IR cameras
FLIR, a pioneer in high-performance marine thermal-imaging systems, announced the debut of its new flagship series of multi-spectral maritime camera systems, the M460 and M560. The M460 and M560 are elite AI-powered multi-spectral camera systems tailored specifically for professional marine applications ranging from first responders, commercial vessels, and superyachts. Taking the next step from a conventional thermal camera, the M460 and M560 are complete marine-imaging systems that combin...
i-PRO Co., Ltd. (formerly Panasonic Security), a major global manufacturer of edge computing cameras for security and public safety, announces a major expansion of its EMEA Partner Program. The move supports i-PRO’s long-term growth strategy and commitment to building a dynamic, future-focused partner ecosystem. Unveiled last month at the i-PRO EMEA i-Summit 2025 annual partner conference in Barcelona, the enhanced program reinforces i-PRO’s position as one of the most partner-cent...
MKS Inc., a global provider of enabling technologies that transform the world, announces the next generation of Newport™ ODiate® Fluorescence Filter Sets, an expanded filter portfolio that includes precision single-band optical filters as well as new multi-band optical filters designed for fluorescent imaging. The new DAPI/TRITC and FITC/Cy5 dual-band filters provide single-band filter level signal performance in multi-band filters, allowing for the simultaneous detection of multiple...
Teledyne FLIR OEM, part of Teledyne Technologies Incorporated, announces Dragoon is using the Prism™ Supervisor and Prism SKR software for its AI-driven object detection, tracking, real-time autonomy flight control, and mission planning capabilities within its long-range unmanned platform prototypes under Project Artemis, a Defense Innovation Unit (DIU) initiative. Project Artemis is a program designed to evaluate and deploy long-range loitering munitions capable of operating in highly co...
Intellian is proud to announce the launch of the next generations of its v240M dual-band 2.4m antenna and Intelligent Mediator. Together, the new v240M Gen-II and Intelligent Mediator Gen-II enable auto-switching between C- and Ku-band communications, GEO and MEO satellite tracking, and management of up to eight antennas and modems. Seamless band switching Developed from the v240M – the world’s first antenna to provide auto-switching 2.4m performance in both C- and Ku-band on a si...
SightLogix, a pioneer in intelligent outdoor security solutions, has announced dual-spectrum AI for its dual-sensor SightSensor product series. This new capability integrates thermal and visible AI validation, providing unmatched, real-time intrusion detection that minimises false alarms. Reliable and immediate awareness is mandatory for high-performing perimeter security solutions in critical infrastructure and commercial remote video monitoring applications. Edge-based intelligence Th...
News
Motorola Solutions announced the new Pelco, an innovative portfolio of artificial-intelligence-powered devices that are purpose-built for enterprises operating in some of the most challenging environments, like oil and gas and ports. Backed by the company’s deep engineering expertise and significant investments in research and development. Smart surveillance The portfolio brings together specialised security technologies from the strategic acquisitions of VideotecPelco’s device lineup features fixed cameras, ruggedised and long-range cameras, smart sensors and AI analytics that easily integrate with a broad set of third-party video management systems (VMS). Since acquiring Pelco in 2020, Motorola Solutions has completely transformed the camera line, which has more than doubled in breadth since the company brought engineering and design in-house. Under a contemporary new Pelco mark, the portfolio brings together specialised security technologies from the strategic acquisitions of Videotec, IP Video and Silent Sentinel. Advanced threat detection “Pelco provides security operators with robust AI-powered security solutions capable of performing across a wide range of environmental conditions,” said Hamish Dobson, corporate vice president, Pelco. “We’ve purposefully created Pelco to combine rugged hardware, state-of-the-art sensing and AI-powered analytics for a VMS-agnostic device portfolio that is driving higher standards in critical infrastructure security.” Expanding security solutions Expansions to the portfolio broaden growth opportunities with enterprises and critical infrastructure verticals like transportation, aviation, maritime and utilities. Such operations routinely endure extreme weather, corrosive elements and other hazardous conditions where standard security cameras and devices would quickly be damaged. Precision in protection Pelco’s new specialised portfolio includes: Esprit Anti-Corrosion cameras that can withstand the harsh elements of maritime environments. The ExSite Enhanced Thermal 2 fixed camera, which gives hazardous sites like power plants a thermal imaging security camera with global explosion-proof certifications. The Halo Smart Sensor, an all-in-one intelligent sensor that protects privacy while detecting events like vaping, gunshots, abnormal noises, motion and emergency keywords like “help.” The Aeron and Jaegar cameras, which offer detection capabilities at distances of up to 20 miles in extreme environments associated with military, aviation, maritime and critical infrastructure. All Pelco devices are supported by Elevate, a cloud-based camera support platform. Elevate assesses camera health and expands the sensing capabilities of the camera with cloud-based AI. Future-ready surveillance Pelco devices are engineered to be compatible with Open Network Video Interface Forum (ONVIF) -conformant systems, simplifying installation, enabling flexible integrations and alleviating costly system overhauls. Pelco IP cameras enable regulatory compliance with the current National Defense Authorisation Act (NDAA) Sec. 889 rules for the procurement of secure equipment. Experience the new Pelco at booth #14059 at ISC West from April 2-4 in Las Vegas.
At ISC West 2025, April 2-4, in booth 11053, Bosch will demonstrate artificial intelligence-enabled video solutions that empower proactive responses to improve security and safety for customers. An expanded Intelligent Video Analytics Pro (IVA Pro) suite, now including 12 Licence, uses deep neural network-based video analytics for accurate, precise, and reliable detections, alerts, and data capture. Introducing the next level in visual intelligence, Bosch will also preview IVA Pro Context, a solution that adds AI reasoning capabilities to support the automation of decisions for improved operational efficiency. Moving toward technology IVA Pro Context goes beyond object detection for deeper scene understanding by interpreting environments Visual intelligence helps users find meaningful information in video footage, recognize patterns, and understand what may happen next. By anticipating potential incidents and initiating a quick response, users can address adverse situations before they become a problem. At ISC West, visitors will experience how IVA Pro Context goes beyond object detection for deeper scene understanding by interpreting complex environments and providing insights about what is happening. AI-driven risk management It quickly analyses images for situations based on users’ free text prompts without being trained for specific objects or behaviours. With integration into organisational processes, it can suggest actions to mitigate risk and alert responsible personnel. The demonstration will provide insight into the future of AI-enabled video solutions that will bring even greater value to customers. Growing suite of IVA Pro IVA Pro offerings provide insights on object classification, attributes such as vehicle models or clothing colours, and counting data to support solutions for perimeters, cities, buildings, and much more. Seven new IVA Pro Licence join previously released offerings for a powerful suite of application-specific analytics. The solutions help users make informed decisions in critical security and safety situations or to leverage business intelligence beyond security. Long-distance detection response The new licence include an enhanced IVA Pro Perimeter that layers AI object detectors The new Licence include an enhanced IVA Pro Perimeter that layers AI object detectors with video analytics technology that is highly sensitive to directed motion for early detection of people alongside perimeters at long distances. It detects individuals approaching a perimeter even if they are rolling, crawling, or have camouflaged themselves, while minimising false positives. Security personnel benefit from more time to make appropriate decisions based on data that includes geolocation, object type, speed, and size. Capture accurate vehicle data In cities and on highways, IVA Pro License Plate Recognition and IVA Pro Vehicle Make Model capture data on vehicle plates, types, and brands to support informed decisions about traffic management, parking policies, and fleet operations. Detailed data enhances the effectiveness of traffic analysis by providing the insights needed to keep traffic flowing safely and efficiently. Attributes to speed investigations IVA Pro Appearance detects and captures granular data on physical attributes of individuals, such as clothing colour and the presence of hats, glasses, backpacks, and more. When used with forensic search, it speeds investigations with easier video evidence retrieval, enhancing the safety and security of public areas. Complete camera portfolio ISC West attendees can see these and more IVA Pro offerings in action, including IVA Pro Visual Gun Detection, IVA Pro Buildings, and IVA Pro Traffic, at the Bosch booth. The demonstrations will highlight the power of the latest generation of Bosch cameras with edge-based AI. The 3100i, 5100i, 7100i, and 8100i series of cameras deliver superior imaging and intelligence, providing customers options that range from budget-friendly to high-performance to meet their requirements. On-premise cloud-based event Booth visitors will also see that managing event notifications from IVA Pro and viewing associated video is supported by the Bosch Video Management System and VideoView+ as well as solutions from industry partners, such as those from Genetec, Milestone Systems, and Eagle Eye Networks. These integrations provide customers the flexibility to manage video in the way that best fits their needs through on-premise or cloud-based solution options.
