Shop security systems
Hanwha Vision, the global vision solution provider, has launched the TNO-C8083E, its first explosion-proof camera with artificial intelligence. The compact 5MP explosion-proof AI model features AI object detection and classification alongside intelligent video analytics. It has a wide range of explosion-proof certifications, including IECEx, ATEX, KCs, and JPEx, making the camera ideal for environments at a higher risk of an explosive atmosphere due to gas or dust - such as oil refineries, gas...
Appdome, the mobile app economy’s one-stop shop for mobile defense, announced it has enhanced its award-winning Geo-Fraud Detection service to include two new defences: Geo-Location Fencing and Geo DeSync Attack Detection. Combined with other Geo-Compliance features available on the Appdome platform, mobile app developers and enterprises can eliminate location-based fraud, ensure geo-compliance and deliver location-relevant user experiences in mobile apps free from location spoofing, fake...
Security applications for drones have evolved to provide benefits such as bird's-eye views of large areas, easy access to remote locations, and rapid deployment. However, to date, most drone applications have been outdoors. Not for long. Today, indoor drones are also finding unique opportunities for enhanced surveillance, security, and operational efficiency in indoor environments such as offices, warehouses, self-storage facilities, and malls. Indoor drones can navigate complex indoor spaces,...
The faulty CrowdStrike Falcon Sensor update and subsequent outage – the CrowdOut Event – underscore the potential for Single Point of Failure (SPoF) technology outages to impact the global digital economy. CyberCube is advising clients on how to use SPoF Intelligence to identify exposed insureds and estimate the exposure footprint of the event. SPoF Intelligence is the definitive source for analysing a portfolio's digital supply chain, integrated with the industr...
Verkada, a pioneer in cloud-based physical security solutions, announced it will offer customers a new AI-powered search in Beta. Leveraging a large language and large vision model, Verkada’s AI-powered search will enable customers to use everyday language to search their video security camera footage for people and vehicles, making their investigations even more intuitive and efficient. “Our new AI-powered search is an exciting expansion of the way that Verkada leverages the l...
Corsha Inc., a Washington D.C.-based cybersecurity firm, known for its innovative Identity Provider for Machines, pioneering the way in Machine-to-Machine (M2M) security solutions, has been awarded an SBIR Phase III contract by the United States Air Force Sustainment Centre (AFSC). This initiative will focus on developing a blueprint for streamlining how to get Authority to Operate (ATO) and Interim Authority to Test (IATT) certifications for new technologies on the Industrial Depot Maint...
News
Own Company, the industry pioneer for SaaS data protection and activation, strengthens its commitment to US government agencies with FedRAMP-authorised backup and recovery solution for ServiceNow. Own’s backup and recovery solution for ServiceNow, Own Recover, is now a FedRAMP-authorised data protection solution. In recent years, U.S. government agencies have made significant strides in modernising and adopting Software as a Service (SaaS) applications to enhance their efficiency and service delivery. Yet, as agencies rely more on SaaS solutions, they now face the challenge of securing the data in those platforms - data that is often sensitive and crucial for mission delivery. FedRAMP-authorised version Customers are the ones finally liable for protecting the data that they store on these outlets Own has a strong track record of helping agencies protect their data within Salesforce, highlighted by the FedRAMP-authorised version of the Recover for Salesforce solution. This certification ensures that its backup and recovery solution meet stringent security and compliance standards, making Own a trusted data protection partner for agencies leveraging Salesforce. Salesforce isn’t the only SaaS platform that agencies rely on though. More than 100 U.S. government agencies use ServiceNow to modernise, transform, and innovate enterprise-wide service delivery. And while SaaS providers like ServiceNow guarantee the security of their platform, customers are the ones ultimately responsible for protecting the data that they store on these platforms. Zero Trust maturity model That's where Own can help. Own Recover for ServiceNow improves data resilience and compliance by equipping organisations with more control over backup timing and retention, proactive alerting of unusual data loss or corruption, and the ability to quickly restore data—from entire instances down to individual records—entirely through self-service. In addition, Own Recover helps agencies align with the Zero Trust maturity model requirement for independent and off-site backups that are readily available when needed. Own Company understands the unique challenges faced by agencies and strives to deliver innovative and secure solutions that meet their evolving needs. For agencies seeking to enhance data resilience within ServiceNow, Own Recover offers a comprehensive and reliable solution.
Camden Door Controls is pleased to introduce to the market the CX-ED0010 Electromechanical Cabinet Lock. Representative of the impressive technological evolution in secure locking systems, it is designed for a variety of enclosures that use swinging doors, drawers, and sliding doors. This lock introduces the flexibility of operating in either field selectable fail-safe or fail-secure modes and supports both 12V and 24V power supplies. Functionality of the CX-ED0010 This flexible and affordable cabinet lock is ideal for a wide range of access control applications, including securing computer cabinets, lockers, retail display counters, and medical and cannabis dispensaries. It features front mounting for use with office drawers, display cabinets, etc. and the strike plate easily adjusts to door alignment. Door and lock status sensors provide real-time security status, further enhancing the functionality of the CX-ED0010.
Lumeo, an innovator in video analytics, proudly announces the launch of new Generative AI capabilities. These enable users to extract advanced insights from video and search through their footage effortlessly, saving time and unlocking new use cases while optimising costs. Customised video analytics With the exponential growth of video content across various industries, the ability to efficiently analyse and derive insights from this data is crucial. Lumeo's new AI search capability marks a significant milestone, positioning it as a competitive choice for Enterprises, Integrators, and Managed Service Providers (MSPs) seeking unmatched flexibility in accessing and deploying customised video analytics solutions. Large Vision Model Support Lumeo supports running and integrating with Large Vision Models such as OpenAI GPT-4, Google Gemini, and Nvidia NIMs via APIs, as well as Generic Detectors, Generic Classifiers, and Caption Generators running on-device. These integrations enable: Training-free Analytics: These Generative AI models are pre-trained on large datasets and allow users to use natural language prompts to extract scene and object attributes similar to human observation. This enables new analytics use cases that were previously too difficult or required new models. For instance, prompts like "Describe if this is a possible case of vandalism" or "Is there a fight going on?" can be answered accurately. Smarter Captions and Alerts: Utilise large vision models to caption videos or scenes for faster retrieval and make alerts more actionable. For instance, instead of sending a generic “Person detected” alert, users can now receive “Two people detected wearing masks and attempting to open the door” or “Person detected, looks like they are passing by the door”. Hybrid Compute: Large vision models tend to be compute-heavy. Lumeo enables users to run Large Vision Models conditionally (say when a group of people are detected, or just on a person vs the entire scene), and on-device or via Lumeo’s integrations with cloud APIs from OpenAI, Google, and Nvidia. This reduces bandwidth and cost when using cloud APIs and enables more efficient hardware utilisation when running on-device. AI Search Lumeo’s new AI Search capability enables users to search through video using natural language, making it faster to find relevant footage from anywhere. The salient features of Lumeo’s AI search are: Natural Language Queries: Users can perform searches using everyday language, such as "a person falling" or "a red car entering the parking lot" ∙Index Objects, Attributes, and Descriptions: AI Search indexes scenes or specific objects, their attributes, captions and descriptions generated by classic vision AI models or Large Vision Models. Index Custom Events: Define and search for custom events tailored to specific requirements, enhancing the relevance and precision of the search results. For instance, by creating an analytic rule that looks for illegal right turns, users can index “illegal right turn” events and search for them. Hybrid Deployment: AI Search indexes video content on the AI Gateway that is performing the processing, and then uploads the video and metadata for triggered events to Lumeo Cloud. This enables users to search from anywhere while keeping heavy processing load on-device. Through these capabilities, AI Search helps with: Customised Search Queries: Tailor specific search queries to meet unique video analytics requirements, such as detecting particular objects, actions, or patterns within footage. Seamless Integration: Integrate AI search capability with Lumeo's existing suite of analytics tools for a unified and comprehensive video data management experience. Natural Language Search: Utilise natural language for queries, allowing users to explore video content using descriptive phrases or questions, regardless of predefined analytics categories. Enhanced Efficiency: Streamline the search process, significantly reducing the time and effort required to identify specific insights within large video datasets, enabling swift, informed decisions. Unrivaled Customisation: Empower users to customise search parameters according to their industry-specific needs, unlocking new possibilities for data-driven decision-making in various fields, including security monitoring, retail analytics, and industrial optimisation. Efficiency and precision "We are thrilled to bring Generative AI, AI Search, and Large Vision Models to video analytics, a testament to our commitment to empowering users with cutting-edge tools to unlock the full potential of their video data," said Devarshi Shah, CEO of Lumeo. "With this groundbreaking feature, we are redefining the way organisations interact with their video analytics, enabling them to extract actionable insights with unparalleled efficiency and precision." Cloud Storage retention-based plan AI Search is available on any paid Lumeo tier with the addition of a Lumeo Cloud Storage retention-based plan that offers a 7/30/60/90/360-day retention period per camera. This enables users to store event recordings and search for them, for a fixed monthly per-camera fee.
