Network cameras
Matrix successfully showcased its advanced security products and solutions at the 5th edition of the Rail and Metro Technology Conclave, held at Hotel Le Méridien, in New Delhi, India, from July 23-24, 2024. As the first Indian company to offer RDSO 6.0-compliant network cameras for Indian Railways, Matrix highlighted its STQC-certified network cameras, adhering to the OWASP ASVS 4.0 L2 standards for cybersecurity compliance. These cameras ensure that critical passenger video data remain...
Critical Response Group (CRG), the global pioneer in critical incident mapping data, and Intrado, a global pioneer in emergency communication services and end-to-end solutions announced the integration of CRG within Intrado’s FirstNet® certified Safety Shield application. This integration brings CRG’s critical incident mapping data into Intrado’s comprehensive Safety Suite, an end-to-end incident management solution designed to enhance school and enterprise safety by helpi...
Mimecast, a pioneering global Human Risk Management platform, announced the acquisition of Code42, a pioneer in insider threat management and data loss prevention. Expanding on the success of their existing technology partnership, this acquisition marks a critical step in Mimecast’s strategy to revolutionise how organisations manage and mitigate human-centered security risks. The financial terms of the deal were not disclosed. Risk management capabilities “Mimecast&rsqu...
Hanwha Vision, the global vision solution provider, has launched the TNO-C8083E, its first explosion-proof camera with artificial intelligence. The compact 5MP explosion-proof AI model features AI object detection and classification alongside intelligent video analytics. It has a wide range of explosion-proof certifications, including IECEx, ATEX, KCs, and JPEx, making the camera ideal for environments at a higher risk of an explosive atmosphere due to gas or dust - such as oil refineries, gas...
Nozomi Networks Inc., the pioneer in OT and IoT security announced the industry’s first OT and IoT security sensor that runs embedded in Mitsubishi Electric programmable logic controllers (PLCs). Arc Embedded With Arc Embedded, security and operations teams gain previously unavailable visibility at the process level of their industrial automation equipment and field assets as well as the ability to analyse and deter process-level threats and malicious user activity without impacting curr...
The Security Industry Authority (SIA) – the UK’s private security industry regulator is encouraging everyone to show their appreciation to security operatives on International Security Officers’ Day, which takes place annually on 24 July. This follows a reception at the House of Lords (22 July 2024) to mark 20 years of SIA licencing. The anniversary event was sponsored by Baroness Meacher, the first Chair of the SIA. Public security and safety The event was attended by SIA f...
News
Appdome, the mobile app economy’s one-stop shop for mobile defense, announced it has enhanced its award-winning Geo-Fraud Detection service to include two new defences: Geo-Location Fencing and Geo DeSync Attack Detection. Combined with other Geo-Compliance features available on the Appdome platform, mobile app developers and enterprises can eliminate location-based fraud, ensure geo-compliance and deliver location-relevant user experiences in mobile apps free from location spoofing, fake location, VPNs, Fake GPS Apps and other threats. Local laws and regulations Geo-fencing is essential in finance apps and other regulated industries that need to meet Know Your Customer (KYC) and other compliance mandates, such as the US Federal Financial Institutions Examination Council (FFIEC), EU General Data Protection Regulation (GDPR), and the Monetary Authority of Singapore (MAS) requirements. Geo-fencing enables mobile app developers to restrict or limit app access on a country or regional level, ensuring that operations are compliant with local laws and regulations. Geo Desync Attack is a cyber-attack that creates mismatches in place data on a mobile device A Geo Desync Attack is a cyber-attack that intentionally creates mismatches in location data on a mobile device. By manipulating GPS coordinates, altering the time zone settings, and falsifying accelerometer readings, attackers can deceive location-based services and security systems. This type of attack can lead to inaccurate tracking, unauthorised access, and potential breaches of security protocols, undermining the integrity of location-dependent applications and services. Appdome’s mobile Geo Compliance service “Detecting geo-related fraud is a top priority in today's mobile app economy. Attackers are increasingly using location spoofing to avoid compliance, for example,” said Eric Newcomer, CTO and Principal Analyst at Intellyx. “Mobile apps rely on accurate location for their services and are increasingly required to confirm device location to maintain trust. Appdome’s mobile Geo Compliance service reduces developer complexity for implementing advanced geo-compliance security features.” Appdome Geo Compliance solution zeros in on protecting the mobile device’s built-in site services Unlike legacy geo compliance offerings that rely on proprietary, costly, and vendor-built geo service networks, the Appdome Geo Compliance solution zeros in on protecting the mobile device’s built-in location services and ensures these services have not been abused or tampered with. Appdome’s approach eliminates the need for third-party networks, SDKs, complex server-based implementations and does not require third-party monthly usage fees, allowing the enforcement to work even if the device is not network-connected. Appdome’s patented technology “Offering a broad range of mobile Geo Compliance features under a single pane of glass with other security and anti-fraud defences is a game changer,” said Tom Tovar, co-creator and CEO of Appdome. “These added Geo-Fraud defences showcase how the Appdome platform is uniquely extensible, and allows brands, developers and enterprises alike to solve multiple mobile app defense objectives simultaneously in the same automated workflow.” Full Appdome Mobile Geo-Compliance solution puts an end to geo-fraud by detecting fake locations The full Appdome Mobile Geo-Compliance solution puts an end to geo-fraud by detecting fake locations, fake GPS apps, fraudulent locations, detect VPN, no SIM (fake device), teleportation, Geo DeSync and other attacks. Customers simply select the Geo-Compliance features needed in any Android & iOS apps and initiate the build command from CI/CD or using the Appdome Platform’s “Build My App” button. Appdome’s patented technology uses machine learning to code the defences into each application, so mobile developers don’t have to. Appdome ThreatScope™ Mobile XDR “Compliance was the early driver for our geo-fraud solution, but now there’s so much more customers are getting out of it,” said Chris Roeckl, Chief Product Officer of Appdome. “Stopping location-fraud and ensuring valid, real location in mobile applications is universal across every Android & iOS app, whether it’s a streaming, dating, restaurant, retail, gig economy or other app. True location is what we deliver in these mobile apps.” The Appdome Geo-Compliance solution is available in multiple enforcement modes including advanced telemetry and customised responses or workflows when geo-compliance threats are detected, and monitoring geo-fraud attacks via the Appdome ThreatScope™ Mobile XDR, either before or after the deployment of geo-location defences via the Appdome platform. See the full Appdome Mobile Geo-Compliance solution live at Black Hat USA August 3-8, 2024 in booth #1350.
Barox Kommunikation AG, the manufacturer of professional standard switches, PoE media converters and IP extenders, is delighted to announce that it has joined the Genetec™ Technology Partner Program (TPP). Barox’s network management Genetec plug-in provides flexibility and extended network diagnostics from within the Genetec™ Security Centre, significantly reducing security network support costs. Following its release, barox has been welcomed into the Genetec Technology Partner Program (TPP). The program will see Genetec and barox working together to raise awareness of the joint integration capabilities and benefits, throughout the Genetec Channel Partner and End User network. Other advanced security capabilities Genetec TPP is the way barox has used to build secure and loyal integrations with Genetec solutions Genetec TPP is the pathway barox has used to build secure and reliable integrations with Genetec solutions. Within the collaboration, barox has utilised the latest tools and support needed to easily integrate barox technology with the Genetec Security Center VMS platform. Genetec Security Centre is a unified physical security platform that allows clear monitoring of events and system configuration in one place. It unifies access control, video management, forensic search, intrusion monitoring, automation, and many other advanced security capabilities. This advanced capability offers users a global view of the security environment, improving awareness and efficiency. Advanced network solutions With easy integration for deep barox Ethernet switch and network control, the new Genetec plug-in reinforces barox’s ethos of offering advanced network solutions that are tailored to meet the needs of the modern video security market. New Genetec plug-in reinforces barox’s ethos of offering advanced network solutions “We are delighted to enter into collaboration with Genetec,” says Rudolf Rohr, barox Co-founder & Managing partner. “Our inclusion into the Genetec Technology Partner Program has already yielded significant breakthroughs in integration between the two security sector brands. We are proud to deliver the benefits of simple device integration, advanced functionality, product quality and performance, all backed with local customer support.” Installation requirements Kirsty Whitefield, Sr. Manager, Strategic Alliances Marketing at Genetec commented: “Through barox integration, Genetec customers will benefit from simple system design, reduced installation requirements, performance and the security benefits both brands offer." "With barox now part of the Genetec Technology Partner Program, we can offer even more added value to our Channel Partner network and End User customers.”
