card information, thereby devaluing this data and making it difficult for threat actors to steal assets or identities. Ontic connected intelligence platform The Ontic Connected Intelligence Platform is purpose-built to help security teams shift from siloed, reactive operations to proactive programs that surface meaningful insights, improve response, and support smarter business decisions. Ontic aggregates open-source intelligence (OSINT) and external threat signals alongside internal data from systems like HR, legal, IT, and facilities. With configurable workflows, automated reporting, and robust integrations, the platform eliminates manual processes and delivers a common operating picture across the entire risk landscape—from executive protection and workplace violence to insider threats and travel risk.
Rapid7, Inc., a pioneer in threat detection and exposure management, released its 2025 Access Brokers Report, a new research analysis of illicit underground marketplaces where cybercriminals buy and sell access to corporate networks. Drawing on six months of threat intelligence from dark web forums Exploit, XSS, and BreachForums, the report uncovers new insights into how initial access to compromised businesses is being sold — often for less than $1,000 — and the steps defenders can take to disrupt the process in its earliest stages. Rapid7’s threat intelligence Rapid7’s threat intelligence students analysed 100 of posts by IABs offering access to compromised networks Rapid7’s threat intelligence researchers analysed hundreds of posts by Initial Access Brokers (IABs) offering access to compromised networks across a range of industries and regions. Their findings paint a stark picture: “initial” access doesn’t necessarily equate to minimal; in many cases, this access represents a deep compromise. Threat actor logs “This report shows that initial access brokers aren’t intent upon finding a single way into an organization’s network and then quickly exiting — they’re making attempts to explore the networks they’ve infiltrated. And they’re often succeeding,” said Raj Samani, SVP and chief scientist at Rapid7. “In doing so, the IAB can offer buyers admin privileges, multiple access types, or both. By the time a threat actor logs in using the access and privileged credentials bought from a broker, a lot of the heavy lifting has already been done for them. Therefore, it’s not about if you’re exposed, but whether you can respond before the intrusion escalates.” Key report findings The vast majority of access broker sales (71.4%) offer more than just a specific access vector; they also include a level of privilege — and in nearly 10% of those sales, it’s a bundle with multiple initial access vectors and/or privileges. The average sale price hovered just over $2,700, with nearly 40% of offerings priced between $500–$1,000. VPN, Domain User, and RDP were the most common access types — the very same weak points seen in Rapid7’s incident response investigations. Integration of Intelligence Hub The Access Brokers Report arrives as security teams grapple with alert fatigue, limited resources, and evolving attacker The Access Brokers Report arrives as security teams grapple with alert fatigue, limited resources, and evolving attacker tradecraft. It supports Rapid7’s growing body of evidence that exposure management and threat detection must be operationalised together, not handled in isolation. This vision underpins the company’s recent launch of Incident Command, an AI-native SIEM that unifies prevention, detection, intelligence, and response within a single workflow. With its seamless integration of Intelligence Hub, Incident Command gives security teams direct access to the same curated threat insights that informed this report — now embedded into detection logic and investigation workflows. Concrete steps In addition to in-depth forum analysis, the report outlines concrete steps organisations can take to harden defences and reduce attacker dwell time: Enforce MFA — especially on VPN, RDP, and user accounts that access critical infrastructure. Invest in threat-informed detection and response — including unified platforms that correlate access signals with suspicious activity. Run regular red team exercises to identify exposure paths like abandoned accounts, default credentials, and externally accessible RDP services. Reinforces Rapid7’s position This research reinforces Rapid7’s position that threat detection and exposure management must be fast, unified, and context-rich. As highlighted in the company’s recognition in the 2025 Frost Radar for MDR, operationalising threat intelligence, asset context, and automation isn’t just a best practice — it’s a requirement. Initial Access Brokers and the forums they use have long been analysed by threat intelligence teams. While law enforcement activity and takedowns continue, access brokers remain a persistent threat to organisations around the world.


Expert commentary
In the old days, hopping onto the platform from a not-yet-stopped train was a commonplace stunt for daily commuters in a hurry. It was a thrilling, but dangerous part of railway travel. Today, rail travel is generally much safer, but thrill and fame seekers are finding new, creative ways to use the railway to court notoriety online. Earlier this month, a young man filmed himself laying on the tracks and allowing a train to pass over him. In another instance, two people were seen misusing a level crossing to get an 'Instagram worthy' picture. Meanwhile, the media has recently reported stories from Austria to Australia of people (and in some cases children) being seriously hurt or killed whilst attempting to train surf. Safety and security of the railway Safety and security have always been a top priority for railways and supporting agencies For rail companies, such incidents cause great distress and bring often unjust headlines that question the level of safety and security of the railway. Then, of course, there is the impact on the timetable when incidents cause significant delays. The ramifications of just one incident can be significant, as illustrated by a case in February when a track trespasser caused 16 trains to be cancelled and a further 54 to be partially cancelled at the cost of approximately 600,000 euros. Despite the negative stories, safety and security have always been a top priority for railways and supporting agencies. The British Transport Police, for example, traces its origin back to 1830 when the force was established following the death of a member of Parliament, who was struck by a passing train after alighting onto the track of the newly opened Liverpool and Manchester Railway. Modern surveillance Today, trains, platforms, yards, level crossings and sections of track are monitored by some of the very latest technology hardware and software, from high-definition cameras with built-in advanced video analytics capabilities to PSIM (physical security information management) systems that can be used to orchestrate a response to anything from a trespasser on the line to a major derailment. Even with all these systems, the sheer scale of rail networks means it is simply not possible to always have eyes everywhere. True of video analytics If a driver spots someone or something on the line and immediately applies the emergency brake What’s more, whilst the technology continues to make huge leaps forward, affordability and usability can limit their effectiveness. This has been especially true of video analytics and object detection, where distinguishing between a human trespasser or an animal can be challenging, especially in low light (a particular issue with passenger and freight trains running round the clock). With trains moving at a high speed, early detection is everything. If a driver spots someone or something on the line and immediately applies the emergency brake, it could take the train as much as one mile to come to a stop. LiDAR to the rescue So, what can be done to improve response times for drivers and other stakeholders? One recommendation is to focus on key sections of the rail network that provide easier access for trespassers, such as stations, platforms, tunnels, bridges and level crossings, where more than a quarter of all significant accidents occur on EU railways. This is already standard operating procedure for most rail companies. However, a growing number are going beyond the 'standard' safety and security measures, with the introduction of high-tech solutions such as 3D LiDAR (Light Detection and Ranging) sensors. This technology is already familiar to the rail industry. It has been used for some time in applications ranging from surveying