Security cameras
Alibaba Cloud, the digital technology and intelligence backbone of Alibaba Group, and Olympic Broadcasting Services (OBS), has announced the launch of OBS Cloud 3.0 for the Olympic Games Paris 2024 (Paris 2024). A combination of cloud technologies powered by AI, OBS Cloud 3.0 makes the work of OBS and Media Rights-Holders (MRHs) easier and more efficient. For Paris 2024, OBS Cloud 3.0 will serve as the backbone infrastructure supporting several critical functions, fully utilising the benef...
iDenfy, a Lithuanian-based RegTech company best known for its identity verification tools, has announced a new partnership with SetFreaks, the world’s first pre-release service for DJs in the dance music industry. This collaboration will enhance regulated compliance and automate user identity verification on the SetFreaks platform while adding an extra layer of security to internal fraud prevention measures. SetFreaks, the world’s first pre-release service for DJs in the dance...
Regula, a global developer of forensic devices and identity verification solutions, has improved the onboarding process for Maza, a fintech company dedicated to providing new immigrants in the U.S. with rapid access to essential financial services. By integrating Regula Document Reader SDK and Face SDK, Maza has established a streamlined, secure identity verification process, enhancing customer experience and reducing onboarding costs by 50%. Maza assists newcomers to the USA with obtaini...
Matrix successfully showcased its advanced security products and solutions at the 5th edition of the Rail and Metro Technology Conclave, held at Hotel Le Méridien, in New Delhi, India, from July 23-24, 2024. As the first Indian company to offer RDSO 6.0-compliant network cameras for Indian Railways, Matrix highlighted its STQC-certified network cameras, adhering to the OWASP ASVS 4.0 L2 standards for cybersecurity compliance. These cameras ensure that critical passenger video data remain...
As the anticipation builds for the 2024 Paris Olympics, security concerns are heightened. While this long-awaited event will showcase the world’s most accomplished athletes, the safety of all participants and spectators is paramount. Extensive preparations have been underway to achieve this crucial goal. Security challenges The threat landscape in the historical context The security challenges facing the Paris Olympics are underscored by ongoing global conflict, an ever-evolv...
Mayflex, the distributor of Converged IP Solutions has added the full range of Gardner Engineering CCTV bracketry to their product portfolio. Gardner Engineering is a British CCTV mount manufacturer that prides itself on design excellence. They have a focus on sustainability with their products being manufactured at their facility in Lancashire and utilising the closest possible suppliers to minimise the production ‘miles’ involved in the logistics and production process. All Produ...
News
Nozomi Networks Inc., the pioneer in OT and IoT security announced the industry’s first OT and IoT security sensor that runs embedded in Mitsubishi Electric programmable logic controllers (PLCs). Arc Embedded With Arc Embedded, security and operations teams gain previously unavailable visibility at the process level of their industrial automation equipment and field assets as well as the ability to analyse and deter process-level threats and malicious user activity without impacting current resources or disrupting mission-critical networks. As a result, organisations benefit from greater operational resilience and uptime, reduced cyber risk, and better compliance. Manage and protect critical infrastructure “We’re honoured to partner with innovator and industry pioneer Mitsubishi Electric to bring Arc Embedded to their PLCs,” said Nozomi Networks Co-founder and CPO Andrea Carcano. “Arc Embedded can transform how CISOs manage and protect critical infrastructure, extending security to and through industrial control systems, down to the field assets they manage.” Strengthening physical process “Mitsubishi Electric is the perfect partner for this initiative, thanks to its passion for innovation and an unmatched understanding of automation,” continued Carcano. “Through our joint work, customers in a variety of industries can feel confident deploying Arc Embedded in Mitsubishi Electric PLCs, strengthening security to the physical process." Safety, security, and reliability "This is a revolutionary approach that makes it possible to extend in-depth real-time monitoring of assets, network traffic, anomaly detection, and threat identification directly to process controls." "Ultimately, it improves the safety, security, and reliability of the automation processes we depend upon and sparks the imagination for what’s possible when advanced security is embedded at the device level.” Visualisation and intrusion-detection "Solutions that provide robust OT security and continuous system operation are a priority in Mitsubishi Electric's ongoing digital transformation,” said Kunihiko Kaga, Mitsubishi Electric's Representative Executive Officer and Industry & Mobility Business Area Owner. “Combining Mitsubishi Electric’s manufacturing-control and information-system security technologies with Nozomi Networks' visualisation and intrusion-detection technologies, allows us both to contribute to a safer, more secure, and more sustainable society." Programmable logic controllers (PLCs) Mitsubishi Electric’s MELSEC iQ-R family of PLCs are among the most modern and advanced in the world A PLC is an industrial digital computer designed to automate manufacturing processes, ensuring high reliability and ease of programming. Widely used across various industries, PLCs enhance operational efficiency by providing real-time processing and control in harsh environments. Mitsubishi Electric’s MELSEC iQ-R family of PLCs are among the most modern and advanced in the world, which facilitated the development of this new embedded security solution. Control-level cybersecurity The PLC market is expected to reach $22 billion by 2030 as more industries embrace and expand their use of automation, driving the need for better control-level cybersecurity. Recent CISA advisories on attempted PLC exploits are a harsh reminder that a related attack could shut down production, or cause a public safety crisis. Arc Embedded transforms existing industrial control systems into secure-by-design assets, offering a fully integrated security layer from an independent vendor that delivers robust, comprehensive protection for in-production systems. AI-powered OT/IoT security platform The proactive approach strengthens operational resilience, reduces downtime, protects critical infrastructure The newest component in Nozomi Networks’ award-winning, AI-powered OT/IoT security platform, Nozomi Arc Embedded in Mitsubishi Electric PLCs makes it possible for the first time for organisations to monitor east-west activity to detect and respond to cyber incidents at the PLC level before they can do harm or escalate across the entire industrial operations environment. This proactive approach strengthens operational resilience, reduces downtime, protects critical infrastructure, and maintains process integrity. Benefits of Arc Embedded Arc Embedded on Mitsubishi Electric PLCs delivers: Real-time visibility and security from the network endpoint to the manufacturing floor to enhance data integrity, more accurately detect PLC anomalies, and detect unauthorised access (intrusions). AI-powered protection to provide continuous monitoring for real-time learning, faster responses to security incidents, and more robust detection of known and unknown vulnerabilities. Innovative visibility and protection for devices connected to the PLC “backplane” to understand module health and status, normal and abnormal communications patterns, all configuration changes, and firmware integrity. Arc Embedded is available for Mitsubishi Electric iQ-R series PLCs via a subscription-based model, available from Mitsubishi Electric, Nozomi Networks, and an extensive global network of Nozomi Networks channel partners.
Allied Universal®, the security and facility services company announced the launch of its new Enhanced Protection Services business unit. Enhanced Protection Services To address the most critical threats to life and safety, Enhanced Protection Services offers comprehensive, high-consequence threat mitigation at every stage of the risk cycle from planning and preoperational surveillance to execution and completion. Leveraging extensive subject matter expertise, the team delivers unrivaled protection for government agencies and commercial entities around the world. Special services integration The business unit will be led by industry expert Glen Kucera, president, of Enhanced Protection Services Enhanced Protection Services is the integration of several of the company’s specialised services including firearm and explosive detection canine teams; risk advisory and consulting; executive protection; intelligence; disaster and emergency response; chemical, biological, radiological, nuclear, and explosives screening; SmartTech screening technology; and active law enforcement. The business unit will be led by industry expert Glen Kucera, president, of Enhanced Protection Services. Specialised security services “Today’s elevated and dynamic threat landscape requires businesses and organisations to utilise specialised services that address high consequence threats,” said Steve Jones, global chairman, and CEO, of Allied Universal. “We’ve formed Enhanced Protection Services to better protect our clients in this environment and position Allied Universal as the innovative, go-to partner for specialised security services.” Team members Enhanced Protection Services boasts a team of 17,000 highly specialised security experts, a streamlined suite of services, an expanded national footprint with greater surge capacity, and more than 3,000 teams the world’s largest private sector team of explosive and firearm detection canines. The new business unit is built upon a bench of unrivaled subject matter expertise. Subject matter experts From executive leadership to field personnel, members of the Enhanced Protection Services team draw from decades of experience including elite law enforcement and military organisations, corporate security, Big Four consulting, and beyond. They are experts in strategic intelligence, counterterrorism, explosive mitigation, countersurveillance, executive protection, disaster response, and other areas of specialised protection. In a complex threat environment, Allied Universal Enhanced Protection Services designs situation-specific plans and programmes to preserve life safety, protect business continuity, and deliver peace of mind.
