Museum security
Seven minutes. That’s how long the recent Louvre heist took. In broad daylight, a group of thieves rode up on a construction platform, smashed display cases, stole several historical jewels tied to the Napoleonic dynasty and escaped on scooters before anyone in the control room even realised what was happening. It sounds like a scene straight out of “Mission: Impossible.” Only this time, Tom Cruise wasn’t there. In movies, we often see tight webs of red laser beams guard...
Against the backdrop of Vietnam’s expanding security, fire safety, and smart building sectors, Secutech Vietnam will return to the Saigon Exhibition and Convention Center (SECC) in Ho Chi Minh City from 14 – 16 August 2025. The 18th edition will span 13,000 sqm, hosting 480 exhibiting brands, presenting the latest solutions driving safer cities and smarter infrastructure. Held with concurrent events Fire & Safety Vietnam and SMABuilding, Secutech Vietnam will spotlight technolo...
iDenfy, a pioneer in identity verification and fraud prevention technologies, announced its latest partnership with Alevon, the first members-only art platform enabling U.S. clients to lease museum-grade artworks valued between $100,000 - $10M. This collaboration introduces a new level of security and efficiency to the high-end and luxury art leasing market using iDenfy’s AI-powered identity verification system, which was integrated directly into Alevon’s onboarding workflow. Inter...
Innodisk, a pioneering provider of industrial AI solutions, reaffirmed its pioneering position by showcasing its latest innovations at COMPUTEX 2025 in Taipei. This year, Innodisk’s live demonstrations spotlighted its optimised AI systems—including the APEX series—and computing solutions built on NVIDIA, Intel, and Qualcomm Technologies solutions. Innodisk’s comprehensive portfolio These were seamlessly integrated with Innodisk’s comprehensive portfolio of e...
G2E Asia and Asian IR Expo, the key marketplace for the gaming, entertainment and integrated resorts sectors, continues into its second and third days at The Venetian Macao and Galaxy International Convention Centre. The shows draw industry professionals from across the region for a dynamic agenda of over 50 education sessions delivered across four stages. Range of key topics The content spans a wide range of key topics: High-level insights into gaming and entertainment at the G2E Asia Con...
Secutech 2025 is set to showcase a comprehensive array of cutting-edge solutions from 7 – 9 May at the Taipei Nangang Exhibition Centre. This one-stop platform for smart technology and business will cover 15,120 sqm and feature approximately 400 exhibitors from eight countries and regions. Sourcing and business connections Edition is expected to attract visitors, including system integrators, manufacturers, and distributors With a fringe programme of over 140 seminars and 14 trend...
News
G2E Asia and Asian IR Expo, the pioneering marketplace for the gaming, entertainment and integrated resorts sectors, officially opens today at The Venetian Macao, with more than 10,000 industry professionals from 80 countries and regions expected to attend. Running from May 7-9, the exhibition spans over 30,000 sqm, showcasing over 150 exhibitors and featuring cutting-edge products and technologies that encompass the full spectrum of the entertainment and travel industries. Opening ceremony officiated by key local figures The joint event officially commenced with a grand opening ceremony officiated by key figures from the local industry, highlighting the event’s importance as the key platform and reinforcing the region’s commitment to industry growth and cross-border collaboration. Event officially commenced with a grand opening ceremony officiated by key figures G2E Asia Conference begins with distinguished keynote lineup Kicking off on May 7-9 alongside the exhibition, the G2E Asia Conference opened with a compelling program and a strong lineup of industry pioneers. G2E Asia Conference opened with a compelling program and a strong lineup of industry pioneers May 7 featured Francis Lui, Chairman of Galaxy Entertainment Group, delivering the opening keynote on the evolving entertainment landscape and Ed Bowers, President of Global Development of MGM Resorts International, presenting the afternoon keynote on gaming and market transformation. Centered around the Asian Market Forum, the day also welcomed notable speakers including Praveen Choudhary, Managing Director of Morgan Stanley Asia Limited; Fredric E. Gushin, Managing Director and Chief Executive Officer of Spectrum Gaming Group; and Niall Murray, Chairman of Murray International (Macau) Co. Ltd., setting the stage for two more days of strategic insights and future-focused discussions. 100 Exclusive products debut across the show floor Among the showcased products and solutions, 100 exclusive launches are making their debut in Asia for the first time. From established brands to rising stars, the launches span a diverse range of functions within the gaming and integrated resorts sectors, underscoring the limitless potential for innovation and growth within the industries. 100 exclusive launches are making their debut in Asia for the first time May 8 event highlights G2E Asia and Asian IR Expo continues May 8 with a full lineup of activities, including: The G2E Asia Conference running until May 9, addressing key topics including Technology and Innovations for Gaming; the 4th Asia Pacific Responsible Gaming Forum; and IAGA Best Practices Institute. Speakers include Jerry Chan, Senior Vice President of Electronic Gaming & Special Projects of Okada Manila; Guojing Su, President and Professor of Asian Responsible Gaming Alliance; and Hikaru Oguchi, Partner of Nishimura & Asahi. The final day of the Asian IR Summit, offering in-depth discussions on Sportainment and New Era of Entertainment. Speakers include Kevin Benning, Senior Vice President and Studio City General Manager, Melco Resorts & Entertainment; Jeffrey Jiang, EVP- Entertainment Services, Galaxy Entertainment Group; Michael Jensen, Senior Vice President of Strategic Optimisation of Wynn Macau and Wynn Palace; Jeremy Walker, Senior Vice President, Marketing and Event Services, Galaxy Entertainment Group; Raymond Lo, Senior Vice President, Head of Global Marketing and General Manager of Altira Macau and Mocha Clubs, Melco Resorts & Entertainment; David Baxley, Vice President of Regional Entertainment, Sands China Ltd. An afternoon of expert-led sessions on smart hospitality at the Tech Talk, located within the exhibition. An afternoon exploring table games technology at the Gaming Innovation Forum, also within the exhibition. Exclusive networking cocktail events designed for table games and marketing professionals. The G2E Asia After Party at Para Club Macau, City of Dreams, with tickets available for purchase onsite at the event.
Asian IR Summit officially kicks off, May 6, at the Galaxy International Convention Centre in Macau, bringing together top executives from both local and international travel and integrated resort sectors. Over the next three days, industry pioneers will engage in high-level discussions, addressing the challenges shaping the future of the industry. The Asian IR Expo exhibition, co-located with G2E Asia, opens at May 7-9, at The Venetian Macao, with complimentary shuttle service to ensure seamless access between the two venues throughout the event. Macao government tourism office opens summit The Asian IR Summit will continue to spotlight key industry trends, including emerging technologies Asian IR Summit proudly opened with a keynote address by Maria Helena de Senna Fernandes, director of Macao Government Tourism Office, setting the tone for the day with key insights into the integrated resort sector, particularly in Macau. The day’s theme focuses on the industry and hospitality, featuring speakers including Wade Howk, Chief Operating Officer of Inspire Entertainment Resort; Jeffrey Kiang, Equity Analyst of CLSA; and Angel Sueiro, Chief Operating Officer of PH Resorts Group, who explore the opportunities and challenges of incorporating non-gaming components into integrated resorts across the Asia region. Over the next two days, the Asian IR Summit will continue to spotlight key industry trends, including emerging technologies, the rise of sportainment and the evolution of next-generation entertainment. Celebrating the finest in gaming and entertainment Introducing the G2E Asia Awards, recognising excellence and innovation across the industry. Winners will be announced the day before the exhibition, with honours given in five key categories: Best Slot Award, Best Electronic Table Game Award, Best Table Game Award, Best Casino Supply Award, and Best IR Tech Solution Award. All winning and nominated products will be showcased in the exhibition, allowing attendees to experience them firsthand. May 7-9 exhibition highlights The pioneering joint event is expected to attract over 10,000 visitors from 80 countries and regions. Event highlights include: New Smart Hospitality Technology Experience Zone offering an immersive and interactive onsite experience. Technology Zone and Tech Talk showcasing the latest advancements from emerging industry brands. New Gaming Innovation Forum highlighting cutting-edge innovations from G2E Asia Awards nominees across the gaming industry. Targeted Networking Events for professionals from the slots, table games, MICE and marketing industries.
