Security monitoring system
Artificial Intelligence Technology Solutions, Inc., a pioneer in AI-driven security and productivity solutions, along with its wholly owned subsidiary, Robotic Assistance Devices Group (RAD-G), announced a SARA™ contract covering more than 2000 video channels, marking a large agentic AI monitoring deployment. The agreement begins with SARA Verified replacing a competing solution and is expected to progress into SARA Lite and ultimately SARA Agent as the client expands its use of auto...
Salto, a global pioneer in smart access solutions, announced the launch of XS4 Sense, an innovative Smart Energy Management System (SMES) designed to revolutionise energy efficiency in buildings. Combining cutting-edge wireless technology with real-time energy monitoring platform, XS4 Sense empowers building operators to reduce energy consumption, lower carbon footprints, and achieve sustainability goals – all without complex installations or invasive infrastructure upgrades. Build...
Motorola Solutions announced it has acquired Blue Eye, a pioneering provider of AI-powered enterprise remote video monitoring (RVM) services, based in Salt Lake City, Utah. Blue Eye provides a comprehensive RVM service powered by AI to help detect threats in real time, enabling live voice talk-downs to deter crime and providing verified alerts to help accelerate law enforcement response. Enhanced situational awareness The company’s software platform is interoperable with pioneerin...
Intellian Technologies Inc., a global provider of resilient multi-constellation, feature-rich satellite user terminals and communications solutions, and OneWeb, the low Earth orbit (LEO) satellite communications company, have announced a new product portfolio of Intellian Flat Panel user terminals for use on OneWeb’s network. Flat Panel Series Intellian’s Flat Panel Series is a suite of both Pro and Compact user terminals that deliver exceptional performance in sle...
Artificial Intelligence Technology Solutions, Inc., a pioneer in AI-driven security and productivity solutions, along with its wholly owned subsidiaries, Robotic Assistance Devices, Inc. (RAD), and Robotic Assistance Devices Group (RAD-G), announced that CEO/CTO and founder Steve Reinharz will present at ISC East in New York City Wednesday afternoon on the rise of agentic AI in real time security. His session will feature SARA™ (Speaking Autonomous Responsive Agent), the Company...
Solink, the pioneer in AI-driven video intelligence, introduced enhanced AI capabilities that accelerate response times and strengthen security operations, transforming everyday security video into business intelligence to improve safety, security, loss prevention and business performance. Security operations centres (SOCs) and frontline teams are facing more threats, more alerts, and more noise than ever before. From false alarms to missed incidents, the critical signals often get buried under...
News
Almost half (48%) of those who attend religious services say they feel less safe attending in-person due to rising acts of violence at places of worship. In fact, 39% report these safety concerns have led them to change how often they attend in-person services, according to new research from Verkada conducted online by The Harris Poll among 1,123 U.S. adults who attend a religious service or event at least once a month. These findings highlight a growing concern among faith communities about safety in shared worship spaces, and underscore the need for new approaches to help institutions create secure and welcoming environments. Key findings Additional key findings include: Safety concerns are higher at larger congregations: 32% of attendees at larger places of worship (500+ attendees) say they are very concerned about their safety, compared to 18% of those who attend smaller establishments. Younger generations feel the greatest concern: 55% of Gen Z and 61% of Millennials express safety concerns at in-person services, compared to Gen X (40%) and Boomers (25%). Younger respondents are also more likely to adjust their attendance due to safety concerns: 53% of Gen Z and Millennials say they’ve changed their habits, compared to Gen X (36%) and Boomers (14%). Security improvements are underway, but gaps remain: More than half of attendees (54%) say their place of worship has upgraded security in the past year. However, one in three (33%) still rate security measures at their institution as minimal or non-existent. At Verkada, the trend is already visible: over the past year, the number of religious institutions adopting Verkada’s security technology has increased by 65%, as more communities take proactive steps to promote safety and peace of mind for their communities. “Places of worship are essential gathering places with three in 10 U.S. adults attending religious services regularly, according to a recent Gallup Poll," said retired police lieutenant and Verkada Public Safety Advisor, Ben Jones. “For faith leaders ensuring the physical security of their congregations isn’t just about protection, but about preserving the sense of peace and belonging these spaces represent.”
Artificial Intelligence Technology Solutions, Inc., a pioneer in AI-driven security and productivity solutions, along with its wholly owned subsidiary, Robotic Assistance Devices Group (RAD-G), now announced the release of SARA™ ASSIST, a new extension to its multiple award-winning SARA (Speaking Autonomous Responsive Agent), the Company's agentic AI platform. Designed for Remote Video Monitoring, GSOC, and SOC environments, SARA ASSIST places agentic AI directly on the operator's console, providing real-time verification, notification, and documentation capabilities within active monitoring workflows. Agentic AI platform Artist’s depiction of SARA ASSIST enhancing a busy security monitoring centre. The agentic AI platform works in parallel with human personnel, streamlining verification, communication, and reporting across live video feeds. SARA ASSIST creates an efficient hybrid control platform that dramatically increases operator efficiency without turning over all functions to SARA's full agentic AI workflow. An early client call centre manager recently remarked, "Our team has really been enjoying the SARA ASSIST feature. It's been a great addition and has helped improve our efficiency. Being able to have SARA make calls for simple tasks with just a click has been a big time-saver." Introduction of SARA ASSIST The introduction of SARA ASSIST marks a key step in bringing agentic AI into mainstream monitoring operations, enabling human operators to manage incidents faster and with greater consistency. SARA ASSIST is included at no extra cost. The Company expects that as central stations gain operational confidence with SARA's performance through the use of SARA ASSIST, they will move quickly to full agentic AI-powered call centre operations. Invent new features and functionality "Creating the leading agentic AI platform for the security industry has been a joy and has required us to invent new features and functionality," said Steve Reinharz, CEO/CTO and Founder of AITX and RAD-G. "From fully autonomous systems to operator-assist deployments, our goal is to have a version of SARA on every console, at every site, helping teams make faster, smarter, more confident decisions. This approach positions RAD-G to scale agentic AI across every segment of the monitoring and security industry." SARA platform's capabilities SARA ASSIST extends the SARA platform's capabilities to live operators, serving as the bridge between manual monitoring and full agentic automation. While SARA AGENT and SARA EDGE operate autonomously to verify, communicate, and respond without human input, SARA ASSIST is designed to work alongside monitoring personnel, adding real-time AI support directly into their workflow. It verifies alerts, initiates notifications, and documents activity automatically, giving operators the speed and accuracy of agentic AI without replacing human judgement. Advantages of SARA ASSIST firsthand The SARA ASSIST platform complements existing SARA offerings, including VERIFIED, LITE, AGENT, and EDGE, each designed for specific levels of automation and engagement. Priced to accelerate adoption, SARA ASSIST offers organisations a low barrier entry into agentic AI while establishing a direct path toward full autonomy as operational confidence grows. RAD-G invites all organisations engaged in live video monitoring, GSOC, and SOC operations to experience the advantages of SARA ASSIST firsthand.