Check Point Research (CPR) releases new data on Q2 2024 cyber attack trends. The data is segmented by global volume, industry, and geography. These cyber attack numbers were driven by a variety of reasons, ranging from the continued increase in digital transformation and the growing sophistication of cybercriminals using advanced techniques like AI and machine learning. Need for robust cyber security Economic motivation for income from attacks like ransomware and phishing as well as attacks fueled by geopolitical tensions and supply chain vulnerabilities continues to heavily impact this rise in the numbers. This increase in global cyberattacks also stems from hacker interest in Education and Research, which saw the largest increase in cyber attacks in Q2 2024, when compared to all other industries. CPR warns that these factors can continue to accelerate the number of cyber attacks in 2024, driving the need for robust cyber security across all industries. Key statistics In Q2 2024, Check Point Research saw a 30% YoY increase in cyber attacks globally, reaching 1,636 attacks per organisation per week. The top 3 most attacked industries were Education/Research (3,341 attacks per week), Government/Military (2,084 attacks per week), and Healthcare (1,999 attacks per week). Latin America, (+53%), Africa (+37%), and Europe (+35%) showed the largest increases in cyber attacks in Q2 2024, compared YoY. Africa experienced the highest volume of attacks with 2,960 weekly attacks per organisation, followed by Latin America with 2,667 weekly attacks per organisation. North America accounted for 58% of publicly extorted ransomware attack victims. The Manufacturing sector represented 29% of the published ransomware victims globally, marking a 56% year-over-year increase. Cyber-attacks The relentless onslaught of attacks underscores the growing sophistication and persistence of threat actors Cyber-attacks are increasing worldwide, with a 30% increase in weekly attacks on corporate networks in Q2 2024 compared to Q2 2023, and a 25% rise compared to Q1 2024. With an average of 1,636 attacks per organisation per week, the relentless onslaught of attacks underscores the growing sophistication and persistence of threat actors. Several cyber threat trends are all happening at once. Target for cybercriminals Education and research industry For instance, the education and research industry has consistently been a prime target for cybercriminals due to its wealth of sensitive information and often inadequate cyber security measures made further complex by multiple groups of online users within and outside of the network expanding the attack vector surface. The education/research sector was the number one most attacked industry globally, seeing a 53% increase in Q2 2024 compared to Q2 2023, with an average of 3,341 attacks per organisation every week. Government/Military Government/Military was the second most attacked sector with 2,084 attacks per week, reflecting the high stakes involved in state-level cyber espionage and disruption. Looking back at cyber attacks for the Healthcare sector in Q2, healthcare organisations saw an average of 1,999 weekly attacks per organisation, which was 15% higher than last year. Hackers like to target hospitals because they perceive them as short on cyber security resources with smaller hospitals particularly vulnerable, as they are underfunded and understaffed to handle a sophisticated cyber attack. Healthcare and hardware vendor industry The Hardware Vendor industry experienced the largest increase in attacks, with a dramatic rise of 183% Ranking third out of all sectors for the most cyber attacks globally, healthcare is so lucrative to hackers because they aim to retrieve health insurance information, medical records numbers, and, sometimes, even social security numbers. Furthermore, the Hardware Vendor industry experienced the largest increase in attacks, with a dramatic rise of 183%. This surge underscores the expanding target range of cyber criminals as they seek to exploit vulnerabilities across various sectors. Regional analysis of cyber attacks Regionally, Africa experienced the highest average weekly cyberattacks per organisation in Q2 2024, with an average of 2,960 attacks, marking a 37% increase compared to the same period in 2023. Latin America saw the most significant rise, with attacks increasing by 53% year-over-year to an average of 2,667 per week. The Asia-Pacific (APAC) region followed with a 23% increase, highlighting the global spread of cyber threats. Region Avg weekly attacks per org YoY Change Africa 2960 +37% Latin America 2667 +53% APAC 2510 +23% Europe 1367 +35% North America 1188 +17% Ransomware attacks per region and industry In Q2 2024, ransomware attacks that involved public extortion were reported showing a 13% year-over-year increase, totaling approximately 1,200 incidents. North America was the hardest hit, comprising 58% of all reported ransomware attacks, despite a slight 3% decrease from the previous year. Europe experienced 19% of the incidents, marking a notable 28% decrease, while the APAC region saw the largest increase with a 38% surge, accounting for 16% of the attacks. Region Percent of Published Ransomware Attacks YoY Change in Number of Published Attacks North America 58% -3% Europe 19% -28% APAC 16% +38% Latin America 6% +1% Africa 1% -55% Industry impact In terms of industry impact, the Manufacturing sector was the most affected, representing 29% of publicly extorted ransomware attacks’ victims globally, with a significant 56% year-over-year increase. The Healthcare sector followed, accounting for 11% of the attacks and experiencing a 27% increase. The Retail/Wholesale industry saw 9% of the attacks, with a notable 34% decrease from the previous year. Notably, the Communications and Utilities sectors experienced dramatic rises in ransomware incidents, with increases of 177% and 186%, respectively. Industry Percent of Published Ransomware Attacks YoY Change in Number of Published Attacks Manufacturing 29% +56% Healthcare 11% +27% Retail/Wholesale 9% -34% Finance/Banking 7% -8% Education/Research 6% -3% Software vendor 6% -57% Government/Military 6% +31% Transportation 6% +40% Insurance/Legal 5% -25% Communications 5% +177% Leisure/Hospitality 3% +0% Consultant 2% -76% Utilities 2% +186% Energy 1% -25% Tips for prevention and mitigation Organisations must take proactive steps to safeguard their data and systems. Here are some strategies inspired by best practices from Check Point Software: Enhance Security Posture: Regularly update and patch systems to close vulnerabilities. Multi-layered security measures, including firewalls and endpoint protection, are essential. Employee Training and Awareness: Regular training sessions can educate employees about the latest cyber threats and phishing tactics, fostering a culture of vigilance. Advanced Threat Prevention: Utilise technologies such as sandboxing and anti-ransomware tools to detect and block sophisticated attacks. Adopt Zero Trust Architecture: Implement strict identity verification for every person and device attempting to access network resources. Regular Backups and Incident Response Planning: Ensure regular backups of critical data and develop comprehensive incident response plans to quickly address and mitigate the impact of attacks. Network Segmentation: Isolate critical systems to limit the spread of attacks and protect sensitive information. Vulnerability Management: Conduct regular vulnerability assessments and penetration testing, prioritising remediation efforts based on potential impact. Customised strategies The dramatic rise in cyber-attacks globally, particularly ransomware incidents, signals an urgent need for robust cybersecurity frameworks. Organisations must prioritise cyber security, adopting customised strategies to effectively combat the evolving threat landscape. By implementing advanced security measures, fostering a culture of awareness, and preparing for potential incidents, businesses can better defend against the relentless tide of cyber threats. The time to act is before the next wave of attacks strikes.
Sophos, a global pioneer of innovative security solutions for defeating cyberattacks announced that Teresa Anania has joined the company as Chief Customer Officer (CCO). Anania will play a key role in accelerating Sophos’ customer and partner success initiatives to maximise the value of Sophos’ portfolio of cybersecurity solutions and services, including Managed Detection and Response (MDR) services and endpoint, network, email, and cloud security. Teresa Anania Anania has more than 25 years of experience in pioneering customer satisfaction and sales growth across the public and private sectors, excelling in both direct and indirect sales channels. Joining Sophos from Zendesk, Anania was responsible for the management and development of its global client base of more than 110,000 customers from small- and medium-sized businesses (SMBs) to enterprises. During her time at Zendesk, Anania led all post-sales functions, including Professional Services, Customer Support, Customer Service, Customer Success, and Renewals, to deliver top-line growth and measurable impact for customers. Anania has extensive experience specialising in scaling post-sales customer engagement for enterprise, commercial, and volume segments, delivering significant Return on Investment (ROI) and driving revenue. Anania's responsibilities Anania will be responsible for developing a stronger customer-centric culture to deliver a seamless experience As CCO, Anania will be responsible for developing a stronger customer-centric culture, working together with channel partners and Managed Service Providers (MSPs) to deliver a seamless experience for Sophos’ growing customer base of more than 600,000 organisations worldwide. This vision also assures that smaller customers, which are a prime target for attackers, have access to the same innovative security solutions and industry-pioneering threat intelligence as their larger counterparts, a critical overall mission for Sophos in 2024 and beyond. Cybersecurity and managed security services “Sophos is in an exciting phase of its business growth, and I am eager to bring my career success building positive customer experiences to the company,” said Anania. “Sophos has a stellar reputation for continually innovating cybersecurity technology and managed security services that help organisations defend their businesses against ransomware, data breaches, and other potentially business-ending cyberattacks." Interactive assessments "I will be working closely with channel partners, MSPs, and the global team, to advocate for Sophos’ customers and their security defences and to drive value for partners from Sophos’ entire portfolio of solutions and services,” added Anania. “The threat landscape is always changing, and organisations need regular, interactive assessments of their overall IT environments to determine how to most efficiently and effectively adapt to defeat active attackers,” said Joe Levy, CEO of Sophos. Customer experience "To help facilitate this, security vendors need to take responsibility to ensure that customer investments in their products and services are providing real value to them, which requires engagement throughout contract lifecycles." "This also requires world-class customer experience (CX) for renewals and upgrades to the most relevant and appropriate technologies and services, and an awareness of the full potential already available in existing licences. The best tool is of little value without the right operation, so these components are critical to properly and consistently defending against modern attacks." Post-sales relationships “To provide this pathway, we’ve hired Teresa, who has an impressive track record building post-sales relationships and delivering experiences that increase customer satisfaction and drive topline growth." "Her knowledge and expertise will allow us to further put customers at the centre of our business, alongside our channel partners and MSPs. Most importantly, Teresa’s new role will help keep our customers as secure as possible, which is always our top priority. We are delighted to welcome Teresa to the Sophos team.”
