IP security solutions
Hikvision announced recently that it has achieved the ISO 37301:2021 Compliance Management System certification from SGS, the world's renowned testing, inspection, and certification company. This milestone, highlighted in the certification ceremony at the Shaping Intelligence Hikvision Commercial Summit 2025 in Bangkok, Thailand, affirms that Hikvision’s robust compliance framework aligns with global standards, supporting the company's resilient growth worldwide. A Testament to Complianc...
Axis Communications, a industry pioneer in video surveillance, announces it has signed the U.S. Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge to transparently communicate about the cybersecurity posture of Axis products. The voluntary Secure by Design pledge of the U.S. government agency, CISA, calls on manufacturers to make the security of customers a core business requirement by addressing seven key aspects of security: ...
SAGE Integration is excited to announce the newest office in Ripley, Tennessee, located at 567 Highway 51 South, Ripley, TN 38063. The latest expansion continues to enhance SAGE's ability to serve its expanding regional client base and address the rising demand for advanced electronic security solutions in the region. The new Ripley office will bolster local operations, enabling quicker response times, improved service, and deeper engagement with clients and the community while supporting our N...
The South American Football Confederation (CONMEBOL) strengthens its commitment to South American football by announcing its agreement with Atos, which becomes the first Official Innovation Partner for CONMEBOL’s club competitions. Among other responsibilities, the partner will develop new website and app solutions for CONMEBOL Libertadores and CONMEBOL Sudamericana, aiming to enhance fan interaction and improve their digital experience. Investing in innovation and IT efficiency Atos is...
As AI-generated phishing attacks flood inboxes with more realistic and personalised scams, DigiCert, a pioneer in intelligent trust, today released new research revealing that consumers are turning to verified brand identities in email for reassurance--especially during Cyber Week. The study, conducted by independent research firm Vitreous World, surveyed 5,000 consumers across the U.S., U.K., Australia, and New Zealand to understand how verified logos and sender authentication will...
Milestone Systems will use the GEFION supercomputer to accelerate the development of sovereign, responsible, and high-performance AI within Europe. The work will focus on the deployment and fine-tuning of the world’s most advanced AI Vision Language Model (VLM) for traffic and smart city applications, developed by Milestone in collaboration with NVIDIA. Today, millions of video cameras capture valuable footage that could improve everyday life. Yet much of this potential remains...
News
MARCH has opened a new regional hub at Meadowhall Business Park in Sheffield, marking a major investment in Yorkshire’s growing economy and supporting the company’s continued expansion. The new site replaces the company’s former Chesterfield and Leeds offices, bringing teams together under one roof to create a collaborative environment designed for innovation, training and growth. With excellent transport links via train, tram, bus and road, the location provides easy access for staff and customers across the region. The modern facility includes dedicated meeting rooms and a large test space for hands-on technical work, all designed to enhance the employee experience and support delivery for customers. Significant investment “This move represents a significant investment in both our people and the region,” said Christopher Kehoe, CEO at MARCH. “Bringing our teams together in Sheffield gives us the opportunity to collaborate more closely, share ideas and strengthen our culture. It’s about creating an environment where talent can grow and where innovation happens naturally.” The new office reflects MARCH’s continued investment in people and capabilities across the North. Sheffield is recognised as a centre of excellence for engineering and technology education, producing highly skilled graduates across a range of disciplines. Its strong academic base and established industrial links provide MARCH with access to a deep pool of technical talent, reinforcing the company’s commitment to developing digital expertise in the region. Newly launched digital apprenticeship programme The Sheffield hub will also support the company’s newly launched digital apprenticeship programme, which has been designed and fully funded by MARCH to address the national shortage of automation and control systems skills. Delivered through the MARCH Academy, the initiative provides a structured training route that blends academic study with practical application. Members of the 2025 apprenticeship intake will be based at the new office, combining academic study with hands-on project experience under the guidance of experienced mentors. Developing future-ready skills The programme forms part of MARCH’s wider strategy to develop future-ready skills and create a consistent training pathway across its regional network. “We believe this investment allows us to serve our customers more effectively,” added Christopher Kehoe. “The Sheffield hub connects our expertise across the North, helping us deliver faster, more consistent results and giving customers direct access to the full range of our capabilities.” The opening of the Sheffield hub underlines MARCH’s ongoing investment in regional development, helping to create high-quality digital roles and supporting the wider local economy.
IDIS has further strengthened its UK sales operations with two key appointments: Carl Scarrott has joined the company as Regional Sales Manager for the south region, and Amy Brown has taken up the role of Regional Sales Manager for the north. These latest appointments follow the recent announcement of Brian Lee as the new Managing Director of IDIS Europe. IDIS, which is the largest in-country manufacturer of trusted South Korean video tech, is investing in its UK sales and customer service operations as it drives take-up of its advanced, user-focused AI video surveillance technology, prioritising system performance and value. New role from various roles Amy Brown will be a familiar face to customers in the north, having held previous roles in both sales and account management, including with leading security providers Stanley Security and Securitas. Carl Scarrot also brings a wealth of industry expertise and experience to his new role from various roles in project management, technical support, and business development with UK security distribution companies, including Norbain and, most recently, Oprema. Key to IDIS’s ongoing success “We are delighted to be welcoming both Carl and Amy to the IDIS team, as we continue to support systems integrators and end-user customers at a time of significant technical innovation and market development,” said Brian Lee. He adds, “They will play an important role in bringing major new projects to fruition, and developing the long-term mutually-beneficial customer relationships that are key to IDIS’s ongoing success.” Introduced a series of landmark video innovations IDIS has recently introduced a series of landmark video innovations powered by its in-house developed next-generation deep learning engine, IDLA Pro. These include the Edge AI Plus cameras range, IDIS A-Cut/AI search, and Smart Privacy Masks, all designed to drive value and efficiency, making it easier for more users to benefit from AI video surveillance.
Intellian Technologies Inc., a global provider of resilient multi-constellation, feature-rich satellite user terminals and communications solutions, and OneWeb, the low Earth orbit (LEO) satellite communications company, have announced a new product portfolio of Intellian Flat Panel user terminals for use on OneWeb’s network. Flat Panel Series Intellian’s Flat Panel Series is a suite of both Pro and Compact user terminals that deliver exceptional performance in sleek, small-footprint, and lightweight form factors. Designed for Land Fixed, Land Mobile, Maritime, and Government markets, they’re a game-changer for customers globally requiring low profile, easy installation, and high performance. Pro and Compact Flat Panels These Flat Panel terminals are meticulously designed to meet the unique demands of end users Through the Pro and Compact Flat Panels, customers have a choice of four different user terminals to address their specific market needs and use cases. Both the Pro and Compact models come in two versatile configurations: a fixed enterprise terminal and a mobility terminal. These Flat Panel terminals are meticulously designed to meet the unique demands of end users, ensuring reliable connectivity everywhere in the world, on land and at sea. Reliable and accurate beam Based on active electronically scanned array (AESA) technology, coupled with proprietary antenna element design, custom vector-amplifier phased array chipset, and proprietary artificial intelligence software algorithms of beam forming and beam shaping, Intellian’s Flat Panel Series is redefining the flat panel product class across the industry. To support the frequent beam and satellite handovers required for OneWeb, Intellian’s flat panel architecture allows for highly reliable and accurate beam pointing with optimised tracking, and ultra-fast, sub-milli-second satellite handovers, even at low elevation look angles as encountered in mobility markets. Critical applications For commercial, private, and government customers requiring fixed, land mobility, or maritime installations, Intellian’s Flat Panel Series is ideal for all levels of connectivity needs including critical applications. The terminals enable connectivity to OneWeb’s network at OneWeb’s Committed Information Rates, even with severe platform motion. Compact user terminals Intellian's global leadership in the maritime communications industry makes the Flat Panel Series, Pro, and Compact user terminals for mobility highly anticipated additions to the OneWeb roadmap by customers looking for reliability and excellence in such challenging environments. Eric Sung, President and CEO at Intellian Technologies Inc., said, "Our evolution into flat panel user terminals has been an exceptionally exciting and intense development, that has not only stretched the boundaries of our technological prowess but has also redefined the possibilities within the industry." SWAP form factor "With such a sleek, optimised SWAP form factor user terminal that doesn’t compromise on performance, our Flat Panel Series is unlike anything OneWeb’s customers have experienced to date. We’re proudly empowering their connectivity with these initial four flat panel user terminal series." First to market in Q1 2024 is the OW11FL, the Pro terminal designed specifically for fixed enterprise needs with demanding performance requirements such as business continuity, community broadband, and government sectors. OW11FM OW9HM Compact terminal designed for mobility users including blue light services and leisure vessels Shortly thereafter in 2024 Intellian will launch the OW11FM, another Pro terminal, this time tailored for mobility such as shipping, superyachts, transportation, and rail. Maintaining this momentum into Q2 and Q3 2024 will be the launch of the OW9HM Compact terminal designed for mobility users including blue light services and leisure vessels, followed by the OW10HL version for fixed enterprise use such as cellular backhaul, NGOs, and military. Intellian anticipates these will be the foundation for further variants that will allow OneWeb to customise solutions and address other use cases in the future. Dependable and flexible connectivity solutions Massimiliano Ladovaz, CTO at OneWeb, said, "We are delighted to partner with Intellian once again to bring these AESA terminals to the market and add them to OneWeb’s comprehensive suite of terminal solutions." "Intellian’s Flat Panel Series will cater to a range of diverse market segments and uses. By combining Intellian's pioneering technology with OneWeb's fast, reliable, low-latency network capabilities, we will continue to provide customers with dependable and flexible connectivity solutions that meet their needs worldwide.”
