Security camera systems
Artificial intelligence (AI) creates efficiencies throughout various industries, from managing teams to operating businesses. Key outcomes include faster investigations, fewer false alerts, automated operational checks, and quicker support experiences. These advancements free up valuable time for users, allowing them to focus on high-impact priorities that drive greater ROI. When it comes to surveillance, AI is most visibly powering a new generation of vision language-powered video analytics,...
Artificial Intelligence Technology Solutions, Inc, along with its residential security subsidiary, Robotic Assistance Devices Residential, Inc. (RAD-R), announced a major upgrade to RADCam, the Company’s agentic AI-powered interactive security camera, that brings Alexa voice interaction to the device. Uniquely, Users can now ask Alexa what RADCam sees, or has seen, and receive clear spoken descriptions of activity in the camera’s field of view, extending RADCam’s positio...
barox Kommunikation AG is delighted to announce the launch of their new technology partnership with Network Optix, the latest addition to their extensive integration portfolio with market pioneering VMS and PSIM providers. This new integration is designed to transform the management and support of Network Optix Nx Witness video networks. Utilising the new barox Network Optix plug-in, Nx Witness users will be able to capitalise on a greater depth of integration capabilities. Key features i...
Ambient.ai, the pioneer in Agentic Physical Security, announced the general availability of Ambient Pulsar, its most advanced AI engine yet. Built on Ambient's edge-optimized reasoning Vision-Language Model (VLM) architecture, Pulsar represents a quantum leap forward that transforms physical security from reactive response to proactive incident prevention. Physical security use cases Pulsar is engineered to reason like a human security operator, only at accelerated machine speed and scale. Tr...
Tuskegee University, one of the nation's most respected Historically Black Colleges and Universities (HBCUs), announced a multi-year, strategic project to implement a fully integrated security system across its campus using Honeywell’s AI-enabled smart access technology. The upgrades will aim to further strengthen Tuskegee University’s commitment to the safety of its students, faculty, staff and visitors. Tuskegee University will utilise Honeywell’s s...
Installing physical security systems requires integrating diverse technologies (e.g., cameras, access control, alarms) that often use different protocols and must be adapted to a building's unique physical layout and legacy infrastructure. Specialised technical expertise is required for seamless networking and proper configuration. Hopefully, no important factors are overlooked in the installation process. We asked our Expert Panel Roundtable: What is the most overlooked factor when inst...
News
With its new Architects & Engineers (A&E) Partner Program, Dallmeier offers architects, consultants, and engineers comprehensive support for the design and implementation of state-of-the-art video security systems – through in-depth expertise, specialised tools, and exclusive digital resources. Support across all project phases With the A&E Partner Program, planners and engineers gain direct access to field-proven tools, resources, and expert know-how to design resilient and future-ready video security solutions – backed by decades of experience. The program is designed to deliver maximum efficiency, transparency, and planning reliability throughout the specification, design, and implementation stages of security projects. Core components of the Dallmeier A&E Partner Program include the professional 3D planning software PlanD, the mobile media platform PresentD, and CalcD for instant project cost visualisation. PlanD-3D design software The PlanD software combines intuitive usability with professional features for precise 3D camera planning and realistic visualisations – enabling efficient system design and well-informed decisions. PlanD is tailored specifically to meet the needs of planners and installers. Precise 3D camera planning Realistic visualisation Secure & certified – Made in Germany PresentD-mobile media platform With the PresentD web app, partners enjoy on-the-go access to exclusive content – from whitepapers, battlecards, and presentations to project-specific installation cards. Mobile web app – available anytime, anywhere Technical documents and interactive 3D presentations Tailored project documents CalcD-instant TCO visualisation CalcD is Dallmeier’s exclusive tool for fast and professional project cost projection. Total Cost of Ownership (TCO) can be compared and visualised in seconds – ideal for early project phases or technology comparisons. Project cost projection in seconds Includes hardware, infrastructure, maintenance, and more Professional visualisation More services for A&E partners In addition to its core tools, the Dallmeier A&E Partner Program offers a wide range of value-added services. These include comprehensive BIM models for all Dallmeier cameras and recorders to ensure seamless integration into existing building infrastructures. To help partners fully leverage the potential of Dallmeier solutions, the company offers a wide range of training programs – from fast onboarding to in-depth expert courses. Flexible training levels provide the knowledge required for accurate planning, installation, and operation – online or in person. For particularly demanding projects, Dallmeier also offers its premium 3D planning service. This expert service delivers maximum detail and realism in video system planning. Join now–free registration The Architects & Engineers Partner Program is open to all consultants, architects, and engineers looking to implement professional security solutions with Dallmeier products. Registration is free and provides full access to all program content. “With the A&E Partner Program, we’re equipping consultants and engineers with a comprehensive toolkit for planning and realising modern security systems – with maximum reliability and planning confidence,” says Christian Linthaler, Chief Sales Officer at Dallmeier. “Whether you’re specifying cutting-edge camera systems, visualising your plans, calculating TCO, or presenting your solutions – our A&E resources are designed to make your job easier.”
i-PRO Co., Ltd. (formerly Panasonic Security), a global pioneer in professional security, public safety and medical applications, announced that it has signed an agreement with Panasonic Connect Co., Ltd. to take over the wholesale and marketing functions for i-PRO products in the Japanese market, which are currently managed by Panasonic Connect. The transition is scheduled to be completed on March 31, 2026, following the necessary regulatory approvals. Advanced security products Since becoming independent from Panasonic in 2019 through a capital partnership with Polaris Capital Group Co., Ltd., i-PRO has focused on developing and manufacturing advanced security products, while sales in the Japanese market have been conducted through Panasonic Connect. At the same time, they have also made efforts to develop the own sales channels. By taking over the wholesale and marketing functions for the products from Panasonic Connect, i-PRO will strengthen its sales structure in the Japanese market and integrate development, manufacturing, and sales into a unified organisation. This integration will enhance responsiveness to market needs, improve operational efficiency, and reinforce competitiveness in the Japanese market. This approach aligns with the regionally integrated management model that i-PRO has been implementing globally since 2019. Expected synergies Expected synergies include the following: Promote collaboration among manufacturing, product development, and sales to swiftly reflect market needs in products. Accelerate the deployment of global solutions in the Japanese market by promoting personnel exchanges with overseas offices. Enhance customer value and strengthen competitiveness through a more efficient and integrated value chain. Improve the quality of sales, proposals, and after-sales service. Increase operational speed by simplifying business processes. i-PRO products via Panasonic Connect As of April 1, 2026, approximately 500 dealers who currently procure i-PRO products via Panasonic Connect will begin conducting business directly with i-PRO. Contracts with end-users purchasing through Panasonic Connect or Electric Works Company (Panasonic Corporation) will remain unchanged. i-PRO will continue to build long-term relationships with customers and deliver reliable, high-quality products and solutions that contribute to a safer and more secure society.