Barox Kommunikation AG, the manufacturer of professional standard switches, PoE media converters and IP extenders, is delighted to announce that it has joined the Genetec™ Technology Partner Program (TPP). Barox’s network management Genetec plug-in provides flexibility and extended network diagnostics from within the Genetec™ Security Centre, significantly reducing security network support costs. Following its release, barox has been welcomed into the Genetec Technology Partner Program (TPP). The program will see Genetec and barox working together to raise awareness of the joint integration capabilities and benefits, throughout the Genetec Channel Partner and End User network. Other advanced security capabilities Genetec TPP is the way barox has used to build secure and loyal integrations with Genetec solutions Genetec TPP is the pathway barox has used to build secure and reliable integrations with Genetec solutions. Within the collaboration, barox has utilised the latest tools and support needed to easily integrate barox technology with the Genetec Security Center VMS platform. Genetec Security Centre is a unified physical security platform that allows clear monitoring of events and system configuration in one place. It unifies access control, video management, forensic search, intrusion monitoring, automation, and many other advanced security capabilities. This advanced capability offers users a global view of the security environment, improving awareness and efficiency. Advanced network solutions With easy integration for deep barox Ethernet switch and network control, the new Genetec plug-in reinforces barox’s ethos of offering advanced network solutions that are tailored to meet the needs of the modern video security market. New Genetec plug-in reinforces barox’s ethos of offering advanced network solutions “We are delighted to enter into collaboration with Genetec,” says Rudolf Rohr, barox Co-founder & Managing partner. “Our inclusion into the Genetec Technology Partner Program has already yielded significant breakthroughs in integration between the two security sector brands. We are proud to deliver the benefits of simple device integration, advanced functionality, product quality and performance, all backed with local customer support.” Installation requirements Kirsty Whitefield, Sr. Manager, Strategic Alliances Marketing at Genetec commented: “Through barox integration, Genetec customers will benefit from simple system design, reduced installation requirements, performance and the security benefits both brands offer." "With barox now part of the Genetec Technology Partner Program, we can offer even more added value to our Channel Partner network and End User customers.”
SONDA USA, a pioneering provider of innovative smart city technology solutions, has announced a new partnership with Intel Corporation and ISS (Intelligent Security Systems) to offer cutting-edge video intelligence capabilities powered by advanced artificial intelligence. This collaboration leverages SONDA's leadership in smart cities and digital transformation, Intel's high-performance hardware solutions, and ISS' AI and computer vision expertise. The resulting outcome is a robust video analytics system that instantly identifies and responds to traffic violations, public safety incidents, and other potential threats, ensuring communities are safer, more efficient, and more responsive in real-time. Collaborate with Intel and ISS Now available, the solution can process live camera feeds from various sources, including traffic and security cameras. By harnessing the power of AI-enabled video analytics, computer vision, and deep learning models, it swiftly identifies patterns, behaviours, and anomalies that could signify a violation or potential danger. The solution can process live camera feeds from various sources, including traffic and security cameras "We are thrilled to collaborate with Intel and ISS on this groundbreaking video intelligence initiative," said SONDA USA CEO Maurizio Rinaldi. "By combining our strengths in video management, data analytics, hardware solutions, and AI, we are creating a powerful tool that can meaningfully enhance public safety and other use cases." AI for video analytics “This partnership represents a significant leap forward in applying AI for video analytics and intelligent monitoring to different use cases, all contributing to improving the quality of life of cities and communities. As this transformative technology continues to evolve, it promises to revolutionise traffic management, law enforcement, and public safety efforts,” Rinaldi added. “Through our strategic partnership, Intel, SONDA and ISS are at the forefront of transforming traffic management and safety, leveraging advanced AI at the edge to deliver innovative and efficient solutions," said Anthony Abuta, Transportation Global Director - Cities & Critical Infrastructure BU at Intel Corporation. SONDA's extensive integration “Integrating global relationships into the North American market enables us to harness diverse perspectives and innovative ideas and bring lessons learned from established networks worldwide. SONDA's extensive integration and project management expertise, coupled with Intel's technological capabilities, empower ISS North America to introduce new capabilities to the market in a proven manner,” said Matt Powell, Managing Director for ISS in North America. He added, “We are witnessing this in the transportation and public safety sectors, where our collaboration with SONDA USA and Intel involves actively engaging with organisations to educate them about our integrated capabilities. By leveraging the expertise of both partners, we expand our market reach and deliver world-class video intelligence products to new and established customer segments and industries.”
RecFaces, a provider of advanced facial biometric software, announces the release of its new white paper titled - 'Facial Recognition Systems in Securing Critical Infrastructure'. The white paper delves into the fundamentals of securing critical infrastructure, which encompasses everything, from perimeter monitoring and access control to video surveillance and beyond. Facial recognition technology With increasing digitisation, the Internet of Things, and biometric technology advancements, finding the right security modality requires deep thought. Facial recognition technology has emerged as a front-runner in this regard, owing to its precision, universality, and unique capabilities. This newly released white paper is an effort towards building a roadmap for strengthening the security ecosystems across sectors through the increased adoption of Facial Recognition Systems (FRS). Key highlights Some of the key takeaways from the white paper are: Accurate Identification: FRS ensures precise identification of individuals, enabling proactive threat mitigation and effective resource allocation. Efficient Physical Access Control: By seamlessly integrating with access control systems, FRS facilitates streamlined and secure access to critical infrastructure facilities, reducing vulnerabilities and unauthorised entries. Safeguarding Public Data: FRS enhances data security by implementing robust authentication checks, threat detection, and preventing unauthorised access or breaches. Imperceptible Constraints: Unlike traditional security measures, FRS is not limited by proximity constraints, hence, preserving user convenience and optimising operational efficiency, while maintaining stringent security protocols. Biometric identification Through compelling case studies, the white paper showcases how FRS has significantly bolstered security levels in critical infrastructure settings. Citing one such case, it highlights how biometric identification, powered by highly precise facial recognition algorithms, augmented security measures in a data centre. “Critical infrastructure is the greatest asset for the acceleration of economies. Without it, there cannot be stable growth. This white paper talks about FRS as the catalyst for fighting out the vulnerabilities that different sectors in critical infrastructure face,” said Sukrit Varma, Global Marketing Partner, at RecFaces.