environments in preparation for building high-speed rail networks to mapping railway tracks and surrounding infrastructure for ongoing maintenance works. Management of virtual perimeters LiDAR enables the creation and management of virtual perimeters and/or safe zones In the context of safety and security on the railway, LiDAR enables the creation and management of virtual perimeters and/or safe zones with pinpoint accuracy. A good example would be at level crossings where a high volume of vehicle and pedestrian traffic crosses the track when the barrier is raised, but it must be clear for rolling stock to pass safely. LiDAR sensors can be programmed to automatically switch on minutes before a train is scheduled to pass through the crossing and turned off after it has cleared the area. During this time, any movement detected with this ‘live zone’ would create an alert in the control room. Further layer of protection The addition of cameras would provide a real-time feed of the situation, enabling the control room operator to act. That could involve sending a message via a public address system to clear the area, alerting the approaching train driver to take appropriate action, and alerting emergency services and maintenance teams if there is a vehicle, animal or other blockage on the track. The investment many rail operators have made in PSIM and CAD (computer-aided dispatch) can add a further layer of protection. These systems provide the operator not only with guidance regarding the next best action but also automatically triggered responses to orchestrate the entire incident management process. Protecting critical infrastructure All of these pieces of rail infrastructure and the joint network stand to benefit from the use of LiDAR Level crossings are a good example of environments where it is not viable to have round-the-clock live surveillance, but monitoring is essential at key times. It is a similar case for stations late at night, bridges and depots, all of which are susceptible to acts of trespass, vandalism (particularly graffiti) and theft. All of these pieces of rail infrastructure and the collective network stand to benefit from the use of LiDAR, as incidents are prevented or their impact mitigated in terms of the effect on the timetable, negative publicity, fines and the costs of investigations. Latest Report on Railway Safety and Interoperability The latest Report on Railway Safety and Interoperability in the EU stated that “European railways remain among the safest in the world, with major accidents becoming rare and significant accidents decreasing in the last two decades.” This good news is heightened by the fact that more people than ever in Europe are choosing to let the ‘train take the strain’, with passenger numbers reaching record levels. However, whilst passengers may no longer be swinging open train doors and jumping from moving carriages just to get to work a few seconds earlier, the risks on the railways have evolved. With more rolling stock travelling at higher speeds on lines old and new, there is a need to revisit the traditional methods of safeguarding areas on the network, to deter, detect and protect against those seeking fame, infamy or gain.
The European Union’s GDPR (General Data Protection Regulation) framework represents some of the toughest and most secure privacy laws in the world. Their creation signaled the EU’s dedication to individual privacy rights and generated new standards and requirements for an organisation inside or outside of the EU wanting to do business in the region. This privacy stance raises an interesting question: to what extent (if any) will France be utilising AI-assisted security and biometrics - at the upcoming Paris Summer Olympic Games? AI-assisted security systems As France prepares to host this global event, certain AI-assisted security systems like algorithmic video monitoring have been tested and are planned to be in use. The country also passed a law with a legal framework for addressing provisions of hosting the Games in their country, Law No. 2023-380. These technologies will support the police and security efforts to detect sudden crowd movements, irregular vehicle, and pedestrian movements, abandoned objects, people lying on the ground, and more, any of which could indicate an attack. Local connectivity One recent French poll found that an overwhelming number of respondents support the use of smart cameras Such technologies, which can be connected directly to localised command centers and police departments, provide an opportunity to prevent deadly incidents like the bombing at the 1996 Summer Olympics in Atlanta, GA. There are signs that citizens of the EU are becoming more receptive to such measures, with one recent French poll finding that an overwhelming number of respondents (89 percent) support the use of smart cameras in stadiums for this purpose. Biometric technology The general public and private use of biometric technology (face matching, face liveness, and other biometric modalities), on the other hand, continues to run into challenges with adoption in this privacy-focused region. For the most part, laws ban facial recognition, permitting its use only once someone has been convicted or is suspected of having committed a serious crime. Limitations of video surveillance Limiting the utility of biometrics to only video surveillance for an event of the Paris Olympics’ magnitude is not the best approach. The ability to quickly identify or de-identify possible suspects from regular attendees greatly strengthens the activities of the police and helps protect the rights of regular attendees. Consider the example of New York City detectives using facial recognition to identify a man who, in 2019, left a pair of potential bombs in the Fulton Street subway station. Benefits of facial recognition technology Many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy With facial recognition technology, it took only one hour to identify the suspect - a process that previously would have taken several hours or even days, leaving the possibility of further damage unresolved. Citing yet another example, many believe that the use of facial recognition could have expedited and solved the Boston Marathon bombing tragedy much sooner and more efficiently, aiding investigators who reportedly had to sift through 120,000 photos and nearly 13,000 videos before identifying the perpetrator. Need for real-time video With an estimated 16 million visitors expected to descend upon France for the Games - and an environment that is harder to protect from bad actors - is limiting the use of biometrics to video surveillance the most effective? In our minds, in certain high-urgency cases, such as tracking kidnapping cases or possible terrorism activity, it should be permissible for facial recognition to be applied to recorded video in real-time and without delay. Public safety Beyond this obvious good that biometrics can bring from a public safety perspective, there are other ways that biometrics can be woven into the fabric of the Summer Olympics to support a faster, more enjoyable experience for all. Consider queue management. In a few weeks, an estimated 2.3 to 3.1 million ticket holders will form lines to access Olympic events. Fingerprint scanning technology People could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket If fingerprints were captured at the point of ticket purchase and fingerprint scanning technologies made available on-site, people could pass through lines in mere fractions of a second, versus having to fumble for a paper ticket that may be torn or damaged, or an e-ticket on a phone with a dead battery. This would speed up the processing of queues tremendously. Olympics-focused gambling activity Another area where biometrics can be beneficial is in Olympics-focused gambling activity, which is expected to gain steam as the Games get underway. Biometrics can be used to match facial images with legal documentation for age verification, and then combined with geofencing to ensure gambling participants are of legal age, depending on where they are physically based. Biometrics also makes it possible to identify, beyond the shadow of a doubt, all of the activities of particular individuals, which can help track nefarious activities like money laundering. Evolution of privacy and security We believe biometrics can be a force for major good in our society and around various facets of the upcoming Paris Olympics, most notably public safety. It will be interesting to watch both the 2024 Summer Olympics and the ongoing evolution of privacy and security laws and practices in France and the European Union.