Wavestore, a global provider of video management systems (VMS), announced the release of WaveView v6.44, the latest version of its platform designed to cut incident response times and streamline daily security operations. The update introduces core enhancements, including Interactive Maps, a redesigned device navigation system, and improved search and review workflows, aimed at helping operators, integrators, and end-users work faster and more effectively. Importance of time “Security teams tell us that minutes lost during an incident can make the difference between containment and escalation,” said Sam Shalaby, CEO of Wavestore. “With v6.44, we’ve focused on the fundamentals - ensuring operators can locate cameras in seconds, investigators can review video without impacting live operations, and integrators can deploy systems more efficiently.” Refined platform “These improvements address the real-world pressures faced by operators and integrators every day,” added Mark Claxton, Managing Director of Wavestore. “We’ve deliberately refined the platform so that anyone using it - from control room staff to forensic analysts - can do their jobs more effectively, with less training and fewer distractions.” Interactive Maps: Place and control cameras directly on floor plans, improving situational awareness. Expand All Navigation: One-click expansion of full device trees for faster access in large deployments. Offline Review-Station Support: Review exported video drives without affecting live monitoring. Bulk List Management: Upload licence plates, object IDs, and identifiers via CSV for quicker setup. Enhanced Filtering and Search: Smarter navigation through complex system hierarchies. The company said the release reflects a “foundation-first” approach, strengthening the underlying interface and workflow tools on which advanced analytics, integrations and automation features can be built. The v6.44 update is available immediately.
Hikvision has successfully achieved certification under the NIST Cybersecurity Framework (CSF) 2.0, following a rigorous independent audit conducted by the British Standards Institution (BSI). With this milestone, Hikvision becomes one of the first companies worldwide to achieve this certification, demonstrating its commitment to aligning its cyber security governance, risk management, and compliance practices with internationally recognised standards. What is NIST CSF 2.0? The NIST Cybersecurity Framework (CSF) is a set of voluntary guidelines developed by the National Institute of Standards and Technology (NIST) to help organisations of all sizes manage and reduce cyber security risks. The framework consists of three main components — the Core, Organisational Profiles, and Tiers. The CSF Core defines six key functions — Govern (GV), Identify (ID), Protect (PR), Detect (DE), Respond (RS), and Recover (RC) — providing organisations with a strategic lifecycle for managing cyber security risks. Compared with version 1.1, which laid the foundation for lifecycle-based risk management, NIST CSF 2.0 introduces important enhancements, including: Elevating “Govern” as a core function, emphasizing the strategic role of cyber security governance within organisational development. Integrating supply chain and third-party cyber security risk management into the “Govern” function, emphasizing the importance of end-to-end supply chain security. Expanding applicability and alignment with other NIST resources, enabling organisations worldwide to manage cybersecurity risks more effectively. Building a robust cybersecurity and governance System Hikvision has established a robust, end-to-end cybersecurity system aligned with all six core functions. The company embeds security into its corporate strategy, risk management, compliance programs, and supply chain operations, ensuring that security practices are integrated across all business processes. Achieving NIST CSF 2.0 certification confirms that Hikvision’s cybersecurity governance aligns with international best practices. With comprehensive, layered security capabilities, Hikvision supports partners and clients worldwide in achieving safe, compliant, and reliable operations — reinforcing its commitment as a trusted global technology partner. Hikvision’s ongoing commitment to cybersecurity Hikvision is committed to advancing cybersecurity and privacy protection across all aspects of its operations. The company adheres strictly to internationally recognised standards and regulatory requirements, conducting regular capability assessments and continuous improvement programs to enhance its security posture. Over the years, the company has achieved a broad portfolio of globally recognised certifications, including ISO/IEC 27001:2022, ISO/IEC 27701:2019, ISO/IEC 27017, ISO/IEC 29151, and ISO 38505-1:2017, in addition to the newly awarded NIST CSF 2.0 certification. Cybersecurity Cybersecurity is at the core of trust. To date, Hikvision has earned more than 25 authoritative security and compliance certifications worldwide, reflecting its ongoing commitment to safeguarding data and building digital trust. Looking ahead, the company will continue to advance its cybersecurity programs and share best practices across the industry.
A well-designed commercial security system doesn’t just deter crime—it also improves operational awareness, safeguards staff, and protects business continuity. At Amax, they begin every project with a detailed consultation to assess vulnerabilities, understand the site layout, and identify the ideal combination of security solutions. Their commercial security system design services include: High-definition commercial security cameras with live and recorded footage Access control and commercial door entry systems with staff and visitor management Intruder alarms with 24/7 monitoring and police response options Fire alarm systems with smoke, heat, and gas detection Integration with existing building management and IT systems From concept to installation, Amax’s engineers ensure every component is expertly fitted, fully tested, and easy to operate. Commercial security cameras Visual surveillance remains a cornerstone of effective commercial security. Amax’s HD and IP-based commercial security cameras provide crystal-clear images, remote access, and intelligent video analytics to help users monitor and manage the premises in real time. Whether users need coverage for entrances, stock areas, perimeters, or communal spaces, their camera systems can be configured for: Motion detection and event-triggered recording Remote viewing on desktops and mobile devices Integration with access control and alarm systems Video analytics for object tracking, facial recognition, and line-crossing detection All footage is stored securely and can be accessed on demand—ideal for resolving disputes, reviewing incidents, or providing evidence if needed. Expert commercial security services & support Amax goes beyond installation—Amax provide end-to-end commercial security services to keep the system performing at its best. Their dedicated team is available for ongoing maintenance, system upgrades, troubleshooting, and rapid-response support when users need it most. Amax also offers: Regular health checks and system audits Remote monitoring through Amax’s 24/7 UK-based centre Software updates and firmware management Technical support and engineer call-outs Whether users are expanding to new premises or upgrading ageing systems, Amax is their trusted partner for reliable, professional commercial security.
One of the primary advantages of commercial CCTV systems is their deterrent effect on criminal activity. The presence of visible cameras acts as a powerful deterrent, dissuading potential thieves, vandals, or trespassers from targeting the business premises. Knowing that their actions are being recorded significantly reduces the likelihood of criminal incidents. By strategically placing CCTV cameras in high-risk areas such as entry points, parking lots, or storage areas, they create a perception of constant surveillance. This proactive approach can help safeguard the business from external threats and minimise the risk of theft, vandalism, or unauthorised access. Enhanced safety and security Commercial CCTV systems provide a heightened level of safety and security for employees and customers Commercial CCTV systems provide a heightened level of safety and security for employees, customers, and visitors. By monitoring the premises in real-time, they can promptly identify and respond to any potential security breaches or emergency situations. In the event of an incident, CCTV footage serves as valuable evidence for investigations and can aid in identifying perpetrators or resolving disputes. Additionally, live monitoring of CCTV feeds allows them to proactively address safety concerns, ensuring a safe and secure environment for everyone on their premises. Employee productivity and accountability CCTV systems not only protect the business from external threats but also foster a culture of accountability and productivity among the employees. Knowing that their actions are being recorded encourages employees to adhere to company policies and maintain professional behaviour. Commercial CCTV systems can help monitor employee productivity, identify areas for improvement, and discourage activities that may hinder overall performance. By promoting a transparent and monitored work environment, they can create a culture of trust and professionalism. Remote monitoring and access control Modern commercial CCTV systems offer the advantage of remote monitoring and access control Modern commercial CCTV systems offer the advantage of remote monitoring and access control. With the help of internet connectivity and mobile applications, they can access their CCTV feeds from anywhere, at any time. This flexibility allows them to keep a watchful eye on their business even when they’re away, ensuring peace of mind and a quick response to any potential security incidents. In addition, certain CCTV systems enable remote access control, allowing them to grant or restrict access to specific areas of their premises. This feature is particularly beneficial for businesses with multiple locations or those that require restricted access to sensitive areas. The importance of commercial CCTV maintenance While commercial CCTV systems provide numerous benefits, regular maintenance is essential to ensure their optimal performance and longevity. Commercial CCTV maintenance involves routine inspections, cleaning, software updates, and repairs if necessary. Neglecting maintenance can lead to equipment malfunction, degraded video quality, or gaps in surveillance coverage. Commercial CCTV care involves routine inspections, cleaning, software updates, and repairs if necessary To ensure the reliability and effectiveness of the commercial CCTV system, it is advisable to partner with a professional security provider that specialises in commercial CCTV maintenance. They can perform regular checks, address any issues promptly, and provide necessary upgrades or replacements to keep the system running smoothly. For comprehensive commercial CCTV maintenance services, visit commercial CCTV maintenance. The team of experts is well-equipped to handle all aspects of maintenance, ensuring the longevity and optimal performance of the commercial CCTV system. Conclusion In conclusion, commercial CCTV systems offer a range of advantages, including deterring criminal activity, enhancing safety and security, promoting employee productivity, and enabling remote monitoring and access control. However, it’s crucial to prioritise regular commercial CCTV maintenance to ensure the continued functionality and effectiveness of the system. By partnering with a professional security provider, they can rely on their expertise to handle maintenance tasks and address any issues promptly. Remember, investing in a commercial CCTV system is not a one-time effort. Regular maintenance is essential to keep the system in optimal condition, providing them with reliable surveillance and peace of mind. To harness the power of commercial CCTV systems and ensure their longevity, consider the advantages of regular commercial CCTV maintenance. It’s an investment that pays off in terms of security, safety, and the overall success of the business.