Taking place in Stavanger, Norway on 26-29 August, this pioneering biennial exhibition and conference will see Teledyne Gas & Flame Detection (Teledyne GFD), Teledyne FLIR and Teledyne Marine display numerous innovations on their shared stand that take safety to new levels in these potentially hazardous industries. Teledyne will also introduce advanced emission monitoring solutions to meet the latest legislative requirements and deliver effective LDAR solutions. By exhibiting jointly under the Teledyne name, the company mantra of “everywhereyoulook” will resonate more than ever with visitors via the extensive range of technologies available on the same stand. Whether it is Teledyne GFD’s fixed and portable gas and flame detection solutions, Teledyne FLIR’s thermal imaging cameras, or instruments from Teledyne Marine that monitor and explore everything beneath the ocean surface – Stand 1063 in Hall 10 will have it all. Teledyne GFD Oil and gas companies constantly scrutinise new technologies that reduce the risks to personnel, property or the environment. At ONS 2024, a broad spread of Teledyne GFD portable and fixed detectors will take centre stage, with the latter providing a particular focus area. The GD1 hydrogen sulphide (H2S) open-path laser detector, for example, offers high performance while overcoming the obstacles provided by challenging offshore environmental effects that include sun, rain and fog. This popular device provides fail-safe, rapid responses in up to 98% obscuration. The product’s integrated high-definition CCTV video delivers clear, rapid imaging of fires Offering another attractive option for visitors to the booth will be the GD10P infrared gas detector, which houses features that provide an effective response to the detection of gas hazards in high-demand mode SIL2-approved applications. Product differentiation arrives courtesy of the GD10P’s silicon-based solid-state infrared source. Long service life and robust detector stability help users reduce maintenance and service costs. A further innovation on the stand will be the recently introduced Spyglass™ flame detector. The product’s integrated high-definition CCTV video delivers clear, rapid imaging of fires. Colour video detects fuel fires like gasoline and jet fuel, while the near-infrared video option detects fires caused by other fuels such as hydrogen and methanol. Teledyne FLIR On the same stand, FLIR a Teledyne technologies company will demonstrate its prowess in helping oil and gas inspectors, managers, and technicians deliver quick thermal imaging solutions to problems that include leak detection and maintaining system integrity. Highlights at ONS 2024 are set to include the G-Series cameras, designed to detect hydrocarbons, methane (CH₄) and other Volatile Organic Compound (VOC) emissions from multiple stages of the oil and gas supply chain, as well as other industrial markets. By adopting the QL320, users no longer require a toxic vapour analyser or similar tool for secondary sampling Under the new EU Methane Regulation, which aims to reduce methane emissions in the energy sector, companies are now required to quantify methane emissions at both the source and site levels. The G-Series range features advanced gas quantification analytics within the camera itself, capable of measuring leak type and severity, ensuring compliance with the new regulation. Elsewhere on the booth will be the advanced QL320, a quantitative optical gas imaging system for measuring the leak rate of methane and other hydrocarbon emissions captured by FLIR OGI cameras. By adopting the QL320, users no longer require a toxic vapour analyser or similar tool for secondary sampling. Teledyne Marine Teledyne Marine provides offshore energy equipment for reliable operation in oil fields and wind farms. Although offering a vast plethora of solutions, the focus at ONS 2024 will be subsea distribution units and downhole optical connectors. The Modular Connectorised Distribution Unit (MCDU), for instance, is a factory-qualified subsea distribution unit that provides oil-filled, pressure-balanced junctions for flexible underwater configurations. ROVs (remote operated vehicles) can easily install and retrieve the unit from the sea floor thanks to the latest compact-frame design which eliminates the requirement for lifting wires. A further product focus from Teledyne Marine will be the Optical Feedthrough System (OFS). This downhole, ‘wet mateable’ optical connector is for high-pressure/high-temperature environments within a vertical Xmas tree (VXT) valve stack on a subsea wellhead. Providing pressure integrity barriers and optical continuity, the OFS on display will measure 2” (50 mm) in diameter and 12” (300 mm) long. An associated display screen will show an animation of its operation. Teledyne experts will be present throughout ONS 2024, ready to discuss the optimal solutions for new projects or existing challenges.
Expert commentary
Security manufacturers throw around the term “scalable” a lot these days, but few dive into what scalable really means for modern organisations and their security programs. Achieving true scalability, or as I like to refer to as “expandable with a purpose,” takes planning and coordination from security pioneers alongside the broader organisation. Implementing a flexible strategy is critically important in the age of advancing analytics and intelligence-driven technology. So what exactly do we mean by “scalable”? "Scalable" refers to the capability of a system, process, or technology to handle growth or increased demand without compromising performance, efficiency, or quality. To put it simply, scalability refers to the ability of a solution to expand or adapt to accommodate larger workloads, higher volumes of data, or increased complexity without requiring significant changes to its underlying architecture or design. It’s not enough to create a “fix it and forget it” security program. Not only do the needs of the organisations shift, but growth (or even shrink) is inevitable. How to Approach Growth Pioneers must be prepared to adapt their strategies and approaches to manage security risks For many security pioneers, growth has a trickle-down effect. Expansion through mergers and acquisitions or organic growth, in addition to decreases in facility or employee count, directly impacts the security program. Whether it’s an increase or decrease in size, workload, or scope, these pioneers must be prepared to adapt their strategies and approaches to efficiently manage security risks while maintaining operational efficiency. Here are some ways security pioneers can approach growth: Assess the here and now: Begin by looking at the current state of your security program, including the resources, capabilities, processes, and technology infrastructure. Understanding existing strengths, weaknesses, and areas for improvement can help inform planning for the future. Align with the business: This might be one of the most important considerations to make, but ensuring security pioneers understand the organisation’s growth objectives, priorities, and risk tolerance levels is critical to the success of a security program. The most successful security pioneers will be able to align security strategies with business goals to ensure security investments and planning are enabling the company’s growth initiatives. Invest in scalable solutions: Invest in solutions that offer flexibility and can adapt to the changing needs of the organisation. Closed systems that can’t integrate fully with new technologies will severely limit the security team’s ability to seamlessly manage the security portfolio. Optimize processes: Reviewing security processes and workflows – or investing in a platform that can streamline this for you – can improve efficiency and effectiveness for your security team. Identifying opportunities for automation and standardisation can allow for scaling as business needs change. Collaborate across departments: Preparing for growth initiatives requires extensive communication across departments, including leadership teams, human resources, legal, IT, facilities, and many other stakeholders ensure that security priorities, challenges, and requirements are effectively communicated and integrated. Adopting these approaches helps put security teams in the driver’s seat, effectively managing periods of growth and change without compromising the safety and security of the organisation. Technology considerations As security pioneers navigate investments in new technologies that achieve some of the approaches listed above, such as aligning strategy with business goals, optimising processes, and cross-departmental collaboration, there are several considerations to make. Looking at how technology can support (or even hinder) future growth. For example, when making a buying decision around access control systems, security pioneers must consider the number of users, number of credentials, server requirements, facilities, hardware end points, and software features. As these items are being addressed in an RFP or in conversations with a vendor, security pioneers must ask themselves, “Is there a scenario where my program will outgrow the system’s capabilities in any of these areas?” If so, the answer might be to select a different solution. Security pioneers must consider interoperability. We talk a little about this above, but the importance here cannot be overstated: integration is key. The ability to leverage multiple point solutions, such as access control systems and video surveillance cameras – regardless of manufacturer – provides growing companies with the ability to scale quickly and more efficiently than ever before. Centralising the ability to pull these solutions into a single security operations management platform allows security pioneers a better view of their security programs in a current – and even future – state. Cloud-based solutions can provide the ultimate scalability factor, providing flexibility and accessibility advantages compared to traditional on-premise systems. Cloud-based, or Software-as-a-Service (SaaS) platforms, can easily scale up or down based on changing needs, accommodate distributed environments, and provide remote access and management capabilities, making them well-suited for scalable physical security deployments. Data-driven insights and analytics can drive decision-making beyond security, making technology investments that provide these critical. Automated workflows, event-triggered alerts, and AI-driven analytics can streamline security processes, improve threat detection capabilities, and reduce manual intervention, enabling security teams to manage larger environments more efficiently. Centralised management of technology investments can create cohesion for security teams. Centralised management and monitoring of physical security systems across multiple locations or facilities enables personnel to efficiently oversee and control security operations, access controls, and incident response activities. Being able to manage security in a single platform provides security pioneers with the ability to assess staffing levels, streamline training, allocate resources effectively, and scale to additional sites and/or solutions as needed. Tasked with building a security program that can adapt to the changing needs of the organisation, security pioneers must consider a number of factors when setting strategy. First and foremost, taking a close look at the existing program to identify strengths and weaknesses, then truly assessing the technology and processes in place, is the best way to move forward and future-proof the organisation.
