Network monitoring
The South American Football Confederation (CONMEBOL) strengthens its commitment to South American football by announcing its agreement with Atos, which becomes the first Official Innovation Partner for CONMEBOL’s club competitions. Among other responsibilities, the partner will develop new website and app solutions for CONMEBOL Libertadores and CONMEBOL Sudamericana, aiming to enhance fan interaction and improve their digital experience. Investing in innovation and IT efficiency Atos is...
The European Network for Cyber Security (ENCS) announces that ELES, Slovenia's transmission system operator, has joined the network as a member, reinforcing collaborative efforts to protect Europe’s electricity grid from evolving cyber threats. The partnership will give ELES access to ENCS’s collaborative threat intelligence, specialist training and technical expertise – strengthening its ability to detect, prevent and respond to cyber incidents targetting high-voltage n...
barox Kommunikation AG is delighted to announce the launch of their new technology partnership with Network Optix, the latest addition to their extensive integration portfolio with market pioneering VMS and PSIM providers. This new integration is designed to transform the management and support of Network Optix Nx Witness video networks. Utilising the new barox Network Optix plug-in, Nx Witness users will be able to capitalise on a greater depth of integration capabilities. Key features i...
Altronix, the recognised pioneer in power and networking solutions, is showcasing its latest innovations that elevate security and system performance at ISC East Booth 713. Altronix will feature eFlow Pro Series auto-ranging power supply/chargers with enhanced features, Trove™ Access and Power Integration Solutions, and advancements in LINQ™ network power management, fibre, PoE, and long-range Ethernet for greater flexibility for a broad range of applications. Product enhancem...
FireMon, the pioneering network security and firewall policy management company, detailed expanded support for Zero Trust microsegmentation across hybrid environments, including a deeper integration with Illumio and continued coverage for VMware NSX and Zscaler. By normalising, analysing, and continuously validating segmentation intent across network, virtual, and host enforcement points, FireMon helps security teams operationalise Zero Trust at enterprise scale. Firewall governance...
A Russian telecom company that develops technology to allow phone and internet companies to conduct web surveillance and censorship was hacked, had its website defaced, and had data stolen from its servers, TechCrunch has learned. Founded in Russia, Protei makes telecommunications systems for phone and internet providers across dozens of countries, including Bahrain, Italy, Kazakhstan, Mexico, Pakistan and much of central Africa. The company, now headquartered in Jordan, sells video conferencin...
News
Expanding their sales operation to cover North America, barox Kommunikation GmbH, the Swiss manufacturer of video security networking L2/L3 switches, media converters, IP extenders, and network management software has appointed Reinhard Florin to the role of Vice President of North America Sales. In this new role, Reinhard will be leading the development and execution of barox’s go-to-market strategy as well as head a team of sales and technical support professionals. Through this appointment, barox is leveraging their proven success outside of North America and bringing their unique portfolio of networking products, designed for video security applications, to the North American marketplace. Reinhard brings over 30 years of senior executive experience in the networking industry where he advanced some of the most recognisable brands, most recently as the Global General Manager of Comnet by Acre. Unique set of networking products “barox has developed a unique set of networking products and technologies geared to the demanding requirements of video security networking in critical infrastructure environments,” says Reinhard. “They are committed to developing the North American marketplace and I look forward to heading the rollout of their industry-leading solutions across the region.” Outside of the Americas, barox products have been deployed extensively by customers in the government, financial, healthcare, education, IT, transportation, utilities, correctional, and manufacturing market segments. Distributed software agent technology One of barox ’s differentiating solutions is the ‘Smart-barox’ plug-in, designed to greatly extend the inter-operability of Video Management Software (VMS). Incorporating a distributed software agent technology, the barox plug-in enables a “single pane of glass” within the VMS for network wide management integration of cameras, video streams, and the network connectivity provided by barox hardware devices. This provides users a single point of control and management of the video network. The barox plug-in is compatible with major vendor VMS solutions, including those from Milestone and Genetec. This advanced technology reduces the time, effort and costs associated with setting-up and maintaining IP video networks. Greater geographic video surveillance coverage “Driven by greater geographic video surveillance coverage, advancements in camera technology and the use of AI, video security networks in North America are increasingly more sophisticated and complex.” "This requires a networking solution specifically designed for this environment,” continues Reinhard. “barox’s comprehensive, application specific, portfolio of hardware and software products uniquely meets this requirement.” High demands of video surveillance networks “barox designs all of its products to address the high demands of video surveillance networks, and we anticipate making a big difference in the North America market,” says Rudolf Rohr, barox Co-founder & Managing Partner. “This includes keeping video networks secure. barox products include a robust set of video networking cyber security features and functions. We are eager to support system integrators and network operators in North America in protecting their video networks from cyber-attacks and failures.” Reinhard and the barox North America team will be available to demonstrate the power of the barox portfolio of solutions, live, at ISC East at the Javits Center, NYC on November 19 and 20, 2025 at stand 215.
Digital workplace solutions and managed services pioneer Espria returns in December with another Optimise IT exhibition, pioneering the discussion on how IT solutions can best work together to provide the ultimate support for businesses and end-user experience. Post-COVID, Espria hosted a series of Optimise IT webinar discussions, covering themes such as business peace of mind, business readiness and AI integrations for workplace teams. These discussions have featured key spokespeople from some of their pioneering IT solutions partners and provided industry pioneers with a platform to network directly with key decision-makers who are looking for increasingly efficient ways to deliver their IT strategy. Event feature representatives This year’s in-person event will feature representatives from premier vendor partners Gamma, Microsoft (hardware and software), Sophos and Omada by TP-Link, with more vendors to be confirmed. Marketing and Business Strategist, Bryony Thomas, will be giving a keynote speech during the lunch, sharing lessons in preparation, prioritisation and attention to detail and how missing these can be catastrophic. The event will be held from 9 am to 2 pm on 3rd December at the Down Hall Hotel, Matching Lane, Hatfield Heath, Bishop’s Stortford. Attendance is free but subject to prior registration on the Espria website. Cybersecurity alliance partnerships Stephen Cook, Sales Director at Espria, commented, “Turning to 2026, cybersecurity has entered a transformative phase, with the cyberthreat landscape accelerating in complexity and scale. Businesses that adopt intelligent monitoring and integrated, adaptive defence strategies will be best positioned to navigate 2026 with confidence.” “Similarly, customer trust is entirely defined by uncompromising data security in today’s environment. Where AI has been rapidly adopted into operations, it has simultaneously amplified the quantity and quality of cyberattacks, creating this paradox for security." "Espria has always prioritised our cybersecurity alliance partnerships as a critical solution for today’s security landscape, especially with the proliferation of AI-boosted attacks, which is why bringing experts such as Micrsoft and Sophos to the table is a key part of building a lasting strategy for SMEs from our previous Optimise events.” Commitment to cyber hygiene and defence practices Cook added: “Peace of mind with data security has always been a part of this and requires a continuous commitment to cyber hygiene and defence practices from experts and clients alike. It’s not just about the most high-technology solutions, but the ones that work best within businesses and align with existing operations seamlessly." "Our mission is to lead the conversation for enterprises of all sizes to navigate their modern technology needs, and that ensures any technology introduced, particularly AI tools, provides a strategic boost without hindering operations or opening up wider attack surfaces." Comprehensive security strategies Cook concludes, “Educating our customer businesses who may be neglecting their endpoint security is an essential way to show security support. We’ve seen that customers, particularly smaller businesses with limited cyber skills or expert access, need that guidance when it comes to network security." "Thankfully, we can provide those skills and in this instance the forum for expert minds to collaborate, providing those all-comprehensive security strategies needed to tackle the cyber threats of today and tomorrow.”