Expert commentary
Artificial Intelligence isn’t just a buzzword anymore. It has become part of our lives, and its uses and applications are growing every other day. Even the public sector, which usually is a late adopter of new technologies, has come onboard this new train. Law enforcement, in particular, has seen the advantages different AI technologies can offer to their work and has started to integrate them into their workflow and daily routines. But there is much more to come. Task automation: AI as a workhorse Due to the increasing importance of media files in police investigations, current police cases have an increasing amount of digital files to be analysed. Videos from mobile phones, computer files, sound recordings, voice messages from chat applications…the list is almost endless. But, in contrast to other types of digital files, like documents or PDFs, it is not possible to search directly a certain information in a video. It has to be watched by someone. And that takes an inordinate amount of time for a human being, as there can be hundreds of videos in a case. This is one of the areas where artificial intelligence shines. Modern analytics systems are able to find almost any kind of information in media files due to the improvement of artificial vision, object recognition and face biometrics. It is simply a matter of feeding the hundreds or thousands of media files to a AI analyser, which will work through them and find specific sounds, words, faces, cars, etc. Case of law enforcement On top of that, an analyser does not tire after long work hours and does not make errors What is more, unlike human officers, these systems can work 24/7 which speeds up investigations considerably, as more evidence is found in less time. On top of that, an analyser does not tire after long work hours and does not make errors. This is why police work can be helped greatly by AI Analytics, as it frees police officers to do high value work, instead of endlessly watching videos on a computer of listening to audio recordings, in search of evidence. As soon as the system finds what the officer has specified (a face, name, number plate, object, etc.) it sends an alarm to the officers’ phone, so he or she can take a look and decide what to do with that information. Despite AI being touted as a danger to many workplaces, in the case of law enforcement, it is a valuable tool to help police do more, with more accuracy, and in less time, freeing officers from the repetitive and boring work of checking mountains of evidence in search of clues. The AI Analyser landscape The field of AI analytics is expanding constantly and new types of analysis are being discovered that may be helpful to police or intelligence. The most used analysers today are probably Automatic Licence Plate Recognition (ALPR), object and face recognition. But OCR is equally useful not just for reading documents, but also signs and logos that may appear in pictures or videos, to help identify a location. And for audio (as in interception or surveillance recordings) there is speech-to-text (S2T), translation, Speaker ID, audio fingerprinting (AFP) and natural language processing (NLP) which is able to extract sentiment from what is said. All of these have their application in daily police work and can save time in investigations or make them possible in the first place. But looming on the horizon are new possibilities, which we will discuss later and that are even more powerful. So the field of AI Analytics is, by no means, a closed one. Generative AI in law enforcement LLMs will be an important part in all those tasks related to investigate large sets of documents For the past year, the term “Generative AI” has become part of our general vocabulary, although most of the time we just say ChatGTP, Copilot o similar. The large language models (LLM) use Deep Learning and different AI strategies to, amongst other things, analyse and summarise vast amounts of information, in order to generate a short report with the highlights. This can be of use for Law Enforcement in all those cases that have great amounts of documents that may contain evidence. Again, this is a case like the above, where AI helps speed up operations by doing the grunt work much quicker than any person could. The difference is in the Deep Learning part. The model can be tuned to specific needs (like financial crimes, for example) and will get better over time when dealing with specific sets of documents. Thus, LLMs will be an important part in all those tasks related to investigate large sets of documents during a case. What the future holds As with all technology, it is virtually impossible to predict what the future will hold. Because any breakthrough can upend complete sectors, as demonstrated by ChatGPT not that long ago. However, there are several promising AI technologies in the pipeline, some of which are already being tested and perfect around the world: Behaviour analysis: as facial recognition systems get better and better, they are not only able to recognise faces, but also facial expressions. This means that AI systems could be assisting during interrogations, to evaluate the truthfulness of what is being said. Combined with the analysis of small voice inflections, they can be a non-invasive “lie detector”. Robotics: already in use by many police forces around the world, robots are going to be ever so important. Particularly the autonomous kind, which is able to do missions on its own, without a human behind the controls. This, combined with swarm technology, could be an incredible help in disaster areas, where time is of the essence in locating victims. Predictive policing: thanks to pattern analysis, predictive policing, which has been to the test several times already, will be an important part of police work, to figure out where to send units or concentrate surveillance efforts. In short, AI has much more to offer, and we are going to see and incredible evolution of this technology applied to law enforcement, over the next years.