Artificial Intelligence Technology Solutions, Inc., a pioneer in AI-driven security and productivity solutions, along with its wholly owned subsidiary, Robotic Assistance Devices Group (RAD-G), has executed a three-year agreement with a U.S.-based RVM (Remote Video Monitoring) company. The project, which is expected to reach $2.5 million in total contract value, will deploy SARA™ (Speaking Autonomous Responsive Agent), the Company’s multiple award-winning agentic AI platform, across the RVM’s growing portfolio of monitored accounts. Range of SARA solutions Under the terms of the agreement, RAD-G will begin the process of deploying a range of SARA solutions with an initial annual value of approximately $855,000. The rollout will occur in phases over the next several months, with full implementation expected to take up to six months as both companies determine the optimal mix of SARA configurations and integrations. Once fully implemented, annual recurring revenue is expected to approach $1 million as the RVM expands its customer base and adds monitored accounts. The project is anticipated to replace three legacy system providers and transition more than 1,000 video monitoring accounts currently managed overseas. How rapidly SARA is redefining “This agreement demonstrates how rapidly SARA is redefining what’s possible in video monitoring,” said Steve Reinharz, CEO/CTO and founder of AITX and RAD-G. “This RVM’s decision to build around our platform validates the strength of our technology, our roadmap, and our vision for autonomous, intelligent monitoring at scale. We’re not following industry trends, we’re setting them.” How SARA can transform its monitoring operations The project adds to RAD-G’s growing portfolio of enterprise software engagements and contributes to the Company’s expanding base of recurring monthly revenue. SARA is designed to autonomously monitor live video streams, identify relevant events, and respond in real time through voice-interactive deterrence and notifications. The platform continues to gain traction as monitoring companies and security providers seek reliable, intelligent, and scalable alternatives to traditional human and offshore monitoring. With each new deployment, RAD-G further advances its mission to modernise security operations through AI-driven automation and actionable intelligence. The Company invites Remote Video Monitoring, GSOC, and SOC operators interested in learning how SARA can transform their monitoring operations to connect with RAD-G at the website. Mobile robotic solutions AITX, through its primary subsidiary, Robotic Assistance Devices, Inc. (RAD), is redefining the nearly $50 billion (US) security and guarding services industry through its broad lineup of innovative, AI-driven Solutions-as-a-Service business model. RAD solutions are specifically designed to provide cost savings to businesses of between 35%-80% when compared to the industry’s existing and costly manned security guarding and monitoring model. RAD delivers these cost savings via a suite of stationary and mobile robotic solutions that complement, and at times, directly replace the need for human personnel in environments better suited for machines. All RAD technologies, AI-based analytics and software platforms are developed in-house. Data protection and security compliance The Company’s operations and internal controls have been validated through the successful completion of its SOC 2 Type 2 audit, which is a formal, independent audit that evaluates a service organisation’s internal controls for handling customer data and determines if the controls are not only designed properly but also operating effectively to protect customer data. This audit reinforces the Company’s credibility with enterprise and government clients who require strict data protection and security compliance. Reinforce RAD’s ability to deliver RAD is led by Steve Reinharz, CEO/CTO and founder of AITX and RAD, who brings decades of experience in the security services industry. Reinharz serves as chair of the Security Industry Association’s (SIA) Autonomous Solutions Working Group and as a member of the SIA Board of Directors. The RAD team also draws on extensive expertise across the sector, including Mark Folmer, CPP, PSP, President of RAD and Chair of the ASIS International North American Regional Board of Directors, Troy McCanna, former FBI Special Agent and RAD’s Chief Security Officer, and Stacy Stephens, co-founder of security robotics company Knightscope. Their combined backgrounds in security industry leadership, law enforcement, and robotics innovation reinforce RAD’s ability to deliver proven, practical, and disruptive solutions to its clients. Delivery of artificial intelligence-based solutions RAD has a prospective sales pipeline of over 35 Fortune 500 companies and numerous other client opportunities. RAD expects to continue to attract new business as it converts its existing sales opportunities into deployed clients generating a recurring revenue stream. Each Fortune 500 client has the potential of making numerous reorders over time. AITX is an innovator in the delivery of artificial intelligence-based solutions that empower organisations to gain new insight, solve complex challenges and fuel new business ideas. Through its next-generation robotic product offerings, AITX’s RAD, RAD-R, RAD-M and RAD-G companies help organisations streamline operations, increase ROI, and strengthen business. AITX technology improves the simplicity and economics of patrolling and guard services and allows experienced personnel to focus on more strategic tasks. Customers augment the capabilities of existing staff and gain higher levels of situational awareness, all at drastically reduced cost. AITX solutions are well-suited for use in multiple industries such as enterprises, government, transportation, critical infrastructure, education, and healthcare.
Suprema, a pioneer in AI-powered access control and security solutions, announced the launch of BioStar X, its most advanced unified security platform. BioStar X unifies world-pioneering biometric access control and video surveillance, into a single, scalable platform, delivering total control, integrated monitoring, and enterprise-grade resilience. Advanced access control features The new BioStar X offers total control through a unified monitoring console. Administrators can view interactive maps, AI-powered video grids, live alarms, and access logs on a single screen at real-time, eliminating the need to switch between multiple systems and helping them respond to incidents faster and more intelligently. Its advanced access control features provide a high level of granularity, allowing administrators to define detailed role-based access levels, zone-based rules, and automated emergency actions such as lockdowns and fire protocols. This unified view, combined with a granular approach, streamlines security operations across large facilities and multi-site environments while ensuring consistent policy enforcement. AI-driven video intelligence BioStar X also enhances AI-driven video intelligence by detecting events such as falls, intrusions, loitering, and tailgating, which enables administrators to identify potential threats and take proactive security measures. Built on a scalable and flexible architecture, BioStar X delivers the reliability and performance that organisations of all sizes require for mission-critical security operations. Open API-based architecture supports seamless integration with third-party systems from parking management and perimeter detection to drones and robots. This openness provides organisations with the freedom to design fully interoperable security ecosystems tailored to their operational needs. Capabilities for enterprise operation Also, core capabilities for enterprise operation, such as AES-256 encryption, database sharding, and multi-communication servers guarantee business continuity and reliability in any environment from single sites to multi-sites. Designed to support thousands of devices and users, this scalable architecture allows security infrastructure to expand as they grow, without compromising system performance. Future of intelligent operations "With BioStar X, we're delivering total confidence in security operations," said Hanchul Kim, CEO of Suprema Inc. "One unified platform combining AI intelligence, multi-credential access, and seamless scalability — enabling organisations to grow their security infrastructure without compromise." "That's the future of intelligent operations. It represents our vision for the future of enterprise security — intelligent, integrated, and adaptive to continuous change."
Artificial Intelligence Technology Solutions, Inc., a global pioneer in AI-driven security and productivity solutions, along with its wholly owned subsidiary, Robotic Assistance Devices, Group (RAD-G), announced that four Remote Video Monitoring (RVM) companies have entered operational pilot programs with SARA (Speaking Autonomous Responsive Agent), the Company’s multiple award-winning agentic AI platform set to expand the remote video monitoring industry. These pilots represent the next major step in SARA’s rapid expansion, moving from signed commitments to live operations across the monitoring sector. These industry first movers are poised to grow market share and margins with the implementation and use of SARA in lieu of traditional monitoring methods. Ten RVM clients In October, the Company announced that an initial ten RVM clients had signed on to licence SARA. The four companies now in operational pilot mode represent the beginning of a series of more than ten active deployments expected to roll out over the next several weeks. Collectively, their networks encompass roughly 100,000 potential monitoring channels that could be transitioned to SARA as performance continues to demonstrate its reliability, scalability, and transformative impact on live monitoring operations. “SARA has moved from concept to demonstrations to non-disclosure agreements and now to live operational testing,” said Steve Reinharz, CEO/CTO of AITX and RAD-G. “These pilots show the industry demand for agentic AI. We’re moving fast and setting a new standard the rest of the industry will have to chase.” Global remote video monitoring market These initial pilots represent only a fraction of the opportunity ahead. The global Remote Video Monitoring market is estimated to encompass more than five million active monitoring channels, and SARA’s growing footprint positions RAD-G at the centre of that transformation. As additional monitoring clients prepare to begin their own pilot and deployment phases, the Company expects to announce further rollouts and measurable results that reinforce SARA’s expanding role as the industry’s preferred AI platform for live video monitoring. AITX, through its primary subsidiary, Robotic Assistance Devices, Inc. (RAD), is redefining the nearly $50 billion (US) security and guarding services industry through its broad lineup of innovative, AI-driven Solutions-as-a-Service business model. Cost savings to businesses RAD solutions are specifically designed to provide cost savings to businesses of between 35%-80% when compared to the industry’s existing and costly manned security guarding and monitoring model. RAD delivers these cost savings via a suite of stationary and mobile robotic solutions that complement, and at times, directly replace the need for human personnel in environments better suited for machines. All RAD technologies, AI-based analytics and software platforms are developed in-house. Successful completion of its SOC 2 Type 2 audit The Company’s operations and internal controls have been validated through successful completion of its SOC 2 Type 2 audit, which is a formal, independent audit that evaluates a service organisation’s internal controls for handling customer data and determines if the controls are not only designed properly but also operating effectively to protect customer data. This audit reinforces the Company’s credibility with enterprise and government clients who require strict data protection and security compliance. Extensive expertise RAD is led by Steve Reinharz, CEO/CTO and founder of AITX and RAD, who brings decades of experience in the security services industry. Reinharz serves as chair of the Security Industry Association’s (SIA) Autonomous Solutions Working Group and as a member of the SIA Board of Directors. The RAD team also draws on extensive expertise across the sector, including Mark Folmer, CPP, PSP, President of RAD and Chair of the ASIS International North American Regional Board of Directors, Troy McCanna, former FBI Special Agent and RAD’s Chief Security Officer, and Stacy Stephens, co-founder of security robotics company Knightscope. Their combined backgrounds in security industry leadership, law enforcement, and robotics innovation reinforce RAD’s ability to deliver proven, practical, and disruptive solutions to its clients. Prospective sales pipeline RAD has a prospective sales pipeline of over 35 Fortune 500 companies and numerous other client opportunities. RAD expects to continue to attract new business as it converts its existing sales opportunities into deployed clients generating a recurring revenue stream. Each Fortune 500 client has the potential of making numerous reorders over time. AITX is an innovator in the delivery of artificial intelligence-based solutions that empower organisations to gain new insight, solve complex challenges and fuel new business ideas. Through its next-generation robotic product offerings, AITX’s RAD, RAD-R, RAD-M and RAD-G companies help organisations streamline operations, increase ROI, and strengthen business. AITX technology improves the simplicity and economics of patrolling and guard services and allows experienced personnel to focus on more strategic tasks. Customers augment the capabilities of existing staff and gain higher levels of situational awareness, all at drastically reduced cost. AITX solutions are well suited for use in multiple industries such as enterprises, government, transportation, critical infrastructure, education, and healthcare.