With the rise of organised retail crime (ORC) making headlines, retailers are grappling with the dual challenge of safeguarding both their staff and store assets, while addressing the economic pressures that impact profitability and consumer demand. RFID technology The key lies in identifying effective solutions to counter the current surge in ORC, enabling retailers to secure their vulnerable staff and protect inventory for paying customers. Technology plays a crucial role in supporting brands on this mission, with RFID technology continuing to be a valuable solution. It aids retailers in gaining better control over retail crime, leveraging inventory data. The ongoing surge in retail crime Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector Seen as a global issue, the British Retail Consortium recently reported that incidents of theft have increased by 27% across 10 of the largest cities in the UK, with some cities reporting up to a 68% increase. In the US, retailer Target reported an inventory loss of $500 million for 2023, amounting to a 100-basis point hit to gross margins in 2023. The current surge in theft is not attributed to a singular cause. Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector. Lack of preventive measures A significant contributing factor is the lack of sufficient preventive measures by law enforcement, which in some cases has led to a rise in more severe incidents. However, the implementation of technologies like RFID allows retailers to efficiently build cases against criminals, putting them in a stronger position when it comes to reporting thefts. Not all retail crimes are orchestrated by large entities or executed through sophisticated methods. Some stores have seen a reduction in staff numbers and, as a result, there are fewer people on the shop floor, making it easier for shoplifters to carry out their activities unnoticed. The true impact of retail crime Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey The impact of retail crime on businesses extends beyond financial and economic consequences; it has also led to a surge in violence against retail staff, an ongoing trend elevated by the pandemic. Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey conducted by the National Retail Federation. This escalation in violence not only results in immediate repercussions but also contributes to long-term mental health issues for staff, fostering an atmosphere of insecurity that has compelled some retailers to close their physical stores. Policy implementation Given the challenge of staff retention across various businesses, addressing retail crime becomes an even more urgent matter. Additionally, retailers are wary of their employees facing potential danger and the prospect of legal action. Consequently, many have implemented policies prohibiting employees from actively intervening when confronted with shoplifters. Privacy concerns with facial recognition Retail crime also affects customers, as businesses seek to offset losses by raising prices Retail crime also affects customers, as businesses seek to offset losses by raising prices, further burdening financially strained consumers. The presence of visible security systems not only makes stores more hostile but also diminishes the overall customer experience. While facial recognition technology is considered a potential solution, privacy concerns have emerged in its various applications. Today’s problems, yesterday’s solutions Retailers are resorting to historic measures such as steel cables, physical monitoring, or plastic screens to resolve customer issues. However, the reality is that these solutions are unfit for solving the problem, causing friction for both customers and staff. Digital solutions The newer approach involves equipping retail staff with body cams and providing new training The newer approach involves equipping retail staff with body cams and providing new training to deter shoplifters. Some stores are even offering the police discounted food and beverages to encourage their presence. The responsibility lies with management teams to seek effective solutions. In an era dominated by data and technology, retailers must shift their focus from traditional security methods to digital solutions that align with the challenges of today’s society and modern retail environments. Shrinkage When discussing theft or organised retail crime, retailers commonly use the term "shrinkage," referring to not only theft but the broader issue of lost inventory. Additional drivers of shrinkage include damage, fraud, and internal theft. A significant problem arises as losses are often based on guesswork and estimates rather than concrete numbers. Retailers may lack a comprehensive understanding of their inventories, further increasing the issue of shrinkage. Combating shrinkage Utilising RFID technology notably helps in boosting inventory accuracy Some retailers still struggle with limited knowledge of the whereabouts of items, a challenge heightened by the issue of shrinkage. Utilising RFID technology notably helps in boosting inventory accuracy. This enhancement enables retailers to obtain a clearer understanding of their inventory and the precise locations of items. Comprehensive strategy Changes in the in-store experience have highlighted the relevance of RFID, especially as self-service checkouts encounter double the shrinkage levels compared to traditional checkout stores. To combat retail theft effectively, a comprehensive strategy should involve the integration of labels, deactivation, electronic article surveillance, and data analytics. This combination works synergistically to reduce shrinkage and enhance product availability. Retail data analytics platforms RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors Linking hardware to an underlying data analytics platform empowers retailers to make more informed decisions. Retail data analytics platforms delve into alarms, deactivations, and visitor metrics, providing a deeper understanding of theft patterns. RFID technology drives efficiency by pinpointing frequently stolen items, allowing for the identification of theft patterns. In instances of flash mobs in major metropolitan areas, RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors and incoming customers. Real-time optimisation The crucial question remains whether both shoppers and retailers are prepared to shoulder the responsibility for these additional precautions. Nevertheless, these changes leverage data more effectively, optimising loss prevention strategies almost in real-time rather than relying on biannual inventory counts, therefore transitioning from static to dynamic loss prevention. Holistic approach Striking a balance between security measures and providing a seamless shopping experience is key In a retail environment, not all items require protection, and prioritising the safeguarding of the most frequently stolen and valuable items can significantly impact shrinkage. A holistic approach to retail theft is imperative, considering the entire journey of an item through the retail environment. Striking a balance between security measures and providing a seamless shopping experience is key. Protection without hindrance As stores move towards being checkout-free, retail criminals (or ORC gangs) will be presented with lucrative opportunities to steal, so retailers need to be one step ahead by introducing unobtrusive and effective technology solutions. For example, case building can be improved with item-level data. RFID data offers a more precise means of assessing the value of stolen items compared to relying solely on CCTV. It provides detailed insights into the specific items removed from the store and the timing of these incidents. This proves beneficial in tracking repeat offenders. Increased visibility with a proactive approach The modern retail environment continues to evolve and criminals are never far behind. RFID technology plays a crucial role in minimising shrinkage by enhancing inventory visibility. Moreover, it leverages the power of data to stay ahead, enabling better predictions of retail crime and the formulation of prevention strategies. This proactive approach allows for the implementation of more tailored solutions to alter outcomes positively.
Security beat
ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.