NSI-approved companies had an impressive presence amongst the finalists and winners at this year’s British Security Awards which took place on 3rd July at the Royal Lancaster Hotel in London. The prestigious annual ceremony, organised by the British Security Industry Association (BSIA), celebrates the achievements, acts of bravery and innovations by BSIA members and prospective members in the security systems and guarding services sectors. Highest standards of excellence As a long-term supporter of apprenticeships in the security and fire sectors, NSI was delighted to sponsor the Apprentice of the Year Award for the sixth consecutive year. This year’s winner, Terry McJimpsey of Securigroup, was recognised for his outstanding commitment to learning, professional development, and customer service excellence from his initial steps as an apprentice to his current role as Operations Centre Supervisor. NSI was delighted to sponsor the Apprentice of the Year Award for the sixth consecutive year NSI warmly congratulates all the winners and finalists from this year’s British Security Awards, whose achievements exemplify the highest standards of excellence in the private security sector. With 19 NSI-approved companies shortlisted as finalists and a remarkable 80 nominations among them, they are thrilled to celebrate the success of the following NSI-approved companies and representatives who emerged as winners in the following 13 categories: Best Team: Westgrove Group - Templars Square Shopping Centre Outstanding Act: Martyn Ward - Bidvest Noonan Security Manager of the Year: Tom Meredith–Mitie Gaby Hutchinson Award (Best Newcomer): Caitlyn Turner – Lodge Service Apprentice of the Year: Terry McJimpsey – Securigroup People Property Places - Professionally Protected Recognition Award: Enadeghe Nosakhare – STM Group Mental Wellbeing Initiative: Westgrove Group – Mind over Mountains EDI Champion: G4S – The Million, Securing a Socially Responsible Future SME of the Year: Fenix Monitoring Business of the Year: Mitie Installer of the Year: Securigroup – WH Malcolm Installation Environmental Project of the Year: Securigroup – Securigroup Forest Contribution to Industry: Shaun Kennedy – Securitas UK Additionally, congratulations to Ken Meanwell, Staff Officer NPCC Security Systems Group who received the Chairman’s Award, and to James Goodram of the Post Office, who was honoured with the Industry Bravery Award to a standing ovation. Level of commitment and professionalism Richard Fogelman, NSI Chief Executive, commented: “The British Security Awards are a highlight of the industry calendar and this year’s event was no exception. My congratulations go to all of this year’s winners and finalists, including the NSI-approved companies among them." "For those honoured in front of their peers and industry colleagues, who understand the level of commitment and professionalism required to provide service excellence 365 days a year, it is incredibly rewarding. We wish them continued success in their future endeavours.”
Red Lion, a manufacturer of innovative technologies that empower industrial organisations to access, connect and visualise their data, is pleased to announce the launch of N-Tron® NT116 unmanaged industrial Ethernet switch, designed for industrial applications needing dependable performance for mission-critical applications under harsh conditions. The NT116 unmanaged switch offers exceptional reliability and performance for data acquisition, Ethernet I/O and process control. Compact in size and including 16 high-performance copper ports (10/100BaseTX RJ45), the unit is housed in a rugged industrial metal enclosure. Robust network support NT116 offers high shock and vibration tolerance, and all ports have built-in ESD and surge protection The NT116 offers high shock and vibration tolerance, and all ports have built-in ESD and surge protection. Users benefit from an exceptional 1.2M hour MTBF rating, in a slim, space-saving design that operates in temperatures from −40°C to 85°C. For robust network support, the NT116 supports full wire speed communications of up to 3.2 Gb/s throughput. The unit uses store-and-forward technology and supports full and half duplex operation. Two 10-49 VDC power inputs are provided for redundancy. Red Lion’s new N-Tron® NT116 The N-Tron® NT116 is the next evolution of Red Lion’s 116TX unmanaged industrial ethernet switch. In addition to IEEE 802.3 compliance and marine, railway, and rolling stock certifications, the new switch carries UL Ordinary and Hazardous locations as well as ATEX and IECEx certifications. New switch carries UL Ordinary and Hazardous locations and ATEX and IECEx certification Red Lion’s new N-Tron® NT116 makes critical performance data easier to gather. Its rugged and hardened design provides the durability and reliability needed to withstand the extreme conditions found on factory floor control networks and in oil and gas, utilities, wastewater treatment, alternative energy, rail, intelligent traffic control and transportation applications. Industrial ethernet switch “When industrial equipment operators and business pioneers can access their data seamlessly and quickly, they derive more value from it." "The N-Tron® NT116 unmanaged industrial ethernet switch minimises downtime and maximises throughput to improve efficiency and drive operational performance,” said Diane Davis Product Manager.