ISS (Intelligent Security Systems), a pioneering provider of video intelligence and data awareness solutions, has launched Intellisection, a new turnkey solution for automated intersection monitoring. Intellisection leverages artificial intelligence and advanced neural network training technology to enhance road safety and efficiency, enabling federal, state, and local agencies to create a comprehensive traffic management solution. The state-of-the-art neural network technology autonomously monitors vehicle flow, detects accidents, classifies vehicles, and provides real-time data to optimise traffic signals, ensuring smooth and safe traffic movement. Embedded at the core of the system, it combines proactive monitoring, real-time analysis, and configurable notification mechanisms to optimise the reliability, stability, and performance of all components. Key benefits Enhanced Road User Detection: Accurately detect, count, and classify all road users, including vehicle types as well as pedestrians, bicyclists, and mobility devices like wheelchairs and scooters. Improved Safety Measures: Enhance road safety with features like near-miss analysis, red-light violation monitoring, wrong-way driver detection, speeding alerts, and crash detection, helping to prevent accidents and manage incidents effectively. Real-Time Notifications: Email, text, and in-browser alerts ensure that relevant stakeholders are promptly informed about critical incidents, enabling quicker responses. Multi-Lane Monitoring: The system can detect multiple vehicles approaching or departing in multiple lanes simultaneously, making it suitable for complex intersections. High Reliability: Rated NEMA TS-2, the product is built to meet high standards of reliability and durability in various environmental conditions. Operational Insights and Reporting: The system provides operational dashboards summarising key events, turning movements, and vehicle classifications at intersections. Detailed event statistic reports help in analysing traffic patterns and making informed decisions. Insights for incident detection “As technology continually gets adopted into the ITS marketplace, we have seen a hammer-to-nail approach to its deployment. With Intellisection’s launch, we are providing a platform that allows agencies to optimise signalised intersection performance while offering the most feature-rich insights for incident detection – accidents, near misses, wrong-way driving, etc. – as well as traffic flow estimations, including average speed, density, vehicle classification, and beyond,” said Joe Harvey ITS Market Sector Pioneer, ISS. “Additionally, by leveraging our software platform, we enable agencies to gain comprehensive insights throughout their entire system, enhancing decision-making, improving safety, and increasing efficiency across all levels of traffic management.” Future-proof solution “Releasing a new product is never an easy process and for nearly two years our team has worked tirelessly to create a solution in Intellisection that is the nexus of roadway analytics, decision management, and data analysis,” added Matt Powell, Managing Director, North America, ISS. “I am extremely excited for us to launch this product and thankful to the communities that have worked with us in deploying Intellisection to ensure it works in the real world. Intellisection is an incredible product, built on two decades of our experience with vehicle analytics, and will grow in capability year after year to ensure a future-proof solution for creating safer, more efficient roadways.”
Matrix is excited to present its security products and solutions at Hotel Le Méridien, New Delhi, during the 5th edition of Rail and Metro Technology Conclave, 2024. Network cameras Matrix is the first Indian company to offer RDSO 6.0-compliant network cameras for Indian Railways. Matrix network cameras have been certified by the STQC, Delhi lab for adhering to the OWASP ASVS 4.0 L2 standards required by RDSO for cybersecurity compliance. Cybersecurity compliance Matrix experts will discuss their cutting-edge IP Video Surveillance, Access Control, and Time-Attendance solutions Matrix network cameras are designed to ensure that the data gathered by these cameras is secured against cyber threats at the time of transmission and storage, protecting critical passenger video data. At the event, Matrix experts will discuss their cutting-edge IP Video Surveillance, Access Control, and Time-Attendance solutions, especially suited to the Metro Rail Systems. Ruggedised IP camera Matrix's newly launched ruggedised IP camera, which is EN50155 compliant, will be highlighted. Engineered to withstand vibrations and shocks, these cameras are tailor-made for the demanding environments of railways and roadways. Matrix ruggedised IP cameras redefine surveillance in transportation, offering impeccable video quality, exceptional low-light sensitivity, and versatile monitoring capabilities for rail and road applications. They ensure crystal-clear footage even inside fast-moving vehicles, setting a new benchmark in surveillance technology for dynamic industries. Bullet and dome IP cameras Furthermore, Matrix will discuss its existing line of Project Bullet IP cameras, and Project Dome IP cameras, specifically designed for large-scale organisations. These cameras are RDSO 6.0 ready and offer high-resolution imagery for enhanced clarity and protection. COSEC ARGO FACE Its deep learning algorithm ensures swift identification in under 0.5 seconds, with a user capacity of 50,000 In the domain of Access Control and time attendance, Matrix experts will discuss COSEC ARGO FACE, an intelligent door controller featuring high-speed face recognition technology. With cutting-edge features such as Adaptive Face Recognition, Face Liveness Detection, and Mask Compulsion, this device addresses evolving security threats. Its deep learning algorithm ensures swift identification in under 0.5 seconds, with a user capacity of 50,000, providing organisations with top-tier security. COSEC VEGA FAXQ210 Matrix experts will also discuss COSEC VEGA FAXQ210, a groundbreaking embedded Linux-based AADHAAR-enabled biometric attendance device, registered on the AEBAS Server. With authentication in under 1.5 seconds, it seamlessly verifies users through their AADHAAR number stored in the smart card and fingerprint. This device offers reliability, convenience, speed, and data security, empowering government organisations to optimise workforce productivity. Railway and metro solutions Matrix eagerly anticipates presenting its advanced security solutions tailored for Railway and Metro systems at the upcoming Rail and Metro Technology Conclave. Kaushal Kadakia, Marketing Head, Matrix, remarks, "The Rail and Metro Technology Conclave is an ideal venue for us to present our specialised security solutions for Indian Railways and Metro Rail Systems. We are eager to connect with key government decision-makers to discuss potential collaborations and advancements in Railway and Metro security."
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centres empowered by a new generation of data-driven technologies are emerging as an effective force multiplier. Real-time crime centres Real-time crime centres (RTCCs) serve as centralised hubs where dedicated personnel leverage pioneering-edge technologies to analyse diverse data streams and provide critical support to law enforcement and emergency operations. These 24/7 facilities are transforming how agencies gather, process, and act upon information, enabling more proactive and efficient policing strategies. The core functions of RTCCs These centres provide officers with unprecedented situational awareness and real-time intelligence At their core, RTCCs are tasked with three primary objectives: enhancing safety, facilitating identification, and supporting apprehension. By integrating data from a wide range of data sources, these centres provide officers with unprecedented situational awareness and real-time intelligence. Integrated data approach This integrated data approach allows RTCCs to alert officers to potential threats, quickly identify suspects, and guide responders during critical incidents. For instance, in the event of a robbery, RTCC operators can rapidly search camera and licence plate data to track suspect vehicles, significantly improving the chances of a swift arrest. According to the Bureau of Justice Assistance at the U.S. Department of Justice, the mission of an RTCC is to centralise a broad range of current and evolving technologies, coordinate sworn and non-sworn human resources, and direct the attention to high-crime areas, active crimes in progress, high-profile or highly recidivistic offenders, and large-scale public events that may require law enforcement presence or response. The technology powering RTCCs The effectiveness of an RTCC hinges on its ability to seamlessly integrate a wide array of technologies: Open Platform Video Technology: At the heart of many crime centres is an open platform video management software (VMS) that serves as the central nervous system, unifying diverse data streams into a cohesive operational picture. By leveraging open APIs and SDKs, the VMS can incorporate a wide range of cameras, sensors, and analytics tools. This data-driven approach to video technology enables seamless alert distribution to both the RTCC and field officers via mobile applications. IP Camera Networks: The eyes of an RTCC, these systems combine fixed, PTZ, multi-sensor, thermal, and other specialty cameras to provide continuous city monitoring. Strategically placed throughout urban areas, cameras offer comprehensive coverage of critical locations such as transportation hubs, commercial districts, and high-crime zones. This network forms the foundation for real-time monitoring and incident response. Sensor Arrays: Beyond visual data, RTCCs employ various sensor technologies. Acoustic sensors can detect sounds such as gunshots, shouts for help, breaking glass, and other sounds instantly alerting officers and cueing nearby cameras. Environmental sensors monitor air quality for gasses, smoke, and other non-visible hazards. Licence Plate Recognition (LPR): LPR systems act as a force multiplier, continuously scanning for vehicles of interest. By generating real-time alerts for stolen or wanted vehicles, these systems significantly enhance the ability to track suspects and recover stolen property, contributing to reduced auto theft rates. Aerial Surveillance: Many RTCCs incorporate drone technology, providing on-demand aerial perspectives of developing situations. This capability is particularly valuable for monitoring large-scale events, assessing natural disasters, supporting operations in hard-to-reach areas, and serving as a powerful first response for crime scene situational awareness. AI-Powered Analytics: At the heart of many RTCC operations are sophisticated AI algorithms that analyse video data in real-time. These systems can identify a range of suspicious activities, from unattended packages to unauthorised intrusions. By rapidly processing vast amounts of video data, they help operators focus on potential threats and anomalies. Geospatial Mapping: To make sense of the influx of data, RTCCs rely on advanced mapping software. These tools visualise events, alerts, and data streams geographically, allowing operators to quickly identify patterns, clusters of activity, and relationships between incidents. Database Integration: RTCCs maintain direct connections to various law enforcement databases, including local, state, and federal resources like the National Crime Information centre (NCIC). This integration allows for rapid background checks and threat assessments, providing crucial context for ongoing operations. Cloud Infrastructure: The scalability and flexibility of cloud computing are revolutionising RTCC capabilities. Cloud and hybrid solutions offer secure, off-site storage and facilitate easy data sharing between agencies. This approach not only reduces initial costs but also allows for incremental upgrades, making advanced RTCC functionality accessible even to agencies with limited budgets. Real-world impact RTCC operators tracked shooting suspects via camera feeds, guiding officers to their location The proliferation of RTCCs across the United States with over 80 centres in operation speaks to their proven effectiveness. Cities that have implemented these high-tech command centres are reporting significant improvements in response times, clearance rates, and overall public safety. Real-time surveillance In Winston-Salem, North Carolina, the local RTCC leverages over 1,300 live video feeds to provide real-time surveillance across the city. This extensive network, combined with gunshot detection technology and licence plate readers, has already demonstrated its value. In a recent incident, RTCC operators were able to track shooting suspects via camera feeds, guiding officers to their location for a quick apprehension. Video analysis by RTCC Similarly, Newport News, Virginia, saw an immediate impact after launching its RTCC in 2021. The centre has played a crucial role in solving homicides caught on video and rapidly closing a series of carjacking cases. These success stories underscore the game-changing potential of RTCCs when it comes to solving crimes and gathering evidence. In Memphis, Tennessee, video analysis by RTCC detectives helped identify a shooter in custody following an incident at a community basketball court even when no witnesses had come forward. Identifying suspects with RTCC Officers and analysts can view street and body camera footage to monitor crowds at parades The Jackson Police Department in Mississippi has seen similar