Shopping centre security
The terrorism threat in the UK is very real. In fact, since July 2019, the threat level has never dropped lower than “substantial” or “severe.” To ensure preparedness across public places and events, the UK government has introduced the new Terrorism (Protection of Premises) Act 2025, more commonly known as Martyn’s Law in memory of Martyn Hett, a victim of the 2017 Manchester Arena bombing. Overarching aim The new legislation requires operators of public spaces...
Luminys Systems Corporation, the U.S.-based smart technology brand under Foxlink Group, announced the successful unveiling of SYNC ROBOTIC's AI Security Patrol Robot Solution in Taiwan, powered by NVIDIA and Foxlink's technology ecosystem. Backed by a vertically integrated innovation chain, Foxlink's U.S. robotics ecosystem features Luminys' pioneering market deployment and SYNC ROBOTIC, driving product development. Foxlink's broader mission Focused on smart security, AI applications, a...
Orange Business and Toshiba Europe have partnered to launch the first quantum-safe networking service in Paris, France. Orange Quantum Defender uses Toshiba’s Quantum Safe Networking technology, which combines Quantum Key Distribution (QKD) with Post Quantum Cryptography (PQC) for defence in depth. The service is now commercially available in the greater Paris area. The quantum-safe network The quantum-safe network offers the ultimate protection for sensitive data against future...
Artificial Intelligence Technology Solutions, Inc. (the “Company”), a global pioneer in AI-driven security and productivity solutions for enterprise clients, along with its wholly owned subsidiary Robotic Assistance Devices, Inc. (RAD), today announced the signing of a new national authorised dealer, marking a significant expansion into the logistics sector. The new dealer has placed an initial order for four RIO™ Mini solar-powered security trailers, each equipped with RAD&rs...
ZKTeco USA, a major provider of biometric verification and access control technology, announced the company has launched its new cloud-based access control software platform, Cielo365 that is changing the game in access control. Cielo365 is an add-on product that enables customers to easily transition from an on-premise solution to a cloud-based system effortlessly. The new software supports legacy ZKTeco devices and is compatible with existing access control hardware including SpeedFace and P...
DGS Service Solutions, an established provider of outsourced security, cleaning and facilities management services, has successfully implemented Podfather logistics software within its newly launched Industrial Division. With a focus on window cleaning, gutter cleaning, high level cleaning, power washing, and industrial deep cleans, Podfather provides DGS Industrial Services with a proven way to boost its customer experience. Addressing emerging market needs Using the Podfather app, operativ...
News
Six Degrees is pleased to announce the appointment of Mike Drolet as its new Chief Operating Officer (COO) and Tony Healy as its new Chief Information and Technology Officer (CITO). Both appointments bring an impressive track record to Six Degrees. As the Chief Operating Officer, Mike is focused heavily on the transformation and delivery of technology and services to the customers. Extensive experience With extensive global experience, he brings a wealth of knowledge in the deployment of innovative technology With extensive global experience, he brings a wealth of knowledge in the deployment of innovative technology and the delivery of strong, customer-centric results. Mike has held multiple COO positions within the technology, professional services, and consulting industries, and his tenure includes global roles with Geometric Results, Inc (GRI), Pontoon (a subsidiary of the Adecco Group), Infocrossing (a Wipro Company), and Deloitte. New CITO Tony is an award-winning Chief Information and Technology Officer with a proven track record of leading global technology functions across complex, fast-paced environments. He brings extensive experience from multiple private equity-backed organisations operating in pharma, transportation, retail, infrastructure, software, and professional services. Tony has delivered large-scale digital transformations, executed M&A integrations, and embedded cyber and data strategies that drive measurable business outcomes. He is known for shaping high-performing teams, modernising technology platforms, and aligning innovation with commercial growth. Drive new innovation Regarding his new role, Mike Drolet, COO, Six Degrees, said: “I’m delighted to be joining the Six Degrees team as Chief Operating Officer at such a pivotal time. I’m passionate about technology and delivering meaningful outcomes for our customers; I look forward to working with the extremely talented teams at Six Degrees to drive new innovation and deliver cutting-edge services and value to those we serve.” Ready to meet the future Tony Healy, CITO, Six Degrees, said: “I’m excited to join Six Degrees as Chief Information and Technology Officer. My focus will be on aligning our technology, cyber security, and product strategies with our broader business goals – delivering successful product launches, improving customer satisfaction, and ultimately driving organic growth.” “I’m particularly passionate about harnessing the potential of data and AI to drive innovation and value for Six Degrees and our customers, and I look forward to shaping agile, high-performing teams that are ready to meet the future head-on.” Authority comments Commenting on Mike and Tony’s appointments, Vince DeLuca, CEO, Six Degrees, said: “I’m really pleased to welcome Mike and Tony to Six Degrees. Their appointments will help us to achieve key strategic pillars including delivering for our customers now and in the future; reaching new markets; and elevating our service portfolio." "With their combined experience in transformation, innovation, and delivery, I believe we now have the right leadership team in place to realise our vision to be the most trusted and innovative managed services partner, empowering our clients’ success.”
