Security monitoring system
Bugcrowd, the pioneer in crowdsourced security, has signed Dubai-based Axon Technologies as a value-added partner in the EMEA market. Axon Technologies AXON specialises in managed security services, SOC consulting, security engineering, advanced testing, and incident response services. It has more than 60 customers in 12 countries across financial services, healthcare, government, and other verticals, with a particularly strong presence in its UAE base and Saudi Arabia. Bugcrowd...
dormakaba is expanding its activities in the airport business area. Unique pilot projects for the automation of security checks are already underway at various airports and more will be coming soon. dormakaba has also seen a very good order intake in the airport sector for the financial year 2023/24. Argus Air eGates sensor gates Orders for the supply and maintenance of Argus Air eGates sensor gates were successfully implemented at several airports. The total revenue was in the high sin...
Over the past decade, scientists have proved that engineered microbes are capable of exhibiting a range of sense-and-response functions. They can be programmed to convert input signals into detectible outputs, such as a change in colour when they encounter specific toxins. They can sense and respond to physical stimuli such as light or magnetic fields. They can even produce an electric current to actuate a tiny gear. Microbe-based sensing technologies Draper is looking to test the bound...
Nozomi Networks Inc., the pioneer in OT and IoT security announced the industry’s first OT and IoT security sensor that runs embedded in Mitsubishi Electric programmable logic controllers (PLCs). Arc Embedded With Arc Embedded, security and operations teams gain previously unavailable visibility at the process level of their industrial automation equipment and field assets as well as the ability to analyse and deter process-level threats and malicious user activity without impacting curr...
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation announced that its AI gun detection and intelligent situational awareness solution has been deployed by Florida SouthWestern State College (FSW) to mitigate gun-related violence. Protecting FSW campuses ZeroEyes has been implemented across all four FSW campuses, protecting 16,000 students and nearly 1,000 faculty and staff. First establishe...
Allied Universal®, the security and facility services company announced the launch of its new Enhanced Protection Services business unit. Enhanced Protection Services To address the most critical threats to life and safety, Enhanced Protection Services offers comprehensive, high-consequence threat mitigation at every stage of the risk cycle from planning and preoperational surveillance to execution and completion. Leveraging extensive subject matter expertise, the team delivers un...
News
Developing solutions for everyday challenges – that’s the task product developers face over and over again. Yet it’s not just the solution itself that is important, it’s also the user-friendliness that counts. The International Design Centre Berlin (IDZ), an independent institution with more than 50 years of experience, founded the UX Design Awards in 2015 to recognise special achievements in the area of user-friendliness, or other words, user experience. D21x series DoorBird is pleased about the IP video door stations from the D21x series being nominated for the upcoming award ceremony. The D21x series features a variety of innovative modules, customisation options, and elegant design, meaning it offers noticeable added value by significantly optimising both the safety and aesthetics of the home environment for the user. As a smart door communication solution, it also enables a maximum degree of flexibility: Nobody has to be physically present in the home to grant access to a building or property or to communicate with delivery persons and parcel carriers at the door. An app allows users to do all of this easily while out and about. DoorBird has even expanded the access options with the latest D2101TFV model: The touchless call button makes it possible to access facilities with high visitor traffic, such as kindergartens, hospitals, or nursing homes, in a hygienic manner. UX Design Awards The UX Design Awards are handed out twice a year and winners are decided via a multi-stage selection process. However, it’s not just the experts who decide who wins. An audience vote is also part of the process, allowing everyone to select their favorites from the nominated parties.
ISS (Intelligent Security Systems), a pioneering provider of video intelligence and data awareness solutions, has launched Intellisection, a new turnkey solution for automated intersection monitoring. Intellisection leverages artificial intelligence and advanced neural network training technology to enhance road safety and efficiency, enabling federal, state, and local agencies to create a comprehensive traffic management solution. The state-of-the-art neural network technology autonomously monitors vehicle flow, detects accidents, classifies vehicles, and provides real-time data to optimise traffic signals, ensuring smooth and safe traffic movement. Embedded at the core of the system, it combines proactive monitoring, real-time analysis, and configurable notification mechanisms to optimise the reliability, stability, and performance of all components. Key benefits Enhanced Road User Detection: Accurately detect, count, and classify all road users, including vehicle types as well as pedestrians, bicyclists, and mobility devices like wheelchairs and scooters. Improved Safety Measures: Enhance road safety with features like near-miss analysis, red-light violation monitoring, wrong-way driver detection, speeding alerts, and crash detection, helping to prevent accidents and manage incidents effectively. Real-Time Notifications: Email, text, and in-browser alerts ensure that relevant stakeholders are promptly informed about critical incidents, enabling quicker responses. Multi-Lane Monitoring: The system can detect multiple vehicles approaching or departing in multiple lanes simultaneously, making it suitable for complex intersections. High Reliability: Rated NEMA TS-2, the product is built to meet high standards of reliability and durability in various environmental conditions. Operational Insights and Reporting: The system provides operational dashboards summarising key events, turning movements, and vehicle classifications at intersections. Detailed event statistic reports help in analysing traffic patterns and making informed decisions. Insights for incident detection “As technology continually gets adopted into the ITS marketplace, we have seen a hammer-to-nail approach to its deployment. With Intellisection’s launch, we are providing a platform that allows agencies to optimise signalised intersection performance while offering the most feature-rich insights for incident detection – accidents, near misses, wrong-way driving, etc. – as well as traffic flow estimations, including average speed, density, vehicle classification, and beyond,” said Joe Harvey ITS Market Sector Pioneer, ISS. “Additionally, by leveraging our software platform, we enable agencies to gain comprehensive insights throughout their entire system, enhancing decision-making, improving safety, and increasing efficiency across all levels of traffic management.” Future-proof solution “Releasing a new product is never an easy process and for nearly two years our team has worked tirelessly to create a solution in Intellisection that is the nexus of roadway analytics, decision management, and data analysis,” added Matt Powell, Managing Director, North America, ISS. “I am extremely excited for us to launch this product and thankful to the communities that have worked with us in deploying Intellisection to ensure it works in the real world. Intellisection is an incredible product, built on two decades of our experience with vehicle analytics, and will grow in capability year after year to ensure a future-proof solution for creating safer, more efficient roadways.”