Teledyne FLIR OEM, part of Teledyne Technologies Incorporated, announced Prism™ SKR, the newest addition to the Prism embedded software ecosystem. Prism SKR, pronounced “seeker,” sets a new standard in precision automatic target recognition (ATR) for autonomously guided weapon systems, including loitering munitions, air-launched effects (ALE), counter-unmanned aerial systems (C-UAS), low-cost missiles, and smart munitions. Prism SKR's advanced algorithms Prism SKR operates seamlessly at the edge on low-power embedded processors Prism SKR operates seamlessly at the edge on low-power embedded processors. Compatible with both infrared (IR) thermal and visible camera data, Prism SKR's advanced algorithms provide real-time target position, identification, direction of motion, and aim-point localisation. The target information is used to guide the platform's autonomous flight system for air-to-ground (A2G), ground-to-air, air-to-air, and ground-to-ground operations. Prism embedded software ecosystem “Compatible with existing autonomy and navigation software via a Weapon Open System Architecture (WOSA) compliant interface, Prism SKR represents a significant leap forward in autonomous precision target detection, identification, and tracking technology for defence OEM developers and integrators,” said Dan Walker, vice president of product management, Teledyne FLIR OEM. “Additionally, developers can reduce development risk and costs with plug-and-play integration with the Prism embedded software ecosystem and Teledyne FLIR IR camera modules.” Prism AIMMGen synthetic dataset Custom target lists can quickly be incorporated using the Prism AIMMGen synthetic dataset The Prism software ecosystem streamlines development and shortens time to market with out-of-the-box compatibility. Starting with the Prism AI embedded software, developers and integrators can utilise detection and tracking models leveraging Teledyne FLIR OEM's six million visible and thermal annotations. Custom target lists can quickly be incorporated using the Prism AIMMGen synthetic dataset and model training toolchain. Finally, Prism Supervisor empowers autonomous mission control and platform guidance with Prism SKR, where ATR is required. Ultimate solution for OEMs With its advanced features, robust ecosystem, and a complete application programming interface (API) and software development kit (SDK) for customisation and performance optimisation, Prism SKR is the ultimate solution for OEMs seeking to enhance the precision and reliability of autonomous weapon systems. Teledyne FLIR OEM will show Prism at SPIE Defense + Commercial Sensing in Orlando, Florida, April 13-17, 2025.
Quanergy Solutions, Inc., a global pioneer in high-performance LiDAR-based security and smart space solutions, announces a technology partnership with Netsocs. An integration and automation software solution provider specialising in electronic security. Smart security with LiDAR Netsocs’s versatile and powerful management platform helps to deliver unparalleled operational intelligenceThe partnership combines invaluable data from Quanergy 3D LiDAR sensors with Netsocs’ highly versatile and powerful management platform to deliver unparalleled operational intelligence and security for large-scale enterprises with the highest levels of cost-efficiency. Netsocs flexible architecture can be deployed in the cloud under a SaaS model, on-premises, or in a hybrid environment enabling customised deployment tailored to the specific needs of each project. The SaaS model transforms the investment into an operational expense (OPEX) instead of a capital expenditure (CAPEX), allowing easy access to cutting-edge technology without high upfront costs. Real-time insights “Our collaboration with Netsocs underscores Quanergy’s commitment to innovation and market expansion,” said Gerald Becker, Vice President of Market Development and Alliances at Quanergy. “This integrated solution delivers the real-time analytics essential for proactive security and efficient business management, setting a new industry benchmark.” Next-gen security solutions Integrated solution provides actionable insights for faster decision-making, and improved operational efficiencyTraditional security and management systems often operate in silos, causing delays and inefficiencies. By merging advanced 3D LiDAR event detection, object analysis and tracking with intelligent analytics. The integrated solution provides actionable insights for faster decision-making, proactive threat detection, and improved operational efficiency—all on a scalable, customisable single pane of glass platform. “The integration of Quanergy 3D LiDAR sensors to capture high-resolution 3D data with QORTEX perception monitoring software delivers actionable insights that enhance decision-making and streamline operations," said Netsocs partner, Carlos Jimenez. “This partnership makes the implementation of 3D LiDAR more accessible and efficient, maximizing return on investment from day one.” Applications for this innovative solution include: Enhanced Perimeter Security: Real-time intrusion detection and tracking Intelligent Traffic Management: Optimised flow and reduced congestion Automated Asset Monitoring: Improved tracking and reduced asset loss Advanced Crowd Management: Safe and compliant crowd analytics Key differentiators: Comprehensive integration A holistic view of operations and security beyond LiDAR applications Real-time data utilization Immediate insights that reduce response times and boost agility Customization and scalability A platform designed to evolve with diverse business needs This integration is poised to redefine operational intelligence by bridging physical security and enterprise management. By delivering immediate insights, it enables organisations to mitigate risks more effectively, streamline resource allocation, and boost business performance.
FLIR, an industry pioneer in visible and thermal imaging sensors for security applications, will use ICS West 2025 to show visitors how they can benefit from adopting a multi-layered approach to their security challenges. With extensive experience across applications that include fence line/perimeter protection, parking lots, outdoor area protection, and entry/interior area protection, FLIR designs its solutions as building blocks that can integrate to form a robust multi-layered security solution. Advancing security strategies ISC West 2025 is a comprehensive security trade event taking place from March 31 to April 4 ISC West 2025 is a comprehensive and converged security trade event taking place from March 31 to April 4 at the Venetian Expo convention center in Las Vegas, USA. On Stand 29075, FLIR will emphasise that today’s security response has to be precise, quick, flexible, and robust in the face of threats that are more intelligent and complex than ever before. Real-time threat detection Ensuring the safety and protection of people and the security of buildings is becoming ever more challenging, rendering traditional security models insufficient. The way forward lies in developing advanced situational awareness capabilities, namely a security framework that not only reacts to threats but also supports active prevention. Detecting threats in real time, responding with precision, and continuously adapting to emerging risks is crucial for upholding safety and security. Multi-layered security solutions FLIR cameras seamlessly integrate with third-party VMS complying with the US NDAA At ICS West 2025, FLIR will demonstrate how, using the latest multi-layered security solutions, turns this idea from concept into reality, creating several barriers for potential intruders. A combination of technologies strengthens each stage of the security journey from initial detection to identification and tracking, stopping threats before they cause harm. Smart perimeter protection By combining thermal, visible, and ground-based radar imaging with FLIR’s pioneering Virtual Barrier video analytics, multi-layered solutions provide the strategic building blocks to detect, identify, track, and act over a long range and in any weather conditions. Central to any multi-layered solution is thermal imaging technology. FLIR cameras integrate with third-party video management systems (VMS), adhere to strict cybersecurity protocols, and comply with the US National Defense Authorization Act (NDAA). FLIR’s camera innovations At ICS West, the FLIR stand will host a number of key camera innovations At ICS West, the FLIR stand will host a number of key camera innovations, including the FC-AI-R rugged thermal radiometric camera. The FLIR FC-Series AI-R integrates deep neural network and motion analytics. With a thermal sensitivity of <35 mK NETD, this advanced radiometric camera offers enhanced situational awareness and clear image quality for perimeter security and physical asset safety. AI-Powered thermal surveillance Also in the spotlight will be the FLIR Quasar PTZ AI PTZ (pan-tilt-zoom) infrared thermal camera. Featuring edge AI video analytics to detect and accurately classify humans and vehicles, applications include commercial and critical infrastructure sites, remote facilities, or any large area requiring close monitoring. Elsewhere on the FLIR stand will be the FH-R-PTZ, a multi-spectral pan-tilt-zoom radiometric camera. Upon detecting a hot spot or surface temperature change, the contactless temperature measurement is sent to the operator through a connected VMS for instantaneous assessment and deployment of response tactics. Expert security insights at ICS West Visitors to ICS West 2025 seeking a technical discussion about multi-layered security or any other solutions can tap into the expertise of FLIR professionals, with representatives from both engineering and sales available on the stand. A Spanish speaking representative will also be present.