G2E Asia @ the Philippines, a special edition of G2E Asia, makes its highly anticipated return to Manila Marriott Hotel this December 10 and 11. Tailored for the Philippine gaming industry, the two-day event will feature over 100 brands in the exhibition, many of which have no local presence. Complementing the exhibition is a series of dynamic activities, including dedicated networking events for various industry segments, specialised masterclasses to support professional development, and a two-day conference addressing the latest developments in the Philippine gaming industry. Networking events for slots, table games, iGaming and more G2E Asia is all about connecting professionals across the industry. Its networking events, tailored for different segments, provide opportunities to engage with industry professionals both locally and globally. Networking events include: Slots Networking Cocktail – Dec 10 (Wed), 15:00 – 16:00 iGaming Networking Cocktail – Dec 10 (Wed), 15:00 – 16:00 Table Games Networking Cocktail – Dec 11 (Thu), 15:00 – 16:00 IT & Marketing Networking Cocktail – Dec 11 (Thu), 15:00 – 16:00 G2E Asia Closing Party (open to all) – Dec 11 (Thu), 16:30 – 17:30 Specialised masterclasses for iGaming, IT and marketing professionals Recognizing the growing importance of iGaming, IT and marketing in the industry, G2E Asia’s specialised masterclasses help professionals at all levels upskill in these key functions. Each session delivers practical insights on emerging trends while providing opportunities to learn and network with peers. All sessions are held in the exhibition hall and are accessible with an expo-only pass. Masterclasses include: iGaming Masterclass – Dec 10 (Wed), 14:00 – 15:00 IT & Marketing Solutions Masterclass – Dec 11 (Thu), 14:00 – 15:00 Two-day conference focused on the Philippine gaming industry Opening the conference, G2E Asia is proud to welcome Mr. Alejandro H. Tengco, Chairman and CEO of Philippine Amusement and Gaming Corporation (PAGCOR), as the morning keynote speaker on December 10, followed by Mr. Greg Hawkins, President and Chief Operating Officer, Bloomberry Resorts Corporation/Solaire Resort, for the afternoon keynote. Over two days, the conference will explore the latest trends shaping the Philippine gaming industry, featuring top industry pioneers who will share insights, strategies, and emerging opportunities across the sector. Key trends in the online gaming sector The Wednesday, December 10 conference will take a deep dive into the land-based gaming sector, exploring regulatory adaptations, non-gaming innovations, and more. Speakers including Mr. Evan Spytma, CEO of Casino Plus; Mr. Shaun McCamley, Founder and Chairman of GameWorkz; Mr. Samuel Wilkes, Vice President, F&B Business Development & Strategy of Solaire Resort; Mr. John Lucas, Chief Hospitality Officer of Newport World Resorts; and others. The Thursday, December 11 conference will spotlight key trends in the online gaming sector, covering business growth, AML best practices, CSR, slots and ETG technology, and more. Speakers include Mr. Ricardo Banaag, President and CEO of DFNN Inc.; Mr. Jeremy B. Luglug, Assistant Vice President, Electronic Gaming Licencing Department of PAGCOR; Ms. Nerie Aquino, Director – Gaming Compliance, Legal & Compliance of Okada Manila; Ms. Vina Claudette Oca, Assistant Vice President, Gaming Licencing & Development Department of PAGCOR; Mr. Alexander Ngo, Director of LexisNexis Risk Solutions; and others.
Corero, the distributed denial of service ("DDoS") protection specialists and champion of adaptive, real-time service availability, is pleased to announce good sales traction across Q3 2025, driven by a number of new customer wins and product enhancement launches, as well as a key customer renewal and expansion order in October, delivering a strong start to Q4 2025. Corero delivered a strong Q3 2025, with order intake of $7.4 million (Q3 2024: $6.0 million) and new contract wins secured across the US, UK, Europe, Brazil and Singapore. Two additional CORE customer wins were secured in Q3 2025, following the first two CORE contracts secured in Q2 2025. DDoS protection solutions Corero secured a renewal and significant expansion order with a key customer, a pioneering US cloud computing provider in October 2025. The renewed and expanded contract, providing DDoS protection solutions to the customer’s current and planned data centre portfolio, has a total contract value of $6.8 million, $0.8 million of which was included in the Q3 2025 order intake value noted above. The $6.8 million contract consists of a $3.1 million renewal (of all existing contracts) and $3.7 million expansion, which will be delivered and recognised on a subscription basis over the three-year contract term. Customer demand requirements In addition to good customer traction in H2 2025 to date, Corero has also recently announced a number of key platform enhancements to serve customer demand requirements: Layer 7 TLS Protection blocks high-volume application-layer attacks in real time at the network edge with no additional latency, no false positives and no additional hardware. Zero Trust Admission Control uses behavioural analytics to detect and block anomalies at login portals, reducing risk from credential abuse and bot-driven attacks. Extended WAF and Application Security for Service Providers, which protects web applications and APIs using adaptive analytics, threat modelling and anti-bot capabilities, enabling service providers to offer high-value application-layer security as a managed service. Bare Metal and Commercial Off-the-Shelf Deployment Options, which extend the use cases for Corero’s software-led, hardware-agnostic capabilities to customers who desire to run Corero’s solution on hardware of their choosing. Management reaffirms the guidance for the year ending 31 December 2025, as announced on 16 July 202,5 of revenue between $24.0 million and $25.5 million (FY 2024: $24.6 million) and EBITDA between $1.5 million loss and $0 million (FY 2024: $2.5 million profit). DDoS protection requirements Carl Herberger, Chief Executive Officer at Corero, commented: “I am delighted to extend our partnership with a key Corero customer and to continue to support their growing business and DDoS protection requirements. This expanded contract demonstrates Corero’s technical leadership and the confidence customers, including those managing critical infrastructures, have in our SmartWall ONE platform.” “I am encouraged by the sales growth in Q3 2025 and the strong start to Q4 2025. Our success in winning new customers and expanding our global presence, combined with Corero’s strategic focus on product innovation, continues to sit at the heart of our customer proposition.” “The H2 2025 sales momentum not only reflects our strengthening market presence but highlights the ongoing and urgent shift towards performance-driven, flexible and scalable DDoS protection to mitigate cybersecurity attacks.”