Streamlight® Inc., a provider of high-performance lighting and weapon light/laser sighting devices, introduced the ProTac HL® 6, the newest and brightest addition to the ProTac® series of tactical lights. ProTac HL® 6 Delivering up to 5,300 lumens and an extraordinary beam reach, the rechargeable system comes with a charge cord and two Streamlight SL-B48® Li-Ion rechargeable battery packs with an integrated USB-C charge port. The new light also features a convenient head-mounted, push-button switch, an anti-roll face cap and a sure-grip rubber sleeve. Cost-saving rechargeable batteries “The ProTac HL 6 is like a handheld flood light, allowing users to see all around them while also providing a powerful beam reach to put more light on a target at a distance,” said Streamlight Chief Revenue Officer, Michael F. Dineen. “It’s the ideal light for first responders, outdoor enthusiasts, industrial technicians, and other users, whether performing room clearing, lighting an outdoor path or troubleshooting repairs under low-light conditions. It also is powered by convenient and cost-saving rechargeable batteries.” LED technology Its multi-function, easy-access head switch allows for one-handed operation of the light’s momentary modes The ProTac HL 6 uses the latest in power LED technology for extreme brightness. Its multi-function, easy-access head switch allows for one-handed operation of the light’s momentary, variable intensity, or strobe modes. On the high setting, it delivers 5,300 lumens and 80,000 candela over 566 metres. On medium, it offers 1,500 lumens, 23,000 candela and a 303-metre beam distance. On low, the light provides 450 lumens and 6,700 candelas over 164 metres. Run time ranges from 12 hours and 30 minutes on low to two hours on high; in strobe mode, the light runs for four hours. TEN-TAP® programming The new light features TEN-TAP® programming, which allows for user selection from among three programmes: high/strobe/low (factory default); high only; or low/medium/high. The ProTac HL 6 is powered by two included 5000mAh SL-B48 protected Li-Ion USB-C rechargeable battery packs which are rechargeable up to 500 times. New light features Fabricated from 6000 series machined aircraft aluminium with an anodised finish, the new light features an anti-roll face cap, and a textured rubber sleeve and lanyard to ensure a tight grip. It has a gasket-sealed glass lens with an anti-reflective coating. The ProTac HL 6 measures 26.6 cm in length and weighs 590g with two SL-B48 rechargeable batteries. It is rated IPX7, making it waterproof to one metre for 30 minutes. The light is also impact resistance-tested to one metre. Available in black, the light comes in two models, the ProTac HL 6 with a 120V USB adapter or the ProTac HL 6 without an adapter.
Synectics has increased its rapidly growing healthcare portfolio, with two more NHS trusts opting to enhance its surveillance and security management with Synergy software. Multi-phase, multi-site upgrades The undisclosed NHS Trusts will use Synergy as the foundation for multi-phase, multi-site upgrades of their systems. The first project will help one of the UK’s busiest Trusts unify and improve surveillance across two major hospitals and one community facility. Surveillance cameras With Synergy in place, operators at any of the sites can view video footage from across the entire estate The Trust's three sites, covering over 130 acres, encompass diverse facilities, from one of the country’s largest trauma units and busiest A&E departments to dedicated teaching facilities and specialist health units. With Synergy in place, operators at any of the sites can view video footage from across the entire estate, and teams at either of the two hospitals can also control any of the surveillance cameras. Staff, patients, and visitors security In addition to supporting multi-site security management, upgrading to Synergy will deliver sophisticated capabilities for improving the security of staff, patients, and visitors. Advanced incident management tools, on-screen guidance, and a mapping system that can switch from OpenStreetMap to detailed internal floor layouts ensure operators will have what they need at their fingertips to rapidly pinpoint incidents, better manage security responses, and ensure all pertinent footage is prioritised on screen and recorded for evidence. Video analytics Synergy will facilitate further migration to IP cameras, support the use of legacy technology While smaller in size, the second NHS Trust’s use of Synergy is equally ambitious. Following initial upgrade work at the Trust’s primary facility, phased works will bring two further sites – a postgrad centre and a new-build location into the same system. In both NHS Trust deployments, Synergy will facilitate further migration to IP cameras, support the use of legacy technology, and guarantee the seamless integration of additional capabilities as required – including video analytics and an increased number of system inputs. Multi-site surveillance Brett Longley from Synectics commented, “Our multi-site surveillance provides better awareness across entire estates, which is increasingly popular in our industry." "Flexible solutions, like Synergy, are essential for phased improvement plans. This flexibility is a major reason we’re quickly growing in healthcare settings.”
