Security communication
Critical Response Group (CRG), the global pioneer in critical incident mapping data, and Intrado, a global pioneer in emergency communication services and end-to-end solutions announced the integration of CRG within Intrado’s FirstNet® certified Safety Shield application. This integration brings CRG’s critical incident mapping data into Intrado’s comprehensive Safety Suite, an end-to-end incident management solution designed to enhance school and enterprise safety by helpi...
BlackFog, the pioneer in ransomware protection and anti-data exfiltration (ADX), announced it has made new appointments to strengthen its leadership team as it witnesses significant growth. John Sarantakes has joined as Chief Revenue Officer, and Mark Griffith has been appointed as Vice President of Strategic Sales. As one of its founding team members, CMO Brenda Robb has also been promoted to President of BlackFog. As executive director of the company, Brenda led the expansion of the company i...
Bosch Rexroth, the automation branch of the Bosch group, has over 32,000 employees worldwide and specialises in advanced drive and control technologies. At their Customer and Innovation Centre in Ulm, Germany, they develop innovative solutions for the future of automation, such as the Smart Flex Effector, a compensation module aiming to revolutionise the industry. Smart flex effector Smart flex effector–automate the impossible David Lehmann, System Architect at Bosch Rexroth, explains w...
March Networks®, a pioneer in intelligent video surveillance, is pleased to announce a number of enhancements and new features in the company’s mid-year software release. This release focuses on future-proofing, including enhanced analytics to meet the evolving demands of modern security, making the user experience easier and boosting efficiency through technology and automation. Evolving demands of modern security Future-Proof: Enhanced AI Analytics: Attribute search: Search f...
Following the publication of the EC’s White Paper "How to master Europe's digital infrastructure" Euralarm is emphasising the potential risks and challenges associated with an uncoordinated and premature shutdown of 2G and 3G networks. The aforementioned White Paper discusses the need to adapt spectrum management to meet the demands of the Digital Decade, including the coordinated shutdown of 2G and 3G networks while ensuring the continued support of essential legacy services such a...
Ajax Systems is proud to announce its victory at the PSI Premier Awards 2024. The company's KeyPad TouchScreen Jeweller device has been named the winner in the Access Control Product of the Year category. The PSI Premier Awards, organised annually by PSI Magazine, a top professional security media outlet in the UK, celebrate the pioneering technologies and businesses in the security sector. Winners are selected by security installers and systems integrators through votes on the PSI website. DE...
News
The requirement for open server-based telephony systems has increased multifold in the last few years since it gives the freedom to choose a hardware platform of one’s choice. Open server-based systems Traditional hardware-based PBXs are slowly getting replaced by open server-based telephony systems. This is largely because hardware-based PBXs create hardware dependency, require manual upgrading, and incur heavy wiring costs. ANANT UCS ANANT UCS improves employees' productivity and speeds up the decision-making process Matrix has designed an enterprise-grade highly capable, durable, scalable, and efficient Unified Communication Software solution - ANANT. ANANT UCS can be scalable to up to 5000 IP Users to fulfill the communication requirements of large enterprises. The hardware-independent platform provides customers with a choice to select a reliable server as per their requirements. With a range of enterprise-grade calling features like built-in Auto-attendant, Voicemail, Unified Messaging, etc., it improves employees' productivity and speeds up the decision-making process. Single platform ANANT connects all the employees on a single platform. The employees can connect from anywhere at any time by installing Matrix VARTA on Laptops /Tablets /PCs /Smartphone devices of their choice. Our UC Server offers a range of enterprise-grade calling features that improve employees' productivity and speed up the decision-making process. With an in-call redundant system, ANANT boasts of providing the best customer engagement. By integrating ANANT with VoIP Gateways and IP Phones, customer requirements with multiple location communication set-ups can be met. Key features: 5000 IP Users. 1024 Concurrent Calls. 512 Three-party Conference. 64 Simultaneous Call Recording. Other features: RAID1 and RAID5 Support. Hardware Independent. Active-standby Redundancy. Built-in Auto-attendant and Voicemail.