Altronix, the recognised pioneer in power and networking solutions, is showcasing its latest innovations that elevate security and system performance at ISC East Booth 713. Altronix will feature eFlow Pro Series auto-ranging power supply/chargers with enhanced features, Trove™ Access and Power Integration Solutions, and advancements in LINQ™ network power management, fibre, PoE, and long-range Ethernet for greater flexibility for a broad range of applications. Product enhancements “Altronix focus has always been to lead the industry in performance, reliability, and service,” said Alan Forman, President of Altronix. “This year’s product enhancements reflect our commitment – giving specifiers and integrators the confidence to build high-performing systems.” Altronix solutions lineup firsthand Attendees can experience the Altronix solutions lineup firsthand at their booth, including: Trove™ Access and Power Integration Solutions: Trove now features expanded pre-wired and pre-configured kits supporting more than 50 leading access control brands including AMAG, AXIS, Brivo, Galaxy, PDK, Software House, and all Mercury-based controllers such as Avigilon, Genetec, and LenelS2. Available in scalable wall, rack-mount, and outdoor enclosures, Trove simplifies installation and maintenance with a single point of service, reducing time and labour in the field. NEW! eFlow™ Pro Series Power Supply/Charger: eFlow Pro provides auto-ranging 90VAC-256VAC input allows for selectable 12VDC at 14A and 24VDC at 10A outputs, for total flexibility worldwide. Enhanced features include a removeable AC input terminal block, Lithium or SLA battery charging, fire alarm disconnect, short circuit and overload protection and more. Using the LINQ2 module, it enables remote monitoring, power management, and diagnostics. NetWay Spectrum PoE Solutions: Featuring an integrated EBC48 rapid battery charger, it delivers up to 90W per port and recharges 32AH batteries in under eight hours. These hardened PoE switches utilise fibre for remote deployments and provide extended backup to keep systems operating where only intermittent power is available. New 277VAC input options support a variety of edge applications. LINQ™ Network Integration with Milestone XProtect: LINQ™ network communications now integrate directly with Milestone XProtect VMS, enabling monitoring of device events, connectivity status, value thresholds breaches, and service or battery notifications in the XProtect Smart Client. It delivers a single-pane-of-glass to monitor equipment health and uptime status. Pace™ Long-Range Ethernet Solutions: Extends Ethernet connectivity up to 1000m over a single pair or up to 500 metres over structured cabling, enabling the deployment of IP devices at longer distances. Pace also supports T1L industrial devices like sensors and controllers for a wide range of industrial/building automation applications utilising existing single pair infrastructure. Circ™ Redundant Power Solutions: Provides a seamless transition between two independent 115VAC or 230VAC inputs, ensuring continuous operation of critical systems during outages or failures. Trove power specifications Altronix is also excited to introduce its A&E (Architects & Engineers) specification program, designed to provide direct support to the A&E community. This will include streamlined access to Trove power specifications and other tailored resources. Altronix power and data transmission products are backed by a lifetime warranty.
More than half (52%) of retail workers say they are likely to leave their current job in the next 12 months due to personal safety concerns, according to new research conducted by the Loss Prevention Research Council (LPRC) and in partnership with Verkada. The State of Retail Safety report reveals an alarming escalation in workplace violence from 2024, and offers critical insight into solutions that can protect retail workers, consumers and inventory without escalating tensions. Key findings Safety concerns on-the-job escalate, corresponding with material increase in reports of violence: More than one in three (35%) retail workers reported feeling unsafe at work, up from 27% in 2024. Reports of physical assault increased 22% year-over-year, while aggressive behaviour from past employees and current coworkers jumped 28% and 26%, respectively. Nearly 40% of workers worry about theft and verbal harassment most or every time they go to work. Violence threatens retention in an industry that already faces high turnover: One in four retail workers (25%) report they've thought about looking for a new job due to personal safety concerns, up from 19% last year. Those who experienced violent incidents are even more likely to leave: 53% say they have considered new opportunities. Men, who are experiencing workplace violence at notably higher rates than women, are also significantly more likely to quit over safety concerns in the next year (63% vs. 39% of women). Store managers are feeling the impact of this retention challenge: nearly half (49%) report that safety concerns are a barrier to hiring, up significantly from 37% in 2024. Locked cabinets create friction on both sides of the counter: Nearly half (46%) of retail workers say physical theft prevention tools like locked cabinets and checkout gates are more disruptive than effective, and 59% report they reduce their efficiency on-the-job. Customers agree: 60% of U.S. adults say physical theft prevention tools are more disruptive to the shopping experience than they are effective at deterring crime, and 74% say certain theft-prevention measures make them less likely to shop in-store. Retail workers in stores with these measures in place report higher rates of violence across every category measured, revealing an uncomfortable reality: customer frustration from these barriers may be fuelling confrontations, as retail workers report 54% of verbal threats stem from angry customers. LPRC's ongoing efforts "Retail remains a critical cornerstone of the American economy, contributing $5.3 trillion annually to GDP and supporting more than one in four jobs," said Read Hayes, Ph.D., Executive Director of the Loss Prevention Research Council. "Nothing is more important than protecting the frontline retail associates who power this economic engine, and this report builds on the LPRC's ongoing efforts to provide a roadmap for retailers on how to make sure these workers feel safe." Retailer's clear roadmap "Everyone deserves to feel safe, but our research shows that more than one in three retail workers has felt the opposite," said Alana O'Grady Lauk, Vice President of Public Affairs at Verkada. "With the busiest shopping season around the corner, millions of retail workers will experience increased foot traffic, longer hours, and rushed shoppers. This data gives retailers a clear roadmap to protect their teams when it matters most – and the urgency to act on it now."
3DX-RAY, a pioneer in advanced X-ray imaging technology, is pleased to announce the successful acquisition of a significant double-digit unit contract with the esteemed Indian partner for the ThreatScan LS1 system. This innovative solution has been selected for its impressive size, ruggedness, and exceptional capability to efficiently handle Passive Infrared (PIR) devices activated by X-ray technology. EOD and security applications The ThreatScan LS1 is an advanced X-ray imaging system specifically designed for EOD and security applications, delivering high-performance imaging capabilities suitable for various environments, particularly in security settings such as stadia, airports and customs posts. One of the standout features of the ThreatScan LS1 is its large area coverage, allowing it to scan substantial objects effectively. This makes it particularly useful for thorough security checks, providing high-resolution images that enhance the detection of potential threats, including weapons, explosives, and contraband. Advanced imaging technology User experience is prioritised with the ThreatScan LS1, as it boasts an intuitive interface that enables operators to quickly learn and utilise the system efficiently. Additionally, its robust design ensures reliability and longevity, even in demanding operational conditions. In terms of technical specifications, the ThreatScan LS1 utilises advanced imaging technology that allows for superior detection capabilities. It features rapid image processing to facilitate quick decision-making during security screenings and offers multiple connectivity options for seamless data transfer and system integration. Importantly, it complies with international safety standards for X-ray systems, ensuring safe operation for both users and the public. Demand for advanced security solutions “We are thrilled to deepen our partnership and leverage the proven capabilities of the ThreatScan LS1 with our Indian partner,” said Vince Deery, CEO of 3DX-RAY. “This contract not only underscores the increasing demand for advanced security solutions but also demonstrates our ongoing commitment to innovation and excellence in meeting our clients’ needs with cutting-edge technology.” General security inspection The ThreatScan® range is suitable for use in suspect bag and package inspection in locations such as mass transit rail and bus stations, shopping malls, airports, stadia and sports arenas. The system is also used for general security inspection by first responders such as Police, Military, Government Security agencies and Technical Surveillance Counter Measures. 3DX-Ray will be showcasing the ThreatScan ISC on the Visiom stand no. 5R199, at this year’s MILIPOL, November 18-21, 2025 - Paris North Villepinte.


