Mobile surveillance
March Networks®, a pioneer in intelligent video surveillance, is pleased to announce its selection as an American Dairy Queen Corporation (ADQ) approved supplier of video surveillance solutions for the DQ® system. This partnership marks a significant milestone in March Networks’ ongoing collaboration with DQ franchise owners since 2017, serving more than two hundred DQ restaurants across 13 U.S. states. DQ Point-of-Sale (POS) system As an approved supplier, March Networks seam...
Xesar is simply versatile. With the smartphone as an additional access medium, Xesar is now becoming even more versatile in its range of solutions and remains very simple to use. Authorisations and their changes are sent directly from the management software to iOS or Android smartphones by SMS. There is no need to write access media via the coding station and a physical handover – this saves resources and streamlines the processes. Xesar app The Xesar app is clearly...
ABLOY, a global pioneer in security, is proud to announce the launch of the innovative ABLOY CUMULUS Swing Handle for keyless access via smartphone. The handle is designed to meet the needs of professionals who safeguard our society's vital services in various sectors, from commercial organisations to critical infrastructure. Swing Handle The Swing Handle has a wide array of applications. It can be used across numerous industries with needs ranging from telecom, fibre, and electrical ca...
Robotic Assistance Devices, Inc., a subsidiary of Artificial Intelligence Technology Solutions, Inc., is thrilled to announce the successful deployment of 4 RAD RIO™ (ROSA Independent Observatory) solar-powered mobile surveillance units (MSU) during the 2024 CMA Fest in Nashville, Tennessee. The CMA Fest, one of the most significant country music events in the world, saw tens of thousands of fans flock to Nashville for an unforgettable weekend of music and e...
Digitalisation is reshaping the way individuals live and work. Buildings should be at the centre of this change, streamlining daily interactions with homes, offices, and other workplaces, moving into and around them seamlessly. Everyone who uses a site also needs confidence in its security and safety, not just its efficiency and usability. Connected digital access In addition, connected digital access is a fundamental block in constructing more intelligent buildings. As analysts Omdia...
Interface Systems, a major managed service provider of business security, actionable insights, and purpose-built networks for multi-location businesses, announced that it is releasing an enhanced customer portal, One View Edge, that will offer its customers greater visibility and easier access to critical information on all Interface services. The launch of One View Edge reflects Interface's commitment to delivering exceptional and relentless customer support. Capabilities of One View Edge On...
News
Smart Spaces announces that it has partnered with the trusted identity provider, HID, to make access to Workspace’s The Light Bulb building in South West London fast, simple and secure, by making door access credentials available in Google Wallet for all SME customers who lease offices and studios at the centre. Any registered Android smartphone user can gain quick and seamless access to The Light Bulb by holding their device near any NFC-enabled HID Signo reader, with doors then opening automatically. Google Wallet integration Smart Spaces is the first HID Technology Partner to carry out such a Google Wallet integration project, with Workspace the first customer in the world to benefit from this innovative technical collaboration. A FTSE 250 company, Workspace owns and manages 4.6 million sq. ft. of flexible office space across 76 locations in London - home to some of the Capital’s brightest young companies who rent and design their own space and join a vibrant community of other businesses. Ease of access Chris Boultwood, Workspace’s Head of Technology, says, “Our customers are agile, ambitious SMEs who are digitally savvy, and we know how much they appreciate having ease of access to the building with just their phones." Chris Boultwood adds, "We’re always looking to make their experience as seamless as possible and the HID/Google Wallet door access is a natural step forward at The Light Bulb. We’re now excited to start rolling this out across other London locations.” Self-service plus seamless credentials Smart Spaces’ OS is used by Workspace’s customers to not only access the building but to book meeting rooms Smart Spaces’ OS is used by Workspace’s customers to not only access the building but to book meeting rooms and receive information about events and activities happening onsite, with the software branded MyWorkspace. Unlike issuing traditional plastic RFID access cards, shifting to digital offers self-service plus the seamless provisioning of credentials, making it far easier for all concerned – Workspace’s customers as well as onsite facility management staff. Secure and convenient mobile experiences “This partnership highlights our commitment to providing a wider range of secure and convenient mobile experiences for workspaces for all types of end users– from SMEs to larger enterprises. As we diversify and expand our mobile solutions portfolio globally, stay tuned to see more Google Wallet integrations in the coming year,” said Sanjit Bardhan, HID’s Vice President & Head of Global Mobile Business. Smart Spaces’ goal is to be the world’s pioneer in smart building operating systems for commercial real estate. Tap-and-go functionality Winners of the Santander Technology Business of the Year in 2023, a raft of prestigious projects in the UK use its software which has put London centre stage of global smart building implementations. Dan Drogman, Smart Spaces’ Chief Executive Officer, says, “At Smart Spaces, we continuously strive to provide the best possible user experience for our customers. The ‘tap and go’ functionality and convenience offered by Google Wallet provide this seamlessly. We’re delighted we’re the first to offer this to our customers.”