The days of being reactive are over. That’s right, we as an industry, can no longer afford to be reactive. As threats evolve, the need for proactive security is critical. While traditional methods, including physical barriers and security personnel, are still necessary, the future of our approach is built on the backs of emerging technologies. Substantial vulnerabilities As an industry, we’ve operated reactively for decades, it has been common for security teams to address threats only after they occur. The growing risk landscape proves that this approach has significant limitations. Human oversight, delayed responses, and the inability to monitor large areas have exposed substantial vulnerabilities. Emergence of AI AI enables real-time monitoring, advanced data analysis, and more accurate risk detection Times are changing though and it’s largely due to the emergence of AI. AI is revolutionising the security landscape by making technology smarter. It enables real-time monitoring, advanced data analysis, and more accurate risk detection. This ensures a higher level of security and safety, minimising potential incidents' impact while enhancing overall safety. Focus on strategic aspects AI's ability to process vast amounts of data quickly and accurately is, quite frankly, a game-changer. It can identify patterns and anomalies that can provide stakeholders with critical insights to respond in a more prepared manner. By automating routine tasks and highlighting potential issues, AI also allows operators to focus on more complex and strategic aspects of security management, rather than responding to false alarms. The future is AI The future of security lies in AI. The Security Industry Association (SIA) has recognised AI as one of the top security megatrends in 2024. However, the challenge is not adopting AI, it is about effectively using it to enhance security. AI can enhance video surveillance by improving object detection and enabling real-time, informed responses AI systems can easily integrate with existing infrastructures, providing a layered defence that combines traditional methods with more modern technology. For example, AI can enhance video surveillance by improving object detection, reducing false alarms, and enabling real-time, informed responses. This ensures that security measures are adaptive, scalable, and capable of addressing the evolving risk landscape. Don’t react, anticipate One of AI's most significant benefits is its ability to provide proactive insights. AI can predict potential breaches by analysing behaviour patterns and detecting anomalies allowing security pioneers to do something before an event happens. This shift, from reactive to anticipatory measures, marks a significant advancement in asset protection and risk management. AI systems can also continuously analyse data and distinguish between everyday events and real-world threats. It’s AI's continuous learning capabilities that mean the systems can adapt and improve over time to become more accurate and efficient in threat detection and response. Save money, scale on demand Contrary to common belief, adopting AI technologies will not put a security department over budget. It may be surprising, but these solutions offer cost-effective and scalable alternatives to traditional security measures. An initial investment in AI technology can result in substantial long-term savings (and ROI) by reducing the need for physical infrastructure and on-site security personnel. Customisable solutions The ability to scale and customise AI solutions makes them an efficient choice for enhancing perimeter defence AI systems are also inherently scalable and can be tailored to meet the specific needs of different environments. This ensures the system can evolve with emerging threats and technological advancements without requiring a complete system overhaul. The ability to scale and customise AI solutions makes them a practical and efficient choice for enhancing perimeter defence. How’s that for staying within budget? Embrace the possibilities Integrating AI into perimeter security is the future of proactive and intelligent security. As these technologies continue to evolve, we can expect even more refined solutions that are predictive, autonomous, and capable of directly addressing new and emerging threats. We’re experiencing an exhilarating transformation as AI becomes more trusted, precise, and advanced on multiple levels. This evolution is bigger than pilots and small, low-profile deployments. AI in perimeter security For instance, France is preparing to deploy AI-powered video surveillance as it gears up to host the 2024 Olympics, part of its efforts to detect sudden crowd movements, abandoned objects, and suspicious activities. Think about the sheer scale of that project. We’re finally moving forward, and staying one step ahead must be our priority. But this shift requires a significant change in mindset. Are you ready to make the change?
Educational institutions worldwide increasingly rely on robust wireless networks to enhance academic pursuits, safety measures, and operational efficiency. The campus environment, a complex network of interconnected buildings, and the humans navigating them require innovative technologies to meet these diverse needs. The solution lies in a new wireless protocol that provides an ideal fit for the long-range, low-power connectivity requirements of educational campuses: Wi-Fi-certified HaLow. Wi-Fi HaLow: Wi-Fi HaLow, a new Wi-Fi certification released by the Wi-Fi Alliance in November 2021 and incorporating the IEEE 802.11ah standard, is optimized for the unique requirements of Internet of Things (IoT) applications. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs Its combination of long-range connectivity, low power consumption, advanced Wi-Fi CERTIFIED WPA3 security features, and the ability to connect more than 8,000 devices from a single access point makes the protocol a game changer for campus environments. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs between range and speed that limit the effectiveness of conventional Wi-Fi in the 2.4, 5, and 6 GHz frequency bands for campus applications. Robust, secure connections for access control Operating at sub-GHz frequencies, the Wi-Fi HaLow protocol's unparalleled ability to penetrate physical barriers and its advanced security features make it an ideal wireless technology for supporting access control systems throughout campuses. Credential systems for students, badge scanners, cameras, and dormitory door locks can work efficiently and securely in hard-to-reach locations, providing an interconnected and safe environment for the campus community. Enhancing safety through improved connectivity Body-worn cameras used by public safety officers can remain connected to the wireless local-area network The low-power and long-range attributes of Wi-Fi HaLow can play a significant role in strengthening campus safety systems. Body-worn cameras used by public safety officers can remain connected to the wireless local-area network (WLAN) or mobile router in their patrol vehicles even at a long distance, reducing the need to consume cellular data. Wi-Fi HaLow enables the development of robust wireless networks that can reliably support campus-wide, two-way video intercoms, potentially enhancing response times and safety measures. Streamlining outdoor equipment automation Outdoor equipment automation, such as irrigation systems, smart lighting, and robotic lawnmowers, can leverage Wi-Fi HaLow's power efficiency, and long-range and expansive coverage. Automation of these systems with such efficient wireless connectivity can lead to significant energy savings, improved productivity, and reduced operational costs. Delivering superior speed and range 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second A Wi-Fi HaLow network shatters the traditional tradeoff of wireless communications between speed and range. A single-stream, 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second at sub-GHz frequencies, enabling live streaming on large screens, connecting multiple real-time AI edge cameras, as well as thousands of low-power IoT devices, all connected without compromising on range. Wi-Fi HaLow signals can extend beyond 1 kilometre, up to 10 times farther than traditional forms of Wi-Fi in the 2.4, 5, and 6 GHz frequency bands, and are capable of connecting far-flung devices and systems across campus environments. Setting a new standard for campus connectivity By addressing the connectivity needs of modern campuses, Wi-Fi HaLow paves the way for future campus applications. As we navigate the digital era, Wi-Fi HaLow presents a compelling solution that significantly enhances connectivity, safety, and efficiency. This leap in wireless capabilities isn’t merely incremental; it represents a transformative stride toward a smarter, more connected future. Wide-reaching wireless network Educational institutions can leverage Wi-Fi HaLow to create safer, more efficient, and interconnected campus environments. By providing a robust, reliable, and wide-reaching wireless network, Wi-Fi HaLow enables campuses everywhere to fulfill their diverse connectivity needs without compromise.