DigiCert, a pioneering provider of digital trust, released its first RADAR Threat Intelligence Brief, a quarterly publication delivering data-driven insights on emerging cyber threats. Drawing from trillions of network events across DigiCert’s global security platform, including UltraDNS, UltraDDoS Protect, and UltraWAF, RADAR provides one of the most comprehensive views of the evolving threat landscape. Fundamental shift in cyber warfare The Q3 2025 RADAR brief highlights an unprecedented surge in distributed denial-of-service (DDoS) attacks that reached “internet tsunami” scale, with two events peaking at 2.4 terabits per second (Tbps) and 3.7 Tbps, respectively. These attacks underscore a fundamental shift in cyber warfare where the internet itself becomes both the weapon and the battlefield. Top findings from the Q3 2025 DigiCert RADAR DDoS Attacks Reach Record Scale: DigiCert’s UltraDDoS Protect network absorbed multiple multi-terabit attacks—the largest seen to date—while preventing an estimated 3,000 hours of potential website downtime for customers. Geopolitical Realignment Fuels Cyber Risk: Attack traffic increasingly originates from regions where digital infrastructure is outpacing regulation, with Vietnam, Russia, Colombia, and China ranking among the top five sources. Higher Education Targeted: September saw a significant rise in DDoS attacks on universities and academic networks, ranking higher than financial services and IT/Software services, timed with peak enrolment periods and open campus infrastructures. Automation Drives Modern Threats: Malicious web activity rose from 51% in July to 73% in September, with 32 million bot violations recorded in September alone, confirming that automation now powers most large-scale attacks. FormErr Spike Highlights DNS Interdependence: DNS errors caused by misconfigurations jumped 22,000% mid-quarter, reflecting how quickly issues can ripple across the internet. Targeted precision attacks “Attackers are not just choosing between precision and scale anymore, they’re mastering both,” said Michael Smith, AppSec CTO at DigiCert. “Our data shows that targeted precision attacks dominated two of the three months, while large-scale carpet-bombing campaigns surged in August, accounting for 65% of all incidents. As threats grow more complex, organisations need visibility that spans infrastructure, applications and identity to stay resilient.” Critical infrastructure and geopolitically significant regions Smith added, “We also saw that the United States bore the brunt of these attacks, accounting for 58% of global DDoS activity, with the United Kingdom (11%) and Saudi Arabia (11%) also heavily targeted." "Adversaries are focusing their firepower on critical infrastructure and geopolitically significant regions, those where disruption has the greatest ripple effect.”
Cyberseer, one of Darktrace’s first Managed Security Service Provider (MSSP) partners and previous winner of Darktrace’s EMEA Service Partner of the Year award, today announced it has achieved Authorised Managed Detection & Response (MDR) Partner status with Darktrace, a pioneer in cybersecurity. This recognition underscores Cyberseer’s proven expertise, extensive training and commitment to delivering world-class MDR services powered by the Darktrace ActiveAI Security Platform. Darktrace-focused MDR services The Darktrace Services Authorised Partner Program enables partners to deliver differentiated, Darktrace-focused MDR services that address the unique security needs of their customers. Achieving this status demonstrates Cyberseer’s commitment to providing cutting-edge cyber defence services powered by Darktrace’s unique Self-Learning AI. The service offers organisations 24/7 monitoring and response capabilities, combining the Darktrace ActiveAI Security Platform with Cyberseer’s team of experienced security analysts. The MDR Service is designed to address the growing volume and sophistication of cyberattacks, from ransomware and phishing to insider threats and zero-day attacks. AI-driven cyber defence technologies “Achieving Authorised MDR Managed Service Partner status with Darktrace is a significant milestone for Cyberseer in our 10-year collaboration with Darktrace,” said Garath Lauder, Director, Cyberseer. “It reflects both our deep expertise and our dedication to protecting customers with pioneering AI-driven cyber defence technologies available. Earning this designation places us among an elite group of providers who are uniquely positioned to deliver Darktrace MDR services that provide our customers with 24/7 proactive protection.” Darktrace-powered MDR services By earning Authorised MDR Managed Service Partner status, Cyberseer can now deliver Darktrace-powered MDR services that provide: AI-Powered Threat Detection – the Darktrace ActiveAI Security Platform’s Self-Learning AI continuously learns an organisation’s unique digital environment to detect novel and fast-moving threats. 24/7 SOC Coverage – Dedicated security analysts monitor, investigate, and respond to threats at any time of day. Autonomous Response – AI technology that can take targeted action within seconds to neutralise threats while maintaining normal business operations. Broad Coverage – Protection with Darktrace / EMAIL™, Darktrace / NETWORK™, and Darktrace / OT™ Customised Reporting – Actionable insights and post-incident analysis tailored to each customer’s environment. Rapid investigation and coordinates response actions The Cyberseer MDR Service deploys Darktrace across an organisation’s entire digital estate. Once deployed, Darktrace’s Self-Learning AI establishes a dynamic understanding of “normal” activity for every user and device, enabling it to detect anomalies that may indicate a cyber threat. When an alert is triggered, Cyberseer’s SOC team conducts a rapid investigation and coordinates response actions, with the option for autonomous intervention to contain threats in real time. Darktrace’s Self-Learning AI technology “The Darktrace ActiveAI Security Platform enables partners like Cyberseer to bring advanced AI cyber defence to customers who may not have the resources for a full in-house SOC,” said Eloina Pesce, VP of Partner Sales. “The combination of Darktrace’s Self-Learning AI technology and Cyberseer‘s expertise provides a powerful new layer of fully managed protection capable of finding and stopping both known and novel threats.”


Expert commentary
In today’s connected world, attacks are more likely to target digital than physical entry points. From ransomware and firmware tampering to remote hijacking, AI-driven phishing and automated vulnerability discovery, the nature of threats is evolving rapidly, and no industry can afford to neglect them. As our industry has moved from mainly mechanical to increasingly digital solutions, we have long recognised the importance of constantly monitoring and assessing the risks we face. This means not only meeting mandatory regulations but also voluntarily adopting international standards such as ISO 27001, which protects data and systems through a structured and independently audited framework. Today’s fast-changing risk environment is also why the EU introduced the Network and Information Security Directive 2 (NIS2) – to raise the bar for cybersecurity across Europe. But what do measures like NIS2 and the Cyber Resilience Act (CRA) mean in practice? How does the rise of AI fit in? And most importantly, what should our industry be doing to stay secure in such an unpredictable digital landscape? The new regulations Compliance is not just about meeting regulations, it is also a competitive advantage NIS2 is reshaping cybersecurity expectations by setting higher standards to reduce risk, improve transparency, and protect data and services. Alongside it, the CRA introduces mandatory requirements for products with digital components. This makes “secure by design,” regular updates, and compliance checks essential before products can enter the EU market. For companies in our industry, responsibilities now extend well beyond internal systems. Organisations must also ensure that suppliers and service providers comply, with regular risk assessments forming a central part of the process. The consequences of falling short are severe, ranging from significant fines and audits to the potential withdrawal of products from the market. For our customers, the message is clear: security must be built in from the start. Compliance is not just about meeting regulations, it is also a competitive advantage. At ASSA ABLOY Opening Solutions EMEIA, security is part of our DNA. We embed these standards into everything we do, giving customers solutions they can trust to be compliant and resilient. The rise of AI Artificial intelligence is transforming the digital security landscape and it cannot be separated from the regulatory framework shaping our industry. With AI advancing rapidly and new regulations coming into force, we have established a digital compliance framework to stay ahead of the curve and use AI as an enabler for improving security and achieving compliance. On one hand, AI brings powerful benefits, including more intelligent monitoring, faster anomaly detection, and smarter tools for operational efficiency. These capabilities directly support NIS2 and the CRA, particularly in the areas of proactive risk management and incident response. AI and building cybersecurity standards On the other hand, AI introduces new risks. The attack surface is expanding and threats such as deepfakes and smarter phishing create serious threats that regulators are determined to address. Both NIS2 and the CRA emphasise continuous monitoring, transparency and accountability, principles that must now also guide the responsible use of AI. At ASSA ABLOY Opening Solutions EMEIA, we see AI not just as a risk to mitigate, but as a capability to strengthen resilience and trust. That is why we are embedding strong governance practices around AI and building cybersecurity standards into every stage of product development. By doing so, we help our customers align with new regulations while ensuring AI serves as a tool for greater security and confidence. Trust and compliance Beyond our own operations, we are also committed to supporting customers on their compliance journey At ASSA ABLOY Opening Solutions EMEIA, we are taking NIS2, the CRA and the rise of cyber-threats seriously, ensuring compliance and enhancing trust with all our customers. We have reinforced supplier oversight, streamlined incident reporting, and embedded cybersecurity into every stage of product development and lifecycle management. Our teams also conduct ongoing risk assessments and post-incident reviews, ensuring that lessons are learned and improvements are made. By taking these steps, we not only meet regulatory requirements but strengthen the resilience of our supply chain and the trust customers place in us. Beyond our own operations, we are also committed to supporting customers on their compliance journey. Initiatives such as our recently released whitepaper “Enhancing Cyber–Physical Resilience with Digital Access Solutions” and a detailed NIS2 whitepaper developed in Germany last year provide clear, practical guidance. By showing what these regulations mean in practice and how intelligent access solutions can directly support compliance, we aim to make the path forward less complex and more achievable for our customers. Looking ahead The days when security threats to businesses and products were only physical are long passed. Today, we find ourselves in a world where the digital realm poses even more serious and constantly evolving challenges. It is therefore crucial that, as an industry, we take the necessary steps to meet the directives of NIS2 and the CRA and also constantly monitor the rise of AI. Only by doing so can we protect our customers, preserve our reputations, and build the trust that defines true leadership in security.