IDEMIA Public Security North America, the pioneer secure identity solutions provider, in partnership with the New York State Department of Motor Vehicles has launched the next-generation of mobile ID. New York residents can now assert their identity securely and easily from their mobile phone by downloading the free app from either the Apple App Store or Google Play. State residents can use the app immediately to verify their identities directly from their mobile phones at TSA checkpoints at John F. Kennedy International Airport (JFK) and LaGuardia Airport (LGA), as well as 27 other participating airports around the country. Interactive identity solution This comprehensive and interactive identity solution can be used for identity verification both in-person and online by various government agencies, businesses, and organisations. Created with IDEMIA’s patented technologies, robust security features, and a focus on privacy and interoperability at the forefront, the New York Mobile ID (mID) app is designed to conform to the International Organization for Standardization (ISO) standard for the mobile driving license (ISO 18013-5). This provides a high level of assurance that mobile ID verifiers and relying parties of mobile ID can trust This provides a high level of assurance that mobile ID verifiers and relying parties of mobile ID can trust. The New York Department of Motor Vehicles (NY DMV) pushes on-demand credential updates to the app, ensuring verifiers have the most-up-to-date status, including real-time notification if an ID has been revoked or cancelled. Easy and contactless way The New York mID app provides an easy and contactless way for users to verify their identity while protecting their privacy and ensuring security. Mobile ID holders are the only ones who can access the Mobile ID by unlocking the app using their biometrics or their personal six-digit pin. Users must consent to sharing their information when using their Mobile ID, an improvement in consumer privacy compared to the physical credential. “Everything is on your cell phone these days, and now, your ID can be too. This is an exciting way to provide identification without having to dig through your wallet or purse to find your physical document. Rather than handing over your physical ID with lots of personal information, the Mobile ID gives you greater control over what personal data you share. We are proud of the product we built with our partners at IDEMIA and look forward to New Yorkers using it,” said Mark J.F. Schroeder, DMV Commissioner. Demonstrating collective commitment IDEMIA’s partnership with New York Department of Motor Vehicles is an example of iron sharpening iron" “IDEMIA’s partnership with New York Department of Motor Vehicles is an example of iron sharpening iron. Throughout the development and launch of New York’s mobile ID, leaders in the State challenged us to do more and make important improvements to our mID offering. Ultimately, the State of New York is launching a best-in-class solution to its citizens, something they should all be proud of.” “Together, we are demonstrating our collective commitment to expanding the use of mobile ID while implementing technologies that are convenient, secure, and equally accessible to all citizens. We’re excited for New York residents to be able to use this technology to verify their identities seamlessly and securely and for acceptors of mobile ID to gain important benefits as well,” said Donnie Scott, CEO of IDEMIA Public Security North America. Significant user experience The NY mID app was designed with IDEMIA’s most advanced features to improve usability for all residents. The NY DMV and IDEMIA teams collaborated to make significant user experience improvements including enhancements to screen reader compatibility, adjustable text and contrast, voice command, keyboard navigation, and much more. Arizona, Delaware, Iowa, and Mississippi are additional states that have rolled out IDEMIA’s Mobile ID technology, with more states to launch later this year.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Expert commentary
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint method have made it among the most widely used for biometric authentication across industry sectors ranging from banking and finance, retail, and healthcare, to government and law enforcement. It performs biometric technology’s “something you are” function while offering unique characteristics that make it particularly valuable for many applications. Unique identifier The fingerprint biometric has the permanency of being reasonably stable and consistent over time Among these characteristics is the pervasiveness and special nature of the fingerprint -- almost everyone has one, and each is a unique identifier. The fingerprint biometric has the permanency of being reasonably stable and consistent over time. It is also easy to acquire, measure, and process. High adoption rate Another key attribute of a fingerprint biometric is its ability to be protected against threats ranging from abuse and misuse to theft, imitation, and substitution. When it is used with recognition techniques the resulting solution performs with a combination of accuracy, speed, scalability, and ease of use. Fingerprint biometric solutions also have the highest adoption rate among biometric authentication solutions according to an industry report published by Payments Journal. Three interrelated components There are three basic components in any fingerprint biometric system as shown in Figure 1: capture (using a sensor that can capture even the most difficult finger types); liveness detection (using the Presentation Attack Detection – or PAD – technique); and matching (including preventing rejection of a legitimate user). Biometric algorithm The sensor captures and pre-processes the fingerprint data. It must be able to successfully capture fingerprint images for a range of skin types and print conditions under diverse temperatures, humidity, light, surface oil, dust, dirt, and other environmental conditions. A biometric algorithm then extracts minutiae data about the fingerprint ridges (endings, bifurcations, islands, etc.) and their orientation and position. PAD technique Implementing a presentation attack detection (PAD) technique at this stage activates the fingerprint biometric system’s second key element: liveness detection. This verifies the fingerprint’s authenticity and that it belongs to a living person. The system’s third element – matching – occurs after the PAD-verified fingerprint dataset has been securely stored as a record, known as a template, inside an enclave with cryptographic protection. Check for liveness The corresponding template of the legitimate user is then retrieved from secure storage When the fingerprint is presented for matching, it is rechecked for liveness. The corresponding template of the legitimate user is then retrieved from secure storage and the process of matching the fingerprint with this template is executed. This must be completed accurately and without rejecting a legitimate user. Types of fingerprint sensing technologies There are four prevailing categories of sensing technologies used with fingerprint readers: optical, capacitive, thin-film transistor (TFT), and multispectral imaging (MSI). Optical and capacitive method Optical is the most mature sensor technology and offers the benefits of a compact size, good capture Optical is the most mature sensor technology, and offers the benefits of a compact size, good capture and matching performance, a small enough size to fit in most desktop environments or shared workstations, and a high level of accuracy at a cost-effective price point across all use cases. The capacitive method, on the other hand, is less prone to fake finger attempts while also offering a thin and compact size for space-limited applications, the power efficiency to support battery-operated devices, and the ability to handle both indoor and outdoor lighting conditions. TFT technology The third technology goes a step further in capture accuracy. TFT technology can accurately recognise the smallest fingerprint features with ultra-high resolution and is used either as a larger-size matrix capacitive proximity detector (capacitive fingerprint sensor) or a larger-area matrix light detector (optical fingerprint sensor). It is ideal for in-the-field mobile identification applications that require a cost-effective, ultra-slim, and lightweight solution with low power consumption. MSI technology MSI technology differs from all three approaches, projecting multiple colors of light into the finger from different angles to collect both surface and subsurface biometrics data. It captures the most difficult fingerprints of diverse demographics, in a wide range of challenging environments. HID has used this patented technology in fingerprint readers that are compliant with ISO 30107-3 PAD Level 2 for advanced anti-spoofing against fraud. The technology also improves matching and offers sophisticated endpoint security that prohibits cyber criminals from gaining unauthorised access to networks by turning fingerprint readers into secure endpoints. Best practices for technology selection Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership. There are three top considerations: security, suitability, and usability. Each is important and the best approach is to strike a balance between all three. Following are the questions to ask during the selection process: Security: What is the regulatory environment? Financial and government services, healthcare, and law enforcement are some examples of highly regulated sectors with elevated security compliance requirements. Are there mandates in place for advanced capturing and biometric authentication specifications? How important is it to ensure anti-spoofing through liveness