Digitalisation is high on the agenda, or well under-way, in all kinds of commercial environments. As part of this process, many businesses are discovering an additional ROI when they digitalise access management for offices, retail spaces, entertainment venues, warehouses and more. The challenges of securing these buildings are no secret. Staff and business security are a priority, including the resilience of operations and the maintenance of a company’s hard-earned reputation. Filtering access, however, should not erect barriers to accessibility. Buildings should be comfortable to use for all those who are authorised to enter them. Web management software Digital access makes this much easier to achieve, providing day-to-day benefits for each building stakeholder – employees and building managers, owners and the contractors who come and go through commercial building spaces every day. During use, when employees, contractors and visitors can come-and-go with ease, collaboration is simpler and administration for building managers is more streamlined. This functionality supports the broad contribution to business efficiency that digitalisation brings. This functionality supports the broad contribution to business efficiency that digitalisation brings There’s a device to lock almost any opening and a digital solution which can either extend existing access management capability or implement digital access from scratch without cabling or invasive installation. Mobile credentials stored on a smartphone can simplify and accelerate the process of issuing, amending and revoking access. Facility and security managers can benefit from web management software, including mobile access management, which enables remote monitoring and control from one convenient point, or even while off-site. Generating higher revenues According to digital transformation experts, digital access enhances operational agility, improves productivity, enhances security and encourages innovation. Deloitte research found evidence that businesses with greater ‘digital maturity’ generated higher revenues. “Access is an increasingly important part of a digital picture which incorporates both physical and cyber security measures,” says Joachim Mahlstedt, Director and CCO Digital Access Solutions at ASSA ABLOY Opening Solutions EMEIA. “Digitalising access quickly provides benefits which a business can turn into a competitive advantage. It puts powerful tools in the hands of a commercial building manager, as these four real projects demonstrated.” Multiple building technologies Example 1 – Office building Managing access manually and updating multiple systems in parallel can eat up a large amount of facilities staff time. There is a more efficient alternative: management of offices is more streamlined and errors are minimised when multiple building technologies, including access, are connected. There is a more efficient alternative: management of offices is more streamlined and errors are minimised At a new corporate headquarters for Canal+ near Paris, for example, various devices from ASSA ABLOY’s suite of connected Digital Access Solutions – including battery-powered Aperio® wireless handles with integrated readers and ABLOY electromechanical security locks – integrate with a Genetec system to filter access to and through all technical areas, for 1,200 employees plus visitors and contractors. This native integration adds control without adding management complexity. Aperio is not an ‘add-on’, no extra database is required. It becomes part of one streamlined system, controlled from a single interface. Programmable key-operated digital access Example 2 – Manufacturing site Digital access is also available for high security environments and/or locations where multiple different cylinder types must be used. In Germany, RheinfelsQuellen opted for ASSA ABLOY’s eCLIQ programmable key-operated digital access. At its Duisburg HQ and other locations around North Rhine–Westphalia, their new digital locking operates reliably both indoors and outside. The system is managed via the CLIQ Web Manager (CWM); system data may be accessed at any time, and from any location, via the CWM interface. The software's flexibility makes it especially suited to large access systems or for multiple locations which are geographically dispersed. “We would choose this secure and flexible locking solution time and time again,” says Marcus Schlötels, Project Manager at RheinfelsQuellen. Software-powered digital access solution Example 3 – Small retail ASSA ABLOY’s Code Handle locks fitted on a few key doors were the answer Petty theft from stockrooms and shop floors is a persistent problem for retailers. Yet in small premises, a software-powered digital access solution may not be appropriate. In Leuven, Belgium, upscale fashion boutique Patio sought an easy, low-cost deterrent. ASSA ABLOY’s Code Handle locks fitted on a few key doors were the answer. Door security is operated by a discreet PINpad built into a brushed-chrome handle. Two standard batteries slot inside each Code Handle to power the digital security. These typically last for 30,000 lock/unlock cycles. Code Handle comes with one Master PIN; the store manager issues up to 9 additional 4–6-digit PINs. When an employee leaves Patio, it’s simple to delete their PIN. Flexible work environment Example 4 – Flexible workspace Modern workplace design needs access control that is powerful, flexible and aesthetically in tune with building users. At Plexal, an East London flexible work environment used by up to 800 entrepreneurs, ASSA ABLOY Aperio digital access achieves all three. Plexal offices are fitted with Aperio wireless digital locks which are integrated with DoorFlow, NetNodes’ online platform for managing and auditing access. These locks provide Plexal with physical security and transmit door status to DoorFlow in real time. Because they are battery- rather than mains-powered, Aperio locks also keep maintenance costs and energy consumption low. “Digitalisation presents huge challenges and opportunities for businesses of every size and type, in access management and beyond,” adds Joachim Mahlstedt. “Our expertise in access, established over decades, enables us to work with customers to truly get their access ready for what’s ahead. With ASSA ABLOY, they digitalise with confidence.”