The sale of Carrier’s Global Access Solutions to Honeywell in December amounted to a dramatic finish to a big year in 2023 for mergers and acquisitions (M&A) in the physical security market. In the transaction between two industry giants, Honeywell sought to enhance and strengthen its building automation capabilities with the acquisition of Carrier’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. Honeywell acquires Carrier Access business The acquisition, which includes both hardware and software solutions, will mean a new corporate owner for the LenelS2 brand, a pioneering business for over 25 years in commercial and enterprise access solutions, including well-known offerings Onguard and Netbox. In addition, the acquisition covers the Onity brand of electronic locks, including hospitality access, mobile credentials, and self-storage access; and the Supra brand of cloud-based electronic real estate lockboxes. ADT sells commercial business, which rebrands as Everon ADT Inc. announced the sale of its commercial security, fire, and life safety business unit to GTCR ADT Inc., another industry giant and a trusted brand in smart home and small business security, announced the sale of its commercial security, fire, and life safety business unit to GTCR, a private equity firm, for a purchase price of $1.6 billion. ADT Commercial, a security integrator and premier provider of commercial security, fire, and life safety in the United States, announced that it will move forward as a standalone organisation and rebrand as Everon. Bosch to sell building technologies products Bosch Building Technologies announced in 2023 that it is realigning its Building Technologies division to focus solely on its regional integrator business, with solutions and services for building security, energy efficiency, and building automation. Therefore, Bosch plans to sell most of the Building Technologies division’s product business. At year-end, Bosch was seeking a buyer who would take on all three business units with their associates and locations. This includes the Video, Access and Intrusion, and Communication business units, and affects some 4,300 associates at more than 90 locations worldwide. Building its integrator business earlier in 2023, Bosch announced the acquisition of Paladin Technologies, Inc., headquartered in Vancouver, Canada, a provider of security and life safety solutions and system integration services in North America. Motorola acquires IPVideo, creator of HALO Sensor In another deal emerging late in 2023, Motorola Solutions acquired IPVideo Corp., Bay Shore, N.Y., the creator of the HALO Smart Sensor, an all-in-one intelligent sensor that detects real-time health and safety threats. The powerful capabilities of the HALO sensor extend Motorola’s end-to-end physical security offering by integrating a non-video threat detection product into the safety and security ecosystem. IDIS acquires Costar Technologies Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. Korean video manufacturer IDIS and U.S. company Costar Video Systems had enjoyed a long-term existing ODM (original design manufacturer) relationship, and approximately 60% of Costar Video products were already made by IDIS. Therefore, it made sense when IDIS Co., Ltd. and Costar Technologies Inc. announced an agreement and plan to merge, with IDIS acquiring Costar. Leveraging Costar's established distribution networks and sales channels in the U.S. gives a significant boost to IDIS' growth strategy, which is founded on building long-term relationships with systems integrators. Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. that will benefit from IDIS’ NDAA-compliant and 100% Korean-made technology. SECOM invests in Brivo and Eagle Eye Eagle Eye Networks, a cloud video surveillance company, and Brivo, a provider of cloud-based access control and smart space technologies, announced one of the largest investments to date in cloud physical security in 2023. SECOM CO., LTD, based in Japan and one of the largest security integration companies in the world, has made a primary equity investment of $192 million in the two companies, $100 million in Eagle Eye Networks, and $92 million in Brivo. $100M primary equity investment Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific Eagle Eye Networks, a global pioneer in cloud video surveillance, announced it will use the $100M primary equity investment to expand its suite of AI-powered products, fund geographic expansion, and enhance its enterprise features. Brivo will use the investment to grow sales and marketing, accelerate product development scale support and operational functions, and evaluate strategic acquisitions. Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific, and enhance the smart spaces and AI functionality in the Brivo Access Platform. ACRE buys PremiSys Portfolio ACRE, a security company built on acquisitions, is continuing to broaden its portfolio and serve the expanding needs of its customer base. In 2023, ACRE acquired the PremiSys software and hardware portfolio and assets from IDenticard. PremiSys’ technologies enable organisations to self-manage door access and view integrated video and lockdown facilities. The acquisition extends opportunities for ACRE in healthcare, education, data centers, and senior living facilities. Qognify is a part of Hexagon Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond Qognify, a provider of video (VMS) and enterprise incident management (EIM) solutions announced that it has become a part of Hexagon. Qognify joins the Safety, Infrastructure & Geospatial division of Hexagon, following the completion of its acquisition originally announced on Dec. 19, 2022. Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond to incidents, providing a more robust offering. ASSA ABLOY continues acquisition trend ASSA ABLOY continued to acquire companies in 2023 to strengthen its position in mature markets by adding complementary products and solutions to the core business. Among the companies acquired in 2023 were Ghost Controls, a U.S. supplier of automated residential gate openers, and Securitech Group, a manufacturer of high-security mechanical and electronic door hardware products in the U.S. Door and fencing ASSA ABLOY also acquired Leone Fence, a Canadian manufacturer, distributor, and installer of fencing products for commercial and residential applications, and Lawrence Hardware and Gallery Specialty, providers of commercial hinges, locksets, exit devices, and door hardware accessories in Canada. Another new acquisition is Inovadoor Portas Industriais Ltda, a Brazilian manufacturer of sectional and high-speed doors. Earlier in 2023, ASSA ABLOY completed the acquisition of Spectrum Brands’ Hardware and Home Improvement division and the divestment of Emtek and the Smart Residential business in the U.S. and Canada to Fortune Brands.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
ZeroEyes, the creators of the first AI-based gun detection video analytics platform to earn the full U.S. Department of Homeland Security SAFETY Act Designation, and Singlewire Software, the pioneer in solutions that help keep people safe and informed, announced a new partnership to improve emergency communications in schools. As part of this collaboration, Glassboro Public School District (GPSD) in New Jersey has become the first joint customer to deploy an integrated solution combining ZeroEyes’ AI gun detection with Singlewire’s InformaCast incident management software. Real-time gun detection alerts This integration supports faster, more coordinated emergency responses The integration enables real-time gun detection alerts from ZeroEyes to automatically trigger Singlewire’s InformaCast system, which can instantly distribute customised alerts across a wide range of devices. These include digital signage, PA systems, strobe lights, desk phones and more, all reaching targeted audiences. This integration supports faster, more coordinated emergency responses and ensures critical information reaches those who need it most. Hosting emergency training exercises GPSD is a Pre-K through 12 public school district located in Glassboro, New Jersey, serving approximately 1,950 students and 350 staff members across four schools and two district buildings. With a diverse student population and deep partnerships with neighboring Rowan University, the district offers specialised academics in Performing Arts, STEM, Biomedical Studies, and Business Leadership. The district prioritises safety and mental health, using tools like Senso and Gaggle to flag concerning keywords in emails, as well as hosting emergency training exercises with local law enforcement. ZeroEyes’ capabilities “Our district was immediately impressed upon seeing a demonstration of ZeroEyes’ capabilities, and recognised that integrating it with our Singlewire software would significantly enhance our security system,” said Craig Stephenson, assistant superintendent at GPSD. “The safety of our students and staff is our top priority, and this integration adds a critical new layer of protection.” Based in Madison, Wisconsin, Singlewire Software is a major provider of mass notification systems for schools, healthcare, government, and enterprise organisations. InformaCast platform Its InformaCast platform enables organisations to communicate quickly and effectively during emergencies and daily operations. Singlewire serves more than 2,000 K-12 customers across all 50 states and is widely trusted for its reliability and flexibility in high-stakes environments. “Shootings typically last only five to seven minutes, so every second counts,” said Terry Swanson, president and CEO of Singlewire Software. “By integrating ZeroEyes’ AI-based detection with our mass notification platform, we help schools take fast, decisive action. Our goal is to keep people safe and informed everywhere, every time, and this partnership strengthens that mission.” AI gun detection AI gun detection and intelligent situational awareness software layers onto existing digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to first responders and school staff as quickly as 3 to 5 seconds from detection. Integration with Singlewire “This integration with Singlewire is a powerful example of how two technologies can complement each other to enhance school safety,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “While ZeroEyes provides the critical early detection of a potential threat, Singlewire enables that intelligence to be instantly delivered across a wide range of devices and formats.” “It’s a mutually beneficial partnership that simplifies emergency response and helps protect lives. We’re proud to see this technology in action with Glassboro Public Schools and look forward to bringing it to more districts in the future.”