detection? Will endpoint security be required so that, if the fingerprint device is hacked, no network, system, or data behind the firewall will be impacted? Suitability: Where will the biometric technology be implemented? There will be additional considerations if it is to be embedded in portable, battery-operated devices that require low power consumption. Where will the technology be used? Will it need to fit into small spaces or be used in challenging indoor or outdoor conditions and environments? Will durability be important? Some deployments will face unpredictable weather and difficult lighting conditions for image capture. Will the technology be used for mission-critical border control or a more common – and less demanding -- commercial use? Usability Is it critical that the technology easily and consistently perform capture and matching? Will there be high volumes of fingerprint captures and matches? Is “friction frustration” a concern? If so, the solution must perform matching quickly and accurately to sustain high levels of user productivity. Will the fingerprint device be used by one person exclusively, or multiple people in a shared workstation setting? How diverse is the user population? Some readers are designed to handle all types of fingerprints and diversified demographics. Different applications Fingerprint biometrics is a proven solution to address real-world challenges, each with its requirements The answers to these questions will help determine the best choice of fingerprint technology. Different applications apply fingerprint biometrics to very different use cases but in all cases. It is a proven solution to address real-world challenges, each with its requirements. For instance, in a healthcare clinician’s terminal area or a similar shared environment with limited space, a durable, low-profile capacitive sensor may be the right answer. For an organisation in a highly regulated, mission-critical environment like a bank or border control agency, advanced technologies such as MSI readers may be needed to avoid the serious repercussions of a spoofed identity or the rejection of a legitimate one. Requirements for a biometric solution These are just a few of the requirements to consider when choosing a fingerprint solution. In banking and finance, alone, fingerprint biometrics is used for applications ranging from transacting at the ATM to customer onboarding (eKYC), compliance (AML/KYC), and fraud prevention. The retail sector adds even more, including age verification, loss prevention, point of sale (POS) security, self-service checkout, and secure time and attendance. Law enforcement organisations have their unique requirements, using fingerprint biometrics for background checks, criminal booking, crime investigation, inmate management, mobile identification, and more. For government agencies, typical applications include benefits distribution, border security, citizen ID, employ authentication (SSO/MFA), and voter registration. Each application requires a thorough assessment of the best fingerprint technology for the job. The right touch The right solution will deliver the optimal balance of security, suitability, and usability Fingerprint biometric solutions empower a wide range of use cases with the simple touch of a finger. The right solution will deliver the optimal balance of security, suitability, and usability based on an analysis of criteria including specific application requirements, the characteristics and size of the user population, and challenges posed by environmental conditions. Accuracy, efficiency, and security The world faces increasingly dangerous fraud, account takeover, and impersonation threats. As industries and enterprises work to improve and evolve their identity and access strategies to combat these threats, fingerprint biometrics continue to prove their value through solutions that meet the key selection criteria while delivering the highest levels of accuracy, efficiency, and security.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
When it comes to security cameras, the end user always wants more—more resolution, more artificial intelligence (AI), and more sensors. However, the cameras themselves do not change much from generation to generation; that is, they have the same power budgets, form factors and price. To achieve “more,” the systems-on-chips (SoCs) inside the video cameras must pack more features and integrate systems that would have been separate components in the past. For an update on the latest capabilities of SoCs inside video cameras, we turned to Jérôme Gigot, Senior Director of Marketing for AIoT at Ambarella, a manufacturer of SOCs. AIoT refers to the artificial intelligence of things, the combination of AI and IoT. Author's quote “The AI performance on today’s cameras matches what was typically done on a server just a generation ago,” says Gigot. “And, doing AI on-camera provides the threefold benefits of being able to run algorithms on a higher-resolution input before the video is encoded and transferred to a server, with a faster response time, and with complete privacy.” Added features of the new SOC Ambarella expects the first cameras with the SoC to emerge on the market during early part of 2024 Ambarella’s latest System on Chip (SOC) is the CV72S, which provides 6× the AI performance of the previous generation and supports the newer transformer neural networks. Even with its extra features, the CV72S maintains the same power envelope as the previous-generation SoCs. The CV72S is now available, sampling is underway by camera manufacturers, and Ambarella expects the first cameras with the SoC to emerge on the market during the early part of 2024. Examples of the added features of the new SOC include image processing, video encoders, AI engines, de-warpers for fisheye lenses, general compute cores, along with functions such as processing multiple imagers on a single SoC, fusion among different types of sensors, and the list goes on. This article will summarise new AI capabilities based on information provided by Ambarella. AI inside the cameras Gigot says AI is by far the most in-demand feature of new security camera SoCs. Customers want to run the latest neural network architectures; run more of them in parallel to achieve more functions (e.g., identifying pedestrians while simultaneously flagging suspicious behavior); run them at higher resolutions in order to pick out objects that are farther away from the camera. And they want to do it all faster. Most AI tasks can be split between object detection, object recognition, segmentation and higher-level “scene understanding” types of functions, he says. The latest AI engines support transformer network architectures (versus currently used convolutional neural networks). With enough AI horsepower, all objects in a scene can be uniquely identified and classified with a set of attributes, tracked across time and space, and fed into higher-level AI algorithms that can detect and flag anomalies. However, everything depends on which scene is within the camera’s field of view. “It might be an easy task for a camera in an office corridor to track a person passing by every couple of minutes; while a ceiling camera in an airport might be looking at thousands of people, all constantly moving in different directions and carrying a wide variety of bags,” Gigot says. Changing the configuration of video systems Low-level AI number crunching would typically be done on camera (at the source of the data) Even with more computing capability inside the camera, central video servers still have their place in the overall AI deployment, as they can more easily aggregate and understand information across multiple cameras. Additionally, low-level AI number crunching would typically be done on camera (at the source of the data). However, the increasing performance capabilities of transformer neural network AI inside the camera will reduce the need for a central video server over time. Even so, a server could still be used for higher-level decisions and to provide a representation of the world; along with a user interface for the user to make sense of all the data. Overall, AI-enabled security cameras with transformer network-based functionality will greatly reduce the use of central servers in security systems. This trend will contribute to a reduction in the greenhouse gases produced by data centres. These server farms consume a lot of energy, due to their power-hungry GPU and CPU chips, and those server processors also need to be cooled using air conditioning that emits additional greenhouse gases. New capabilities of transformer neural networks New kinds of AI architectures are being deployed inside cameras. Newer SoCs can accommodate the latest transformer neural networks (NNs), which now outperform currently used convolutional NNs for many vision tasks. Transformer neural networks require more AI processing power to run, compared to most convolutional NNs. Transformers are great for Natural Language Processing (NLP) as they have mechanisms to “make sense” of a seemingly random arrangement of words. Those same properties, when applied to video, make transformers very efficient at understanding the world in 3D. Transformer NNs require more AI processing power to run, compared to most convolutional NNs For example, imagine a multi-imager camera where an object needs to be tracked from one camera to the next. Transformer networks are also great at focussing their attention on specific parts of the scene—just as some words are more important than others in a sentence, some parts of a scene might be more significant from a security perspective. “I believe that we are currently just scratching the surface of what can be done with transformer networks in video security applications,” says Gigot. The first use cases are mainly for object