Allegion US, a pioneering security products and solutions provider, has introduced the Schlage® XE360™ Series Wireless Locks, a new electronic lock portfolio designed with multifamily market needs–like style and technology–in mind, at an attractive price point. The XE360 Series is the next generation of innovative electronic locks from Schlage, outfitted with the options and features most looked for by multifamily properties and made to fit the needs of a wide range of common area openings. With in-demand finishes and modern lever styles, the XE360 Series was designed to complement a variety of design styles. It operates in an offline or No-Tour environment, which eliminates the need for property managers to visit the lock as credentials update the access rights. Schlage Control® smart locks “Designed specifically for the multifamily market and backed by Schlage’s legacy of trust and innovation, the XE360 Series is a versatile and affordable solution to create safe and secure communities for residents and enhance the multifamily living experience,” said Brian Telljohann, Director of Product Management, Commercial Electronics at Allegion. “A strategic evolution of our multifamily ecosystem, the XE360 Series seamlessly integrates with Schlage Control® mobile-enabled smart locks and features applications across the entire building, which allows multifamily operators to leverage a single access control and management solution without compromising security and design.” Freedom of choice Integrated with Allegion and third-party access control software providers and proptech systems, the XE360 Series’ open architecture design provides property owners and operators the flexibility to choose between management systems and delivers a convenient and secure experience for residents. Pioneering credential technologies The trend of mobile access control is increasing in popularity for apartment selection The trend of mobile access control is increasing in popularity for apartment selection. According to Allegion’s 2023 Multifamily Living Trends Report, over 59% of survey respondents would select a future place of residence if they were able to access their unit using a mobile device. The XE360 Series supports the latest mobile credential technologies, including MIFARE®, Bluetooth® and NFC mobile, with advanced encryption to keep data and communications safe. Design-forward aesthetic The Schlage XE360 boasts a next-level design that provides property owners with a seamless aesthetic across all openings regardless of the type of door and required lock installation. Thoughtfully engineered, the uniquely concealed key override maintains the sleek look of the lock on the door, providing residents with a modern design without compromising peace of mind. Future-ready connectivity The new and innovative FleX Module™ board allows the XE360 Series locks to be easily upgraded The new and innovative FleX Module™ board allows the XE360 Series locks to be easily upgraded in the field to allow migration from an offline to a networked solution and adapt to emerging trends in security and connectivity as the building’s needs or technology change. “As the multifamily market continues to evolve, the XE360 Series equips property owners and managers with a curated set of features designed to simplify access control, thoughtful designs and finishes to complement today’s aesthetics, and the power to choose software that meet the needs of their building,” said Telljohann. Schlage’s multifamily ecosystem The XE360 Series builds upon Schlage’s multifamily electronic access control ecosystem, including Schlage Control smart locks, designed specifically for multifamily resident doors. Property owners can now outfit all openings – including main entrances, resident entrances, paths of egress, common areas and workspaces – with a one-system solution.
On February 8th, PureTech Systems, under the auspices of the Security Industry Association (SIA) and the National Capital Region Security Forum, hosted the 4th government-industry engagement with CBP. This time, the guest speaker was Mr. Henry Laxdal, who currently serves as Deputy Directorate Chief of the U.S. Border Patrol (USBP) Program Management Office Directorate (PMOD). Vision and strategy Chief Laxdal provided valuable insights into the evolving vision and strategy of how PMOD supports the overarching USBP Strategy to keep America safe. He discussed how the Border Patrol strives to remain innovative in its pursuit of border security, shedding light on how important industry stakeholders are to its complex mission. Chief Laxdal's experience Chief Laxdal worked in Law Enforcement Operations, Strategic Planning, and Analysis, at the Office of Acquisition His public service progressed from being a Border Patrol agent in Arizona to working at USBP Headquarters in Washington, DC, to working as a Patrol Agent in Charge on both the Northern and Southern borders and then back to USBP Headquarters. While assigned to Headquarters, Chief Laxdal worked in Law Enforcement Operations, Strategic Planning, and Analysis, at the Office of Acquisition, and is currently the Deputy of PMOD. Identify, target, and mitigate threats Close to 50 participants from industry stakeholders gathered to hear how PMOD strategises and prioritises innovative technology to identify, target, and mitigate emerging threats. Chief Laxdal discussed the decision-making process for large-scale programs of record and newly identified potential solutions that might solve a particular capability gap. Chief Laxdal answered each question from the attendees in detail providing additional clarity to many of the interrelated topics discussed during the previous week's Industry Day and beyond. Key insights From Chief Laxdal’s keynote and subsequent Q&A that lasted almost two hours, PureTech gathered the following important points: There is a continued need for enhanced coordination between Border Patrol and the local sheriff departments, which often operate in overlapping jurisdictions. By establishing partnerships, it allows more effective and coordinated efforts along the border and in the local communities they protect. The shared intelligence from community policing efforts, surveillance systems, and other similar systems enhances agents’ ability to manage operations along the border, increasing the safety and well-being of neighboring communities. AI plays an important role in integrated systems with automated detection, continuous monitoring, and predictive analytics, and is considered a critical component in increasing the efficiency of border operations by streamlining processes and functions that can be completed with advanced computing. Chief Laxdal articulated how staffing and attrition rates have become an increasing challenge, requiring creative methods to complete the mission with fewer people. As technology evolves, the agency must continue to consider how best to utilise autonomous sensors in all environmental domains of land, air, and sea. The USBP must continue to grow its capability to rapidly adapt and deploy mobile solutions like unmanned aerial vehicles, land-based sensor nodes, subterranean detections, and future acquisition plans such as the Modular Mobile Surveillance Systems (M2S2) that provide remotely operated capabilities that reduce the need for additional manpower. Transnational Criminal Networks (TCN) are adopting the use of drones to infiltrate the borders of the United States, presenting a significant threat to the security of the nation. TCNs seek to illegally smuggle any commodity into the U.S. that provides a profit, ranging from narcotics trafficking like fentanyl to human trafficking. Additionally, TCNS are persistently monitoring border operations with the use of drones, seeking to disrupt the effectiveness of a Border Patrol response to illicit activity. To mitigate these security risks, CBP must have the flexibility and authorisation to implement counter-drone operations that can identify, classify, track, and intercept drones that terrorists and TCNs could nefariously use. Another source of effort is the Common Operational Picture (COP), designed as a software solution that ties in edge computing, artificial intelligence, and machine learning to further enhance the interdiction effectiveness of the USBP. The COP synthesises large amounts of data through border detections into a unified user interface that can be used to prioritise threats and deploy border agents to prevent those threats. Discussions and networking opportunities The National Capitol Region Security Forum, in partnership with its many stakeholders, is immensely grateful for Chief Laxdal’s participation and candidness and looks forward to future opportunities to learn from his leadership. The preparation for this event spanned several months, and in the end, it provided a successful opportunity for engagement and set the stage for meaningful discussions and networking opportunities. Border security “PureTech sponsorship demonstrates their commitment to advancing the field of border security and their dedication to supporting initiatives that promote collaboration, innovation, and best practices." "This sponsorship, alongside SIA and NCRSF, provides all of us with a platform to bring government pioneers' expertise and vision to an audience of industry professionals,” says Wayne Esser of NCRSF.