Interface Systems, a pioneering managed service provider delivering business security, networking, and business intelligence solutions to multi-location enterprises, announced the launch of TamperShield, its breakthrough monitoring technology designed to identify alarm system interference before an intrusion occurs. Traditional alarm monitoring only reports once an alarm is triggered. TamperShield continuously verifies that the alarm panel can communicate properly, providing faster visibility into communication failures, device tampering, and system health issues. The result is greater alarm uptime, faster threat awareness, and stronger protection for businesses that cannot afford downtime in their security operations. Interface's monitoring centres TamperShield is currently compatible with DMP and Honeywell alarm panels, allowing organisations to upgrade their monitoring capabilities without a complete system replacement. When an alarm panel is unable to communicate, an alert is sent to Interface's monitoring centres to notify customers and engage law enforcement, ensuring continuous protection and immediate situational awareness. Interface operates TMA Five Diamond-certified, UL-listed Interactive Security Operations Centres (iSOCs) staffed 24/7 by U.S.-based security experts who monitor more than 75,000 customer locations nationwide. These centres provide real-time response and alarm video verification, ensuring customers receive rapid, professional intervention whenever communication disruptions or intrusion attempts are detected. TamperShield Alarm Monitoring A national jewellery retailer is already deploying TamperShield Alarm Monitoring across all stores nationwide, reflecting strong customer demand in the jewellery and high-value retail sectors for intelligent, resilient alarm monitoring solutions that combat increasingly sophisticated criminal tactics. "Criminals are becoming more sophisticated in how they attempt to disable security systems before committing crimes," said Steve Womer, Senior Vice President of Product at Interface Systems. Interface's comprehensive portfolio Steve Womer added: "TamperShield Alarm Monitoring ensures that customers know the moment their system is compromised, so they can respond immediately." TamperShield strengthens Interface's comprehensive portfolio of integrated security solutions, which includes advanced interactive remote video monitoring, intrusion detection, cloud video management, video analytics, and access control, offering businesses an intelligent, layered approach to safeguarding their assets and people.


Expert commentary
Seven minutes. That’s how long the recent Louvre heist took. In broad daylight, a group of thieves rode up on a construction platform, smashed display cases, stole several historical jewels tied to the Napoleonic dynasty and escaped on scooters before anyone in the control room even realised what was happening. It sounds like a scene straight out of “Mission: Impossible.” Only this time, Tom Cruise wasn’t there. In movies, we often see tight webs of red laser beams guarding treasures, with the hero gracefully sliding between them. Reality, however, is far less cinematic. Most museums still rely on mechanical sensors, simple infrared barriers, cameras and the most fallible component of all: the human eye. But the human eye doesn’t measure space. A camera records an image, but it doesn’t know that a display case has shifted by three centimetres, or that a visitor’s hand just crossed an invisible boundary. That’s where a new kind of perception comes in — LiDAR. From Hollywood fantasy to real-world security Forget the tangled maze of laser beams you’ve seen in films. A modern 128-channel rotating LiDAR fires hundreds of thousands of laser pulses per rotation — and it does this up to 10 times per second. That’s millions of spatial measurements every second, creating an invisible web of light that maps the scene in 3D, without anyone ever noticing. What LiDAR builds is called a point cloud — a live three-dimensional model of the environment. The system constantly compares this “snapshot” with the current scene. If anything changes — a hand moves closer to an artefact, a case is displaced or an object disappears — LiDAR detects it instantly. When technology sees in 3D Pan-tilt-zoom (PTZ) cameras automatically turn to the exact spot and start recording LiDAR technology (such as LidarVision, developed by Hexagon), brings true 3D situational awareness into museums and galleries. It doesn’t just see that someone is moving; it knows where, how fast and in what trajectory. Each detected object is tracked with its precise dimensions, velocity and spatial position. If a visitor steps too close to a protected exhibit, the system triggers an alarm. Pan-tilt-zoom (PTZ) cameras automatically turn to the exact spot and start recording. The operator no longer has to stare at dozens of screens, hoping to catch the right moment. LiDAR data also serves as forensic evidence — allowing investigators to replay the incident as a full 3D reconstruction. They can see exactly how intruders moved, from entry to exit, with centimeter precision. Beyond thieves: Everyday situational awareness LiDAR isn’t just a tool against master criminals. It helps with daily operations, too — recognising when someone lingers suspiciously near a sensitive exhibit, when an unauthorised object enters the room or even when a visitor collapses. The system can trigger a silent alert, notify security staff or automatically redirect nearby cameras. History that never comes back 13 paintings worth more than half a billion dollars vanished from Boston’s Isabella Stewart Gardner Museum Art theft is not a cinematic rarity — it’s a recurring tragedy. In 1990, 13 paintings worth more than half a billion dollars vanished from Boston’s Isabella Stewart Gardner Museum. None have ever been recovered. Even Leonardo da Vinci’s Mona Lisa was stolen from the Louvre in 1911 — though it was miraculously found two years later. That case, however, remains the exception. Thieves often fail to realise that cultural artefacts are not commodities. When they melt them down for gold or strip them for gems, they don’t just destroy value — they erase history. Spatial understanding is the future of security No security system is flawless. But while cameras merely watch, LiDAR understands space. From a single compact device, it monitors the 3D environment in real time, detects anomalies and reacts immediately. Modern security is no longer about higher fences or better cameras. It’s about spatial understanding — knowing what is happening in the room right now. And that’s something even Tom Cruise wouldn’t be able to slip through.
Currently, in security surveillance, the application of intelligent analysis technology has two approaches: front-end intelligence and back-end intelligence. Front-end intelligence Front-end intelligence is typically implemented within the video surveillance camera itself, integrating AI edge algorithms into the camera. Its advantages include: acquiring video in real-time and performing video analysis and feedback results immediately. Benefits No consumption of network resources like bandwidth; Offers real-time and highly efficient analysis; Obtains results immediately; relatively low cost; Highly flexible deployment. Disadvantages Due to the small physical size of cameras, hardware expansion space is limited. AI edge algorithms are often confined to a fixed few types, such as perimeter intrusion detection, tripwire, abandoned object detection, etc. It cannot flexibly load customised intelligent functions. The other approach is back-end intelligence, which usually requires installing an intelligent analysis server in the monitoring centre, integrating AI edge algorithms into this back-end server. Advantages: Hardware components can be flexibly expanded based on project requirements, thereby enhancing the server's overall analytical capability. It can also flexibly customise and load various intelligent algorithms according to project needs, capable of loading dozens or even hundreds of algorithms. Disadvantages: Because back-end intelligence requires first collecting the video stream from the front-end cameras in real-time before analysis, it consumes significant resources like bandwidth. It cannot provide immediate feedback of intelligent analysis results like front-end intelligence, lacks flexible deployment options, and the cost is very high. Development of intelligent analysis technology AI edge analytics boxes have emerged in the security surveillance market, defining another front-end With the development of intelligent analysis technology, AI edge analytics boxes have emerged in the security surveillance market, representing another front-end intelligence product. These boxes themselves can integrate dozens of AI edge algorithms, enriching the variety of AI algorithms available for front-end intelligent cameras while maintaining flexible deployment. Users can freely choose to deploy the box at the front-end (near the camera) or at the monitoring centre end to function as a small intelligent analysis server. Front-end (camera side) When deployed at the front-end (camera side): There is no need to dismantle existing video surveillance equipment. The real-time video stream from the original camera can be analysed directly within the AI box, and results are fed back. Since the camera and AI box are usually on the same network, this consumes minimal bandwidth resources, offering excellent real-time performance, timeliness, and efficiency. After the AI edge analytics box analyses the video, the results can be transmitted to the monitoring centre video management platform server via the internet, VPN dedicated line, 4G, 5G, etc., for storage, real-time display, and retrieval. Monitoring centre end When deployed at the monitoring centre end: The AI edge analytics box can function as a small video analysis server. Individual AI analytics boxes can be stacked to aggregate their analytical power, enabling the analysis of large volumes of video streams transmitted from the front-end. Since the cost of the AI edge analytics box itself is significantly lower than that of a full intelligent analysis server, using AI analytics boxes to implement intelligent solutions is often more economical and practical for small to medium-sized intelligent security surveillance projects. AI box application. AI box deployment application Edge AI Box does not require changes to existing video surveillance kit deployments Since the Edge AI Box does not require changes to existing video surveillance equipment deployments and only upgrades the original system to enable intelligent applications for existing monitoring devices, it can save significant labour costs associated with on-site deployment personnel. After the Edge AI Box and AI-powered cameras transmit intelligent analysis results to the platform, what can the platform do? Taking the video surveillance management platform SVMS Pro as an example. SVMS Pro video surveillance management software First SVMS Pro provides centralised management for multiple AI Boxes across diverse networks (LAN, WAN, VPN, 4G/5G). This flexibility enables users to deploy AI Boxes anywhere project requirements demand. With the AI Box and cameras connected to the SVMS Pro video surveillance management software, users can select video channels for analysis. The AI Box automatically analyses the chosen channels, transmits the results, and triggers alarms back to SVMS Pro. This seamless integration provides a unified platform for users to: Configure event settings Define alarm-triggering actions (such as alarm recording and alarm video pop-up). Alerts originating from the AI Box can trigger video recording via the SVMS Pro platform. These recordings are then stored long-term within the SVMS Pro platform. This capability resolves the limitation of the AI Box itself, which cannot store recordings for extended periods due to constraints imposed by its physical size. Search historical alarm events Manage active alarms View alarm statistics Additionally, SVMS Pro facilitates pushing the analysed results to third-party platforms via the network. SVMS Pro provide various AI intelligent solutions for different scenarios. AI intelligent solutions for different scenarios AI box + video surveillance management software SVMS Pro provides various AI intelligent solutions for different scenarios. For example: In smart construction site applications, AI box can provide not wearing safety helmet and reflective vest detection, fight detection, area intrusion detection, wandering detection, fire detection, etc., and display real-time results in real-time on SVMS Pro. Users can watch real-time video from different places, store the recordings, playback, get the real-time AI alarms, put the video on the video wall, etc., all in one platform. SVMS Pro and AI Edge Boxes Combined force of SVMS Pro and AI Edge Boxes presents a truly unified and intelligent solution In essence, the combined force of SVMS Pro and AI Edge Boxes presents a truly unified and intelligent solution, effectively overcoming the inherent limitations of both traditional front-end and back-end surveillance intelligence. The AI Edge Boxes deliver powerful, real-time analytics at the edge or as scalable micro-servers, offering unprecedented flexibility and cost-effectiveness – particularly vital for small to medium-sized projects. SVMS Pro elevates this capability by providing centralised command and control, seamlessly integrating diverse AI Boxes across any network to offer comprehensive video management. Advanced AI surveillance This synergy enables robust features like intelligent event configuration, alarm-triggered recording with long-term SVMS Pro storage, historical event search, and cross-platform integration, all within a single, cost-optimised platform. From construction sites to broader security networks, this unified solution transforms raw video into actionable intelligence, democratising advanced AI surveillance by making it accessible, practical, and economically viable. SVMS Pro and AI Edge Boxes together redefine intelligent video management for the modern era.