In today's rapidly evolving security landscape, facial recognition has become a buzzword that often triggers privacy and data protection concerns. However, many security professionals may not realise that "facial recognition" is an umbrella term encompassing various technologies, each with distinct applications and privacy implications. Let's dive into what these technologies really mean for security system resellers, integrators, and end-users. Facial recognition tech At its core, facial recognition technology re-identifies or verifies individuals based on their facial features, which are used as biometrics. However, not all biometric systems are based on unique identifying features. Some analyse general characteristics like facial hair style or other distinctive marks. Such traits, known as soft biometrics, can aid in identification but aren't unique enough to verify someone's identity uniquely. Personally identifiable information Modern systems incorporate robust safeguards, including data encryption and strict retention policies While facial recognition technology has applications ranging from access control to crime prevention to investigation, its implementation varies widely depending on specific needs. Modern systems incorporate robust safeguards, including data encryption and strict retention policies, to ensure the responsible handling of any personally identifiable information (PII). Understanding key technologies and applications Facial recognition encompasses several distinct technologies, each serving specific purposes. Here's a comprehensive breakdown of these technologies and their real-world applications. Key technologies: Face Verification (1:1): A one-to-one comparison where a person claims an identity (e.g., by showing an ID card), and the system verifies whether the face matches the provided identity. Example: In airports, face verification is used for automated passport control. When a traveler approaches a gate, their face is scanned and compared to the photo stored in the government database. If the face matches, the traveler is allowed through the gate without manual checks. Face Identification (1 to many): A one-to-many comparison, where a face captured by a system is compared to a database of multiple faces and facial features to identify the person. This process is often used in security or surveillance contexts. Example: In the case of a missing child at an airport, a system could scan the faces of all passengers passing through checkpoints and compare them to a photo of the child in a database. If a match is found, it triggers an alert. Face Re-identification (Many to Many): Many-to-many comparisons where multiple faces are compared to multiple other faces. This is typically used to track a person’s movement anonymously across different areas by matching their facial images at different checkpoints, without knowing their identity. Example: In a retail environment, facial re-identification might be used to track how long an anonymous person spends moving from one section of a store to another by re-identifying their face as they enter and leave different camera views. Facial recognition can be used both for real-time and offline applications. Real-Time Facial Recognition: Real-time facial recognition refers to the immediate processing of a live video feed, comparing faces to a database to generate instant alerts when a match is found. Example: At large public events like sports stadiums, real-time facial recognition might be used to detect banned individuals (e.g., known hooligans) as they attempt to enter. Post-Event (Recorded) Facial Recognition: This refers to analysing video recordings after the event has occurred, rather than in real-time. Facial recognition is applied to recorded data to identify or track individuals. Example: After a crime, investigators could use facial recognition software on recorded video from security cameras to identify suspects by matching their faces to known databases. These definitions cover various aspects of facial recognition technology, its different applications, and how biometrics are used for identification and tracking purposes. Biometrics: Biometric technologies use a person’s distinguishing physical characteristics, such as their face, fingerprint, or iris, to identify them. Example: Fingerprint or face scanning for unlocking a phone or using iris recognition for secure entry at high-security buildings like data centers. Hard Biometrics: Hard biometrics refer to physical characteristics that are sufficiently unique enough to be used for identifying a specific individual, such as a face, fingerprint, or iris. Example: Using iris recognition at airport security checkpoints to confirm the identity of a traveler. Soft Biometrics: Soft biometrics (personal features) include general attributes like height or body shape, which are not unique enough to identify a person on their own but can help narrow down re-identification when combined with other information. Example: Using height and body shape to help identify a suspect in a camera scene when facial features alone are unreliable. Appearance Similarity: This refers to distinguishing between people based on their appearance (e.g., clothing, accessories) rather than biometric features. It’s often used for accelerated investigation and statistical analysis rather than identification. Example: A retail store may track customers based on the clothes they are wearing to monitor how long they stay in the store, without tracking their faces or personal details. Liveness Detection: A method used to determine whether the subject in front of a facial recognition system is a live human being and not a photo or a video recording. Example: In some mobile payment systems, facial recognition requires users to blink or move their head slightly to ensure they are a live person and not someone trying to use a photo for authentication. Mathematical Representation: Non-reversible mathematical representations are lists of numbers based on a person's facial image or appearance based on clothing. These numbers represent characteristics but cannot be easily used to recreate the face. Example: When an organisation stores only the mathematical representations from a face rather than an actual image, even if the data is stolen, it is nearly impossible to recreate the person’s face or use the data with another system. Privacy and security considerations Modern facial recognition systems prioritise privacy through various protective measures, moving far beyond the basic security protocols of the past. Solutions integrate multiple layers of protection designed to safeguard personal data while maintaining system effectiveness. These sophisticated privacy controls work in concert to ensure responsible data handling and comply with evolving security standards. Key protective measures include: Biometric template isolation that keeps facial recognition templates separate from other personal data, with dedicated secure storage environments. Template encryption frameworks specifically designed for biometric data, using industry-standard protocols that protect facial features during both processing and storage. Biometric data anonymisation that converts facial features into non-reversible mathematical representations – into numbers - prevents the reconstruction of original face images. Cascading deletion protocols automatically remove both raw facial data and derived biometric templates after their authorised use period. Segmented access controls that separate facial recognition administrative functions (like enrollment and template management) from regular system operation. Privacy standards The key is selecting the right tool for each application and ensuring that personal data is collected The security industry continues to evolve, finding innovative ways to balance effective surveillance with privacy protection. By understanding this comprehensive range of technologies, security professionals can better serve their clients with solutions that address specific needs while maintaining appropriate privacy standards. The key is selecting the right tool for each application and ensuring that personal data is collected only when necessary and protected when it is not. Statistical analysis and pattern recognition The variety of facial recognition applications demonstrates that not all systems require storing personal information. Many modern solutions focus on statistical analysis and pattern recognition rather than individual identification, offering powerful security benefits while respecting privacy concerns. This balance of capability and responsibility represents the future of video security technology.
A survey conducted by Blackhawk Network finds the average shopper plans to spend almost half of their holiday budget to buy gift cards this year versus only 39% in 2023. The global gift card market was valued at $1.3 billion USD in 2023, and it is projected to reach more than $5.2 billion USD by 2032. Fraud - a growing concern While gift cards continue to be top of mind for consumers for streamlined gifting, gift card fraud is a growing concern for consumers and businesses alike. According to the U.S. Department of Homeland Security’s Homeland Security Investigations (HSI) unit, gift card fraud, perpetrated by Chinese and other organised retail theft (ORT) rings, can be attributed to losses in the hundreds of millions of dollars globally, and is being used to fund other illicit crimes such as drug and human trafficking. The retailers implement procedures to mitigate attacks. Using data insights to detect emerging threats and identify hidden connections is among the ways retailers can protect the integrity of their gift card programs. How gift card fraud is manifested Typical physical gift card scheme involves purchasing items using stolen credit cards Gift card fraud occurs both at physical locations and online. A typical physical gift card scheme involves purchasing items using stolen credit cards and then returning the items for store credit or gift cards. While some stores have strict and well-enforced return policies to ensure that only customers entitled to refunds receive them, fraudsters employ fake tracking ID (FTID) tactics that focus on bypassing identification checks during returns, enabling them to return stolen merchandise or exploit refund policies. They use a combination of fake IDs and altered receipts or rely on lax return processes to achieve their goals. Once gift cards are obtained, criminals can sell them at a discount or use them for personal purchases, effectively converting stolen goods or false claims into untraceable funds. Tactics to convince consumers One tactic involves draining a gift card by obtaining the barcode, Card Verification Value (CVV) number, personal identification number (PIN), or activation code from beneath the slim cardboard packaging. Once they obtain the code(s) from physical cards, they reseal them, monitor online for consumers to buy and load the cards, then spend the balances before the consumers can. Some merchants have sought to combat this by keeping store-branded gift cards behind the checkout counter, handing them out after purchase. However, this approach can be costly and inconvenient for both retailers and customers, as it requires additional resources for in-store management and potentially slows the purchasing process. Other online tactics involve people who misrepresent themselves in a variety of phishing scams to convince consumers to purchase gift cards, then provide the card details to others who then drain the cards. Scammers tell the victim which gift card to buy (and where). They might say to put money on a card for an online store, a streaming service, or a specific retail store. These scammers often work as part of an organised crime network. Retailers leveraging open info, AI, to combat gift card fraud Retailers are empowered to improve the monitoring and analysis of gift card transaction patterns A growing number of retailers are leveraging publicly available (PAI) and hard-to-reach data and analytics to extract key insights that help fight various forms of gift card fraud and stay ahead of evolving fraud tactics. With such tools, retailers are empowered to improve the monitoring and analysis of gift card transaction patterns, identify anomalies, and implement proactive measures to prevent fraudulent activities before they can impact consumers and sales revenues. Retailers need this type of approach in their efforts to battle scammers, who continue to refine tactics for draining gift cards and committing other types of retail fraud. Beyond simply refining their techniques, fraudsters continue to advance their use of technology to commit their crimes. For example, cybercriminals also use bots to perform brute-force attacks on gift card websites. They are increasingly using AI to perpetrate gift card fraud. Leveraging Latest AI And LLMs Retailers need to continually upgrade their fraud-fighting strategies and technologies as well. They can lean into PAI and analytics, in conjunction with existing security operations and investigations, to safeguard the integrity of their gift card programs and demonstrate their commitment to customers, reinforcing brand trust. In addition to leveraging the latest versions of AI and large language models (LLMs), retailers can take advantage of open-source intelligence (OSINT). By leveraging PAI and difficult-to-obtain data with analytics, brands are using OSINT to more quickly seize on evolving threat patterns to recognise current and shifting fraud schemes and stay ahead of evolving fraud tactics. In this way, the AI operates as a resource multiplier, compiling and processing data at faster-than-human speeds, while enabling the ability to extract actionable insights at scale. Users can make more accurate and timely decisions. Retailers need to upgrade their fraud-fighting strategies and technologies. Safeguarding gift cards, customer trust, and brand integrity OSINT can inform retail security managers, loss prevention directors, fraud investigators, and others to help spot and deter gift card fraud. By using AI to detect patterns and anomalies, OSINT solutions can help fraud specialists spot patterns of suspicious activity that may indicate distinct instances of fraud. AI further helps fraud specialists identify members of ORT rings by uncovering hidden connections among seemingly unrelated individuals and transactions. The market for retail gift cards is large and continues to grow, and so too, is the gift card fraud threat. By adopting OSINT for fraud prevention, retailers can stay ahead of tech-savvy criminals, safeguarding gift card revenue streams, as well as customer trust and brand integrity.