Robotic Assistance Devices, Inc. (RAD), a subsidiary of Artificial Intelligence Technology Solutions, Inc., announced that the Taylor City Council has officially approved the addition of a RADDOG™ 2LE to the Taylor Police Department. This marks a historic moment as the city integrates its first robotic quadruped into the municipal police force, and RAD celebrates its inaugural deployment of RADDOG to a municipal entity. Public safety The City of Taylor, recognised as the fifth most populous city in Wayne County and the 17th across Michigan, boasts a population of 63,409 as per the 2020 census. With a dedicated force of approximately 100 sworn officers, the inclusion of RADDOG 2LE represents a significant step forward in leveraging technology to enhance public safety and operational efficiency within the community. RADDOG 2LE RADDOG 2LE, designed and developed by RAD, is a state-of-the-art robotic system RADDOG 2LE, designed and developed by RAD, is a state-of-the-art robotic system modeled to support law enforcement agencies in a variety of operational scenarios. Equipped with advanced mobility, surveillance capabilities, and patrolling functions, RADDOG 2LE is set to become an invaluable asset to the Taylor Police Department. RAD’s Sr. Vice President of Revenue Operations, Troy McCanna, an ex-FBI agent of 23 years, expressed enthusiasm about the new addition, stating, “The integration of RADDOG 2LE into police forces is a testament to our commitment to delivering innovative solutions for public safety." Modern policing Troy McCanna adds, "We are proud to be at the forefront of this technological advancement, setting a precedent for modern policing that could shape the future of law enforcement operations, not just in Michigan, but nationwide." He continues, "I wish we had this device when I was an active agent as I’m certain it will provide critical escalation functions while enhancing officer safety.” Safe solution On January 24, 2024, the Taylor Police Department commented on social media following their final RADDOG 2LE demonstration, “This tool can be used as an additional resource for multiple emergencies that can help law enforcement. The robot can be deployed to assist in incidents where our officers and citizens can be in immediate danger and potentially provide a safer solution and reduce the risk in dangerous circumstances.” Game-changing technology The deployment of RADDOG 2LE in Taylor is expected to pave the way for further adoption of robotic assistance Mark Folmer, CPP, PSP, FSyI, President of RAD, also commented on this milestone, stating “We are honored to partner with the City of Taylor and its Police Department." He adds, "This deployment marks a significant achievement for RAD, demonstrating the trust and confidence that the City of Taylor has placed in our technology. We believe that RADDOG 2LE will prove to be a game-changer in enhancing the capabilities of the Taylor Police Department.” Robotic assistance Steve Reinharz, CEO/CTO of AITX and RAD, noted “We will continue to invest in improving this technology to be budget-friendly. We strive, in time, to develop a version of RADDOG that will be every law enforcement member’s best friend and ride in every car on every patrol. It may take time, but this concept has tremendous potential, and it starts today.” The deployment of RADDOG 2LE in Taylor is expected to pave the way for further adoption of robotic assistance within public safety and law enforcement agencies across the country, highlighting the potential for such technology to complement and enhance the efforts of human officers. AI-driven Solutions-as-a-Service Both parties look forward to witnessing the positive impact that RADDOG 2LE will have on the community As the City of Taylor and RAD embark on this pioneering journey, both parties look forward to witnessing the positive impact that RADDOG 2LE will have on the community, setting a benchmark for innovation in public safety. AITX, through its subsidiary, Robotic Assistance Devices, Inc. (RAD), is redefining the $25 billion (US) security and guarding services industry through its broad lineup of innovative, AI-driven Solutions-as-a-Service business model. Cost savings RAD solutions are specifically designed to provide cost savings to businesses of between 35%-80% when compared to the industry’s existing and costly manned security guarding and monitoring model. RAD delivers these tremendous cost savings via a suite of stationary and mobile robotic solutions that complement, and at times, directly replace the need for human personnel in environments better suited for machines. All RAD technologies, AI-based analytics, and software platforms are developed in-house.
In a world where safety and security are paramount, Monitoreal is proud to announce the launch of the Monitoreal Secure Guard App, allowing Monitoreal users to see what matters most in and around their properties, right from their pockets. Modern living demands modern solutions, and the Monitoreal Secure Guard App is designed to meet the needs of individuals and businesses alike. This all-in-one, comprehensive surveillance app offers on-the-go accessibility, making it easier than ever to protect the property and loved ones using the existing Monitoreal devices and ecosystem. Why Choose the Monitoreal Secure Guard App? Monitoreal Secure Guard App, that same level of excellence is now available for the smartphone Monitoreal is a trusted name in surveillance technology, known for its high-quality hardware and software solutions that have secured homes and businesses using AI-powered video analytics for years. With the Monitoreal Secure Guard App, that same level of excellence is now available for the smartphone or tablet. Key features Live streaming: Watch live video feeds from the connected security cameras in real-time, providing flexibility and ease of monitoring. Multi-camera views: Switch between various camera views at different locations, giving a holistic perspective of all monitored areas from a single screen. Instant alerts: Receive instant notifications in case of suspicious activity and customise alert preferences to receive only relevant information while ignoring false alarms. Relay reactions: Trigger connected accessories like smart lights, alarms, sirens, strobes, gates, and Bluetooth speakers based on predetermined detections to deter potential intruders. 24/7 Monitoring: Access securely stored archived footage on-premises, allowing to review or share clips at any time. Smart analytics: Leverage Monitoreal's AI-powered analytical tools to differentiate between normal and suspicious activities, reducing false alarms. Remote control: Arm or disarm the security system remotely, control camera angles, and manage other smart home devices right from the app. User-friendly interface: Designed with the user in mind, the intuitive interface ensures easy navigation for users of all tech-savviness levels. Getting started is simple Download the app: Available on both iOS and Android. Sign in or create an account: Use the existing Monitoreal account or create a new one. Connect devices: Seamlessly and securely sync the app with the Monitoreal hardware using a QR code system. Customise settings: Set the preferences for alerts, camera views, and more. Start monitoring: Now equipped to monitor what matters most to them, wherever they go. Security never sleeps, and neither should surveillance Whether they are traveling, at the office, or simply away from the monitored space, the Monitoreal Secure Guard App ensures that they are never more than a tap away from peace of mind. Take control of security like never before, with a robust, flexible, and reliable surveillance solution right in the palm of their hand. Ready to take the next step? Download the Monitoreal Secure Guard App and transform the surveillance experience. The world may be constantly changing, but with Monitoreal, the security remains uncompromised. Stay connected, stay secure, with the Monitoreal Secure Guard App. Download now and secure the world, one tap at a time.