detection and recognition. However, research in neural networks is focussing on these new transformer architectures and their applications. Expanded use cases for multi-image and fisheye cameras For multi-image cameras, again, the strategy is “less is more.” For example, if you need to build a multi-imager with four 4K sensors, then, in essence, you need to have four cameras in one. That means you need four imaging pipelines, four encoders, four AI engines, and four sets of CPUs to run the higher-level software and streaming. Of course, for cost, size, and power reasons, it would be extremely inefficient to have four SoCs to do all this processing. Therefore, the latest SoCs for security need to integrate four times the performance of the last generation’s single-imager 4K cameras, in order to process four sensors on a single SoC with all the associated AI algorithms. And they need to do this within a reasonable size and power budget. The challenge is very similar for fisheye cameras, where the SoC needs to be able to accept very high-resolution sensors (i.e., 12MP, 16MP and higher), in order to be able to maintain high resolution after de-warping. Additionally, that same SoC must create all the virtual views needed to make one fisheye camera look like multiple physical cameras, and it has to do all of this while running the AI algorithms on every one of those virtual streams at high resolution. The power of ‘sensor fusion’ Sensor fusion is the ability to process multiple sensor types at the same time and correlate all that information Sensor fusion is the ability to process multiple sensor types at the same time (e.g., visual, radar, thermal and time of flight) and correlate all that information. Performing sensor fusion provides an understanding of the world that is greater than the information that could be obtained from any one sensor type in isolation. In terms of chip design, this means that SoCs must be able to interface with, and natively process, inputs from multiple sensor types. Additionally, they must have the AI and CPU performance required to do either object-level fusion (i.e., matching the different objects identified through the different sensors), or even deep-level fusion. This deep fusion takes the raw data from each sensor and runs AI on that unprocessed data. The result is machine-level insights that are richer than those provided by systems that must first go through an intermediate object representation. In other words, deep fusion eliminates the information loss that comes from preprocessing each individual sensor’s data before fusing it with the data from other sensors, which is what happens in object-level fusion. Better image quality AI can be trained to dramatically improve the quality of images captured by camera sensors in low-light conditions, as well as high dynamic range (HDR) scenes with widely contrasting dark and light areas. Typical image sensors are very noisy at night, and AI algorithms can be trained to perform excellently at removing this noise to provide a clear colour picture—even down to 0.1 lux or below. This is called neural network-based image signal processing, or AISP for short. AI can be trained to perform all these functions with much better results than traditional video methods Achieving high image quality under difficult lighting conditions is always a balance among removing noise, not introducing excessive motion blur, and recovering colours. AI can be trained to perform all these functions with much better results than traditional video processing methods can achieve. A key point for video security is that these types of AI algorithms do not “create” data, they just remove noise and clean up the signal. This process allows AI to provide clearer video, even in challenging lighting conditions. The results are better footage for the humans monitoring video security systems, as well as better input for the AI algorithms analysing those systems, particularly at night and under high dynamic range conditions. A typical example would be a camera that needs to switch to night mode (black and white) when the environmental light falls below a certain lux level. By applying these specially trained AI algorithms, that same camera would be able to stay in colour mode and at full frame rate--even at night. This has many advantages, including the ability to see much farther than a typical external illuminator would normally allow, and reduced power consumption. ‘Straight to cloud’ architecture For the cameras themselves, going to the cloud or to a video management system (VMS) might seem like it doesn’t matter, as this is all just streaming video. However, the reality is more complex; especially for cameras going directly to the cloud. When cameras stream to the cloud, there is usually a mix of local, on-camera storage and streaming, in order to save on bandwidth and cloud storage costs. To accomplish this hybrid approach, multiple video-encoding qualities/resolutions are being produced and sent to different places at the same time; and the camera’s AI algorithms are constantly running to optimise bitrates and orchestrate those different video streams. The ability to support all these different streams, in parallel, and to encode them at the lowest bitrate possible, is usually guided by AI algorithms that are constantly analyzing the video feeds. These are just some of the key components needed to accommodate this “straight to cloud” architecture. Keeping cybersecurity top-of-mind Ambarella’s SoCs always implement the latest security mechanisms, both hardware and software Ambarella’s SoCs always implement the latest security mechanisms, both in hardware and software. They accomplish this through a mix of well-known security features, such as ARM trust zones and encryption algorithms, and also by adding another layer of proprietary mechanisms with things like dynamic random access memory (DRAM) scrambling and key management policies. “We take these measures because cybersecurity is of utmost importance when you design an SoC targeted to go into millions of security cameras across the globe,” says Gigot. ‘Eyes of the world’ – and more brains Cameras are “the eyes of the world,” and visual sensors provide the largest portion of that information, by far, compared to other types of sensors. With AI, most security cameras now have a brain behind those eyes. As such, security cameras have the ability to morph from just a reactive and security-focused apparatus to a global sensing infrastructure that can do everything from regulating the AC in offices based on occupancy, to detecting forest fires before anyone sees them, to following weather and world events. AI is the essential ingredient for the innovation that is bringing all those new applications to life, and hopefully leading to a safer and better world.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Case studies
Geekplus, the global pioneer in mobile robot and smart logistics solutions, has deployed the first Shelf-to-Person PopPick project in the Nordics for one of the biggest online pharmacy wholesalers in the region, Med24.dk. System Teknik partnered on the Denmark project, which includes three PopPick stations and 30 Shelf-to-Person robots, bringing a flexible solution to a region where fixed automation still dominates. "With the rise of e-commerce, Med24.dk had been struggling with huge sales growth coupled with fast delivery demands from customers in Denmark, Norway, Sweden searching for pharmacy, health and beauty products. Peak season events had also caused considerable strain to their operations," said Blond Shkodrani, channel partner manager for the Nordics at Geekplus. "Due to their overwhelming success, Med24.dk needed a modular, automated order fulfilment solution for fast, efficient order fulfilment." Order fulfilment challenges Shelf-to-Person takes goods of all sizes while removing the need for infrastructure investment The Geekplus modular Shelf-to-Person solution optimises warehouse operations using mobile robots to transport shelves. In a region where fixed and cubic solutions have been the trend during recent years, Shelf-to-Person handles goods of all sizes while removing the need for infrastructure investment, making it the most flexible response to order fulfilment challenges. PopPick workstations use two retrieval arms and four presentation locations to present pickers with multiple, moveable 78-tote racks at one time, resulting in an industry-pioneering throughput of 450 totes per hour. PopPick can store goods of all types and sizes; the solution is not limited to small pieces and improves ergonomics for workers while picking. It also takes up less space than traditional systems, so customers can use more stations without adding facility space. Mobile order fulfilment solutions "We are very pleased to invest in flooring robots from Geekplus," said Med24.dk CEO Nils Træholt. "We believe that this new and innovative technology can help us realise our growth ambitions, while maintaining good delivery times for the benefit of our customers." Morten Kirch, System Teknik's CSO, added: "Due to Med24.dk's growth, we are thrilled to be able to deliver a tailor-made, automated solution that matches their needs." Geekplus offers a suite of Goods-to-Person mobile order fulfilment solutions-the only comprehensive robotic offering controlled by a single software platform. "Through trusted partners like System Teknik, we're showing customers all over Europe that Geekplus truly is a one-stop shop for modular warehouse automation," Shkodrani said.