From where I sit in talking to security pioneers every day, the traditional Global Security Operations Centre (GSOC) stands at a critical inflection point. Security teams are up against challenges in staffing, operational efficiency, and more threat complexity, which means “thinking outside the box” is becoming critical. The use of artificial intelligence (AI) is emerging as more than a buzzword in these situations; it’s becoming a game-changing force multiplier in security operations. Reaching a breaking point Today's GSOCs face a perfect storm of operational challenges. Security operators, typically earning between $20-40 per hour, require extensive training periods lasting weeks or months as a result of the numerous applications they’re tasked with using. Yet the industry grapples with insane turnover rates of 100-% to 300% annually, creating a costly cycle of continuous recruitment and training. Meanwhile, operators are drowning in video feeds and alarms, leading to fatigue, missed incidents, and delayed response times. Practical applications for AI The reality of many GSOCs, however, is a disjointed mess of multiple applications The GSOC is the centre of an organization’s security and in a perfect world, all of the data related to safety across multiple facilities flows through there, giving operators a clear picture of what’s going on at any given time. The reality of many GSOCs, however, is a disjointed mess of multiple applications. Think about all the platforms needed to respond to a single incident – access control alarm, video to verify, standard operating procedures (SOPs) stored on a shared drive, radios to get a hold of a guard to dispatch, finding a list of emergency numbers and corresponding it to where the incident is happening, and manually logging the results. Steps into a single platform Not only is there a case for unifying all of these steps into a single platform that pulls in data from various sources, but layering response with AI-enabled technology to achieve the following: Real-time video analysis and threat detection. AI-enabled systems are revolutionising surveillance operations by simultaneously monitoring multiple video feeds, detecting and classifying objects, people, and behaviours in real-time. The technology excels at identifying suspicious activities such as loitering, abandoned objects, or unauthorised access attempts, automatically alerting operators to potential threats – or even identifying false alarms that can take human operators away from the work they’re doing – all while maintaining vigilance across numerous camera feeds. Intelligent alarm management. One of AI's most immediate impacts is in addressing the chronic problem of false alarms. By analysing multiple data points simultaneously, AI technology can intelligently filter and verify alerts, dramatically reducing false positives that traditionally consume valuable operator time. An AI GSOC operator, for example, can assess an incoming alarm and either identify it as a real threat (then escalate to its human supervisors) or use SOPs to determine that the alarm is false, providing feedback and reasoning that’s collected and assessed. This intelligent triage ensures security teams focus on genuine threats rather than chasing false alarms, significantly improving response efficiency. Automated incident response. When security incidents occur, AI systems can instantly gather relevant data from multiple sources – including video feeds, access control logs, and sensor data – to generate preliminary incident reports and initiate appropriate response protocols. This automation ensures consistent application of security procedures while maintaining detailed documentation for compliance and analysis purposes. Predictive analytics and pattern recognition. By analysing historical data, AI systems can identify patterns that might indicate emerging security risks before they materialise. This includes detecting unusual access patterns, anomalies in foot traffic, or behavioural patterns that suggest potential future security threats, enabling proactive rather than reactive security measures. The benefits to the business While AI can be used in so many ways to reduce false alarms, create more efficiencies, and help GSOC operators elevate their roles to be more strategic, there is still a stigma associated with its use. However, a lot of the conversations around this kind of investment can be elevated to reflect positively on the business, which can help achieve more buy-in from leadership. Here are some of the ways: Operational improvements: Dramatic reduction in false alarm rates through intelligent verification systems that analyse multiple data points simultaneously Response times cut significantly through automated triage and threat assessment protocols Standardised and consistent application of security protocols across all shifts and incidents More efficient resource allocation through AI-driven staffing recommendations based on historical patterns Expanded security coverage without proportional staffing increases, enabling monitoring of multiple locations simultaneously Enhanced incident documentation through automated report generation and data collection Improved situational awareness through real-time correlation of multiple data sources Reduced training time for new operators through AI-assisted guidance systems Better compliance management through automated protocol enforcement and documentation Business impact: Significant cost savings through reduced false alarm response and more efficient staffing Decreased liability exposure through comprehensive incident documentation and consistent protocol application Enhanced regulatory compliance through automated record-keeping and standardised procedures Improved risk management through predictive analytics and early warning capabilities Better return on investment for security technology through integrated AI-driven optimization Increased scalability of security operations without proportional cost increases More robust business continuity through improved threat detection and response Enhanced protection of critical assets through constant AI monitoring Personnel impact: Reduced operator burnout through automation of routine and repetitive tasks Enhanced job satisfaction as operators focus on strategic decision-making rather than routine monitoring Improved work-life balance through more efficient resource allocation New career development opportunities in AI-enabled security operations Better retention rates through reduced stress and increased job engagement Enhanced skill development as operators learn to work with advanced technology Improved team collaboration through AI-assisted information sharing More effective decision-making support through AI-driven insights Greater operator confidence through AI-backed verification of security events AI and the road ahead Integration of AI into the GSOC is about more than simply technological advancement While security historically hasn’t changed as quickly as its cyber counterparts, its evolution is imminent. Integration of AI into the GSOC is about more than simply technological advancement; it’s a seismic shift in how organisations approach security operations. The future of this is in the partnership between human expertise and AI capabilities, where technology handles routine monitoring and initial threat assessment, allowing security personnel to focus on complex decision-making and strategic security initiatives. Transformation of security operations For security pioneers looking to implement AI in their GSOCs, success lies in thoughtful integration that considers both technical requirements and human factors. By carefully balancing automation with human oversight, organisations can create more effective, efficient, and responsive security operations that deliver tangible value to the enterprise. The transformation of security operations through AI isn't just about doing more with less – it's about doing better with what we have. As threats become more sophisticated and security demands continue to grow, AI-enabled GSOCs will be better positioned to meet these challenges while delivering enhanced protection for people, assets, and operations.