360 Vision Technology, the UK manufacturer of rugged HD, radar and thermal PTZ imaging cameras, has been chosen to supply the camera surveillance technology for the next generation of rapid CCTV deployment. Designed by 360 Vision Technology’s long term technical partner, Stuart Bostock, of Strategic Protection Services Ltd., the new rapid deployment surveillance vehicle uses a development of the company’s existing patent-pending Mobile Advanced Safety Tower (MAST), rapid deployment camera system, built-into the ultimate mobile application, the Mobile Advanced Safety Truck (MAST). Based in the Cayman Islands, Strategic Protection Services Ltd. (SPS) specialises in the most advanced, integrated mobile surveillance and public safety systems available. Mobile Advanced Safety Tower (MAST) MAST products are designed to be safe, reliable and compliant systems with excellent service MAST is an advanced data capture system, designed to maximise advancing technology in the fields of video capture, environmental monitoring, communications and green energy, across multiple, emerging surveillance applications. MAST products are designed to be safe, reliable and compliant systems with excellent service and continued specialised support. Utilising the proven technology of MAST, the team concentrated on the next chapter, developing the MAST technology into the ultimate rapidly deployable vehicle system. Invictus TX wireless camera Using 360 Vision’s Invictus TX, a high-performance, ruggedised all-in-one PTZ camera, with full 1080P HD and Predator ultra-low-light camera technology, the new MAST Truck has been developed to be a mobile, self-powered, non-obtrusive, public surveillance system. Reliable wireless video transmission Stuart Bostock, Owner of Strategic Protection Services takes up the story: “Featuring 360 Vision’s world-class Invictus TX PTZ HD surveillance imaging camera, its leading-edge design, robust build, zero infrastructure requirements and seamless Video Management System (VMS) integration, help to make the MAST Truck unique in the US security market." He adds, “The vehicle can be deployed virtually anywhere and thanks to the low bandwidth transmission and recording capabilities of the 360 Vision Invictus TX camera, high-quality HD images can be transmitted via cellular networks.” TX wireless video camera transmission technology TX wireless video camera transmission technology delivers camera video & PTZ control from just 6 Kbps Using 360 Vision Technology’s TX wireless video camera transmission technology delivers camera video & PTZ control from just 6 Kbps, with Full 1080p HD edge recording and remote retrieval on demand. Delivering high-quality camera video over low bandwidth, 360 Vision’s 3G/4G/LTE TX technology provides a highly robust wireless video transmission solution that delivers high-quality streamed imaging even within the most difficult of wireless video transmission environments where the MAST truck may be deployed. Invictus TX wireless camera deployed on MAST truck Furthermore, the Invictus TX camera of the MAST truck uses highly efficient optimised video compression, with unique minimal latency, which is fully encrypted and secure. The unique low-power consumption and green credentials of the 360 Vision camera range lends itself to a more economical and environmentally efficient operation, delivering extended operation performance and less battery capacity requirement for its use on the MAST truck. MAST system is unrestricted in its deployment capability Keeping running costs down to a minimum, the 360 Vision TX camera technology operates without the need for expensive airtime contracts and can switch dynamically between low and high bandwidth video streams, dependent on network capability; adjusting CCTV camera video quality to suit. This means the MAST system is unrestricted in its deployment capability, can record and transmit images, and be integrated remotely into VMS control rooms, if required. Low power consumption Based within a rugged all-terrain platform, the MAST truck is 100% self- powered" “Based within a rugged all-terrain platform, the MAST truck is 100% self- powered, using an advanced battery system, which is charged by the driving of the truck, or connected to mains power if required,” said Stuart Bostock, adding “This feature is supported by the use of the low power requirements of the 360 Vision Invictus TX camera. MAST has been developed to answer the need for a more sophisticated and mobile surveillance system for infrastructure and public space safety.” He continues, “The MAST truck has proven unique, as it can be used both static and whilst on the move, and combines a rapidly deployable unit with some of the most advanced safety and surveillance technology available – the reason why we selected 360 Vision Technology for its core imaging and efficient transmission technology.” Invictus TX’s all-in-one PTZ camera transmission Mark Rees, Managing Director at 360 Vision Technology, stated: “The Invictus TX’s high-performance, ruggedised all-in-one PTZ camera transmission with full 1080P HD and ultra-low-light camera technology, make it the perfect choice for off-grid temporary/rapid deployment mobile surveillance, such as the new MAST truck.” He adds, “Additionally, Invictus’ low-power consumption greatly assists the longevity of critical off-grid battery power when deployed in remote applications, and as in this application, extending the new truck’s operational performance and reducing camera maintenance requirements for the Strategic Protection Services team.” MAST truck deployed to provide reliable HD surveillance Since its inception, the MAST truck has been deployed to provide reliable, high-definition surveillance at street festivals, demonstrations, public events, sports events, border control, green space protection, and to support coast guard shoreline protection. “This is our most rapidly deployable MAST product, allowing real time decision making in almost any location,” says Stuart Bostock, adding “This MAST unit will fit directly into any truck bed and may be purchased to fit any existing approved vehicle, or as a fully operational truck, which can be driven into place and in operation within seconds. Any MAST truck can be built-to-order, to any specification, all using 360 Vision camera technology, including LED lighting, thermal integration and even radar.”