iCard, a pioneering European e-money institution, has successfully upgraded its customer checks with Regula’s advanced biometric and document verification technologies. By integrating Regula Face SDK and Regula Document Reader SDK with its KYC (Know Your Customer) and risk assessment systems, iCard has moved to speedy, automated verification with improved fraud detection, and enhanced the overall experience for customers in 30+ countries. Implementing Regula’s solutions As a licenced fintech organisation, iCard must comply with strict European KYC regulations while maintaining a robust risk assessment system alongside low-effort customer experience. iCard complies with strict European KYC rules while keeping a robust risk review system Prior to implementing Regula’s solutions, manual verification processes led to inefficiencies, longer wait times, increased fraud, and potential friction for users. Customers often had to re-upload photos or wait for manual reviews, causing delays—especially outside business hours. Additionally, iCard needed a more comprehensive document verification system that was capable of recognising a broader range of ID types. The Regula solution: Fast and fraud-free identity verification To modernise and automate its verification process, iCard selected Regula’s complete solution for document and biometric verification for its industry-leading accuracy, ease of integration, and ability to meet the company’s specific requirements. Regula Face SDK: Integrated into the iCard Digital Wallet app (Android and iOS), it provides fast and reliable biometric verification when a user logs in or performs a money transaction. The solution conducts instant liveness detection and face matching, preventing fraud attempts, including presentation attacks, deepfakes, or injected videos. Regula Document Reader SDK: Deployed in iCard’s back-office system, it automatically authenticates ID cards, passports, and residence permits, including previously unsupported paper-based IDs. Regula’s solution reads and authenticates data from multiple document zones, including MRZs (machine-readable zones), RFID chips, and barcodes, and cross-validates the information to detect any inconsistencies that may indicate fraud. Tangible business benefits The project was completed in just one month, and the impact has been immediate: Instant identity verification: Customers can now authenticate their identity in under a minute. Reduced operational costs: Automated verification processes have minimised manual reviews. Enhanced fraud prevention: Advanced biometric and document verification strengthen security measures. Increased conversion rates: Faster verification leads to a smoother onboarding experience and reduced drop-off rates. Fast and secure identity verification “Implementing Regula Face SDK and Regula Document Reader SDK has optimised our internal processes while ensuring a seamless experience for iCard Digital Wallet customers." "The integration was completed in a short period, resulting in fast and secure identity verification, improved operational efficiency, and reduced fraud risks—all while boosting customer satisfaction,” says Gabriela Anastasova, Chief Product Officer at iCard. Balancing security and user convenience “In today’s fintech landscape, balancing security and user convenience is critical. Customers expect seamless access, while businesses must comply with strict regulations and defend against sophisticated fraud. We are proud to support iCard in finding that perfect balance." "Our solutions ensure that every identity check is robust, automated, and frictionless, allowing fintech innovators like iCard to scale securely and efficiently,” comments Ihar Kliashchou, Chief Technology Officer at Regula.
The space-saving yet full-function video spectral comparator Regula 4306 has been deployed at Wattay International Airport in Vientiane, the Lao People’s Democratic Republic, to strengthen the country’s border security. This initiative aims to combat transnational crimes, including human trafficking, smuggling, and irregular migration. Forged identity documents Lao People’s Democratic Republic faces growing challenges in identifying forged identity documents Like many countries, the Lao People’s Democratic Republic faces growing challenges in identifying forged identity documents used by criminals and irregular migrants. Until recently, document verification at border checkpoints relied heavily on manual inspection, which was time-consuming, prone to errors, and less effective against increasingly sophisticated forgery techniques. Adopting a forensic solution In collaboration with International Organisation for Migration (IOM), the Lao immigration authorities began modernising their approach by adopting a forensic solution to strengthen document authentication and border security. In partnership with IOM in the Lao People’s Democratic Republic and the Australian Department of Home Affairs, the Lao immigration authorities deployed the Regula 4306 video spectral comparator at the country’s major airport in Vientiane. This step equipped border officials with advanced forensic tools for in-depth document authentication, and significantly automated the whole process. Array of features in the Regula 4306 With an array of features in the Regula 4306, ID proof at the Lao border earned much precision With a vast array of features in the Regula 4306, ID verification at the Lao border achieved much-needed high precision. For instance, the device’s high-resolution 8 MP camera with 60x optical zoom captures document images at up to 18,900 ppi and enables officials to analyse even the finest details, including printing techniques. Hyperspectral imaging module Additionally, with over 40 types of light sources and 18 light filters, the Regula 4306 allows authorities at the second line of border control to examine the most intricate document security features, such as holograms, watermarks, microprinting, and optically variable elements, ensuring a more reliable fraud detection process. Apart from that, 3D visualisation helps analyse a document’s surface relief and intersecting lines, and the hyperspectral imaging module enables forensic experts to detect document alterations, differentiate ink properties, or recover faded text. Regula Forensic Studio cross-platform software Regula 4306 is controlled via Regula Forensic Studio (RFS) cross-platform software Regula 4306 is controlled via Regula Forensic Studio (RFS) cross-platform software. With RFS, an expert can perform a wide range of examinations, conduct precise measurements and comparisons, process images in various modes, and generate comprehensive examination reports without losing a single detail. Its powerful tools and intuitive interface ensure accuracy and reliability, enabling thorough and efficient forensic investigations. Regula’s identity document template database Integrated with Regula Document Reader SDK, RFS enables comprehensive, automated document checks, eliminating the need for additional equipment or software. Regula Document Reader SDK can instantly recognise and validate IDs’ machine-readable zones (MRZs), RFID chips, barcodes, and invisible personal information (IPI), significantly reducing manual workload and minimising human error. Also, as it is backed up by Regula’s identity document template database (the most comprehensive in the world), this software is able to verify a wide range of IDs from 251 countries and territories, even the rarest ones. Adoption of Regula 4306 Regula experts conducted specialised training sessions for the Lao immigration officials To ensure seamless adoption of Regula 4306 at Wattay International Airport, Regula experts conducted specialised training sessions for the Lao immigration officials. This ensured that they had hands-on experience and were fully equipped to handle advanced document verification. “Integrating Regula’s devices into the Lao border management operations is a vital step toward combating serious crimes such as human trafficking and irregular migration. This technology enables detection of fraudulent documents with higher accuracy, eliminating human errors,” says Shareen Tuladhar, Chief of Mission, IOM in the Lao People’s Democratic Republic. Lao immigration authorities “Border crossings are the frontline of many serious crimes, making border security crucial to the country's overall safety. We are honoured to contribute to strengthening Lao border security." "By equipping the Lao immigration authorities with our top-selling video spectral comparator, the Regula 4306, we are providing them with advanced forensic tools to precisely detect even the most sophisticated document forgeries and stop criminals before they can cause harm,” comments Alex Lewanowicz, Director of Hardware Engineering at Regula.