Security beat
Security applications for drones have evolved to provide benefits such as bird's-eye views of large areas, easy access to remote locations, and rapid deployment. However, to date, most drone applications have been outdoors. Not for long. Today, indoor drones are also finding unique opportunities for enhanced surveillance, security, and operational efficiency in indoor environments such as offices, warehouses, self-storage facilities, and malls. Indoor drones can navigate complex indoor spaces, providing real-time data and monitoring without the limitations of fixed cameras. New era of autonomous robotics A significant advantage of using drones indoors, as opposed to outdoors, is their ability to operate fully autonomously, circumventing U.S. Federal Aviation Administration (FAA) regulations that restrict such autonomy in outdoor environments. A new era of autonomous robotics enables drones to work seamlessly for users without the need for specialised flight training. A single security manager can oversee multiple indoor drones simultaneously with simple map clicks or prompts. A new era of autonomous robotics enables drones to work seamlessly for users Indoor monitoring and inspection Indoor Robotics is a company seeking to revolutionise indoor monitoring and inspection through its Control Bridge platform guiding indoor drones. Since its founding in 2018, Indoor Robotics has evolved through years of market engagement and product development. After initially recognising a demand for autonomous indoor monitoring, the company found that existing hardware fell short. “However, we understood the challenges of full autonomy and knew we would solve it using drones,” says Bar Biton, Marketing Manager of Indoor Robotics. Indoor Robotics has evolved through years of market engagement and product development Hardware challenges Seven years later, with the hardware challenges addressed, the company is shifting focus to continually increasing value for security managers, especially with generative AI (artificial intelligence). In 2018, the problem was charging methods, which has been solved with ceiling docking stations and five patents. “Today it’s about making indoor environments safer and even saving lives by identifying blocked emergency exits, missing safety gear, leaks, fire hazards and more,” says Biton. While indoor navigation presents challenges—such as the unreliability of GPS and the need for precision — Indoor Robotics has dedicated significant resources to achieve centimeter-level accuracy and ensure the utmost safety, maintaining a record of zero safety incidents to date, says Biton. Indoor navigation presents challenges—such as the unreliability of GPS and the need for precision Advanced AI-driven navigation systems Navigation challenges for indoor drones include manoeuvering through confined spaces, avoiding obstacles, and maintaining stable flight in varied lighting conditions. To address these, Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle avoidance technologies. These solutions enable drones to adapt to dynamic environments, ensuring precise and safe navigation. Additionally, the Control Bridge platform provides real-time data and monitoring, allowing drones to adjust their routes and respond to changing conditions effectively, thus enhancing their operational reliability. Highly versatile indoor drones find applications across numerous vertical markets such as retail, logistics, healthcare, and corporate settings. Key use cases encompass security surveillance, where drones monitor premises continuously; maintenance checks, especially in hard-to-reach areas; safety inspections to comply with regulations and company policies; and emergency response to provide real-time data during incidents. In warehouses, drones efficiently inspect high shelves. Healthcare facilities and data centres use them to oversee restricted zones. Additionally, corporate offices employ drones to automate after-hours security, safety and maintenance routines. Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle-avoidance technologies Alerts to the remote management team One Indoor Robotics client, a global tech company, deploys drones to enhance site surveillance and operational efficiency across six offices in three countries. The drones conduct regular security patrols after-hours, monitor facility activities, and ensure compliance with safety standards. This deployment has significantly improved the overall safety and security of their offices. The drones provide real-time alerts to the remote management team, enabling prompt responses to any anomalies, such as maintenance issues or unauthorised access. “The key advantage is the unified security standard provided by our Control Bridge operating system, allowing them to oversee all their sites from one centralised platform, ensuring consistent security management across all locations,” says Biton. When indoor drones co-exist with human workers, primary challenges include ensuring safety and preventing disruptions. Drones are equipped with advanced sensors and AI-driven obstacle avoidance systems to detect and navigate effectively around people. Strict operational protocols and designated flight paths are implemented to minimise interactions. Additionally, many drone operations are scheduled for after-hours to further reduce potential disruptions. “Safety is our top priority, and we invest significant resources to ensure it,” says Biton. “We are proud to report zero safety issues to date, reflecting our commitment to maintaining a secure environment for both drones and human workers.” Deploys drones to enhance site surveillance and operational efficiency across six offices in three countries Implementation of indoor drones Indoor drones are significantly more cost-effective and affordable when compared to traditional security methods like additional cameras, sensors, manpower, and even ground robots, says Biton. They cover larger areas and provide dynamic surveillance in less time, offering real-time data collection and enhanced flexibility. Unlike cameras or ground robots, drones eliminate blind spots and adapt to environmental changes autonomously. They also offer substantial indirect savings by optimising maintenance routines, according to Indoor Robotics. For instance, a drone can instantly identify issues in hard-to-reach areas, allowing for immediate, targeted responses, instead of requiring an inspector first and then a technician, thus streamlining maintenance processes. “The biggest obstacle to greater implementation of indoor drones is education and awareness,” says Biton. “Many people are not yet exposed to the concept of autonomous indoor drones and may find it hard to believe they really work.” To overcome this, Indoor Robotics focuses on creating awareness and educating customers about the reliability and benefits of the technology. Demonstrations, case studies, and clear communication about the capabilities and safety of drones are key. By showcasing successful implementations and providing hands-on experiences, Indoor Robotics seeks to build trust and drive wider adoption of indoor drone technology in security applications. Control Bridge operating system Drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms A common misconception is that indoor drones are intrusive and pose significant privacy risks. However, drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms. They operate primarily during off-hours and are programmed to avoid sensitive areas, focusing solely on enhancing security and operational efficiency. The solution also includes rigorous data protection measures to safeguard any collected information, ensuring compliance with privacy regulations and addressing concerns effectively. Soon, automation will become integral to tasks across all facility types, from manufacturing and logistics to retail and office spaces. Using Indoor Robotics’ Control Bridge operating system, facility managers will deploy fleets of robots to identify issues, collect data, and gain insights to enhance operations, maintenance, and safety. Facilities will benefit from 24/7 AI-driven monitoring, eliminating the need for occasional surveys. Managers will receive immediate alerts for any anomalies, with preventive maintenance tasks seamlessly integrated into building management platforms, ensuring optimal performance and safety. New standards in the industry The Indoor Robotics platform-agnostic approach provides flexibility and scalability. “As we continue to evolve, we support more and more platforms, enabling our clients to tailor their indoor monitoring solutions to their specific needs,” says Biton. “We believe that the future of security lies in intelligent, automated systems that can adapt to dynamic environments and provide real-time insights,” says Biton. Indoor Robotics seeks to be at the forefront of this transformation, setting new standards in the industry and paving the way for a safer, more efficient future.