Hanwha Vision, the global vision solution provider, has launched Q series fisheye cameras with enhanced AI, providing a range of intelligent analytics alongside 360-degree monitoring. Ideally suited for retail, hospitality, public spaces, and residential settings, with models QNF-C9010 for indoor use, and QNF-C9010V for outdoor use. Efficient investigations with AI Accurate object detection and classification, powered by leading AI algorithms, reduces false alarms caused by wildlife, weather, and changing light patterns. The cameras generate object metadata for quick forensic search in complex scenes, making investigations highly efficient. Footage can be searched based on detected vehicles, people - plus colour of clothing (upper and lower) and vehicle colour. Nine colours can be detected, including black, white, grey, and primary colours. The cameras feature a host of intelligent video analytics including virtual area, appear and disappear, and line-crossing detection. Alerts can be issued based on predefined rules, such as a person remaining in a space for a specific time, or a vehicle crossing a virtual line into a car park. Business intelligence for data-driven decisions The fisheye cameras include heatmapping analytics, people and vehicle counting, and queue management, to enable more strategic decisions such as staffing for checkout counters in a retail space, where to place advertising in public spaces, or limiting the number of people entering a hospitality venue. This delivers value beyond security in other business areas such as marketing, sales, and operations. Clear images, compact form To deliver clear images to operators, the cameras have on-board dewarping To deliver clear images to operators, the cameras have on-board dewarping, which stretches footage out to a horizontal, wide field of view, with no distortion of the image at the edges. There are options for single four-frame views of a space, double or single panoramas, and quad views. The QNF-C9010 is a compact fisheye camera, 52mm in height, making it ideal for indoor settings where it can be discreetly installed on a ceiling or wall. The QNF-C9010V is a larger model with an aluminium casing and IP66 and IK10 ratings, and vandal protection, designed for outdoor environments. Next-level cybersecurity The Q series AI fisheye cameras come with industry-leading end-to-end cybersecurity features, including user and network authentication, secure communication, access control based on IP addresses, device ID, and secure storage. Footage and data are securely stored, with hacking risk pre-empted through unauthorised access blocking. John Lutz Boorman, Head of Product and Marketing, Hanwha Vision Europe, said, “The latest Q series fisheye cameras deliver the benefits of our leading AI-powered analytics to help operators and businesses make smarter decisions. With 360-degree monitoring, a compact and discreet form factor, and business intelligence capabilities, these cameras suit a multitude of applications.”
Keysight’s Riscure Security Solutions has been accredited by the European Payments Initiative (EPI) to conduct security evaluations for Payment Service Providers (PSPs), including both acceptor and consumer evaluations. The device security research lab’s accreditation marks an expansion of Keysight’s EPI certification services, which enable a review of the full range of EPI certification and approval objects, including: EPI Standalone Wallet EPI Digital Wallet Applications embedded in the Payment Service Provider’s (PSP) own Wallet EPI PSP Evaluations (acceptor and consumer) Security requirements “With this accreditation, we’re able to support even more companies in securing their payment solutions,” said Pascal van Gimst, VP of Sales and Business Development at Keysight. “We continue to help our clients navigate security requirements confidently, so that they can focus on building great products and delivering the best experience to their customers.” What is EPI? The goal of the EPI is to develop a comprehensive digital wallet based on the instant payment scheme The EPI is an initiative formed by 16 European banks and financial service providers to build a new digital wallet and a unified account-to-account solution for Europe. The solution aims to establish a new standard in payment methods across Europe, benefiting consumers and merchants across all retail transactions, whether in-store, online, or person-to-person (P2P). The goal of the EPI is to develop a comprehensive digital wallet based on the instant payment scheme, as defined by the European Payments Council (EPC). Digital wallets support various transactions between merchants and individuals, and aim to provide robust security and immediacy through a user-friendly interface. The EPI initiative aligns with Europe’s move towards instant payments and is a response to calls from European authorities for the development of an independent, alternative payment system based on instant payment schemes. Keysight helps customers navigate security requirements Keysight’s expertise in payment security enables vendors to efficiently navigate certification and strengthen the security of their payment solutions. This enables vendors to demonstrate compliance with strict security requirements covering cryptographic protection, secure authentication, and transaction integrity.
Logistics companies face immense pressure to optimise their operations, enhance security, reduce losses, and become more cost-efficient. Advanced AI-powered video surveillance solutions provide essential support, including robust stock monitoring, access and perimeter control and proactive security - all while improving operational insights and automating tasks such as barcode scanning. Investing in tailored and innovative surveillance solutions has a tangible and lasting impact across the entire supply chain, not just by preventing losses through theft and misplacement but also in tracking shipments across complex supply chains, improving the customer and delivery experience, and helping combat talent shortages through automation. The rising cost and challenge of theft in logistics Cargo crimes worth just over 100 million euros were reported to the TAPA EMEA Intelligence System In the last quarter of 2024, cargo crimes worth just over 100 million euros were reported to the Transport Asset Protection Association's (TAPA) EMEA Intelligence System. This included the two months of the year (December and November) with the highest reported theft value in 2024. Insider crime is a growing concern for logistics pioneers, with warehouse, distribution and store employees accounting for 40% of retail theft losses in Europe. Beyond the obvious financial repercussions of this, losses across the supply chain can disrupt inventory accuracy, impacting customer satisfaction and causing unforeseen stock shortages. How AI can support logistics loss prevention Partnering with a strategic surveillance partner with tailored logistics solutions and long-standing experience in the sector can make a significant difference to loss prevention. Multi-layered security frameworks can be implemented to cover warehouses, distribution centres, car parks, storage, loading docks and more. AI-enabled cameras integrated with a video management system (VMS) and intelligent IP audio analytics allow for real-time facility overview, whether on-site or remotely managed, giving operators greater situational awareness of potential events and objects of interest that may require further investigation. For instance, an unexpected vehicle entering a loading bay during busy periods can trigger an alert to a control room team, who can then track the vehicle and send ground teams to its exact location. Potential security threats Team efficiency is improved with the VMS scanning for objects or events that require human input With AI continuously monitoring for potential security threats such as loitering, unauthorised access, and unusual employee or goods movements, operators are free to work on other activities, reassured that alerts will prompt them