Advancements in technology and industry practices as well as changes in regulatory agendas and directives make it necessary to continuously initiate new standards and update existing standards to ensure they remain relevant and effective. In this context, leadership in standardisation is a crucial factor for achieving the desired benefits and outcomes both for industry and society. That requires the ability and willingness of an actor to initiate, influence and shape the development and implementation of standards that are relevant, effective, and legitimate. Euralarm provides that leadership in standardisation. Process of standardisation Standardisation, the process of developing and promoting, and possibly mandating standards, processes and regulations has a long history and might be called as old as the human race itself. During Greek antiquity, standardised units of measurement were found to be convenient for trade within the Mediterranean region and these units became increasingly common to different city-states. The establishment of such shared concepts and meanings is a precondition for cultural interaction. It wasn't until the late 18th century that standardisation was for the first time thoroughly systematised. The establishment of such shared concepts and meanings is a precondition for cultural interaction Attempts at the large-scale setting of norms and standards gained momentum and introduced an entirely new rationale to the process of standardisation. Jumping further forward in time, Europe nowadays has three European standards bodies: CEN (Comité Européen de Normalisation, 1961), CENELEC (Comité Européen de Normalisation Électrotechnique, 1973), and ETSI (European Telecommunications Standards Institute, 1988). The technology standards that they provide, focus on ensuring quality, reliability, consistency, compatibility, interoperability and safety. Importance of standardisation The work and results of these European Standardisation Organisations (ESOs) are intricately linked to the work and goals of the European Commission. Standardisation has played a pioneering role in allowing goods, services, money and people to move freely between EU countries, making life easier and better for Europeans and business. This is the EU Single Market and is one of the pillars of the European Union. Standards support market-based competition and help ensure the interoperability of complementary products and services. They reduce costs, improve safety, and enhance competition. Due to their role in protecting health, safety, and security, standards are important to the public Due to their role in protecting health, safety, and security, standards are important to the public. The EU has an active standardisation policy that promotes standards to better regulate and enhance the competitiveness of European industry as well as to advocate EU values. Indeed, the success of the market-driven and consensus-based European standardisation system has had significant economic benefits in the development of specific industries. Above all, standards allow businesses of all kinds and sizes to enter the international market. Not a static or uniform phenomenon Whereas uniformity is the goal of standardisation, the process of standardisation itself isn't uniform nor standardised at all. It is influenced by numerous factors, such as technological change, market dynamics, consumer preferences, regulatory frameworks and societal values. Therefore, standardisation requires constant adaptation and coordination among different actors, such as industry, government, academia, civil society and international organisations. Also, there is a growing focus on sustainability and an ever-increasing focus on digitisation There are several megatrends that are currently affecting the fire safety and security industries as well as the standardisation for these industries. The threat of trade wars constantly lurks and protectionism reigns supreme. Inflation has been high in recent years and the supply chains have been regularly disrupted. Moreover, most sectors are experiencing labour shortages. Additionally, there is a growing focus on sustainability and an ever-increasing emphasis on digitisation. Green and digital Europe All these developments have led to a tsunami of new (European) regulations. Two important ‘drivers’ behind this are the Green Deal and the Digital Decade, reflecting the green and digital transition of Europe. Under the umbrella of these programs, a wide variety of regulations is introduced having an impact on all aspects of the industries, ranging from products and project design to installation, operations and response and maintenance. Examples of regulation under the Digital Decade with a high impact are the Artificial Intelligence (AI) Act, Data Act, the Delegated Act of the Radio Equipment Directive and the Cyber Resilience Act. An overview of the impact of the several regulatory acts is shown in the table below. An overview of the impact of the several regulatory acts Examples of regulations under the Green Deal with a high impact are the regulation on Eco-design and the requirements for sustainable products (ESPR), the Construction Products Regulation (CPR) and the Battery Directive. An overview of the impact of the several ‘green’ regulatory acts is given in the table below. An overview of the impact of the several ‘green’ regulatory acts Leadership in standardisation The lack of knowledge on these subjects and the shortage of expertise to deal with these is apparent Many of the regulations such as Cybersecurity, AI, Data Transparency, are so-called horizontal in nature, meaning that they cover a broad number of sectors. While these are not directly focussed on the industry, they are affecting it, and this is creating numerous challenges for the industry. The lack of knowledge on these subjects and the shortage of expertise to deal with these is apparent. Euralarm is supporting companies and national associations that want to meet those challenges thereby establishing leadership. That role is filled in a variety of ways. First, Euralarm initiates new standards through the bodies in which it is represented. For example, two service standards that were first issued by Euralarm as guidelines were later elevated to European standards. Today, EN 15763 specifies minimum requirements for service providers as well as the competencies, knowledge and skills of their involved staff charged while EN 50710 defines the requirements for the provision of secure remote services for fire safety systems and security systems. Technological, social or economic developments A good example is the overhaul of the needs for intruder and hold-up alarms as defined in EN 50131-1 Secondly, Euralarm is pioneering the actualisation of existing standards to ensure they evolve with technological, social or economic developments. A good example is the overhaul of the requirements for intruder and hold-up alarms as defined in EN 50131-1. The outlines of this overhaul were drafted by Euralarm as a memo in 2020. Following that first draft, Euralarm provided the relevant Technical Committee (CLC/TC 79/WG 1) with conceptual drawings for a future-proof and function-oriented standard. Euralarm was then actively involved in compiling the new text for the adapted standard. Development of horizontal standards Finally, Euralarm closely monitors the development of horizontal standards and acts where necessary to adjust the development. An example of this was given by Euralarm’s involvement in supporting Technical Committees that faced the impact of cybersecurity regulations. For example, Euralarm provided Guidance and explanatory documents to the CLC/TC 79 community to ensure that the different players in Security and Fire Safety understand their roles and responsibilities with regards to cybersecurity. It also ensured that RED DA standards (prEN 18031 series) were in line with the requirements of alarm systems. The same goes for monitoring the activities in artificial intelligence (CNC/CLC/JTC21), intervening where necessary to ensure that developments in artificial intelligence don’t conflict with the requirements of security and fire safety systems and services. Both standardisation and regulatory level Euralarm's involvement is not only limited to standardisation level but also relates to law Euralarm's involvement is not only limited to standardisation level but also relates to regulation. With the Data Act, for instance, Euralarm played a significant role in limiting the mandatory sharing of data for security systems and avoiding conflicts with National Regulations on security. The same goes for the Digital Product Passport (DPP) where Euralarm is ensuring the compatibility between DPP requirements under other regulations, such as the Eco-design Directive for Sustainable Products (ESPR), CPR and Battery Regulation. Prepare themselves The tsunami of new regulations will affect the security industry in all European countries. Therefore, it is of vital importance to stay informed, either via national associations such as APSEI or Euralarm via webinars, guidance papers, articles and training courses. For the individual companies, it is of utmost importance that they ensure that their personnel are qualified to cope with these new types of regulations. For those looking for support, Euralarm will gladly provide leadership on the topic of standardisation.