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or-death situations rapidly and efficiently. Historically, 911 operators had to respond based on very little information, perhaps just a voice on the phone or a location on their screen. Providing critical information Today, there are literally millions of information sources available, ranging from connected buildings to vehicle telematics to live video streams to health information from wearable devices. In fact, there are 540 million connected devices, any one of which could provide critical information in an emergency. But how can those information sources be leveraged to improve emergency response? That’s the mission and value proposition of RapidSOS, an ‘intelligent safety platform’ company that connects 911 operators with the vast universe of information available to promote better and faster emergency response. Highly sophisticated operation The platform is integrated into every major public safety software system and first responder agency “RapidSOS fuses human and artificial intelligence to put critical information from any connected device directly into the existing systems and operating procedures of first responders across the United States,” says Michael Martin, CEO of RapidSOS. RapidSOS is widely used by first responders. The platform is integrated into every major public safety software system and first responder agency. There are more than 4,600 software integrations that serve more than 21,000 first responders and 911 agencies. In 2023, RapidSOS supported the lifesaving work of public safety across 171 million emergencies with 3.3 billion data payloads. The system is adaptable and configurable to support any agency, from a highly sophisticated operation in New York City to a local sheriff running their own 911 center. Intelligent analytics and reporting RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation, rich content pathways, redundant connection to caller phones, and access to millions of connected devices. In an emergency, Unite intelligently fuses data from among millions of sensor feeds into a unified picture of an incident, allowing public safety officials to view real-time location, health profile, telematics, alarm data, and more. RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation RapidSOS offers core modules that handle call, text, video, sensor, mapping, and administration tools, and that provide partner data from connected devices. Additional modules provide enhanced geographic information system (GIS) data, and automated translation and transcription. There is also a single sign-on (SSO) upgrade, intelligent analytics and reporting, and seamless integration into field responder applications. Field responder applications Consider how an emergency might unfold and how RapidSOS can help. In a car accident, data from a modern automobile telematics system can alert a 911 operator of the accident as it happens. Data from a passenger’s wearable device might provide information about their health and condition. A nearby video or traffic camera could fill in details of how the accident occurred. Useful information in an emergency might come from any one of thousands of sources, including public safety data, sensor feeds, enterprise security systems, smart phones, etc. In a train derailment, electronic access to the cargo manifest can identify which train cars contain hazardous materials and how to manage the specific type of hazmat. This information could save valuable time when responding to incidents like the Feb. 3, 2023, Norfolk Southern train derailment involving 38 cars in East Palestine, Ohio. Consider how an emergency might unfold and how RapidSOS can help Institutional security partners Norfolk Southern is one of the companies that provides information to first responders using RapidSOS; in effect, the company provides a direct digital link from their rail security operations to any first responder in the United States. Amazon’s global operations centers also interface with RapidSOS to provide critical information to first responders. Partnering with corporate security helps to better support the flow of data from institutional security partners and their solutions. Information can transform and guide emergency responses. For example, in a structure fire, real-time sensor feeds throughout a building can help 911 and first responders understand how the fire is progressing. Real-time security camera footage Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR Leading the way to providing video feeds from private camera systems to 911 operators is an agreement between Eagle Eye Networks and RapidSOS, which was announced in April 2024. The agreement allows an enterprise to opt-in to share real-time security camera footage from an Eagle Eye video stream during a live 911 call. Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR. “Security cameras are crucial in many locations, including schools, but previously those cameras could not be accessed by 911 during an emergency but were only used for investigation after an incident,” says Martin. Improving fire and life safety systems RapidSOS is also integrated with Honeywell’s Connected Life Safety Services (CLSS) system, a cloud platform that combines software and hardware to improve fire and life safety systems. Technology integrations between the two companies further modernise and digitise the public safety communications process to provide faster, more accurate communications with emergency centers (i.e., 911 agencies). RapidSOS technology securely transmits detailed data about an emergency CLSS provides real-time visibility and connectivity to help systems integrators and facilities managers make informed decisions and manage fire systems more efficiently. When combined with Honeywell's solutions, RapidSOS technology securely transmits detailed data about an emergency, such as the type of hazard, severity, and location within the impacted building, to emergency response centers. Video object detection Rapid SOS’s emerging Harmony artificial intelligence (AI) product serves as a ‘co-pilot’ for 911 operators, helping them manage the high volume of emergencies by making their response more efficient. Harmony pulls all the sensor feeds in an emergency and works to make only the most important information available in the hands of 911 and first responders. Harmony can take key insights from text and video data, use ‘sentiment analysis’ to determine the emotion tone of a message, and help 911 professionals using language translation, keyword alerts and video object detection. Harmony can help local agencies as they address a 25% average staffing shortage by providing additional support to 911 professionals while lessening the workload. Harmony is also working to help RapidSOS expand the ecosystem, stitching more data together and quickly making it more actionable than ever. Emergency response system RapidSOS also interfaces with Iamresponding, a comprehensive end-to-end emergency response system for first responders in the fire and other emergency sectors. Iamresponding’s field responder application is used by RapidSOS to get information out to first responders in the field. More than 650,000 first responders use RapidSOS’s field application RapidSOS’s recent acquisition of Iamresponding helps the company improve the connection with the last mile “in-the-field” piece of the puzzle, ensuring partners across computer-aided dispatch (CAD), integrated applications, mobile data terminals, body cameras and other responders have access to critical data. More than 650,000 first responders use RapidSOS’s field application. Enhancing emergency response RapidSOS’s Safety Pioneer Program formalises the important partnership between RapidSOS and public safety agencies. Participants in the program receive early access to new platform features, contribute to the platform roadmap, and drive feedback to enhance emergency response. “911 and first responders do incredible lifesaving work,” says Martin. “Everything we have done and built at RapidSOS is a direct result of the engagement, partnerships, inside advice and insight we have gotten from public safety. We have learned from them, developed new technologies and tested them.” Martin adds: “Companies have data and we now know how to make that data actionable into the hands of 911 and first responders to save lives. This is an exciting moment for us continuing our mission in partnership with public safety, and for technology and security companies to have a major hand in that.” {##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##}
Security professionals are recognising the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organisations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analysing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognise the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilising open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualised through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritise critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratisation of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivise bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimises the occurrence of analytic errors caused by inaccurate machine translations. This minimises the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognise its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyse massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Case studies
One of the pioneering players in the global packaging ecosystem, this manufacturing facility transforms over 100,000 tonnes of paper, paperboard, and laminates annually into diverse, high-value packaging solutions. Established in 1925, it caters to industries such as food and beverage, personal care, and consumer goods, with a robust presence across India and select global markets. Recognised for operational excellence and innovation, the business holds numerous prestigious awards and certifications. With a strong focus on customer delight and sustainable packaging, it partners with major brands like P&G, Nestle, and Unilever. Business Scenario To address these challenges effectively, the facility of a video surveillance system was felt essential Without a video surveillance system in place, the company faced recurring security breaches and unauthorised access to its manufacturing units, which raised significant concerns for employee safety and the protection of assets. Instances of product mishandling and operational inefficiencies went unnoticed, underscoring the critical need for a video surveillance system. To address these challenges effectively, the installation of a video surveillance system was deemed essential. Additionally, they wanted a video surveillance system that ensured uninterrupted monitoring to avoid missing crucial events. Challenges Security Vulnerabilities: The absence of a video surveillance system posed risks to employee safety and the protection of valuable assets such as machinery, raw materials, and finished products. Operational Oversight: Instances of product mishandling were not promptly detected or addressed due to the lack of a robust video surveillance system. This compromised productivity, and quality control within the manufacturing unit. Loss Prevention: The inability to monitor activities effectively increased the risk of inventory shrinkage, theft, or damage to goods. This not only affected financial losses but also disrupted supply chain operations and customer deliveries. Inaccurate Weighbridge Monitoring: Inaccurate weighbridge monitoring made it difficult to verify truck weights before and after loading, which caused fraud and serious operational issues. Regulatory and Compliance Risks: Without a proper video surveillance system, it was challenging for the manufacturing unit to meet stringent regulatory standards, potentially leading to regulatory penalties. Solution Solution uses Matrix’s Bullet Network Cameras with Motorised Varifocal Lens to zoom in on the digit plate All the vehicles entering and exiting the premises were monitored with Matrix Automatic Number Plate Recognition Solution. This solution uses Matrix’s Bullet Network Cameras with Motorised Varifocal Lens to zoom in on the number plate. SATATYA SAMAS - Video Management Software then uses OCR technology to convert this captured number plate image into a digital number and store it in the database. The loading and unloading facility was closely monitored with the help of Matrix Weighbridge Monitoring Solution. This aided in the accurate tracking of shipments, which prevented fraud. Matrix 5MP Dome Cameras were strategically placed above production floors, assembly lines, packaging areas, and quality control stations within the manufacturing and warehouse facility. These cameras provided detailed monitoring of manufacturing processes, ensuring product quality and operational continuity with clear footage. Additionally, they were installed in administrative offices, break rooms, and training areas contributing to workplace safety. Matrix 5MP Bullet Cameras were deployed for robust outdoor and perimeter surveillance. They monitored loading docks, outdoor storage yards, parking lots, and security checkpoints. These cameras secured critical infrastructure such as HVAC rooms and electrical rooms, ensuring the safety and integrity of vital systems. SATATYA SAMAS - Video Management System The video surveillance system was configured in such a way that ensured uninterrupted recording All 100+ cameras were integrated with SATATYA SAMAS - Video Management System aiding in live view, and playback of the network cameras in the premises. The facility also opted for the CREAM (Cognitive Response Engine and Automated Monitoring) module in SATATYA SAMAS to improve employee safety. Two IVAs were configured in this case - Tripwire and Motion Detection. The Tripwire IVA could be used to monitor specific areas that had to be obstructed, while Motion Detection IVA helped in identifying accidents or unusual activities in the obstructed areas. Both IVAs worked in tandem, providing real-time alerts and video pop-up notifications. The video surveillance system was configured in such a way that ensured uninterrupted recording. Even if the recording server failed, the recording would be pushed to the management server by the network cameras. When the recording server was functional again, the footage was again pushed to the management server. Products Offered: SATATYA SAMAS PLT (1No.): Enterprise Video Management Software Matrix Licence Dongle 200 (1No.): USB Dongle to Run Matrix SATATYA SAMAS SATATYA SAMAS CAM5 (24 Nos.): Licence for Adding 5 Additional Cameras SATATYA SAMAS USER3 (01No.): 3 Concurrent User Licence for Smart Client and Mobile Client SATATYA SAMAS ANPR3 (01No.): 3 Camera Licences for Automatic Number Plate Recognition SATATYA SAMAS CREAM5 (01No.): 5 Camera Licences for Automated Monitoring SATATYA CIBR50MVL12CWP P2 (04 Nos.): 5MP IR Bullet Camera Motorised Varifocal 2.8-12mm Lens With Audio SATATYA CIBR50FL40CWS P2 (63 Nos.): 5MP IR Bullet Camera Fixed 4mm Lens SATATYA CIDR50FL40CWS P2 (53 Nos.): 5MP IR Dome Camera Fixed 4mm Lens Benefits The manufacturing facility is extremely satisfied with Matrix Video Surveillance System and is now planning to rely on Matrix for its needs at additional plant locations across India. Matrix's Automatic Number Plate Recognition (ANPR) and Weighbridge Monitoring Solutions streamlined operations by accurately tracking vehicles entering and leaving the premises, reducing manual errors and cutting down on weighment fraud. Employees experienced a greater sense of security with the help of CREAM in Matrix VMS, as it lowered the risk of accidents in the facility. With regular monitoring, the video surveillance system minimised product mishandling and prevented process errors, while also protecting assets and machinery. Matrix Network Cameras kept a constant watch over inventories, warehouses, and storage yards, making it easy to track stolen goods using surveillance footage. Matrix VMS and the server systems ensured 24/7 recording of the facility, maintaining continuous surveillance even in critical situations, providing a reliable and secure environment.