Expert commentary
As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres empowered by a new generation of data-driven technologies are emerging as an effective force multiplier. Real-time crime centres Real-time crime centres (RTCCs) serve as centralised hubs where dedicated personnel leverage pioneering-edge technologies to analyse diverse data streams and provide critical support to law enforcement and emergency operations. These 24/7 facilities are transforming how agencies gather, process, and act upon information, enabling more proactive and efficient policing strategies. The core functions of RTCCs These centres provide officers with unprecedented situational awareness and real-time intelligence At their core, RTCCs are tasked with three primary objectives: enhancing safety, facilitating identification, and supporting apprehension. By integrating data from a wide range of data sources, these centres provide officers with unprecedented situational awareness and real-time intelligence. Integrated data approach This integrated data approach allows RTCCs to alert officers to potential threats, quickly identify suspects, and guide responders during critical incidents. For instance, in the event of a robbery, RTCC operators can rapidly search camera and licence plate data to track suspect vehicles, significantly improving the chances of a swift arrest. According to the Bureau of Justice Assistance at the U.S. Department of Justice, the mission of an RTCC is to centralise a broad range of current and evolving technologies, coordinate sworn and non-sworn human resources, and direct the attention to high-crime areas, active crimes in progress, high-profile or highly recidivistic offenders, and large-scale public events that may require law enforcement presence or response. The technology powering RTCCs The effectiveness of an RTCC hinges on its ability to seamlessly integrate a wide array of technologies: Open Platform Video Technology: At the heart of many crime centres is an open platform video management software (VMS) that serves as the central nervous system, unifying diverse data streams into a cohesive operational picture. By leveraging open APIs and SDKs, the VMS can incorporate a wide range of cameras, sensors, and analytics tools. This data-driven approach to video technology enables seamless alert distribution to both the RTCC and field officers via mobile applications. IP Camera Networks: The eyes of an RTCC, these systems combine fixed, PTZ, multi-sensor, thermal, and other specialty cameras to provide continuous city monitoring. Strategically placed throughout urban areas, cameras offer comprehensive coverage of critical locations such as transportation hubs, commercial districts, and high-crime zones. This network forms the foundation for real-time monitoring and incident response. Sensor Arrays: Beyond visual data, RTCCs employ various sensor technologies. Acoustic sensors can detect sounds such as gunshots, shouts for help, breaking glass, and other sounds instantly alerting officers and cueing nearby cameras. Environmental sensors monitor air quality for gasses, smoke, and other non-visible hazards. Licence Plate Recognition (LPR): LPR systems act as a force multiplier, continuously scanning for vehicles of interest. By generating real-time alerts for stolen or wanted vehicles, these systems significantly enhance the ability to track suspects and recover stolen property, contributing to reduced auto theft rates. Aerial Surveillance: Many RTCCs incorporate drone technology, providing on-demand aerial perspectives of developing situations. This capability is particularly valuable for monitoring large-scale events, assessing natural disasters, supporting operations in hard-to-reach areas, and serving as a powerful first response for crime scene situational awareness. AI-Powered Analytics: At the heart of many RTCC operations are sophisticated AI algorithms that analyse video data in real-time. These systems can identify a range of suspicious activities, from unattended packages to unauthorised intrusions. By rapidly processing vast amounts of video data, they help operators focus on potential threats and anomalies. Geospatial Mapping: To make sense of the influx of data, RTCCs rely on advanced mapping software. These tools visualise events, alerts, and data streams geographically, allowing operators to quickly identify patterns, clusters of activity, and relationships between incidents. Database Integration: RTCCs maintain direct connections to various law enforcement databases, including local, state, and federal resources like the National Crime Information centre (NCIC). This integration allows for rapid background checks and threat assessments, providing crucial context for ongoing operations. Cloud Infrastructure: The scalability and flexibility of cloud computing are revolutionising RTCC capabilities. Cloud and hybrid solutions offer secure, off-site storage and facilitate easy data sharing between agencies. This approach not only reduces initial costs but also allows for incremental upgrades, making advanced RTCC functionality accessible even to agencies with limited budgets. Real-world impact RTCC operators tracked shooting suspects via camera feeds, guiding officers to their location The proliferation of RTCCs across the United States with over 80 centres in operation speaks to their proven effectiveness. Cities that have implemented these high-tech command centres are reporting significant improvements in response times, clearance rates, and overall public safety. Real-time surveillance In Winston-Salem, North Carolina, the local RTCC leverages over 1,300 live video feeds to provide real-time surveillance across the city. This extensive network, combined with gunshot detection technology and licence plate readers, has already demonstrated its value. In a recent incident, RTCC operators were able to track shooting suspects via camera feeds, guiding officers to their location for a quick apprehension. Video analysis by RTCC Similarly, Newport News, Virginia, saw an immediate impact after launching its RTCC in 2021. The centre has played a crucial role in solving homicides caught on video and rapidly closing a series of carjacking cases. These success stories underscore the game-changing potential of RTCCs when it comes to solving crimes and gathering evidence. In Memphis, Tennessee, video analysis by RTCC detectives helped identify a shooter in custody following an incident at a community basketball court even when no witnesses had come forward. Identifying suspects with RTCC Officers and analysts can view street and body camera footage to monitor crowds at parades The Jackson Police Department in Mississippi has seen similar benefits since building an RTCC in 2019, part of a broader effort that included deploying 100 cameras and 271 body cams. Officers and analysts can view street and body camera footage to monitor crowds at parades and other events. During pursuits, the cameras provide extra surveillance, allowing officers to identify suspects or witnesses to help solve crimes. Enhancing crime mitigation and emergency response While RTCCs have proven their worth in responding to active incidents, their true potential lies in proactive crime prevention and enhanced emergency preparedness. By leveraging advanced analytics and integrated data sources, RTCCs are evolving into powerful predictive tools for law enforcement. Pattern recognition algorithms For instance, pattern recognition algorithms can analyse historical crime data alongside real-time video feeds to identify potential hotspots for criminal activity. This allows law enforcement to strategically deploy resources, increasing visible presence in high-risk areas before crimes occur. Similarly, anomaly detection systems can alert RTCC operators to unusual behaviors or suspicious activities, enabling early intervention in potentially dangerous situations. Asset and property protection, automated alerts RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7 Asset and property protection is another area where RTCCs excel. By integrating with access control systems and using AI-powered video analytics, RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7. Automated alerts for perimeter breaches, unauthorised access attempts, or suspicious objects left in restricted areas allow for an immediate response, significantly enhancing security postures. Emergency response and preparedness In terms of emergency response and preparedness, RTCCs serve as vital command and coordination centres during crises. Whether facing natural disasters, major accidents, or other large-scale emergencies, RTCCs provide a centralised hub for information gathering and dissemination. Real-time video streams from affected areas, combined with data from environmental sensors and emergency service communications, allow for rapid situational assessment and coordinated response efforts. Post-incident investigation and analysis RTCCs can also play an active role in post-incident investigation and analysis. The ability to quickly compile and analyse vast amounts of data from multiple sources can significantly accelerate case resolution and help identify patterns to prevent future incidents. As RTCCs continue to evolve, their capacity for integrating diverse data streams and leveraging advanced analytics positions them as indispensable tools in modern law enforcement strategy. The future of technology-driven policing The integration of artificial intelligence and machine learning promises to enhance video analytics As RTCCs continue to evolve, they are likely to incorporate even more advanced technologies. The integration of artificial intelligence and machine learning promises to enhance video analytics capabilities, enabling faster and more accurate threat detection. Additionally, the expanding use of drones, subject to FAA regulations, could provide RTCCs with cost-effective aerial surveillance options. Effective and ethical operations However, the implementation of RTCCs is not without challenges. Agencies must navigate issues of privacy, data security, and community trust. Ongoing training for personnel and careful planning is essential to ensure these centres operate effectively and ethically. Data-driven approach Despite these hurdles, the trend toward technology-driven policing shows no signs of slowing. RTCCs represent a shift from reactive to proactive law enforcement strategies, offering a data-driven approach to crime prevention and response. As these centres become more prevalent, they will play an increasingly vital role in helping agencies maximise their resources and make informed decisions, ultimately contributing to safer communities for all.
Security manufacturers throw around the term “scalable” a lot these days, but few dive into what scalable really means for modern organisations and their security programs. Achieving true scalability, or as I like to refer to as “expandable with a purpose,” takes planning and coordination from security pioneers alongside the broader organisation. Implementing a flexible strategy is critically important in the age of advancing analytics and intelligence-driven technology. So what exactly do we mean by “scalable”? "Scalable" refers to the capability of a system, process, or technology to handle growth or increased demand without compromising performance, efficiency, or quality. To put it simply, scalability refers to the ability of a solution to expand or adapt to accommodate larger workloads, higher volumes of data, or increased complexity without requiring significant changes to its underlying architecture or design. It’s not enough to create a “fix it and forget it” security program. Not only do the needs of the organisations shift, but growth (or even shrink) is inevitable. How to Approach Growth Pioneers must be prepared to adapt their strategies and approaches to manage security risks For many security pioneers, growth has a trickle-down effect. Expansion through mergers and acquisitions or organic growth, in addition to decreases in facility or employee count, directly impacts the security program. Whether it’s an increase or decrease in size, workload, or scope, these pioneers must be prepared to adapt their strategies and approaches to efficiently manage security risks while maintaining operational efficiency. Here are some ways security pioneers can approach growth: Assess the here and now: Begin by looking at the current state of your security program, including the resources, capabilities, processes, and technology infrastructure. Understanding existing strengths, weaknesses, and areas for improvement can help inform planning for the future. Align with the business: This might be one of the most important considerations to make, but ensuring security pioneers understand the organisation’s growth objectives, priorities, and risk tolerance levels is critical to the success of a security program. The most successful security pioneers will be able to align security strategies with business goals to ensure security investments and planning are enabling the company’s growth initiatives. Invest in scalable solutions: Invest in solutions that offer flexibility and can adapt to the changing needs of the organisation. Closed systems that can’t integrate fully with new technologies will severely limit the security team’s ability to seamlessly manage the security portfolio. Optimize processes: Reviewing security processes and workflows – or investing in a platform that can streamline this for you – can improve efficiency and effectiveness for your security team. Identifying opportunities for automation and standardisation can allow for scaling as business needs change. Collaborate across departments: Preparing for growth initiatives requires extensive communication across departments, including leadership teams, human resources, legal, IT, facilities, and many other stakeholders ensure that security priorities, challenges, and requirements are effectively communicated and integrated. Adopting these approaches helps put security teams in the driver’s seat, effectively managing periods of growth and change without compromising the safety and security of the organisation. Technology considerations As security pioneers navigate investments in new technologies that achieve some of the approaches listed above, such as aligning strategy with business goals, optimising processes, and cross-departmental collaboration, there are several considerations to make. Looking at how technology can support (or even hinder) future growth. For example, when making a buying decision around access control systems, security pioneers must consider the number of users, number of credentials, server requirements, facilities, hardware end points, and software features. As these items are being addressed in an RFP or in conversations with a vendor, security pioneers must ask themselves, “Is there a scenario where my program will outgrow the system’s capabilities in any of these areas?” If so, the answer might be to select a different solution. Security pioneers must consider interoperability. We talk a little about this above, but the importance here cannot be overstated: integration is key. The ability to leverage multiple point solutions, such as access control systems and video surveillance cameras – regardless of manufacturer – provides growing companies with the ability to scale quickly and more efficiently than ever before. Centralising the ability to pull these solutions into a single security operations management platform allows security pioneers a better view of their security programs in a current – and even future – state. Cloud-based solutions can provide the ultimate scalability factor, providing flexibility and accessibility advantages compared to traditional on-premise systems. Cloud-based, or Software-as-a-Service (SaaS) platforms, can easily scale up or down based on changing needs, accommodate distributed environments, and provide remote access and management capabilities, making them well-suited for scalable physical security deployments. Data-driven insights and analytics can drive decision-making beyond security, making technology investments that provide these critical. Automated workflows, event-triggered alerts, and AI-driven analytics can streamline security processes, improve threat detection capabilities, and reduce manual intervention, enabling security teams to manage larger environments more efficiently. Centralised management of technology investments can create cohesion for security teams. Centralised management and monitoring of physical security systems across multiple locations or facilities enables personnel to efficiently oversee and control security operations, access controls, and incident response activities. Being able to manage security in a single platform provides security pioneers with the ability to assess staffing levels, streamline training, allocate resources effectively, and scale to additional sites and/or solutions as needed. Tasked with building a security program that can adapt to the changing needs of the organisation, security pioneers must consider a number of factors when setting strategy. First and foremost, taking a close look at the existing program to identify strengths and weaknesses, then truly assessing the technology and processes in place, is the best way to move forward and future-proof the organisation.