Expert commentary
When a bomb detonated in the Port of Beirut, I had hundreds of employees under my care inside the blast zone. Within just two hours, I was able to determine who was impacted, understand their safety conditions, and share resources for on-the-ground support—all thanks to mobile technology. For Chief Security Officers, receiving calls like these launches a variety of protocols and necessary decision-making with the safety and security of people and assets as a top priority. And these calls are only becoming more common. Dependence on threat intelligence Mobile phones have dominated the post-COVID environment where people work from anywhere Threats ranging from natural disasters to geopolitical conflicts are becoming more frequent and complicate the responsibility organisations have in keeping their people safe. To meet these needs CSO’s are staying ahead of negative outcomes through creating a greater dependence on threat intelligence. In these times, effective, real-time risk management depends on hyper-local data from technology that is accessible, portable, and dynamic–such as cell phones. Mobile phones have revolutionised the way people live and work. They allow us all to walk around with a computer in our pocket, bringing the world to our fingertips and eliminating digital borders for over 90% of the world's population. Mobile phones have dominated the post-COVID environment where people work from anywhere and have geographically distributed teams but are also more vulnerable to threatening events. Mobile-friendly risk management platforms Mobile technology assigns workers with easy entry to data that can help keep them and their teams safe As we approach 2024, many organisations are adopting comprehensive risk management tools that empower personnel across the organisation with the intelligence and knowledge they need to stay safe wherever they are. Mobile-friendly risk management platforms, such as Crisis24 Horizon, provide always-on awareness, on-hand threat intelligence, and immediate communications and distress signalling through location monitoring. Users receive location risk assessments and push notifications directly to their devices about nearby issues and threats no matter if they are on or off the job. While only select risk managers have complete control of the platform and all sensitive employee data is protected through encryption, the app distributes critical intel to foster a culture of shared awareness and responsibility. Thus, mobile technology empowers employees with easy access to information that can help keep them and their teams safe. Creating a culture of mobile technology adoption In the last few years, the world has proven the importance of being well-informed of risks and mitigation plans to minimise harm. However, psychological barriers tend to trump physical barriers when it comes to accessing the vast array of tools our mobile devices offer. World has proven the matter of being well-informed of risks and relief plans to minimise harm Adopting this technology and establishing a culture that enforces risk management across an organisation is a daunting challenge that demands substantial commitment from leadership to be successful. Some companies have tackled this challenge by positioning security technology as part of the organisation’s employee benefits package, such as commuter benefits and health insurance, to encourage people to take advantage of these resources and learn how to use them. Cohesive risk management culture Technology is only as effective as the people whose actions it informs, which is why adoption and integration are so important. When a cohesive risk management culture meets a powerful technology platform, individuals are enabled to receive threat alerts and counter their impacts, letting others know when and how to take the necessary precautions to protect themselves and their team. For more information on mobile technology and other security trends, check out the Global Risk Forecast, an annual report by Crisis24 that provides a comprehensive analysis of key events around the world most likely to affect operations in the coming year.
Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications. From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physical security systems Hospitals in particular have developed into multi-faceted spaces that house hundreds to thousands of patients, staff and visitors at any one time. In England for example, research has found in the three months leading to June 2023, an average of 44,626 people visited major hospital A&E departments each day, with over 16 million attendances typically recorded over the course of a year-not to mention an additional nine million logged at other minor units. For any building, this level of sustained footfall can request severe security difficulties For any building, this level of sustained footfall can invite severe security tests. With that, the need to deploy effective physical security systems in healthcare is clear. And so, as access control continues to become more readily adopted and new products enter the market, decision-makers are reminded to consider the requirements of their building, ensuring they select the solutions most suited to their settings and budget. Security controlled Patient safety will always remain the top priority in healthcare settings, and where matters of health and social care come into question, a diverse set of professional regulatory bodies are tasked with setting and maintaining high standards. When it comes to healthcare premises specifically, patient security and perimeter security often come hand in hand and are amongst the most pressing of challenges that decision-makers must face. To help address operational planning and potential design concerns in the NHS, the Health Building Note (HBN), provides general design guidance for healthcare buildings under HBN 00-01-citing the use of access control measures as a way of maintaining security and protecting the safety of patients, staff and visitors. Use of access control Hospital buildings control varied levels of access for a number of security purposes Hospital buildings, for example, must control varied levels of access for a number of operational and security purposes. Routine scenarios exist where vulnerable patients are under monitoring and thus refrained from exiting the premises for their own safety, while at the same time, permitted staff must be able to reach their patients and medicines when required. For this, the use of access control is key. Equally, access credentials can also help management teams keep track of those who may be entering or exiting rooms with equipment and pharmaceutical supplies, deterring any unwanted visitors and opportunists in the process. Incorporation of access control systems On a similar note, regulations have set a minimum standard for how personal data should be stored and managed in healthcare environments, giving decision-makers an added responsibility to regulate staff-controlled areas with patient medical records. While instances of personal data breaches are rare, healthcare facilities and professionals are at legal risk should confidential data be found misused or missing. As such, the incorporation of access control systems has become essential in keeping data storage areas secure, with intuitive online systems capable of permitting access to staff with the correct credentials while simultaneously tracking who has requested clearance at digital entry points. HBN guidance Healthcare experts are better fitted to control the sheer volume of people entering and exiting To function effectively, healthcare facilities must always be perceived as safe places by the people who reside within them, and as HBN guidance implies, a unified physical security system can help address key safety and security concerns while enhancing patient and staff experience. Opportunely, access control systems are more accessible and adaptable than ever and combine several technologies such as mechanical locks and automatic doors with electronic access credentials in the form of smartphone apps, badge readers and biometric scanners. By integrating these systems into the building’s existing infrastructure, healthcare professionals are better equipped to control the sheer volume of people entering and exiting the premises without impairing the general flow of movement and coordination around the facility. Better by design Despite the clear benefits offered to healthcare facilities, there are a number of considerations to be mindful of when choosing an access control solution. Poorly implemented systems can have an adverse effect on security and functionality - quickly costing healthcare organisations time and budget to rectify and replace the inadequate products that don’t meet the building’s requirements. For that reason, decision-makers and design teams are reminded that there is no single solution that fits all healthcare buildings. As such, it’s crucial for decision-makers to understand the systems that are being put in place throughout each of the touchpoints in their facility. Clear collaboration is required during periods of specification, where together, teams can ensure the selected product works on all angles, from meeting fire safety and sustainability standards to aesthetics and scalability. Modern access control products Scalability is a key area that decision-makers must review when selecting access control systemsFrequently overlooked, scalability is a key area that decision-makers must review when selecting access control systems. Such is their diverse nature; healthcare facilities can often change and develop as years go by, and by selecting a system that facilitates growth, such as a cloud-based solution-security and efficiency is long-established. While modern access control products are known for seamless integration, there are some systems that may restrict the ability to use different vendors throughout the remainder of the building’s infrastructure. This, in effect, causes a monopolisation of products throughout the estate, which can have an adverse effect on growth by increasing costs and reducing the levels of service associated with the security system already in place. Improve security and safety A scalable and reliable access control system will continue to improve security and safety by adapting to a building’s new requirements-and all while having minimal impact on its operational network. And so, while technology will no doubt continue to influence and transform the access control market, healthcare facilities and their professionals must continue to remain educated on their own systems, ensuring they have the best options in place to keep their patients, staff and visitors safe and secure for years to come.