In the ever-evolving struggle between cyber offence and defence, attackers have almost always moved first. In the emerging domain of artificial intelligence, this pattern appears to be repeating itself. Yet, global cybersecurity pioneers appear disconcertingly disengaged. Just over half even agree that AI-driven attacks are set to become dramatically more complex and widespread. Equally concerning is the widespread apathy regarding AI’s role in expanding an already sprawling corporate attack surface. This is no small oversight. A recent global Trend Micro study showed that 73 percent of organisations have already suffered cybersecurity incidents due to unknown or unmanaged assets. In an era where digital blind spots are both common and consequential, hesitation is a risk few can afford. Security has to shift from reactive protection to proactive risk exposure management. The opportunity and the risk of AI Threat actors are now using jailbroken versions of legitimate generative AI tools such as ChatGPT The potential for AI to transform enterprise operations is enormous, but so is the risk. The warnings have been loud and clear. As early as the first quarter of 2024, the UK’s National Cyber Security Centre (NCSC) stated that AI would “almost certainly increase the volume and heighten the impact of cyber-attacks over the next two years.” Their prediction is proving accurate. Threat actors are now using jailbroken versions of legitimate generative AI tools such as ChatGPT, freely traded as services on the dark web, as well as malicious models like FraudGPT, built on open-source large language models (LLMs). These tools are no longer just about automating tasks; they are turbocharging the entire attack lifecycle. From more convincing phishing emails and precise target selection, to sophisticated malware creation and lateral movement within breached systems, AI is driving a step-change in threat actor capability. Integrating open-source models However, this is only one side of the coin. The other, often overlooked, is AI’s impact on the corporate attack surface. Even well-meaning employees can unintentionally expand organisational risk. The widespread use of AI-as-a-service tools like ChatGPT introduces significant shadow IT concerns, especially when sensitive business information is input without proper oversight. Data processing and storage practices for many of these services remain opaque, raising additional compliance concerns under regulations like the UK GDPR and the EU’s AI Act. For those organisations that choose to build or customise their own LLMs, the risks multiply. Integrating open-source models may expose businesses to vulnerabilities, misconfigurations and flawed dependencies. Each new tool and environment adds to the complexity of an attack surface already strained by remote work setups, sprawling cloud deployments, IoT ecosystems, and accelerating digital transformation programmes. Managing the expanding risk landscape Many have already shared security incidents where a lack of asset visibility was the root cause Many security pioneers do understand what is at stake. Nine in ten agree that effective attack surface management is tied directly to business risk. They cite a long list of potential consequences, disruptions to operations, reputational damage, declining competitiveness, strained supplier relationships, financial losses and reduced staff productivity. Many have already experienced security incidents where a lack of asset visibility was the root cause. Despite this recognition, however, the response remains largely inadequate. Fewer than half of global organisations use dedicated tools to monitor their attack surface proactively. On average, only a quarter of cybersecurity budgets are allocated to managing cyber risk exposure. Third-party risk management is similarly neglected: fewer than half of firms actively monitor their vendors for vulnerabilities. This inertia creates an obvious contradiction. Security pioneers understand the business implications of unmanaged risk, but they are not equipping themselves with the tools or processes to respond. That needs to change—and fast. How AI can help defenders take the lead There is good news: AI is not only a weapon for cybercriminals. It can also be a powerful ally for defenders, particularly in the field of Cyber Risk Exposure Management (CREM). The best tools in this category use AI to continuously scan an organisation’s entire digital footprint. They can automatically detect vulnerabilities, spot misconfigurations, identify rogue or shadow assets, and provide prioritised remediation recommendations. CREM platforms apply contextual filtering to reduce false positives and elevate the most urgent threats Intelligent algorithms can also analyse network behaviour to identify anomalies that could signal a breach in progress. Unlike traditional tools, which often drown analysts in noise, CREM platforms apply contextual filtering to reduce false positives and elevate the most urgent threats. For overburdened security teams, this enables a far more focused and effective response. However, the keyword here is “continuous.” The nature of today’s IT environments, especially in the cloud, is dynamic and fast-moving. Assets appear and disappear within minutes. Static, point-in-time assessments are no longer sufficient. Yet more than half of organisations still lack continuous scanning processes. This leaves them exposed to risks that might persist undetected for weeks or months. Overcoming barriers to adoption So what is holding organisations back? In many cases, it’s not the technology itself but the internal politics of investment. Security pioneers interested in CREM tools often prioritise real-time alerting, clear dashboards, and seamless integration with their existing environments. All of this is now achievable. The challenge lies in securing board-level support. Many security teams still work in silos, disconnected from the broader business Boards are often cautious when it comes to cybersecurity investment, particularly when immediate ROI is not clear. To gain their trust, security pioneers must learn to speak the language of business risk, not technical threat. They must frame cyber exposure in terms of reputational impact, regulatory liability, operational continuity, and investor confidence. There is also a cultural component. Many security teams still work in silos, disconnected from the broader business. This limits their influence and makes it harder to embed security as a strategic enabler. In the AI era, this divide must be bridged. Cybersecurity must become a board-level concern, and risk exposure must be treated as a fundamental operational issue. Time to act We are at a critical inflection point. The AI revolution is not on the horizon, it is already here. Threat actors are moving rapidly to exploit it, leveraging tools and techniques that were unthinkable just a few years ago. Meanwhile, organisations remain slow to respond. Too few are investing in the tools, processes, and people needed to manage their risk exposure effectively. AI can be used not only to attack but to defend. CREM tools powered by AI offer a powerful way to regain visibility, restore control, and build lasting resilience. They enable proactive rather than reactive security. And they help organisations align their cybersecurity strategy with their broader business objectives. Security teams have to elevate the conversation. They must advocate not just for new tools, but for a new mindset, one that treats cyber risk as an enterprise risk, and one that prioritises continuous visibility as a prerequisite for resilience.