Valsoft Corporation Inc., a Canadian company specialising in the acquisition and development of vertical market software businesses, is pleased to announce the acquisition of Asher Group, a pioneering provider of scalable communications for emergency management agencies and cutting-edge human resources solutions. Founded in 1995, Asher focuses on the intersection of communication and computing technology, most notably with the development of Hyper-Reach. The Hyper-Reach platform enables hundreds of public safety and emergency management agencies to easily communicate with the public and others across multiple diverse communications platforms at an enormous scale. Areas of security and new capabilities Asher provides mass news to private firms as well as telephone-based access to systems In addition to Hyper-Reach, Asher provides mass notification to private enterprises as well as telephone-based access to pioneering edge human resource systems, including UKG Pro and UKG Ready. “We are thrilled to join the Valsoft family of software companies,” said Sam Asher, President and Founder of Asher Group. “Their deep expertise in developing and operating cloud-based software companies will help us strengthen our offerings to customers, especially in the areas of security and new capabilities that go beyond traditional emergency alert services.” Acquisition of Asher Group “Asher Group's exceptional track record of industry-pioneering solutions and customer service aligns perfectly with Valsoft's mission to invest in and grow companies with strong potential,” explains Kent Howard, Operating Partner at Valsoft Corporation. “We are committed to supporting Asher Group in its next phase of growth, ensuring that their tradition of excellence continues to flourish under our stewardship.” The acquisition of Asher Group marks Valsoft Corporation’s strategic entry into the Mass Notification Software space. Tequity Advisors, a brokerage firm with a deep understanding of the SaaS market, played a pivotal role in the swift closure of the deal for Asher Group. Working with Valsoft’s operating division, Aspire Software, Asher Group will now have the opportunity to further strengthen its presence in the market while ideally placed to roll out significant product and service improvements.
In the digital age, businesses are constantly looking for new methods to boost communication efficiency and productivity. As technology advances, IP telephony systems have gained popularity for their flexibility, advanced features, and cost-effectiveness. However, before deciding to invest in an IP telephony system, it's essential to understand the latest trends, the factors influencing IP telephony, and the available solutions. Let's explore these aspects to help them make a well-informed decision. Trends in IP telephony systems Advance Towards Unified Communications: Companies are combining multiple communication channels, including voice, video, messaging, and collaboration tools, into single platforms. This trend simplifies communication processes, enhances productivity, and improves the user experience. Emphasis on Mobility and Remote Work: With the rise of remote work, IP telephony systems are increasingly focusing on mobility features. Mobile apps allow employees to make and receive calls, access voicemail, and collaborate from anywhere, enhancing productivity and flexibility. Growing Adoption of Cloud-Based Solutions: Cloud-based IP telephony systems provide scalability, flexibility, and cost-effectiveness. These solutions enable businesses to access communication tools from anywhere with internet access, making it easier to adapt to remote work trends and seamlessly scale operations. Improved Security Measures: In response to the growing threat of cyber-attacks, IP telephony systems are integrating strong security features, including encryption, authentication mechanisms, and adherence to industry regulations, to protect sensitive data. Four components that enhance an IP telephony system Comprehensive Features: Assess the IP telephony system's feature set to ensure it meets their business needs. Features like auto-attendant, call routeing, voicemail-to-email, conferencing, and CRM integration can boost productivity and streamline communication processes. Scalability: A scalable IP telephony system can adapt to the business's changing needs, whether it's expanding operations, adding new users, or integrating advanced features. Scalability ensures that the communication infrastructure evolves with the business smoothly and without disruptions. Reliability and Backup Systems: Consistent communication is crucial for uninterrupted business operations. Seek IP telephony solutions that include redundancy and failover features to reduce downtime during network disruptions or hardware failures. Security and Regulatory Compliance: Ensure the security of the communication infrastructure by choosing an IP telephony system equipped with strong security measures. Features like encryption, authentication protocols, intrusion detection, and adherence to industry regulations such as GDPR are critical factors to prioritise. How the Matrix IP telephony system can meet its requirements? Matrix Telecom Solution provides a complete IP telephony system that includes all the necessary components for smooth communication within the business. With Matrix, they can: Utilize Advanced Capabilities: Matrix IP telephony systems offer a diverse array of advanced features such as auto-attendant, call forwarding, voicemail, conferencing, and more, enabling the business with improved communication functionalities. Enjoy Expandability: Matrix IP telephony systems are engineered for seamless scalability, enabling them to incorporate additional users, features, and locations as their business expands. Guarantee Reliability and Backup: Matrix ensures continuous communication with redundant architecture and failover mechanisms, minimising interruptions from network issues or hardware failures. Improve Security and Adherence to Regulations: Matrix places a strong emphasis on securing the communication infrastructure by incorporating encryption, authentication, and compliance protocols to safeguard sensitive information and meet regulatory requirements. Choosing to invest in an IP telephony system is a strategic move that can transform communication within the organisation. By examining current trends, critical components, and options like Matrix Telecom Solution, they can harness the benefits of IP telephony to enhance efficiency, collaboration, and business expansion.