IDS Imaging Development Systems GmbH, market pioneer in industrial machine vision, and Prophesee SA, inventor of the most advanced neuromorphic vision systems, announces that IDS’ new uEye EVS camera line incorporates the high-speed, dynamic range and data efficiency of the Prophesee-Sony IMX636HD event-based vision sensor to offer new capabilities for industrial machine vision applications. High-speed event-based vision The uEye EVS camera redefines high-speed machine vision for unprecedented precision The result of extensive collaboration between the two companies, the solution features Prophesee’s proven neuromorphic approach to capturing fast-moving objects with significantly less data processing, power and blur than traditional frame-based methods. With these capabilities, the uEye EVS camera is the ideal solution for applications that require real-time machine vision processing at very high speed, such as optical monitoring of vibrations or high-speed motion analyses. Conventional image sensors The camera benefits from Prophesee’s event-based vision’s ability to capture only relevant events in a scene. In contrast to conventional image sensors, it does not capture every image completely at regular intervals (frames) but only reacts to changes within a scene. It transmits events depending on when and where the brightness in its field of view changes - for each individual sensor pixel. The temporal resolution, i.e. the minimum measurable time difference between two successive changes in brightness, can be less than 100 microseconds. Metavision SDK integration The sensor is supported by Metavision SDK, a seamlessly integrated suite of software tool The sensor is supported by Metavision SDK, a seamlessly integrated suite of software tools and models, APIs, and other training and development resources from Prophesee for efficient evaluation, visualisation, and customisation. "This partnership combines our mutual areas of expertise to realise the benefits of event-based vision, including remarkable temporal resolution which make the cameras optimised for analysing highly dynamic scenes.” “It enables best conditions for capturing fast object movements without loss of information, comparable to an image-based frame rate of more than 10,000 images per second," explains Patrick Schick, Product Owner 3D & Vision Software. Enhanced efficiency & performance “At the same time, the sensor ignores all motionless areas of its field of view and thus generates 10 to 1000 times less data than image-based variants. This saves memory and computing time. IDS cameras are well known to address the toughest machine vision use cases and with the incorporation of Prophesee event-based vision technologies.” “It strengthens its offering to provide far more performance, power efficiency and accuracy, even in the most challenging conditions,” says Luca Verre, CEO and co-founder of Prophesee. “We are excited to see how the efforts of this tight collaboration have resulted in the new uEye EVS camera which leverages the potential of our sensors and development environment to deliver new value to its customers.”


Expert commentary
The autumn equinox, which marks the start of autumn, occurs this weekend on Saturday, September 23. With darker evenings ahead, the experts at ADT have shared five ways to maximise your home's security. Author's quote Michele Bennett, General Manager at ADT UK&I comments: “Opportunistic thieves use darkness to their advantage, so it’s no surprise that the number of burglaries committed increases when the darker nights draw in." He adds, "Our 2022 burglary report found that burglaries are most common at night, with 58% of burglaries occurring between 6 p.m. and 6 a.m. Taking steps to optimise your home’s security before the clocks go back this year will provide reassurance that your property is as secure as possible.” Five ways to secure your property: Get a monitored alarm installed: A visible alarm system is a strong deterrent to potential burglars, as criminals are less likely to target a home that is protected. In the event of a break-in, a monitored alarm will alert you, your keyholders and depending on the package you take out, the police, ensuring a swift response to an alarm activation. Light up the dark: Well-lit exteriors make your home less appealing to potential intruders. Install motion-activated lights around any entry points, particularly porches and gardens, which alert you to movement on your property. This will also prevent burglars from operating under the cloak of darkness and increase the chance of a passerby spotting suspicious activity. Trim your garden landscape: Thieves look for escape routes and hiding spots when deciding which homes to break into, making gardens with high, overgrown hedges more likely to be targeted. This is especially true in the darker evenings, so be sure to give your garden a thorough tidy-up to make your property less likely to be targeted. It’s also advisable to ensure any tools are locked away in sheds and garages that could assist a burglar such as ladders, or a garden spade to force entry. Be smart with your lights: Using smart plugs allows you to turn on a few well-appointed lights and radios or televisions from any location from your phone. Used in conjunction with an outdoor camera or video doorbell, you can have lamps plugged into smart plugs come on when motion is detected. Programming lights to come on at different times throughout the night will help to deter burglars by making your property look occupied. Purchase a smart doorbell or outdoor camera: Smart doorbells are an effective way to deter burglars as they provide evidence in the event of a break-in, package theft, or other suspicious activity around your home. They also notify you when someone is at your door reducing the chance of you being caught out by a late evening or early morning robbery. Further encroachment Smart doorbells also act as a deterrent to unscrupulous door-to-door sellers and con artists, as video footage is recorded. In the event of a late-night door knock, you can see and speak to whoever is at your front door, without having to open the door. ADT’s new outdoor camera also has two-way audio and a high-pitch deterrent siren so you can warn off anyone from your property to deter any further encroachment.