The days of being reactive are over. That’s right, we as an industry, can no longer afford to be reactive. As threats evolve, the need for proactive security is critical. While traditional methods, including physical barriers and security personnel, are still necessary, the future of our approach is built on the backs of emerging technologies. Substantial vulnerabilities As an industry, we’ve operated reactively for decades, it has been common for security teams to address threats only after they occur. The growing risk landscape proves that this approach has significant limitations. Human oversight, delayed responses, and the inability to monitor large areas have exposed substantial vulnerabilities. Emergence of AI AI enables real-time monitoring, advanced data analysis, and more accurate risk detection Times are changing though and it’s largely due to the emergence of AI. AI is revolutionising the security landscape by making technology smarter. It enables real-time monitoring, advanced data analysis, and more accurate risk detection. This ensures a higher level of security and safety, minimising potential incidents' impact while enhancing overall safety. Focus on strategic aspects AI's ability to process vast amounts of data quickly and accurately is, quite frankly, a game-changer. It can identify patterns and anomalies that can provide stakeholders with critical insights to respond in a more prepared manner. By automating routine tasks and highlighting potential issues, AI also allows operators to focus on more complex and strategic aspects of security management, rather than responding to false alarms. The future is AI The future of security lies in AI. The Security Industry Association (SIA) has recognised AI as one of the top security megatrends in 2024. However, the challenge is not adopting AI, it is about effectively using it to enhance security. AI can enhance video surveillance by improving object detection and enabling real-time, informed responses AI systems can easily integrate with existing infrastructures, providing a layered defence that combines traditional methods with more modern technology. For example, AI can enhance video surveillance by improving object detection, reducing false alarms, and enabling real-time, informed responses. This ensures that security measures are adaptive, scalable, and capable of addressing the evolving risk landscape. Don’t react, anticipate One of AI's most significant benefits is its ability to provide proactive insights. AI can predict potential breaches by analysing behaviour patterns and detecting anomalies allowing security pioneers to do something before an event happens. This shift, from reactive to anticipatory measures, marks a significant advancement in asset protection and risk management. AI systems can also continuously analyse data and distinguish between everyday events and real-world threats. It’s AI's continuous learning capabilities that mean the systems can adapt and improve over time to become more accurate and efficient in threat detection and response. Save money, scale on demand Contrary to common belief, adopting AI technologies will not put a security department over budget. It may be surprising, but these solutions offer cost-effective and scalable alternatives to traditional security measures. An initial investment in AI technology can result in substantial long-term savings (and ROI) by reducing the need for physical infrastructure and on-site security personnel. Customisable solutions The ability to scale and customise AI solutions makes them an efficient choice for enhancing perimeter defence AI systems are also inherently scalable and can be tailored to meet the specific needs of different environments. This ensures the system can evolve with emerging threats and technological advancements without requiring a complete system overhaul. The ability to scale and customise AI solutions makes them a practical and efficient choice for enhancing perimeter defence. How’s that for staying within budget? Embrace the possibilities Integrating AI into perimeter security is the future of proactive and intelligent security. As these technologies continue to evolve, we can expect even more refined solutions that are predictive, autonomous, and capable of directly addressing new and emerging threats. We’re experiencing an exhilarating transformation as AI becomes more trusted, precise, and advanced on multiple levels. This evolution is bigger than pilots and small, low-profile deployments. AI in perimeter security For instance, France is preparing to deploy AI-powered video surveillance as it gears up to host the 2024 Olympics, part of its efforts to detect sudden crowd movements, abandoned objects, and suspicious activities. Think about the sheer scale of that project. We’re finally moving forward, and staying one step ahead must be our priority. But this shift requires a significant change in mindset. Are you ready to make the change?
Security beat
For all the emphasis on cloud systems and centralised servers at ISC West, a lot of innovation in security video systems is happening at the edge. New advancements inside video cameras are boosting capabilities at the edge, from advancements in processing power to artificial intelligence (AI) and machine learning (ML) algorithms that can now be deployed directly on the cameras or edge devices. Advancements in AI algorithms The progress of video systems becoming smarter at the edge is driven by the need for real-time insights, lower latency, bandwidth efficiency, enhanced privacy, and improved reliability. Advancements in edge computing hardware and AI algorithms are enabling a range of intelligent video applications across various industries, including physical security. Smarter functionality at the edge is a benefit of new computer systems-on-chips (SoCs) that are driving new heights of performance for today’s cameras. Axis Communications’ ARTPEC-9 Axis Communications’ new ARTPEC-9 SoC offers advanced video compression to reduce bandwidth Axis Communication’s new ARTPEC-9 system-on-chip (SoC) offers advanced video compression to reduce bandwidth and storage needs. With a low bitrate, the SoC helps deliver high-quality imaging with outstanding forensic detail. ARTPEC-9 also offers enhanced deep learning capabilities to allow users to leverage the latest video analytics and accelerate the implementation of AI technology. Axis maintains control over all aspects of the chip’s development to ensure high quality and cybersecurity. Among the benefits of ARTPEC-9 are better AI and deep learning, better image quality, better cybersecurity, and AV1 license-free video compression (see below). Hanwha Vision’s Wisenet 9 Hanwha Vision has launched Wisenet 9, its most advanced AI-powered System on Chip (SoC). Wisenet 9’s enhanced edge AI capabilities increase performance as the volume and complexity of security threats demand real-time, accurate analysis. By elevating edge-device performance, AI empowers systems to quickly analyse vast amounts of video data and discern crucial patterns and anomalies. A key differentiator driving Wisenet 9 is deployment of two Neural Processing Units (NPUs), which improve performance three-fold compared to Wisenet 7, the previous SoC generation. While one NPU handles image processing, the other focuses on object detection and advanced analytics. This dual NPU concept was introduced to ensure video quality and analytics have independent resources, thus preventing one function from impacting the performance of the other. The latest from Ambarella Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers Off the ISC West trade show floor in a nearby meeting room, semiconductor company Ambarella demonstrated how it will continue to push the envelope of what is possible with generative AI at the edge. Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers and recently achieved the milestone of 30 million cumulative units shipped. The demonstrations highlight Ambarella’s ability to enable scalable, high-performance reasoning and vision AI applications across its ultra-efficient, edge-inference CVflow 3.0 AI SoC portfolio. The company’s DeepSeek GenAI models run on three different price/performance levels of its SoC portfolio. In addition to advancements in GenAI processing at the edge, Ambarella integrates image processing, encoding and system-level functions into all its AI SoCs. New standard for video encoding: AV1 AV1 compression is a next-generation video coding technology that offers significant improvements in compression efficiency and video quality, especially at lower bitrates. Its royalty-free nature positions it as a crucial codec for the future of internet video. AV1 compression is a next-generation video coding technology. Axis Communication’s ARTPEC-9 chip now supports the AV1 video encoding standard. By embracing this standard, which is new to the physical security market although it was introduced in 2018, Axis sets the stage for AV1 compression to eventually become the industry standard, replacing H.264 and H.265. Network video transmission AV1 is an open-source, license-free coding format designed mainly for efficient network video transmission AV1 is an open-source, license-free coding format designed specifically for efficient network video transmission. It delivers high-quality video at low bitrates, reducing bandwidth consumption and storage costs. The codec was developed by the Alliance for Open Media (AOM), a nonprofit organisation founded in 2015 by Google, Intel, Amazon, Microsoft, Netflix, and Mozilla (among others), to provide open-standard, next-gen video coding technology. AV1 is ideal for cloud solutions—making streaming applications more robust, scalable, and capable of delivering real-time insights. Now the ARTPEC-9 chipset brings these benefits to the surveillance industry, and AV1 is currently supported by AXIS Camera Station. Providers of major video management solutions (VMS) such as Genetec and Milestone will be adding support for AV1, with further developments already underway. More intelligence at the edge Intelligence inside video cameras comes from the processing power and algorithms that enable them to perform tasks beyond simply capturing and recording images. This "intelligence" allows cameras to analyse the video stream in real-time, identify objects, detect events, and make decisions or provide alerts based on what they "see." New and improved SoCs are driving performance improvements at the edge. The increasing power of embedded processors and advancements in AI are continuously expanding the capabilities of intelligent video cameras.