dormakaba has earned prominent recognition for its sustainability management and is listed as one of the 500 'World’s Most Sustainable Companies 2024' by TIME magazine. The ranking has been developed for the first time by TIME in partnership with Statista with the aim to recognise corporate responsibility and advance sustainable practices. "We have worked diligently to establish a pioneering sustainability program in our industry, and we are delighted to have been recognised by TIME magazine for what we have achieved. Of course, sustainability management is a marathon, not a sprint. So, we are fully dedicated to continuing on this journey together with our colleagues across the world," said Stephanie Ossenbach, Group Sustainability Officer of dormakaba. Other significant recognitions The comprehensive methodology of the selection tapped from a pool of more than 5,000 of the world's largest and most influential companies, assessed over 20 sustainability criteria, including performance in relevant areas of environmental and social KPIs, such as carbon emissions, energy intensity, employee turnover and work safety, public commitment to sustainability targets and transparent reporting. The top-scoring 500 companies were awarded as 'World’s Most Sustainable Companies 2024'. During this year dormakaba achieved other significant recognitions for its sustainability performance, such as a gold medal from the sustainability assessment firm EcoVadis, Prime Status by the ISS ESG Corporate Rating and AA rating by MSCI. Further, dormakaba was recently named as one of Europe’s Climate Leaders by the Financial Times.
Secure email and file transfer provider Zivver has announced a new strategic partnership with data privacy consulting firm Lex Dinamica, specialising in data protection and AI end-to-end solutions and advisory. Email security is one of the biggest challenges facing organisations now. The UK Government Cyber Security Breaches Survey found that 50% of businesses report having experienced a breach, with phishing emails identified as the most common mode of attack. Added to this is the risk of human error, which accounts for more than 80% of data breaches, according to the ICO. Data protection regulations Lex Dinamica’s diverse client base in drives such as financial services, FMCG, and health and life sciences Through this partnership, Lex Dinamica’s diverse client base in industries such as financial services, FMCG, and health and life sciences, will have access to Zivver’s range of cloud-based digital communication products, including Zivver Secure Email and Secure File Transfer. All comply with data protection regulations, including GDPR and DORA, making it the ideal solution for organisations looking to add to their security suite while also managing compliance with existing and emerging regulations. Challenges posed by AI adoption Rick Goud, Founder and CIO at Zivver: “The role of IT teams is ever-expanding and the expectation for them to safeguard organisations against inbound and outbound threats no doubt adds an increasing amount of pressure. Implementing a secure email infrastructure with a smooth user experience will help boost productivity and ultimately reduce time spent firefighting. It’s always a proud moment to start a partnership with an organisation whose focus on growth and understanding of the regulatory environment aligns with ours. We look forward to and will continuously work towards helping Lex Dinamica deliver innovative products to their customers.” Lex Dinamica specialises in data privacy, data governance and AI solutions Lex Dinamica specialises in data privacy, data governance and AI solutions. Founded in 2021 with a focus on addressing regulatory compliance and the challenges posed by AI adoption, cloud transitions, and hybrid work models, Lex Dinamica partners with clients globally to provide sustainable, impactful solutions. Digital communication solutions Alex Nugeé, Manager at Lex Dinamica added: “We looked at Zivver because they have a proven track record in providing secure digital communication solutions to a broad range of sectors. Whether it be a public or private organisation, Zivver can adapt and implement its technology to fit the structure. We felt like this was the ideal commercial and cultural fit for Lex Dinamica." “Similar to us, they pride themselves on remaining on top of evolving regulations and when we choose to collaborate with an organisation, we look for those who understand and recognise the global impact of changing legislations so that we can meet the needs of our international client base.”