Convergint, a global pioneer in service-based systems integration announced that it has acquired Helinick, a Romania-based integrator that specialises in the design and implementation of electronic security, fire safety, communications, and building management systems. Helinick is a market pioneer and fast-growing organisation in Romania with over 500 regional customers. This acquisition greatly expands Convergint’s key service and technology capabilities across Europe. Helinick Founded in 1991, Helinick provides turn-key, innovative technology solutions, tailored to customers’ unique industry needs. With a reputation for providing best-in-market service, Helinick has fostered strong business growth across the region, acting as a strategic partner to customers across Romania and Germany to reduce risk, improve safety, and deliver transformative results. The acquisition brings over 160 colleagues to Convergint extending its foothold across the region and allowing it to meet growing customer demand with cutting-edge technology solutions. Strategic growth “Helinick is a pioneer in their region for security technology and design, and their expertise will accelerate our strategic growth in this crucial market, and with our global customers,” said Ann Fandozzi, CEO of Convergint. “We’re thrilled to welcome Helinick colleagues to Convergint. Their dedication to providing customers with innovative technology integrations and industry-pioneering service is well-aligned with our core Values and Beliefs, and together we will strengthen Convergint’s global reach.” Digital solutions “With a shared mission to deliver the market’s most advanced technology solutions, joining Convergint enables Helinick to meet progressing demand for fully integrated, digitally transformed security systems,” said Marius Retegan, Executive Director of Helinick. “Convergint’s global presence and culture of service will allow us to power growth, and continue to deliver premium service to our existing customers across Romania.”
Mimecast, a global cybersecurity pioneer, has unveiled its Human Risk Management (HRM) platform, marking an important and eagerly anticipated milestone in advancing toward the next generation of cybersecurity. HRM platform In response to customer and market demand for a more effective means of mitigating risk brought on by employee mistakes and user errors, Mimecast has charted a new path forward by developing a connected HRM platform. The platform will provide unprecedented visibility into an organisation’s risk profile, scoring users by risk and allowing security teams to educate and protect the riskiest part of their employee base. A comprehensive solution to a complex problem Professionals cannot differentiate risk across employees, and frustrated end users who ignore warnings A small number of users tend to cause the majority of security issues. But, to date, organisations have invested in disconnected security point products, resulting in security professionals who cannot differentiate risk across employees, and frustrated end users who ignore continuous security warnings and bypass disparate controls, all of which ultimately increase both human and organisational risk. Preventative controls Mimecast's connected HRM platform, which is built on a central risk engine, is designed to prevent evolving and sophisticated threats targeting human error within organisations. The new platform will offer preventative controls and direct actions that will mitigate the risk associated with human behaviour such as an errant click of a link, the opening of a malicious attachment or inadvertently sharing a document. Challenges with human-centric risks Employees have access to a myriad of collaboration tools and unlimited access to organisational data In an increasingly connected world, employees have access to a myriad of collaboration tools and unlimited access to organisational data, making them prime targets for complex attacks such as business email compromise (BEC) and phishing, but also makes them more prone to errors as they are constantly multi-tasking and have multiple tools open at the same time. Traditional security measures often fall short of addressing these human-centric risks, leading to significant vulnerabilities. Risk mitigation "Our platform is centred around protecting organisations from employee mistakes and user error, aligning key defence and data controls to offer one of the most comprehensive approaches to human risk management," said Mimecast CEO, Marc van Zadelhoff. We provide a single solution that brings together multiple technologies – from Mimecast and dozens of partners – to help organisations protect collaboration and engage employees in risk mitigation." Human risk dashboard with unparalleled visibility The HRM platform is engineered to include a unique human risk dashboard, providing security teams with company-wide human risk scoring and visibility based on event data from both native Mimecast metrics as well as data from current and future integrations with third-party tools. Organisations can tailor security strategies specifically, including awareness initiatives that provide more training In addition to increased visibility at the organisation-wide, group, and individual levels, this dashboard is designed to also quantify attack factors measuring the frequency and severity of inbound threats, with plans to analyse inbound phishing attempts, blocked malware, malicious web content loaded by visited websites, and more. With full visibility into this data, organisations can tailor security strategies specifically, including awareness initiatives that provide more training to those who need it and less to those who don’t. Mimecast Engage® transforming security awareness A key pillar of the platform is the company’s new human risk awareness training offering, Mimecast Engage®, which is built to redefine how security leaders can manage human risk. Traditional security awareness programs take a standardised approach, rendering IT leaders unable to identify high-risk employees or effectively mitigate risky behaviour. Increasing productivity Mimecast Engage technology, the result of the integration of Elevate Security technology Mimecast Engage technology, the result of the integration of Elevate Security technology acquired in December 2023 with Mimecast’s awareness training product, combines to eliminate blind spots by offering extensive visibility into employees' risky behaviours powered by the human risk dashboard and adapting interventions to each individual's unique risk profile. This approach also helps increase productivity as the lower-risk employees are interrupted far less with training tasks, enabling them to focus on more critical business activities. Awareness and training "Mimecast Engage awareness and training empowers security teams to identify and reduce risky behaviour with smarter, more targeted training," said van Zadelhoff. "It leverages risk insights from the Mimecast ecosystem and beyond to deliver contextual interventions at the point of risk, helping to ensure a more secure work surface." Key benefits of the HRM platform Visibility: The comprehensive human risk dashboard spans the collaborative landscape, ensuring organisations can keep up with and stay ahead of evolving threats. Insight: Leveraging two decades of focused cybersecurity expertise, Mimecast’s HRM platform helps align cyber and human risk for more detailed and actionable insights. CISOs and security analysts can take these insights make proper decisions and deploy the right tactics to keep the organisation secure. Action: The unified, AI-powered platform is engineered to ensure that threats can be detected and eliminated promptly, allowing for precise and proactive decision-making. New business standards Mimecast is pioneering human risk management. The HRM platform and Mimecast Engage technology are the latest innovations in its mission to advance security and transform the way organisations manage and mitigate risk. By integrating security into the very fabric of human interaction, the organisation is setting a new standard for protecting businesses in an increasingly complex digital world.