Security beat
Ibrahim Kassem, Everon’s new Chief Technology Officer (CTO), has been in the security industry since 1998 in various IT leadership roles. Most recently, he was Chief Information Officer for a video monitoring company. With most of his professional experience rooted in commercial security, Kassem has come to understand how customer needs and demands change with the evolving technology landscape. That understanding is a foundation for his new role at Everon, the national provider of commercial security, fire, and life safety solutions formerly known as ADT Commercial. Integrate AI to security operations “In this role, I am responsible for any customer-facing technology at Everon,” says Kassem. “Our primary focus is to provide a platform that will make it easy to do business with us. That platform will involve most of our solutions, including video monitoring which is the near-future focus for us.” As an integrator, Everon’s objective is to identify the best solutions. “We have partners that we leverage to help develop solutions for our customers that directly respond to their needs,” says Kassem. “For example, we partner with video camera providers to integrate AI to take security operations to the next level.” Demand for video monitoring Everon is looking to shift from reacting to events after they take place toward proactive monitoring Like most security operations, Everon is looking to shift from reacting to events after they take place toward proactive monitoring and preventing crimes as they are happening or deterring them from taking place. The ability to detect objects and behaviours is possible through AI. “Through this detection, we can respond accordingly – that’s why it’s at the forefront of our video monitoring efforts,” says Kassem. Every pursuit at Everon is in response to customer demand, and there is tremendous demand for video monitoring, says Kassem. Customer needs are the main philosophy behind the development and acquisition of technology, which also ensures that Everon is at the forefront of evolving with the security industry. Video-based security solutions “Right now, we’re noticing a trend towards video-based security solutions versus solely intrusion and guarding,” says Kassem. Everon seeks to strike a balance between “build versus buy.” The integrator prefers to buy when there is a proven product that will bring the most value. “We’re an integrator before we are a developer of technology,” says Kassem. “However, we are not shy about complementing a technology that we purchase with technology that we build if we don’t find the proper platform.” Video monitoring solutions and services Everon continues to evolve in step with ongoing trends, including smarter AI and analytics, smarter cameras Everon continues to evolve in step with ongoing trends, including smarter AI and analytics, smarter cameras, faster internet connectivity, and availability of wireless through 4G, LTE, and 5G connections. All of these are critical pieces of the video monitoring roadmap, says Kassem. “We aim to develop our video monitoring solutions and services to provide the best value to enterprises, reduce false alarms, and focus on relevant activities to save time and money,” he adds. “That’s what we’re looking forward to in the next couple of years.” Dependence on physical security Everon provides video monitoring services on a monthly basis, so the approach plays well with their recurring monthly revenue (RMR) model. Video monitoring is in great demand, and Everon is working towards being pioneers in that space, pushing to make it a major part of their future offerings. Everon is working towards being pioneer in that space, pushing to make it a major part of their future offerings “The dependence on physical security has gotten expensive, and many responding agencies no longer dispatch without video verification, which is the biggest technology challenge currently in the commercial security space,” says Kassem. “Video monitoring is the most direct, effective answer to that challenge, replacing costly, around-the-clock guarding services while also providing video verification for first responders and law enforcement agencies.” Portfolio of security solution offerings Everon roots all its pursuits in responding to the customer. Making the difference in Everon’s approach is an eagerness to listen, an awareness of industry trends and changes, and a full portfolio of security solution offerings. “Our technological roadmap is ambitious, innovative, and looks to the future through our thoughtful investments in this space, including through acquisitions of technology and top talent,” says Kassem. “All our efforts are supported by our teams of experts with decades of experience.”
The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of this problem has emerged in the consumer and political worlds, the issue cannot be ignored when it comes to the authenticity and protection of video and security data. Video surveillance data SWEAR is a company with the mission to ensure the integrity of video surveillance data by mapping video data and writing it into the blockchain, providing real-time, immutable proof of authenticity. Blockchain, which is the underlying technology that enables cryptocurrencies, is a decentralised digital ledger that securely stores records across a network of computers in a way that is transparent, immutable, and resistant to tampering. SWEAR solution The SWEAR solution is based on proactive, foundational protection that validates data at the source The SWEAR solution is based on proactive, foundational protection that validates data at the source before any opportunity for manipulation can occur. “Our technology is about proving what’s real and our goal is to ensure that security content and video surveillance data remain untampered with and reliable when needed,” says Jason Crawforth, Founder and CEO of SWEAR. Real-time authentication Security leaders need to ensure that the content they are relying on to make mission-critical decisions is authentic. Once verified, organisations can be sure that their investment in video can be trusted for critical use cases, including intelligence operations, legal investigations, and enterprise-scale security strategies. SWEAR seeks to embed trust and authenticity directly into video surveillance content at the point of creation. This ensures real-time authentication while proactively preventing tampering or manipulation before it can happen. AI-generated content The rise of AI-generated content, such as deepfakes, introduces significant challenges As AI transforms the landscape of video surveillance by enhancing threat detection and predictive analysis, it also introduces the very real risk of manipulation through AI-generated content. This presents a significant challenge in protecting critical security data, especially in mission-critical applications. The rise of AI-generated content, such as deepfakes, introduces significant challenges when it comes to ensuring the protection of digital media like video surveillance. Recent study findings It is a fact that digital media content is being questioned more regularly, which puts businesses, legal systems, and public trust at risk. A recent study from the Pew Research Center found that 63 percent of Americans believe altered videos and images create significant confusion about the facts of current issues. Last month, California Governor Gavin Newsom signed three bills aimed at curbing the use of AI to create fake images or videos in political ads ahead of the 2024 election. Footage authenticity “While most of the news cycle has centered on the use of fake content in politics, we need to think about how manipulated videos could affect security,” says Crawforth. “In video surveillance, ensuring the authenticity of footage is critical for keeping operations secure and safe around the world. That means verifying and protecting video data is a must.” Organisations must be capable of performing thorough digital investigations, which involve retrieving and analysing video and security data from devices and networks through a chain of evidence. Digital forensic capabilities Strong digital forensic capabilities also enhance incident response, risk management, and proactive security An in-depth understanding of who has handled video data, how it was handled, and where it has been is an important step in responding to security incidents, safeguarding assets, and protecting critical infrastructure. Strong digital forensic capabilities also enhance incident response, risk management, and proactive security measures, all essential for risk management, regulatory compliance, and cost control, says Crawforth. An unbroken chain of custody “By using tools to identify, preserve, and analyse digital evidence, organisations can ensure swift and accurate responses to security incidents,” he adds. “Using the latest tools and techniques is vital for maintaining a strong security posture." "But you must ensure your digital content isn’t manipulated.” SWEAR’s technology provides an unbroken chain of custody, ensuring that video evidence can be trusted and admissible in court and forensic applications. Authenticating content Authenticating content also strengthens accountability and trust, protecting organisations By verifying video content is protected from tampering, manipulation, or forgery, organisations can be sure that they have reliable evidence that produces actionable results. Authenticating content also strengthens accountability and trust, protecting organisations from legal disputes or compliance violations. Safeguarding digital content “With an increasing amount of disinformation in today’s world, we sought to develop an innovative solution to safeguard the integrity of digital content,” says Crawforth. SWEAR safeguards security content using real-time “digital DNA” encoding. It integrates directly at the video management system level, ensuring it is preserved with a secure chain of custody and maintains integrity for evidentiary purposes. Real-time “digital DNA” encoding The digital DNA is then stored on a blockchain, creating an immutable record The solution integrates with cameras and other recording devices to map this digital DNA of the video data, all in real-time. The digital DNA is then stored on a blockchain, creating an immutable record that tracks the content’s history and integrity. Any attempt to manipulate the media can be instantly detected by comparing the current state of the media to its original, authenticated version. SWEAR is actively collaborating with video management solution providers to integrate the technology into their platforms. Video and security data benefits “We’re still in the early stages of our collaboration in this space, but it is clear that the industry recognises that we have to work together to mitigate this risk proactively before it becomes a significant issue,” says Crawforth. “The feedback we have received from the industry to date has been beyond our expectations, and we expect to have more integration partners to highlight shortly.” “We should approach this as a collaborative effort across the industry, as ensuring the authenticity of video and security data benefits everyone involved,” says Crawforth.