to investigate an event further. Team efficiency is improved with the VMS scanning for objects or events that require human input and automating tasks such as opening car park barriers for white-listed vehicles. Displays can be on fewer screens, with critical cameras and event displays on a single screen instead of traditional multi-screen control rooms. This improves energy efficiency and sustainability. Increased operational insights Now, AI-powered video surveillance goes beyond merely improving security. It can enhance operational efficiency by delivering insights into daily workflows that allow pioneers to fine-tune processes such as staffing and delivery schedules. AI-enhanced video systems can track goods movement, monitor inventory levels, and pinpoint inefficiencies on the warehouse floor in real time. AI-powered cameras can evaluate the flow of goods throughout a facility, automatically identifying bottlenecks, underutilised spaces, or slow-moving processes that may lead to delays. Over the longer term, patterns can be tracked to identify inefficiencies and areas of concern. AI-powered video surveillance spots AI-powered video surveillance spots likely issues before they escalate, such as an out-of-place package Historically, decision-making has relied on fragmented or outdated information captured on different systems, with issues resolved only as they occur and are discovered. AI-powered video surveillance spots potential issues before they escalate, such as an out-of-place package or a delay in an outbound shipment. Furthermore, AI-powered barcode scanner cameras can track packages through channels for video and barcode scanning in one device, with insights delivered in a single place for operators to take action. Such dual-channel cameras are a powerful way to streamline package tracking and retrieval, ultimately ensuring the package makes it to its final destination. Additionally, video playback can help operators understand what has occurred if a package is damaged in transit or lost to ensure claims are thoroughly investigated and resolved. Other AI-powered cameras Other AI-powered cameras can closely monitor activities in loading bays, tracking if the right vehicles are parked where they should be, if they are receiving the right packages and, equally important, how long they are taking to achieve full load times. Having this information can help company pioneers identify the key reasons for any slowdowns and avoid costly delays. Besides minimising the chance of packages ending up in the wrong vehicle, it can also reduce safety-related concerns when parked commercial vehicles are not initially in their designated spots, so drivers are required to move them. Simplifying compliance and reducing liability AI surveillance assist logistics firms in adhering to strict safety, labour, and environmental regulations AI surveillance can also assist logistics companies in adhering to strict safety, labour, and environmental regulations, for example, by detecting forklifts in an area and ensuring they are in a safe proximity to other vehicles and people. With AI-powered cameras monitoring operations and a VMS verifying adherence to required standards, pioneers can rest assured that if they do need to provide evidence in a dispute or accident, detailed footage and data are captured by their surveillance system. This can be particularly valuable in the case of damage to goods, accidents involving personnel or claims of improper handling. Beyond compliance monitoring, AI-powered video surveillance simplifies reporting by generating detailed logs and compliance records, saving time and costs associated with regulatory documentation. Preparing logistics for the AI-powered future Embracing AI-powered video surveillance will help logistics pioneers take their operations, efficiency, safety, and loss prevention to the next level - setting the stage for sustained success in an evolving industry. To realise these benefits, it’s vital to work with the right video surveillance partner, along with deploying the right AI-enabled solutions, to maintain a competitive edge and manage the challenges of both now.
JFrog Ltd, the Liquid Software company and creators of the award-winning JFrog Software Supply Chain Platform, announces the integration of its foundational DevSecOps tools with the NVIDIA Enterprise AI Factory validated design. JFrog will serve as the cornerstone software artifact repository and secure model registry for the landmark agentic AI architecture. Following a successful NVIDIA NIM integration with the JFrog Platform, this new collaboration delivers a full-spectrum MLOps solution, designed to ensure scalable, secure, and seamless deployment of AI-powered applications using the NVIDIA Blackwell platform. Future of AI "The future of AI depends not only on innovation - but on trust, control, and seamless execution," said Shlomi Ben Haim, CEO and co-founder of JFrog. "To deliver AI at scale, enterprises need to adopt the same concepts applied to software: developer-friendly workflows, strong security, robust governance, and full lifecycle management. ML models are binaries, and they must be managed as first-class software artefacts.” “That’s why we’re excited to partner with NVIDIA to bring JFrog’s Software Supply Chain Platform as the single source of truth for all software and AI assets to the NVIDIA Enterprise AI Factory so organisations can build and scale trusted AI solutions with confidence." Providing critical infrastructure for future AI innovation The JFrog Platform provides customers with a “single source of truth” for software components The JFrog Platform provides customers with a “single source of truth” for software components within NVIDIA Enterprise AI Factory, which contains an integrated and validated suite of software technology solutions enterprises can use to develop, deploy, and manage agentic AI, physical AI, and HPC workloads on-premises. This validated design aims to allow organisations to have full control of their data and operate advanced AI agents in a secure environment. Key capabilities include: Secure & Governed Software Component Visibility: Enables all ML models, engines, and software artefacts to be scanned for security issues, versioned, governed, and traceable across the entire software development lifecycle. End-to-End Software Artifact & ML Model Management: Enables the seamless pulling, uploading, and hosting of AI models and datasets, AI containers, Docker containers, and dependencies optimised for the NVIDIA Enterprise AI Factory validated design. Rapid, Trusted AI/ML Application Provisioning in Runtime: Simplifies configuration of AI environments by eliminating the need for runtime environments to pull components from outside of the organisation, thanks to the universality, proven scalability and robustness of JFrog Artifactory. Future-proofed for Evolving GenAI Applications: Quickly and easily manages ML model versioning and upgrades to new and approved model generations. Words from Justin Boitano “Enterprises building AI factories need to manage the complexity of AI adoption while ensuring performance, governance and trust,” said Justin Boitano, Vice President, Enterprise AI Software Products, NVIDIA. “JFrog’s unified software supply chain platform, paired with the NVIDIA Enterprise AI Factory validated design, enables rapid, responsible AI innovation at scale.” Efficient integration of the JFrog platform The integration is designed to enable the JFrog Platform to run natively on NVIDIA Blackwell systems to help reduce latency and process tasks with unparalleled performance, efficiency, and scale. It supports a wide range of AI-enabled enterprise applications, agentic and physical AI workflows, autonomous decision-making, and real-time data analysis across various industries, including financial services, healthcare, telecommunications, retail, media, and manufacturing. Additionally, the system leverages NVIDIA’s engineering know-how and partner ecosystem to help enterprises accelerate time-to-value and mitigate the risks of AI deployment.