SMARTSHOOTER, a world pioneer in fire control systems, will showcase its handheld and remotely controlled SMASH solutions at the DEFEA 2025 defence exhibition in Athens, Greece. The company will present its combat-proven SMASH 3000 Fire Control System and the SMASH Hopper Light Remotely Controlled Weapon Station (LRCWS), demonstrating advanced capabilities for counter-UAS (CUAS), maritime security, border defence, and perimeter protection. SMARTSHOOTER’s SMASH technology Combat-proven and in operational use by defence, homeland security and border protection forces across Israel, the UK, Europe, the USA, India, and more, SMARTSHOOTER’s SMASH technology dramatically increases operational effectiveness by ensuring each round finds its target. The SMASH 3000 is a lightweight, day/night capable fire control system that enables precise target engagement in complex operational environments—on land, at sea, and in the air. Designed for integration with C4I systems, battle management software, and external sensors, the SMASH 3000 supports tactical, multi-layer defence operations and can function as both a standalone solution and a component of a networked CUAS or perimeter protection architecture. SMASH Hopper securing maritime borders The SMASH Hopper is ideal for securing maritime borders, protecting critical infrastructure The SMASH Hopper, a modular, rapidly deployable LRCWS, is designed to address evolving threats from a safe distance. Easily integrated onto manned or unmanned platforms—such as vehicles, naval vessels, UGVs, and fixed observation points—it combines precise fire control with multi-mission flexibility. Controlled remotely, the SMASH Hopper is ideal for securing maritime borders, protecting critical infrastructure, and delivering short-range CUAS defence when paired with radar and command-and-control units. How SMASH systems support mission success Michal Mor, SMARTSHOOTER CEO, commented: “At DEFEA, we’re focusing on how our SMASH systems support mission success in maritime, border, and tactical environments. From handheld rifles to remotely controlled weapon stations, our technology transforms standard weapons into smart, precise, and effective defence systems." "Whether defending forces on the ground or securing national borders, SMASH delivers the accuracy needed to counter modern-day threats—including drones.”
Hyundai Global Services has announced the signing of a contract to deliver its Smart Ship and Satellite Communications package to KSS Line shipping fleet supported by Inmarsat’s Fleet Xpress and digital solution Fleet Connect. This is the first time that the Integrated Smart Ship solution from the world’s largest shipbuilder Hyundai Heavy Industries will be delivered as a single package with a satellite communications service. Smart Ship and Satellite Communications The Smart Ship and Satellite Communications package is a combination of the ISS – an IoT platform for ships, developed by HHI Group to support vessel operation and device optimisation – supported by Inmarsat’s dedicated bandwidth service. This achievement is a direct result of a collaboration between HGS, Intellian and Inmarsat, the world leader in global, mobile satellite communications. Intellian and HGS signed a Memorandum of Understanding (MoU) in July 2019, and a similar arrangement between HGS and Inmarsat was signed in June 2019 at the Nor-Shipping exhibition in Oslo. The package will allow large volumes of measured data to be transmitted between ship and shore quickly and easily, facilitating remote operations and vessel management, monitoring and analysis services, through Fleet Connect dedicated bandwidth. This is separate from the vessel’s Fleet Xpress connection that will be used for day-to-day business traffic and crew internet use. Digital Fleet Transformation “Our plan is for our entire fleet to be operating using the Integrated Smart Ship and Satellite Communications solutions by 2021,” said a spokesman for KSS Line. “KSS Line is committed to continuous enhancement of its Information Communication Technology (ICT) environment to maximise fleet efficiency and reinvest the resulting savings into its business expansion.” A total of 15 ships are covered by the contract, including five new vessels and 10 already in operation. The five new ships will be equipped with ISS from build, allowing their operators to manage assets more economically and efficiently. The 10 existing vessels will be provided with separate supporting web services to relay weather conditions and ship locations. The signing ceremony was attended by senior executives from both HGS and KSS, including KSS Line’s President Lee Dae-sung, Executive Director Lee Seung-woo and Executive Director Park Wook-jae; and Hyundai Global Services’ boarder members Lee Seung-woo and Executive Director Park Wook-jae; and Hyundai Global Services’ border members. Maritime Digital Milestone “This is a breakthrough for our Integrated Smart Ship and Satellite Communications solution and a milestone for maritime digitalization, delivering always-on IoT in a single package with dedicated bandwidth that can be installed on existing ships or embedded at newbuild,” said Kyoungsoo Ahn, HGS Director. Intellian CEO Eric Sung said: “Smart shipping is an area of growth and importance for the maritime industry, with the opportunity for customers to gain efficiencies and cost savings on vessel operations. Through collaborating with our partners and delivering industry pioneering connectivity solution” “Intellian has a key role to play in helping customers achieve their objectives. Our partnership with HGS and Inmarsat will deliver great value to KSS Line and we are confident that more of the maritime industry will follow their lead, signing similar agreements in the future." Integrated Connectivity Solution “We are delighted to be working with Hyundai Global Services and Intellian on this new Integrated Smart Ship solution with a line-fit satellite communications service at its heart, which means that an owner such as KSS can benefit from a service that is built-in by the shipyard and fully operational on delivery,” said Inmarsat Maritime President Ronald Spithout. “It is especially pleasing to see that our new digital solution, Fleet Connect will be a vital part of the service which highlights how Fleet Xpress is so much more than just a VSAT connectivity pipe.”