Security systems represent a significant investment, yet many organisations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance or drive operational efficiencies. Consumption gap When users aren’t tapping into the full power of the solution they bought, they aren’t realising their full return on investment. This creates a consumption gap. It’s a situation that has the potential to go in one of two very different directions. A misreading of a system, its capabilities and functionality can fast result in user discontent Left unchecked a consumption gap can create frustration for system integrators, manufacturers and end users alike. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction. Leading to a greater likelihood that they’ll look to change or focus investment into overlapping and likely competing solutions. Customers’ security goals Addressed appropriately it can help manufacturers, system integrators and end users to build trusted partnerships in which everybody wins. Understandably, systems integrators are primarily focused on installation—delivering reliable solutions that meet customers’ security goals to ensure their long-term success. However, engagement can go beyond deployment. Closing the consumption gap can be a strategic way to differentiate yourself from competitors. The deeper you understand your customer’s business, the better advice you’re able to offer—and the stronger the partnership you form. Why do consumption gaps exist? For customers, finding the time to learn multiple capabilities of a security system can be time-consuming. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks. Often, taking use of new tools and keys takes a backseat to the speed of daily tasks There are many reasons why customers may not be taking full advantage of the features available to them in their security platform. They may feel overwhelmed by a steep learning curve after deployment and might delay diving into the additional system features. Sometimes, there might be a lack of awareness of the technology’s full capabilities, and despite a willingness to learn, there are few options for training. Often, it can simply be they are not aware of the benefits of their system or are too busy with day-to-day and urgent tasks to learn other features. Bridging the consumption gap Systems are built to deal with a wide variety of use cases and broaden market appeal, but the goal isn’t to get everyone to use all the features of every product. You want to guide your customers towards the features and functionality that best meet their needs. This could entail reducing the friction they experience in their day-to-day operations, solving unique issues related to their business, or addressing their most important challenges. Having these conversations with your customers deepens your relationship and can organically open up new revenue streams. Continuous engagement allows you to recommend other relevant products or services that they may find helpful. Customised training plan Customers can learn at their own pace and gradually expand their understanding of their system Furthermore, customers are often not able to implement all features at once. You can help by proposing a plan to gradually evolve systems and processes over time. This could include a customised training plan to get the most value from their investment. Some manufacturers are also now providing learning management tools that system integrators can pass on to their customers. Customers can learn at their own pace and gradually expand their understanding of their system in accordance with their bandwidth. This allows them to get more out of their system. Simplifying deployment With the right software partners, systems integrators can focus on solving customer problems, not reactively troubleshooting issues. Look for manufacturers who offer good support systems for integrators. This includes not only quality technical support but also configuration and training services you can build on. Look for partners that offer tools and consultation services you can use to complement your value-added services, either to spend less time on the basics or for specialised expertise on complex projects. Beyond support and services, one telling sign is the configuration interface and tools that you as an integrator will primarily interact with. Ask yourself whether the manufacturer invests in their back-end tools and their primary user interface. Is there a noticeable difference between these two interfaces in terms of look and feel? Does one feel more dated? Widening consumption gap The harder it is to implement upgrades, the more reticent customers are to make the changes If the end user interface is easy to use but changes on the back end are difficult, the resulting friction can contribute to the widening consumption gap. It can become too time-consuming or difficult to upgrade or make changes to the system. The harder it is to implement upgrades, the more reticent customers are to make the changes. Configuration should be painless. If the system has a solid graphical user interface, you’ll be able to interact with the software in a fluid and intuitive way. When the system is intuitive for both you and your customers, you spend less time on setup and training. You can invest more attention in value-added activities. Conclusion A consumption gap could be a sign that technological innovation is outpacing people's ability to implement them in their day-to-day lives. You can work with your customers to simplify the adoption of the innovations so they can more easily implement them and realise the full value of their investment. By reviewing opportunities to bridge the consumption gap for your customers, you increase the likelihood of growing and renewing your system and service contracts. You also build relationships as a trusted partner. Customers will turn to you when looking to expand their security system and proactively solve new and incipient problems.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Case studies
Adelante Healthcare currently operates seven healthcare centres in Phoenix, Arizona, and offers a wide array of services to patients of all socio-economic levels. The lock and key system wasn’t at all adequate for securing the seven different facilities. The facilities and all the patient and healthcare data needed to be protected in a highly secure manner. With so many employees, there was no way to track who had keys and how many copies were out there difficult to keep track of who had the keys. The choice It’s very easy to manage and we can focus our time on providing quality care to our patients" “The Brivo system makes my job easier and frees me up for other things. With Brivo, it’s easy to find out what we need; the system doesn’t lie," Larry Kadin, Facilities and Purchasing Manager, Adelante Healthcare. "It’s very easy to manage and we can focus our time on providing quality care to our patients.” The change Adelante has issued access cards to over 200 staff and the cleaning crews at their seven facilities. Without lots of keys floating around, the healthcare provider no longer has security breaches. One person is administering multiple sites from a single web interface. Access can be programmed easily and quickly, it’s done remotely and in a manner of just minutes. The team has better records and easy access to data that can be provided to other departments. The new system has had significant positive effects on staff productivity and effectiveness. “I’ve not seen anything that comes close to what Brivo provides. The Brivo system is a joy to work with. It saves us so much time compared to other systems we were looking at, ” Larry Kadin.
Athena Security’s Concealed Weapons Detection System was selected by Champions Club Texas to protect patrons, members and staff at a first-of-its-kind hospitality destination in Houston that features a full-service hotel, lounge and bar with Southern-inspired cuisine and private-membership poker. Located in Houston’s expanding Westchase community, Champions Club Texas is celebrating its grand opening as a destination offering something for everyone, from business travellers seeking comfortable accommodations with well-appointed amenities to locals looking for a unique night out. Weapons detection system Athena's Concealed Weapons Detection System (WDS)/Walk Through Metal Detector is engineered to detect a wide range of mass casualty threats like handguns, shotguns, and rifles without requiring individuals to stop as they pass through the detector. There is no need to have individuals remove phones, wallets, or other extraneous items from their pockets due to the proprietary multiple-sensor detection method. The system adheres to Federal Standards while allowing both auditory and visual alert options, as seen in the best practices of Homeland Security for WDS. The concealed weapons detection system is designed to scan walking at an average speed of one person per second. Unintimidating approach Athena Security is a solution that detects weapons upon entry and is one of the many layers of security “At Champions we are raising the bar in hospitality and gaming, and that includes ensuring the most comfortable and safe atmosphere for our valued customers,” said Trent Touchstone, Director of Security, Champions Club Texas. “Athena Security is a solution that detects weapons upon entry and is one of the many layers of security protocols in place at Champions that improves operational efficiency of our security team as a workforce multiplier.” Athena Security’s low profile, unintimidating approach is a welcome differentiator from historic metal detector tech by eliminating the need to check cell phones and keys, allowing for a better flow into the venue. Modest-full time security team Advanced analytics and management protocols allow for deep visibility and flexibility to maintain staffing levels providing the highest level of safety. Touchstone, a 28-year veteran of the United States Marshals Service Chief with a long history of threat analysis, notes that given the hotel and membership club will require 24/7 attention with a modest-full time security team, he appreciates Athena Security’s ability to provide a feature-rich entryway security experience with the ability to automate and accomplish so much remotely.