Nowadays to save costs by making full use of old devices while upgrading the old security projects, many integrators or installers prefer to use video management software to manage multiple brands of video devices (such as IP cameras, and NVR), instead of only one single brand. So that they could have more flexible choices to earn profits while saving costs. Multi-brands video device management On other hand, with market segmentation and specialisation, instead of managing the video by themselves, application service providers of different industries prefer video surveillance companies could help them to collect the video from various brands of front-end video devices. Thus they could focus more on application development according to the characteristic of different industries. Therefore to meet the requirements of the surveillance market, how to manage multi-brand video devices has become very important, especially for third-party video management software companies. Then how to manage multi-brands multi-brands video devices (such as IP cameras, and NVR) with your VMS system? The first step is: integration Preparing your system for video devices integration Selecting an open architecture VMS system allows for a deeper, seamless level of integration There’s more to integration than just the ability to plug in a video device. Does your VMS allow you to take advantage of the latest IP camera and other video device technologies? Does it support open architecture? Closed architecture systems offer limited integration. Selecting an open architecture VMS system allows for a deeper, seamless level of integration, and allows you to upgrade hardware at your own pace. It also allows you to expand your suite of security solutions in the future, as your needs change. Choosing a VMS system And these questions also need to be considered when choosing a suitable VMS system: Does your system support multiple protocols to communicate with video devices? Can your system easily integrate the private SDK provided by the IP camera manufacturer? Make sure the communication between multi-brand video devices (such as IP cameras, NVR) and your video surveillance VMS system can be put through. ONVIF Nowadays most famous overseas video surveillance manufacturers all support the standard protocol ONVIF, which enable VMS system easily to access their video devices (such as IP cameras, and NVR). Some will provide protocols like RTSP, HLS, HTTP-FLV, and Websocket. Some will provide their private protocols like EHOME/ISUP protocol and DHOME. And also GB/T28181, and GA/T1400 protocols are very popular in China. Simple and easy integration As for the VMS system, the more protocols it supports, the easier it can put through communication As for the VMS system, the more protocols it supports, the easier it can put through communication with the front-end video devices. Thus it will make the whole process of integration simple and easy. And about video surveillance manufacturers who only can provide SDK, in this way open architecture of VMS system is needed because it can help to put through the communication smoothly. The second step is management Since communication between front-end video devices and the VMS system is put through. VMS system can access, capture, and collect the video from the network video devices (both live and recorded). It then stores that video to dedicated data storage media (on-premises, external locations, or in the cloud), based on automated policies, pre-determined by the organisation. That is how a VMS system work. But if the front-end devices are different, they are using a different format, bitrate, and resolution. For example, one brand of IP camera uses H.265, 4K resolution, and the other brand of IP camera use H.264, 1080P. How can a VMS system manage them together? Video transcoding technology That requires the VMS system should have efficient video transcoding technology to convert different video formats and resolutions into unified video formats and resolutions, and strong video transmission technology to meet low bandwidth network adaptability. Smooth streaming automatically adjusts bit-rate and resolution between the VMS system and front-end devices according to real-time network conditions. For example: The video with a high bitstream can be converted to a low bitstream. 8K,4K,3M, 10 80P. .. → D1,CIF,VGA... Transcode video in different encoding formats to the unified encoding formats. H.265, MPEG4 → H.264 The third step: output standard video data for the third-party integration A good VMS system should provide convenient ways for several video processing applications. In interactions applications, particularly in media interchange, a good system should output standardised protocols and stream formats (such as HLS, RTSP, WebSocket, etc) according to the needs of the third party, so that the third party can easily acquire and use video from VMS system for the further application or development.
Currently and unfortunately, there is no such thing as Cloud Police. If there were, two-thirds or more of the companies using ‘cloud’ in their advertising and documentation would be in Cloud Jail for seriously misusing the word in their marketing. The term ‘Cloud’ is over-used and misused—sometimes intentionally and knowingly, but also often in ignorance. It’s just a word—but in the context of cloud computing technology, it does have a specific meaning in the United States. We may lack cloud police, but we do have a resource that defines cloud. Video surveillance system The National Institute of Standards and Technology (NIST) spells out the requirements in The NIST Definition of Cloud Computing. Regardless of where in the world your video system is located, there are certain, fundamental attributes of a ‘Cloud Video Surveillance System.’ A true cloud system would have significant advantages over a traditional on-premises server-based system A modern security video surveillance system is composed of securely connected video cameras (IP cameras and/or analogue cameras with encoders), video recorders, video display monitors, and video management software for managing equipment configuration and system performance configurations and for providing system operations functionality. Based on the NIST definition of cloud computing and its essential characteristics, a true cloud system would have significant advantages over a traditional on-premises server-based system. Cloud video management system Here's what a cloud video management system should provide: Infinite Scalability and an ‘Only Pay for What You Use.’ Cloud video surveillance systems are a subscription-based business model. Integrators derive recurring monthly revenue from the subscription, and the end-user only pays for what they use. True cloud systems do not charge you for unused disk space. Cloud Video System can be Operated and Managed from Anywhere. System management capabilities are off-site from camera locations for all system functionality. It should not be necessary to be on-site to view or export video or change system or device Redundant System Functionality. The software system functionality is redundant, so in the event of a computing or networking failure, alternate computing and/or networking resources immediately take over without human interaction. Recorder Isolation. Camera locations should transmit video off-site to a secure, SaaS service provider location. Redundant Video Storage. Video should be stored redundantly for business continuity and disaster recovery purposes, and automatically swap-in redundant storage if primary storage fails. Cybersecure Systems and Devices. On-site hardware, data transmission, and cloud systems must be cybersecure. Individual cameras must be protected from other cameras or devices on the network that could be malware-infected. Intelligent Video Data Transmission and Video Data The installer and users should be able to configure and adjust video traffic bandwidth usage--such as the percentage of available bandwidth. On-premises appliances should intelligently buffer video being sent to the cloud to accommodate fluctuations in internet bandwidth availability. Retention Assurance for Every Camera. Recorded video retention periods must be individually configurable on a per-camera basis. Instant Changes. Changes to video retention and/or user privileges must be instantly accomplished with the flip of a switch. Internet-Based Integrations. Integrations with system functionality must be available through a single secure and well-engineered applications programming interface (API) available via a secure internet connection to the cloud-based system software. Service Provider Account Management. Centralised monitoring and management of reseller accounts dashboard. System Performance Metrics. Maintain and chart a seven-day performance window of Camera LAN and internet packet loss, Camera LAN and Cloud Bandwidth Usage, per-camera video storage in hourly increments. Automatic Cloud System Upgrades. Feature and system security upgrades to cloud system software and cloud user applications, including periodic software and firmware updates on-premises appliances, should be automatically provided as they are released. On-Demand Periodic Full Hardware Replacement. To keep subscribed on-premises system physical hardware technologically current, provide on-demand complete hardware replacement at no charge every six years. Cloud computing characteristics Cloud mis-marketing commonly occurs when vendors use public cloud data centre capabilities—such as AWS, Google or Azure--to provide parts of their customer solution, without actually providing the customer with the full benefits of cloud computing. In these cases, vendors are wrongfully labeling the products or services ‘cloud’ offerings. Common mis-labeling includes: On-Premises System Backups to Cloud Data Centre Locations. Whether it is a private or public cloud data centre storing a system backup in a cloud location, if a manual action is required to restore the backup system, this is not a cloud system. Client-Server Based Applications Running in a Virtual Server. When a client-server application is installed in a virtual server in a public cloud—the same way it is done within an on-premises virtual server data centre—this is not a cloud application and does not provide the end-user with the benefits of cloud computing. Browser-Based Client-Server Applications. Software running in a ‘cloud’ data centre can provide a browser-based interface without conforming to the essential cloud computing characteristics. The browser is not the determining factor in a cloud system. Server Database Partitioning. The partitioning of a single client-server application database into separate customer partitions is not a cloud ‘multi-tenant’ model, because a shared database does not provide ‘different physical and virtual resources dynamically assigned and reassigned according to consumer demand,’ this is not a cloud-system architecture. Client-Server Camera Licences ‘Priced’ as a Subscription. Software companies that re-price their client-server software licenses into monthly billings and call them cloud subscriptions are not providing a cloud subscriber application Remotely Executed Upgrades. Remotely executed periodic upgrades of on-premises system software, performed as part of a service or support fee, are not a cloud computing service—regardless of whether the software upgrade image is stored in a cloud location. Assumed Cybersecurity. Service providers will on occasion mistake the cybersecurity credentials and certifications of their public cloud partner with the cybersecurity of the software service provider’s own application. See sidebar ‘Assessing A Vendor’s Cybersecurity Credentials.’ Cloud-Based applications Based on the nature of its software functionality, true cloud provides maximum value for the subscriber So how do we sum up true cloud? Based on the nature of its software functionality, true cloud provides maximum value for the subscriber because it’s engineered to take advantage of the characteristics of cloud computing to be cost-effective, flexible, and high performing for all use cases. Any vendor providing cloud-based applications should be able to explain in detail how they have applied the cloud computing characteristics--on-demand self-service, broad network access, resource pooling, rapid elasticity or expansion, and measured service--for the benefit of the subscriber. Provide independent validation Assessing a Vendor’s Cybersecurity Credentials - When end-users and resellers assess the cybersecurity credentials of vendors, it’s essential to check the documentation, read the fine print, and ask the right questions. Fortunately, there are some easy best practices to follow. SOC 2 Type 2 and ISO 27001 are rigorous assessments that take six months or more to complete It’s good news if your vendor has completed audits such as SOC 2 Type 2 and ISO 27001. Considered the gold standard of security audits, SOC 2 Type 2 and ISO 27001 are rigorous assessments that take six months or more to complete, and they provide independent validation that vendor’s policies and procedures meet and exceed cybersecurity standards. Internal vendor network Always take a close look at audits and credentials to determine if your vendor holds the cybersecurity credential themselves, or if the credential is held by one of their vendors. For example, some vendors who host software in the cloud—whether cloud applications or virtualised client-server applications—make the mistake of pointing to a SOC 2 Type 2 or ISO 27001 certification held by AWS or Azure or another public cloud whose services the vendor uses to run their software. However, such reports and certifications apply only to the cloud infrastructure on which the vendor’s software is running. The reports do not apply to the vendor’s software and the vendor’s own cybersecurity and data privacy practices, the vendor’s development environment, its technical support personnel or any internal vendor network that connects to its cloud system. Popular cloud computing The vendor itself must establish SOC 2 and ISO 27001 compliance for itself and provide that documentation The vendor itself must establish SOC 2 and ISO 27001 compliance for itself and provide that documentation. Other publicly available resources can be extremely helpful in assessing vendors’ cybersecurity credentials. A great example is the Security, Trust, Assurance, and Risk (STAR) Registry provided by the Cloud Security Alliance (CSA), that documents the security and privacy controls of popular cloud computing offerings. Vendors can submit a free questionnaire to show their security and compliance postures, including the regulations, standards, and frameworks they adhere to. Any cloud application service provider stating they have engineered sound cybersecurity for their cloud offering should back up that assertion by participating in the STAR registry program.—Ken Francis.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Milestone Systems wants to double its revenue in the next five years while also setting a new standard of how technology companies behave, spotlighting more responsible use of technology. In short, the open platform video management system (VMS) company seeks to revolutionise the industry, deploying data-driven video software in security and beyond. Milestone is also shifting the approach from tech-centric to emphasising business outcomes; that is, focusing on solving problems that keep their customers up at night. Integration partner program “Technology companies have a bad habit of falling in love with their own products,” says Thomas Jensen, Milestone CEO. “But if we cannot convey to customers what the products will do for them, then shame on us. We want to focus on business outcomes as the way we address our customers, drive business, and add value to companies. We want to focus on outcomes rather than the functions products perform.” We want to focus on business outcomes as the way we address our customers" At the MIPS 2022 Partner Summit in Minneapolis, Milestone outlined for their integrator and technology ‘partners’ the path to achieving these lofty goals. The vision includes revamping the integration partner program to eliminate two-thirds of their dealer count, with the remaining third more focused on Milestone and equipped with new marketing tools to succeed at even higher levels. Market development personnel MIPS (Milestone Integration Platform Symposium) is a combination education seminar, pep rally and mini-trade show. The yearly event continued virtually during the pandemic and is back in 2022 as a fully in-person experience — first in Dubai and then in Minneapolis for the Americas market. Milestone is also dramatically increasing its head count as an investment in the future, emphasising a ‘people-first’ mindset that sets the company apart, says Jensen. In the Americas market, Milestone has increased the size of the organisation by 75% in the last year. They have increased sales personnel 100% during that time, upped pre-sale technical personnel by 150%, and increased market development personnel by 200%. Cloud-based setups The future of data-driven video technology will include a mixture of on-premise systems, cloud-based setups, and a combination of the two (hybrid) Milestone intends to spend more money on marketing to reflect the evolving ‘buying journey’ of business-to-business customers, who often do more online research before reaching out to vendors. The new Milestone vision also requires a heightened focus on vertical markets, including applications beyond traditional security use cases. It also embraces cloud systems for small- to medium-sized businesses. The future of data-driven video technology will include a mixture of on-premise systems, cloud-based setups, and a combination of the two (hybrid). To expand their cloud offerings, Milestone announced the introduction of Kite, a Milestone-branded version of the cloud system developed by Arcules, a Canon sister company built on the Google cloud. The ‘pure cloud’ system, targeting small- to medium-sized businesses, will be offered in addition to a previously announced version of XProtect hosted by AWS (Amazon Web Services). The new Milestone vision also requires a heightened focus on vertical markets Safe cities applications Examples of applications ‘beyond security’ include use of video technology in safe cities applications to learn traffic patterns, adjust traffic flow, etc. In 2023, Milestone will launch XProtect Hospital Assist, targeting the healthcare vertical with applications beyond hospital security. For example, the system will address the shortage of nurses using video systems that can help to monitor patients remotely and detect falls. Blurring technology, applied per camera and in real time from a smart camera interface, will be used with video to protect patient privacy. Industry-based solutions “Each industry has different use cases, especially beyond security,” says Anders Bo Rasmussen, Director Product Direction at Milestone. “The demand is also increasing, which makes it difficult for a generic product to succeed. We are investing in finding more industry-specific use cases and transitioning to industry-based solutions. We must understand the language and the need to create intimacy that will eventually give us the business. We can be more competitive, more focused, and stand out more.” Another new vertical market product will address the hospitality industry, including gaming Another new vertical market product will address the hospitality industry, including gaming. Among other capabilities, the system can use video and facial recognition to recognise compulsive gamblers. Supporting casinos to meet legal requirements, the system will create value beyond video and beyond safety and security. Promoting human rights For one customer, a Milestone system ties together connected video and sensors on a cruise ship to respond to silent alarms without alerting guests that there is a problem. Another example involves using video in remote therapy sessions with children on the autism spectrum. Expanding in markets beyond security depends on Milestone being able to map the right stakeholders and broaden the appeal to other departments in a company. Security will continue to be the ‘gateway’ to additional business, at least in the near term. Security will continue to be the ‘gateway’ to additional business, at least in the near term Related to the responsible use of technology, Milestone subscribes to the United Nations Guiding Principles on Business and Human Rights, embracing emerging awareness of the responsibilities of business to promote human rights around the world. In practice, the commitment guides Milestone to avoid unconscious bias in products and recruitment and to perform due diligence when approving projects to ensure they do not impact human rights. Acceptable standards of surveillance Milestone has also taken a deliberate stand not to do business with companies that violate human rights. Another concern is responsible use of data. “Here is a warning for our industry: The Wild West is over,” says Jensen. “It’s our responsibility to use data in a responsible way. Now is the time to act to protect our current and future generations.” Responsible technology also extends to uses of artificial intelligence (AI), ensuring that a human directs system intent and complying with acceptable standards of surveillance throughout the world.