In today’s world, almost any electronic security system holds the potential to become a gateway for cybercriminals. With physical security and cybersecurity increasingly entwined, security professionals aren’t doing their job unless they take all possible precautions to lock down unauthorised access to camera systems, access control platforms, intercoms, and other network-based security devices and solutions. Let’s explore the many steps companies should take throughout their security technologies’ lifecycle – from choosing a vendor all the way through device decommissioning – to avoid making the common mistakes that leave systems, and the networks they reside on, vulnerable to attack and sabotage. Prepurchase phase: Laying the groundwork for cybersecurity 1. Conduct a Vendor Risk Assessment IT departments often rely on the same Vendor Risk Assessment criteria they use for evaluating IT equipment manufacturers when considering the suitability of physical security vendors. While commonalities exist between how to assess these disparate solutions, there are also differences that require distinct scrutiny. For example, device endpoints within physical security systems run on custom Linux Kernels and therefore do not utilise standard Linux distributions like Red Hat, Ubuntu, or Debian. IT divisions often rely on the same Vendor Risk Assessment criteria they use for evaluating IT kit A comprehensive evaluation should examine how each security solutions manufacturer handles its software development life cycles. Ideally, vendors should adhere to a recognised framework when developing both their platform management and device-specific software. In 2021, Executive Order 14028 made it a bit easier for companies to evaluate vendors by providing guidelines for evaluating software security, the practices of the software developer, and methods to demonstrate conformance with secure practices, specifically referencing the NIST SP 800-218 Secure Software Development Framework. In short, a good vendor should have documentation that explains everything it’s doing to address cybersecurity from development, through releases and ongoing maintenance. 2. Obtain Software Update Schedules The frequency with which manufacturers update their software varies. Each company is different. If you’re their customer, it shouldn't matter whether the vendor schedules updates every six months, three months, or more often than that. What does matter is that you know what to expect and have a plan for how to deal with that reality. For example, if updates only occur every six months, under what conditions are patches released to address vulnerabilities that emerge between updates? Customers must understand how often they'll be updating the software on their devices and ensure they have the resources to make it happen. Make sure stakeholders agree, upfront, who will be performing the software updates. Will it be the integrator who installed the system, the physical security system staff, the IT team, or the end user? Keeping an entire system current is a huge challenge, but a non-negotiable responsibility. Manufacturers who don't issue frequent releases and patches put the onus on customers to handle mitigation efforts on their own. In these instances, IT departments must be prepared to employ network segmentation, firewalls, security whitelists/blacklists, and other methods to protect their systems until a patch is released. If a company's security team has typically updated firmware only when something breaks, these additional responsibilities most likely require greater collaboration with IT departments and a shift in how security systems are managed. 3. Know the Warranty Terms and Duration of Software Support Organisations should understand the warranty policies for the devices they purchase Organisations should understand the warranty policies for the devices they purchase. Even more important is knowing when a device's software support will expire. Software support should extend well beyond hardware coverage. For example, if a camera has a five-year hardware warranty, customers should reasonably expect an additional five years of software support. When that period ends, companies must plan on replacing the device – even if it still works well. Without software updates, the device lacks vulnerability support and becomes too risky to remain on the network. Manufacturers should be transparent about their warranty and software support policies, helping organisations plan for device replacements that align with cybersecurity needs. 4. Request a Software Bill of Materials (SBOM) During the pre-discovery process, customers should request a Software Bill of Materials (SBOM) that provides a detailed inventory of the software running on each device, including open-source components. By revealing what software is "under the hood," the SBOM allows IT departments to be vigilant in protecting the company's systems from exposed vulnerabilities. For example, a customer should understand how Transport Layer Security (TLS) is being handled to secure a security solution's web server if it’s an open-source component like OpenSSL. 5. Assess Vulnerability Disclosure Practices CNA manufacturers represent the gold standard in cybersecurity practices Understanding how a manufacturer handles vulnerabilities is essential. Ideally, they should be a Certified Naming Authority (CAN) and report common vulnerabilities and exposures (CVEs) to national vulnerability databases such as NIST and MITRE. Doing so automatically includes any disclosed vulnerabilities associated with their devices in vulnerability scanners' databases. CNA manufacturers represent the gold standard in cybersecurity practices, but most security manufacturers do not reach this level. At a minimum, the vendors you choose to work with should have an email notification system in place to alert customers to new vulnerabilities. Remember – email notifications are only as reliable as the employees managing them, so investigate whether the manufacturer has a strong track record of keeping up with such communications. Ask to speak with customer references who have been using the solution for an extended period to ensure the vendor is diligent in its communications. Configuration phase: Ensuring a secure setup 1. Use Hardening Guides Once a device is purchased, configuring it securely is the next critical step. Manufacturers should publish hardening guides that detail the security controls available for their products and recommended practices for implementation. Between the features offered by the vendor and your company's own cybersecurity policies, make sure all possible encryption options are activated. Using HTTPS is vital for ensuring secure communication with devices. Many physical security devices default to HTTP to accommodate customer-specific network topologies and certificate management. Failing to implement HTTPS can leave sensitive metadata unencrypted and vulnerable to interception. 2. Consider Advanced Encryption Protocols Protocols are necessary to protect video data in transit from cameras to the VMS Some solutions offer built-in encryption protocols, like MACsec, which makes it impossible for data to be compromised as it is transmitted over the network. HTTPS is still necessary to secure the connection to the devices’ webservice, but while customers set up and configure their devices, MACsec will keep network data safe. Additionally, if you want to encrypt video streams, consider protocols such as Secure Real-Time Transport Protocol (SRTP), which secures the transmission of audio and video data over the Internet, or tunnelling methods like Secure Socket Tunnelling Protocol (SSTP), which encapsulate data packets for safe transmission between two points, even if the network is insecure. Such protocols are necessary to protect video data in transit from cameras to the Video Management System (VMS). Encryption should also extend to the VMS hard drive where video is stored. There are different methodologies to do that, but ultimately the goal is to encrypt data in transit and in storage. 3. Implement Remote Syslog In the case of a breach, each device maintains a set of logs that are useful for forensic investigations. However, if a device gets hacked, its log may not be accessible. Best practices dictate that companies should set up a remote Syslog server that maintains a copy of all device logs within a central repository. In addition to providing redundant data for investigations, a Syslog offers IT systems an efficient way to look for anomalies. Cybersecurity teams will receive immediate notification for events like unsuccessful login attempts so they can quickly figure out what's happening. Who is trying to log in? Why on that particular device? 4. Practice Healthy Password Hygiene Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions One of the most basic and yet overlooked aspects of cybersecurity is the failure to manage user accounts meticulously. Many organisations use the same username and password for all security devices because it's simply too cumbersome to manage a network of devices in which each requires a separate, unique login. It's assumed that the system's primary administrators are the only ones who know the universal password. However, the system becomes vulnerable if anyone within this select group leaves the company and the password isn't changed or deleted right away. Ideally, organisations should move towards using Active Directory or Single Sign-On (SSO) solutions. This approach ensures that employees throughout a company are each assigned a unique login credential that they use for any systems they use throughout the organisation. When they leave, their passwords and access are universally terminated along with their accounts. If SSO is not an option, regular password changes and prompt account deactivation are critical. Decommissioning phase: Securely retiring devices At some point, physical security devices will reach the end of their useful life. When that time comes, companies must take care in how they dispose of their devices. A good vendor will provide guidance on how to clear memory chipsets and restore factory defaults. Improper decommissioning can lead to severe risks. For example, if an improperly decommissioned device is sold on the secondary market or retrieved from a dumpster, an attacker could gain access to sensitive network configurations and use this information for malicious purposes. Conclusion Deploying physical security solutions involves more than just securing buildings and assets; it also requires robust measures to protect against cybersecurity threats. From assessing vendors and understanding update policies to configuring devices securely and managing decommissioning processes, each step presents potential pitfalls that, if overlooked, could expose organisations to significant risks. By incorporating the techniques discussed into their deployment protocols, organisations can ensure their physical security solutions provide comprehensive physical and digital protection.