benefits since building an RTCC in 2019, part of a broader effort that included deploying 100 cameras and 271 body cams. Officers and analysts can view street and body camera footage to monitor crowds at parades and other events. During pursuits, the cameras provide extra surveillance, allowing officers to identify suspects or witnesses to help solve crimes. Enhancing crime mitigation and emergency response While RTCCs have proven their worth in responding to active incidents, their true potential lies in proactive crime prevention and enhanced emergency preparedness. By leveraging advanced analytics and integrated data sources, RTCCs are evolving into powerful predictive tools for law enforcement. Pattern recognition algorithms For instance, pattern recognition algorithms can analyse historical crime data alongside real-time video feeds to identify potential hotspots for criminal activity. This allows law enforcement to strategically deploy resources, increasing visible presence in high-risk areas before crimes occur. Similarly, anomaly detection systems can alert RTCC operators to unusual behaviors or suspicious activities, enabling early intervention in potentially dangerous situations. Asset and property protection, automated alerts RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7 Asset and property protection is another area where RTCCs excel. By integrating with access control systems and using AI-powered video analytics, RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7. Automated alerts for perimeter breaches, unauthorised access attempts, or suspicious objects left in restricted areas allow for an immediate response, significantly enhancing security postures. Emergency response and preparedness In terms of emergency response and preparedness, RTCCs serve as vital command and coordination centres during crises. Whether facing natural disasters, major accidents, or other large-scale emergencies, RTCCs provide a centralised hub for information gathering and dissemination. Real-time video streams from affected areas, combined with data from environmental sensors and emergency service communications, allow for rapid situational assessment and coordinated response efforts. Post-incident investigation and analysis RTCCs can also play an active role in post-incident investigation and analysis. The ability to quickly compile and analyse vast amounts of data from multiple sources can significantly accelerate case resolution and help identify patterns to prevent future incidents. As RTCCs continue to evolve, their capacity for integrating diverse data streams and leveraging advanced analytics positions them as indispensable tools in modern law enforcement strategy. The future of technology-driven policing The integration of artificial intelligence and machine learning promises to enhance video analytics As RTCCs continue to evolve, they are likely to incorporate even more advanced technologies. The integration of artificial intelligence and machine learning promises to enhance video analytics capabilities, enabling faster and more accurate threat detection. Additionally, the expanding use of drones, subject to FAA regulations, could provide RTCCs with cost-effective aerial surveillance options. Effective and ethical operations However, the implementation of RTCCs is not without challenges. Agencies must navigate issues of privacy, data security, and community trust. Ongoing training for personnel and careful planning is essential to ensure these centres operate effectively and ethically. Data-driven approach Despite these hurdles, the trend toward technology-driven policing shows no signs of slowing. RTCCs represent a shift from reactive to proactive law enforcement strategies, offering a data-driven approach to crime prevention and response. As these centres become more prevalent, they will play an increasingly vital role in helping agencies maximise their resources and make informed decisions, ultimately contributing to safer communities for all.
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint method have made it among the most widely used for biometric authentication across industry sectors ranging from banking and finance, retail, and healthcare, to government and law enforcement. It performs biometric technology’s “something you are” function while offering unique characteristics that make it particularly valuable for many applications. Unique identifier The fingerprint biometric has the permanency of being reasonably stable and consistent over time Among these characteristics is the pervasiveness and special nature of the fingerprint -- almost everyone has one, and each is a unique identifier. The fingerprint biometric has the permanency of being reasonably stable and consistent over time. It is also easy to acquire, measure, and process. High adoption rate Another key attribute of a fingerprint biometric is its ability to be protected against threats ranging from abuse and misuse to theft, imitation, and substitution. When it is used with recognition techniques the resulting solution performs with a combination of accuracy, speed, scalability, and ease of use. Fingerprint biometric solutions also have the highest adoption rate among biometric authentication solutions according to an industry report published by Payments Journal. Three interrelated components There are three basic components in any fingerprint biometric system as shown in Figure 1: capture (using a sensor that can capture even the most difficult finger types); liveness detection (using the Presentation Attack Detection – or PAD – technique); and matching (including preventing rejection of a legitimate user). Biometric algorithm The sensor captures and pre-processes the fingerprint data. It must be able to successfully capture fingerprint images for a range of skin types and print conditions under diverse temperatures, humidity, light, surface oil, dust, dirt, and other environmental conditions. A biometric algorithm then extracts minutiae data about the fingerprint ridges (endings, bifurcations, islands, etc.) and their orientation and position. PAD technique Implementing a presentation attack detection (PAD) technique at this stage activates the fingerprint biometric system’s second key element: liveness detection. This verifies the fingerprint’s authenticity and that it belongs to a living person. The system’s third element – matching – occurs after the PAD-verified fingerprint dataset has been securely stored as a record, known as a template, inside an enclave with cryptographic protection. Check for liveness The corresponding template of the legitimate user is then retrieved from secure storage When the fingerprint is presented for matching, it is rechecked for liveness. The corresponding template of the legitimate user is then retrieved from secure storage and the process of matching the fingerprint with this template is executed. This must be completed accurately and without rejecting a legitimate user. Types of fingerprint sensing technologies There are four prevailing categories of sensing technologies used with fingerprint readers: optical, capacitive, thin-film transistor (TFT), and multispectral imaging (MSI). Optical and capacitive method Optical is the most mature sensor technology and offers the benefits of a compact size, good capture Optical is the most mature sensor technology, and offers the benefits of a compact size, good capture and matching performance, a small enough size to fit in most desktop environments or shared workstations, and a high level of accuracy at a cost-effective price point across all use cases. The capacitive method, on the other hand, is less prone to fake finger attempts while also offering a thin and compact size for space-limited applications, the power efficiency to support battery-operated devices, and the ability to handle both indoor and outdoor lighting conditions. TFT technology The third technology goes a step further in capture accuracy. TFT technology can accurately recognise the smallest fingerprint features with ultra-high resolution and is used either as a larger-size matrix capacitive proximity detector (capacitive fingerprint sensor) or a larger-area matrix light detector (optical fingerprint sensor). It is ideal for in-the-field mobile identification applications that require a cost-effective, ultra-slim, and lightweight solution with low power consumption. MSI technology MSI technology differs from all three approaches, projecting multiple colors of light into the finger from different angles to collect both surface and subsurface biometrics data. It captures the most difficult fingerprints of diverse demographics, in a wide range of challenging environments. HID has used this patented technology in fingerprint readers that are compliant with ISO 30107-3 PAD Level 2 for advanced anti-spoofing against fraud. The technology also improves matching and offers sophisticated endpoint security that prohibits cyber criminals from gaining unauthorised access to networks by turning fingerprint readers into secure endpoints. Best practices for technology selection Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership. There are three top considerations: security, suitability, and usability. Each is important and the best approach is to strike a balance between all three. Following are the questions to ask during the selection process: Security: What is the regulatory environment? Financial and government services, healthcare, and law enforcement are some examples of highly regulated sectors with elevated security compliance requirements. Are there mandates in place for advanced capturing and biometric authentication specifications? How important is it to ensure anti-spoofing through liveness detection? Will endpoint security be required so that, if the fingerprint device is hacked, no network, system, or data behind the firewall will be impacted? Suitability: Where will the biometric technology be implemented? There will be additional considerations if it is to be embedded in portable, battery-operated devices that require low power consumption. Where will the technology be used? Will it need to fit into small spaces or be used in challenging indoor or outdoor conditions and environments? Will durability be important? Some deployments will face unpredictable weather and difficult lighting conditions for image capture. Will the technology be used for mission-critical border control or a more common – and less demanding -- commercial use? Usability Is it critical that the technology easily and consistently perform capture and matching? Will there be high volumes of fingerprint captures and matches? Is “friction frustration” a concern? If so, the solution must perform matching quickly and accurately to sustain high levels of user productivity. Will the fingerprint device be used by one person exclusively, or multiple people in a shared workstation setting? How diverse is the user population? Some readers are designed to handle all types of fingerprints and diversified demographics. Different applications Fingerprint biometrics is a proven solution to address real-world challenges, each with its requirements The answers to these questions will help determine the best choice of fingerprint technology. Different applications apply fingerprint biometrics to very different use cases but in all cases. It is a proven solution to address real-world challenges, each with its requirements. For instance, in a healthcare clinician’s terminal area or a similar shared environment with limited space, a durable, low-profile capacitive sensor may be the right answer. For an organisation in a highly regulated, mission-critical environment like a bank or border control agency, advanced technologies such as MSI readers may be needed to avoid the serious repercussions of a spoofed identity or the rejection of a legitimate one. Requirements for a biometric solution These are just a few of the requirements to consider when choosing a fingerprint solution. In banking and finance, alone, fingerprint biometrics is used for applications ranging from transacting at the ATM to customer onboarding (eKYC), compliance (AML/KYC), and fraud prevention. The retail sector adds even more, including age verification, loss prevention, point of sale (POS) security, self-service checkout, and secure time and attendance. Law enforcement organisations have their unique requirements, using fingerprint biometrics for background checks, criminal booking, crime investigation, inmate management, mobile identification, and more. For government agencies, typical applications include benefits distribution, border security, citizen ID, employ authentication (SSO/MFA), and voter registration. Each application requires a thorough assessment of the best fingerprint technology for the job. The right touch The right solution will deliver the optimal balance of security, suitability, and usability Fingerprint biometric solutions empower a wide range of use cases with the simple touch of a finger. The right solution will deliver the optimal balance of security, suitability, and usability based on an analysis of criteria including specific application requirements, the characteristics and size of the user population, and challenges posed by environmental conditions. Accuracy, efficiency, and security The world faces increasingly dangerous fraud, account takeover, and impersonation threats. As industries and enterprises work to improve and evolve their identity and access strategies to combat these threats, fingerprint biometrics continue to prove their value through solutions that meet the key selection criteria while delivering the highest levels of accuracy, efficiency, and security.