Commtact, a provider of advanced wireless communication solutions for defence, security forces, and robotic platforms, will showcase its latest innovation, the Micro Phoenix, at the DEFEA 2025 exhibition in Athens, Greece. As part of the company's portfolio of mission-critical communication systems, the Micro Phoenix delivers secure, resilient, and high-performance connectivity for land, air, and maritime platforms, in a compact, lighter-than-ever design. Commtact is also proud to announce its first contract for the Micro Phoenix, securing a deal with a defense customer to integrate the system into missiles and unmanned platforms. Data link solution Micro Phoenix is a compact, lightweight data link solution designed for drones, missiles, and unmanned systems The Micro Phoenix is a compact, lightweight data link solution designed for drones, missiles, and unmanned systems. Engineered with SWaP (Size, Weight, and Power) constraints in mind, it weighs only 110 grams and offers advanced full-duplex wideband digital links with robust anti-jamming and GPS-deprived operational capabilities. The system supports multiple topologies, including Point-to-Point (P2P), Point-to-Multipoint (P2MP), Relay, and Multi-Platform Smart MESH, ensuring long-range connectivity of up to 150 km in complex operational environments. Introduction of the Micro Phoenix “The introduction of the Micro Phoenix marks a significant step in Commtact’s continuous innovation in secure and resilient communication solutions,” said Guy Avrahami, VP Sales & Marketing at Commtact. “This system is tailored to meet the growing demand for lightweight, high-performance communication solutions for unmanned and missile platforms." "It demonstrates our commitment to delivering value for customers in the field of munitions—where information must be transferred in real-time. We are proud to announce our first contract for the Micro Phoenix, demonstrating the immediate value it brings to our customers.” Phoenix command and control infrastructure Phoenix system, the Micro Phoenix seamlessly blends with the existing Phoenix power infrastructure Building on the success of its predecessor, the Phoenix system, the Micro Phoenix seamlessly integrates with existing Phoenix command and control infrastructure. This enables current users of the Phoenix system to expand their capabilities without requiring additional control systems, enhancing operational flexibility and cost-effectiveness. Range of advanced wireless communication solutions The Micro Phoenix is also equipped with AES-256 encryption and optional CAT & TSV security layers, providing high-level data protection. Its Software Defined Radio (SDR) architecture allows for configuration and adaptation based on customer-specific requirements, making it an ideal solution for defense and security forces worldwide. At DEFEA 2025, visitors to Commtact’s booth will have the opportunity to explore the Micro Phoenix and the company’s full range of advanced wireless communication solutions which are ideal for aerial, ground, and naval operations.
Intersec Shanghai, the Chinese extension of the globally recognised security brand Intersec, will launch 13–15 May 2025 at the National Exhibition and Convention Centre (Shanghai). Gathering a variety of exhibitors, the fair will spotlight digital technologies and innovative solutions across key sectors, including security, fire safety, emergency response, and occupational protection. Digital advancements With a special focus on cutting-edge digital advancements, the show aims to empower public safety, emergency management, industrial safety, and disaster prevention. The global security landscape has become increasingly complex in recent years, driving governments worldwide to prioritise the safety and security sector. Smart security hardware and software market China has taken significant steps by implementing a series of policies to accelerate industry growth China has taken significant steps by implementing a series of policies to accelerate industry growth. By 2025, the smart security hardware and software market in China is projected to reach RMB 91.3 billion (USD 12.5 billion), while the market for occupational protection products is expected to reach RMB 145 billion (USD 19.9 billion). Furthermore, the smart fire safety market is anticipated to surge to RMB 422.2 billion (USD 57.8 billion) by 2026. A joint report by SIA, ASIS, and Omdia predicts a CAGR of 8.2% for the global physical security equipment market and 6.9% for security services from 2022 to 2026. Against this backdrop of robust domestic growth, Intersec Shanghai emerges as a pivotal platform for companies to showcase their innovations and expand their market reach. Global and domestic industry pioneers under one roof Intersec Shanghai combines Messe Frankfurt’s international expertise with Intersec’s extensive resources in the security sector. The show will be held concurrently with the Yangtze Delta International Emergency Disaster Reduction & Rescue Expo (EDRR), which focuses on government-led emergency systems and disaster resilience. Latest advancements in security The previous edition’s EDRR attracted more than 600 exhibitors and over 80,000 visitors, together drawing a higher number of buyers The previous edition’s EDRR attracted more than 600 exhibitors and over 80,000 visitors, together drawing a higher number of buyers and offering a valuable opportunity for cross-sector sourcing in security, safety, and disaster risk reduction. This year, both fairs have attracted pioneering brands such as 3M, HAINAR GROUP, CETC, CPIC, StarWin, Fire Chem, BFDX, GRANDING, LINGYIN, HANGZHOU AITE, DXGuard, Inrico, Lenovo, BAOLIFENG, OUBAO, PICC, Raythink, Beckwell, SHANGHAI HANYU, Shanghai Hygloves, Shanghai Petrochemical, Shanghai Xihongqiao Navigation Industry Development, Kingber Safety, CommPro, Tianlong Century, CRUN LTD, Sinomartin, Sunstorm, Jiaogao Fire Protection, TAIYU, Zhoan, TLX, top safe, Tyco, VdS, WALLEAN, huangdongmei trading, LONGJUN FIRE EQUIPMENT, YUNHE Technology, FERRASUN, Wanlian, Zhejiang Xun'an Flood Control, e-sunhigh and more. These exhibitors will present their latest advancements in security, fire safety, and emergency response, fostering cross-industry collaboration and growth. Adaptable training systems and real-world scenario simulation Among them, YUNHE Technology will showcase its VR Firefighting Training Solution and Military Deployment Command Training System, emphasising adaptable training systems and real-world scenario simulation. These solutions are designed for emergency management, public safety education, professional training for firefighting and security units, and industrial safety training. YUNHE Technology highlights the industry’s shift from ‘passive protection’ to ‘operational empowerment’, where security converges with human behaviour data, smart feedback, and education. Range of high-efficiency solutions The platform aims to facilitate digital transformation for enterprises, allowing them to operations TLX is a fire safety pioneer in integrated solution design and manufacturing. At the fair, the company will showcase its Supervised Latching Solenoid Actuators, along with a range of high-efficiency solutions tailored for complex fire suppression needs. Meanwhile, Tyco, a security pioneer, will introduce its one-stop security management platform, enabling seamless compatibility with third-party systems for fire control, building automation, human resources, and more. The platform aims to facilitate digital transformation for enterprises, allowing them to streamline their operations. Digital frameworks connecting security innovations Beyond the showcase, the Intersec Shanghai Digitalisation Application of Security Industry Value Chain Summit will bring together government officials and industry pioneers to explore digital solutions in security, emergency response, fire safety, and occupational protection. The summit will provide a comprehensive business platform for all industry stakeholders. Key highlights include: Trend analysis: experts will analyse policy trends and technological advancements, featuring case studies on digital applications in energy mining, smart buildings, and environmental safety monitoring. Report launch: the 2025 Digital Transformation Survey for the Safety & Security Industry will be released, providing essential standards and practical guidelines for the sector. Real world applications: focused on ‘full-scenario integration’, sessions will delve into digital applications for safety supervision, operational maintenance, and early-warning systems across critical sectors. Awards ceremony: the a&s Top Digital Products & Solutions Awards will recognise outstanding innovations, serving as a trusted reference for integrators and end-users in their procurement decisions. Intersec Shanghai is organised by Messe Frankfurt (HK) Ltd and CCPIT Shanghai.


Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
We work with and buy from “middlemen” all the time, yet the term remains loaded with negative connotations. It’s telling that the term remains gendered, no one has tried very hard to normalise the term “middleperson” in the same way as “chairperson” or “police officer.” Why? It’s easy to see a middleman as an inconvenience, someone who skims profit off the top while offering no real value to the end customer. Think of the second-hand car salesperson or estate agent of the popular imagination. Management of added services Yet we buy from retailers and marketplaces every day without complaint. As long as we see a middleman as providing value and convenience rather than getting in the way, they’re safe. This does mean, however, that resellers and integrators need to carefully manage how they are perceived and how much their added services are valued by their customers. The risk to security integrators Security policies need to be integrated, and the way physical and cybersecurity works needs to reflect these policies Businesses have often relied on security integrators to break down silos between security systems to strengthen both physical and cybersecurity postures. Typically, these have been seen as separate, but the increase in remote working and the adoption of cloud-based physical security has blurred the lines between the physical and the digital. Security policies need to be integrated, and the way physical and cybersecurity works needs to reflect these policies, rather than a siloed approach that will mean one is more secure than the other, and security integrators can help bridge this gap. Macroeconomic headwinds, digital transformation Security integrators have also proved invaluable in filling skill gaps within organisations. Not every business can be expected to have the staff and skills needed to successfully overcome integration challenges, they may have cybersecurity and physical security experts, but perhaps not both. And if they do have experts on staff, they may lack knowledge of the cutting-edge technologies that will protect their businesses best. This unique and esteemed role of security integrators is today at risk of disruption. Macroeconomic headwinds mean that businesses are scrutinising every budget line and asking if each is necessary. Digital transformation means they are questioning old ways of doing things are the providers they worked with five years ago, or longer, the same people who are going to give them the best value today? Research findings on current trends Unfortunately, many security integrators are not keeping up with change. Our research has found that only 26% of customers consider integrators up to date with the latest technologies. Businesses rely on these providers to navigate a new and confusing security landscape and only one in four say they are confident their partners have researched the road ahead. In the past, providers may have relied on having better knowledge than their customers. But 73% of security solutions buyers are doing their research on vendors and technology. Integrators risk being underprepared to serve a market that is more and more educated in the products they are providing a dangerous situation for any middleman. Finding the gap Who needs to outsource in-depth technical knowledge of security when they have that knowledge available in-house? The research suggests a shrinking gap for security integrators. Who needs to outsource in-depth technical knowledge of security when they have that knowledge available in-house? However, the problem may not be as dire as the research first suggests as long as integrators act to address the risks they face. Education Businesses are educating themselves about the market. They want to know what is available to stay safe, both in a physical environment and from online threats. This is understandable given how the news cycle, both of these spaces have seen an increase in potential threats, and the cost of cleaning up after a ransomware or similar attack has spiralled. Any sensible business will review what they have in place and their future options. Advance industry knowledge It has never been more important for the integrator community to advance their industry knowledge. They truly are the experts, and have an in-depth understanding of the latest trends, the advancement in cloud security, and the shifting demands of users. They also need to provide better service and consultancy. As the security world gets smarter and more cloud-based, security integrators who are well-informed and educated will have a clear advantage in the market. After all, most businesses don’t want to spend time researching and upskilling in areas where they can effectively outsource. Security integrators must be able to reassure their customers that they are up to the task. Bring on added value But to thrive, security integrators need to bring more value to the table and also be seen to be providing more value The problem may be perceptions rather than the actual value that integrators can offer. If integrators are more informed than their customers realise, they need to do more to let their customers know. This could be down to being too reactive i.e., not anticipating customer needs and simply waiting for them to ask for particular services or products or not demonstrating knowledge as part of regular customer service. There is still very much of a gap for security integrators in today’s market. They can survive in this gap. But to thrive, security integrators need to bring more value to the table and also be seen to be providing more value, more than a middleman, but a provider that can advise on the right products to meet specific needs and make those products work for their customers in an integrated way. Reinventing via consultancy They need to provide consultancy so their customers understand how best to ensure online and physical security work together to keep a business safe. Most of all, they need to demonstrate their knowledge to their customers and make sure they understand the value they bring. Businesses won’t be safer by relying on their research and knowledge to buy and install security products, but if they don’t understand the benefits of a specialist integrator, they may choose this route. It’s up to security integrators to reinvent themselves as the better kind of middleman if they want to remain relevant.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Well attended and generating levels of excitement not seen since before the pandemic, ISC West may provide just the shot of adrenaline we need to drive industry success through the uncertain economic times ahead. Buzzwords like artificial intelligence (AI) and the cloud were still prevalent at the conference and exhibition in Las Vegas, but the hype of yesteryear seemed more subdued. Rather than breakthroughs to be celebrated, AI and cloud were discussed more as ways systems can realise even greater potential. Rampant cybersecurity attacks Rather than hype, discussions seemed much more practical and down-to-earth, encompassing shifting customer needs and how to address pain points. There was more discussion of the shift of security from a cost center to a profit center, where industry technologies can contribute to an enterprise’s bottom line. More companies seemed to be vigorously addressing the challenges of cybersecurity More companies seemed to be vigorously addressing the challenges of cybersecurity, although perpetually an obstacle. The industry seems more devoted than ever to protecting physical security systems in an age of rampant cybersecurity attacks. But more than in years past, it was the ISC West event itself that generated the most buzz. The crowded aisles of the exhibition seemed both reminiscent of the pre-covid past and prescient of the industry’s even brighter future. From booth to booth and attendee to attendee, the enthusiasm was both conspicuous and contagious. Everybody was thinking: ‘Wow! What a show!’ Pushing technology to the edge “The practice of physical security is about more than understanding threats, and end users are thinking now about the bigger picture of security and how networks work in the broader context of the business,” said Andrew Elvish, Vice President, Marketing at Genetec. Problems of latency and miscommunication are elements pushing technology to the network edge, he says. For example, in an access control scenario, decision-making should be as close to the door as possible to avoid network congestion, delays, or failure. Andrew Elvish, Vice President, Marketing at Genetec, displays Axis network door controller ‘powered by Genetec’ Elements pushing technology Reflecting the philosophy is a new collaboration introduced at the show called ‘Axis Powered by Genetec,’ an enterprise-level access control offering that combines Genetec Synergis software with A1210 and A1610 network door controllers by Axis Communications. Elvish says lines are blurring when it comes to edge versus cloud technologies. Rather than choosing ‘either-or,’ a blending of approaches is optimum, always ensuring that “Decision-making is close to the point of actuation,” he says. On-premise versus cloud systems Elvish also points to changing assumptions about the industry roles of on-premise versus cloud systems Elvish also points to changing assumptions about the industry roles of on-premise versus cloud systems. Historically, the assumption was that on-premise systems are most appropriate for enterprise customers, while the cloud is the best approach for small- to medium businesses (SMBs). Depending on the end customer’s needs, a system can be either or both at the same time. Rather than debate cloud versus edge, customers should consider the outcomes they seek, and how technologies can be merged to provide those outcomes. “They should consider a solution where they do both, with the gradation of controls provided at their fingertips,” says Elvish. Combining security into one platform Unifying security and related functions on a single platform was a widely evident trend at ISC West. An example is Verkada which now offers a unified platform that includes video, access