Expert commentary
Retailers now often find themself in a precarious situation. Profit margins are being squeezed by widespread shoplifting: The Council on Criminal Justice reports that between the first half of 2023 and the first half of 2024, shoplifting reports increased by 24%. Meanwhile, the strategies used by shops to deal with this situation are alienating consumers and affecting total sales. Andy Jassy, the CEO of Amazon, stated during an earnings call that customers are now purchasing more pharmaceuticals from Amazon in response to other retailers locking their cabinets. Media reports This crisis impacts not only the large chains—more than 7,100 retail stores were closed in the U.S. in 2024, a 69% increase from the previous year—but also small, local businesses, whose profit margins are even narrower. Media reports out of Los Angeles show that small businesses in regions with greater shoplifting rates are more likely to close, and small business owners' job satisfaction and general well-being are negatively impacted by the fear of crime. How to safeguard staff and inventory Unchecked retail theft demoralises staff and makes the store less attractive to customers This is obviously not a sustainable situation. In addition to lowering revenue, unchecked retail theft demoralises staff and makes the store less attractive to customers. Unfortunately, making customers wait in line to enter a store or locking up toothpaste and deodorant only makes the customer relationship worse. Retailers need to figure out how to safeguard staff and inventory without alienating their customer base—and they need to figure it out fast. Advanced video security A new tool has come to the forefront of this fight: advanced video security. Of course, video surveillance has been used in stores for many years. However, the technology currently being used to reduce retail theft is very different from the outdated analog video systems of the past. With features like cloud-based flexibility and AI-enhanced analytics, this new generation of video surveillance systems has all the advantages of modern technological advancements, while also providing businesses with a competitive edge in the fight against retail theft. Security's new AI video standard Workers are constantly rushing from aisle to aisle in an effort to satisfy eager consumers Although the typical chain pharmacy may appear straightforward to the customer, retailers are aware of how intricate these spaces are. Hundreds or even thousands of shoppers may come and go on any given day, with a larger volume during busy seasons like holidays or special promotional events. It's common for shoppers to pick up merchandise and put it down in another part of the store, often far away from its original location. Meanwhile, workers are constantly rushing from aisle to aisle in an effort to satisfy eager consumers, particularly during these busy seasons. How much can recorded videos reveal in a busy Using traditional CCTV, managers and security teams can monitor some of this activity, but their viewpoint of events will always be incomplete. There is a limit to how much recorded videos can reveal in busy, fast-paced customer situations, and even the largest chain stores lack the staff and resources to continuously sort and evaluate all of the data they collect. When more customers are in the store for a special event, there’s also naturally a higher risk of theft. New generation of video security Using machine learning algorithms trained on large amounts of retail-specific data The new generation of video security aims to provide retailers with comprehensive intelligence that covers all aspects of their operations. Using machine learning algorithms trained on large amounts of retail-specific data, they are focused on predictive actions and can recognise problematic behaviour in real time from raw video footage. AI-powered surveillance For example, if someone entered a store with empty bags but bypassed the cashier and started heading to the exit with a full bag, AI could predict a potential theft before it happens. Instead of just recording the theft, security action could be triggered in the moment. AI-powered surveillance is like an all-seeing security officer, quickly analysing the thousands of variables at play and spotting the warning signs of a possible crime before it happens. This is especially crucial during the holidays and busy shopping periods. Security personnel required to monitor cameras Imagine a chain store with 500 locations and 32 cameras each: that’s 1,600 cameras Cameras with AI can also alert human security personnel of events that would have otherwise been missed. Imagine a chain store with 500 locations and 32 cameras each: that’s 1,600 cameras. Now just imagine the number of security personnel required to monitor all of those cameras – when it comes down to it, traditional security is a numbers game. AI is the differentiator here that will allow retailers to win this game. VSaaS: A new tool to Deter Theft The emergence of Video Surveillance as a Service (VSaaS), a surprisingly under-discussed aspect of the broader SaaS revolution, is an important part of video security’s evolution. VSaaS solutions are especially helpful for chains that require a high level of centralisation and coordination across hundreds or even thousands of locations. In addition to offering action alerts at the shop level, VSaaS offers comprehensive security systems accessible from any location. This gives corporate headquarters access to complete, aggregated insights on all aspects of business operations. Identify the best ways to deploy staff Retail operators are constantly in a state of triage, rushing to identify the best ways to deploy staff This is significant in part because of the importance that social engineering and store layout have in preventing theft. Stores are frequently more busy during specific hours than others, and consumers may congregate in particular areas of the store while others are comparatively empty. Retail operators are constantly in a state of triage, rushing to identify the best ways to deploy staff and organise inventory while accounting for all of these variables. Cloud-based VSaaS solutions Cloud-based VSaaS solutions help streamline this process by eliminating uncertainty, highlighting blind spots and bottlenecks, and informing retailers of what truly works. Another regrettable reality is that employees frequently steal from businesses they work at. Here, too, VSaaS solutions—when combined with sophisticated, integrated access controls—are essential. AI analytics technology Implementation and deployment of VSaaS is also easier and less costly than CCTV Implementation and deployment of VSaaS is also easier and less costly than CCTV. When new AI analytic updates become available, the client software and hardware don’t need to be upgraded, and the onsite technology and cameras also don’t need to be replaced. The AI analytics technology is upgraded in the cloud, enabling faster deployment and implementation of new technology. New VSaaS solutions Theft will always occur at some level; it's just a part of doing business. However, the growth in shoplifting that retailers have experienced in recent years is unacceptable, and if these figures keep rising, the consequences will be disastrous. In a time of dire need for retail, new VSaaS solutions have come to the forefront and are already turning the tide.