Educational institutions worldwide increasingly rely on robust wireless networks to enhance academic pursuits, safety measures, and operational efficiency. The campus environment, a complex network of interconnected buildings, and the humans navigating them require innovative technologies to meet these diverse needs. The solution lies in a new wireless protocol that provides an ideal fit for the long-range, low-power connectivity requirements of educational campuses: Wi-Fi-certified HaLow. Wi-Fi HaLow: Wi-Fi HaLow, a new Wi-Fi certification released by the Wi-Fi Alliance in November 2021 and incorporating the IEEE 802.11ah standard, is optimized for the unique requirements of Internet of Things (IoT) applications. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs Its combination of long-range connectivity, low power consumption, advanced Wi-Fi CERTIFIED WPA3 security features, and the ability to connect more than 8,000 devices from a single access point makes the protocol a game changer for campus environments. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs between range and speed that limit the effectiveness of conventional Wi-Fi in the 2.4, 5, and 6 GHz frequency bands for campus applications. Robust, secure connections for access control Operating at sub-GHz frequencies, the Wi-Fi HaLow protocol's unparalleled ability to penetrate physical barriers and its advanced security features make it an ideal wireless technology for supporting access control systems throughout campuses. Credential systems for students, badge scanners, cameras, and dormitory door locks can work efficiently and securely in hard-to-reach locations, providing an interconnected and safe environment for the campus community. Enhancing safety through improved connectivity Body-worn cameras used by public safety officers can remain connected to the wireless local-area network The low-power and long-range attributes of Wi-Fi HaLow can play a significant role in strengthening campus safety systems. Body-worn cameras used by public safety officers can remain connected to the wireless local-area network (WLAN) or mobile router in their patrol vehicles even at a long distance, reducing the need to consume cellular data. Wi-Fi HaLow enables the development of robust wireless networks that can reliably support campus-wide, two-way video intercoms, potentially enhancing response times and safety measures. Streamlining outdoor equipment automation Outdoor equipment automation, such as irrigation systems, smart lighting, and robotic lawnmowers, can leverage Wi-Fi HaLow's power efficiency, and long-range and expansive coverage. Automation of these systems with such efficient wireless connectivity can lead to significant energy savings, improved productivity, and reduced operational costs. Delivering superior speed and range 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second A Wi-Fi HaLow network shatters the traditional tradeoff of wireless communications between speed and range. A single-stream, 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second at sub-GHz frequencies, enabling live streaming on large screens, connecting multiple real-time AI edge cameras, as well as thousands of low-power IoT devices, all connected without compromising on range. Wi-Fi HaLow signals can extend beyond 1 kilometre, up to 10 times farther than traditional forms of Wi-Fi in the 2.4, 5, and 6 GHz frequency bands, and are capable of connecting far-flung devices and systems across campus environments. Setting a new standard for campus connectivity By addressing the connectivity needs of modern campuses, Wi-Fi HaLow paves the way for future campus applications. As we navigate the digital era, Wi-Fi HaLow presents a compelling solution that significantly enhances connectivity, safety, and efficiency. This leap in wireless capabilities isn’t merely incremental; it represents a transformative stride toward a smarter, more connected future. Wide-reaching wireless network Educational institutions can leverage Wi-Fi HaLow to create safer, more efficient, and interconnected campus environments. By providing a robust, reliable, and wide-reaching wireless network, Wi-Fi HaLow enables campuses everywhere to fulfill their diverse connectivity needs without compromise.
Security beat
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
As the physical security and cybersecurity worlds converge, many industry professionals are finding themselves moving from one realm to the other. Or, more likely, they are embracing both disciplines as integral to the future of security as a whole. One security professional bringing her cybersecurity expertise to the physical security market is Wendy Hoey, Director of Sales, US Sales Leadership, North America, for Milestone Systems. With more than 23 years of experience in cybersecurity, Wendy Hoey now works with a global company dedicated to empowering people, businesses and societies with data-driven video technology. Author's quote Caught up with Wendy Hoey to discuss how the security market can harness innovation “I'm thrilled to be joining the physical security industry at this transformative time when there's such tremendous potential to update legacy systems with pioneering technologies like AI and the Internet of Things,” says Hoey. “I'm energised by the chance to collaborate with colleagues to help transform physical security, enhance predictive capabilities, and realise a shared vision of seamless protection across the digital and physical realms.” Caught up with Wendy Hoey to discuss how the security market can harness innovation to make the world safer and more secure. “The future is bright, and I'm honoured to be part of this community,” says Hoey. Q: What can physical security learn from the world of cybersecurity? Hoey: Physical security can learn a great deal from the world of cybersecurity. With the rise of IoT and IP-connected devices, the lines between physical and digital security are blurring. Like cybersecurity, physical security needs to take a proactive approach to protecting core systems and perimeter access points. Understanding potential vulnerabilities and attacks is key. Physical security pros should continuously educate themselves on emerging technologies and threats and stay up to date on best practices. Adopting a customer-centric mindset is also critical. Rather than just selling technologies, physical security providers should focus on understanding clients' unique risks, objectives, and pain points. By taking cues from cybersecurity, the physical security industry can transform itself, innovate, and provide smarter solutions. Q: How is physical security a unique application for IT? How do physical security (and/or video) systems differ from “other” IT systems? Hoey: Physical security has unique challenges compared to traditional IT systems, but also shares some commonalities. At its core, physical security relies on networked hardware like cameras, access control and detectors that must be online and recording effectively at all times. This is like IT infrastructure in that uptime and availability are critical. With the rise of IoT, cyber and physical security are converging. Physical security systems have vulnerabilities that didn't exist before everything became IP-connected. Staying on top of emerging technologies and threats is crucial. At the end of the day, both physical and cyber security share the goal of minimising organisational risk, and both disciplines must come together and cooperate to optimise security and safety. Q: How can security integrators ensure their workforce (i.e., installers) have the required IT skills to address the needs of the physical security market? Hoey: As security networks converge more deeply with IT infrastructure, integrators must invest in training to ensure their installers have the required skills. Whether pursuing vendor certifications, in-house training programs, or partnerships with IT services firms, integrators must recognise that security solutions require IT fluency. A willingness to upskill installers and keep pace with technological change will prepare integrators to deliver the solutions end users demand in an increasingly connected physical security ecosystem. Q: What is the role of the manufacturer to ease the application of IT technologies to the physical security market? Hoey: The role of the security manufacturer is to simplify and facilitate the application of IT technologies by serving as a trusted advisor and educator. Manufacturers must provide guidance, case studies, and domain expertise to help partners and end users understand the full capabilities of technologies and how they can be leveraged most effectively. Rather than just promoting a specific product, manufacturers should always take an active role in informing the channel and customers on available possibilities, bringing real partnership through tailored advice and solutions. Q: What challenges remain relating to implementing IT technologies in the physical security industry? How will new technologies (e.g., AI) transform the IT environment for physical security now and in the future? Hoey: When implemented thoughtfully, AI has enormous potential to transform physical security by helping security professionals identify anomalies and patterns in data to enable predictive analytics. With the right solutions, AI can act as a force multiplier by monitoring behaviours and giving security teams advance warnings before incidents occur. As AI and other emerging technologies mature, they will bring the industry in line with the most advanced security tools available. The future looks bright for a truly integrated physical and digital security environment with AI pioneering the charge.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
