SourceSecurity.com
  • Products
    CCTV
    • CCTV cameras
    • CCTV software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network video recorders (NVRs)
    • IP Dome cameras
    • CCTV camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Audio, video or keypad entry
    • Electronic locking devices
    • Access control cards/ tags/ fobs
    • Access control system accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Suprema BioStation 3 sets global sales record
    • A landmark gathering shaping the future of real estate, investment, sustainability & design
    • IDIS launches new AI PTZ cameras for enhanced security
    • Leuze AI elevates optical sensor precision
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What are emerging applications for physical security in transportation?
    • What is the most overlooked factor when installing security systems?
    • Amid rising certificate demands, stricter compliance and quantum threats, PKIaaS is a necessity
    • How should security adapt to the unique aspects of healthcare?
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Alamo enhances security with Alcatel-Lucent solutions

    Alamo enhances security with Alcatel-Lucent solutions

    The University of Dundee implements HID for modern access control

    The University of Dundee implements HID for modern access control

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    The Camp: Enhance security with ASSA ABLOY Aperio wireless locks

    SBB upgrades surveillance with Hanwha Vision cameras

    SBB upgrades surveillance with Hanwha Vision cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Understanding AI-powered video analytics
    Understanding AI-powered video analytics
    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Technology Summit International 2025

    Technology Summit International 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Hanwha Vision America
    Other Resources
    • eMagazines
    • Videos
    One system, one card

    One system, one card

    Aligning physical and cyber defence for total protection

    Aligning physical and cyber defence for total protection

    Understanding AI-powered video analytics

    Understanding AI-powered video analytics

    Modernizing access control

    Modernizing access control

About us Advertise
  • AI-powered video analytics
  • AI special report
  • Cyber security special report
  • 6
Robotics
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Videos

Check out our special report on Cybersecurity

Read now!

SMP introduces security robots post-COVID-19 for private security

10 Dec 2020

SMP introduces security robots post-COVID-19 for private security
Contact company
Contact SMP Robotics
icon Add as a preferred source Download PDF version

The COVID-19 pandemic has given impetus for the introduction of unmanned technologies in the business of private security and asset protection companies.

The risk of infection of the personnel of security companies has arisen from the first days of the pandemic. At the same time, the spread of infection or even a small number of trained personnel leads to the need to hire new employees or reduce the quality of service and safety. Besides, many countries have reduced the inflow of immigrants to their territories. All of this prompted private security companies to start using security robots.

Security robots exceed the performance

By the time the pandemic began, SMP Robotics security robots had more functionality than any typical patrolling security guard can do. The robots are capable of autonomous patrolling, detecting the presence of people, detecting faces and masks on them, and playing back voice warnings in the event of an intrusion attempt.

Robots are around the clock in a protected area and automatically charge the batteries using a self-charging method

Moreover, it is also important to say that the robots are around the clock in a protected area and automatically charge the batteries using a self-charging method. During operation, only the occasional presence of technical personnel is required to carry out maintenance of the robot’s hardware.

The only thing that required the long-term participation of technicians in the protected area was the installation procedure. The process of implementation of robotic security is a deterrent to the rapid introduction of robotic security. SMP Robotics decided to simplify the implementation process. For this, new software was developed.

Remote installation of robots

The new software for robots allows to remotely plot patrol routes by placing waypoints on a Google map. Previously, the programming of patrol routes for robots was carried out by wiring the robot by an operator with remote control. This allowed choosing the most suitable paths for the movement of the robot.

As robot autopilot functionality has improved, the need for the presence of an operator has disappeared. The autopilot can independently choose the optimal travel route; it is enough for it to indicate the points to visit, and the software will connect them in the route in an optimal way.

Deployment preparations

Work on setting and changing patrol routes, requiring special experience, does not require the presence of personnel

Currently, the deployment preparation of the robot is reduced to the installation of an automatic charger and a base station. These works are quite simple and any technician having experience in installing CCTV cameras can easily cope with them.

At the same time, work on setting and changing patrol routes, requiring special experience, does not require the presence of personnel at the facility. They can be done remotely. The new software version is available free of charge for customers who already operating robots.

Robot for business

As the world emerges from the COVID-19 pandemic, the security and asset protection business will radically change. The patrolling guards will be a thing of the past. Companies that fail to master the use of security robots will be forced out of the market.

They will be replaced by technology companies with a fewer number of highly skilled employees. These companies will serve security robots; the task of security officers will be changed to remote monitoring of the robot and resolving crises.

Robot maintenance

Overall, it is important to realise that the provision of technical services to support the operation of robots is local, tied to the location of the company. Maintenance work on the robot by technical personnel is more cost-effective if it is performed locally.

Therefore, it is obvious that one technical team will maintain a limited area with many objects guarded by robots. This factor will avoid price dumping between private security companies who use security robots.

Understand how converged physical and cybersecurity systems can scale protection.

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Remote surveillance
  • Remote video surveillance
  • Physical security
  • Industrial security
  • Remote security
  • Commercial security
  • Private sector security
  • Public sector security
  • Security management
  • Security installation
  • Security tagging
  • Covert cameras
  • Security monitoring system
  • Network monitoring
  • Remote video monitoring
  • Security guards
  • Identity management
  • Building security
  • Public security
  • Industrial security systems
  • Network cameras
  • Security software
  • Security service
  • Covert Surveillance
  • Integration software
  • Corporate Security
  • Central Monitoring
  • IR cameras
  • Network Video Recorders
  • Incident Management
  • Robotics
  • COVID-19
  • Related categories
  • CCTV cameras
  • CCTV software
  • Network video recorders (NVRs)
Related articles
Aetina CoreEdge MXM: AI edge revolution with NVIDIA

Aetina CoreEdge MXM: AI edge revolution with NVIDIA

AI security solutions boost orders for AITX & RAD

AI security solutions boost orders for AITX & RAD

SARA: Transforming security with AI at ISC East 2025

SARA: Transforming security with AI at ISC East 2025

Follow us

Sections Products CCTV Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cyber security special report RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Counter terror Cyber security Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy
  1. Home
  2. Topics
  3. Robotics
  4. News
  5. Product news
See this on SecurityInformed.com

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SourceSecurity.com - Making the world a safer place
Copyright © Notting Hill Media Limited 2000 - 2025, all rights reserved

Our other sites:
SecurityInformed.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Understanding AI-powered video analytics
Understanding AI-powered video analytics
Security and surveillance technologies for the casino market
Security and surveillance technologies for the casino market
Modernizing access control
Modernizing access control
Addressing Cybersecurity Vulnerabilities in the Physical World
Addressing Cybersecurity Vulnerabilities in the Physical World
SourceSecurity.com
SecurityInformed.com

Browsing from the Americas? Looking for our US Edition?

View this content on SecurityInformed.com, our dedicated portal for our Americas audience.

US Edition International Edition
Sign up now for full access to SourceSecurity.com content
Download Datasheet
Download PDF Version
Download SourceSecurity.com product tech spec