Like most stadiums worldwide, the Alsancak Mustafa Denizli Stadium suffers from vandalism and riots by individual fans. To be able to better identify and track perpetrators and thus reduce financial and non-material damage, the operator opted for a video security solution from the German manufacturer Dallmeier. The Alsancak Mustafa DenizIi Stadium in Izmir–named after former Turkish football player and current football coach Mustafa Denizli–is a multipurpose stadium that mainly hosts football matches. With over 15,000 seats, it is one of the medium-sized stadiums in Türkiye. Originally built in 1929, it was demolished in 2015 and reopened after reconstruction in November 2021. Up to 15% fewer spectators due to riots Outcomes have been painful, ranging from classic fines to the closure of an entire block of viewers In Türkiye, stadiums are usually owned by the Ministry of Sport, which then grants the rights of use to an operator. In the case of the Alsancak stadium, the operator is “Altay Izmir”, an Izmir-based football club that currently plays in Türkiye’s top professional league. The club, like so many other football stadiums, has had its fair share of repeated incidents and threats to spectators and players. These have included verbal abuse and even the throwing of objects onto the pitch. In addition to the intangible damage to the image, the consequences have been painful, ranging from traditional fines to the closure of an entire block of spectators–a loss of 1,000 to 2,000 spectators per home game, and that on a regular basis. How is image quality defined to recognise perpetrators? Under these conditions, the operators were looking for a solution that would allow them to reliably detect and track potential offenders. The tender specified a minimum resolution density of 144 pixels per metre (px/m), which is also required by law. This means that there must be at least 144 pixels in the camera image to represent every metre of “reality” in the stands. This value is between the “recognition” (125 px/m) and “identification” (250 px/m) qualities specified in the IEC EN 62676-4 standard for video surveillance systems. Only ten cameras to monitor the stands The Ministry of Sports decided to invite various manufacturers to a comparative test To find the most suitable solution for the Alsancak Stadium, the Ministry of Sports decided to invite various manufacturers to a comparative test. After receiving the proofs of concept (PoCs) of several companies, the owner chose a solution from the German manufacturer Dallmeier Electronic. In addition to around 140 single-sensor cameras for corridors, outdoor areas and entrances, only ten “Panomera®” multifocal sensor systems are required for the particularly critical grandstand surveillance. 39% more resolution than required The low number of camera systems required for grandstand surveillance is due to the patented multifocal sensor technology: Panomera® cameras combine the images from up to seven detail sensors and one overview sensor in a single camera system. This provides the user with a high-resolution overview of the entire area to be monitored, which acts as a single image of a vast environment. Within this overall picture, system operators can now open any number of detail views at the same time, while the overall scene is always available in high resolution–even during recording, which is essential for possible prosecution. This provides an optimal overview of the situation and ensures that all events can be followed in real-time, in high resolution and in detail. Thanks to this technology, a minimum of 200 px/m is now available throughout the Alsancak stadium instead of the required 144 px/m – 39 percent more than originally required. No surprises: Remote “FAT” and training from Dallmeier Türkiye Due to the COVID-19 pandemic, the stadium's technicians were unable to travel to Dallmeier's headquarters in Regensburg, Germany, to commission the system and attend classroom training. For this reason, the so-called Dallmeier Factory Acceptance Test (FAT) took place online. The entire system was set up, configured and remotely accepted in the FAT centre in Regensburg. The training of the technicians and operators was carried out by Dallmeier Türkiye experts on-site The training of the technicians and operators was carried out by Dallmeier Türkiye experts on site. Serkan Atalar, CEO of RESA Construction Electromechanical Inc. Co, the installer company that implemented the project, is very pleased: “Dallmeier's sincere and collaborative approach, as well as the high-tech products and after-sale support they offered were very impressive. We thank Dallmeier Türkiye for the great cooperation.” Author's quote “The customer is very satisfied with the Panomera® systems. The benefits are equivalent to combining a powerful megapixel camera with any number of high-resolution 'virtual' PTZ cameras. At the same time, the systems reduce the total cost of ownership for infrastructure, cables, masts, screens, workstations, etc.,” Serkan Atalar summarises. “Alsancak Stadium only needs three system operators with one monitor each. They also have two workstations for the police and management. The solution always gives them 100% control of the security situation in the stadium, allowing them to react immediately and reliably track down perpetrators. And all this at a low total cost of ownership and with minimal manpower thanks to the unique multifocal sensor technology.”
Quanergy Solutions, Inc., a provider of 3D LiDAR (Light Detection and Ranging) security solutions, successfully implemented its ground-breaking 3D LiDAR security solution at a prominent army barracks in the Middle East, resulting in a significant reduction in false alarms and the accurate detection of true intrusion attempts on base. Challenges with perimeter system The country’s military had long faced challenges with the barrack’s existing perimeter intrusion detection system, which relied on camera-based analytics and thermal cameras. This outdated system produced a high number of false alarms, leading to alarm fatigue that masked genuine intrusion threats. Solution: 3D LiDAR sensor and Q-Track The result was a hyper-accurate, flexible solution that allowed the army to deploy sensors Quanergy stepped in, deploying its unified 3D LiDAR sensor and advanced perception software solution, Q-Track, to pinpoint the exact location of a potential intrusion while tracking the direction and speed at which an intruder is moving. This near-perfect data was then ingested by the army’s Video Management System (VMS) to generate real-time, accurate alerts. The result was a hyper-accurate, flexible solution that allowed the army to deploy sensors over a diverse terrain with assorted elevations and suboptimal lighting. Successful intrusion detection The deployed Q-Track solution underwent rigorous testing wherein hundreds of intrusion attempts were simulated by military personnel, including fence-jumping and tunnel-digging, in both daylight and complete darkness. Quanergy’s highly accurate LiDAR system was proven to detect all true intrusion attempts made by military personnel, exponentially reducing false alarms and their associated risks. 3D LiDAR security solutions Quanergy’s 3D LiDAR security solutions are currently deployed at hundreds of critical infrastructure sites around the world, addressing a wide spectrum of mission-critical applications including perimeter intrusion detection, server rack and cabinet security, mobile security towers, mantrap/vestibule access controls, rooftop security, and more.