Security beat
As the pioneering security event in the United States, ISC West is truly the global focal point for bringing together professionals across the physical and cybersecurity landscape. The event seeks to showcase innovation in security technology, nurture professional development, and explore the security implications of today’s connected world. Future of security With the growth of cybersecurity programming and the established Cybersecurity & Connected Internet of Things (IoT) pavilion, ISC West is addressing the future of security head-on. “As the lines between the digital and physical worlds blur, collaboration and shared learning among defenders have never been more critical,” says Mary Beth Shaughnessy, Event Vice President at RX USA, who oversees all aspects of the ISC brand. Shaughnessy previews what’s new at ISC West 2025 and shares other insights in our interview. Q: For long-time attendees at ISC West, what will be the biggest surprise at the 2025 show? Shaughnessy: Long-time attendees know to expect top-tier educational content through the SIA Education@ISC West program (produced by the Security Industry Association (SIA)) in addition to cutting-edge security innovations showcased by 700+ exhibitors. New this year is our focus on technology, training, and education around cyber-physical threats. In today’s connected world, physical and cybersecurity defenders must take a unified, holistic approach to protecting their people, assets, and data. ISC West serves as a bridge between those two worlds, helping organisations tackle the complex security landscape. Q: Presenting a high-profile music concert as part of ISC West is a fun value-add for attendees. Describe how this feature has been embraced by longtime attendees, and the plans for 2025. Shaughnessy: We’re thrilled to announce that the legendary Gin Blossoms will headline the ISC West Concert, sponsored by Wavelynx. This tradition began last year and became a celebrated highlight, offering professionals a chance to unwind and connect with colleagues and peers after a productive day on the show floor. When choosing a performer, we focus on acts that resonate across generations, making the experience both entertaining and memorable for our diverse audience. We are excited to continue this fun and exciting event and networking opportunity. Q: In the past, the education program at ISC West has been seen as secondary to the Expo event. How have you sought to increase the profile of the education program, and what new features will attract more attendees in 2025? Shaughnessy: We’ve expanded the SIA Education@ISC programming from three to four days, now beginning two days before the expo hall opens. These dedicated education days ensure professionals can engage in thoughtful discussions and gain actionable insights without overlapping with the Expo. This year, we’re proud to partner with RSA to introduce a new “IT for Security Professionals” track while also offering our core tracks, including AI & Digital Transformation, Critical Infrastructure & Data Protection, Cybersecurity & IT, InfraGard National Members Alliance @ ISC, and Video Surveillance. We will also be welcoming powerful keynote speakers — Rachel Wilson, Director of Cybersecurity, Morgan Stanley Wealth Management; Will Bernhjelm, Vice President of Security, Mall of America; and Kate Maxwell, Chief Technology Officer, Worldwide Defense & Intelligence, Microsoft. Q: What else is “new” at ISC West in 2025? Shaughnessy: Our educational programming has grown significantly — this year’s SIA Education@ISC program is our most extensive yet, offering more than 115 sessions led by over 200 distinguished experts. With broader and deeper topics, the program emphasises the critical convergence of cyber and physical security, providing unparalleled insights for today’s security professionals. We are also significantly ramping up our cybersecurity offerings and expect to have more than 50 exhibitors in our Cybersecurity & Connected IoT pavilion with names such as Entrust and Ontic. Q: Networking is a critical aspect of ISC West. How are show organisers working to increase networking opportunities? Shaughnessy: Networking remains a top priority at ISC West, with countless opportunities to build valuable connections. Professionals can join peers at popular spots like The Bridge, The Cyber Hub, and the Career Zone (sponsored by: TEECOM). These spaces offer the chance to learn from industry experts, explore the challenges and innovations shaping the security workforce, and engage in dynamic discussions with peers. Also, returning by popular demand, the ISC West Concert, proudly sponsored by Wavelynx, delivers a vibrant evening of music and networking in a relaxed atmosphere. Together, these experiences ensure networking at ISC West is both impactful and memorable. Q: What is the biggest challenge for organisers of ISC West (and related events), and how are the organisers seeking to address the challenges? Shaughnessy: As with most events, there is a lot of pressure on organisers to ensure there’s “something for everyone,” add meaningful value, and introduce fresh, exciting features. At ISC West, we work to raise the bar each year by expanding our content with more thought pioneers, showcasing a broader range of innovative technologies, and fostering additional networking opportunities. Achieving top-quality results is no small task — it demands careful planning, collaboration, and a dedication to continuous improvement. This means actively listening to the needs of our attendees and exhibitors, staying ahead of industry trends, and ensuring we provide an experience that informs, inspires, and connects the security community.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Case studies
Comelit-PAC LOGOS video door entry monitors have been installed at the luxury Mercantile residential development in just two weeks from quotation to project completion, thanks to the enhanced security technology. Situated in Ropewalks, a central hub in Liverpool, the Mercantile is a cosmopolitan living environment situated at the heart of the city. Featuring 32 one- and two-bedroom apartments together with a collection of penthouses, the development is suitable for buy-to-live and buy-to-let clients. Ideal features and benefits of smart LOGOs monitors With premier interior specification, security specialist on site Digital Vision North West was introduced to Comelit-PAC via its gold partner distributor Moreton Alarms, with the smart LOGOs monitors proving ideal features and benefits to seamlessly blend with their surroundings. Says John Morley of Legacie Developments: “Every aspect of the Mercantile has been designed to be world-class and completed to an impeccable standard to maintain our impressive portfolio of luxury living environments in key UK cities. We knew of Comelit-PAC for its own reputation for high specification solutions and were happy to be introduced to the LOGOs monitors. All 32 monitors were installed quickly and offer our residents impressive features and benefits.” Power and use of NFC communications New Comelit-PAC LOGOS monitor series offers installers ease of use and enhanced functionality The new Comelit-PAC LOGOS monitor series offers installers ease of use and enhanced functionality. By harnessing the power of NFC communications and the dedicated MyComelit app, the LOGOS Monitor was selected over other brands for its high-quality video capabilities, user-friendly interface, and competitive pricing. Says Mark Lewis, Director of Digital Vision North West: “The streamlined design and efficient integration of the LOGOs monitors made it the ideal choice for this residential development. Its real benefit is the use of NFC communications, where we could programme each monitor quickly and efficiently, ready for resident use. From quoting to works completion is a top effort to offer such advanced smart door entry technology; we’ll definitely be using them more in the future.” Innovation and security excellence Tom McCabe of Comelit-PAC added: “Whilst Comelit-PAC is known for our focus on style and design, the LOGOs monitor demonstrates our commitment to innovation and security excellence." "We continuously strive to enhance our product portfolio and simplify the setup process, enabling more installers to offer smart door entry technology with ease. It’s fantastic to see LOGOs installed at such a prestigious project in Liverpool and to witness how its advanced functionality enhances both security and convenience for modern city living.”