There are well over 1,200 road tunnels in Norway. Camera-based incident detection is the preferred way to keep these tunnels safe and support tunnel operators in organising a fast incident response. Camera-based detection Gradually introduced since the nineties, camera-based detection is well established. Both visual and thermal imaging cameras have proven to be a fail-proof solution for 24/7 automatic incident detection inside tunnels. With the latest camera technology upgrade of the Damsgård Tunnel in Bergen, Norway is premiering AI-enhanced dual-vision cameras as a new evolution in incident detection. Damsgård Tunnel technology upgrade In 2024, the tunnel will undergo a comprehensive technology upgrade, with the replacement The Damsgård Tunnel is part of Norwegian National Road 555, which runs from Fjell to the city center of Bergen. The road tunnel opened in 1992 and has two tubes of around 2.3 kilometers in length, each carrying two lanes of traffic through the Damsgårdsfjellet mountain.In 2024, the tunnel will undergo a comprehensive technology upgrade, with the replacement of ventilation systems, lighting, drainage, and camera technology. AI-enhanced dual-vision cameras Unique to this project is that, for the first time in Norway, AI-enhanced dual-vision cameras will be used. The traffic cameras from sensor specialist FLIR combine thermal and visual imaging technology in a ruggedised housing and rely on advanced deep learning algorithms that enable the camera to detect stopped vehicles, wrong-way drivers, queues, crossing pedestrians, and even smoke and fires in their early stages. Approximately 80 FLIR cameras are scheduled for installation in the second half of the year. The history of tunnel incident detection in Norway The Damsgård tunnel upgrade is another milestone in Norway’s long-standing efforts to secure the country’s vast number of tunnels. Due to Norway’s complex landscape, with fjords, mountains, and islands, road tunnels have always been a way to solve the region’s unique transportation challenges. Norway has embraced the use of automatic incident detection in its road tunnels ever since the technology came into being, with FLIR setting the pace of this evolution since the beginning. In 1995, FLIR cameras were already used in the 1,500-meter-long Ekeberg Tunnel near Oslo. FLIR automatic incident detection system In 2004, a European directive on road tunnel safety prompted the roll-out of incident detection systems In August 1996, when a bus stopped and caught fire in that tunnel, the FLIR automatic incident detection system generated an alert to the tunnel operators, enabling them to close the tunnel entries and exits and activate warnings to oncoming motorists. In 2004, a European directive on road tunnel safety prompted the roll-out of incident detection systems in tunnels continent-wide and since then the technology evolution has not stopped. Visual and thermal incident detection Initially, visual CCTV cameras were used to detect incidents. The technology enabled first response teams to be deployed minutes, even seconds after an incident or an irregularity (a fallen object, a pedestrian, a car slowing down) was detected. About ten years ago, FLIR introduced thermal incident detection cameras in tunnels. These cameras are established as critical assets that guarantee operators' accurate detection throughout the tunnel infrastructure. 24/7 traffic detection The use of thermal imaging cameras has especially proven valuable for tunnel entrances and exits. There, shadows or direct sunlight can obstruct the view of visible-light cameras and therefore disturb traffic detection. Because thermal cameras detect heat, not light, they have no issues with these phenomena. As a result, thermal cameras can detect traffic 24/7 and in all weather conditions. Fire detection FLIR thermal cameras can also spot fires at the stage of ignition, making them the fastest One of the biggest advantages of thermal cameras in the field of tunnel safety is that they can effectively see through smoke. This makes them the ideal technology for tunnel safety operators or emergency response teams to find their way through a smoke-filled tunnel or for incident detection systems to spot issues in time. FLIR thermal cameras can also spot fires at the stage of ignition, making them the fastest and most reliable technology for fire detection inside road tunnels. The role of dual-vision cameras Both visual and thermal cameras have their merits. A visual camera may provide operators with more detail to assess the nature of an incident, while thermal cameras have proven to be unbeatable in detecting incidents in complete darkness and challenging weather conditions. Currently, both detection technologies can be combined into one system, hereby offering operators a more comprehensive view of the environment and improved accuracy compared to single-sensor systems. FLIR’s TrafiBot Dual AI camera is an example of such a combined system. ITS-Series Dual AID cameras In 2018, FLIR’s ITS-Series Dual AID cameras were installed at the entrance and exit of the Lyderhorn Tunnel near Bergen. In 2021, technology integrator Trafsys also installed 332 of FLIR’s dual-vision cameras in the Hundvåg and Eiganes tunnels, which are part of the extensive Ryfast project. The cameras’ fire detection functionality proved effective when a car fire occurred in the Hundvåg tunnel in July 2020; the FLIR ITS dual thermal AID camera detected the fire within 7 seconds of visible flames, following an initial alert for a stopped vehicle and pedestrians. Artificial Intelligence in incident detection AI algorithms embedded in the FLIR camera analyse captured images in real-time and full-resolution FLIR’s TrafiBot Dual AI, installed in the above-mentioned Damsgård Tunnel announces a new wave of incident detection cameras. The camera also combines a visual and a thermal camera in one unit, but what makes it stand out is the use of artificial intelligence and deep learning. AI algorithms embedded in the FLIR camera analyse captured