Located in the city of Gualeguaychú in Argentina, Carnaval del País is a festive season that runs for two whole months, holding the world record as the longest carnival in the world. It is full of lively events featuring energetic samba dancers dressed in sequins and feathers as well as parades of colourful and beautifully crafted floats. To accommodate the event, the city built its own Sambadrome called the Corsódromo, the first of its kind in Argentina. It has an extension of 500 metres long and a track width of 10 useful metres, which can hold up to 38,000 spectators. Challenges at Carnaval del País Implementing an outdoor video monitoring solution that can cover a capacity of 38,000 people was a massive challenge and not an easy task for the entire team. The client required a surveillance system that can monitor the crowd’s security; from the moment they enter the stadium, watch and enjoy the show, until they leave the premises. Recorded video footage must also be readily available for further analysis in case of an incident. Solution: Vari-focal Bullet WizMind Network Cameras This intelligent camera is also equipped with deep-learning algorithms that enable intelligent functions The team deployed several types of Dahua cameras around Corsódromo to monitor the situation during the carnaval. A dozen 4MP IR Vari-focal Bullet WizMind Network Cameras (IPC-HFW5442H-ZHE) were deployed to cover various areas of the venue. Aside from providing clear and vivid images, this intelligent camera is also equipped with deep learning algorithms that enable intelligent functions such as video metadata, smart object detection, people counting, and more. It has an IP67 waterproof rating and an IK10 vandal-proof rating, making it durable and reliable for outdoor applications. Cameras installed Other cameras installed include 4MP 32x Starlight IR WizSense Network PTZ Cameras (SD5A432XB-HNR), 2MP 33x Starlight+Laser WizMind Network PTZ Camera (DH-SD6AL233XA-HNR), and Integrated Solar Monitoring System (DH-SD6C3432XB-HNR-AGQ-PV). After each show, the situation at the entrance is also analysed through the recorded footage (via NVR5216-8P-I/L) to reduce waiting/queuing time in the future. Integrated alarm systems All cameras are checked one day before each event to ensure their optimal condition and performance It also helps in deploying security personnel in the right location to avoid unauthorised entry, theft, or any misdemeanour. What’s more, cameras with integrated alarm systems were strategically installed in crucial zones and were supervised by dedicated personnel regularly. All cameras are checked one day before each event to ensure their optimal condition and performance during the event. Results: Efficient monitoring solution The Dahua video monitoring solution deployed in Corsódromo for the Carnaval del País is a technological step forward from what it had in previous years. Through this new monitoring system, the management of the venue can efficiently monitor the situation inside the stadium and make necessary adjustments if needed. It helps optimise the entry time of spectators to avoid congestion and assists in assigning security personnel at crucial points around the venue to prevent incidents from happening; all of which contribute to the enhanced on-site experience of every spectator and improved security measures of Corsódromo.
Quanergy Solutions, Inc., a provider of 3D LiDAR (Light Detection and Ranging) solutions for highly dynamic environments, has successfully partnered with a prominent social media provider to effectively optimise the organisation’s use of space across campuses for enhanced productivity and improved employee experience. Improve space utilisation The social media giant faced the critical need to improve space utilisation across their campuses, which comprised of numerous conference rooms, cafeterias, and other general-purpose areas. Existing legacy solutions proved unreliable in these complex environments, failing to provide the desired level of accuracy while compromising employee privacy. Q-Track Q-Track ensures that employees’ privacy is protected while enabling the sensors to track individuals seamlessly To overcome these limitations, Quanergy leverages their seamlessly integrated solution that combines long-range 3D LiDAR sensors with advanced perception software. Quanergy’s solution provides extensive coverage across the diverse campus environments, accommodating both large and small rooms with various occlusions, such as tables, chairs, cabinets, columns, and pillars. With a unique object stitching mechanism, Q-Track ensures that employees’ privacy is protected while enabling the sensors to track individuals seamlessly, even when temporarily obscured from view. Hyper-accurate detection, tracking Quanergy’s solution resulted in the hyper-accurate detection, tracking, and classification of employees without compromising privacy or capturing any Personal Identifiable Information (PII). Through the use of occupancy related insights, the social media giant can optimise the use of available areas and achieve enhanced productivity among its workforce. The result is a comprehensive solution that outperforms traditional camera-based solutions and dramatically lowers total cost of ownership. 3-D LiDAR solutions Quanergy’s success in optimising space utilisation for the social media giant showcases the transformative potential of 3-D LiDAR technology in smart spaces. With its privacy-preserving capabilities and accurate tracking, Quanergy 3-D LiDAR solutions are already the preferred solution at over 100 global locations providing security for critical infrastructure such as data centres, utility plants, and airports, as well as for safe cities, and industrial automation.
Round table discussion
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
The role of the integrator/installer in the physical security marketplace is shifting as technologies evolve and applications expand. Integrators are being faced with a need to augment their expertise both in a wider range of systems and deeper into the specifics of each increasingly complex technology. At the end of the day, it falls to the integrator/installer to ensure a system performs as promised, however much a consultant or even a manufacturer might be involved in the process. We asked this week’s Expert Panel Roundtable: How is the role of the security installer/integrator changing?
Products
Videos
Mobile surveillance: Manufacturers & Suppliers
Honeywell GARD USB threat report 2024
DownloadThe role of artificial intelligence to transform video imaging
DownloadAccess control system planning phase 1
DownloadKey Findings from the 2024 Thales Cloud Security Study
DownloadFacial recognition
Download