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-centre at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Centre SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call centre software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasising feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrolment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defence in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panellists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasising tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalised a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defences against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defences. By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the evolving threat of cyberattacks, safeguarding the nation's maritime economy and national security. Expanded authority for DHS The proactive approach aims to prevent incidents before they occur The Executive Order grants expanded authority to the Department of Homeland Security (DHS) and the Coast Guard to address maritime cyber threats. DHS gains the power to directly tackle these challenges, while the Coast Guard receives specific tools. The Coast Guard can compel vessels and waterfront facilities to address cyber vulnerabilities that endanger safety. The proactive approach aims to prevent incidents before they occur. Real-time information sharing Reporting any cyber threats or incidents targeting ports and harbors becomes mandatory. This real-time information sharing allows for swifter response and mitigation efforts. The Coast Guard also gains the authority to restrict the movement of vessels suspected of posing cyber threats. Inspections can be conducted on vessels and facilities deemed risky. Mandatory cybersecurity standards The standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting Beyond these broad powers, the Executive Order establishes foundational elements for improved cybersecurity. Mandatory cybersecurity standards will be implemented for U.S. ports' networks and systems, ensuring a baseline level of protection across the board. This standardisation aims to eliminate weak links in the chain and prevent attackers from exploiting individual vulnerabilities. Importance of collaboration and transparency Furthermore, the initiative emphasises the importance of collaboration and information sharing. Mandatory reporting of cyber incidents fosters transparency and allows government agencies and private sector partners to work together in mitigating threats. Additionally, the Executive Order encourages increased information sharing among all stakeholders, facilitating a unified response to potential attacks. Maritime Security Directive The Executive Order encourages investment in research and development for innovative cybersecurity solutions To address specific concerns, the Coast Guard will issue a Maritime Security Directive targeting operators of Chinese-manufactured ship-to-shore cranes. This directive outlines risk management strategies to address identified vulnerabilities in these critical pieces of port infrastructure. The long-term success of this initiative hinges on effective implementation. The Executive Order encourages investment in research and development for innovative cybersecurity solutions, recognising the need for continuous improvement and adaptation to evolving threats. Recognising the urgency of cyber threats The initiative has been met with widespread support from port authorities, industry stakeholders, and cybersecurity experts who recognise the urgency of addressing cyber threats. However, some concerns exist regarding the potential burden of complying with new regulations for smaller port operators. Effective communication, resource allocation, and collaboration among all stakeholders will be crucial to ensure the successful implementation of this comprehensive plan. Enhancing cybersecurity The more impactful and noteworthy piece is the associated NPRM from the U.S. Coast Guard (USCG) “This Executive Order is a positive move that will give the U.S. Coast Guard (USCG) additional authority to enhance cybersecurity within the marine transportation system and respond to cyber incidents,” comments Josh Kolleda, practice director, transport at NCC Group, a cybersecurity consulting firm. The more impactful and noteworthy piece is the associated Notice of Proposed Rulemaking (NPRM) from the U.S. Coast Guard (USCG) on “Cybersecurity in the Marine Transportation System,” adds Kolleda. Portions of the notice of proposed rulemaking (NPRM) look similar to the Transportation Security Administration (TSA) Security Directive for the rail industry and the Emergency Amendment for the aviation industry. Coordinating with TSA on lessons learned The USCG should be coordinating with TSA on lessons learned and incorporating them into additional guidance to stakeholders and processes to review plans and overall compliance, says Kolleda. “At first glance, the NPRM provides a great roadmap to increase cybersecurity posture across the various stakeholders, but it underestimates the cost to private companies in meeting the requirements, particularly in areas such as penetration testing,” says Kolleda. Cyber espionage and threats The focus is on PRC because nearly 80% of cranes operated at U.S. ports are manufactured there “It is unclear if or how the federal government will provide support for compliance efforts. As this seems to be an unfunded mandate, many private companies will opt for the bare minimum in compliance.” “Cyber espionage and threats have been reported by the Director of National Intelligence from multiple nation-states including China, Russia, and Iran,” adds Paul Kingsbury, principal security consultant & North America Maritime Lead at NCC Group. The focus here is on the People’s Republic of China (PRC) because nearly 80% of cranes operated at U.S. ports are manufactured there, he says. Destructive malware “The state-sponsored cyber actors’ goal is to disrupt critical functions by deploying destructive malware resulting in disruption to the U.S. supply chain,” says Kingsbury. “These threat actors do not only originate in China or other nation-states but also include advanced persistent threats (APTs) operated by criminal syndicates seeking financial gain from such disruptions." "The threat actors don’t care where the crane was manufactured but rather seek targets with limited protections and defences. The minimum cyber security requirements outlined within the NPRM should be adopted by all crane operators and all cranes, regardless of where they are manufactured.” PRC-manufactured cranes Kingsbury adds, “The pioneering risk outlined in the briefing is that these cranes (PRC manufactured) are controlled, serviced, and programmed from remote locations in China." "While this is a valid concern and should be assessed, there are certainly instances where PRC-manufactured cranes do not have control systems manufactured in PRC. For example, there are situations in maritime transportation system facilities where older cranes have been retrofitted with control systems of European Union or Japanese origin.” Monitoring wireless threats “The Biden Administration’s recent Executive Order is a critical step forward in protecting U.S. ports from cyberattacks and securing America’s supply chains,” says Dr. Brett Walkenhorst, CTO at Bastille, a wireless threat intelligence technology company. “To ensure proper defence against malicious actors accessing port-side networks, attention must also be paid to common wireless vulnerabilities." "Attacks leveraging Wi-Fi, Bluetooth, and IoT protocols may be used to access authorised infrastructure including IT and OT systems. Monitoring such wireless threats is an important element in a comprehensive approach to upgrading the defences of our nation’s critical infrastructure.”