Founded in 2020 by a team of energy professionals in Milan, Sunprime is a fast-growing independent renewable energy producer that develops sustainable photovoltaic plants across Italy. Their focus is mainly commercial and industrial (C&I) segment, ground-mounted systems on industrial land and industrial electricity storage systems. Challenges With global initiatives toward green sustainability and carbon neutrality, the demand for photovoltaic power generation construction is growing rapidly. Sunprime's project pipeline currently consists of several projects, many of which are located in very remote and often unattended areas (e.g., Maleo, Lodi Province), making it vulnerable to thieves that steal valuable cables and panels. Securing the vast area of photovoltaic plants requires a comprehensive surveillance system that can monitor the site at all times. Solution Dahua and Sunprime enabled the project team to come up with an effective design The technical and commercial partnership between Dahua and Sunprime enabled the project team to come up with an effective design, implement cutting-edge technologies and pay great attention to the positioning of the cameras. In order to safeguard one of the client’s solar power plants covering approximately 70,000 m2, more than 1,500 hybrid cameras (thermal cameras + traditional cameras) equipped with AI algorithms were deployed around the area, actively monitoring for potential intrusion 24/7. Advanced AI algorithms These state-of-the-art Dahua products can stably operate even under harsh weather conditions, making them ideal for outdoor applications. They are equipped with advanced AI algorithms capable of generating accurate alarms while filtering out false positives, which makes monitoring more efficient and more convenient for the client. Dahua AirShield wireless alarm system The signals are managed by row of switches and transmitted to high-resolution recorders In addition, through fibre optics, the video steam from the cameras are sent to the technical rooms in the solar park via Dahua’s industrial switches. The signals are then managed by another row of switches and finally transmitted to high-resolution recorders. The Dahua AirShield wireless alarm system was also installed in each technical room in the park, providing another level of protection for the central equipment. What’s more, all the systems of Sunprime’s solar parks are now centralised through local routers thanks to the Dahua DSS management software installed in the surveillance operations centre. Results Sunprime’s solar power plant has witnessed how Dahua’s thermal perimeter protection solution can be utilised to safeguard its property and assets located in remote and secluded areas. In addition to early business communication, Dahua has assisted Sunprime from pre-sale stage to the implementation of the products, with plans and designs based on the actual needs of the customer. The high-quality service offered by Dahua has gained praised from the client. “The implementation of this type of systems was made possible thanks to the support of the Dahua projects department, which assisted us from the pre-sale stage up to the implementation of the products,” says Mr. Michele Vianello, Asset Manager at Sunprime. “I take this opportunity to once again thank them for their support throughout the entire project,” he added. After the successful completion of this project on the first site, Dahua has secured new projects for another 80 sites with approximately 20 thermal imaging cameras for each site, generating a total supply of 1,600 thermal imaging cameras.
Genetec Inc., the global pioneer in enterprise physical security software, announced The City of Edinburgh Council is using Genetec™ Security Centre as the backbone of its Smart City Strategy. The software is transforming public safety, city services and urban planning by allowing the council to manage all smart city technologies from a single interface. New applications and technologies The council’s Smart City Strategy focuses on introducing innovative technologies to manage aids The council’s Smart City Strategy focuses on introducing innovative technologies to manage resources more efficiently and improve public services. A key barrier to this vision was the city's outdated public space security system, which lacked the ability to integrate new applications and technologies. With funding from the European Regional Development Fund (ERDF) and in partnership with North, Edinburgh has launched a state-of-the-art Smart City Operations Centre built on Genetec Security Centre, a unified platform that combines video surveillance, analytics and IoT sensors, through one platform. Open hybrid-cloud architecture “All truly connected Smart Cities start with unified security as success depends on centralising your operations under one platform. Otherwise, every new IoT device deployed will make you data-rich but information poor,” comments Ben Durrant, Account Executive, Genetec Inc. "Our platform differs from conventional alternatives because of its open hybrid-cloud architecture that offers the flexibility and functionality needed to evolve and keep pace with new requirements.” Capabilities beyond physical security The system not only supports day-to-day functions and the control of large-scale events With a unified platform in place, Edinburgh has been able to expand CCTV coverage in public spaces and enable secure data sharing with partners like Police Scotland, the Fire Service, and Transport for Edinburgh. The system not only supports day-to-day operations and the management of large-scale events such as the Edinburgh Fringe, the Royal Military Tattoo, and the Hogmanay celebrations, but it also extends its capabilities beyond physical security. Security Centre ecosystem Andrew Foster, MD, Public Services at North comments: "The Security Centre ecosystem allows us to gather and visualise useful data sets from advanced analytics IoT sensors on how the city is actually being used by residents and visitors." "This enables the council to make more informed decision making on how Edinburgh can become even safer, greener and better maintained." Improved quality of footage The council credits the software with saving hundreds of man hours that were yet spent manually The council credits the software with saving hundreds of man hours that were previously spent manually trawling through surveillance footage. As well as with helping it to more than double the number of viewing requests from Police Scotland that it can positively respond to. The improved quality of footage submitted as evidence is also expected to increase the number of early guilty pleas, reducing the time police officers must spend attending court to give evidence. Smart City strategy “The benefits for Edinburgh residents are massive. Enhanced public safety, improved services, optimised traffic flow, better infrastructure and city planning,” concludes Gavin Brown, Head of Network Management & Enforcement, Edinburgh City Council. “Genetec and North have proved instrumental in helping deliver our Smart City strategy.”
EQUANS were engaged by Alfred Health to deliver an AV upgrade to their Centre for Health Innovation (CHI), where clinical staff and students can use simulation to develop skills and practice procedures in a safe learning environment, with the aim of capturing clinical and learning events for review, assessment and debrief. In addition, the facility also required the capacity to host workshops and networking events from major clinicians and health professionals. Centre for Health Innovation (CHI) CHI caters to all health specialties and can accommodate training in a variety of simulated environments, such as ICU, emergency, high dependency units, operating theatre and recovery rooms, ward spaces and procedure rooms. The Solution – CAE LearningSpace solution The system allows for up to 12,000 hours of video and audio recording EQUANS deployed the CAE LearningSpace solution. Based on a multi room enterprise grade IP platform, the local recorders in each of the training areas seamlessly upload to a central management and redundant storage server. The system allows for up to 12,000 hours of video and audio recording, live view from any network connected browser enabled workstation, and annotations of points of interest in real time. EQUANS deploys a Crestron touch screen and table kit EQUANS also deployed a Crestron touch screen and table kit for control of the learning space display, in addition to the cloud control via the CAE Learning Space One Hardware. The implementation of a Revolabs discrete microphone system provides users with great audio collaboration. The Benefit Immersive simulation-based education is used to facilitate teamwork and clinical management skills for multidisciplinary teams and individuals. The collaborative space allows clinical and innovation experts to use the latest technology and learning methods to facilitate courses and workshops, plus the recording and evaluation of usability research into new health technologies and processes. Participants are then able to practice procedures and hone clinical skill without patient risk, and have access to ratified technology that ultimately improves patient care. Overview Key facts: Deployed the CAE LearningSpace solution 12,000 hours of video and audio recording, live view and real time interactions