Security beat
There was high-level energy at GSX 2025, befitting an industry undergoing massive change. Artificial intelligence (AI) was everywhere, but not so much in the booth signage. Rather, AI has made its way beyond marketing claims and solidly into the core of the products themselves. There were hundreds of examples of how AI is changing how security systems operate, all for the better. Clearly on display at GSX 2025 was an industry in the midst of metamorphosis. Deep integration of AI My conversations with companies across the security ecosystem revealed an industry heavily focused on leveraging advanced technologies like AI and the cloud to address increasingly complex global and localised threats. Several key themes emerged at the Global Security Exchange (GSX), sponsored by ASIS International, held Sept. 29–Oct. 1 at the Ernest N. Morial Convention Centre in New Orleans, La. Themes I heard repeated throughout the show floor included deep integration of AI, the ongoing shift toward cloud-based and hybrid architectures, and a sharp focus on modernising security systems to meet current challenges. AI and intelligent automation transform security The use of GenAI is moving beyond simple search functions into real-time decision support Companies are integrating AI and intelligent technologies to enhance analytics, streamline incident response, and improve internal efficiency. The use of Generative AI (GenAI) is moving beyond simple search functions into real-time decision support. For example, Bosch Video Systems introduced a "second tier" to its video analytics capabilities by combining highly sensitive edge detection with GenAI models in the cloud. For example, in visual gun detection, edge analytics might flag a potential gun (yellow), but the cloud-based GenAI then quickly reviews and confirms the threat (red), helping to filter out false alarms. Bosch is also using GenAI for more open-ended searches, such as a "Where's Waldo" application demonstrated at their booth. GenAI-powered system Eagle Eye Networks says they are focused on helping integrators "organise the AI chaos” through their cloud-based video platform. Their precision person and vehicle detection capabilities work across multiple cameras. Motorola Solutions introduced Inform, an AI-assisted incident response solution designed to bring clarity to the "noise" and help security teams respond to complex threats. They also offer Avigilon Visual Alerts, an on-prem GenAI-powered system that expands the natural language interface. AI internally to improve processes The Body Workforce Mini protects frontline workers and businesses "amid rising violence and theft." The Axon Body Workforce Mini, a small “computer with a lens” for non-police applications, is AI-capable and can perform real-time translations, automated report writing, and summarisation, and can even act as a personal assistant by incorporating company policies. All those functions are built into a lightweight body-worn camera designed to safeguard frontline workers in retail and healthcare verticals. The Body Workforce Mini protects frontline workers and businesses "amid rising violence and theft." Beyond products, integration company Everon is using AI internally to improve processes, such as handling commoditised tasks, which they expect will result in better customer satisfaction. Everon wants to be known as a premier service provider and will be introducing new services in the video realm. AI-powered search and continuous system upgrades Genetec prefers the term Intelligent Automation (IA), instead of AI, to describe its empathetic interface, which can "know" what additional information a security professional needs when they click on an image, for example. Genetec says the advantages of the cloud include AI-powered search and continuous system upgrades. Their Security Centre SaaS has had a fast and successful launch. It enables cloud-based systems with local storage. Genetec also highlighted the Cloudlink 210, a cloud-managed appliance designed to unify physical security operations that can be simply plugged in without involving IT staff. They call it a “headless appliance.” Cloud migration and the push for hybrid systems Hanwha debuted OnCAFE (Cloud Access for Everyone), a new cloud-based access control product The industry continues its strategic march toward the cloud, often through hybrid applications that blend on-prem strength with cloud flexibility. Acre's access control is described as "cloud-first technology," and they continue to focus on cloud solutions, incorporating AI. To help customers transition, they offer the "Bridge," a migration tool that allows systems to communicate throughout the move. At the same time, they are continuing to develop and enhance their core on-prem products – DNA Fusion and AccessIt!. Adding access control to supplement their video product line, Hanwha debuted OnCAFE (Cloud Access for Everyone), a new cloud-based access control product. The goal is to provide “access control that is easy;” It works alongside their OnCloud direct-to-cloud VMS as a Service platform. Future of video management The future of video management is increasingly hybrid. Milestone recently completed a three-year process of updating XProtect and building for the future of hybrid applications. At GSX, they showcased how their XProtect Evidence Manager seeks to "democratise evidence management" by collecting video, cell phone data, notes, and other metadata related to a case for easy sharing and prosecution. Also, Milestone’s “app centre” enables additional features to enhance XProtect without involving integration. Milestone is also focusing on "Metadata Ingest," which collects and aggregates data from various manufacturers (including Genetec, Motorola, and Exacq) for use by AI. Strategic modernisation and open integration Convergint and Genetec collaborated on a "2026 Technology Modernisation Outlook" white paper A key theme for the future is the shift toward open systems and strategic modernisation, enabling security professionals to better utilise new technology. Convergint and Genetec collaborated on a "2026 Technology Modernisation Outlook" white paper, arguing that dealers and end-users need to think more strategically when buying technology. They predict that "2026 will be the year of modernisation," with tangible results including unified intelligence, flexible deployment, and lower total cost of ownership. The call for open standards and architecture was also strong. What AI needs from open systems Johnson Controls noted that cloud, AI, and open standards are its three big focus areas. Their C-CURE IQ 3.10 is gaining adoption as it unifies access and video. OpenEye is seeking to address the "AI disruption anxiety" in the industry, focusing on what AI needs from open systems. The emphasis is on the value of a Model Context Protocol (MCP), an open standard and framework to enable AI systems to integrate and share data with external tools and sources. Addressing shifting global and local threats Allied Universal's "World Security Report 2025" highlights a risen focus on executive protection Companies unveiled solutions targeted at new security concerns, particularly the rising threat of violence, theft, and misinformation. Allied Universal's "World Security Report 2025" highlights an increased focus on executive protection and cites the rise of misinformation and disinformation as the number two threat. They noted that macro trends around instability and the political and social environment are driving security threats globally. To combat physical threats, Shooter Detection Systems introduced a new outdoor sensor, which is now generally available after a favourable feedback period that included an apprehension in one municipality. The company notes the unique challenge of developing technology for a "non-cooperative" threat like a person with a gun, in contrast to most security technologies that are "cooperative" and depend on user compliance. Implementation of integrated security Flock Safety is expanding its focus beyond licence plate readers into solutions for retail, with a new initiative to automate and streamline investigative processes, which are often manual. The company also showcased "drones as automated security guards," which can be deployed within 90 seconds to provide "eyes" on a site and enhance safety. The system works on its own network and is firewalled away from the city system A tour of the City of New Orleans' Real Time Crime Centre (RTCC), hosted by Axis Communications, demonstrated a mature implementation of integrated security. The RTCC uses Axis cameras, Genetec VMS, and is tied to a Motorola Solutions Command Centre to enhance efficiency and effectiveness, operating independently of the police department. They measure success in terms of valuable hours saved in an investigation or even when an event is happening. The system works on its own network and is firewalled away from the city system. Rapidly changing industry on display The GSX 2025 highlights an industry that is moving toward more intelligent and integrated solutions. The investment in AI is shifting security from reactive monitoring to proactive, automated assistance. Throughout the show floor, the continued embrace of hybrid cloud architectures, coupled with an emphasis on open standards and modernisation roadmaps, suggests a security ecosystem built for agility and future growth. These trends, and the GSX show itself, collectively underscore the industry's commitment to delivering scalable, next-generation solutions for a changing threat landscape.