For businesses today, loss prevention is no longer just about safeguarding inventory from theft. While retail theft makes frequent headlines in the United States, and is indeed the leading cause of shrinkage, The National Retail Foundation (NRF) has reported that process failures, operational inefficiencies and employee theft also drive significant losses. Legacy security systems In 2022, the shrink loss is estimated to be $ 120 billion in the United States, and that’s for retail alone. Industries like hospitality, healthcare, manufacturing, and transportation all face similar challenges even though loss and inefficiency take different forms in each of these fields. As shrinks from theft and operational inefficiency have already put margins of companies under pressure, we are increasingly seeing more businesses demand AI-powered security systems with advanced video analytics, capable of addressing both security and operational inefficiencies that their legacy security systems could not. Understanding the full scope of loss Package theft is a common problem in commercial buildings, with which box detection in mailrooms Starbucks’ recent announcement of reinventing its franchise operation due to faltering sales is a great example of how operational efficiency can take a toll on business revenue. In restaurants or hotels, failing to anticipate customer flow can lead to long wait times or inefficient use of staff, frustrating guests. Take, for example, in hospitals, inefficient patient flow management can lead to overcrowded waiting areas and delays in care, compromising patient health. Similarly, in manufacturing, poorly optimised assembly lines create production bottlenecks, delaying output and raising overhead. Package theft is another common problem in commercial buildings, with which package detection in mailrooms can mitigate loss from deliveries. These invisible leaks creepingly drain profits across industries, and require future-proof solutions that not only confirm what’s already known but also provide actionable insights for improvement. Transforming security into a powerhouse for efficiency Progress continues to advance across these areas, fuelling optimism for what lies ahead. Thanks to the rise of artificial intelligence and data analytics, some security solutions are already integrated with facial recognition and licence plate detection capabilities, as well as Virtual Fences that help ensure that only authorised personnel or vehicles enter sensitive areas. This can be especially useful for manufacturing environments, where controlling access to high-risk zones and protecting valuable assets are critical. Some modern security systems can even offer more than a watchful eye, doubling as a data analytic tool beyond traditional surveillance limits. Heat mapping in security AI technology Heat mapping in security AI technology analyses ways of movement and behaviour in a retail environment Modern security systems are now capable of tracking foot traffic, analysing customer behaviour, and even identifying bottlenecks in real time by incorporating different technologies such as heatmapping, people counting and queue length monitoring for long lineups. Heat mapping in security AI technology analyses patterns of movement and behaviour in a retail environment by visually representing areas with high foot traffic. With tracking over time and identifying potential vulnerable and hot spots for potential theft and fraud, resulting in change of store layout, deploy additional resources in high traffic areas and physical security placement. Predictive security analytics AI people counting in security utilises sensors and cameras to accurately track the number of individuals entering and exiting a space in real time. This data helps businesses optimise staffing levels, enhance customer experience, and improve overall operational efficiency by aligning resources with foot traffic trends. Predictive security analytics, such as heat mapping and people counting, are not new inventions. But I believe the ability to integrate all these functionality into a single system will allow these technologies to further mature and expand their footprint in near future. Rather than relying on separate tools for each business function, businesses can now use a single, integrated system to gather actionable data while continuing to secure protection through video surveillance. You Can’t Manage What You Can’t Measure AI-powered security systems give businesses access to a wealth of data that they can use AI-powered security systems give businesses access to a wealth of data that they can use to precisely pinpoint where losses are happening. This is key to solving the problem of shrinkage, which often goes beyond simple theft. Consider the Starbucks case mentioned earlier, while Starbucks hasn't specified how it plans to achieve operational efficiency to “enhance the cafe experience”, an AI-powered security system could provide an all-encompassing solution to minimise bottlenecks during peak hours, optimise store layouts, and allocate staff more efficiently. The impact of this technology can be tremendous as it not only enhances the customer experience but also reduces inefficiencies that contribute to lost revenue. By analysing patterns, conducting Forensic Review with Smart Search to quickly locate incidents, and understanding the root causes of loss, companies can implement targeted solutions that reduce shrinkage and streamline operations. Future-proof solutions Walmart is using foot traffic analytics to predict demand and manage inventory Companies like Walmart are already using foot traffic analytics to predict demand and manage inventory. But beyond basic predictive inventory analysis and crowd control, the data gathered will have the potential to be combined with other business functions, smart energy management, pricing and marketing strategy, just to name a few. Investing in a security system that integrates AI video analytics, such as package detection, queue length monitoring, and Virtual Fences, can provide future-proof solutions that also enhance operational efficiency. Looking ahead With New York State's introduction of new Retail Security measures to encourage businesses to strengthen their security, we've seen increased interest. However, modern security systems with real-time analytics are now offering companies more than just protection—they’re providing valuable insights into operations, transforming security from a cost burden into a powerful tool for growth and efficiency. As businesses continue to adopt AI-powered security systems, it's clear that the role of security is evolving beyond traditional surveillance. These advanced systems are no longer just about protection, but help businesses grapple with increasingly complex challenges. By transforming security from a reactive expense into a proactive, data-driven asset, companies can stay ahead of the curve, managing not only what they can see, but also what they’ve been missing.