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
Cognitec Systems is providing reliable face recognition technology to Brazilian payment solutions provider - Billingpay for use in Rio de Janeiro’s public transport system. Automated face recognition Billingpay has implemented automated face recognition to facilitate digital ticketing via the transport application Jaé, to be used by more than four million users daily. Currently, about 11 thousand capture devices are installed throughout the city’s transportation system. Facial biometrics The process starts with the enrollment of facial images during the registration service The process starts with the enrollment of facial images during the registration service, which is then used to prevent revenue evasion in public transportation. Facial biometrics match the ticket holder to the correct ticket, therefore preventing fraudulent use of subsidised tickets. “The second largest city in Brazil now operates one of the most modern and secure ticketing systems in the world, with added high-performance technology from Cognitec!” comments Marcello Perrotta, CCO of Billingpay. Modern identification services Public transport users can also present their faces to log into the Jaé platform and access buses or trains without the need for a ticket or identification. “This use case is a testament to the countless capabilities of face recognition technologies for modern identification services,” says Alfredo Herrera, Cognitec’s Managing Director, adding “We are excited to be a part of this innovative project, and this successful international partnership with Billingpay!”
One of India's fastest-growing entertainment networks, renowned for its iconic brands, offers a diverse array of experiences across multiple platforms. This network profoundly impacts the Indian entertainment landscape, engaging audiences through its on-air, online, on-ground, cinema, and merchandise properties. With a portfolio of over 30 channels, it captivates audiences nationwide with a variety of programming, including general entertainment, movies, sports, youth content, music, and children's genres. Additionally, the network has been successfully producing and distributing acclaimed Hindi and regional films in India for over a decade. Challenge/requirements The client required a unified communication solution, prioritising emergency communication, for over 500 users. Future scalability was a crucial factor as well. A major challenge involved integrating Matrix devices with existing SIP-enabled systems. Their key requirements were as follows: Unified Communication Solution: Implement a system that ensures seamless connectivity across various devices via a single unified communication platform. Mobility: Guarantee connectivity for users on the go. SIP Integration: It was essential to integrate Matrix devices with the existing SIP-enabled systems to maximise investment efficiency without revamping the current infrastructure. Emergency Communication: Provide features that facilitate contacting emergency services during times of distress. Redundancy: To minimise or eliminate downtime, particularly during emergencies, redundancy was a critical requirement. Solution Matrix, in collaboration with Space Office Systems (I) Pvt. Ltd., created a Unified Communication solution that integrated existing devices with Matrix devices via SIP. This solution included the ANANT unified communication server, standard SIP desk phones, and the VARTA softphone. The deployment was carried out as follows: The server-based PBX, ANANT, housed in the server room, provides LAN and WAN connectivity with the crucial feature of redundancy. The media house utilised ANANT's LAN connectivity, facilitated by a network switch that allowed multiple devices on the premises to access IP connectivity. The network switch, connected to ANANT via LAN, provides connectivity for SPARSH VP510 and SPARSH VP210 phones, along with the VARTA softphone. Moreover, a connection through the router facilitates SIP integration with third-party devices via the SIP trunk. Results Emphasising SIP integration of Matrix devices with existing systems optimised investments The results included significant enhancements to their communication capabilities. Collaboration was streamlined through a unified communication solution, and mobility was boosted with VARTA. Emphasising SIP integration of Matrix devices with existing systems optimised investments. Overall, the solution markedly improved operational efficiency with advanced calling features. Now, let's delve into the specifics of the solution provided. Collaboration: The unified communication solution, featuring the server-based PBX ANANT, enabled seamless teamwork between office-based and mobile staff through VARTA. This ensured uninterrupted transfer and reception of information. Investment Optimisation: The SIP integration with Matrix Solution seamlessly integrated into the existing network infrastructure, meeting the client's uncompromising requirement. This integration effectively utilised current resources, eliminating the need for additional investments. Operational Efficiency: The redundancy offered by ANANT ensured minimal to no downtime, enabling smooth information flow and greatly enhancing workflow efficiency. This capability was especially critical during emergencies and related communications. Modern Features: The office now enjoys enhanced capabilities with Matrix Standard SIP desk phones such as SPARSH VP210 and SPARSH VP510. These include advanced call routeing, integration with global directories, VPN connectivity support, thereby significantly bolstering the media house's communication capabilities. The Matrix solution empowered the media house to elevate its communication capabilities with advanced call features. Notably, it excelled in emergency communication functionality, provided scalability for future needs, and seamlessly integrated with third-party devices through SIP.