AI has the potential to enhance the usability of traditionally complex access control and physical security systems. The application of AI (artificial intelligence) within access control is still relatively new, but rapid advancements in generative AI are already transforming how security systems operate. acre security is driving the deployment of generative AI in access control through its acquisition of REKS earlier this year. REKS is a purpose-built generative AI solution designed specifically for acre’s access control platform. Unlike generic AI tools, REKS understands both system and security-specific terminology, allowing users to ask natural-language questions like, “Show me all access denied events at a specific location,” and receive instant results. AI workflows and AI agents “We're starting to see how AI workflows and AI agents, that leverage language models, can potentially be used in conjunction with access control to create new, automated processes around false alarm reduction, system configuration, report generation, data analysis, threat detection, and in-system customer support,” says Adam Groom, Director of Business Development, AI Development Team, acre security. “We expect AI-driven capabilities to evolve rapidly, but the full range of benefits will depend on continued development and real-world application,” he adds. Integrate AI-driven capabilities acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions The best way to think of REKS is as an acre access control expert you can talk to, says Groom. “As AI adoption grows in security, REKS will expand its capabilities, making access control more usable and more efficient.” Groom says acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions the company as a pioneer in next-generation physical security. “These features will add long-term value by enhancing usability and operational insights across various segments,” says Groom. “Work is already under way to incorporate REKS into acre access control, and we’ll evaluate other integration opportunities in the future.” REKS' AI capabilities According to acre, REKS simplifies daily operations, automating routine tasks, and delivering real-time, actionable intelligence. With REKS' AI capabilities, users can interact with the system to retrieve more detailed insights and actionable information from their acre access control system. “This eliminates the need for complex reports, navigating drop-down menus, or manually reviewing logs,” says Groom. “It significantly enhances efficiency and usability for security professionals.” Enhancing productivity and customer satisfaction Key concern is ensuring that system configuration, enactment, and servicing remain within their scope For integrators, the key concern is ensuring that system configuration, implementation, and servicing remain within their scope of expertise. With REKS, that doesn’t change — but the process becomes significantly faster and more efficient. Instead of manually configuring every panel, input, and output — a traditionally time-consuming task — REKS enables integrators to use natural language commands to streamline setup and adjustments, says Groom. This eliminates tedious steps and dramatically improves operational efficiency, allowing integrators to deploy and fine-tune systems with greater speed and accuracy, ultimately enhancing both productivity and customer satisfaction, he adds. Cloud-enabled ecosystems “We are committed to helping organisations modernise their security infrastructure by transitioning from legacy systems to cloud-enabled ecosystems at their own pace — ensuring minimal disruption while maximising value,” says Groom. “By integrating AI-driven capabilities, we enhance usability and deliver deeper operational insights across all segments.” “Security’s future isn’t about forcing change — it’s about empowering choice,” adds Groom. “Whether staying on-prem, migrating to the cloud, or adopting a hybrid model, we plan to provide a seamless, zero-disruption transition, prioritising interoperability, automation, and security at every stage.” Generic AI tools AI must be purpose-built for security applications because security demands precision, reliability, and context-aware decision-making, which only focused AI offerings like REKS bring to the table, says Groom. In contrast, generic AI tools, like ChatGPT, are designed to perform a wide variety of tasks, like how humans can learn and do many different things. Instead, purpose-built AI is built to do just one specific function. “REKS adds specially designed artificial intelligence to our access control solutions to enhance both intelligence gathering and the user experience,” says Groom. New applications in access control The integration of generative AI into acre's access control platforms and their broader portfolio A new AI development team will lead AI initiatives at acre, driving the integration of generative AI into acre's access control platforms and their broader portfolio. This team will seek to push boundaries in applying AI to new applications in access control, intrusion detection, and beyond, empowering security professionals to interact with their systems in a smarter, more intuitive way. But don’t worry, AI will not take the human element out of security entirely. AI human capabilities “The reality is that AI will improve upon human capabilities because it is a versatile tool that supports and strengthens security operations, not a replacement for human decision-making,” comments Groom. “It helps operators process large amounts of data quickly and detect patterns that might be missed otherwise.” Rather than removing the human element, AI allows security teams to work more efficiently by automating repetitive tasks and providing actionable data, enabling professionals to focus on critical responsibilities. {##Poll1743085396 - What is the biggest challenge you face with your current access control system?##}
The practice of executive protection changed forever on Dec. 4, 2024, when UnitedHealthcare CEO Brian Thompson was shot outside a Manhattan, New York, hotel. The shocking event raised awareness in board rooms around the world about the need for, and challenges of, executive protection. Questions followed immediately, including why was the high-level executive not protected? Combination of risk and reward UnitedHealthcare’s stock price has gone down more than 20% since the shooting The event also highlighted what is at stake for companies, extending beyond the safety of executives and impacting many factors, even including a company’s stock price. UnitedHealthcare’s stock price has gone down more than 20% since the shooting, equating to tens of billions of dollars. “Companies are considering the combination of risk and reward like never before when it comes to executive protection,” says Glen Kucera, President of Allied Universal Enhanced Protection Services. “What are the chances this could happen? Before Dec. 4 many thought it was zero. And what are the financial implications for a company if it happens? Executive protection is a small investment to protect against a worst-case scenario.” Evaluation of an executive protection Before the UnitedHealthcare shooting raised awareness, fewer than 50% of executives had protection. But concerns that previously fell on deaf ears now have the full attention of companies, says Kucera. “Boards of directors are having to figure this out,” he adds. “They may not have executive protection, but now they have to do it.” A threat assessment, conducted by a company such as Allied Universal, provides an independent evaluation of a company’s executive protection needs. The assessment evaluates factors such as an executive’s travel habits, the safety of their home, etc. Does the executive need protection 24/7, or just when they travel into more dangerous areas? Risks increase related to corporate earnings Sometimes, cases increase the need for executive protection, such as an internal threat In assessing threats, security professionals also look beyond the individual to consider the safety of a corporate facility, for example. “Is there a visual deterrent, controlling who comes and goes?” asks Kucera. “If there is good security, it all ties together. We do home assessment, facility assessment, route assessment, and travel assessment as needed.” Sometimes, circumstances increase the need for executive protection, such as an internal threat. Timing is a factor, and risks increase related to corporate earnings releases, new product announcements, and corporate layoffs or consolidation. Monitoring social media tracks shifting threats that impact the need for executive protection. UnitedHealthcare shooting “He didn’t have it and probably didn’t think he needed it,” comments Kucera about the UnitedHealthcare executive who was gunned down in the streets of New York City. “He was staying at the hotel across the street and was used to walking down the street every day.” “Sometimes executives want to preserve their privacy and be able to walk down the street,” says Kucera. “Getting protection can be seen as a sign of weakness. Some CEOs in the past have said they just didn’t want it.” However, the UnitedHealthcare shooting raised the stakes of the need for more vigilance. “The bottom line is you have to yet beyond objections and make the investment to protect against a worst-case scenario,” says Kucera. Anti-capitalist sentiment in the general population An internal police bulletin warned of an online hit list naming eight executives and their salaries Threats to executives sometimes arise from anti-capitalist sentiment in the general population about perceived inequalities in wealth and power. Executives provide symbolic targets for anyone who fights the system, and social media has amplified the voices of those who oppose capitalism. For example, a "Most Wanted CEO” card deck seeks to shine a spotlight on "titans of greed." Also, in the aftermath of the UnitedHealthcare shooting, CEO "wanted" posters appeared across New York City, threatening various executives of large companies. An internal police bulletin warned of an online hit list naming eight executives and their salaries. Careful monitoring of social media posts Careful monitoring of social media posts and other sources enables executive protection professionals to analyse data and separate the dangerous threats from the merely negative ones. Sadly, positive support of the UnitedHealthcare shooting was expressed by the 300,000 or so followers of the shooter, who became a celebrity of sorts. A huge outcry of negative sentiment toward the insurance industry led to fear that copycat incidents might occur. “There has been an unprecedented amount of positive support for committing murder,” commented Kucera. Executive protection requests HR executives can be at risk, especially at a time of layoffs or consolidation “Let’s face it, there has been a lot of controversy, from COVID to the Middle East crisis, to the political campaign, and there is negativity on both sides,” says Kucera. “People have opportunities to pick sides, and there is a lot of sentiment going both ways, and there is a small percentage of people who will act aggressively.” Executive protection requests now extend beyond the CEO to include others in the management ranks of companies. Basically, any public-facing executive is at risk, including anyone who makes statements to the press. Human resource (HR) executives can be at risk, especially at a time of layoffs or consolidation. Private information on the Internet Typically, an executive is assigned a single armed operative for protection. The firearm serves primarily as a visual deterrent that hopefully makes a potential perpetrator think twice. “When they plan an event like this, their expectation is that it will be a soft target,” says Kucera. “If there is an officer, it gives them pause.” Controversial or high-profile CEOs are typically protected 24/7, including when they travel with their family. Adding risks is the fact that private information is now posted on the Internet, including where an executive lives and where their children go to school. Internet monitoring Internet monitoring also includes the “dark web,” which includes sometimes dangerous information “We offer social media monitoring, and we advise them to be more careful with what they post,” says Kucera. “We monitor reactions to posts including any that might be threatening. We watch social media carefully if a company announces earnings or a change in their service or product offering.” Internet monitoring also includes the “dark web,” which includes sometimes dangerous information that is intentionally hidden and requires specific software, configurations, or authorisation to access. Own layer of protection Public and government officials can also come under fire in a variety of scenarios. FEMA officials faced threats after the recent floods in the Southeast, for example, among other situations where perceived unfair treatment promotes thoughts of retribution. Although government agencies have their own layer of protection, there are instances when they call on companies such as Allied Universal for additional help. Ad hoc protection for various executives In the aftermath of the UnitedHealthcare shooting, calls to Allied Universal’s Command Centre increased by 600%, reflecting requests for ad hoc protection for various executives. These requests are in addition to the company’s business providing “embedded” operatives that travel with executives all or some of the time. On that side of the business, requests for services are up probably 300%, says Kucera. {##Poll1742194323 - Has the recent increase in violent threats changed your company's view on executive protection?##}
Case studies