Casinos face multiple security issues caused by potential bad actors, everything from cheating to vandalism, from theft to vagrancy. A new intelligent technology can monitor for specific keywords and behaviours. The technology scans the entire casino premises constantly for potential threats and notifies key personnel when they happen. Casinos are among the environments deploying the OpticSense system by Huvr Inc., which uses special fibre optic technology called an interferometer to secure large areas. Imagine a very sensitive loop made of fibre-optic cables placed around the perimeter of a facility. System’s artificial intelligence Basically, it converts the entire facility into a highly sensitive microphone, detecting any slight disturbances, such as an unusual movement or sound. When the system senses something out of the ordinary, it immediately triggers cameras to look at the disturbance and record a short video. The system’s artificial intelligence (AI) then analyses both the sound and video to determine what's happening. It compiles a detailed report and immediately sends the information to security teams. OpticSense OpticSense can hear, see, and analyse potential threats automatically before they get out of control. “This makes it possible for fewer people to do more,” says Herman C. DeBoard III, CEO and Founder of Huvr Inc, adding “When you don’t need as many personnel to monitor video feeds and analyse data, you can drastically reduce your labour costs. Best of all, when you optimise your resource allocation, your security teams can respond more effectively to each threat.” The system’s AI analyses sound and video to define what's happening. Combining fibre optics and AI Huvr was originally designed as a platform to provide immersive virtual travel experiences Huvr was originally designed as a platform to provide immersive virtual travel experiences. However, with the acquisition of OpticSense and Grip Places, the company pivoted to integrate advanced fibre-optic technology and AI-driven analytics into a comprehensive security system. The system’s artificial intelligence and fibre-optic interferometer technology work together to detect and analyse real-time threats. When the Fibre Optic Ring Interferometer (FoRi) detects even minute audio abnormalities, it triggers AI analysis. In split seconds, the AI directs cameras to record 60 seconds of video, compiles a detailed report, and then texts the real-time intelligence to security teams and authorities. Intelligent security solutions The growing need for intelligent security solutions can help to drive Huvr's entry into the security marketplace. Advanced technology enables the company to meet the increasing concerns surrounding public safety and the growing need for real-time threat analysis. The AI system classifies each detected anomaly according to its severity and stores data from various incidents to improve its risk assessment abilities over time. This continuous learning enables the AI to become more adept at accurately identifying and responding to threats specific to the casino environment. AI system classifies each detected anomaly according to its severity. Simple and discreet installation The system involves installing fibre optic cables around the casino’s perimeter The system involves installing fibre optic cables around the casino’s perimeter. It’s a simple job that typically requires less than a day. “These cables allow the casino to establish a smart perimeter detection system without significant infrastructure alterations,” says DeBoard Casinos typically employ upwards of 6,000 cameras, but human security teams cannot feasibly monitor all the incoming data at once. Huvr's OpticSense product becomes like the brain of the casino, constantly monitoring disturbances and responding in real time. Huvr’s fibre optic cables Huvr’s advanced detection algorithms work in tandem with a casino’s existing camera infrastructure, simply adding a layer of security that converts traditional security measures into an intelligent system that continuously monitors and analyses video footage. With Huvr’s fibre optic cables easily hidden or buried and the server roughly the size of a shoe box, the system is designed to be extremely discreet. It can be operated by a single person using a small handheld device. The security system is simple to scale and manage without disrupting casino operations. Security system is simple to work without disrupting casino operations. Autonomy boosts productivity Huvr automates surveillance and anomaly detection to decrease the load on security teams Autonomy is an important aspect of this new technology. Traditional security systems have required constant human monitoring, but Huvr automates surveillance and anomaly detection to decrease the load on security teams. “Without any human direction, Huvr detects minute disturbances, triggering the AI system to direct cameras and analyse video footage instantaneously,” says DeBoard. He adds, “The intelligent system rapidly monitors every anomaly and accurately decides which present potential threats. When it detects an issue, it compiles a detailed report that includes the number of individuals involved, their appearances, direction of movement, and licence plates. It takes only seconds to text this report to security teams and authorities.” Applications beyond casinos Beyond casinos, Huvr already provides proactive security in a wide variety of settings. In banks, the system monitors parking lots and ATM machines for suspicious activity. In large stadiums, it proactively detects target words such as “help” or “gun.” In schools, Huvr’s fibre optic ring interferometer secures campuses against unauthorised intrusions. In hospitals, it alerts medical staff when patients need immediate care. In airport terminals, it monitors for suspicious behaviour. In restaurants or construction sites, the system learns to monitor for safety violations and health hazards. Smart perimeters around critical infrastructure The fibre optic cables also form smart perimeters around critical infrastructure like power grids, cell towers, and bridges to watch for physical disturbances or tampering. “Because the system can be customised to each new environment and can learn quickly, the applications are virtually limitless,” says DeBoard. {##Poll1728555696 - Do you believe AI-driven perimeter detection systems will significantly reduce security labour costs?##}
Case studies
Amthal has delivered a complete security upgrade at The Maltings Shopping Centre, building on a partnership of more than three decades to transform the way the centre is monitored and managed. In supporting The Maltings since 2013 and taking on full management in 2017 Amthal could ensure the system remained effective through a dedicated maintenance programme until the time came for a complete upgrade. Integrated with the barrier system The new solution introduces 39 state-of-the-art Dahua cameras, including PTZ, 180-degree and AI-powered people-counting models, to provide full coverage across all seven entrances and car parks. Automatic number plate recognition has been integrated with the barrier system to improve vehicle access control, while people-counting technology now delivers reliable visitor data to track peaks and troughs. Active deterrent measures and signage strengthen site protection, supported by EMCS Sentry software to continuously monitor hardware performance and camera availability. Secure on-premises storage ensures all data remains under the centre’s direct control. Redesigned digital control desk Says Richard Marrett, Centre Director at The Maltings: “The new systems have changed the way we manage the centre. The cameras and control desk give us clearer oversight and together with features like people counting and vehicle access ensures we can identify incidents, respond quickly and review activity with confidence. Behind it all is the trust we have in Amthal, built over three decades of working together to keep The Maltings safe and welcoming.” A redesigned digital control desk now brings all live feeds, recordings and analytics together on a single platform, giving the security team clearer visuals and wider oversight than ever before. These features provide greater efficiency, faster response times and stronger protection. Management and security teams All installation work was carried out while the centre remained fully open. Amthal partnered with Dahua together with the management and security teams to plan the schedule so that tenants, staff and shoppers experienced no disruption. Kris Hallett, Business Development Director at Dahua Technology UK, added: “The upgraded cameras now capture detail even in low light, and features like auto-tracking reduce the need for constant manual monitoring. People-counting sensors give the team reliable data across key areas, while number plate recognition integrated with the car park barrier has streamlined vehicle access and reduced misuse." "All can be accessed at any time, even remotely. Working alongside Amthal, we were able to introduce all of this without disruption to the centre’s daily operations.” New requirements and advances in security technology The original system was first installed in 1995, marking the beginning of a long-term relationship that has seen Amthal support The Maltings in adapting to new requirements and advances in security technology. Paul Rosenthal, Amthal Group Business Development Director, concluded: “Our established partnership with The Maltings demonstrates how we work with clients over the long term. This complete upgrade with latest Dahua technology has delivered an integrated system that is straightforward for the team to use and manage via the new control centre. It ensures the centre remains safe, accessible and an enjoyable experience with complete peace of mind for tenants and shoppers alike.”
When major fire and security specialists Cornerstone were appointed to deliver the life safety systems for the refurbishment of 77 Grosvenor Street, they faced a unique challenge. Located in the heart of London’s Mayfair district, the prestigious building features classical architecture and over 50,000 square feet of premium open-plan office space spread across six floors. The goal was to upgrade the fire protection without compromising the building’s refined aesthetics. The client, a major property management company, required a solution that was robust, reliable and unobtrusive. Working closely with the design and construction teams, Cornerstone turned to Hochiki Europe, a long-standing partner known for dependable systems that blend seamlessly into high-end environments. Latitude fire detection and alarm control system At the core of the installation is the Latitude fire detection and alarm control system. Chosen for its powerful cause and effect programming, flexible networking and modular scalability, Latitude was well suited to the demands of a multi-level heritage building. Its ability to support complex configurations made it ideal for a site where multiple zones, floors and room functions needed to be managed with precision. To deliver complete protection across the site, Cornerstone selected a combination of Hochiki's Enhanced System Protocol (ESP) addressable devices and the FIRElink aspirating detection system. The FIRElink system is adaptable to a broad range of environments and applications. ESP detectors From small, to very large areas, the system is particularly useful in protecting computer rooms or data centres but can be designed to fit almost any environment. ESP detectors offer high performance with a minimal visual footprint, ideal for preserving the character of the restored interiors. In areas requiring an even more discreet solution, such as decorative ceilings or high airflow zones, FIRElink was installed using capillary sampling pipes hidden within the building’s structure. One of the key advantages of the Latitude platform is its ability to interface with wider building management systems (BMS). At Grosvenor Street, this opens the door to centralised monitoring and control of fire safety in conjunction with other building systems. Open integration Latitude’s open integration options mean it can share status updates and alarm events in real time with the BMS, enabling facilities teams to coordinate responses quickly and efficiently. For a high-spec office environment, this not only improves safety outcomes but also supports smoother day-to-day operation and building performance. Patrick Anthony, Project Manager at Cornerstone, explained the decision: “We have a trusted relationship with the Hochiki team. Their systems and devices are reliable, help reduce false alarms and are designed to aesthetically fade into the background, exactly what this project needed and delivers complete peace of mind for the management team.” The site at Grosvenor Street is now protected by a fully integrated, future proof life safety system that meets modern building safety standards while maintaining the building’s elegance.