images in real-time and full resolution. This latest addition to FLIR’s portfolio of AI cameras is setting a new standard for automatic incident detection in tunnels, generating extremely accurate traffic data, incident detection information, and live track data. Video image analysation Of course, analytics on traffic cameras are not new. Early cameras from decades ago already used some form of AI. So, what’s the difference with this new generation of AI cameras? Much has to do with how detection systems analyse video images. Early generations of smart cameras analysed the variation of gray levels in groups of pixels in successive video frames. Smart predictions When a vehicle enters a detection zone, the pixel value within that zone changes, and detection is activated. AI systems, however, look at the entire camera image and use object detection techniques to analyse the traffic scene. This results in much better presence detection, better classification of traffic users, and the ability to determine position, speed, and direction. These new AI systems can handle more complex traffic situations and they are much better at making smart predictions. Identification and classification of objects Computing speeds have increased, hardware prices dropped, and the exponential growth of data has worked It’s not hard to see where this is coming from. Over the past decades, computing speeds have increased, hardware prices dropped, and the exponential growth of data has worked as fuel for making AI better and more efficient. Instead of rule-based analytics—if x happens, then y—data-based systems are now in the lead. These systems can be trained on large datasets of images and learn how to identify and classify objects in an image. They use this knowledge to make decisions based on new images that they have never seen before. Benefits of AI-based detection systems AI-powered detection systems are much more accurate than their non-AI alternatives. For tunnel operators, this is a big deal. Nothing is a bigger nuisance for control room operators than having to pay attention to continuous unwanted alarms. AI can help filter out unwanted alarms by distinguishing between routine activity, weather phenomena, and actual incidents. High performance As an important aspect of their accuracy, AI-based systems are much more successful in detecting different vehicle classes. Detectors from FLIR will easily distinguish between a car and a van, or between a small and a large truck. It’s even possible to train a system to detect specific objects or incidents. And because cameras are so smart, installers nowadays are more flexible in installing their equipment. Even in less ideal camera positions, the detection performance of AI-based systems is high. Vehicle parameters Based on vehicle parameters such as speed and direction, they can easily see where a car is going FLIR’s AI detectors can also predict vehicle trajectories. Based on vehicle parameters such as speed and direction, they can easily see where a car is going, even if for part of that trajectory the view of that car is occluded by a passing truck. This makes detection much faster and more accurate. Operators can even be warned by so-called pre-alarms for cars that are slowing down and likely to cause a collision. Reduces human monitoring For traffic or security operators, AI offers many benefits. Since incidents can be detected much faster and with more accuracy, operators will be able to make better-informed decisions, especially in high-stress situations, and they will be able to deploy emergency teams more quickly. AI will also reduce the need for constant human monitoring, allowing operators to focus on other tasks.AI will benefit traffic planners too. Data collected from a camera can be analysed over time to identify trends, patterns, or areas with a higher potential for incidents. This can be valuable for proactive traffic planning, infrastructure improvements, or for overall risk management. Data as the cornerstone of AI performance AI-based detection systems will become the norm very swiftly. Since these systems depend on massive data sets, it’s easy to understand that the detection performance will soon be determined by the quality of the data it is trained with. High-performance systems will need a lot of data for training—in case video images of traffic—but not just any data that has been plucked from the internet will do. Challenges with publicly available datasets The problem with that approach is that, more often than not, publicly available datasets are limited Some camera manufacturers rely on publicly available datasets to train their AI systems. The problem with that approach is that, more often than not, these datasets are limited or of low quality. For example, internet data sets hardly have any thermal images, traffic images are mostly collected during sunny weather or friendly daytime conditions, and they are often taken from useless angles. FLIR model and prediction AI-based products from FLIR, on the other hand, are trained on datasets that have been collected in-house, over more than 30 years, with data samples that are relevant for practically any traffic scene you can think of. What’s more, FLIR’s datasets are continuously growing and with it the quality of its models and predictions. For FLIR, data is the true quality mark which stands for high-performance, accurate traffic detection. The future is AI Norway and FLIR share an interesting history of evolving incident detection technology. A lot has changed since the installation of the first FLIR automatic incident detection system in the Ekeberg tunnel in 1995. Currently, incident detection systems combine multiple sensors—visual and thermal—and, most importantly, they use AI, which enables them to improve their detection performance over time with every new video image they process. Artificial intelligence has a promising future in incident detection. Norwegian tunnels, and the average daily traffic of 40,000 vehicles in the Damsgård Tunnel, will only benefit from it.