Case studies
Furnaces play a critical role in refining and petrochemical operations, providing the high temperatures required for essential processes. When they fail, the consequences can be severe both in terms of safety and operational losses. A single day of unplanned downtime can result in losses exceeding $1 million. This is why companies like PROtect, under the leadership of Jason Czajkowski, are leveraging modern infrared (IR) technologies to conduct smarter, safer, and more cost-effective furnace inspections. Evolution of IR furnace cameras IR technology in furnace inspections has evolved significantly over the past three decades. Early tools like the Agema 550 and Inframetrics 390 laid the groundwork for remote temperature diagnostics in extreme environments. These early cameras were bulky and required extensive setup, but opened the door to non-contact thermal inspections. Real-time thermal imaging FLIR’s GF309 became the workhorse of the industry, offering real-time thermal imaging through flames Later, FLIR’s GF309 became the workhorse of the industry, offering real-time thermal imaging through flames with improved ergonomics. However, the GF309’s 320 × 240 resolution limited its ability to detect fine anomalies, especially at a distance. Czajkowski recognised the need for greater clarity and transitioned PROtect to the FLIR G609, which features a 640 × 480 detector. This allows PROtect technicians to detect smaller anomalies such as hot spots, coke buildup, or insulation breakdowns earlier and from safer distances. Introducing the FLIR G609: A smarter tool for a safer job The G609 represents the latest in FLIR’s IR camera evolution. It is built specifically for high-temperature applications and comes equipped with a re-engineered heat shield, factory-calibrated furnace lens, and a modern touchscreen interface. PROtect’s field teams report that the camera’s intuitive controls and robust design make it a reliable tool in even the harshest conditions. With its increased resolution, the G609 can accurately measure temperatures on narrow furnace tubes deep within radiant sections, something older models struggled with. "It’s not just clearer images," Czajkowski explains, "It’s better decisions, faster." Complete solutions: Pairing the G609 with software With the Route Creator tool, inspections are no longer reactive they’re pre-planned and executed with precision What truly transforms the inspection process is the integration of FLIR’s Thermal Studio Pro software. With the Route Creator tool, inspections are no longer reactive they’re pre-planned and executed with precision. Technicians follow a defined route with inspection points loaded into the camera, eliminating guesswork and ensuring consistency. Manual sorting and documentation After inspections, images are automatically organised by inspection point, and reports are generated in minutes using professional templates. This saves countless hours of manual sorting and documentation, freeing up inspectors to focus on analysis and decision-making. According to Czajkowski, "This combination of camera and software creates a seamless workflow from planning to reporting." Real-world results: Safer plants, better uptime Early detection of a developing hot spot let a refinery to schedule a repair during planned downtime By adopting the G609 and an integrated software approach, PROtect has helped clients detect issues like burner misalignment and developing coking conditions early, preventing costly shutdowns. In one instance, early detection of a developing hot spot allowed a refinery to schedule a repair during planned downtime avoiding an emergency outage and saving hundreds of thousands in potential losses. Conclusion Infrared furnace inspections have matured from a specialty technique to an essential maintenance strategy. With modern tools like the FLIR G609 and expert leadership from professionals like Jason Czajkowski, PROtect is setting new standards for asset reliability. IR inspections now provide not only sharper thermal images but also faster workflows, greater safety, and measurable ROI. As Czajkowski affirms, "We’re not just taking pictures we’re delivering solutions that protect assets, budgets, and people."
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the full U.S. Department of Homeland Security SAFETY Act Designation. Announced that its proactive gun detection and intelligent situational awareness solution has been deployed by Carbon Cliff-Barstow School District (CCBSD) in Rock Island County, Illinois. Strengthening security with AI The ZeroEyes Gun Violence Research Centre has already analysed 34 gun-related eventsThe AI technology will be implemented at the district’s Pre-K through 8th grade school to enhance security and reduce response times in the event of a gun-related threat. The ZeroEyes Gun Violence Research Centre has already analysed 34 gun-related events at Illinois K-12 school districts this year alone. Recognising the ongoing threat of gun-related violence, the district is taking an important step by integrating ZeroEyes’ AI gun detection system to further bolster its security measures and protect against potential threats. Commitment to campus safety CCBSD maintains a comprehensive, multi-layered security programme in partnership with the Rock Island County Sheriff's Department to ensure the safety of students and staff. Alongside the district’s school resource officer, CCBSD has invested in a third-party monitored alarm system and recently upgraded its camera infrastructure. An on-site behavioural interventionist is also employed to build strong relationships with students and families. Strengthening security “We take great pride in ensuring the safety and success of all students and staff members at our school,” said Eric Lawson, Superintendent of CCBSD. “By incorporating ZeroEyes, we’re adding another important layer of safety to our campus, and we’re confident that this proactive approach will help us promote a safe learning environment.” Smart solutions with ZeroEyes CCBSD serves 240 students from diverse backgrounds in an urban area of northwest Illinois CCBSD serves 240 students from diverse backgrounds in an urban area of northwest Illinois, part of the Quad Cities region. The district’s mission is to prepare students to be academically successful and career-ready, foster a love for learning, and help students reach their full potential as confident, lifelong learners. The district’s 40 staff members are dedicated to ensuring the safety and educational success of every student. ZeroEyes' AI gun detection and intelligent situational awareness software layers onto CCBSD’s existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC. Protecting with precision The industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to first responders and local staff as quickly as 3 to 5 seconds from detection. Innovating school security “The safety of students and staff is a priority for Carbon Cliff-Barstow, and we are honored to play a role in supporting that mission," said Mike Lahiff, CEO and co-founder of ZeroEyes. “Our AI gun detection system will provide the district with the actionable intelligence needed to mitigate potential threats, helping to ensure a safer environment for students and staff."
Battery Energy Storage Systems (BESS) are essential for storing renewable energy and ensuring grid stability. However, their implementation comes with inherent risks, particularly related to lithium-ion battery fires. BESS fires can start from thermal runaway, where one cell failure can trigger a cascade of overheating, leading to fires that are difficult to extinguish and can last for hours or even days. Should a fire breakout, hazardous gases would release from the batteries, posing health risks to nearby communities and causing environmental damage through soil and water contamination. Traditional detection methods BESS fires have the potential for huge disruptions to locals via property damage and even evacuations In severe cases, BESS fires have the potential for huge disruptions to locals through property damage and even evacuations. Traditional detection methods such as flame detectors often fail in the early stages of a BESS fire due to their reliance on visible flames or smoke, which might not be immediately present. Where flame detectors fall short, thermal imaging cameras can significantly improve protection and prevent fires before they ever reach combustion. Advantages of thermal cameras for BESS Thermal cameras detect the heat signature from the onset of thermal runaway long before visible flames or smoke appear, allowing for preemptive action to mitigate risks. While flame detectors react to events that have already happened, a fixed thermal camera such as the FLIR A700F Advance Smart Sensor provides 24/7 surveillance by continuously monitoring for temperature anomalies that could indicate an impending fire, thus enabling early intervention. FLIR cameras are designed for easy integration into broader safety and control systems, allowing for automated responses such as activating suppression systems that enhance response times and efficiency. Comparison with other detection methods FLIR thermal imaging cameras can detect heat in low light and see the start of embers as they heat up While flame detectors are designed to detect visible fire, they may miss smouldering or hidden fires—meaning an alert may not be tripped until the fire has escalated to a dangerous level. FLIR thermal imaging cameras can detect heat in low light and see the beginnings of embers as they heat up surrounding materials, even when there's no visible sign of fire. This early detection can prevent escalation or at least minimise damage by providing critical time for action before fires get out of control. Another advantage of thermal cameras is their ability to monitor large areas or multiple battery racks simultaneously, providing comprehensive coverage which is often challenging for point-specific flame detectors. Conclusion Incorporating FLIR thermal monitoring into BESS installations not only addresses the critical safety concerns associated with battery fires but also offers a proactive, reliable, and technologically advanced solution. By choosing a FLIR fixed thermal solution, they ensure that the energy storage systems are safeguarded with the industry's pioneering thermal imaging technology, protecting both the investment and the community from the devastating effects of BESS fires.