Sports hold profound significance in the lives of athletes, nations, and citizens alike, fostering a sense of unity and national pride. Sporting events captivate hearts and minds, showcasing the devotion towards athletic spirit. The journey of an athlete from local competitions to global stages embodies dedication and resilience, inspiring millions worldwide. Olympics event At the pinnacle of this athletic journey lies the Olympics, a cherished event that transcends borders and cultures, uniting nations in a shared pursuit of excellence and sportsmanship. For years, anticipation has been building as Paris, affectionately known as the City of Lights and renowned as the iconic capital of France, prepares to host the Olympics 2024, promising unforgettable moments of triumph and unity. Facial Recognition Technology FRT symbolises a commitment to safeguarding the spirit of The Olympics, preserving the joy and pride Amidst the excitement, there lies a solemn responsibility: to protect the interests of everyone involved. In response, the use of Facial Recognition Technology (FRT) offers an enhanced approach to improving security measures for identification, access control, and threat detection. It symbolises a commitment to safeguarding the spirit of The Olympics, preserving the joy and pride that this monumental event brings to millions worldwide. The quest for enhanced security at the Olympics Ensuring Olympic security involves addressing a spectrum of challenges, including the complexities of managing fan behaviour, cyber-attacks, and the unpredictability of civil unrest. According to the National Center for Sports Safety and Security, 73.2% of attendees consider safety and security measures when deciding whether to attend an event, and 77% prefer security measures to be visible at an event. Common cybersecurity threats Phishing attacks, credential stuffing, and password spraying are some of the common cybersecurity threats With growing technological advancement and globalisation of the world these days, the Olympic Games face increasing risks of cyber attacks. Phishing attacks, credential stuffing, and password spraying are some of the common cybersecurity threats. Reports from the National Cyber Security Centre, United Kingdom, have established that more than 70% of sports organisations fell victim to cyber incidents in 2020, and this was mostly caused by hackers seeking financial gain. Eradicating Security Concerns with FRT In particular, surveillance becomes an important component of security and incident detection during the Olympics, where millions of spectators gather from all over the world. For this reason, strict perimeter measures, secure screening procedures, and vigilant security are required. Indeed, integrating FRT as an additional feature in Video Management Systems (VMS) can improve the outcomes significantly. Physical Security Enhancement: Video Analytics Systems are one of the most effective means of evaluating threat levels at the event Video Analytics Systems are one of the most effective means of evaluating threat levels at the event, using face recognition to match the faces of the people attending the event with a universal offenders database. It allows security staff to quickly identify malicious actors and detain them. This reduces the likelihood of wrong-doers making attempts at large-scale events, thus, protecting participants and spectators, and ensuring their safety. Monitoring Crowd Behaviour: Effective management of crowd behaviour is crucial for maintaining a safe and harmonious environment. Video Analytics Systems make it easier to look for and monitor disruptive crowd behaviours in real-time, like vandalism, alcoholism, violence, etc. Instigators of such activities are immediately identified and flagged, allowing security officials to address the problem before it escalates. It also helps in tracking and preventing agitation since the system incites recognising people in the crowd from lists of unreliable persons, even if masks hide their faces. This capability enables security to respond quickly to emerging threats, ensuring that protests remain peaceful. Enhanced Cybersecurity Measures: If the FRT system is centralised, any attempted intrusion by an intruder will be immediately visible FRT minimises the capability of cyber intruders attempting to penetrate the competition control information systems, media streams, and security systems and meddle with their work. If the FRT system is centralised, any attempted intrusion by an intruder will be immediately visible to security personnel. This will prevent unauthorised access and reduce not only the number of cybercrimes but also financial and reputational risks. By integrating FRS with AI, biometric and conventional security systems have made security surveillance more effective and efficient in providing real-time data analytics. With the development of generative AI, a new type of attack using spoofing and deep fakes is gaining momentum. Recognition technologies with liveness features can stand out among other defence systems. Peace of mind for athletes and staff FRT has the potential to profoundly impact the Olympic experience, offering athletes and staff a transformative blend of efficiency, security, and operational ease. For athletes, it means seamless access to venues, minimising distractions and administrative hurdles, allowing them to dedicate more time and focus to their training and competition. They can move through the Olympic complex with confidence, knowing their safety is assured. Identifying and addressing potential threats The technology not only enhances a sense of safety and belongingness but also ensures that global athletic excellence Beyond efficiency, this technology empowers security personnel to manage large crowds with precision, swiftly identifying and addressing potential threats. The technology not only enhances a sense of safety and belongingness but also ensures that global athletic excellence is memorable and deeply meaningful for everyone involved. Harmonising security and privacy with integrity Data privacy is paramount, and the balance between safety and the subject’s right to privacy must be kept to the highest standard. Transparency about data collection, storage, and usage fosters trust and upholds individual dignity. By championing both security and privacy, advanced technology security solutions like FRT can play an important role in ensuring that every participant and spectator feels safe, respected, and inspired. The application of security measures trusted worldwide helps maintain the integrity of global events, and the Olympic games act as an anchor for setting a perfect example of unified growth and glory. 360-degree protection "The Olympic Games stand as a monumental event for millions worldwide, posing substantial challenges to security services," said Tamara Morozova, Global CEO, of RecFaces. "Integrating facial recognition software promises 360-degree protection, drastically reducing incident response times to mere seconds, and empowering security personnel with invaluable analytical insights."
Geutebrück video security provides comprehensive protection for professional users, from perimeter security to process documentation. The open platform for video management G-Core offers a variety of interfaces to third-party systems and is the basis for integrated security systems. The latest integration with Commend's communication solutions supports efficient communication and security for users from various verticals such as banking, industrial production, police and corrections authorities, health care, education, road and air traffic, parking facilities, and hotels. Direct voice contact By linking Geutebrück's G-Core Video Management System and Commend's communication servers, information, and commands can be exchanged effortlessly between the systems. For example, users of a Commend intercom station can call up video images from specific cameras at the click of a mouse, assess the situation, and then make direct voice contact with the other party, e.g. to respond immediately to emergency calls. Advanced analysis The integration creates a safer working environment and minimises training times and operating errors This integration not only offers greater transparency but also simplifies the users' daily as they do not have to switch between different platforms. This creates a safer working environment and minimises training times and operating errors. The integration also offers advanced analysis options, such as the automatic detection of suspicious activities using AI algorithms and the creation of detailed security reports. Flexibility and scalability The flexibility and scalability of the combined solution allow the security system to be adapted to changing requirements and simplify the integration of additional components. Overall, the integration provides an improved security infrastructure that significantly increases the efficiency, security, and user-friendliness of monitoring and communication systems.
Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announced that Heathrow Airport’s multi-year investment in Genetec solutions is enabling them to continuously innovate and transform operations. The joint effort provides Heathrow with a unified view across large-scale airport operations to secure people and assets, bringing efficiency and enhancing the passenger experience while ensuring data privacy and cybersecurity compliance. Deployed Genetec Security Centre Heathrow deployed Genetec Security Centre to bring all of its IP security systems onto one unified forum London Heathrow is Europe’s busiest airport, handling approximately 80 million passengers and 14 million tons of goods annually. Over 76,000 employees work around the clock to ensure the airport’s smooth operations across its 1,227-hectare site, including maintaining passenger flow, securing the premises, and managing over 1,300 daily take-offs and landings for 89 different airlines. Heathrow initially deployed Genetec Security Centre to bring all of its IP security systems onto one unified platform. What began as a 2,000-camera deployment in 2016 has since more than quadrupled in size, incorporating everything from video and access control to LIDAR, analytics, automatic licence plate recognition (ALPR), and more. Genetec solutions Genetec solutions are used to go far beyond security. For example, Genetec solutions are used to monitor over 150 km (93 miles) of baggage belts and facilitate the daily entry and exit of over 150,000 vehicles. “We’re essentially running a small city operation that happens to be called Heathrow,” explains Danny Long, IT Product Owner for physical security products at Heathrow. “Alongside the traditional airport security functions, we’re responsible for the monitoring of roads, retail space, three train stations, a bus terminal, offices, a church, fuel stores, a high voltage electrical network, and all the other associated infrastructure that maintains passenger flow.” Software and firmware updates Genetec Security Centre supports 90 other stakeholder groups working across 110 control rooms Genetec Security Centre now supports 90 different stakeholder groups working across 110 distinct control rooms, all of whom have different needs and access rights. Customised dashboards enable individual teams and third parties, such as police, government agencies, airlines, and retailers, to focus on their specific tasks. For example, some operational staff are given the tools to monitor passenger flow and are automatically notified when security lines grow too long. Meanwhile, colleagues in IT don’t see camera feeds. Instead, they have access to system health dashboards that notify them of devices that have fallen offline or require software/firmware updates. New requirements “The joy of working with London Heathrow is that the team is constantly striving to put our system through its paces and identify new areas where it can add value,” states Simon Barnes, Director of Business Development, Genetec, Inc. “While our software is configured to their requirements at the time, once in the field, new requirements emerge, and we have to adjust to their reality." “My job is to translate business requirements into workable solutions and Genetec provides me with the valuable tools to achieve that,” concludes Long. “Our experience with Genetec has been very positive. We’re only looking to expand in terms of the size and usage of the system.”
The Ampelmännchen (“little traffic light man”) from the former GDR is a cult figure around the globe. For tourists, the shops of AMPELMANN GmbH in Berlin are a big draw. Branches are spread over the entire city, and to reduce the burden of employee and staff key assignments, the company sought to optimise access rights management. At the same time, branch security needed to be state-of-the-art. The CLIQ® access control solution from ASSA ABLOY met all these requirements with flying colours. AMPELMANN GmbH Founder and Owner - Markus Heckhausen sought a locking solution for eight AMPELMANN GmbH branches and a 2,200 m2 logistics centre, to meet the needs of a decentralised branch organisation. This creative company, which manufactures and sells a wide variety of products under the AMPELMANN brand with the Ampelmännchen, did not want a complex system suited only to large companies with thousands of employees. It should be practicable and fast for a company with around 150 employees, yet still be able to secure branches reliably. Easy administration, maximum security Branches must be accessible to customers during opening hours, yet sufficiently secured Small and medium-sized retailers face the same access control challenges as their large competitors. Employees need access to the store, warehouse, and offices, but not every employee should have the same authority. Branches must be accessible to customers during opening hours, yet sufficiently secured after closing time against unauthorised access. Challenges faced Key management is often an elaborate, time-consuming process, even more so when keys are lost or stolen. In such cases, all locking systems must be replaced, which requires more effort and significant costs. AMPELMANN GmbH in Berlin also faced these issues. Its eight branches are located in the best shopping areas in Berlin, each staffed by several employees. External service providers, such as cleaners also need access to the building. A large staff roster and significant distance between branches create a major key management workload. eCLIQ ensures branch security Together with the Berlin locksmith Hinz, AMPELMANN Owner - Markus Heckhauen found a solution in the flexible, decentralised, and reliable electronic locking system from ASSA ABLOY. Uli Hahn, Managing Director of Hinz, has been providing security in and around Berlin for more than 50 years. He says, "The eCLIQ locking system is very powerful and safe compared to conventional systems. It is easy to handle and to assemble. Above all, it enables quick and easy administration of access authorisations, making it the perfect choice for medium-sized companies, such as AMPELMANN." Plug-and-play solution Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software eCLIQ comes as a "plug and play" solution and is ready to use immediately after installation. The system works without cabling, so the extremely compact eCLIQ cylinder can be used in a wide variety of doors at any location. Power is supplied by batteries in each programmable key, which can be changed easily and without tools. A built-in chip