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
GSX 2023 marks a poignant moment for the security industry as an increasingly complex risk landscape converges with the acceleration of technology innovation. Emerging from this environment are three key trends that will dominate the conference and the future of the security industry: (i) the adoption of AI, (ii) the use of predictive analytics, and (iii) a hybrid global and local risk management approach. As Chief Security Officer of Crisis24, a GardaWorld company, I regularly advise clients on how these trends are evolving and impacting their security and risk management approach. Here’s how we can expect to see them discussed at the show next month: Trend 1: Artificial intelligence is the new industry standard. AI is this year's buzzword. While AI is not new to the industry, this year it has become a standard to operate with AI being adopted or expanded more ubiquitously. Legacy AI-enhanced security offerings that have been years in the making are becoming more advanced and are being integrated into expert analyst teams to leverage the best of both man and machine. Limitations AI augments the data processing ability; however, human-led intelligence is still necessary AI can generate unparalleled levels of data and insights, but it also has its limitations. AI does not have the emotional intelligence that can influence decision-making. For instance, our Crisis24 analyst teams know that every one of the intelligence alerts they provide to leadership may save a life or protect a business. AI augments the data processing ability; however, human-led intelligence is still necessary to effectively elevate knowledge of those threats through an organisation to incite action. Trend 2: Predictive analytics powered by AI will transform security operations. Predictive analytics enabled by AI will allow for more precise planning and execution of true emergency management. Those living or operating in conflict zones must be ready to spring into action and predictive analytics can help better evaluate risks, threat levels, and the probability of certain events. When I served in Iraq in 2003, our greatest challenge was operating in an unpredictable environment and navigating the many unknown threats. With these large-scale threats, it was difficult to account for the vast array of variables involved and ensure that all parties were protected. Broad and instant visibility Predictive analytics provides broad and instant visibility into numerous potential outcomes, impacts, and mitigation strategies for a wide variety of threats. When dealing with risks that are constantly evolving and quickly accelerating, the insights from predictive analytics can have a direct impact on risk management, mitigation strategies, and preparedness levels. Predictive analytics can anticipate the ripple effect that threats can have on organisations, their people, and their assets and enable security teams to plan. Trend 3: Risk mitigation is increasingly both global and hyper-local. A company’s workforce is often scattered across the country or the world, working from home or on the go Remote work and a flood of 24/7 data sources have driven demand for timely, accurate, and hyper-local intelligence. Where before an organisation may have had a handful of facilities around the world where its employees gathered, now a company’s workforce is often scattered across the country or the world, working from home or on the go. Preventive mitigation steps To keep their people and assets safe, business pioneers need to know what’s happening in all corners of the globe, while also easily accessing details on what is happening at the street corner level. How a business takes care of its people, including anticipating risks and taking preventive mitigation steps as well as responding quickly in the face of threats, can directly affect its reputation. Every company is in the business of safety and security when it comes to looking after its people on a global, national, and increasingly hyper-local scale.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organisations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customised questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
Case studies
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution will be deployed at Appomattox County Public Schools (ACPS), Virginia to protect students and faculty against gun-related threats. ACPS Comprising four schools - a primary, elementary, middle, and high school - ACPS educates approximately 2,500 students annually. With a commitment to fostering a safe and nurturing learning environment for all students, the school has implemented several security measures in recent years. These include assigning individual School Resource Officers (SROs) to each school, facilitating comprehensive walkthroughs of all facilities by local and state law enforcement, installing exterior door alarms and student computer monitor software, and enhancing its after-hours surveillance system. ZeroEyes will be the latest addition to this multilayered security approach. School safety “School safety is of the highest priority right now, and to have a technology that could potentially save a life or stop a threat before anything happens made ZeroEyes a no-brainer for us,” said Philip Amos, Supervisor of Security and Technology, Appomattox County Public Schools. ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. ZeroEyes Operations Center If a gun is identified, images are instantly shared with ZOC staffed 24/7/365 by specially trained U.S. military If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement, SROs, and ACPS staff as quickly as 3 to 5 seconds from detection. Swift and accurate security communications "In the instance of a gun-related threat, first responders and school leadership must receive swift and accurate security communications to help them navigate the potentially deadly situation,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “We are proud that ZeroEyes has been chosen to provide this type of situational awareness to Appomattox County Public Schools. Their proactive stance against gun violence is truly commendable."
GX-MAX-DT35B Smart Care Medical Alarm comes with a brand-new case design. The battery level and the cellular signal strength will be indicated through the white bar on the top cover. The system supports VoLTE (voice over LTE), offering better quality of voice communication and calling experience. In addition, the current status of the system, for example, in learning mode or alarm reporting, will be also indicated through the LED backlight of the large Help button. Users can always be informed of the system status and have peace of mind. GX-MAX-DT35B GX-MAX-DT35B Smart Care Medical Alarm is an all-in-one wellness and personal safety medical alarm solution GX-MAX-DT35B can be compatible with Bluetooth medical devices, like blood glucose/blood pressure monitors, pulse oximeters, etc., to track medical data and remote monitoring directly from caregivers/physicians; and also has telecare alarm features, including emergency monitoring, inactivity monitoring, voice control, and home automation capabilities to assist seniors to have a more secure, healthy living. GX-MAX-DT35B Smart Care Medical Alarm is an all-in-one wellness, and personal safety medical alarm solution, bridging medical health monitoring and emergency alarms to keep seniors safe in their own homes. Functions Bluetooth Medical Device Pairing GX-MAX-DT35B is compatible with BluetoothMedical devices, like blood pressure/blood glucose monitors, pulse oximeters, thermometers, etc., to track health and medical data and allow caregivers/physicians