LATINA Construction and Drilling needs to maximise staff safety and site security on the La Santa Maria oil drilling platform in the Gulf of Mexico. To achieve this, they have implemented a Hikvision solution featuring explosion-proof cameras equipped with deep learning algorithms for perimeter protection and fire detection. This system provides real-time alerts to the security team for swift incident response. Challenge: Maximising security and safety High value of hydrocarbon products makes perimeter security crucial for safeguarding staff and assets Oil and gas sites face unique security and health and safety challenges. The extraction, refining, and transport of hydrocarbons present significant fire and explosion risks that require all equipment and installations to operate at safe working temperatures. Additionally, the high value of hydrocarbon products makes perimeter security crucial for safeguarding staff and assets. These are some of the well-known challenges facing Constructora y Perforadora LATINA (LATINA Construction and Drilling), a major geothermal drilling company in Latin America with more than 60 years of experience. ‘La Santa Maria’ drilling platform The organisation is responsible for operating the ‘La Santa Maria’ drilling platform in the Gulf of Mexico, while also ensuring protection of the local maritime environment and wildlife based on responsible operations. The platform, built in 2013, is relatively close to land, making it more vulnerable to security breaches and property damage from trespassers. To address these risks, and to ensure that environmental risks are mitigated, the platform needed a new, improved, security solution. 24x7 perimeter security This needed to provide 24x7 perimeter security, excellent fire prevention capabilities, and the ability to minimise health and safety risks for employees. In addition, the system needed to be highly corrosion-resistant to withstand the harsh maritime environment, where the platform is located. Solution: Hikvision explosion-proof thermal imaging cameras with on-board deep learning for fire detection and perimeter security To overcome these challenges, LATINA Construction and Drilling, in collaboration with the renowned System Integrator - STC Global System, has deployed a Hikvision solution, which incorporates Thermal & Optical Bi-spectrum Network Bullet Cameras (DS-2TD2637-35/P) and Explosion-Proof Thermographic Network Bullet Cameras (DS-2TD2466T-25X). Hikvision explosion-proof thermal imaging cameras The explosion-proof cameras are housed in 316L stainless-steel casings The explosion-proof cameras are housed in 316L stainless-steel casings, preventing sparks or heat from coming into contact with potentially flammable fumes. The casings meet the NEMA-4X anti-corrosion standard, ensuring durability in the salty sea environment. The cameras’ thermal imaging capabilities, along with the sensitive fire-detection algorithm, ensure that any overheating equipment is reported immediately, even in low-visibility conditions such as fog and rain. Cameras feature powerful analytics functions Both Hikvision camera models use an on-board deep learning algorithm to provide powerful analytics functions. This means the cameras can generate alerts immediately for certain types of incidents, including perimeter invasions (line crossing) and entry of unauthorised people. The algorithm also distinguishes false alarms caused by moving objects like seabirds, high waves or storms from genuine threats, such as people invading the platform perimeter. This helps to minimise false alarms. The cameras also feature light and strobe alarms to alert intruders, deterring them from further actions. Benefits: Increased staff health and safety, optimised operational efficiency, and durable performance Enclosed in heavy-duty casings, the Hikvision explosion-proof cameras help to maximise staff health and safety by ensuring that the risk of camera-related sparks and resulting fires and explosions is minimised. Additionally, the cameras' thermal imaging helps the platform respond quickly to temperature increases or fires, ensuring the safety of personnel and assets, while adhering to environmental regulations. False alarm reduction deep learning algorithm The company can mitigate security risks associated with the platform’s location close to land The false alarm reduction deep learning algorithm ensures that members of the security team can focus 100% of their effort on genuine security threats, speeding up responses, saving time, and increasing operating efficiency and performance. With automated alerts for security incidents, such as ‘line crossing’, the company can mitigate security risks associated with the platform’s location close to land and ensure the safety of everyone working on the platform. Corrosion-resistant cameras offer chemical resistance Finally, but equally importantly, the corrosion-resistant cameras offer exceptional chemical resistance and durability, making them well-suited to withstand the harsh maritime conditions of the Gulf of Mexico. This reliability ensures that LATINA Construction and Drilling continues to benefit from the system for years, despite constant exposure to saltwater. Additionally, the reduced need for repairs and maintenance results in significant cost savings.
Robots do monotonous workflows and less pleasant, repetitive tasks with brilliance. Combined with image processing, they become “seeing” and reliable supporters of humans. They are used in quality assurance to check components, help with the assembly and positioning of components, detect errors and deviations in production processes and thus increase the efficiency of entire production lines. An automobile manufacturer is taking advantage of this to improve the cycle time of its press lines. Together with the latter, VMT Vision Machine Technic Bildverarbeitungssysteme GmbH from Mannheim developed the robot-based 3D measuring system FrameSense for the fully automatic loading and unloading of containers. Pressed parts are thus safely and precisely inserted into or removed from containers. Four Ensenso 3D cameras from IDS Imaging Development Systems GmbH provide the basic data and thus the platform for process automation. Application The actual workflow that FrameSense is designed to automate is part of many manufacturing operations. A component comes out of a machine-here a press- and runs on a conveyor belt to a container. There it is stacked. As soon as the container is full, it is transported to the next production step, e.g., assembly into a vehicle. All these tasks are now to be taken over by a robot with a vision system-a technological challenge Up to now, employees have been responsible for loading the containers. This actually simple subtask is more complex than one might think at first glance. In addition to the actual insertion process, the first step is to determine the appropriate free space for the part. At the same time, any interfering factors, such as interlocks, must be removed and a general check of the “load box” for any defects must be carried out. All these tasks are now to be taken over by a robot with a vision system-a technological challenge. This is because the containers also come from different manufacturers, are of different types, and thus vary in some cases in their dimensions. Positioning of the components For their fully automatic loading and unloading, the position of several relevant features of the containers must be determined for a so-called multi-vector correction of the robot. The basis is a type, shape and position check of the respective container. This is the only way to ensure process-reliable and collision-free path guidance of the loading robot. All this has to be integrated into the existing production process. Time delays must be eliminated and the positioning of the components must be accurate to the millimetre. 3D point cloud These point clouds of all four sensors are combined for the subsequent evaluation To counter this, VMT uses four 3D cameras per system. The four sensors each record a part of the entire image field. This can consist of two containers, each measuring approximately 1.5 × 2 × 1.5 metres (D × W × H). Two of the cameras focus on one container. This results in data from two perspectives each for a higher information quality of the 3D point cloud. These point clouds of all four sensors are combined for the subsequent evaluation. In the process, registrations of relevant features of the container take place in Regions of Interest (ROIs) of the total point cloud. Interference contours Registration is the exact positioning of a feature using a model in all six degrees of freedom. In other ROIs, interference contours are searched for which could lead to collisions during loading. Finally, the overall picture is compared with a stored reference model. In this way, the containers can be simultaneously checked for their condition and position in a fully automated manner. Even deformed or slanted containers can be processed. All this information is also recorded for use in a quality management system where the condition of all containers can be traced. The calibration as well as the consolidation of the measurement data and their subsequent evaluation are carried out in a separate IPC (industrial computer) with screen visualisation, operating elements and connection to the respective robot control. Image processing solution The entire image processing takes place in the image processing software MSS developed by VMT The main result of the image processing solution is the multi-vector