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Case studies
ATÜ Duty Free, Turkey’s pioneering duty-free retailer, aimed to establish a comprehensive security and AI-powered surveillance system in the Antalya Airport new terminal building project to maximise operational efficiency and customer experience. This critical project was successfully implemented thanks to Hanwha Vision’s high-performance camera solutions and deep learning-based AI capabilities, combined with the flawless implementation by integrator Arte Teknoloji. This project, utilising over 1,450 cameras, serves as a model for modern retail security and business intelligence applications. ATÜ Duty Free ATÜ Duty Free is one of Turkey’s and the world’s pioneering players in international standard duty-free retail. Operating in major Turkish airports such as Istanbul, Ankara, Izmir, and Antalya, as well as abroad, ATÜ is committed to providing travellers with a luxurious and enjoyable shopping experience. Due to its wide product range, high customer traffic, and sensitive duty-paid/duty-free sales processes, security systems are not only a means of protection for ATÜ but also a critical resource for business intelligence and operational management. Arte Technology A pioneer in the electronic security systems sector since 2006, Arte Technology is an integrator company specialising in low-voltage systems that has delivered hundreds of successful projects. Arte Technology offers its customers comprehensive services, from sales to after-sales support, in line with international standards and local regulations, providing solutions from global brands such as Hanwha Vision. Project objectives and challenges The new terminal building at Antalya Airport, with its high passenger traffic and extensive and complex store layout, required the following objectives: Advanced security: Prevention of in-store theft, inventory losses, and security breaches in critical areas. Operational efficiency: Effective management of customer flow, congestion levels, and checkout processes in the retail area. Business intelligence: Collecting data to analyse customer behaviour, optimise in-store layouts, and increase sales. Integration and management: Seamless and reliable management of over 1,450 cameras and analytical data through a centralised VMS (Video Management System). Hanwha Vision’s solution The backbone of the project consists of Hanwha Vision cameras, chosen for their reliability and high image quality. A total of 1,450 cameras have been deployed at the terminal’s most critical points: QNV-C6083R (Dome) – 1200 cameras for in-store areas, corridors, warehouses and customer tracking. QNO-C6083R (Bullet) – 250 cameras for exterior facades, entrances/exits, and critical surveillance points. AI applications: enhancing efficiency and customer experience Using Hanwha Vision’s camera and Genetec’s VMS integration, three critical AI analytics solutions tailored for ATÜ were implemented: People counting: By accurately measuring passenger density in different sections of the store and at the main entrances, working hours and staff distribution were optimised. Queue management at checkouts: Cameras installed in checkout areas detect queues forming and send alerts to staff to manage. Heatmap: Areas where customers spend the most time within the store are analysed visually. This data has become an indispensable business intelligence tool for optimising product placement (merchandising) and window displays. Software integration All camera and analytics data is consolidated on the industry-pioneering Genetec VMS platform. This powerful integration has provided ATÜ with the following capabilities: Centralised monitoring and recording management. Rapid visualisation and reporting of Hanwha Vision AI data within the VMS interface. Establishment of alert mechanisms for immediate response to incidents. Results and benefits Thanks to this comprehensive project, ATÜ Duty Free has achieved significant gains not only in security but also in operational excellence at Antalya Airport: Precise inventory control – High-resolution surveillance minimises the risk of theft and loss, particularly in areas containing luxury and duty-free goods. Enhanced customer experience – Queue Management has reduced waiting times, for improved customer satisfaction. Efficient staff deployment – The right number of staff were assigned during peak hours using people counting data. Store optimisation – Heatmap analytics highlight the most popular store areas, maximising sales potential. This case study demonstrates how Hanwha Vision’s reliable camera hardware, alongside distributor Entpa Elektronik A.Ş. and its Project Manager Eyüp Tetik, combined with Arte Technoloji’s integration expertise, provides the retail sector not only with video recording but also with actionable business intelligence that delivers value.
In recent years, campus safety and student mental health have drawn growing attention. Government data in Taiwan show a rise in emotional and stress-related issues among students aged 15–24. Unauthorised attempts to enter campuses still occur, unsettling students and staff. Strengthening security management and proactive alerting has therefore become a priority for schools. To address risks such as expansive campuses, multiple entry points, blind spots, and potential intrusions, VIVOTEK (3454-TW), the leading global security solution provider, has been promoting its AI-driven education security solutions, designed to proactively detect risks and safeguard school environments. Era of real-time detection and proactive response According to a report by research firm GII, the global education security market is projected to reach USD 910 million in 2025 and grow to USD 1.6 billion by 2030, representing a compound annual growth rate (CAGR) of 11.96%. As AI video analytics, edge computing, and cloud management platforms mature, security systems are evolving beyond passive video playback into an era of real-time detection and proactive response. In education settings, AI can automatically detect intrusions into restricted zones and trigger instant alerts, enabling security personnel to make swift and informed decisions. VSS Pro platform Recently, VIVOTEK deployed a comprehensive education security solutions at a renowned national university in Taiwan, installing hundreds of AI Bullet and Fixed Dome cameras across entrances, rooftops, classrooms, corridors, walls, elevators, and parking areas. Integrated with the VAST Security Station (VSS) Pro platform, the system delivers: Proactive prevention: AI virtual fence defines restricted zones, detects loitering, notifies the security centre, triggers on-site audio alerts, and coordinates real-time response. Efficient investigations: Broad coverage flags abandoned objects, while AI deep search traces intruders or vehicles in the shortest time using attributes (e.g., clothing colour, backpack, vehicle type) to quickly assemble event timelines. VIVOTEK’s education security solutions With comprehensive, AI-enabled coverage, schools can monitor in real time and avert risks, fostering safe, welcoming, and sustainable learning environment. Beyond Taiwan, VIVOTEK’s education security solutions are also used in the United States, Belgium, and Indonesia, tailored to local needs to build a global network of smart, sustainable campuses.