One of the pioneering players in the global packaging ecosystem, this manufacturing facility transforms over 100,000 tonnes of paper, paperboard, and laminates annually into diverse, high-value packaging solutions. Established in 1925, it caters to industries such as food and beverage, personal care, and consumer goods, with a robust presence across India and select global markets. Recognised for operational excellence and innovation, the business holds numerous prestigious awards and certifications. With a strong focus on customer delight and sustainable packaging, it partners with major brands like P&G, Nestle, and Unilever. Business Scenario To address these challenges effectively, the facility of a video surveillance system was felt essential Without a video surveillance system in place, the company faced recurring security breaches and unauthorised access to its manufacturing units, which raised significant concerns for employee safety and the protection of assets. Instances of product mishandling and operational inefficiencies went unnoticed, underscoring the critical need for a video surveillance system. To address these challenges effectively, the installation of a video surveillance system was deemed essential. Additionally, they wanted a video surveillance system that ensured uninterrupted monitoring to avoid missing crucial events. Challenges Security Vulnerabilities: The absence of a video surveillance system posed risks to employee safety and the protection of valuable assets such as machinery, raw materials, and finished products. Operational Oversight: Instances of product mishandling were not promptly detected or addressed due to the lack of a robust video surveillance system. This compromised productivity, and quality control within the manufacturing unit. Loss Prevention: The inability to monitor activities effectively increased the risk of inventory shrinkage, theft, or damage to goods. This not only affected financial losses but also disrupted supply chain operations and customer deliveries. Inaccurate Weighbridge Monitoring: Inaccurate weighbridge monitoring made it difficult to verify truck weights before and after loading, which caused fraud and serious operational issues. Regulatory and Compliance Risks: Without a proper video surveillance system, it was challenging for the manufacturing unit to meet stringent regulatory standards, potentially leading to regulatory penalties. Solution Solution uses Matrix’s Bullet Network Cameras with Motorised Varifocal Lens to zoom in on the digit plate All the vehicles entering and exiting the premises were monitored with Matrix Automatic Number Plate Recognition Solution. This solution uses Matrix’s Bullet Network Cameras with Motorised Varifocal Lens to zoom in on the number plate. SATATYA SAMAS - Video Management Software then uses OCR technology to convert this captured number plate image into a digital number and store it in the database. The loading and unloading facility was closely monitored with the help of Matrix Weighbridge Monitoring Solution. This aided in the accurate tracking of shipments, which prevented fraud. Matrix 5MP Dome Cameras were strategically placed above production floors, assembly lines, packaging areas, and quality control stations within the manufacturing and warehouse facility. These cameras provided detailed monitoring of manufacturing processes, ensuring product quality and operational continuity with clear footage. Additionally, they were installed in administrative offices, break rooms, and training areas contributing to workplace safety. Matrix 5MP Bullet Cameras were deployed for robust outdoor and perimeter surveillance. They monitored loading docks, outdoor storage yards, parking lots, and security checkpoints. These cameras secured critical infrastructure such as HVAC rooms and electrical rooms, ensuring the safety and integrity of vital systems. SATATYA SAMAS - Video Management System The video surveillance system was configured in such a way that ensured uninterrupted recording All 100+ cameras were integrated with SATATYA SAMAS - Video Management System aiding in live view, and playback of the network cameras in the premises. The facility also opted for the CREAM (Cognitive Response Engine and Automated Monitoring) module in SATATYA SAMAS to improve employee safety. Two IVAs were configured in this case - Tripwire and Motion Detection. The Tripwire IVA could be used to monitor specific areas that had to be obstructed, while Motion Detection IVA helped in identifying accidents or unusual activities in the obstructed areas. Both IVAs worked in tandem, providing real-time alerts and video pop-up notifications. The video surveillance system was configured in such a way that ensured uninterrupted recording. Even if the recording server failed, the recording would be pushed to the management server by the network cameras. When the recording server was functional again, the footage was again pushed to the management server. Products Offered: SATATYA SAMAS PLT (1No.): Enterprise Video Management Software Matrix Licence Dongle 200 (1No.): USB Dongle to Run Matrix SATATYA SAMAS SATATYA SAMAS CAM5 (24 Nos.): Licence for Adding 5 Additional Cameras SATATYA SAMAS USER3 (01No.): 3 Concurrent User Licence for Smart Client and Mobile Client SATATYA SAMAS ANPR3 (01No.): 3 Camera Licences for Automatic Number Plate Recognition SATATYA SAMAS CREAM5 (01No.): 5 Camera Licences for Automated Monitoring SATATYA CIBR50MVL12CWP P2 (04 Nos.): 5MP IR Bullet Camera Motorised Varifocal 2.8-12mm Lens With Audio SATATYA CIBR50FL40CWS P2 (63 Nos.): 5MP IR Bullet Camera Fixed 4mm Lens SATATYA CIDR50FL40CWS P2 (53 Nos.): 5MP IR Dome Camera Fixed 4mm Lens Benefits The manufacturing facility is extremely satisfied with Matrix Video Surveillance System and is now planning to rely on Matrix for its needs at additional plant locations across India. Matrix's Automatic Number Plate Recognition (ANPR) and Weighbridge Monitoring Solutions streamlined operations by accurately tracking vehicles entering and leaving the premises, reducing manual errors and cutting down on weighment fraud. Employees experienced a greater sense of security with the help of CREAM in Matrix VMS, as it lowered the risk of accidents in the facility. With regular monitoring, the video surveillance system minimised product mishandling and prevented process errors, while also protecting assets and machinery. Matrix Network Cameras kept a constant watch over inventories, warehouses, and storage yards, making it easy to track stolen goods using surveillance footage. Matrix VMS and the server systems ensured 24/7 recording of the facility, maintaining continuous surveillance even in critical situations, providing a reliable and secure environment.
One of India's fastest-growing entertainment networks, renowned for its iconic brands, offers a diverse array of experiences across multiple platforms. This network profoundly impacts the Indian entertainment landscape, engaging audiences through its on-air, online, on-ground, cinema, and merchandise properties. With a portfolio of over 30 channels, it captivates audiences nationwide with a variety of programming, including general entertainment, movies, sports, youth content, music, and children's genres. Additionally, the network has been successfully producing and distributing acclaimed Hindi and regional films in India for over a decade. Challenge/requirements The client required a unified communication solution, prioritising emergency communication, for over 500 users. Future scalability was a crucial factor as well. A major challenge involved integrating Matrix devices with existing SIP-enabled systems. Their key requirements were as follows: Unified Communication Solution: Implement a system that ensures seamless connectivity across various devices via a single unified communication platform. Mobility: Guarantee connectivity for users on the go. SIP Integration: It was essential to integrate Matrix devices with the existing SIP-enabled systems to maximise investment efficiency without revamping the current infrastructure. Emergency Communication: Provide features that facilitate contacting emergency services during times of distress. Redundancy: To minimise or eliminate downtime, particularly during emergencies, redundancy was a critical requirement. Solution Matrix, in collaboration with Space Office Systems (I) Pvt. Ltd., created a Unified Communication solution that integrated existing devices with Matrix devices via SIP. This solution included the ANANT unified communication server, standard SIP desk phones, and the VARTA softphone. The deployment was carried out as follows: The server-based PBX, ANANT, housed in the server room, provides LAN and WAN connectivity with the crucial feature of redundancy. The media house utilised ANANT's LAN connectivity, facilitated by a network switch that allowed multiple devices on the premises to access IP connectivity. The network switch, connected to ANANT via LAN, provides connectivity for SPARSH VP510 and SPARSH VP210 phones, along with the VARTA softphone. Moreover, a connection through the router facilitates SIP integration with third-party devices via the SIP trunk. Results Emphasising SIP integration of Matrix devices with existing systems optimised investments The results included significant enhancements to their communication capabilities. Collaboration was streamlined through a unified communication solution, and mobility was boosted with VARTA. Emphasising SIP integration of Matrix devices with existing systems optimised investments. Overall, the solution markedly improved operational efficiency with advanced calling features. Now, let's delve into the specifics of the solution provided. Collaboration: The unified communication solution, featuring the server-based PBX ANANT, enabled seamless teamwork between office-based and mobile staff through VARTA. This ensured uninterrupted transfer and reception of information. Investment Optimisation: The SIP integration with Matrix Solution seamlessly integrated into the existing network infrastructure, meeting the client's uncompromising requirement. This integration effectively utilised current resources, eliminating the need for additional investments. Operational Efficiency: The redundancy offered by ANANT ensured minimal to no downtime, enabling smooth information flow and greatly enhancing workflow efficiency. This capability was especially critical during emergencies and related communications. Modern Features: The office now enjoys enhanced capabilities with Matrix Standard SIP desk phones such as SPARSH VP210 and SPARSH VP510. These include advanced call routeing, integration with global directories, VPN connectivity support, thereby significantly bolstering the media house's communication capabilities. The Matrix solution empowered the media house to elevate its communication capabilities with advanced call features. Notably, it excelled in emergency communication functionality, provided scalability for future needs, and seamlessly integrated with third-party devices through SIP.