to remotely monitor and provide treatment as needed. Wi-Fi Hotspot GX-MAX-DT35B can serve as a Wi-Fi hotspot, allowing users’ computers, smartphones, or other devices to connect and access the Wi-Finetwork. Smart Home Automation ZigBee, Z-Wave, or Bluetooth automation devices are incorporated into GX-MAX-DT35Bcreates a smarter and safer home, by autotuning on hallway lights at night to decrease the chance of a fall; or auto turn on the heater if there’s a sudden temperature drop. Location Tracking GX-MAX-DT35B can be paired with the BRPD-1 Bluetooth pendant, a small wearable panic button that partners with a smartphone application for GPS location reporting and triggers a help alarm with one button press, whether the user is at home or out for a walk. Connected for Healthier, Secure Living Voice Control GX-MAX-DT35B is compatible with Google Home and Amazon Alexa voice control to control home electronic devices, allowing seniors to use their voice to make their environment more suitable without lifting a finger. Pivotell ® Advance Automatic Pill Dispenser GX-MAX-DT35B is compatible with Pivotell ®Advance Automatic Pill Dispenser, keeping secure of all pills, reminding users to take their medication, keeping track of their medicine intake, and allowing caregiver/physician to monitor pill-taking results/records, and keeping an eye on user needs. Voice over Internet Protocol (VoIP) &DECT GX-MAX-DT35B’s built-in VOIP function allows users to initiate two-way voice calls to contact CMS and family members during alarms and emergencies. With a built-in DECT module (forGX-MAX5/8 models) or plug-in EX-1 DECT module (for GX-MAX15/18 models), GX-MAX-DT35B can pair with voice extenders, talking pendants, call points, etc., placed around the home to create a safety net and peace of mind. Visual Monitoring and Verification GX-MAX-DT35B can integrate Camera PIR Motion Sensors to deliver real-time visual monitoring and verification. When an emergency occurs, alerts are immediately sent to family members, and the Monitoring Centre to verify the event and send immediate assistance as needed. Safety & Inactivity Monitoring GX-MAX-DT35B can support wireless sensor devices, allowing users to add in smoke detectors, water leakage sensors, and gas sensors to monitor emergencies; and motion sensors, door contacts, sensor pad transmitters for inactivity monitoring, to build a healthier, safer independent living. Features Communication Path Options: IP (Ethernet), LTE. Support for VoLTE (Voice Over LTE). Built-in Module: RF (for all models), DECT (for GX-MAX5/8 models). Optional DECT Module (for GX-MAX15/18 models). Protocol Module Options: Zigbee, Z-Wave, Bluetooth. Wi-Fi hotspot capability. Support external antenna capability (GX-DT35B-EX only). Able to support multiple Communication protocols with Monitoring Centres for Alarm Reporting. Compatible with Bluetooth (BLE) medical devices. Voice over Internet Protocol (VoIP) capabilities. World-class certified RF range, reliability, and performance. Supports Pivotell ® ‘Advance’ Pill Dispenser integration. ZigBee or Z-Wave compatible home automation features. Compatible with Amazon Alexa & Google Home voice control. 24/7 Environment Safety Monitoring. Energy Management Capabilities. Voice Prompt feature alerts the user upon designated events and status. Comprehensive help/nurse arrival function. Multi-colour of the Help button backlight to indicate the current status of the system. Multi-party emergency intercom system capability. Supports multiple programming methods. Automatic check-in reports. Remote firmware update capabilities.
Air Power East, a family-run business with over 30 years of experience as a premier distributor of Atlas Copco, specialises in providing high-quality compressed air systems to various industries across East Anglia. Under the leadership of Jason Sewell, the company has established a strong reputation for delivering reliable and efficient solutions. However, they faced a significant challenge in ensuring their systems were completely leak-free, a concern shared by their clients, including an agricultural manufacturer managed by Paul Musgrove. Jason highlighted the issue, stating, "Customers have been asking us to make sure that we can prove something that's completely leak-free." Challenge Musgrove was seeking an effective way to manage and maintain their compressed air systems Concurrently, Paul Musgrove was seeking an effective way to manage and maintain their compressed air systems, with a specific focus on reducing energy waste and operational costs, emphasising the need to "save money where we can, especially with energy prices as they are." This dual challenge called for an innovative approach to maintain Air Power East's commitment to quality and efficiency while addressing the specific needs of their clients. Solution To address the intertwined challenges, Jason reached out to Baseline-RTS, an independent supplier of training and predictive maintenance equipment. They introduced Air Power East to the FLIR Si124 camera, an advanced acoustic imaging tool, capable of accurately detecting air leaks. Jason explains, "We sat down and did a bit of market research on a few different models and then came to the top. So, we contacted FLIR to come along and show us the Si124, and we've loved it ever since." One-handed tool designed to quickly locate pressurised leaks in compressed air systems or detect discharge The Si124 is a lightweight, one-handed tool designed to quickly locate pressurised leaks in compressed air systems or detect partial discharge from high-voltage electrical systems. It is equipped with 124 microphones to produce a precise acoustic image that visually displays ultrasonic information. This image is transposed in real time on top of a digital camera picture, allowing users to accurately pinpoint the source of sound. The Si124 camera can detect issues up to 10 times faster than traditional methods, even in loud industrial environments. Additionally, it is compatible with FLIR Thermal Studio suite for offline editing, analysis, and advanced report creation, and it can help facilities save money on utility bills and delay the expense of installing new compressors. Results The use of the Si124 camera brought about transformative results. Jason explained the camera's effectiveness: "We've managed to walk around with the customer, showing them exactly what we're finding on our screen. And if we do find any small leaks, we can rectify them and then we can prove to the customer that their system is leak-free." This approach not only heightened the efficiency of the compressed air systems but also solidified customer trust in Air Power East's services. Camera enabled the detection of leaks amounting to approximately 100 cubic feet per minute Quantitative results underscore the Si124's impact. The camera enabled the detection of leaks amounting to approximately 100 cubic feet per minute (CFM), which is roughly 50 litres per second. This translates to about 18.5 kilowatts of compressor power, pioneering to substantial energy and cost savings, particularly in light of rising energy prices. Conclusion Air Power East's adoption of the FLIR Si124 camera to address the complex challenges in compressed air systems illustrates the power of innovative technology in industrial settings. The successful detection and rectification of air leaks not only enhanced operational efficiency but also led to considerable energy and cost savings for the agricultural manufacturer. This case study demonstrates the effectiveness of advanced tools in solving intricate industrial problems and highlights the importance of technology-driven solutions in optimising industrial processes.