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announced that the Yorkdale Shopping Centre in Toronto, Canada, has unified its security operations based on Genetec™ Security Centre, Sipelia™, AutoVu™, and Mission Control™. With the Genetec platform, the security team at Yorkdale has been able to enhance operational efficiency, better collaborate with local police, and take a more proactive security stance. Yorkdale Shopping Centre With over two million square feet of retail space and 270 stores, Yorkdale Shopping Centre offers the country’s largest collection of designer labels and luxury brands. Managed by Oxford Properties Group, it goes beyond shopping, offering visitors valet services, a museum-quality art collection, and 24/7 on-site security. Breaking out of proprietary system limitations Additionally, having a closed security solution held them back from exploring new technologies With their proprietary video system and standalone access control solution, searching for information required the security operations team to navigate between the two systems, which slowed investigations and incident response. Additionally, having a closed security solution held them back from exploring new technologies such as cutting-edge cameras or system integrations. Genetec™ Security Centre and Omnicast™ The search for a new video management system (VMS) led them to Genetec™ Security Centre and Omnicast™, which not only provided state-of-the-art video management, but unified video, access control, and data from other sensors into one system. The Genetec solutions enhanced the team's ability to manage security policies, monitor events, and run investigations. Since it is an open platform, Yorkdale can expand the system with new technology as it emerges. A comprehensive view of mall security With Security Centre, we’re shaving valuable time from investigations and response" Since implementing the Security Centre, the Yorkdale team has been able to significantly enhance operational efficiencies. If an incident is underway, operators can see what’s happening and act fast from one unified view. “With Security Centre, we’re shaving valuable time from investigations and response," said Luca Aiello, Security Manager at Oxford Properties. Enhanced guest experience “Our security operators can identify potential risks, retrieve critical information, and deploy on-foot officers faster within the shopping centre." "Overall, we’ve become far more proactive and efficient in handling anything that comes up. That ensures we keep providing an exceptional guest experience.” Sipelia™ intercom module Sipelia allows them to initiate two-way conversations across 150 intercom stations Operators manage over 750 cameras, 500 access control readers, and 2000 cardholders using the Security Centre. They’ve also deployed the Sipelia™ intercom module. Sipelia allows them to initiate two-way conversations across 150 intercom stations located in parking garages, entrances, and other areas. AutoVu™ ALPR system The team also added the AutoVu™ automatic license plate recognition (ALPR) system, the Genetec Mission Control™ decision management system, and other technologies within the platform. All video, data, and calls come back into a state-of-the-art command centre, where security operators keep the shopping centre running smoothly. Security managers can also use the Genetec Mobile app on their phones to check in on situations from anywhere in the mall. Operational efficiencies, enhancing public safety To streamline incident response, the Yorkdale team implemented Genetec Mission Control™ Ensuring security operators can quickly respond and resolve the issues is critical to maintaining a five-star shopping experience. To empower their operators and streamline incident response, the Yorkdale team implemented Genetec Mission Control™. The collaborative decision management system helps operators better understand unfolding events and guides them through the best course of action according to SOPs. Proactive security approach Genetec AutoVu™ has been a key component in fostering a proactive security approach. With 52 AutoVu automatic license plate recognition (ALPR) cameras deployed, they’ve been able to extend security to their property’s perimeter, enhance vehicle-related investigations, and help serve the community. For example, if local police are searching for a vehicle of interest, Yorkdale can put that vehicle information into their AutoVu system, and if the vehicle comes onto their property, police are notified. Responsive to theft-related incidents As incidents of vehicle and/or retail theft rise, the AutoVu ALPR system has also become a deterrent As incidents of vehicle and/or retail theft rise, the AutoVu ALPR system has also become a deterrent. Said Bob Vounotripidis, Senior Operations Manager at Yorkdale Shopping Centre, “Since implementing the AutoVu ALPR system, we’ve become significantly more responsive to theft-related incidents and investigations. Word has gotten out–Yorkdale is a property that takes security seriously, and the perpetrators will be caught.” Planning for future expansions The Yorkdale team is looking ahead to other technologies that can expand their security approach and system, such as deploying body-wearable technology and integrating video from those devices into the unified platform. They are also exploring using Genetec Clearance™ digital evidence management system to streamline evidence sharing with law enforcement. Said Aiello, “More shopping centres should be using Genetec Security centre. This security platform not only helps our team operate more efficiently, but we’re also evolving our deployment using the best technologies out there.”
An IDIS end-to-end retail branch network solution has been adopted across all of Konyalı Saat’s 40 store locations in Türkiye as well as at the pioneering retailer’s warehouse and workshop where high-value watches are repaired, serviced, and calibrated. Konyalı Saat is one of Türkiye’s pioneering independent retail chains in the luxury watches and jewellery sector, with 40 stores selling a wide selection of top brand Swiss-made timepieces, silver and gold accessories with precious gems as well as a range of designer sunglasses. POS integration Systems integrator Secom specified the powerful yet affordable IDIS solution to meet Konyalı Saat’s wide-ranging surveillance and business intelligence needs. Konyali Saat must centralised video control with POS integration and to develop new efficiencies To ensure that all their retail outlets were being run as optimally and securely as possible, Konyali Saat required centralised video management with point-of-sale (POS) integration and to develop new efficiencies using AI-powered video analytics integrated with their wider retail enterprise resource planning (ERP) software. The aim was to boost profitability from strengthened loss prevention as well as improving product management and marketing operations from video data. IDIS AI Box for Retail (DV-1304) Complete HD coverage of each store, without blind spots, was efficiently achieved using a single, NDAA-compliant 12MP IDIS Super Fisheye Camera, plus either one or two 2MP IDIS 2.8 mm fixed lens dome cameras, depending on each store’s layout. The fisheye provides comprehensive domain awareness, providing the same coverage as three or more fixed lens cameras, while the domes located at entrances capture video to support people counting and other analysis functions. These AI capabilities are provided by an IDIS AI Box for Retail (DV-1304), a powerful plug-in video analytics device that can transform IDIS surveillance solutions with functions including people counting, queue management, heat & zone mapping and occupancy monitoring. IDIS DR-2508P NDAA-compliant NVR Footage is recorded locally at each store on an 8-channel IDIS DR-2508P NDAA-compliant NVR An IDIS DP-HE1201 HDMI/VGA Encoder enables simple and cost-effective POS integration, with cash register data overlaid on video footage and time synched with all cameras, allowing suspicious activity or sales anomalies to be investigated quickly and easily while providing a time-stamped visual audit trail. The footage is recorded locally at each store on an 8-channel IDIS DR-2508P NDAA-compliant NVR, and the system is operated in each branch using the cost-free IDIS Centre VMS, as well as being controlled and managed centrally at Konyalı Saats’ headquarters with IDIS Solution Suite (ISS) Expert. IDIS end-to-end solution The IDIS end-to-end solution is allowing Konyalı Saat to analyse sales turnover and conversion rates with visitor numbers by day, month, and week, making it possible to increase boost sales by accurately evaluating store performance including marketing campaigns, product management and staff efficiency more accurately than ever before. IDIS technology is perfectly suited to the demands of high-end retail environments" Yunus Bürge, Information Technology Manager for Konyalı Saat, reports, “We have been deeply impressed with every aspect of the IDIS solution, from the quality and performance of the fisheye cameras to the added value provided by the AI Retail Box including simple integration of video data with our POS. IDIS technology is perfectly suited to the demands of high-end retail environments.” IDIS single source model The chain has recently extended its portfolio with Longines-branded stores, and the owner has ambitious plans to expand further, with four new outlets scheduled to be opened in the next half year and more to follow. Koray Ozyildirim, IDIS Türkiye Country Manager, added, “The project with Konyalı Saat demonstrates IDIS end-to-end solutions for retail can be tailored to meet the needs of stores and retail branch networks of any type and scale. The IDIS single source model gives retailers a choice of cost-effective surveillance technology to tackle challenges such as shrink and safety. Combined with integration options and highly accurate, AI-powered video analytics, we are giving retailers the ability to achieve a rapid return on investment and an enhanced customer experience that positively impacts the bottom line.”