A survey conducted by Blackhawk Network finds the average shopper plans to spend almost half of their holiday budget to buy gift cards this year versus only 39% in 2023. The global gift card market was valued at $1.3 billion USD in 2023, and it is projected to reach more than $5.2 billion USD by 2032. Fraud - a growing concern While gift cards continue to be top of mind for consumers for streamlined gifting, gift card fraud is a growing concern for consumers and businesses alike. According to the U.S. Department of Homeland Security’s Homeland Security Investigations (HSI) unit, gift card fraud, perpetrated by Chinese and other organised retail theft (ORT) rings, can be attributed to losses in the hundreds of millions of dollars globally, and is being used to fund other illicit crimes such as drug and human trafficking. The retailers implement procedures to mitigate attacks. Using data insights to detect emerging threats and identify hidden connections is among the ways retailers can protect the integrity of their gift card programs. How gift card fraud is manifested Typical physical gift card scheme involves purchasing items using stolen credit cards Gift card fraud occurs both at physical locations and online. A typical physical gift card scheme involves purchasing items using stolen credit cards and then returning the items for store credit or gift cards. While some stores have strict and well-enforced return policies to ensure that only customers entitled to refunds receive them, fraudsters employ fake tracking ID (FTID) tactics that focus on bypassing identification checks during returns, enabling them to return stolen merchandise or exploit refund policies. They use a combination of fake IDs and altered receipts or rely on lax return processes to achieve their goals. Once gift cards are obtained, criminals can sell them at a discount or use them for personal purchases, effectively converting stolen goods or false claims into untraceable funds. Tactics to convince consumers One tactic involves draining a gift card by obtaining the barcode, Card Verification Value (CVV) number, personal identification number (PIN), or activation code from beneath the slim cardboard packaging. Once they obtain the code(s) from physical cards, they reseal them, monitor online for consumers to buy and load the cards, then spend the balances before the consumers can. Some merchants have sought to combat this by keeping store-branded gift cards behind the checkout counter, handing them out after purchase. However, this approach can be costly and inconvenient for both retailers and customers, as it requires additional resources for in-store management and potentially slows the purchasing process. Other online tactics involve people who misrepresent themselves in a variety of phishing scams to convince consumers to purchase gift cards, then provide the card details to others who then drain the cards. Scammers tell the victim which gift card to buy (and where). They might say to put money on a card for an online store, a streaming service, or a specific retail store. These scammers often work as part of an organised crime network. Retailers leveraging open info, AI, to combat gift card fraud Retailers are empowered to improve the monitoring and analysis of gift card transaction patterns A growing number of retailers are leveraging publicly available (PAI) and hard-to-reach data and analytics to extract key insights that help fight various forms of gift card fraud and stay ahead of evolving fraud tactics. With such tools, retailers are empowered to improve the monitoring and analysis of gift card transaction patterns, identify anomalies, and implement proactive measures to prevent fraudulent activities before they can impact consumers and sales revenues. Retailers need this type of approach in their efforts to battle scammers, who continue to refine tactics for draining gift cards and committing other types of retail fraud. Beyond simply refining their techniques, fraudsters continue to advance their use of technology to commit their crimes. For example, cybercriminals also use bots to perform brute-force attacks on gift card websites. They are increasingly using AI to perpetrate gift card fraud. Leveraging Latest AI And LLMs Retailers need to continually upgrade their fraud-fighting strategies and technologies as well. They can lean into PAI and analytics, in conjunction with existing security operations and investigations, to safeguard the integrity of their gift card programs and demonstrate their commitment to customers, reinforcing brand trust. In addition to leveraging the latest versions of AI and large language models (LLMs), retailers can take advantage of open-source intelligence (OSINT). By leveraging PAI and difficult-to-obtain data with analytics, brands are using OSINT to more quickly seize on evolving threat patterns to recognise current and shifting fraud schemes and stay ahead of evolving fraud tactics. In this way, the AI operates as a resource multiplier, compiling and processing data at faster-than-human speeds, while enabling the ability to extract actionable insights at scale. Users can make more accurate and timely decisions. Retailers need to upgrade their fraud-fighting strategies and technologies. Safeguarding gift cards, customer trust, and brand integrity OSINT can inform retail security managers, loss prevention directors, fraud investigators, and others to help spot and deter gift card fraud. By using AI to detect patterns and anomalies, OSINT solutions can help fraud specialists spot patterns of suspicious activity that may indicate distinct instances of fraud. AI further helps fraud specialists identify members of ORT rings by uncovering hidden connections among seemingly unrelated individuals and transactions. The market for retail gift cards is large and continues to grow, and so too, is the gift card fraud threat. By adopting OSINT for fraud prevention, retailers can stay ahead of tech-savvy criminals, safeguarding gift card revenue streams, as well as customer trust and brand integrity.