Revader Security was selected by safety & security specialists North to provide over 75 re-deployable CCTV cameras to the London Borough of Hammersmith and Fulham as part of their contract to upgrade the council’s public space CCTV network. Revader’s re-deployable CCTV cameras are all-in-one professional surveillance solutions that combine an HD camera, recording, onboard storage and wireless transmission in a single compact unit. Fleet of re-deployable cameras They can operate from a wide range of power sources, including mains, battery and solar The cameras can be installed in virtually any location and can be easily moved to target crime hotspots and other areas of interest, enabling police and local authorities to deter offenders, respond to developing incidents and secure prosecutions. They can operate from a wide range of power sources, including mains, battery and solar. The fleet of re-deployable cameras is used by the council’s CCTV operators to tackle street crime, anti-social behaviour and fly-tipping, protect property, prevent trespass, improve public safety and monitor traffic flow. Delivered over a three-year period, this purchase was part of the London Borough of Hammersmith and Fulham’s £5.4 million investment into its CCTV network. The borough has a surveillance network of over 1,900 cameras in total, representing the highest-density network of CCTV cameras in the UK. Longstanding partnership with North Stuart Caldecourt, Managing Director at Revader Security, said: “We are delighted that the investment being made by Hammersmith & Fulham Council into its surveillance network is delivering results, with more police arrests enabled by high-quality CCTV footage and more prosecutions supported by video evidence. We are proud to continue our longstanding partnership with North to deliver cutting-edge solutions that make our communities safer and more secure.” Revader Security continues to work alongside the partners to support Hammersmith & Fulham Council and a wide range of other local authorities, police forces and industrial users across the UK.
Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announced that Heathrow Airport’s multi-year investment in Genetec solutions is enabling them to continuously innovate and transform operations. The joint effort provides Heathrow with a unified view across large-scale airport operations to secure people and assets, bringing efficiency and enhancing the passenger experience while ensuring data privacy and cybersecurity compliance. Deployed Genetec Security Centre Heathrow deployed Genetec Security Centre to bring all of its IP security systems onto one unified forum London Heathrow is Europe’s busiest airport, handling approximately 80 million passengers and 14 million tons of goods annually. Over 76,000 employees work around the clock to ensure the airport’s smooth operations across its 1,227-hectare site, including maintaining passenger flow, securing the premises, and managing over 1,300 daily take-offs and landings for 89 different airlines. Heathrow initially deployed Genetec Security Centre to bring all of its IP security systems onto one unified platform. What began as a 2,000-camera deployment in 2016 has since more than quadrupled in size, incorporating everything from video and access control to LIDAR, analytics, automatic licence plate recognition (ALPR), and more. Genetec solutions Genetec solutions are used to go far beyond security. For example, Genetec solutions are used to monitor over 150 km (93 miles) of baggage belts and facilitate the daily entry and exit of over 150,000 vehicles. “We’re essentially running a small city operation that happens to be called Heathrow,” explains Danny Long, IT Product Owner for physical security products at Heathrow. “Alongside the traditional airport security functions, we’re responsible for the monitoring of roads, retail space, three train stations, a bus terminal, offices, a church, fuel stores, a high voltage electrical network, and all the other associated infrastructure that maintains passenger flow.” Software and firmware updates Genetec Security Centre supports 90 other stakeholder groups working across 110 control rooms Genetec Security Centre now supports 90 different stakeholder groups working across 110 distinct control rooms, all of whom have different needs and access rights. Customised dashboards enable individual teams and third parties, such as police, government agencies, airlines, and retailers, to focus on their specific tasks. For example, some operational staff are given the tools to monitor passenger flow and are automatically notified when security lines grow too long. Meanwhile, colleagues in IT don’t see camera feeds. Instead, they have access to system health dashboards that notify them of devices that have fallen offline or require software/firmware updates. New requirements “The joy of working with London Heathrow is that the team is constantly striving to put our system through its paces and identify new areas where it can add value,” states Simon Barnes, Director of Business Development, Genetec, Inc. “While our software is configured to their requirements at the time, once in the field, new requirements emerge, and we have to adjust to their reality." “My job is to translate business requirements into workable solutions and Genetec provides me with the valuable tools to achieve that,” concludes Long. “Our experience with Genetec has been very positive. We’re only looking to expand in terms of the size and usage of the system.”
RODE, the acronym for RObotic DEpalletiser, is a pioneering product from AWL in the intralogistics market. The robotic solution can efficiently process packages randomly arranged on a pallet, setting it apart from conventional systems. Need for increased automation According to the German Parcel and Express Logistics Association (Bundesverband Paket und Expresslogistik e. V.), 4.15 billion courier, express, and parcel shipments were sent in Germany alone in 2022. Annual shipment growth to around 4.9 billion is realistic by 2027. Against this backdrop and the generally prevailing shortage of personnel, there is only one solution for shipping and logistics companies to cope with this immense volume of orders: increased automation. RODE The global robotic integrator AWL offers RODE, an intelligent robotic depalletiser solution The global robotic integrator AWL offers RODE, an intelligent robotic depalletiser solution. One of the locations where RODE adds value is for DHL eCommerce in Rotterdam. In this machine, two Ensenso 3D cameras from IDS Imaging Development Systems GmbH are implemented to provide the required image data. Application The intelligent robot-supported depalletiser, therefore, automatically destacks any packaged goods such as cartons, bags, or containers from pallets and thus ensures their continuous processing - without delays or downtime. Even "extra shifts" at peak times can be implemented at any time, e.g., to cope with the increased workload during Christmas. This frees up staff for more qualified tasks, such as the subsequent processing of consignments or handling customer inquiries. At the same time, it relieves employees of physically and ergonomically demanding tasks and reduces the risk of injury. Up to 800 packages in continuous operation The particular difficulty here lies in the robot's picking of parcels of different sizes and weights At DHL eCommerce in Rotterdam, RODE processes up to 800 parcels per hour with a maximum weight of 31.5 kg each and places them on the corresponding sorting belt. The particular difficulty here lies in the robot's picking of parcels of different sizes and weights. It must independently recognise the position of the objects in three-dimensional space and decide which package to pick next. It then has to determine the best gripping position and avoid collision with other parcels or the machine. Ensenso X36 3D cameras "This intelligent robotic solution integrates AI image processing and high-tech gripper technology," explains Sander Lensen, R&D Manager at AWL. "The system recognises products and can flip the items to ensure that the required long side is leading." Two Ensenso X36 3D cameras provide the necessary image data. Integrated image processing system They can provide robust 2D and 3D information on products on a pallet measuring 1200 x 1200 mm They can provide robust 2D and 3D information on products on a pallet measuring 1200 x 1200 mm and a maximum height of 2400 mm. The integrated image processing system processes this further and enables the depalletiser to identify each package and determine the corresponding gripping position for robust robot-assisted picking. 3D cameras for future-oriented robotics Each Ensenso X36 3D camera system consists of a projector unit and two GigE cameras with either 1.6 MP or 5 MP CMOS sensors. AWL has opted for the 5 MP variant for its solution. Mounting and adjustment brackets, three lenses as well as sync and patch cables for connecting the cameras to the projector unit are also included in the scope of delivery. The integrated FlexView2 technology ensures an even better spatial resolution as well as a very high robustness of the system with dark or reflective surfaces. Easy to set up It is also easy to integrate into its working environment and aims to give its users a competitive edge The 3D systems are delivered assembled and pre-calibrated. However, focussing and calibration are also easy to set up using the setup wizard integrated into the software. The latter they have in common with the RODE depalletiser - it is also easy to integrate into its working environment and aims to give its users a competitive edge in the world of logistics automation. Outlook "The intralogistics market is a growth market. The number of robot solutions required will increase rapidly in the coming years." "The type of products that need to be recognised will change constantly. This will be a challenge for all components and the demands on the camera," explains Sander Lensen. Camera technology with artificial intelligence However, image processing is also developing rapidly. Smart solutions that combine camera technology with artificial intelligence are on the rise. They hold great potential for tackling both increasingly demanding tasks and the worsening shortage of skilled workers. Carton by carton, parcel by parcel, pallet by pallet.