The City of Centennial, Colorado, operates a state-of-the-art Traffic Management Centre (TMC) to monitor regional traffic conditions. Serving a population of over 108,000, Centennial’s TMC ensures smooth traffic flow, supports city operations such as snow management, and engages the public with initiatives like Centennial 101, which provides residents with a behind-the-scenes look at city departments. In August 2023, Centennial installed RGB Spectrum’s Galileo® video wall processor to address its operational needs. The city sought a solution that would enable operators to monitor live feeds from 60 CCTV cameras, improve situational awareness, and facilitate content management for real-time operations and training purposes. The challenge The Momentum Group provided exceptional service and support throughout the project Centennial’s Traffic Management Centre required a reliable, flexible system capable of displaying numerous video streams simultaneously. Operators needed the ability to monitor critical intersections and road conditions in real-time. Beyond daily operations, the TMC needed a tool to support public presentations and internal reviews, offering intuitive control of the video wall through a desktop interface. Planning for the new operational centre began in 2021. After evaluating various options, Centennial chose to follow the example of neighbouring Douglas County, which had successfully implemented RGB Spectrum’s Galileo system in its TMC. This decision was influenced by positive feedback on Galileo’s reliability, flexibility, and performance. The city collaborated with the Momentum Group, a nationally recognised and award-winning manufacturer’s representative firm in the Rocky Mountain region. The Momentum Group provided exceptional service and support throughout the project. “We’ve been very happy with the system reliability and functionality. The Galileo allows us to monitor real-time traffic and engage with the public—all in one powerful platform,” Libby Nordeen, Traffic Management Centre Operator, City of Centennial. Why RGB Spectrum RGB Spectrum’s Galileo video wall processor met Centennial’s needs on multiple fronts. It offered a seamless solution for monitoring multiple video streams in real-time and allowed operators to move content effortlessly between a desktop interface and the video wall. The city appreciated Galileo’s robust design, which ensures 24/7 reliability, and its scalability to accommodate future operational growth. Libby Nordeen, Traffic Management Centre Operator, described the decision: “We really liked that Douglas County uses Galileo and has been happy with it. It made sense for us to go with RGB Spectrum to align with our region and ensure seamless communication with other jurisdictions.” How the City of Centennial uses RGB Spectrum The Galileo processor also supports Centennial’s broader goals of public engagement and education At the heart of Centennial’s TMC is RGB Spectrum’s Galileo processor, which powers a Planar display that showcases live video feeds from 60 CCTV cameras. Operators, including Nordeen and her team, use the system daily to monitor traffic conditions and enhance citywide situational awareness. This capability has been especially beneficial during inclement weather, allowing snow crews to assess road conditions and prioritise their efforts using live video feeds. The Galileo processor also supports Centennial’s broader goals of public engagement and education. During events like Centennial 101, a program designed to familiarise residents with city operations, the TMC uses the video wall to demonstrate how the department monitors traffic and supports real-time operations. The ability to move content from the desktop to the video wall enables operators to create dynamic and engaging presentations for visitors and city officials alike. Looking ahead, Centennial plans to expand the TMC’s capabilities to include enhanced incident management and greater system-to-system communication with neighbouring jurisdictions such as Englewood, Greenwood Village, and Littleton, all of which use the same traffic signal platform. Results and benefits Since installing RGB Spectrum’s Galileo video wall processor, the City of Centennial has seen significant improvements in traffic monitoring operations. Operators now benefit from enhanced situational awareness and streamlined decision-making. Galileo’s seamless integration with desktop control has simplified workflows, enabling more efficient management of daily monitoring and presentations. Libby Nordeen highlighted the system’s impact: “We’ve been very happy with the system reliability and functionality. Galileo allows us to monitor real-time traffic and engage with the public—all in one powerful platform.” The TMC’s enhanced operations provide a solid foundation for future growth. As Centennial expands its capabilities to include incident management and regional collaboration, the Galileo processor will continue to be a cornerstone of efficient traffic monitoring and control.
To combat persistent retail crime and deliver peace of mind to workers in the bustling North Leroy Street business district, the City of Fenton Police Department has deployed a new AI-powered video surveillance system with camera-sharing technology to accelerate response time during retail heists or other emergencies. Deter, detect, and apprehend criminals Fenton is a small city with 12,000 permanent residents, but Chief of Police Jeffery Cross estimates that 60,000 people pass through the town daily. Located off Highway US-23, it is a popular shopping and restaurant district for commuters and people from neighbouring cities. Unfortunately, retail criminals also frequent the area. The new video surveillance system is designed to deter, detect, and apprehend retail criminals. Live security camera footage Through a partnership with RapidSOS, this technology gives Fenton’s 911 dispatch professionals immediate access The new system, housed in a rugged, weatherproof cabinet and mounted on a telephone pole with two cameras, includes Eagle Eye 911 Camera Sharing technology. Through a partnership with RapidSOS, this technology gives Fenton’s 911 dispatch professionals immediate access to view live security camera footage during an emergency. “With 911 Camera Sharing, the 911 operator can see the situation unfold and give law enforcement direct, quality information and immediate feedback about what happened and the direction the suspect is headed in,” Cross explained. “That enhances safety for first responders and our community.” Smart Video Search In addition, the security cameras have built-in AI-powered Eagle Eye Smart Video Search, which enables Fenton’s authorised law enforcement officials to quickly search security camera footage for vehicles, people, or objects of interest. “With Smart Video Search you can search for a ‘person wearing a red shirt and black pants’ a ‘blue Honda truck’ or ‘person with a backpack’ and quickly find a shoplifting suspect or determine when a certain vehicle, person, or group of people entered a shopping centre parking lot, which can be critical information for law enforcement,” said Joe Bommarito of Elite Fire Safety, a division of Sciens Building Solutions. This Novi, Mich.-based security integrator is working on the project with the City of Fenton. AI-powered video surveillance “Fenton’s new system with 911 Camera Sharing and AI features such as Smart Video Search is like having a virtual patrol in the Fenton business district,” he added. “Last month the National Retail Federation reported a 93% increase in the average number of shoplifting incidents per year in 2023 versus 2019 and a 90% increase in dollar loss,” said Dean Drako, CEO of Eagle Eye Networks. “AI-powered video surveillance can now be deployed in more areas than ever, offering communities new ways to contend with rising retail crime.”


Round table discussion
The hospitality industry drives economic growth and development by creating jobs, generating revenue, and initiating a ripple effect to improve profitability throughout the supply chain. The hospitality industry includes a vast number of small businesses, including hotels and restaurants. But what are the security challenges of these businesses, and how is the security marketplace serving those needs? We asked this week's Expert Panel Roundtable: How can technology address the security challenges of the hospitality market?
By linking human resource (HR) systems to physical security, access control systems can automatically update permissions based on employee changes, such as promotions, terminations, or department transfers. In fact, connecting HR and information technology (IT) systems to physical security can provide many significant benefits in terms of access control, incident response, compliance, cost savings, and employee experience. We asked this week’s Expert Panel Roundtable: How can organisations integrate physical security with other systems, such as IT and HR?
Manufacturers make things. That hasn’t changed. Manufacturers today still produce finished goods from raw materials using various tools, equipment, and processes. What is evolving is a greater emphasis among manufacturers on understanding and meeting customer needs. In the security industry and elsewhere, the role of a manufacturer is expanding from a purely production-focused function to one that embraces technology, prioritises adaptability, expands service offerings, and caters to a more demanding customer base. We asked this week’s Expert Panel Roundtable: How is the role of the manufacturer changing in the security market? Is “manufacturer” still the best term to reflect the changing role?
Products
Aligning physical and cyber defence for total protection
Download
Understanding AI-powered video analytics
Download
Enhancing physical access control using a self-service model
Download
How to implement a physical security strategy with privacy in mind
Download
Security and surveillance technologies for the casino market
Download