correction. In this way, the robot is adjusted to be able to insert the component at the next possible, suitable deposit position. Secondary results are error messages due to interfering edges or objects in the container that would prevent filling. Damaged containers that are in a generally poor condition can be detected and sorted out with the help of the data. The entire image processing takes place in the image processing software Multi-Sensor Systems (MSS) developed by VMT. FrameSense is designed to be easy to use and can also be converted to other components directly on site. Robust 3D camera system On the camera side, VMT relies on Ensenso 3D cameras-initially on the X36 model. The current expansion stage of FrameSense is equipped with the Ensenso C variant. The reasons for the change are mainly the better projector performance-thanks to a new projection process-as well as a higher recording speed. In addition, the Ensenso C enables a larger measuring volume. This is an important criterion for FrameSense, because the robot can only reach the containers to be filled up to a certain distance. The specifications of the Ensenso C thus correspond exactly to VMT's requirements, as project manager and technology manager Andreas Redekop explains: "High projector performance and resolution together with fast data processing were our main technical criteria when selecting the camera. The installation in a fixed housing was also an advantage.” Ensenso models Housing of a robust 3D camera system meets the requirements of protection class IP65/67 The Ensenso C addresses current challenges in the automation and robotics industry. Compared to other Ensenso models, it provides both 3D and RGB colour information. Customers thus benefit from even more meaningful image data. The housing of the robust 3D camera system meets the requirements of protection class IP65/67. It offers a resolution of 5 MP and is available with baselines from current to approx. 455 mm. This means that even large objects can be reliably detected. The camera is quick and easy to use and addresses primarily large-volume applications, e.g., in medical technology, logistics or factory automation. Outlook By automatically loading and unloading containers and the integrated 3D container inspection, manual workstations can be automated with the help of FrameSense. Against the background of the shortage of skilled workers, the system can thus make an important contribution to process automation in the automotive industry, among others. It meets the prevailing challenges of the industry. Ensenso C provides the crucial basis for data generation and exceeds the requirements of many applications. Lukas Neumann from Product Management sees their added value especially here: “The high projector power and large sensor resolutions are particularly advantageous in the field of intralogistics. Here, high-precision components have to be gripped from a great distance with a large measuring volume.” For other stacking or bin-picking applications in classic logistics, he could imagine a similar camera with high projector power but lower resolution and fast recording. So nothing stands in the way of further developments and automation solutions in conjunction with "seeing" robots.
The Public Security Department is the law enforcement agency responsible for maintaining public safety, preventing crime, and upholding the law in the region. Established in 1873, the force has been instrumental in maintaining peace and stability in the area, particularly in counter-insurgency operations. In addition to its core operations, the department conducts community service activities to bridge the gap between the department and the public. The force works closely with other law enforcement agencies to ensure effective coordination and cooperation. Dedicated to upholding the rule of law and protecting the rights of every citizen, it is committed to building a safe and secure environment in the region. Business scenario The lack of centralised monitoring capabilities at the head of the department's office The department is divided into multiple zones, ranges, and districts, with each district housing several branch offices. However, monitoring these dispersed stations posed a challenge. The lack of centralised monitoring capabilities at the head of the department's office and inadequate infrastructure at the department branches could have helped with real-time updates and efficient communication. To address this, the department aimed to enhance surveillance infrastructure, enable streaming access to all stations, and establish a centralised monitoring system. These efforts would improve coordination, data management, and security services for the people of the state. Challenges Monitoring challenge: The stations are dispersed across multiple locations Lack of centralised monitoring capabilities at the head of department’s office Inadequate infrastructure at the stations for local data recording Hindered real-time updates and efficient communication across the network Solution A total of 70 cameras were installed with varying focal lengths and capabilities to cover 20 branches in the jurisdiction. Based on their requirement the experts suggested high-resolution 5MP bullet cameras with audio support to capture clearer images and for playback and investigation. The motorised varifocal lens and PTZ cameras can be manoeuvered remotely for better control over the cameras. Motorised varifocal lens and PTZ cameras can be handled remotely for better control To enable the streaming and recording of footage for a longer duration, eight-channel network video recorders (NVRs) with 1 SATA port (each SATA port supports 10TB storage support) were installed across 20 locations. These NVRs were connected to television screens using HDMI cables, enabling the streaming of live footage at local offices. Matrix SATATYA SAMAS For centralised surveillance, all NVRs related to Matrix SATATYA SAMAS use static public IP. The video management system was connected to the desktop for monitoring purposes and provided Matrix SATATYA VISION 24×7 surveillance on the go. The Matrix team also provided training to the officials on how to use the video surveillance infrastructure effectively. They were taught to leverage the system's full potential, including best practices for monitoring, managing, and analysing data captured by the system. Products offered SATATYA CIBR50FL40CWP: 15 Nos. 5 MP Project Series IR Bullet Camera with 4 mm Fixed Lens and Audio Support SATATYACIBR50MVL12CWP: 40 Nos. 5 MP Project Series IR Bullet Camera with Motorised Varifocal Lens and Audio Support SATATYA PZCR20ML25CWP: 10 Nos. 2 MP Pan-Tilt-Zoom Camera with 25× Optical Zoom and Audio Support Matrix SATATYA NVR0801X: 20 Nos. Eight-channel NVR with 1SATA Port Support Matrix SATATYA SAMAS Video Management System with 70IP Camera Licences and three Concurrent User Licences Benefits Matrix's video surveillance solution has empowered the department with real-time updates. The robust infrastructure enables centralised monitoring, enhancing public safety and quick response to incidents. Matrix's expertise and technical capabilities have significantly contributed to maintaining law and order in the region.


Products


Round table discussion
The role of the integrator/installer in the physical security marketplace is shifting as technologies evolve and applications expand. Integrators are being faced with a need to augment their expertise both in a wider range of systems and deeper into the specifics of each increasingly complex technology. At the end of the day, it falls to the integrator/installer to ensure a system performs as promised, however much a consultant or even a manufacturer might be involved in the process. We asked this week’s Expert Panel Roundtable: How is the role of the security installer/integrator changing?
From lodging to food service to event planning to tourism, the hospitality market faces a large and growing range of security threats and challenges. Given the competitiveness of the market and the heightened flow of information about customer satisfaction via social media, there is more at stake than ever as hospitality professionals seek to ensure the safety and security of guests. We asked this week's Expert Panel Roundtable: What security challenges are impacting the hospitality market of today?
We appreciate the variety of opinionated discussions offered throughout the year by our Expert Panel Roundtable. Looking back at 2021, we found some random and uncategorised Expert Panel responses that were not previously published. We have rescued these responses from our cutting-room floor and present them here in the interest of generating even more discussion.
Videos
IR cameras: Manufacturers & Suppliers
- Hikvision IR cameras
- Dahua Technology IR cameras
- LILIN IR cameras
- Hanwha Vision IR cameras
- Axis Communications IR cameras
- eneo IR cameras
- Messoa IR cameras
- Bosch IR cameras
- IDIS IR cameras
- LTV Europe IR cameras
- Eagle Eye Networks IR cameras
- Computar IR cameras
- AV Costar IR cameras
- Illustra IR cameras
- IndigoVision IR cameras
- Avigilon IR cameras
- Vicon IR cameras
- MobileView IR cameras
- Anviz IR cameras
- March Networks IR cameras
Aligning physical and cyber defence for total protection
Download
Understanding AI-powered video analytics
Download
Enhancing physical access control using a self-service model
Download
How to implement a physical security strategy with privacy in mind
Download
Security and surveillance technologies for the casino market
Download