makes every electronic key unique. Keys can be programmed directly on the cylinder, remotely, or with easy-to-use eCLIQ Manager software. Robust, durable, and safe In addition to the compact design, the system is characterised by robust, durable, and safe components. An integrated lubricant reservoir ensures the cylinders remain maintenance-free for up to 200,000 cycles. A high-quality processor protects the locking system against manipulation and intelligent attacks. Keys are also highly resistant and waterproof (IP67). eCLIQ cylinders and keys are VdS-certified (BZ +) and comply with the DIN EN 15684 standard for electronic locking systems. A wide range of different cylinder types makes the system suitable for many applications from the company's entrance gate to securing alarm systems, elevators, doors, and cupboards. Convincing solution "Decisive in our choice of eCLIQ was that we could control access authorisations easily and flexibly at any time," explains Markus Heckhausen, adding "If a key is lost, we can easily deactivate it and disable it." eCLIQ even makes time- and location-limited authorisations easy for example, by allowing cleaners to enter only at certain times. The allocation of access authorisations can be coordinated conveniently by individual branch managers, within a system that ensures maximum security for all AMPELMANN GmbH shops.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Audio might detect sounds like breaking glass or footsteps before a person even enters the field-of-view of a video camera. Audio also helps to provide context: Someone running in a video image might be suspicious, but the situation is different if they are yelling for help. Furthermore, audio enables operators to talk remotely to people on site, which can deter crime, de-escalate situations, or gather information. And yet, optimising audio is often an overlooked aspect of physical security system design. We asked this week's Expert Panel Roundtable: What is the expanding role of audio in today's physical security systems?
Inflation, the rise in prices of goods and services over time, can result from a multitude of factors. It happens when there is more money chasing a limited supply of goods. It happens when the cost of producing and transporting goods increases. It can even happen because expectations of future inflation heighten current demand to avoid higher prices. During and after the COVID pandemic, supply chain disruptions, shifting consumer demand, and government stimulus all contributed to higher inflation throughout the broader economy, including the physical security marketplace. Energy price shocks, particularly oil price spikes in late 2021, also increased inflationary pressures. But what is the situation now? We asked this week's Expert Panel Roundtable: Has price inflation ended (or slowed down) in the security market?
Manufacturers make things. That hasn’t changed. Manufacturers today still produce finished goods from raw materials using various tools, equipment, and processes. What is evolving is a greater emphasis among manufacturers on understanding and meeting customer needs. In the security industry and elsewhere, the role of a manufacturer is expanding from a purely production-focused function to one that embraces technology, prioritises adaptability, expands service offerings, and caters to a more demanding customer base. We asked this week’s Expert Panel Roundtable: How is the role of the manufacturer changing in the security market? Is “manufacturer” still the best term to reflect the changing role?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![A step-by-step checklist for choosing an intercom system](https://www.sourcesecurity.com/img/white-papers/612/lg-wp-image-920x533.jpeg)
A step-by-step checklist for choosing an intercom system
Download![Safeguard Students With New Techniques And Technology](https://www.sourcesecurity.com/img/white-papers/612/milestone-k-12-ebook-mockup-2023-920x533.jpeg)
Safeguard Students With New Techniques And Technology
Download![How to implement a physical security strategy with privacy in mind](https://www.sourcesecurity.com/img/white-papers/612/920x533_1676645204.png)
How to implement a physical security strategy with privacy in mind
Download![5 ways to strengthen physical security with an integrated system](https://www.sourcesecurity.com/img/white-papers/612/asset-image-920x533_1660648693.jpg)
5 ways to strengthen physical security with an integrated system
Download![The benefits of Edge AI + Cloud for security systems](https://www.sourcesecurity.com/img/white-papers/612/anviz1-920-x-533.jpg)
The benefits of Edge AI + Cloud for security systems
Download![Creating a secure and positive healthcare experience](https://www.sourcesecurity.com/img/white-papers/612/asset-image-920x533_1658397645.jpg)
Creating a secure and positive healthcare experience
Download![Integrated access control: reap the benefits of connected security](https://www.sourcesecurity.com/img/white-papers/612/image.jpg)
Integrated access control: reap the benefits of connected security
Download![Connected video technology for safe cities](https://www.sourcesecurity.com/img/white-papers/612/milestone-safe-city-video-technology-920.jpg)
Connected video technology for safe cities
Download![10 step guide to staying ahead of emerging security threats](https://www.sourcesecurity.com/img/white-papers/612/everbridge-920_1611141969.jpg)
10 step guide to staying ahead of emerging security threats
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Security monitoring system: Manufacturers & Suppliers
- Dahua Technology Security monitoring system
- Vicon Security monitoring system
- Bolide Security monitoring system
- Hikvision Security monitoring system
- Seagate Security monitoring system
- BCDVideo Security monitoring system
- Pelco Security monitoring system
- LILIN Security monitoring system
- MobileView Security monitoring system
- Hanwha Vision Security monitoring system
- AV Costar Security monitoring system
- Vanderbilt Security monitoring system
- TESA Security monitoring system
- CEM Security monitoring system
- VIVOTEK Security monitoring system
- Sony Security monitoring system
- DSC Security monitoring system
- OPTEX Security monitoring system
- Parabit Security monitoring system
- MOBOTIX Security monitoring system
![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Facial recognition](https://www.sourcesecurity.com/img/emagazines/612/facial-recognition-magazine-security-technology-trends-international.jpg)
Facial recognition
Download