Keihan Bus, established in 1922, is a long-standing public transportation provider with over 100 years of service in Japan. Its network spans Osaka, Kyoto, and Shiga prefectures, offering a wide range of safe and reliable transportation services and carrying over 10,000 passengers daily. The company also operates routes that serve major tourist destinations such as Kiyomizu-dera in Kyoto and Dotonbori in Osaka, as well as direct access to the venue of Expo 2025 Osaka, Kansai, Japan—a major international event expected to attract millions of visitors from around the world. Through these services, Keihan Bus contributes to both regional mobility and Japan’s broader efforts to welcome global travellers. Among all its depots, the Hirakata Depot manages the largest fleet and is regarded as one of the company’s key operational hubs. To enhance manpower dispatch efficiency in its bus depot, Keihan Bus implemented VIVOTEK’s intelligent traffic solution to improve operational workflows. Challenges Hirakata Depot expanded its parking space and increased its fleet to around 120 vehicles As part of its relocation on March 23, 2025, the Hirakata Depot expanded its parking space and increased its fleet to around 120 vehicles, underscoring the need for a more efficient vehicle management system. Even before the move, manually verifying each bus’s parking location was labour-intensive and inefficient. Staff had to physically check where each bus was parked and update a whiteboard using numbered magnets to represent each bus. Compounding the issue, new regulations introduced in April 2024 limiting driver work hours further exacerbated the shortage of bus drivers. This heightened the urgency of reducing operational workloads through digital transformation. To meet these challenges, Keihan Bus aimed to modernise its analog parking management process and streamline daily operations, especially at its busiest depot. Solutions LPR cameras were installed throughout the depot to capture and recognise the licence plates of buses in real time To achieve operational efficiency, Keihan Bus, in close collaboration with IBS Japan and Mobile Create, implemented a Bus Depot Monitoring System powered by VIVOTEK’s licence plate recognition (LPR) technology, using VIVOTEK’s IP9165-LPR-v2 JPN 12–40mm cameras. LPR cameras were installed throughout the depot to capture and recognise licence plates of buses in real time during entry, exit, and parking. The captured data is processed to identify the latest detected location of each vehicle, and the parking information is displayed on digital signage. This allows drivers to quickly find their assigned bus before beginning their shift, reducing unnecessary delays and confusion. By replacing this analog system with digital monitoring, the company has significantly improved its efficiency and reduced the workload for both drivers and depot staff. Benefit According to Keihan Bus, choosing VIVOTEK’s solution has brought multiple advantages: Reliable Performance: The camera evaluation results were highly positive, with excellent recognition accuracy that inspired confidence in the system’s reliability. VIVOTEK’s WDR Pro technology effectively reduces the impact of harsh backlighting, such as strong afternoon sunlight, while its SNV (Supreme Night Visibility) ensures that licence plates remain clearly visible even in low-light conditions. User-Friendly Setup: Compared to other options, VIVOTEK's system offered a more intuitive setup process. Strong Local Support: The local support provided by IBS Japan, including on-site assistance, was more responsive and comprehensive than that of other vendors. System Compatibility: The data transfer format was compatible with the depot’s existing infrastructure, allowing for a smoother integration process. Customer feedback “After implementing the system, we monitored its performance and fine-tuned the settings to fit our operational environment. As a result, the accuracy has remained consistently high and stable over time. Knowing that long-term maintenance support is available makes us feel secure,” Keihan Bus Hirakata Depot. “This was our first experience working on a solution-based project, and we started from scratch, feeling our way through. Thanks to the strong support from IBS Japan, we were able to successfully take off.” “Gaining hands-on experience with a camera-based solution has become a major source of confidence for us. Although this was our first time implementing an LPR solution, having this successful case now gives us the confidence to apply and propose it for future projects as well,” Mobile Create Co., Ltd.
As Micro-LED displays and advanced semiconductor components push the limits of miniaturisation and efficiency, precision and scalability in manufacturing become critical. The technology-pioneering company Micraft Systems Plus has developed two cutting-edge systems that meet these demands: the uLED Laser Soldering Machine and the HBM High-Accuracy Die Bonder. Both rely on industrial cameras from the USB3 uEye CP series from IDS Imaging Development Systems to deliver maximum accuracy, speed, and process control. These systems are already in high-volume use across the Asian electronics market. 20MP USB3 uEye CP cameras Application 1: Micro-LED Transfer & Laser Soldering with 20MP USB3 uEye CP cameras uLED Laser Soldering Machine is designed for high-speed, even of Micro-LEDs onto large-area substrates The uLED Laser Soldering Machine is designed for high-speed, precise of Micro-LEDs onto large-area substrates, including G4.5 and G6 glass panels. Laser soldering minimises thermal and mechanical stress, which is essential when handling thousands of miniature components simultaneously. Firstly, the cameras are used to capture global reference marks for the preliminary alignment or to determine the rough position of the substrate in the machine coordinate system. This position data is then transmitted to the motion control system, which enables high-precision motion control on this basis - with a repeat accuracy of the coordinates of around ±1 µm. Dynamic rotation correction Once qualified, the chips are aligned and transferred with extreme precision. For fine adjustment, the cameras now capture fiducial marks, enabling real-time sub-micrometer alignment of the substrate and, if necessary, dynamic rotation correction. The alignment results are then transmitted to the motion control system, which adjusts the stage position and angle to ensure each Micro-LED is perfectly matched to the target location. Initial inline visual inspection The camera automatically moves to the relevant area, enabling operators to perform an initial inline visual inspection With a throughput rate of up to 10 million chips per hour, the system delivers both exceptional accuracy and high-volume efficiency, a key performance indicator (KPI) for scalable mass production. After bonding, the camera automatically moves to the relevant area, enabling operators to perform an initial inline visual inspection - such as verifying chip alignment, detecting potential tilt, and checking for physical damage or placement errors. This step is critical in mass transfer operations where yield optimisation is essential. Advanced camera tasks in the micro LED process USB3 uEye CP cameras from IDS are the eyes of the uLED Laser Soldering Machine. Throughout the Micro LED workflow, the two integrated U3-3800CP-M-GL Rev.2.2 cameras from IDS support several key process steps: Donor wafer inspection (prior to transfer): Cameras detect defects such as cracks or missing units, ensuring only functional Micro LED chips are selected. Alignment and placement (during mass transfer): Cameras identify alignment marks and fiducials on substrates and dies. The results are transmitted to the motion control system for sub-micron placement accuracy. Post-transfer inspection: The cameras verify that each Micro LED has been precisely positioned and is free of tilt, damage, or misplacement. Rework and repair: When necessary, cameras guide pick-and-place systems to replace individual chips with precision. IMX183 Rolling Shutter CMOS Sensor Camera is therefore ideally suited for complex image analysis in applications such as surface “Exceptionally high-resolution images with low noise levels ensure the capture of even the smallest details,” emphasises Damien Wang, Area Sales Manager APAC South East at IDS. The light-sensitive IMX183 Rolling Shutter CMOS Sensor from Sony's STARVIS series in the USB3 Vision industrial camera U3-3800CP Rev.2.2.provides outstanding image quality with a resolution of 20.44 MP (5536 x 3692) at 2.4 µm pixels and it delivers up to 19.8 fps. The camera is therefore ideally suited for complex image analysis in applications such as surface and display inspections. 12 MP USB3 uEye CP cameras Application 2: Die Bonding for High Bandwidth Memory (HBM) with 12MP USB3 uEye CP cameras The second system, the HBM High-Accuracy Die Bonder, is designed for advanced semiconductor packaging, especially HBM (High Bandwidth Memory) applications, where vertical stacking of dies requires micron-level precision. Here, two U3-3890CP-M-GL Rev.2.2 cameras from IDS locate the dies and bonding pads, provide precise coordinates to the placement unit, and enable accurate placement of each component. Inline inspection checks Inline checks every bond for placement accuracy, alignment integrity, and possible damage “The IDS camera is also mainly used for the alignment system in our HBM equipment. It identifies the positions of the chip and the target substrate and converts this information into coordinates for the motion control system to achieve precise positioning and alignment,” explains the manufacturer. The control unit uses these coordinates to guide placement with sub-micron accuracy, ensuring consistent results in high-density packaging. Inline inspection checks every bond for placement accuracy, alignment integrity, and possible damage. In high-density memory stacks, even minor misalignments can lead to electrical or thermal issues, making precise vision a must. Sensor performance for precise bonding The U3-3890CP Rev.2.2 is equipped with the rolling shutter CMOS sensor IMX226. The 12.00 MP sensor (4000 x 3000 px, pixel size 1.85 µm) from the Sony STARVIS series excels with exceptional light sensitivity and low noise levels. At full resolution, it delivers a frame rate of 33.2 fps. - perfect for fast, precise processes. Thanks to IDS camera integration, the system achieves repeatable accuracy and long-term process stability - ideal for complex 2.5D or 3D semiconductor packages. Vision technology at the core: IDS uEye CP Cameras To achieve the required speed and precision, both systems count on IDS’s uEye CP camera series To achieve the required speed and precision, both systems count on IDS’s uEye CP camera series. These compact (29 × 29 × 29 mm) cameras are built for industrial environments, featuring durable magnesium housing, Global Shutter CMOS sensors, and USB3 Vision connectivity. Thanks to the STARVIS series BSI ("back-side-illumination") technology, both sensors are ideally suited for tasks that require a perfect result even in low light conditions. Their high-resolution, low-noise imaging allows reliable detection of alignment marks, micro chip positions, solder bumps, and post-bonding joint quality, even at sub-micron scale. Crucially, their fast frame rate and minimal latency ensure seamless interaction with motion-control systems, providing real-time image data for rapid adjustments. These cameras also demonstrate strong thermal reliability, supporting continuous 24/7 operation essential in semiconductor factories. Integration and on-site calibration The standby mode reduces the power consumption in idle mode to a minimum and thus contributes to energy efficiency, making the industrial camera an environmentally friendly solution for long-term use. With the comprehensive software SDK from IDS, integration and on-site calibration become simple, making the uEye CP a foundational enabler for precision and throughput in packaging processes. Customer benefit: Scalable precision and increased efficiency The machine builder significantly enhanced process accuracy, repeatability, and reliability By integrating IDS vision technology into both platforms, the machine builder significantly enhanced process accuracy, repeatability, and reliability. Error rates fell, setup times shortened, and overall manufacturing efficiency improved - driving strong competitive advantage in both Micro‑LED displays and advanced semiconductor packaging. Both systems are already in use with pioneering manufacturers in Taiwan and Asia, showcasing how German-engineered vision technology seamlessly integrates with state-of-the-art automation to meet modern production demands. Outlook The market for semiconductor manufacturing – particularly in precision automation – is developing rapidly, and with it, the requirements for modern industrial cameras are also evolving. “Our customers are demanding high-resolution, compact, and absolutely reliable solutions more than ever before,” says Damien Wang. The trend toward higher resolution is a key driver of innovation: sharp, detailed images are essential for complex automation tasks. At the same time, stable performance under challenging operating conditions has become a fundamental requirement. “Many applications require continuous, uninterrupted operation. That’s why our focus is increasingly on cameras that perform reliably even in demanding environments,” emphasises the responsible project manager from Micraft Systems Plus. Another trend is ongoing miniaturisation. Industrial cameras with compact form factors are gaining importance, as space in modern systems is often limited – without any compromise in performance. To address these developments, the product portfolio is being strategically expanded and adapted to meet the growing technical demands.