Required a reliable Indian brand that could provide pre and post-sales support throughout India. Matrix’s competitor brands had failed to provide tech support in some remote locations in India Need for effective monitoring in critical areas of the store: Entrances, Exits, Aisles, Cash Counters, and Inventory Need for a solution that provided valuable video evidence for dispute resolution and liability claims Required efficient monitoring at night to mitigate the risk of thefts Solution offered With growing stores across India, they chose Matrix again due to satisfactory results in the past The eyewear chain relied on Matrix for its video surveillance needs as they were highly satisfied with Matrix Access Control and Matrix Telecom solutions, previously. Earlier, they had installed Matrix IP Cameras, Video Recorders, and Matrix Video Management Software for centralised monitoring. With expanding stores across India, they chose Matrix again due to satisfactory results in the past. 1500+ store locations pan India were secured with Matrix IP Cameras and NVRs. A typical deployment in the store included installing 4 to 5 Matrix Professional Series Dome IP Cameras inside the store. Placement of the camera locations The cameras were strategically placed at the following locations: Outside the Store Premises Entry/ Exit of the Store Product Display Aisle to Monitor Customer Interactions Cash Counters Inventory In the Store Matrix SATATYA SAMAS VMS An 8-channel Matrix NVR with 1 SATA Port was installed within each store to record and store video footage from these IP cameras. A particular location in South India required a centralised monitoring solution. For this purpose, Matrix SATATYA SAMAS, Enterprise Video Management Software (VMS) was provided. With the help of this solution, various multi-location cameras could be centrally monitored from a single location. Products offered SATATYA MIDR20FL36CWS (5000+): 2MP IR Dome Camera with 3.6 mm Fixed Lens SATATYA NVR0801X (1000+): 8 Channel NVR with 1 SATA Port Support SATATYA MIBR20FL28CWS: 2MP IR Bullet Camera with 2.8mm Fixed Lens SATATYA CIBR50FL28CWS (10+): 5MP IR Bullet Camera with 2.8mm Fixed Lens SATATYA PZCR20ML33CWP: 2MP PTZ Cameras with 33x Optical Zoom SATATYA NVR6408X: 64 Channel NVR with 8 SATA Ports Matrix Licence Dongle 200: USB Dongle to Run License VMS Application SATATYA SAMAS PLT: Enterprise Video Management Software SATATYA SAMAS CAM100 (3 Nos.): 100 Camera Licence for Enterprise VMS Solution diagram Benefits Pan India Pre and Post-Sales Support: The team at Matrix ensured seamless deployment of cameras and NVRs even in the most remote locations of India. Further, the eyewear chain was assured of technical support whenever required. Comprehensive Security: Matrix IP Cameras and Network Video Recorders ensured robust security coverage for the brand’s retail outlets throughout India. Preventive Crime Measures: Intelligent Video Analytics and Instant Notifications played a crucial role in deterring and preventing shoplifting, vandalism, etc. Enhanced Night-time Security: The Motion Detection IVA feature in Matrix IP Cameras specifically addressed heightened security concerns during store closure. It triggered instant SMS and email notifications to relevant staff upon detecting motion, proactively preventing incidents even after closing hours. Efficient Bandwidth and Storage: The Adaptive Streaming and Smart Streaming Feature in Matrix IP Cameras intelligently managed bandwidth and storage usage, optimising resources. Customized Recording Retention: Matrix NVRs have camera-wise recording retention, enabling tailored storage duration for each camera’s recordings and backups, further enhancing storage efficiency.
About a year and a half ago, Peter de Jong introduced Dahua to Fred Koks, General Manager of KITT Engineering. Since then, Dahua, KITT Engineering and Ocean Outdoor have completed five joint projects together. Follow-up appointments for the next two projects are already scheduled. "Let's see what happens," was Fred's reaction when introduced to Dahua. ''We evaluate our portfolio with suppliers every year,'' he explained. “We have to. So much is changing and new technology is developing incredibly fast. You have to keep up.” He knows better than anyone how mobile the market is. “Among suppliers of LED screens, there is a constant battle for market position and new technology. We all know the big providers and the market leaders. But it is not necessarily that they are also at the forefront of technology.” Indoor shopping centre But the initial learnings and experience with the screen were very good before we started" Erwin van Domselaar, Operations & Project Manager at Ocean Outdoor, says his company dares to blindly trust the expertise of Koks and his people when choosing a particular type of LED screen. "KITT Engineering is our technical supplier. They are very good at distinguishing good products from bad products, and we trust them completely on this. When they have a product they see a future in, they discuss it with us to see if we can take on a project together with it." In Dahua's case, that first project is a screen in a shopping centre called Koperwiek – an indoor shopping centre with more than a hundred fashion-related shops – located in Capelle aan den Ijssel. "That was a relatively small project," Erwin recalls. "The screen was not too big. But the initial learnings and experience with the screen were very good before we started. And the installation itself went off without a hitch. Exactly what we expected from this product." Not regarding the screen, but its coincidence with the renovation of the shopping centre Very pleasant cooperation Soon, a second project was launched. This time in a shopping centre called Sterrenburg in Dordrecht. "Here, not everything went smoothly right away. Not regarding the screen, but its coincidence with the renovation of the shopping centre.” “They had actually just finished. All the walls had been neatly plastered and at that moment we asked if a new cable could be drawn. Fortunately, all this was eventually dealt with and solved in a very pleasant cooperation with the project developer, but it took some time." We are always looking for something new and surprising Pure craftsmanship The third and fourth projects are true masterpieces. In Hoofddorp, KITT Engineering installed a corner screen. "A unique screen for us," says Erwin. "It is the first screen that goes around a corner. It is half a meter that goes around the corner, fitting in super nicely with the surroundings. On paper, a huge screen of forty square meters, but when you stand there, you don't notice it because it blends in so well with the surroundings. We are always looking for something new and surprising. And a screen that turns around the corner offers a lot of new possibilities. For example, in terms of 3D content." Trying various techniques The screen doesn't just go around the corner, it goes around the corner seamlessly" Fred adds: "The screen doesn't just go around the corner, it goes around the corner seamlessly. KITT is always trying to bring novelties forward so we've had corner screens before. But that was in art projects and things like that where requirements are a lot lower.” “In the process, we were able to try out various techniques and we also found out that the products we had at our disposal at that time were not one hundred percent ready. Then Dahua came up with a prototype, we were very pleased with the 'cold corner' as we call it. It is really LED on LED, without a seam." Making image seamless To understand how clever this feat of engineering is, it's worth realising that the margin you have to make the image seamless is the space between two LEDs. Millimeter work, on a length of ten by five meters. "The fourth project was placing a screen in the atrium of Zuidplein shopping centre in RoFerdam," Peter says. "The screen was placed against a glass elevator. When you see that, [it is] not normal the way it came together. You don't see a cable or anything. Really fantastic." For instance, it prevents the light intensity from being too high Monitoring primary system The fifth project collaboration between Dahua, KITT Engineering and Ocean Outdoor is a LED display screen in Westfield Mall of the Netherlands. Something that can have major consequences in outdoor advertising In addition to the regular LED screen and the driving system, a screen control and monitoring system was also developed to monitor the primary system at every point. “We want to see remotely how our assets in the country are doing," Fred explains. From the video player to dysfunctional LEDs, everything can be monitored remotely. For instance, it prevents the light intensity from being too high. Something that can have major consequences in outdoor advertising.
Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announced that the City of New Orleans’ Real Time Crime Centre (RTCC) has deployed Genetec AutoVu Cloudrunner™ to extend the capabilities of its automatic licence plate recognition (ALPR) programme. The vehicle-centric investigative system helps them gather evidence in the historic French Quarter, with easy-to-deploy, solar-powered ALPR technology that captures high-quality images day or night, making it easier and faster to solve crimes. Genetec Omnicast™ The historic nature of the French Quarter made implementing technologies challenging New Orleans is the most populous city in the state of Louisiana. The New Orleans RTCC uses Genetec Omnicast™, the video management system of Genetec™ Security Centre, to manage over 1000 cameras deployed throughout the city. They also have 150 Genetec AutoVu SharpV™ ALPR cameras, and now, 16 Genetec AutoVu Cloudrunner cameras, with another 22 to be deployed. New Orleans RTCC Director Ross Bourgeois said, “The historic nature of the French Quarter made implementing technologies challenging. Since Cloudrunner isn’t hard-wired, it gave us the flexibility to deploy cameras where we couldn't before. There are decorative historic poles that don’t provide as much lighting as a more modern neighbourhood, and Cloudrunner performs really well in low light." AutoVu Cloudrunner Ross Bourgeois added: "Today, we can gather additional licence plate reads and query suspect vehicles that are entering and existing in the area. I think, more than changing our operation, these modern devices have really helped us enhance security in one of the oldest and most popular neighbourhoods in the country.” AutoVu Cloudrunner goes beyond licence plate recognition to collect, analyse, and securely store vehicle information such as vehicle colour, type, make, model as well as behaviour analytics. This allows investigators to narrow their search even when there is no – or only partial – licence plate information available or a vague vehicle description. Live monitoring capabilities Law enforcement can use notices and live monitoring abilities to fast identify and track likely suspects When investigators review the data collected, the intuitive dashboard in Cloudrunner provides the capability to easily search and filter through data based on the descriptive information collected by witnesses. With just a few clicks, filters on the dashboard can parse through data to help identify a vehicle involved in crime and its licence plate information. They can further their investigation by analysing details such as movement patterns and timing of the suspected vehicle. Law enforcement can then use notifications and live monitoring capabilities to quickly identify and track potential suspects. Wireless connections To aid in investigations involving multiple ALPR cameras, data collected can be stored in the cloud and immediately available for querying from any location connected to Cloudrunner. Vehicle images are uploaded from the camera to the cloud via wireless connections over cellular networks. And with the RTCC managing all video and ALPR data within Genetec Security Centre, law enforcement officers don’t have to switch between multiple systems when they're querying requests for video or vehicle data.
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Round table discussion
Cloud implementations enable organisations to slash IT costs, boost performance, increase efficiency, and provide flexibility in a variety of applications. Cloud computing is a great way to store and access data from anywhere in the world, as long as you have an internet connection. In the case of video management, Video Surveillance as a Service (VSaaS) systems are becoming more popular, both as a means of managing costs and to deliver expectations of accessing video from any device anywhere in the world. But on-premise video management systems (VMSs) still have a role to play, don’t they? We asked this week’s Expert Panel Roundtable: What is the continuing role of video management systems (VMS), given the growth in Video Surveillance as a Service (VSaaS)?
Video storage has come a long way since rooms full of VCRs stored video from an entire system of cameras. Video storage equates to data storage, and there are multiple options ranging from hard disk storage to the cloud to storage on each individual camera using SD cards. Increasingly, cloud-based storage is an attractive option to store video footage conveniently and safely. We asked this week’s Expert Panel Roundtable: How is expansion of video storage capabilities impacting the security industry?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Products
![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
White papers
![How video technology is transforming loss prevention, operations, and customer experience in the retail sector](https://www.sourcesecurity.com/img/white-papers/612/920x533_1705333664.png)
How video technology is transforming loss prevention, operations, and customer experience in the retail sector
Download![Delivering smart, secure and healthy retail environments with the cloud](https://www.sourcesecurity.com/img/white-papers/612/retail-cloud-security_1620303687.jpg)
Delivering smart, secure and healthy retail environments with the cloud
Download![The healthy market for video surveillance at medical facilities](https://www.sourcesecurity.com/img/white-papers/612/healthcare-hikvision-surveillance-620.jpg)
The healthy market for video surveillance at medical facilities
Download![How to catch shoplifters with thermal imaging](https://www.sourcesecurity.com/img/white-papers/612/flir-retail-surveillance-620.jpg)
How to catch shoplifters with thermal imaging
Download![](https://www.sourcesecurity.com/img/carousel-nav.png)
![](https://www.sourcesecurity.com/img/carousel-nav.png)
Videos
Shop security systems: Manufacturers & Suppliers
![Honeywell GARD USB threat report 2024](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720696072.png)
Honeywell GARD USB threat report 2024
Download![The role of artificial intelligence to transform video imaging](https://www.sourcesecurity.com/img/white-papers/612/920x533_1720024749.jpg)
The role of artificial intelligence to transform video imaging
Download![Access control system planning phase 1](https://www.sourcesecurity.com/img/white-papers/612/920x533_1719414417.png)
Access control system planning phase 1
Download![Key Findings from the 2024 Thales Cloud Security Study](https://www.sourcesecurity.com/img/virtual-events/612/key-findings-from-the-2024-thales-cloud-security-study-920x533.jpg)
Key Findings from the 2024 Thales Cloud Security Study
Download![Facial recognition](https://www.sourcesecurity.com/img/emagazines/612/facial-recognition-magazine-security-technology-trends-international.jpg)
Facial recognition
Download