A highly esteemed private Science and Technology University situated in the Charotar region of Gujarat originated from a parent organisation dedicated to social service through education for over 125 years. Recognising its excellence, the Gujarat Government has designated the university as a "Centre of Excellence." With approximately 1700 faculty members and 8000 students, the institution stands as a prominent hub for education in the region. Modern communication technology This university holds a distinguished reputation among science and technology enthusiasts Challenges - This university holds a distinguished reputation among science and technology enthusiasts. Its enrolment has increased thanks to successful educational approaches, rendering outdated communication technology within its buildings obsolete. Furthermore, there are plans for expansion in the upcoming academic year, incorporating modern communication technology to streamline communication across various buildings and offices. To further delve into the difficulties they face: Outdated and insufficient capacity: The system demonstrated obsolescence and inadequate capacity to handle communication loads within both single and multi-location institutions. Communication issues among multi-location offices: The university was in the process of expansion, establishing a new building situated at a distance that required seamless connectivity with the main building. Lack of modern features: The absence of contemporary features such as Multi-party Conferencing, Unified Services for Mobility, etc., provides them with a motive to modernise their antiquated communication system. Scalability and redundancy: They needed a solution that could easily adapt to future requirements, guaranteeing seamless scalability for upcoming applications. Furthermore, the incorporation of redundancy (backup) was essential to ensure uninterrupted operations. Streamlining communication processes Matrix Comsec meticulously examined the challenges faced by the university authorities Solution - Matrix Comsec, in partnership with Rutvi System, meticulously examined the challenges faced by the university authorities. Collaboratively, they formulated a tailored solution for multiple locations. The proposed strategy concentrated on improving and extending the existing infrastructure through the integration of Matrix Telecom Solutions. This included the implementation of a Hybrid IP PBX and the integration of a Media Gateway to streamline communication processes, preparing them for future requirements. The Matrix solution includes: The Hybrid PBX, known as ETERNITY LENX, with Gateway, was situated within the University complex at location 1. Alongside the digital key phone, analog phones were linked in location 1. Location 1 was linked to location 2 via an IP connection. The ETERNITY LENX, along with SARVAM Gateway ENT, facilitated a setup of PRI Gateway from location 1, assigning an IP connection to ETERNITY MENX at location 2. In location 2, a collection of digital key phones and several analogue phones were interconnected. The Matrix Multi-Location Communication solution seamlessly merged both sites, offering a range of contemporary communication features. This results in enhanced adaptability and flexibility within the organisation, delivering optimal benefits for modern communication needs. Enhancing employee productivity Results - The adopted solution enabled them to experience the benefits of up-to-date communication features while ensuring smooth communication throughout their expanded infrastructure. The Hybrid PBX Systems, namely ETERNITY MENX16SAC and ETERNITY LENX27SDC, offered a user scalability capability of up to 2000 IP Users, positioning them for future needs. Furthermore, the Hot Swappable Card feature guarantees uninterrupted operation and simplified maintenance. The incorporated Redundancy ensured a high level of availability and seamless communication. The SARVAM Gateway ENT Licence empowered them to utilise SARVAM both as a Unified Communication Server and Gateway concurrently, eliminating the need for additional investments. EON510 - Premium Digital Key phone comes with next-gen call amenities like Global Directory Integration, and Advanced Call Routeing. This helped the institution to make the best out of these modern features by enhancing employee productivity and efficiency. Matrix's Multi-Location solution allowed the University to effortlessly link various buildings, and the contemporary communication features made them more efficient and well-prepared for the future.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation announced that its proactive AI gun detection and intelligent situational awareness platform has been selected by Woodbine Community School District in Woodbine, Iowa, to protect students, faculty, and staff from individuals attempting to bring illegal guns onto the campus. U.S. school shooting rates continue to surge. Enhancing school safety Woodbine Community School District, a rural pre-K-12 public school district that operates two schools and serves 500+ students, adopted ZeroEyes to address these growing safety concerns. “We are dedicated to enhancing school safety so that our teachers can focus on education and students can concentrate on learning,” said Justin Wagner, superintendent, of Woodbine Community Schools. Instant verification, validation, and communication Step in a series of proactive mitigation and safety precautions we are taking to keep students and staff safe" “Choosing ZeroEyes means instant verification, validation, and communication to local law enforcement of anyone wishing to harm students or staff with a gun." "Their outstanding team and 24/7/365 in-house operations centre provide us with the utmost confidence that we are providing the most advanced notification system available. This is an important step in a series of proactive mitigation and safety precautions we are taking to keep students and staff safe.” Actionable intelligence If ZeroEyes detects a gun on campus, the software will instantly send images to the ZeroEyes Operation Centre (ZOC), staffed by specially trained U.S. military and law enforcement veterans, 24/7/365. These experts will verify the threat and dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to local Woodbine staff and first responders in as fast as 3 to 5 seconds from detection. AI gun detection technology "We're proud to see Woodbine Community Schools adopt our AI gun detection technology,” said Mike Lahiff, CEO and co-founder, of ZeroEyes. “We see it as our duty to help create a safer learning environment for children. We hope to see a day where schools are free from violence, ensuring students, parents, and staff can live without fear of gun-related threats.”