Summer is here, and with it comes the height of music concerts and festival season. As thousands of music fans gather at venues worldwide, security professionals face increasing challenges in protecting these large-scale events. Milestone Systems, a globally renowned provider of open platform video management software (VMS), is helping security teams leverage integrated technology solutions to enhance safety and create seamless experiences for the thousands of fans attending these events. Comprehensive security via unified technology Securing large-scale public events like music festivals and concerts has become increasingly complex Securing large-scale public events such as music festivals and concerts has become increasingly complex amid evolving threats ranging from severe weather and crowd surges to targeted attacks. To meet these challenges, security professionals are adopting open-platform video management technologies that unify data from fixed cameras, drones, mobile devices, thermal sensors, and AI-driven analytics into a single, real-time operational interface. Flexible VMS platforms These advanced systems support coordinated decision-making between venue security, law enforcement, and emergency services, streamlining both response and prevention. Flexible VMS platforms are particularly valuable for overlaying event-specific venue maps, an essential feature when layouts change frequently for different events throughout festival season. Key technologies for event security Event security professionals are increasingly deploying integrated technology solutions to enhance safety at large gatherings: Video Management Software (VMS): Central platforms that integrate and manage multiple security technologies Thermal Cameras: Detect unauthorised fires, overheating equipment, and monitor crowd density Drone Surveillance: Provides aerial overwatch for large areas with real-time video feeds AI-Powered Analytics: Identifies unusual patterns, counts crowds, and detects potential threats Access Control Systems: Manages entry points with credential verification Mobile Command Centres: Specially equipped vehicles that serve as on-site security headquarters Real-world applications demonstrate value The Jelling Music Festival in Denmark exemplifies how effective video security enhances event safety. This year's festival, hosting nearly 40,000 attendees over four days, features 60 cameras throughout stages, entrances, and the campsite. All video feeds are monitored via Milestone's video management software on 65-inch smart screens in a specially equipped emergency command truck. Thermal cameras at the campsite offer advanced detection capabilities, enabling quick identification of unauthorised fires or barbecues. Open VMS technology Security teams are testing new abilities, including software that accurately counts attendees in specific areas The festival has grown from 1,000 spectators and 16 performances in 1989 to its current scale, thanks to open VMS technology that helps prevent overcrowding around the stages. Security teams are testing new capabilities, including software that accurately counts attendees in specific areas, providing critical data for crowd management and emergency response. Response times and overall crowd safety The synchronisation of video, audio, and geospatial data across agencies creates a shared operating view that improves response times and overall crowd safety. Security professionals can implement thermal imaging, IR-enabled cameras, and drone surveillance to create more adaptive and resilient event security strategies.
The Chiba Taxi Association manages over 5,000 taxi vehicles across its eight branches in Chiba Prefecture. Among them, the Keiyo Branch and the Keiyo District Taxi Operations Council have led efforts to install network cameras at key terminal stations for the past 18 years. These systems have supported the monitoring of taxi stand congestion, crime prevention, and emergency response, including the identification of stranded commuters during disasters. Network camera systems Initially, this operation was manually handled by on-site traffic supervisors In response to taxi deregulation by the national government in 2002, large numbers of taxis began flocking to station stands, creating serious congestion. To address this, the association introduced its first “Taxi Satellite System,” which temporarily redirects waiting taxis to offsite parking areas and calls them back via radio when space becomes available at the station. Initially, this operation was manually handled by on-site traffic supervisors, but over time, it transitioned to camera-based monitoring using network camera systems. New monitoring system At the time, deploying network cameras to support such a system was a groundbreaking move in Japan—considered both advanced and innovative. This camera-based approach helped reduce congestion and wait times while also contributing to public safety and convenience. Building on this long-standing commitment to safer and more efficient taxi operations, the association has now introduced a new monitoring system powered by VIVOTEK cameras at JR Maihama Station—a station widely known as the gateway to Tokyo Disney Resort. The goal is to visualise and manage congestion caused by overtourism in the area. Challenges Overcrowding Around a Major Tourist Hub Buses and taxis were unable to access the station due to heavy traffic caused by private vehicles JR Maihama Station serves tens of thousands of passengers daily, many of whom visit Tokyo Disney Resort, located just a five-minute walk away. Adding to the strain, inbound tourism surged in Japan after COVID-19, making evening hours—especially after 8 PM—particularly congested. In some cases, buses and taxis were unable to access the station due to heavy traffic caused by private vehicles. Staff Shortages from an Aging Workforce In the past, supervisors were stationed at major terminals to monitor congestion, maintain order at the rotary, and prevent unauthorised taxi operations—particularly by Tokyo-based taxis operating outside their jurisdiction. However, in recent years, the association has faced increasing challenges due to an aging workforce and a declining pool of available personnel. Solutions Full-Surround Coverage with Fewer Cameras The wide field of view from a single camera helps reduce both installation and maintenance costs VIVOTEK’s fisheye cameras provide seamless 360° coverage, eliminating blind spots and enabling comprehensive monitoring of the taxi stand area with fewer units. This not only enhances situational awareness but also proves valuable during investigations and when sharing footage with law enforcement. The wide field of view from a single camera helps reduce both installation and maintenance costs. Additionally, the camera’s built-in IR illuminator ensures clear video even low-light conditions—an essential feature for round-the-clock taxi operations. Remote Monitoring for Smarter Dispatching Live footage from the cameras is streamed directly to taxi and bus company dispatch centres, enabling remote monitoring of congestion at taxi stands without the need for on-site staff. This has streamlined the dispatching process and helped alleviate overcrowding. By gradually shifting from manual patrols to camera-based monitoring, the association has also mitigated labour shortages while achieving significant improvements in both cost saving and operational efficiency. Benefits The association continues to leverage both new and existing camera systems Camera footage is also shared with local law enforcement. Under a crime prevention agreement with the Urayasu Police Station of the Chiba Prefectural Police, the footage has been utilised for both investigation and deterrence. The association continues to leverage both new and existing camera systems—not only to ease congestion at taxi and bus stands but also to help maintain a peaceful environment and support the creation of a safer society. Results and customer feedback In February 2025, the association began full operation of its new “Taxi Stand Digital Signage & Monitoring System” at JR Maihama Station. As a key component of the system, the association selected VIVOTEK’s FE9382-EHV-V2 fisheye cameras. “Our first encounter with VIVOTEK was at IBS Japan’s booth during the Mass-Trans Innovation Japan exhibition, where we were impressed by the camera’s performance. Since then, we have consistently relied on VIVOTEK cameras for crowd monitoring, digital signage condition monitoring, and taxi stand security,” Mr. Kumagai, Deputy Director, Keiyo Branch, Chiba Taxi Association/Keiyo District Taxi Operations Council.