control, and intrusion detection, as well as other functions such as air quality sensors, visitor management, and a door intercom. David Tsang, Product Director of Verkada, predicts demand to combine technologies into a single platform will grow in the industry. Furthermore, as data is collected in the single system, enterprises will find new ways to ‘connect the dots’ to provide better business intelligence. Air quality sensors Verkada’s cloud-based system enables fast deployment of the single platform “Our approach to building products is based around the idea that every company has different needs, and they want technologies to integrate seamlessly and operate off the same platform,” says Tsang. In addition to seamless integration, each product must also be able to stand on its own. Tsang manages Verkada’s various product categories, including access control, air quality sensors, intercoms, etc. Verkada’s cloud-based system enables fast deployment of the single platform, and the company works with dealers to ensure delivery of a 'better partner experience.' What happens after a binge of acquisitions? Acre Security unveiled a new corporate ‘identity’ and a big booth highlighting the technology brands the company has acquired over the last several years. Brands such as Feenics, ACTMobile, Comnet, Razberi, and others reflect Acre’s acquisition of these companies but are now being promoted as technology choices under the ‘one Acre’ approach. Don Joos, CEO of Acre Security, looked ahead to the future of the company at ISC West Visitor management product categories Change is in the air, and the booth’s unified visual design signifies the new direction for the company, says Don Joos, Acre’s CEO. Various technologies can be delivered via the cloud, through an on-premise installation, or using a hybrid approach Acre is highlighting ACTMobile’s mustering capability, useful in the K-12 market In tying technologies together, the ACTMobile product will play a key role in two major verticals -- command-and-control and K-12 schools. Acre is highlighting ACTMobile’s mustering capability, useful in the K-12 market, which was adapted from a technology used in the cruise industry. The Acre approach is to embrace the variety of opportunities available in the access control, intrusion, and visitor management product categories within a broad definition of ‘security’ that embraces both core capabilities and ‘adjacencies,’ says Joos. Acre seeks to enable customers to protect people, facilities, and critical assets. They manage customers’ security data and provide the insights they need. Ensuring a cohesive security system A challenge in the industry is combining various single products into a cohesive whole. “There are many products that do one thing well, but it’s harder to build a cohesive security platform,” says Ryan Schonfeld, Founder and CEO of Hivewatch. Hivewatch is a software platform that performs the functions previously associated with a ‘PSIM,’ which is a physical security information management system. The term PSIM has earned a questionable reputation in the industry, plagued by added costs and the perpetual challenges of integrating with ever-changing software platforms. Information management system Hivewatch seeks to bypass other software systems and to integrate as closely as possible with devices Hivewatch seeks to bypass other software systems and to integrate as closely as possible with devices on the edge, thus avoiding the impact of software system changes. They integrate with data in a ‘different way’ that eliminates the need to conform to other software systems. In today’s climate, the term ‘security’ could be seen as limiting when it comes to the various functions our industry’s systems can perform in the broader enterprise, says Schonfeld. Traditional enterprise reporting structures that have physical security reporting to the facilities or real estate department are limiting the broader role security can play in the enterprise. Positioning physical security Changing norms are positioning physical security to report to the CIO or CISO, thus reflecting physical security’s role in collecting and analysing data. Higher visibility within the enterprise can help security expand its influence and impact. “Security is too limiting, and it can keep us from getting a seat at the table,” says Schonfeld. “We need to shift from being a cost center to generating revenue and/or driving business — and data is the key. Rather than leading by fear, we need to show the value security can drive.”
IFSEC International took place over three days at the ExCel in London, presented alongside shows covering fire safety, intelligent buildings, facilities management, and safety and health. While perhaps not on the same scale as pre-pandemic events, the atmosphere was convivial and spirits high, everyone glad to be back amongst their peers in the industry. Predictably, the trending topics were steered by issues in the wider world: sustainability, moving services to a subscription-based model, and new ways of working inspired by COVID-19 safety measures. A place for cutting-edge innovation After a challenging couple of years, companies were keen to meet customers, showcase their products and reveal the latest innovations. Integrated Design Limited displayed their new Glassgate 400 Plus turnstile, a sleek design for the corporate market. Tony Smith, Major Accounts and Marketing Manager, Entrance Control and Turnstile Security, told SourceSecurity.com, “I feel trade shows are a very important part of IDL’s marketing effort. We are more than pleased to display alongside our peers and have customers make direct comparisons with our products and theirs.” Biometric access reader Biometrics, as ever, generated a lot of interest, including the European launch of RealNetworks’ new SAFR SCAN biometric access reader, which combines facial recognition, computer vision, and image capture technologies for a range of applications. “Overall, there was a really good footfall, and we met an excellent mixture of end-customers, system integrators, distributors, and consultants from both Europe and the Middle East who are exactly the types of people we were hoping to demonstrate SAFR SCAN to,” commented Charlie Bennett, Vice President UK & Europe – SAFR, RealNetworks. Access control systems going green HID Global is one company leading the way in the move away from plastics to focus on mobile access The eco-friendly trend and the need to be more sustainable is becoming a real force in the security industry, particularly in access control where there is considerable pressure to ditch the plastic. HID Global is one company leading the way in the move away from plastics to focus on mobile access. Gerald Grattoni, Physical Access Control Solutions Regional Business Unit Vice President at HID Global (part of the ASSA ABLOY Group), explained in a press briefing, “Making buildings smarter and more eco-conscious is high on the corporate responsibility agenda of many companies as the sustainability credentials of new buildings are now very important. With digitalised mobile identities there is less plastic waste and lower emissions.” Flexible, remote, and contactless Innovation in smart buildings is also being led by changes to how we work, live, and play, inspired in part by the recent pandemic. New technology is required to meet the needs of the hybrid workspace, as employers adopt more flexible working models and demand for contactless access control increases. Now, the most technologically sophisticated buildings are controlled by an app on a mobile phone, giving ease of access and full control without the need for plastic cards. Remote monitoring Advances in remote monitoring have escalated due to COVID-19, particularly in high demand in the health and education markets. Connecting via industrial standard network protocols allows for remote communication Ian Bridgewater, Director, Technical Sales Manager, TOA Corporation (UK) Ltd, explained further, “Connecting via industrial standard network protocols allows for remote communication. Working with specialist software developers has expanded this, giving greater flexibility to monitor and maintain systems remotely from a central hub.” AI-based autonomous access solution AI also has a role to play in this new high-tech, touchless world and various companies are utilising this technology. Alcatraz AI found IFSEC the perfect opportunity to exhibit their new Rock autonomous access solution. "We now live in a time in which AI can make precise real-time decisions at the door to authenticate or deny access using your face as a credential,” said Greg Sarrail, Senior Vice President of Sales at Alcatraz AI. “IFSEC 2022 allowed Alcatraz AI to demonstrate the speed and accuracy of autonomous access control. The number of qualified partners and end-users representing a broad international scope in attendance at IFSEC was encouraging.” Meanwhile, the Eagle Eye Networks stand attracted a lot of visitors keen for a demo of their new Eagle Eye Smart Video Search, which allows users to search for people, vehicles, or objects, and immediately find the exact video across all cameras in all sites. "AI and cloud are two trends that Eagle Eye, the media, and the security business community have been talking about for a while. We were excited to showcase Eagle Eye's new AI-powered technologies at IFSEC 2022," added Rishi Lodhia, Eagle Eye Networks Vice President and Manager Director EMEA. "Our stand was buzzing with activity and AI was the main topic of discussion for all three days. All in all, a great show." Investing in a secure future Engineers of Tomorrow gave apprentice finalists the chance to show off their skills in front of thousands of peers and professionals from the security sectors live on the show floor. The winners will go on to the WorldSkills UK (WSUK) LIVE competition – the nation’s premier skills, apprenticeships, and careers event. Although the products on display at IFSEC promised a contactless, digital future, this was a good reminder of the importance of the people who install and maintain these systems and the vital role of engineering apprenticeships in the industry.