A renowned global pioneer in international education services provides various programs and comprehensive support to students pursuing their educational goals abroad. Originating from Australia in 1969, its primary objective has been facilitating educational opportunities worldwide. The company is closely associated with IELTS (International English Language Testing System), and it assists students in studying in English-speaking nations like Australia, New Zealand, Canada, Ireland, the UK, and the US. Company profile In India alone, it has over 70 offices across 61 cities and grew its operations in Southeast Asian nations Situated in Delhi, India, the company’s Indian headquarters serves as a central operational hub, addressing the diverse needs of Indian students aspiring for overseas education. With a team of dedicated experts, the centre offers students personalised guidance, counselling, and support nationwide. In India alone, it has over 70 offices across 61 cities and expanded its operations in Southeast Asian countries. Motivated by a commitment to excellence, integrity, and student success, the company continues to empower individuals, fostering global connections and promoting cultural understanding through international education. Challenges Ensuring the integrity of its assessment process Needed a standard procedure that could be replicated across 61 locations Evidence capturing to confirm the identity of the student appearing for the exam Needed a surveillance solution that ensured compliance at the centre Need to capture footage locally and centralised monitoring The surveillance solution should be dependable, scalable, and interoperable Business scenario The institute sought a wide surveillance solution that captured the details of every student As the co-owner of the IELTS, the institute faced significant challenges in ensuring the integrity of its assessment process for students studying in English-speaking countries. With centres spread across India and other Southeast Asian countries like Sri Lanka, Bangladesh, and Bhutan, they needed a reliable surveillance solution to verify the identity of candidates at their assessment centres. It was crucial for the assessment process to be standardised across 61 locations and easily replicable in new centres. With 11 assessment centres and 49 centres where students arrived for assessment, the institute sought a comprehensive surveillance solution that captured the details of every student entering their premises and cross-referenced them with their system centrally. Additionally, they required a robust recording architecture to store video evidence for future reference as needed securely. In essence, the company faced the distressing challenge of establishing a surveillance solution that was dependable, scalable, capable of capturing essential details, and interoperable. They needed a distributed architecture with centralised control to meet their surveillance requirements effectively. Solution The surveillance solution comprised of: The challenges faced by the institute were swiftly assessed by Matrix experts, who devised a robust surveillance structure to ensure compliance across multiple centres in India and abroad. In all 61 centres, Matrix 2MP PTZ cameras with 25x optical zoom were strategically installed to capture the faces of candidates arriving for tests and match them with their recorded details in the system. The movement of each candidate was meticulously recorded in the system to maintain accurate identity records. The action of each candidate was meticulously recorded in the system to keep real identity records Further, the accuracy was enhanced by adding a secondary layer of surveillance to monitor compliance with the SOP. Matrix PTZ cameras with 25x optical zoom adeptly captured intricate event details recorded in the computer. To meet the needs of each centre, NVRs (Network Video Recorders) with different capacities were installed. This enabled the local recording of details at each centre. Following the client's specifications, the NVRs were configured to store recorded details for three months. Additionally, cameras were installed at the 11 OSM sites to ensure compliance at the places where the papers were assessed. Products offered SATATYA MIBR20FL36CWP: 543 2MP IR Bullet Camera with 3.6mm Lens with Audio SATATYA MIDR20FL36CWP: 264 2MP IR Dome Camera with 3.6mm Lens with Audio SATATYA PZCR20ML25CWP: 76 2MP Pan-Tilt-Zoom Camera with 25x Optical Zoom SATATYA NVR1601X - 8 Nos 16 Channel NVR with 1 SATA Port SATATYA NVR1602X - 8Nos 16 Channel NVR with 2 SATA Port - 8 Nos SATATYA NVR3202X - 1Nos 32 Channel NVR with 2 SATA Port SATATYA NVR3204X - 31Nos 32 Channel NVR with 4 SATA Port SATATYA NVR6404X - 2Nos 64 Channel NVR with 4 SATA Port SATATYA NVR6408X - 7Nos 64 Channel NVR with 8 SATA Port MATRIX LICENCE DONGLE 200 Enterprise VMS: USB Dongle to Run Licence Application SATATYA SAMAS PLT Enterprise VMS: Software for up to 65,535 Cameras SATATYA SAMAS CAM100 - 5Nos Enterprise VMS: 100 Camera Licence SATATYA SAMAS USER3 - 5Nos Enterprise VMS: 3 Concurrent User Licence Benefits Enhanced Assessment Integrity: By implementing Matrix 2MP PTZ cameras with 25x optical zoom across all 61 assessment centres, the company ensured the integrity of the assessment process. These cameras meticulously capture the faces of candidates arriving for tests, allowing them to verify their identities and maintain accurate records. Standardised and Replicable Procedure: The Education Centre needed a standard procedure that could be replicated across the extensive network of centres. The Matrix surveillance solution provided it with a standardised approach that could be easily implemented in new locations, ensuring consistency in its assessment process. Compliance Assurance: The addition of Matrix PTZ cameras with 25x optical zoom and a secondary layer of surveillance helped them monitor and ensure compliance with the Standard Operating Procedures (SOP) at all times. Dependable and Scalable Surveillance: Matrix's NVRs with different capacities allowed the Institute to locally store recorded details at each centre while ensuring reliability and scalability for future expansion. Centralised Monitoring: To streamline the operations, they needed a surveillance solution that allowed seamless central monitoring. Matrix's solution facilitated the cross-referencing of student details with their system centrally and, enhancing efficiency and data accuracy. Interoperability: Matrix's surveillance solution is designed to be interoperable, ensuring seamless integration with the existing infrastructure. This interoperability enables them to adapt to evolving technological requirements while maintaining the integrity of the assessment process. In summary, Matrix's comprehensive surveillance solution not only addressed the immediate challenges but also provided a robust foundation for the assessment process, enabling them to uphold the highest standards of integrity, compliance, and efficiency across all assessment centres.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Every day, the physical security industry succeeds in applying technologies that make the world a safer place. Manufacturers, integrators, and end users are eager to share their success stories, and their successes can inspire others to implement the same technology solutions. But, occasionally, technology does not live up to expectations and, in fact, fails to perform as promised. We asked this week’s Expert Panel Roundtable: How has the physical security industry failed to meet customer needs?
For many years, security systems produced their share of "data exhaust." Every access control action and each video image became a data point to be stored in perpetuity, with no practical way to use the data. More recently, systems have been developed to enable organizations to analyze data from sensors and other connected devices to gain valuable insights into how their systems are being used, to identify potential vulnerabilities; and even to provide insights into broader enterprise operations. We asked this week’s Expert Panel Roundtable: How are data analytics changing the course of the security marketplace?
In the United States, they are called licence plate recognition (LPR) systems. In Europe, the more common term is automated licence number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle colour, type, make and model. We asked this week’s Expert Panel Roundtable: What's new with licence plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![Video technology: making cities safer & improving lives](https://www.sourcesecurity.com/img/white-papers/612/safe-city-1-920x533.jpg)
Video technology: making cities safer & improving lives
Download![Integrated access control: reap the benefits of connected security](https://www.sourcesecurity.com/img/white-papers/612/image.jpg)
Integrated access control: reap the benefits of connected security
Download![Securing unmanned infrastructure at the network edge](https://www.sourcesecurity.com/img/white-papers/612/securing-unmanned-infrastructure-network-edge-920.jpg)
Securing unmanned infrastructure at the network edge
Download![Connected video technology for safe cities](https://www.sourcesecurity.com/img/white-papers/612/milestone-safe-city-video-technology-920.jpg)
Connected video technology for safe cities
Download![10 top insights in access, cloud and more](https://www.sourcesecurity.com/img/white-papers/612/vanderbilt-whitepaper-headerimage.jpg)
10 top insights in access, cloud and more
Download![Protecting dormitory residents and assets](https://www.sourcesecurity.com/img/white-papers/612/aiphone-920.jpg)
Protecting dormitory residents and assets
Download![11 reasons video surveillance is moving to the cloud](https://www.sourcesecurity.com/img/white-papers/612/een-header2.jpg)
11 reasons video surveillance is moving to the cloud
Download![How to migrate to an IP-based access control system](https://www.sourcesecurity.com/img/white-papers/612/genetec-us-websiteimage2.jpg)
How to migrate to an IP-based access control system
Download![The inevitability of The Cloud](https://www.sourcesecurity.com/img/white-papers/612/the-cloud-920.jpg)
The inevitability of The Cloud
Download![Making sense of today’s security camera options](https://www.sourcesecurity.com/img/white-papers/612/vicon-todays-security-camera-option-920.jpg)
Making sense of today’s security camera options
Download![Smart security cameras: excellence in retail](https://www.sourcesecurity.com/img/white-papers/612/920x533_1596117357.jpg)
Smart security cameras: excellence in retail
Download![Access control & intelligent vehicle screening](https://www.sourcesecurity.com/img/white-papers/612/uveye-920x533_1582820920.jpg)
Access control & intelligent vehicle screening
Download![How to get buy-in from IT departments on IP video installations](https://www.sourcesecurity.com/img/white-papers/612/getting-buy-in-from-it-option-2-920_1540308414.jpg)
How to get buy-in from IT departments on IP video installations
Download![Hikvision DarkFighter Technology for high-quality images at night](https://www.sourcesecurity.com/img/white-papers/612/hikvision-darkfighter-620.jpg)
Hikvision DarkFighter Technology for high-quality images at night
Download![Enhanced Ethernet Technology (ePoE)](https://www.sourcesecurity.com/img/white-papers/612/Dahua-ePoE-620x360.jpg)
Enhanced Ethernet Technology (ePoE)
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Network cameras: Manufacturers & Suppliers
- Hikvision Network cameras
- Dahua Technology Network cameras
- Axis Communications Network cameras
- exacqVision Network cameras
- Bosch Network cameras
- Honeywell Security Network cameras
- VIVOTEK Network cameras
- Hanwha Vision Network cameras
- AV Costar Network cameras
- LILIN Network cameras
- Messoa Network cameras
- Panasonic Network cameras
- Sony Network cameras
- eneo Network cameras
- Vicon Network cameras
- Pelco Network cameras
- FLIR Systems Network cameras
- Surveon Network cameras
- IDIS Network cameras
- Milestone Network cameras
![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Facial recognition](https://www.sourcesecurity.com/img/emagazines/612/facial-recognition-magazine-security-technology-trends-international.jpg)
Facial recognition
Download