In 1979, nine districts and five cities in Bavaria, Germany, founded a joint association for the disposal of residual waste. They targeted future-oriented, environmentally friendly and economical fulfilment of local statutory obligations. Now with 17 association members, ZMS (Zweckerverband Müllverwertung Schwandorf) disposes waste for around a fifth of Bavaria, almost two million citizens. They also use the energy generated by the waste power plant as efficiently as possible. Different levels of security Devices and other access hardware also need high weather resistance, for deployment outdoors In the past, a mechanical locking system was used on all ZMS properties. The association planned a digital upgrade to boost flexibility over their existing mechanical locking. Their principal site at Schwandorf has areas requiring different levels of security. Devices and other access hardware also need high weather resistance, for deployment outdoors. Managers also considered workflow efficiency. They wanted a way to manage access authorisations more flexibly and align security infrastructure with upcoming IT security laws such as NIS2. Digital Access Solutions from ASSA ABLOY The company chose eCLIQ, part of the suite of Digital Access Solutions from ASSA ABLOY. This innovative, programmable key-based solution now equips not only the power plant and headquarters in Schwandorf, but also buildings across eastern Bavaria, including transfer stations, a waste disposal site, a sorting plant in Bodenwöhr, and a sludge drying plant, as well as all technical and commercial offices, gate control systems and local control points. Because eCLIQ offers a broad range of digital cylinders within its single ecosystem, it suits diverse and complex organisations like ZMS. The benefits of programmable key-based digital access These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors The digitally networked eCLIQ system allows access rights and security levels to be defined and assigned flexibly and precisely. A total of 20 Wall Programming Devices (Wall PDs) installed in the head office and branch offices ensure that only authorised employees gain access. These Wall PDs also make it easy to set limited access time windows for fitters or maintenance contractors. If a key is lost, it can be programmed out immediately to prevent misuse. Standard eCLIQ keys “Now we are going with the times and can conveniently enjoy a wide range of advantages,” says Manuel Emerich, Project Manager at ZMS. “As a critical infrastructure company, we can also react very rapidly and flexibly to future requirements.” The solution offers the advantage that a depleted battery does not render a cylinder useless With eCLIQ, each of ZMS’s approximately 1,000 wireless digital cylinders is powered by a battery inside the keyholder’s personalised key. Standard eCLIQ keys have a battery life of 10 years with typical usage. The solution offers the advantage that a depleted battery does not render a cylinder useless. The key is simply fitted with a spare battery, saving time and effort. Future of evolving physical and cyber-security threats Security is a critical concern at municipal and infrastructure sites: every eCLIQ device offers reliable protection against manipulation and intelligent break-in attempts. Keys are robust, with a waterproof casing, and operate reliably in the most challenging environmental conditions. With eCLIQ, ZMS feel ready to face a future of evolving physical and cyber-security threats. “For us, the introduction of digital locking technology and the ability to respond quickly and specifically to security incidents is a decisive step towards a holistic and future-proof system to defend against cyber–physical threats,” adds Manuel Emerich.
Clever video management and AI-driven analytics has led to significant improvements in traffic flow, public safety, and operational efficiency in one of the U.S. Midwest’s most forward-thinking cities. Milestone Systems, a world-pioneering provider of open platform video management software (VMS), collaborated with the City of Dubuque, Iowa, to enhance traffic management – a project powered by Milestone’s XProtect VMS and Vaidio’s Vision AI platform. Data-driven video technology insights Dubuque has deployed a smart traffic insights solution that integrates real-time video analytics Dubuque, known for its innovative approach to city management, sought to maximise the value of its expansive video network—over 1,300 cameras citywide. While these cameras provided extensive coverage, city officials wanted to go beyond basic monitoring to extract actionable intelligence that could improve traffic management and public safety. Through the collaboration with Milestone Systems and Vaidio, Dubuque has deployed a smart traffic insights solution that integrates real-time video analytics with traffic signal systems. The platform enables automated traffic monitoring and incident detection, allowing the city to make data-driven decisions that enhance mobility and efficiency. Milestone’s open platform video technology “We wanted to leverage our existing investments in video infrastructure to not only improve traffic flow but also enhance public safety and emergency response,” said Dave Ness, Traffic Engineering Manager for the City of Dubuque. “Milestone’s open platform video technology has allowed us to integrate cutting-edge analytics and create a truly intelligent traffic management system.” Full potential of video technology Dubuque unlock the full potential of video technology to create smarter, safer CEO of Milestone Systems Thomas Jensen stresses that the company is committed to helping cities like Dubuque unlock the full potential of video technology to create smarter, safer, and more efficient urban environments. “Our collaboration with the City of Dubuque demonstrates how intelligent video solutions can transform traffic management and enhance quality of life for residents,” he said. Enhanced traffic flow, safety, and sustainability The implementation of this technology has already delivered measurable benefits to Dubuque’s residents: Reduced Travel Times: Optimised traffic signals and real-time monitoring have led to smoother traffic flow, cutting down commute times and reducing congestion. Improved Public Safety: Faster emergency response times and enhanced incident detection have contributed to a safer urban environment. Increased Operational Efficiency: Automated processes free up city personnel to focus on high-value tasks, ensuring resources are used effectively. Environmental Benefits: Reduced idling times lead to lower fuel consumption and emissions, supporting Dubuque’s sustainability initiatives. Advanced AI-powered analytics in action By integrating Vaidio’s Vision AI platform with Milestone’s XProtect VMS, the City of Dubuque has enhanced its traffic management system with advanced video analytics. The solution enables real-time traffic monitoring, counting vehicle volumes, analysing turn movements, and refining signal timing for optimised flow. Automated anomaly detection helps identify wrong-way vehicles, accidents, and other hazards, allowing for quicker response. Variety of analytics functions Vaidio works with any camera and allows a wide variety of analytics functions to be performed Additionally, the system tracks pedestrians and cyclists, supporting the city's broader transportation and safety initiatives. Because Vaidio works with any camera and allows a wide variety of analytics functions to be performed on each camera, even switching between functions as needed, the City of Dubuque was able to leverage existing hardware and minimise the total cost of ownership. How cities leverage video analytics for transportation “Working together with Milestone and Dubuque allowed us to tailor our AI models to address the city's unique traffic challenges,” said David Jenkins, VP of Software Architecture at Vaidio. “This collaboration has driven real-world improvements in how cities leverage video analytics for transportation.” The Dubuque project has also been part of the foundation for Milestone’s Project Hafnia which was announced together with NVIDIA in March. Milestone’s broader innovation initiatives Dubuque project has also been part of the foundation for Milestone’s Project Hafnia "The City of Dubuque’s use of AI-powered video analytics for traffic management aligns with Milestone’s broader innovation initiatives, including Project Hafnia,” said Thomas Jensen. “Project Hafnia leverages NVIDIA Nemo Curator, aiming to build next-generation AI models for transportation by curating and training on high-quality, compliant video data. Insights from deployments like Dubuque’s smart traffic system contribute valuable real-world data that can help enhance future AI-driven urban mobility solutions." Integrating intelligent video analytics Dubuque’s success in integrating intelligent video analytics serves as an example for other municipalities looking to enhance traffic management through technology. Milestone Systems remains dedicated to supporting smart city initiatives worldwide, providing municipalities with powerful video technology solutions that drive innovation, efficiency, and safety.


Round table discussion
Future-proofing your skillset is about embracing continuous learning and developing a versatile set of competencies that remain valuable regardless of technological shifts or industry changes. In the security marketplace, it is not about predicting the exact jobs of the future, but rather equipping yourself to adapt and thrive in the uncertain security landscape. But where to begin? The emerging technology shifts in the security industry provide clues, such as the growing importance of cybersecurity and artificial intelligence (AI). We asked our Expert Panel Roundtable: How can physical security professionals “future-proof” their skillsets to prepare for emerging technologies?
In the physical security marketplace, artificial intelligence (AI) has evolved beyond the novelty phase. The emphasis has now shifted to the more practical aspects of implementing AI technology. That a system implements AI is no longer impressive in and of itself. The question becomes: What can this AI system do for me? How can it improve my physical security stance? We asked our Expert Panel Roundtable: How is artificial intelligence (AI) transforming physical security?
In many cases, architectural design and layout dictate optimal placement of security devices like cameras, access control readers, and sensors. Poor design can lead to blind spots, reduced coverage, and ineffective surveillance. However, planning that involves all the various stakeholders can maximise both security and design elements. We asked this week’s Expert Panel Roundtable: When are building design and physical security systems complementary? When are they at odds?
Products


White papers
Top 7 trends to watch in the physical security industry
Download
Troubleshooting IP video systems
Download
Simple Security Solutions for SMBs
Download
5 question check-up: Test your camera's cybersecurity
Download
How to migrate to an IP-based access control system
Download
Six ways to eliminate costs, risks and disruption to your network
Download
The critical importance of Trusted Execution Environment in access control
Download
Security investments retailers should consider for their 2021 budget
Download
Optimise your business with analytics and AI
DownloadMaking sense of today’s security camera options
Download
How to drive B2B security & operations with smart surveillance
DownloadMaking your surveillance cyber secure
Download
Is access control in the cloud more cost effective?
DownloadWhat are the security technology needs of the hotel sector?
Download
Network Security Redefined: IP-Enabled Access Control
Download

Videos
IP security solutions: Manufacturers & Suppliers
- Dahua Technology IP security solutions
- Hikvision IP security solutions
- exacqVision IP security solutions
- Honeywell Security IP security solutions
- Bosch IP security solutions
- AV Costar IP security solutions
- LILIN IP security solutions
- IDIS IP security solutions
- Pelco IP security solutions
- Axis Communications IP security solutions
- Vicon IP security solutions
- Messoa IP security solutions
- Hanwha Vision IP security solutions
- VIVOTEK IP security solutions
- BCDVideo IP security solutions
- Climax Technology IP security solutions
- CIVINTEC IP security solutions
- eneo IP security solutions
- Avigilon IP security solutions
- Software House IP security solutions
Aligning physical and cyber defence for total protection
Download
Understanding AI-powered video analytics
Download
Enhancing physical access control using a self-service model
Download
How to implement a physical security strategy with privacy in mind
Download
Security and surveillance technologies for the casino market
Download