Artificial Intelligence Technology Solutions, Inc., along with its wholly owned subsidiary Robotic Assistance Devices, Inc. (RAD), announced the publication of a new case study detailing the successful deployment of RAD’s RIO 180 units powered by SARA at a mobile home community managed by Champion Real Estate Services. The project, conducted in collaboration with RAD dealer HUB Enterprises, demonstrates how autonomous security solutions can dramatically reduce incidents, restore resident confidence, and redefine community safety. Newly published case study The newly published case study, titled “Transforming Mobile Home Park Security with RAD and HUB Enterprises,” showcases how the partnership between Champion, HUB, and RAD addressed long-standing security challenges at a large mobile home community. The report details how HUB deployed two RIO 180 units powered by RAD’s agentic AI platform, SARA (Speaking Autonomous Responsive Agent), resulting in a near elimination of resident complaints and a sharp decline in trespassing, theft, and disruptive activity. This case joins a growing collection of real-world examples where RAD’s autonomous technologies are redefining safety and operational efficiency across residential, commercial, and critical infrastructure sectors. LED display and talk-down features “HUB brought us a solution from RAD that works,” said Shannon Noble, Managing Broker at Champion Real Estate Services. “The collaboration between Champion, HUB, and RAD has given us a new level of confidence in how we manage security at our communities. The LED display and talk-down features make a powerful impact. Residents see and hear that their community is protected, and it has completely changed the atmosphere.” Technology-driven adoption “This worked where our patrols just couldn’t,” said Jarrett Willoughby of HUB Enterprises. “It’s visible, it’s active, and it gave Champion the confidence to start talking about more deployments right away. What really surprised us was SARA. We thought of it as just a monitoring tool, but the way it responds on its own, the speed of it, that’s what really sold us.” “The results at Champion’s community clearly show how technology-driven adoption can make neighborhoods safer,” said Mark Folmer, CPP, PSP, President of RAD. “RIO powered by SARA provides an immediate and visible deterrent that residents recognise and appreciate. This collaboration with HUB and Champion demonstrates how autonomous security can deliver measurable improvements in safety and peace of mind.” Transforming residential community safety The full case study is now available for download, offering detailed insights into how autonomous security solutions are transforming residential community safety. Property managers, security providers, and industry professionals are encouraged to review the results and explore how AI-powered autonomy can deliver stronger deterrence, faster response, and greater confidence for the communities they serve. ROSA units Sitting atop a standard RIO 180 configuration is a single ROSA units. ROSA is a multiple award-winning, compact, self-contained, portable, security and communication solution that can be installed and activated in about 15 minutes. ROSA’s AI-driven security analytics include human, firearm, vehicle detection, licence plate recognition, responsive digital signage and audio messaging, and complete integration with RAD’s software suite notification and autonomous response library. Two-way communication is optimised for cellular, including live video from ROSA’s high-resolution, full-colour, always-on cameras. RAD has published six Case Studies detailing how ROSA has helped eliminate instances of theft, trespassing and loitering at mobile home parks, retail centres, hospital campuses, multi-family communities, car rental locations and construction sites across the country. Customised assessment and demonstration The Company encourages property managers, business owners, and municipal leaders seeking to improve security in downtown and high-traffic areas to connect with RAD for a customised assessment and demonstration of its autonomous security solutions. AITX, through its primary subsidiary, Robotic Assistance Devices, Inc. (RAD), is redefining the nearly $50 billion (US) security and guarding services industry through its broad lineup of innovative, AI-driven Solutions-as-a-Service business model. RAD solutions are specifically designed to provide cost savings to businesses of between 35%-80% when compared to the industry’s existing and costly manned security guarding and monitoring model. Cost savings RAD delivers these cost savings via a suite of stationary and mobile robotic solutions that complement, and at times, directly replace the need for human personnel in environments better suited for machines. All RAD technologies, AI-based analytics and software platforms are developed in-house. The Company’s operations and internal controls have been validated through successful completion of its SOC 2 Type 2 audit, which is a formal, independent audit that evaluates a service organisation’s internal controls for handling customer data and determines if the controls are not only designed properly but also operating effectively to protect customer data. This audit reinforces the Company’s credibility with enterprise and government clients who require strict data protection and security compliance. Led by Steve Reinharz RAD is led by Steve Reinharz, CEO/CTO and founder of AITX and RAD, who brings decades of experience in the security services industry. Reinharz serves as chair of the Security Industry Association’s (SIA) Autonomous Solutions Working Group and as a member of the SIA Board of Directors. The RAD team also draws on extensive expertise across the sector, including Mark Folmer, CPP, PSP, President of RAD and Chair of the ASIS International North American Regional Board of Directors, Troy McCanna, former FBI Special Agent and RAD’s Chief Security Officer, and Stacy Stephens, co-founder of security robotics company Knightscope. Their combined backgrounds in security industry pioneership, law enforcement, and robotics innovation reinforce RAD’s ability to deliver proven, practical, and disruptive solutions to its clients. Prospective sales pipeline RAD has a prospective sales pipeline of over 35 Fortune 500 companies and numerous other client opportunities. RAD expects to continue to attract new business as it converts its existing sales opportunities into deployed clients generating a recurring revenue stream. Each Fortune 500 client has the potential of making numerous reorders over time. AITX is an innovator in the delivery of artificial intelligence-based solutions that empower organisations to gain new insight, solve complex challenges and fuel new business ideas. Through its next-generation robotic product offerings, AITX’s RAD, RAD-R, RAD-M and RAD-G companies help organisations streamline operations, increase ROI, and strengthen business. AITX technology AITX technology improves the simplicity and economics of patrolling and guard services and allows experienced personnel to focus on more strategic tasks. Customers augment the capabilities of existing staff and gain higher levels of situational awareness, all at drastically reduced cost. AITX solutions are well suited for use in multiple industries such as enterprises, government, transportation, critical infrastructure, education, and healthcare.
Crime analysts at DeterTech, a trusted security partner to critical infrastructure and law enforcement, are warning of a major rise in reported incidents of copper and cable theft across Greater Manchester and Lancashire. Believed to be orchestrated by Organised Crime Groups (OCGs), the direct to threat to UK infrastructure is being driven by the sustained high price of copper, which hit $10,300 per tonne on 25th September 2025 – the highest recorded price since April 2024. Cable theft from rail network Cable theft from the rail network in Wigan resulted in widespread passenger disruption There have been six key incidents reported in the North-West of England since 14th September, impacting energy, transport, utilities and renewables infrastructure. For example, in Bolton a site was targeted for 33 kv copper cable valued at just under £500,000. Meanwhile, the theft of a significant quantity of string cable from a solar farm near Preston reduced the site’s energy output by around 40% risking the local power supply. Back in August, cable theft from the rail network in Wigan resulted in widespread passenger disruption and estimated losses to the UK economy of more than £1million. Deal with the threats Rachael Oakley, Head of Crime Intelligence, DeterTech, says: "The substantial price of copper is unfortunately driving high rates of offending across all forms of critical infrastructure. In order to protect energy, utilities, transport, and renewable infrastructure, it is imperative that fence lines are checked regularly, CCTV cameras are functioning correctly, and alarm monitoring centres are correctly equipped to deal with the threats posed." Critical infrastructure providers, particularly those with sites in the North-West of the UK, are urged to audit site security plans and to consider taking additional steps to deter unwanted attention from OCGs. Direct threat to infrastructure The current intelligence picture points toward an on-going direct threat to infrastructure, with implications for asset loss service disruption, regulatory penalties and public safety. Operators are reminded to continue reporting all incidents of theft, suspicious vehicles, and hostile reconnaissance to DeterTech and Opal, the national police intelligence unit focused on serious organised acquisitive crime.