Case studies
When Jogja National Museum needed to protect priceless artworks while maintaining visitor accessibility, they turned to a smart security solution. This story reveals how this intelligent security system transformed their operations, reducing response times from hours to minutes, and enhancing protection of modern masterpieces by artists such as Affandi and Bagong Kussudiardja. Quest for wide artwork protection The institution houses an impressive collection that includes masterpieces by contemporary painters like Affandi Jogja National Museum stands as a guardian of Indonesia's artistic heritage, welcoming over 100,000 visitors each year to experience the country's rich cultural legacy. The institution houses an impressive collection that includes masterpieces by contemporary painters like Affandi, Abas Alibasyah, and Bagong Kussudiardja. But as the institution’s reputation grew, and visitor numbers increased, the museum team recognised the need for a more comprehensive approach to artwork protection. As custodians of Indonesia's artistic treasures, they recognised the need to enhance the security of their valuable collections while maintaining an enjoyable experience for visitors. Safeguarding the nation's identity "As museum caretakers, we're not just preserving artworks—we're safeguarding the nation's identity," explained Arka Njela Tevua Lestavi, the Marketing Manager at Jogja National Museum. “But the challenges are real: how do we ensure these pieces remain intact, meaningful, and accessible for future generations?” The museum team wanted to establish a system that could provide consistent monitoring throughout their galleries, particularly during busy periods and special exhibitions. The system should also help staff respond more effectively to various situations while maintaining the welcoming atmosphere that visitors expect. The goal was to create an environment where cultural preservation and visitor accessibility could coexist seamlessly. Deploying an AI-powered protection system Jogja National Museum partnered with Hikvision to create a protective network throughout the museum To address these needs, Jogja National Museum partnered with Hikvision to create a protective network throughout the museum's gallery spaces. Four 4 MP ColorVu with Smart Hybrid Light Fixed Bullet Network Cameras (DS-2CD1047G2H-LIUF(2.8mm)) and four 2 MP Smart Hybrid Light Fixed Turret Network Cameras (DS-2CD1321G2-LIUF/SL(2.8mm)) have been strategically placed across the exhibition areas. These cameras provide continuous, high-quality color imaging even in challenging lighting conditions. With the Smart Hybrid Light technology, the cameras maintain infrared illumination at night when the museum is closed and lights are turned off, until an event triggers colour imaging to capture critical details. Built-in audio capabilities and alert systems The cameras also feature built-in audio capabilities and alert systems that allow security staff to provide guidance to visitors directly from the command centre if necessary. At the heart of the system is an AcuSeek NVR (DS-7616NI-Q2). This uses sophisticated algorithms to distinguish between normal movement and activities that require attention. It can, for example, identify when someone approaches restricted areas or lingers too close to artworks, while intelligently filtering out routine activities like cleaning. Hikvision’s Guanlan large-scale AI models AcuSeek NVR utilises massive parameter training and sample datasets to establish cross-modal Moreover, powered by Hikvision’s Guanlan large-scale AI models, the AcuSeek NVR utilises massive parameter training and sample datasets to establish cross-modal text-image comprehension capabilities. Museum staff uses the smart search functions, such as Target Search and Intrusion Event Search, to streamline incident reviews and improve response times. Improved protection; faster response; better service The implementation has brought significant improvements to the museum's daily operations and long-term preservation goals. The most immediate benefit has been enhanced protection for the artwork collection. Staff can now respond quickly and appropriately to various situations, whether it's guiding visitors away from restricted areas or addressing concerns before they escalate. Ms. Lestavi noted, “We now have a peace of mind we never had before. This intelligent technology respects cultural values. For us, it’s not just a tool. It’s the new guardian of Indonesia’s legacy.” System's intelligent features Video review processes that previously required over an hour can now be completed in just a few minutes The system's intelligent features have dramatically improved operational efficiency. Video review processes that previously required over an hour can now be completed in just a few minutes using the AcuSeek smart search functions. This time savings allows staff to focus more attention on visitor services and collection care rather than lengthy manual reviews. Another valuable feature has been the system's ability to assist with visitor services. When guests misplace personal items during busy exhibitions, the smart search capabilities enable staff to quickly locate lost belongings. How AIoT can revolutionise cultural preservation Not long ago, security staff has successfully recovered a visitor's camera during a crowded exhibition by rapidly reviewing footage to identify where the item was left behind. Building on this success, Jogja National Museum plans to extend the solution to a three-story complex hosting the prestigious annual "Artjog" festival. The museum's transformation showcases how AIoT (AI-powered Internet of Things) can revolutionise cultural preservation, proving that technology and heritage protection create a powerful partnership for safeguarding artistic legacies.
Inaugurated on May 25, 1999, the Museo Antropológico de la Comunidad de Madrid began construction in 1987. It wasn't until ten years later, in 1997, that the decree establishing the museum was issued, thus formalising the institution's existence. As part of the museum’s modernisation, the client needed an SMD LED solution that includes a glass in front of it to avoid dead pixels and any possible damage or accidents caused by museum visitors. Dahua, together with Epsilon Media, provided an innovative solution that overcame these limitations and optimised the museum experience. Renovation of the museum The Museo Antropológico de la Comunidad de Madrid was converted from the former Dominican Convent of the Mother of God, built in several phases between the 17th and 18th centuries. As an old establishment, the client wanted to renovate the installation step by step, with the first stage comprised of an LED wall in the main entrance. Their first idea was to install an SMD LED solution with a glass front in order to protect the LED wall and avoid issues with all visitors visiting the museum. Building such a solution is costly and may not be the right solution due to the lack of front-line maintenance. Flip COB indoor fine pixel pitch LED The Dahua Flip COB Indoor Fine Pixel Pitch LED offers mini flip Chips on Board (COB) technology Together with the Epsilon Media and the Dahua team, the museum evaluated the Dahua Flip COB Indoor Fine Pixel Pitch LED solution in person. After a deliberate discussion, the client agreed that it is the right solution for their facilities. The Dahua Flip COB Indoor Fine Pixel Pitch LED offers mini flip Chips on Board (COB) technology that enables full illumination and softer light without pixel particles, effectively combating digital visual fatigue. Key features It allows full front maintenance that makes disassembly and maintenance highly efficient. With the full control of the ink colour parameters on the surface of the light board, the ink colour at all angles is guaranteed to be uniform, which helps solve the industry’s issue regarding ink colour differences in batches. Other benefits include high contrast of 10,000:1, energy-saving and power-saving capabilities (less than 75 watts per box, 40% lower than other SMD products), and 160° super wide viewing angle. Another notable feature of this LED is its dustproof and anti-fingerprint surface that leaves no visible traces when touched. It is also waterproof and moisture-proof, with a low rate of dead pixels and high hardness against knocks. Doesn’t require additional glass protection Dahua continues to drive technological innovation to improve the way people experience history These features effectively meet the requirements of the client regarding additional protection against damage to the LED during operating hours. Dahua continues to drive technological innovation to improve the way people experience history. With the Dahua Flip COB Indoor Fine Pixel Pitch LED and the Quality Service Epsilon Media offered, the Museo Antropológico de la Comunidad de Madrid was able to install an LED wall without the need of additional glass protection, providing an exceptional digital display of historical images inside the museum while enhancing visitor experience and saving costs. Remarks from the museum director “With the video wall that Dahua installed for us, we were able to renovate the first unit that was originally there. This type of technology is significantly important in transmitting knowledge about the past. The overall collaboration was very satisfactory,” says Mr. Enrique Baquedano, Director of Museo Antropológico de la Comunidad de Madrid. “The Dahua team was always ready to help whenever we encountered any issue. What’s more, the LED wall is balanced and cohesive with the overall aesthetic of the museum, which is an added bonus,” concluded Mr Enrique.