Revader Security was selected by safety & security specialists North to provide over 75 re-deployable CCTV cameras to the London Borough of Hammersmith and Fulham as part of their contract to upgrade the council’s public space CCTV network. Revader’s re-deployable CCTV cameras are all-in-one professional surveillance solutions that combine an HD camera, recording, onboard storage and wireless transmission in a single compact unit. Fleet of re-deployable cameras They can operate from a wide range of power sources, including mains, battery and solar The cameras can be installed in virtually any location and can be easily moved to target crime hotspots and other areas of interest, enabling police and local authorities to deter offenders, respond to developing incidents and secure prosecutions. They can operate from a wide range of power sources, including mains, battery and solar. The fleet of re-deployable cameras is used by the council’s CCTV operators to tackle street crime, anti-social behaviour and fly-tipping, protect property, prevent trespass, improve public safety and monitor traffic flow. Delivered over a three-year period, this purchase was part of the London Borough of Hammersmith and Fulham’s £5.4 million investment into its CCTV network. The borough has a surveillance network of over 1,900 cameras in total, representing the highest-density network of CCTV cameras in the UK. Longstanding partnership with North Stuart Caldecourt, Managing Director at Revader Security, said: “We are delighted that the investment being made by Hammersmith & Fulham Council into its surveillance network is delivering results, with more police arrests enabled by high-quality CCTV footage and more prosecutions supported by video evidence. We are proud to continue our longstanding partnership with North to deliver cutting-edge solutions that make our communities safer and more secure.” Revader Security continues to work alongside the partners to support Hammersmith & Fulham Council and a wide range of other local authorities, police forces and industrial users across the UK.
Geutebrück video security provides comprehensive protection for professional users, from perimeter security to process documentation. The open platform for video management G-Core offers a variety of interfaces to third-party systems and is the basis for integrated security systems. The latest integration with Commend's communication solutions supports efficient communication and security for users from various verticals such as banking, industrial production, police and corrections authorities, health care, education, road and air traffic, parking facilities, and hotels. Direct voice contact By linking Geutebrück's G-Core Video Management System and Commend's communication servers, information, and commands can be exchanged effortlessly between the systems. For example, users of a Commend intercom station can call up video images from specific cameras at the click of a mouse, assess the situation, and then make direct voice contact with the other party, e.g. to respond immediately to emergency calls. Advanced analysis The integration creates a safer working environment and minimises training times and operating errors This integration not only offers greater transparency but also simplifies the users' daily as they do not have to switch between different platforms. This creates a safer working environment and minimises training times and operating errors. The integration also offers advanced analysis options, such as the automatic detection of suspicious activities using AI algorithms and the creation of detailed security reports. Flexibility and scalability The flexibility and scalability of the combined solution allow the security system to be adapted to changing requirements and simplify the integration of additional components. Overall, the integration provides an improved security infrastructure that significantly increases the efficiency, security, and user-friendliness of monitoring and communication systems.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security Safety Act Designation, and Aegix Global, a Utah-based provider of industry-pioneering safety and personal protection resources technology, announced that they have successfully deployed ZeroEyes’ AI gun detection and situational awareness software in more than 200 Utah schools. ZeroEyes’ software has been integrated into the Aegix AIM active incident management platform since spring 2023. Schools and districts that have deployed the combined solution include American Leadership Academy, American Preparatory Academy, and the school districts of Cache County, Carbon, Grand, Juab, Layton City, North Summit, South Summit, Provo, Wasatch, and Waterford School Districts, among others. Aegix AIM platform Aegix AIM platform cuts via chaos to clear guesswork and delays, saving special time in a crisis The Aegix AIM (Active Incident Management) platform cuts through chaos to remove guesswork and delays, saving precious time in an emergency. The system allows individuals in schools, businesses, and other organisations to notify first responders and colleagues about a crisis with the touch of a button. In a worst-case scenario, such as an active shooter, teachers simply push a button in the app to let administrators and first responders know if they are “safe” or “unsafe.” Aegix AIM can be operated from a desktop, laptop or smartphone. “Incorporating ZeroEyes into our AIM solution to mitigate gun-related violence in Utah schools has provided an additional layer of protection for students and staff statewide,” said Chet Linton, CEO of Aegix. “We look forward to the continued success of our partnership.” ZeroEyes' AI gun detection ZeroEyes' AI gun detection and intelligent situational grasp software layers onto living digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and RTC staff as quickly as 3 to 5 seconds from detection. Partnership with Aegix “Amidst the national rise in gun violence, schools shouldn't have to compromise on safety due to financial constraints,” said Mike Lahiff, CEO of ZeroEyes. “We are extremely proud of our partnership with Aegix, which has enabled schools throughout Utah to afford our life-saving gun detection and situational awareness solution."