Amthal has delivered a complete security upgrade at The Maltings Shopping Centre, building on a partnership of more than three decades to transform the way the centre is monitored and managed. In supporting The Maltings since 2013 and taking on full management in 2017 Amthal could ensure the system remained effective through a dedicated maintenance programme until the time came for a complete upgrade. Integrated with the barrier system The new solution introduces 39 state-of-the-art Dahua cameras, including PTZ, 180-degree and AI-powered people-counting models, to provide full coverage across all seven entrances and car parks. Automatic number plate recognition has been integrated with the barrier system to improve vehicle access control, while people-counting technology now delivers reliable visitor data to track peaks and troughs. Active deterrent measures and signage strengthen site protection, supported by EMCS Sentry software to continuously monitor hardware performance and camera availability. Secure on-premises storage ensures all data remains under the centre’s direct control. Redesigned digital control desk Says Richard Marrett, Centre Director at The Maltings: “The new systems have changed the way we manage the centre. The cameras and control desk give us clearer oversight and together with features like people counting and vehicle access ensures we can identify incidents, respond quickly and review activity with confidence. Behind it all is the trust we have in Amthal, built over three decades of working together to keep The Maltings safe and welcoming.” A redesigned digital control desk now brings all live feeds, recordings and analytics together on a single platform, giving the security team clearer visuals and wider oversight than ever before. These features provide greater efficiency, faster response times and stronger protection. Management and security teams All installation work was carried out while the centre remained fully open. Amthal partnered with Dahua together with the management and security teams to plan the schedule so that tenants, staff and shoppers experienced no disruption. Kris Hallett, Business Development Director at Dahua Technology UK, added: “The upgraded cameras now capture detail even in low light, and features like auto-tracking reduce the need for constant manual monitoring. People-counting sensors give the team reliable data across key areas, while number plate recognition integrated with the car park barrier has streamlined vehicle access and reduced misuse." "All can be accessed at any time, even remotely. Working alongside Amthal, we were able to introduce all of this without disruption to the centre’s daily operations.” New requirements and advances in security technology The original system was first installed in 1995, marking the beginning of a long-term relationship that has seen Amthal support The Maltings in adapting to new requirements and advances in security technology. Paul Rosenthal, Amthal Group Business Development Director, concluded: “Our established partnership with The Maltings demonstrates how we work with clients over the long term. This complete upgrade with latest Dahua technology has delivered an integrated system that is straightforward for the team to use and manage via the new control centre. It ensures the centre remains safe, accessible and an enjoyable experience with complete peace of mind for tenants and shoppers alike.”
ZeroEyes, the creators of the first AI-based gun detection video analytics platform to earn the full U.S. Department of Homeland Security SAFETY Act Designation, announced that its proactive AI gun detection and intelligent situational awareness software has been deployed by Kanawha County Schools (KCS) to help protect students, staff, and visitors from gun-related threats. With the help of IT services and solutions provider Advantage Technology, KCS is the first district in West Virginia to deploy ZeroEyes, joining hundreds of K-12 schools nationwide already protected by the technology. Largest public school district KCS serves a number of communities in Kanawha County, with its central office located in Charleston, West Virginia. It is the largest public school district in the state, serving more than 22,000 students and 6,000 staff members across 62 buildings, including 34 elementary schools, 10 middle schools, and 8 high schools, as well as the Ben Franklin Career Center, the Carver Career and Technical Education Center, and Chandler Academy. With a footprint that spans urban, suburban, and rural communities, the district provides a world-class education that prepares all students to be college- and career-ready. Layered safety strategy Kanawha County Schools has added ZeroEyes to its layered safety strategy, which also includes Verkada cameras Guided by its belief that every child can achieve, and that safe, caring schools are essential to student success, Kanawha County Schools has added ZeroEyes to its layered safety strategy, which also includes Verkada cameras, an integrated emergency mapping system, and much more. "A neighbouring district deployed a different AI gun detection system and was so overwhelmed by false positives that staff ultimately ignored the alarms,” said Director of Security, Bryan Carper, adding “ZeroEyes’ operation centre is full of military and law enforcement experts who rapidly verify every detection to eliminate these false alerts. That ‘human-in-the-loop’ aspect is very important to us.” ZeroEyes' AI gun detection ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school administration as quickly as 3 to 5 seconds from detection. Proactive school safety “Advantage Technology is proud to partner with ZeroEyes in delivering a cutting-edge AI gun detection system for Kanawha County Schools, reinforcing our shared commitment to proactive school safety. We’re always looking for the most effective, forward-thinking solutions to protect our students and staff,” said Jonah Adkins, School Safety Consultant for Advantage Technology. Jonah Adkins adds, “ZeroEyes brings a level of precision and reliability that aligns perfectly with our mission. At Advantage, we continually strive to bring the best technologies to the table — solutions that not only meet our customers’ needs but exceed their expectations.” “Kanawha County Schools is setting the standard for school safety in West Virginia,” said Mike Lahiff, CEO and Co-Founder of ZeroEyes, adding “By embracing innovative solutions like ZeroEyes, they’re showing what’s possible statewide.”
i-PRO Co., Ltd. (formerly Panasonic Security), a pioneering manufacturer of edge computing cameras for security and public safety, announced the successful deployment of its advanced, AI-powered camera technology at a major UK aerospace manufacturing facility. The project, delivered in partnership with long-time integrator Richards CCTV, modernised the site’s ageing security infrastructure, addressing stringent aviation industry compliance needs while enhancing safety, operational efficiency, and future scalability. Advanced functionality and analytics The customer, a prominent supplier within the global aerospace supply chain, operates in a high-risk environment The customer, a prominent supplier within the global aerospace supply chain, operates in a high-risk environment where precision engineering and rigorous safety standards are essential. Its legacy security system had grown increasingly unreliable, lacking the advanced functionality and analytics required for the complex security landscape. With high-value assets, civil aviation regulations, and extensive health-and-safety oversight requirements at play, the company sought a more intelligent, robust, and resilient security platform. i-PRO’s edge-AI camera technology To meet these demands, Richards CCTV designed and implemented a comprehensive upgrade based on i-PRO’s edge-AI camera technology. The installation included 169 high-performance cameras deployed across production lines, common areas, external perimeters, and critical zones. Key components Advanced camera technology i-PRO’s AI-powered search application that turns camera metadata into actionable intelligence i-PRO’s portfolio includes AI-enabled S-Series cameras that can distinguish people from objects in real time to reduce false alarms, high-speed PTZ cameras that extend perimeter awareness, and fixed domes that deliver clear evidence in shared spaces to help resolve incidents quickly. The cameras are integrated with Active Guard, i-PRO’s AI-powered search application that turns camera metadata into actionable intelligence, enabling operators to run real-time alerts and proactively manage incidents before they escalate. Remote monitoring and analytics enhance operational efficiency Real-time alerts and mobile integration allow managers to receive live notifications and make decisions remotely, reducing the need for constant on-site supervision. Meanwhile, embedded AI analytics enable quality-control teams to detect manufacturing anomalies earlier, increasing production integrity and minimising downtime. “Our client was happy to lean on our long-standing experience working with i-PRO cameras and the local i-PRO team,” said Phil Luckman, Sales Account Manager at Richards CCTV. “Knowing that i-PRO is willing to properly engage with a customer, come on-site if required, and help demonstrate a proof-of-concept is invaluable.” System reliability and ease of integration Post-deployment, the aerospace plant has seen measurable improvements across several fronts From the outset, system reliability and ease of integration were key. Richards CCTV reported that all 169 devices were “quick to configure and install,” with minimal disruption to day-to-day operations. i-PRO’s durable design, five-year hardware warranties for certified partners, and responsive UK-based support team ensured a smooth, future-proof, deployment and instilled confidence in the long-term viability of the platform. Post-deployment, the aerospace manufacturer has seen measurable improvements across several fronts. The ability to analyse footage from multiple angles has helped refute false personal injury claims, while also identifying root causes of legitimate incidents, leading to meaningful updates in health-and-safety policies. The new system’s high-fidelity audit trails also support quality assurance and compliance documentation, delivering transparency for internal stakeholders and regulators alike. New use cases for i-PRO’s evolving AI capabilities Looking ahead, the installation offers scalability and future-proofing, enabling the end user to adapt the system to continuously evolving needs and industry standards. Planned expansions include securing additional tree-lined zones and increasing coverage in logistics corridors. The facility is also exploring new use cases for i-PRO’s evolving AI capabilities, including automated detection of PPE compliance and unsafe behaviours around heavy machinery. “The cameras provide excellent images in all lighting conditions—every single one performed out of the box,” added Luckman. “With their build quality and long warranties, we know the i-PRO system will deliver long-term value.”