A multinational corporation, headquartered in Mumbai, ranked among the Fortune 500, is sustained by an exceptional workforce exceeding 187,000 individuals from 100 different nationalities. The corporation is founded on the principles of creating value for stakeholders, with a history of over seven decades of responsible business practices. Need for a modernised solution Their enterprises have evolved into global pioneers in various sectors including metals, pulp and fiber, chemicals, textiles, carbon black, telecom, cement, financial services, fashion retail, and renewable energy. The financial services arm of this conglomerate, to expand its business, needed a well-crafted, modernised Telecom solution, thus bringing them to the forefront of Matrix. Conglomerate's challenges The Financial services arm of this multinational corporation in Mumbai was facing issues ranging from modernisation to optimisation of communication. The challenge of telecommunication without laying Telephone cables for their new office was prominent. An arrangement had also to be made for utilising existing PRI lines and modernising them to meet their demands for new establishment. To elaborate on their challenges: Adoption of modern communication with existing Infrastructure: Their investment in existing infrastructure needed protection, and a provision had to be made to modernise the communication using existing infrastructure. Scalability: They required a Telecom solution that was future-proof, that is, easily scalable to fulfill the needs of future applications. Additionally, it had to be ensured that the operations were flawless, especially during critical work hours. Requirement of modern phone features: They required advanced features like Global Abbreviated Dialing, Auto Redial, Call Pick Up, and Internal Call Restriction, to become efficient in day-to-day operations. Managing different protocols: Interface with existing and different telecom networks requires managing different protocols, which can be cumbersome, time, and energy-consuming. Stipulated Time-frame: The transition and modernisation, simultaneously, had to be completed within a stipulated time frame. Solution The solution was based on the prelude of utilising existing infrastructure and amalgamation of Matrix solutions Matrix Comsec in partnership with SMB Automation analysed the challenges of communications and crafted a Telecom solution that was the best fit. The solution offered was based on the prelude of utilising existing infrastructure and amalgamation of Matrix Telecom Solutions within a stipulated time frame. VoIP-based communication This included employing Embedded IP-PBX to empower VoIP-based communication, and simultaneously integrating VoIP-PRI Gateway that optimised the feasibility of communication and helped the firm become more efficient by terminating PRI lines. The Telecom solutions include: The Embedded IP-PBX, PRASAR UCS - SPARK200, enabled them up to 2100 IP users. Additionally, features like up to 550 Concurrent calls, Concurrent 21 Calls Tapping, etc. took them to a notch above through a uniquely crafted telecom solution. The VOIP-PRI gateway included SETU VTEP 2P, which comes with features of 125 SIP Trunks and 120 simultaneous calls. The gateway enabled them to terminate 8 Copper PRI lines and thus transition towards IP. The VARTA Extensions enabled them to access Real-time UC features like one-touch access to Extension numbers, Instant messaging, monitoring the Real-time status of employees, etc. The IP phones included SPARSH VP510E and SPARSH VP210. This came with features like an LCD Graphical display, Context-sensitive keys, Built-in 16 DSS Keys, Polyphonic ring tune, and more. Results and benefits The implemented Telecom solutions enabled them to reap the benefits of modern communication while also enabling them to make the best out of the existing infrastructure. Matrix engineered a Telecom solution with our Embedded IP - PBX, PRASAR UCS enabling them to transit towards wire-free and modern communications, addressing the challenge of telephone cabling. The VOIP-PRI gateway, SETU VTEP, provided much-needed Least-cost routing ensuring that the call is always placed on the most appropriate network resulting in the optimisation and feasibility of calls. Access to the gateway was secured through PIN Authentication, while Digest Authentication ensured verification and protection of user credentials during the authentication process. The Real-time UC features were provided in the form of soft IP extensions through the VARTA UC Client. A complete Collaboration solution was made possible through Laptop/Desktop extensions to work remotely. The IP desk phones helped provide advanced features like Call Pick up, Call Forward, Call Waiting, and Call Transfer along with an Intuitive interface, that enabled employees to become efficient while simultaneously, enhancing user experience.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
The security industry offers a vast array of technologies and vendors. This can be overwhelming for end users, who depend on security integrators for guidance and service. But how well do security integrators provide end users with what they need? We asked this week’s Expert Panel Roundtable: What are the biggest challenges that end users face when working with integrators?
In today's interconnected world, the lines between physical and digital security are blurring. This means that threats can easily exploit vulnerabilities in both realms, potentially causing significant damage. That's why the convergence of cyber- and physical security systems is becoming increasingly important. It has already been a topic of discussion in the security market for more than a decade. To get a reality check, we asked this week’s Expert Panel Roundtable: Has convergence been achieved in security systems? Why or why not?
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Security communication: Manufacturers & Suppliers
- Bosch Security communication
- Senstar Security communication
- Honeywell Security Security communication
- DSC Security communication
- Dahua Technology Security communication
- RISCO Group Security communication
- Climax Technology Security communication
- MOBOTIX Security communication
- Paxton Access Security communication
- Panasonic Security communication
![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Facial recognition](https://www.sourcesecurity.com/img/emagazines/612/facial-recognition-magazine-security-technology-trends-international.jpg)
Facial recognition
Download