About a year and a half ago, Peter de Jong introduced Dahua to Fred Koks, General Manager of KITT Engineering. Since then, Dahua, KITT Engineering, and Ocean Outdoor have completed five joint projects. Follow-up appointments for the next two projects are already scheduled. Looking back "Let's see what happens" was Fred's reaction when introduced to Dahua. ''We evaluate our portfolio with suppliers every year,'' he explained. "We have to. So much is changing and new technology is developing incredibly fast. You have to keep up." He knows better than anyone how mobile the market is. "Among suppliers of LED screens, there is a constant battle for market position and new technology. We all know the big providers and the market pioneers. But it is not necessarily that they are also at the forefront of technology." Working in collaboration Erwin van Domselaar, Operations & Project Manager at Ocean Outdoor, says his company dares to blindly trust the expertise of Koks and his people when choosing a particular type of LED screen. "KITT Engineering is our technical supplier. They are very good at distinguishing good products from bad ones, and we trust them completely. When they have a product they see a future in, they discuss it with us to see if we can take on a project together with it." Shopping centre - Koperwiek In Dahua's case, that first project is a screen in a shopping centre called Koperwiek – an indoor shopping centre with more than a hundred fashion-related shops – located in Capelle aan den Ijssel. "That was a relatively small project," Erwin recalls. "The screen was not too big. But the initial learnings and experience with the screen were very good before we started. And the installation itself went off without a hitch. Exactly what we expected from this product." Shopping centre - Sterrenburg Soon, a second project was launched. This time in a shopping centre called Sterrenburg in Dordrecht. "Here, not everything went smoothly right away. Not regarding the screen, but its coincidence with the shopping centre's renovation. They had just finished." "All the walls had been neatly plastered and at that moment we asked if a new cable could be drawn. Fortunately, all this was eventually dealt with and solved in a very pleasant cooperation with the project developer, but it took some time." Pure craftsmanship The third and fourth projects are true masterpieces. In Hoofddorp, KITT Engineering installed a corner screen. "A unique screen for us," says Erwin. "It is the first screen that goes around a corner. It is half a meter that goes around the corner, fitting in super nicely with the surroundings." "On paper, a huge screen of forty square meters, but when you stand there, you don't notice it because it blends in so well with the surroundings. We are always looking for something new and surprising. And a screen that turns around the corner offers a lot of new possibilities. For example, in terms of 3D content." The screen turns around the corner Fred adds, "The screen doesn't just go around the corner, it goes around the corner seamlessly. KITT is always trying to bring novelties forward so we've had corner screens before. But that was in art projects and things like that where requirements are a lot lower." "In the process, we were able to try out various techniques and we also found out that the products we had at our disposal at that time were not one hundred percent ready." Cold corner "Then Dahua came up with a prototype, we were very pleased with the 'cold corner' as we call it. It is LED on LED, without a seam." To understand how clever this feat of engineering is, it's worth realising that the margin you have to make the image seamless is the space between two LEDs. Millimeter work, on a length of ten by five meters. Zuidplein shopping centre "The fourth project was placing a screen in the atrium of Zuidplein shopping centre in Rotterdam," Peter says. "The screen was placed against a glass elevator." "When you see that, [it is] not normal the way it came together. You don't see a cable or anything. Fantastic." Westfield Mall The fifth project collaboration between Dahua, KITT Engineering, and Ocean Outdoor is an LED display screen in Westfield Mall in the Netherlands. 24/7 remote system monitoring In addition to the regular LED screen and the driving system, a screen control and monitoring system was also developed to monitor the primary system at every point. “We want to see remotely how our assets in the country are doing," Fred explains. From the video player to dysfunctional LEDs, everything can be monitored remotely. For instance, it prevents the light intensity from being too high. Something that can have major consequences in outdoor advertising.
Matrix client, a pivotal divisional office within the Railways Department, manages railway operations across multiple divisions. Serving as the central administrative hub, the Divisional Railway Manager (DRM) office is dedicated to ensuring safe, efficient, and dependable train services, while addressing operational challenges and enhancing the passenger experience. This case study explores the DRM office’s adoption of innovative communication strategies and processes that optimise management, streamline operations, and elevate service delivery throughout the region. Requirements The DRM office sought a telecom solution to modernise their existing system, to enhance communication efficiency and reliability. The primary challenges they faced included: Outdated Communication Infrastructure: The existing system struggled to keep up with operational demands, causing frequent communication disruptions both within the office and with external entities. Need for Technology Integration: The office required a scalable, modern solution capable of merging traditional telephony with advanced VoIP systems, enabling seamless communication across all departments. Seamless System Compatibility: It was essential for the Matrix VoIP Gateway to integrate smoothly with the current third-party PBX, ensuring uninterrupted communication and compatibility with the existing setup. Improved Call Management: Reliable, real-time communication between the DRM office and other railway divisions was vital for coordinated operations and efficient management. Solution The Matrix solution, featuring the Matrix VoIP gateway, was seamlessly integrated with the existing third-party PBX system, successfully bridging modern communication technologies with legacy infrastructure. Key aspects of the solution include: Connection with Third-party PBX: The Matrix VoIP-PRI gateway (SETU VTEP) seamlessly integrated with the existing third-party PBX system, while the Matrix SIP phone (SPARSH VP510) connected effortlessly via LAN to support cohesive and efficient communication within the same PBX setup. Connection to Railway Network: The VoIP-PRI gateway established a dependable PRI network specifically for the Railways, efficiently managing multiple communication lines and ensuring robust connectivity across the network. Analog Network Integration: The Matrix FXO and FXS gateway (ETERNITY GENX12S) enabled analog connections, linking to the third-party PBX through a network switch to extend connectivity options, while maintaining a unified communication structure. This configuration allowed the DRM office to bridge modern digital and analog communication systems, ensuring reliable and adaptable connectivity across all platforms. Results The implementation of the Matrix VoIP Gateway in the DRM office's communication system brought significant operational improvements, achieving the following outcomes: Improved Reliability: The ETERNITY GENX12SAC ensured continuous connectivity across divisions, enabling a smooth and uninterrupted flow of information. This enhanced reliability improved coordination and accelerated decision-making processes. Effortless Integration: The Matrix VoIP Gateway integrated seamlessly with the existing third-party PBX system, creating a unified and efficient communication ecosystem that streamlined internal and external communications. Future-Ready Solution: Designed with scalable VoIP technology, the Matrix solution was built to support future growth, upgrades, and evolving communication needs. This future-ready approach provides the DRM office with long-term efficiency and adaptability without requiring major infrastructure changes. Matrix VoIP Gateway The Matrix VoIP Gateway delivered a robust, integrated, and future-ready communication system that not only addressed the office's current needs, but also strategically positioned it for future advancements and scalability.


Round table discussion
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
In the United States, they are called licence plate recognition (LPR) systems. In Europe, the more common term is automated licence number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle colour, type, make and model. We asked this week’s Expert Panel Roundtable: What's new with licence plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?
Video storage has come a long way since rooms full of VCRs stored video from an entire system of cameras. Video storage equates to data storage, and there are multiple options ranging from hard disk storage to the cloud to storage on each individual camera using SD cards. Increasingly, cloud-based storage is an attractive option to store video footage conveniently and safely. We asked this week’s Expert Panel Roundtable: How is expansion of video storage capabilities impacting the security industry?
Products


White papers
Connected video technology for safe cities
Download
The borderless control room
Download
Security investments retailers should consider for their 2021 budget
DownloadMaking your surveillance cyber secure
Download
Hikvision DarkFighter Technology for high-quality images at night
Download
Enhanced Ethernet Technology (ePoE)
Download

Videos
Network monitoring: Manufacturers & Suppliers
- exacqVision Network monitoring
- Dahua Technology Network monitoring
- Bosch Network monitoring
- Honeywell Security Network monitoring
- Axis Communications Network monitoring
- Hikvision Network monitoring
- Vicon Network monitoring
- Hanwha Vision Network monitoring
- IDIS Network monitoring
- AMAG Network monitoring
- eneo Network monitoring
- Video Storage Solutions Network monitoring
- LILIN Network monitoring
- Sony Network monitoring
- BCDVideo Network monitoring
- Eagle Eye Networks Network monitoring
- IndigoVision Network monitoring
- March Networks Network monitoring
- Messoa Network monitoring
- Surveon Network monitoring
Aligning physical and cyber defence for total protection
Download
Understanding AI-powered video analytics
Download
Enhancing physical access control using a self-service model
Download
How to implement a physical security strategy with privacy in mind
Download
Security and surveillance technologies for the casino market
Download