Interface Systems, a pioneering managed service provider delivering business security, actionable insights, and purpose-built networks for multi-location businesses, announced the successful completion of a major security upgrade for Bethesda Community Church and Bethesda Christian School in Fort Worth, Texas. Serving more than 530 students from preschool through 12th grade, Bethesda Christian School is recognised among the top private schools in Texas. Modern safety and security systems High level of activity required modern safety and security systems to protect students Between church services, school operations, and community events, the multi-building, 26-acre campus welcomes hundreds of people daily. This high level of activity required modern safety and security systems to protect students, staff, and parishioners while simplifying daily operations. Bethesda’s aging fire alarms, intercoms, and CCTV system were increasingly unreliable, creating false alarms and communication challenges. To address these concerns, the church turned to Interface to modernise its infrastructure. Deployed an integrated solution Interface designed and deployed an integrated solution that included: Fire Alarm System: Replacing the outdated system with a modern fire alarm system that communicates urgency effectively without causing unnecessary panic, particularly important for schoolchildren. Managed Access Control: Introducing a modern system that makes it easier for administrators to manage entry to the campus. The cloud-based setup means they can grant or restrict access remotely, without having to manage complex on-site servers. Video Surveillance Upgrade: Installing a 64-channel IP camera system on the new school building, with expansion capability to replace legacy analog cameras over time. The system provides remote monitoring and allows staff to verify alarms with live video before responding, helping to reduce unnecessary dispatches. Intercom and Paging: Replacing the outdated intercom with a flexible IP-based system that supports school bell scheduling, room-to-room communication, and all-campus announcements. It also integrates with access control, giving administrators a simple way to manage visitor entry. Remote access to cameras and alarms The installation was carefully phased to minimise disruption to classes and worship services “The new system is effective. It gets the point across that it’s time to evacuate, but it doesn’t create panic, especially among the kids,” said Rick Campbell, Facilities Manager at Bethesda Community Church. “Having remote access to cameras and alarms has been a huge help.” The installation was carefully phased to minimise disruption to classes and worship services. “Interface worked around the kids and kept us up and running during installation,” Campbell added. “The integration was seamless, and now everything is running smoothly.” Interface’s upgrades With Interface’s upgrades, Bethesda has significantly reduced false dispatches, streamlined communication across the campus, and gained the ability to scale its systems for future growth. “Initially, we were unsure about the cost, but the investment has been well worth it,” Campbell concluded. “I’d recommend Interface to other churches without hesitation.”


Round table discussion
Emphasising proactive rather than reactive security shifts the focus from dealing with crises and damage control to prevention. Advantages of a proactive approach include cost efficiency, better business continuity, and fewer crises that draw attention away from strategic improvements. Staying ahead of threats is a core mission of the security department, and technology has evolved to enable security professionals to deliver on that mission better than ever. We asked our Expert Panel Roundtable: How are security systems transitioning from reactive to proactive, and what is the benefit?
The role of audio in physical security is multifaceted and increasingly vital, offering a layer of intelligence and interaction that access control and/or video surveillance alone cannot provide. Sounds provide crucial context to visual events. For instance, someone running might appear suspicious on video, but audio could reveal they are shouting for help, changing the interpretation entirely. Even so, historically speaking, audio has been an underused component in physical security. How is the situation changing? We asked our Expert Panel Roundtable: Is audio an underused component in today’s physical security systems? What obstacles are keeping audio from expanding?
Port forwarding is a networking technique that allows incoming traffic on a specific port number to be redirected to a particular device or application on a local network. Open ports on the network expose an IP video system to the internet. This makes it a potential target for malicious cyberattacks. In the physical security industry, the elimination of port forwarding is seen as a basic and manageable precaution to shore up cybersecurity. We asked this week's Expert Panel Roundtable: What are the risks of port forwarding, and how can manufacturers and/or integrators mitigate those risks?
Products


White papers
Combining security and networking technologies for a unified solution
Download
Maximising enterprise security systems in the cloud
Download
Are you ready for an on-site emergency?
Download
VSS - Top 4 questions to get you started
Download
A step-by-step checklist for choosing an intercom system
Download
Healthcare Surveillance: Finding efficiencies from OR to ER and beyond
Download
Safeguard Students With New Techniques And Technology
Download
Assessing safety readiness for education campuses
Download
5 question check-up: Test your camera's cybersecurity
Download
The future of healthcare security is connectivity
Download
5 ways to strengthen physical security with an integrated system
Download
The benefits of Edge AI + Cloud for security systems
Download
Video technology: making cities safer & improving lives
Download
Assessing the total cost of ownership (TCO) of VMS and NVR systems
Download
Securing unmanned infrastructure at the network edge
Download

Videos
Security camera systems: Manufacturers & Suppliers
- Hikvision Security camera systems
- Dahua Technology Security camera systems
- Hanwha Vision Security camera systems
- Vicon Security camera systems
- Bosch Security camera systems
- BCDVideo Security camera systems
- LILIN Security camera systems
- Verkada Security camera systems
- Axis Communications Security camera systems
- Videotec Security camera systems
- Seagate Security camera systems
- VIVOTEK Security camera systems
- AV Costar Security camera systems
- Avigilon Security camera systems
- MOBOTIX Security camera systems
- Milesight Security camera systems
- Iluminar Security camera systems
- Vanderbilt Security camera systems
- OT Systems Security camera systems
- Honeywell Security Security camera systems
Aligning physical and cyber defence for total protection
Download
Understanding AI-powered video analytics
Download
Enhancing physical access control using a self-service model
Download
How to implement a physical security strategy with privacy in mind
Download
Security and surveillance technologies for the casino market
Download