Located in Petrópolis, RJ, the Imperial Museum houses one of the most important collections from Brazil’s imperial period, including the iconic crown of Dom Pedro II. As the nation's pioneering repository of artifacts from the Second Reign, the museum showcases over 300,000 historical items—from museological and archival pieces to rare books—making it a vital resource for researchers and history enthusiasts. With more than 300,000 visitors annually, the museum plays a vital role in preserving the nation’s cultural heritage. To further enhance security and optimise visitor management, the museum turned to its long-term partner, VIVOTEK, for a cutting-edge surveillance upgrade. Challenge As visitor numbers grew and security demands evolved, the museum required a smarter surveillance system to address key concerns: High-value Artifact Protection: The Crown Room, where Dom Pedro II’s Imperial Crown is displayed, required continuous high-level monitoring. Visitor Flow Management: Real-time tracking was needed to prevent congestion and improve the visitor experience. Intelligent Security Features: Upgrading to AI-powered analytics would provide enhanced intrusion detection, more precise monitoring, and reduced false alarms. Solutions VIVOTEK, the pioneering security solution provider, partnered with ALCA NETWORK to implement an AI-driven surveillance system tailored to the museum’s needs: VSS PRO Video Management System: Centralised control with seamless AI integration enabled precise monitoring and real-time surveillance management. AI-powered Cameras: Installed in key areas, including the Crown Room, these cameras offer 24/7 surveillance with advanced intrusion detection capabilities. 3D People Counting Cameras: Deployed in high traffic zones, these cameras provide real-time visitor flow tracking, offering valuable insights for effective crowd management. Integrated Security Upgrade: The new deployment seamlessly integrated with the existing 88-camera system, enhancing the museum’s security and ensuring comprehensive monitoring of critical areas. Result and customer feedback With VIVOTEK’s advanced AI security solution in place, the Imperial Museum now benefits from robust protection for its most prized artifacts and gained powerful tools for managing visitor flow. The unified VMS and AI-driven analytics provided more accurate monitoring, significantly reducing the risk of false alarms and improving operational efficiency. Claudio Leal, Head of Electronic Security at the Imperial Museum, commented: “Thanks to the partnership with VIVOTEK and ALCA NETWORK, we now have a modern, intelligent security system that not only protects our collections but also helps us better manage the flow of visitors. The real-time data and reports have been incredibly useful for operational planning, and we are more confident than ever in the safety of our artifacts”.
Opened to mark the 100th anniversary of Bauhaus’ founding, the Bauhaus Museum Dessau is a comprehensive public presentation of the Bauhaus Dessau Foundation collection. On show for the very first time, this valuable collection includes around 49,000 catalogued exhibits and is the second-largest Bauhaus collection in the world. Transparency and simplicity Located in the centre of the city, the museum is a building within a building – a suspended concrete structure inside a glass shell. Its architecture is characterised by transparency and simplicity in both concept and aesthetics. The glass façade reflects the surroundings to different degrees or can be transparent, depending on lighting conditions. An intelligent digital key system It should fit unobtrusively within the building's sophisticated architectural concept Requirements for an intelligent digital key system in the museum were set out in advance. The chosen solution must enable the simplest possible management of access authorisations. It should also fit unobtrusively within the building's sophisticated architectural concept. eCLIQ programmable digital key As in the Bauhaus main building and master houses, the Bauhaus Foundation chose a proven system: ASSA ABLOY’s eCLIQ programmable digital key solution. “The building has an increasingly digital future,” says David Moser, SVP and Head of Digital Access Solutions at ASSA ABLOY Opening Solutions EMEIA. “Choosing a digital solution like eCLIQ, rather than mechanical access, can help organisations to work smarter and collaborate better.” Benefits of digital access: security, convenience, reliability An eCLIQ system can bring digital access to almost any opening, helping filter authorised entry “The electromechanical CLIQ master key system has already proven itself extremely well in the Bauhaus main building and the master houses in Dessau,” explains Uwe Becker, Managing Director of Becker Sicherheitstechnik GmbH, the museum’s security partner on the project. The eCLIQ system is a fully digital version of the CLIQ electromechanical key-operated solution. An eCLIQ system can bring digital access to almost any opening, helping filter authorised entry through doors and much more. Convenient and robust solution Robust, durable cylinders and padlocks with eCLIQ technology can protect lifts, server racks, furniture, gates, mailboxes, cabinets, and more with the same level of control as sensitive doors. Every key has an integrated chip, which makes it unique. As a result, keys may be programmed individually to meet specific needs and access permissions. For keyholders, it’s a convenient solution. Versatility and security benefits The versatility and security benefits of eCLIQ are demonstrated whenever a key is lost. Each key’s access authorisations can be removed individually by reprogramming the cylinders. For greater flexibility, eCLIQ also enables access authorisations to be issued on a time-limited basis, which simplifies the management of external service providers such as maintenance contractors and cleaners. “Digitalisation helps all kinds of organisations to boost their site security and makes everyday access more convenient for everyone – employees, visitors, and contractors,” adds David Moser. Aesthetics and the switch to digital All eCLIQ keys and cylinders are compatible with the high demands that Bauhaus places on design All eCLIQ keys and cylinders are compatible with the high demands that Bauhaus places on design. They blend seamlessly with the varied installation situations of different doors and with the overall building concept in Dessau. A standard battery inside each key powers the eCLIQ cylinder and encrypts the data transfer between the lock, key, and system. With eCLIQ, there is no need to wire cylinders or doors, which leaves building designs intact. Digital transition “ASSA ABLOY’s innovative access solutions can help you digitalise and truly future-proof access at almost any kind of site or building,” says David Moser. “Our vast range of reliable, convenient solutions showcase the value of the digital transition and can be tailored to meet any organisation’s needs or goals.”