Arana Security, a specialist in providing end-to-end security systems for businesses, has chosen Custom Consoles control room desks for a major client in the manufacturing sector. The project includes a main desk and supervisor’s desk from the Custom Consoles SteelBase series plus a MediaWall and auxiliary furniture. Arana Security was founded in 2013 to serve a growing market of smart card solutions and security systems. In 2015 it started to move towards providing clients with the advanced security that biometric technology offers. The company is a globally active service provider specialising in integrated biometric security solutions for the corporate, financial, governmental and logistics sectors. Latest-generation models “This is the most recent of many security-related control room commissions we have worked on over the years,” says Gary Fuller, sales manager at Custom Consoles. “Both SteelBase desks are latest-generation models with blue LED lighting on the underside of the worktop. This style of lighting provides sufficient illumination for staff to concentrate on the monitor displays without distraction while still being able to move around the room easily. It also helps to reduce fatigue during a long or uneventful operating shift." “The main desk is a 4.3-metre wide six-bay unit configured for use by two operators. Each bay is fitted with a lockable front and rear door providing easy access to computer equipment and related cabling. The desktop is 80 cm high and has a 120 cm front-to-back reach. A removable section of the worktop covers a full-desk-width cable tray. Four monitor screens are mounted near the rear edge of the desk. The desk faces directly towards a 3 metre wide MediaWall supporting six large multiscreen monitor video screens forming three wide by two high display grid." Desk worktops Desk worktops are finished in grey Marmoleum with black PVC edging, plus matching grey doors Fuller added: “Situated behind and to the right of the main control desk, the supervisor’s desk is a 1.6-metre wide two-bay SteelBase with dual 24-inch monitor screens, again located near the rear of the worktop. This desk too has blue LED underlighting.” The desk worktops are finished in grey Marmoleum with black PVC edging, plus matching grey doors and side panels. Also provided were a dual-bay control room and crisis room storage units with doors, a 2.2 x 1-metre crisis room meeting table, 24/7 operator chairs, monitor arms plus meeting table chairs. Cable management features Custom Consoles' SteelBase is a high-strength desking system developed to withstand the demands of heavy industry. Built around steel frames with hinged lockable front and rear doors, SteelBase can be configured for use by individual operators or teams of practically any number without the cost and long delivery time usually associated with project-specific furniture. Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs. Predrilled monitor arm mounting points are positioned at the rear upper edge of each bay. Cable management features include a removable worktop section with dual brush strips providing an uninterrupted cable exit for telephones, monitor cables and computer peripherals. Integral cableways allow heavy-duty wiring to be fully concealed within the desk structure while retaining easy access for routine maintenance or adjustment. SteelBase desktops Desktop equipment pods can be specified if required. SteelBase desktops are available in a choice of 120 cm (standard) or 100 cm (SteelBase Lite) front-to-back sizes with a choice of hard-wearing Marmoleum or laminate work surfaces. All elements are guaranteed against component failure for five years of normal use. All elements are guaranteed against component failure for five years of normal use MediaWall is a video and audio monitor support frame system providing a combination of structural rigidity and operational versatility. Flat-screen video displays of practically any size can be mounted in almost any configuration. Video display screens Incorporating height-adjustable horizontal beams and T-slot mounts, MediaWall is fully adjustable to ensure optimal sight lines. Individual or multiple frames can be used in self-supporting mode or coupled directly to the studio wall. Video display screens can be positioned so that the edges meet exactly to form a continuous horizontal display limited only by the monitor panel bezel. Monitor signal and power cables are fully concealed and can enter or leave the structure at any desired point.
Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announced that Heathrow Airport’s multi-year investment in Genetec solutions is enabling them to continuously innovate and transform operations. The joint effort provides Heathrow with a unified view across large-scale airport operations to secure people and assets, bringing efficiency and enhancing the passenger experience while ensuring data privacy and cybersecurity compliance. Deployed Genetec Security Centre Heathrow deployed Genetec Security Centre to bring all of its IP security systems onto one unified forum London Heathrow is Europe’s busiest airport, handling approximately 80 million passengers and 14 million tons of goods annually. Over 76,000 employees work around the clock to ensure the airport’s smooth operations across its 1,227-hectare site, including maintaining passenger flow, securing the premises, and managing over 1,300 daily take-offs and landings for 89 different airlines. Heathrow initially deployed Genetec Security Centre to bring all of its IP security systems onto one unified platform. What began as a 2,000-camera deployment in 2016 has since more than quadrupled in size, incorporating everything from video and access control to LIDAR, analytics, automatic licence plate recognition (ALPR), and more. Genetec solutions Genetec solutions are used to go far beyond security. For example, Genetec solutions are used to monitor over 150 km (93 miles) of baggage belts and facilitate the daily entry and exit of over 150,000 vehicles. “We’re essentially running a small city operation that happens to be called Heathrow,” explains Danny Long, IT Product Owner for physical security products at Heathrow. “Alongside the traditional airport security functions, we’re responsible for the monitoring of roads, retail space, three train stations, a bus terminal, offices, a church, fuel stores, a high voltage electrical network, and all the other associated infrastructure that maintains passenger flow.” Software and firmware updates Genetec Security Centre supports 90 other stakeholder groups working across 110 control rooms Genetec Security Centre now supports 90 different stakeholder groups working across 110 distinct control rooms, all of whom have different needs and access rights. Customised dashboards enable individual teams and third parties, such as police, government agencies, airlines, and retailers, to focus on their specific tasks. For example, some operational staff are given the tools to monitor passenger flow and are automatically notified when security lines grow too long. Meanwhile, colleagues in IT don’t see camera feeds. Instead, they have access to system health dashboards that notify them of devices that have fallen offline or require software/firmware updates. New requirements “The joy of working with London Heathrow is that the team is constantly striving to put our system through its paces and identify new areas where it can add value,” states Simon Barnes, Director of Business Development, Genetec, Inc. “While our software is configured to their requirements at the time, once in the field, new requirements emerge, and we have to adjust to their reality." “My job is to translate business requirements into workable solutions and Genetec provides me with the valuable tools to achieve that,” concludes Long. “Our experience with Genetec has been very positive. We’re only looking to expand in terms of the size and usage of the system.”
Round table discussion
When it comes to preventing theft and ensuring overall safety, technology offers a robust toolkit for retail stores to enhance security in several ways. From intelligent surveillance systems to RFID tags used to avoid shoplifting, today’s retail and loss prevention strategies are more effective than ever. Beyond security, the newer technologies can also provide benefits related to merchandising, inventory control, customer service, and the list goes on. The combination of abundant data and artificial intelligence (AI) is a powerful one-two punch that is on the verge of reshaping the retail industry. We asked this week's Expert Panel Roundtable: How are new technologies transforming the retail and loss prevention markets?
Video storage has come a long way since rooms full of VCRs stored video from an entire system of cameras. Video storage equates to data storage, and there are multiple options ranging from hard disk storage to the cloud to storage on each individual camera using SD cards. Increasingly, cloud-based storage is an attractive option to store video footage conveniently and safely. We asked this week’s Expert Panel Roundtable: How is expansion of video storage capabilities impacting the security industry?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Products
White papers
The role of artificial intelligence to transform video imaging
DownloadAre you ready for an on-site emergency?
DownloadTroubleshooting IP video systems
DownloadAI in security solution
DownloadVSS - Top 4 questions to get you started
DownloadHealthcare Surveillance: Finding efficiencies from OR to ER and beyond
DownloadUnlocking wide-angle camera dewarping
DownloadLevelling up with campus safety
DownloadThe future of healthcare security is connectivity
Download5 ways to strengthen physical security with an integrated system
DownloadThe benefits of Edge AI + Cloud for security systems
DownloadVideo technology: making cities safer & improving lives
Download11 advantages of a combined system for access control and intrusion
DownloadAssessing the total cost of ownership (TCO) of VMS and NVR systems
DownloadSecuring unmanned infrastructure at the network edge
DownloadVideos
Security cameras: Manufacturers & Suppliers
- Hikvision Security cameras
- Dahua Technology Security cameras
- Hanwha Vision Security cameras
- LILIN Security cameras
- AV Costar Security cameras
- Bosch Security cameras
- Visionhitech Security cameras
- Pelco Security cameras
- Axis Communications Security cameras
- Vicon Security cameras
- eneo Security cameras
- Messoa Security cameras
- Avigilon Security cameras
- Sony Security cameras
- Panasonic Security cameras
- VIVOTEK Security cameras
- FLIR Systems Security cameras
- Honeywell Security Security cameras
- Bolide Security cameras
- MOBOTIX Security cameras
Honeywell GARD USB threat report 2024
DownloadThe role of artificial intelligence to transform video imaging
DownloadAccess control system planning phase 1
DownloadKey Findings from the 2024 Thales Cloud Security Study
DownloadFacial recognition
Download