Rhombus, a pioneer in cloud-managed physical security solutions, announced the launch of Rhombus Insights, an AI-powered solution that empowers businesses to measure virtually anything their cameras can see and automate responses based on those specific observations. The launch is a significant expansion of Rhombus’ AI analytics capabilities, giving organisations complete customisation over what they track and how they respond to operational situations. Rhombus's physical operations Businesses can now create tailored measures and automatic replies designed for their specific active needs Rhombus Insights addresses a fundamental challenge companies have faced: the inability to answer questions about their physical operations without ongoing and time-intensive human intervention. Whether tracking parking availability, observing equipment placement, verifying safety protocols, or measuring inventory levels, businesses can now create tailored measurements and automated responses designed for their specific operational needs. How businesses continually optimise and secure “Companies have been limited to predefined analytics that couldn’t really address what they need to know about what’s going on at their store, their campus, their factory, or other physical space at any given moment,” said Rickey Cox, VP of Product at Rhombus. “Rhombus Insights changes that completely. If your Rhombus cameras can see it, you can now measure it, track it, and automate responses to it. This level of complete customisation unlocks entirely new possibilities for how businesses continually optimise and secure their physical spaces.” Transforming visual data into actionable intelligence Rhombus Insights works through an intuitive setup process where users simply create prompts Rhombus Insights works through an intuitive setup process where users simply create prompts describing what they want to measure, specify the measurement type (numerical, percentage, or true/false), and set monitoring frequency. The solution then continuously analyses camera footage to provide real-time data visualisation, exportable reports, and API access for integration with existing business systems. Instant alerts and automated actions Going beyond passive monitoring, Rhombus Insights enables organisations to configure instant alerts and automated actions whenever specific conditions are met. When triggers are detected, the system can send notifications via email, text, or push notification, and execute custom actions such as playing audio announcements or activating third-party devices (such as lights or alarms) through relay triggers. Cross-industry applications drive operational excellence Educational clubs can verify safety protocol compliance, such as confirming lifeguard presence The flexibility of Rhombus Insights supports diverse use cases across industries. In manufacturing environments, companies can track forklift counts on warehouse floors and automate safety alerts when equipment exceeds safe density levels. Retail businesses can observe queue lengths and automatically notify staff when customer wait times become problematic. Educational institutions can verify safety protocol compliance, such as confirming lifeguard presence at pool facilities. Operational leverage and increased efficiency “Like many businesses, our operations have unique characteristics that require specialised knowledge and measurement capabilities,” said Kevin Bush, Chief Strategy Officer at Fresh Dining Concepts, the largest franchisee group of brands like Cinnabon and Auntie Anne’s. “Being able to use our cameras to extract actionable information and automate business response gives us an incredible amount of operational leverage and increased efficiency across our locations.” Seamless integration with existing infrastructure Rhombus’ strategic growth of purposeful AI features built into its cloud-based physical security system Rhombus Insights works with existing Rhombus camera infrastructure or 3rd party cameras and integrates seamlessly with the company’s unified Rhombus Console. Organisations can configure their choice of large language model (LLM) to power the AI analytics, with options including Rhombus’ provided solution or integration with pioneering AI platforms such as ChatGPT, Claude, Gemini, and Grok. This launch continues Rhombus’ strategic expansion of purposeful AI features built into its cloud-based physical security system, following recent introductions of natural language video search and operational analytics capabilities that include line crossing and occupancy counting. Driving cost efficiency and strategic decision-making By automating previously manual monitoring processes, Rhombus Insights delivers significant cost savings while providing organisations with data-driven insights that influence site planning, budget allocation, and operational strategy. The solution's automated response capabilities ensure critical conditions are addressed immediately without requiring constant human oversight. Availability Rhombus Insights is now available to companies with existing Rhombus deployments. Organisations interested in exploring how AI-powered custom analytics and response triggers can optimise their physical spaces
Artificial Intelligence Technology Solutions, Inc. (the Company), along with its wholly owned subsidiary Robotic Assistance Devices, Inc. (RAD), announced the publication of a new case study detailing the successful deployment and performance of RAD’s SARA platform at OneWatch, an Indiana-based monitoring center and a RAD authorised dealer. The release of this case study follows a recent presentation during The Monitoring Association’s Virtual Product Review (VPR) series, titled “Agentic AI Is Transforming Remote Monitoring Operations, Are You Ready?” SARA RVM solution SARA enabled OneWatch to reduce false alarms by 85%, accelerate response times The newly published case study, titled “SARA, RAD’s Agentic AI Monitoring Platform, Drives Efficiency at OneWatch,” explores how OneWatch addressed staffing challenges, operator fatigue, and alarm overload by deploying RAD’s SARA RVM solution. Designed to automate remote video monitoring, SARA enabled OneWatch to reduce false alarms by 85%, accelerate response times, and maintain service quality without increasing headcount. The results illustrate how AI-driven automation can directly support GSOC operations, helping organisations scale without compromising performance. Seamless integration OneWatch CEO Austin Smith cited SARA’s seamless integration with existing infrastructure OneWatch CEO Austin Smith cited SARA’s seamless integration with existing infrastructure and its ability to autonomously detect, verify, and respond to incidents as decisive factors in OneWatch’s adoption of SARA. “SARA has completely transformed how we approach security monitoring,” Smith said. “Our operators are no longer overwhelmed by false alarms and can focus on genuine security threats.” The platform’s autonomous voice-down capabilities and detailed reporting tools now serve as a foundation for OneWatch’s daily operations and long-term growth strategy. GSOC operations RAD’s SARA platform shifted OneWatch’s GSOC operations from continuous human surveillance to AI-supported exception management. Rather than manually monitoring hundreds of feeds, operators now rely on SARA to surface verified incidents and provide real-time context. This transition has improved operator morale, reduced burnout, and created a more efficient work environment. In addition to filtering nuisance alerts, SARA has demonstrated its value in deterring intrusions, preventing asset loss, and delivering faster incident resolution. Autonomous responses At a healthcare facility, the system detected suspicious activity near a restricted area The case study details specific incidents where SARA initiated autonomous responses that led to positive outcomes. At a healthcare facility, the system detected suspicious activity near a restricted area, which triggered immediate notifications, enabling on-site personnel to intervene before property was removed. In another event at a construction site, SARA’s voice-down feature deterred a theft in progress while simultaneously alerting OneWatch and local law enforcement, resulting in a successful intervention without delay. Monitoring industry Steve Reinharz, CEO/CTO and founder of AITX and RAD, emphasised the significance of the SARA deployment’s impact on the broader monitoring industry. “In over two decades of innovation in this sector, I have never witnessed such immediate recognition and adoption of a new technology as we’ve seen with SARA,” Reinharz said. “Monitoring centers are not just interested, they’re acting. The results at OneWatch reflect what is possible when organisations are ready to let AI take a leadership role in their operations.” Success of SARA The success of SARA at OneWatch signals a shift in how remote monitoring centers can evolve to meet growing demand without relying solely on human resources. By integrating agentic AI into daily operations, OneWatch not only improved internal efficiency but also strengthened its competitive position in the market. With SARA handling routine detection and engagement, the company has redefined operator roles, transforming them into AI Surveillance Analysts focused on incident resolution, client communication, and strategic oversight. RAD is actively working to bring similar outcomes to its network of nearly 100 authorised dealers and GSOC operators across the country. By equipping partners with SARA, the Company aims to transform remote monitoring at scale, empowering more organisations to lower costs, reduce false alarms, improve response times, and enhance service delivery through agentic AI.


Round table discussion
In many cases, architectural design and layout dictate optimal placement of security devices like cameras, access control readers, and sensors. Poor design can lead to blind spots, reduced coverage, and ineffective surveillance. However, planning that involves all the various stakeholders can maximise both security and design elements. We asked this week’s Expert Panel Roundtable: When are building design and physical security systems complementary? When are they at odds?
2025 is likely to see further advancements in artificial intelligence, with potential impacts on various aspects of society, including the security industry. The new year will also require security professionals to adapt to changing market conditions and develop contingency plans for unforeseen events. Industry changes will accelerate and challenge everyone in the security market to keep up. Making specific predictions for the new year can be a struggle, but we asked our Expert Panel Roundtable: What will be the big news for security in the year ahead?
Technology automates tasks, streamlines processes, and improves efficiency in various fields, including physical security. But the success of today’s latest technologies depends on our ability to use them responsibly and efficiently. Optimising our industry’s use of technology requires that the industry’s workforce have the needed skills to operate the latest equipment. We asked this week’s Expert Panel Roundtable: How does technology innovation in security systems impact the skillsets needed by security operators and officers?
Products


White papers
Preventing loss, securing assets
Download
A step-by-step checklist for choosing an intercom system
Download
Safeguard Students With New Techniques And Technology
Download
How to implement a physical security strategy with privacy in mind
Download
5 ways to strengthen physical security with an integrated system
Download
The benefits of Edge AI + Cloud for security systems
Download
Creating a secure and positive healthcare experience
Download
Integrated access control: reap the benefits of connected security
Download
Connected video technology for safe cities
Download
10 step guide to staying ahead of emerging security threats
Download

Videos
Security monitoring system: Manufacturers & Suppliers
- Dahua Technology Security monitoring system
- Vicon Security monitoring system
- Bolide Security monitoring system
- Hikvision Security monitoring system
- Seagate Security monitoring system
- BCDVideo Security monitoring system
- MobileView Security monitoring system
- Pelco Security monitoring system
- LILIN Security monitoring system
- AV Costar Security monitoring system
- Hanwha Vision Security monitoring system
- Vanderbilt Security monitoring system
- TESA Security monitoring system
- CEM Security monitoring system
- Sony Security monitoring system
- VIVOTEK Security monitoring system
- DSC Security monitoring system
- OPTEX Security monitoring system
- Parabit Security monitoring system
- Messoa Security monitoring system
Aligning physical and cyber defence for total protection
Download
Understanding AI-powered video analytics
Download
Enhancing physical access control using a self-service model
Download
How to implement a physical security strategy with privacy in mind
Download
Security and surveillance technologies for the casino market
Download