Munich’s Hofbräuhaus enjoys an iconic status, as both a heritage property and a spiritual home for lovers of German beer. “In this historic building is the world’s most famous tavern,” explains its Security Manager, Robert Graßl. “The whole world goes in and out. Security is very important.” Hofbräuhaus Bavarian Duke Wilhelm V commissioned Munich’s original Hofbräuhaus in 1589, initially as a brewery to supply the Wittelsbacher Hof. Moved at the end of the 19th century and severely damaged during World War II, it underwent reconstruction in 1958. It currently attracts tourists and city locals, seating up to 3,000 guests indoors and a further 400 in the beer garden. Need for digital access Inobtrusive digital devices and low-impact installation were a necessity to ensure compliance Although the building is an important heritage monument, it requires 21st-century digital access to keep site users safe and streamline day-to-day operations. They wanted fast, secure access rights management for employees and service providers including up to 100 waiters working each shift within a unified system that could authorise access at both the Hofbräuhaus and their food production facility in Brunntal. Of course, inobtrusive digital devices and low-impact installation were a necessity to ensure compliance with heritage preservation regulations. eCLIQ key-based digital access solution Many electronic access products and technologies are not appropriate for historic buildings. An eCLIQ key-based digital access solution is different: eCLIQ cylinders are compatible with the strict monument preservation requirements at the Hofbräuhaus. They have a flush fit, so don’t even appear to be part of an electronic locking system. With wireless installation at the doors, devices blend with the building interior. Programmable keys for staff management ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys “We can exchange a mechanical cylinder 1:1 with an eCLIQ cylinder without having to modify anything on the door or install cables,” confirms Miriem Hammoudi, Business Development Manager at ASSA ABLOY Sicherheitstechnik GmbH. ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys for Hofbräuhaus managers to issue to relevant staff and service contractors. Easy operation for flexible, cost-efficient management Every eCLIQ key has an integrated chip and is programmable individually for the keyholder. The versatility of eCLIQ is demonstrated when a key is lost: Access authorisations are removed rapidly, simply by reprogramming cylinders ensuring security is maintained. The eCLIQ system also helps manage workflows for service providers such as cleaners: Their access is enabled on a time-limited basis. A standard battery inside each programmable electronic key powers the cylinder or padlock on insertion and encrypts the data transfer between the cylinder, key, and system so no external power source or wiring is needed. Scalable web-based platform The Hofbräuhaus team manages their system via a flexible, scalable web-based platform, CLIQ Web Manager, “I can programme keys from anywhere or also block them quickly if a key has been lost or if someone is no longer allowed to enter,” says Robert Graßl. “And I can install any cylinder in any door by adjusting the length. I don’t have to carry extra stock which is really cost effective.” Anytime, anywhere access The system is easy to expand anytime, future-proofing Hofbräuhaus access With the hosting solution chosen, access data is stored securely at ASSA ABLOY, accessible anytime and from any location, which is an ideal configuration for managing large systems or multiple locations. Their system is easy to expand anytime, future-proofing Hofbräuhaus access. Master key system “The situation before the new master key system was installed was problematic,” says Robert Graßl. “Keys were distributed and nobody knew who held them. Everyone carries only one key programmed with details of where and when they can enter. It’s perfect.”
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that the Yorkdale Shopping Centre in Toronto, Canada, has unified its security operations based on Genetec™ Security Centre, Sipelia™, AutoVu™, and Mission Control™. With the Genetec platform, the security team at Yorkdale has been able to enhance operational efficiency, better collaborate with local police, and take a more proactive security stance. Yorkdale Shopping Centre With over two million square feet of retail space and 270 stores, Yorkdale Shopping Centre offers the country’s largest collection of designer labels and luxury brands. Managed by Oxford Properties Group, it goes beyond shopping, offering visitors valet services, a museum-quality art collection, and 24/7 on-site security. Breaking out of proprietary system limitations Additionally, having a closed security solution held them back from exploring new technologies With their proprietary video system and standalone access control solution, searching for information required the security operations team to navigate between the two systems, which slowed investigations and incident response. Additionally, having a closed security solution held them back from exploring new technologies such as cutting-edge cameras or system integrations. Genetec™ Security Centre and Omnicast™ The search for a new video management system (VMS) led them to Genetec™ Security Centre and Omnicast™, which not only provided state-of-the-art video management, but unified video, access control, and data from other sensors into one system. The Genetec solutions enhanced the team's ability to manage security policies, monitor events, and run investigations. Since it is an open platform, Yorkdale can expand the system with new technology as it emerges. A comprehensive view of mall security With Security Centre, we’re shaving valuable time from investigations and response" Since implementing the Security Centre, the Yorkdale team has been able to significantly enhance operational efficiencies. If an incident is underway, operators can see what’s happening and act fast from one unified view. “With Security Centre, we’re shaving valuable time from investigations and response," said Luca Aiello, Security Manager at Oxford Properties. Enhanced guest experience “Our security operators can identify potential risks, retrieve critical information, and deploy on-foot officers faster within the shopping centre." "Overall, we’ve become far more proactive and efficient in handling anything that comes up. That ensures we keep providing an exceptional guest experience.” Sipelia™ intercom module Sipelia allows them to initiate two-way conversations across 150 intercom stations Operators manage over 750 cameras, 500 access control readers, and 2000 cardholders using the Security Centre. They’ve also deployed the Sipelia™ intercom module. Sipelia allows them to initiate two-way conversations across 150 intercom stations located in parking garages, entrances, and other areas. AutoVu™ ALPR system The team also added the AutoVu™ automatic license plate recognition (ALPR) system, the Genetec Mission Control™ decision management system, and other technologies within the platform. All video, data, and calls come back into a state-of-the-art command centre, where security operators keep the shopping centre running smoothly. Security managers can also use the Genetec Mobile app on their phones to check in on situations from anywhere in the mall. Operational efficiencies, enhancing public safety To streamline incident response, the Yorkdale team implemented Genetec Mission Control™ Ensuring security operators can quickly respond and resolve the issues is critical to maintaining a five-star shopping experience. To empower their operators and streamline incident response, the Yorkdale team implemented Genetec Mission Control™. The collaborative decision management system helps operators better understand unfolding events and guides them through the best course of action according to SOPs. Proactive security approach Genetec AutoVu™ has been a key component in fostering a proactive security approach. With 52 AutoVu automatic license plate recognition (ALPR) cameras deployed, they’ve been able to extend security to their property’s perimeter, enhance vehicle-related investigations, and help serve the community. For example, if local police are searching for a vehicle of interest, Yorkdale can put that vehicle information into their AutoVu system, and if the vehicle comes onto their property, police are notified. Responsive to theft-related incidents As incidents of vehicle and/or retail theft rise, the AutoVu ALPR system has also become a deterrent As incidents of vehicle and/or retail theft rise, the AutoVu ALPR system has also become a deterrent. Said Bob Vounotripidis, Senior Operations Manager at Yorkdale Shopping Centre, “Since implementing the AutoVu ALPR system, we’ve become significantly more responsive to theft-related incidents and investigations. Word has gotten out–Yorkdale is a property that takes security seriously, and the perpetrators will be caught.” Planning for future expansions The Yorkdale team is looking ahead to other technologies that can expand their security approach and system, such as deploying body-wearable technology and integrating video from those devices into the unified platform. They are also exploring using Genetec Clearance™ digital evidence management system to streamline evidence sharing with law enforcement. Said Aiello, “More shopping centres should be using Genetec Security centre. This security platform not only helps our team operate more efficiently, but we’re also evolving our deployment using the best technologies out there.”


Round table discussion
If recent physical security events are a guide, the topic of artificial intelligence (AI) will be everywhere at the upcoming ISC West 2025 exhibition in Las Vegas. Cybersecurity solutions are another core focus at today's physical security events, and ISC West will likely follow the trend. Attendees will also be looking for advancements in access control systems, including biometric technologies and integrated security platforms, among other hot topics. We asked our Expert Panel Roundtable: What will be the big topics of discussion at ISC West 2025?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Aligning physical and cyber defence for total protection
Download
Understanding AI-powered video analytics
Download
Enhancing physical access control using a self-service model
Download
How to implement a physical security strategy with privacy in mind
Download
Security and surveillance technologies for the casino market
Download