Security beat
Anyone who has been in a proverbial cave for the last couple of years faced a language barrier at this year’s ISC West 2025 trade show. The industry’s latest wave of innovation has brought with it a new bounty of jargon and buzzwords, some of which I heard at ISC West for the first time. As a public service, we are happy to provide the following partial glossary to promote better understanding of the newer terms. (Some are new to the security industry but have been around in the IT world for years.) Obviously, if we can’t understand the meaning of the industry’s lexicon (and agree on the meaning of terms!), we will struggle to embrace the full benefits of the latest industry innovation. Not to mention, we will struggle to communicate. Generative AI Generative AI can identify an object in an image based on its understanding of previous objects This was perhaps the most common new(ish) term I heard bouncing around at ISC West. While the term artificial intelligence (AI) now rolls off everyone’s tongue, the generative “version” of the term is catching up. Generative AI uses what it has learned to create something new. The name comes from the core function of this type of artificial intelligence: it can generate (or create) new content. It doesn’t just copy and paste; it understands the underlying patterns and creates something original based on that understanding. In the case of video, for example, generative AI can identify an object in an image based on its understanding of previous objects it has seen. Video and security Generative AI can tell you something digitally about what is happening in an environment. There is no longer a need to write “rules;” the system can take in data, contextualise it, and understand it, even if it does not exactly match something it has seen before. In the case of video and security, generative AI offers more flexibility and better understanding. From 2014 to 2024, the emphasis was on detecting and classifying things; today AI is expanding to allow new ways to handle data, not so prescriptive and no more rules engines. Agentic AI Agentic AI refers to artificial intelligence systems that can operate autonomously to achieve specific goals Agentic AI refers to artificial intelligence systems that can operate autonomously to achieve specific goals, with minimal to no direct human intervention. In addition to the capabilities of generative AI, agentic AI can take action based on what it detects and understands. Use of agentic AI typically revolves around an if/then scenario. That is, if action A occurs, then the system should proceed with action B. For example, if an AI system “sees” a fire, then it will shut down that part of the building automatically without a human having to initiate the shutdown. There is a lot of discussion in the industry about the need to keep humans involved in the decision-making loop, so the use of truly autonomous systems will likely be limited in the foreseeable future. However, the ability of agentic AI to act on critical information in a timely manner, in effect to serve as an “agent” in place of a human decision-maker, will find its place in physical security as we move forward. Inference Inference is another common term related to AI. It refers to the process by which an AI model uses the knowledge it gained during its training phase to make predictions, classifications, or generate outputs on new, unseen data. The direct relationship of this term to physical security and video is obvious. In the simplest terms, an AI system is “trained” by learning patterns, relationships, and features from a large dataset. During inference, the trained model is presented with new questions (data it hasn't seen before), and it applies what it learned during training to provide answers or make decisions. Simply put, inference is what makes AI systems intelligent. Containerisation Dividing a massive security management system into several separate containers enables management of the various parts In IT, containerisation is a form of operating system-level virtualisation that allows you to package an application and all its dependencies (libraries, binaries, configuration files) into a single, portable image called a container. This container can then be run consistently across any infrastructure that supports containerisation, such as a developer's laptop, a testing environment, or a server in the cloud. In the physical security industry, you hear “containerisation” used in the context of separating out the various components of a larger system. Dividing a massive security management system into several independent containers enables the various parts to be managed, updated, and enhanced without impacting the larger whole. Genetec’s SecurityCentre cloud platform Think of it like shipping containers in the real world. Each container holds everything an application needs to run, isolated from other applications and from the underlying system. This ensures that the application will work the same way regardless of the environment it is deployed in. “It took us five years to containerise Genetec’s SecurityCentre cloud platform, but containerisation now simplifies delivering updates to products whenever we want,” says Andrew Elvish, Genetec’s VP Marketing. Among other benefits, containerisation enables Genetec to provide more frequent updates--every 12 days. Headless appliance Headless appliance is a device that is managed and controlled remotely through a network or web interface A headless appliance is a device that is managed and controlled remotely through a network or web interface. The device is like a “body without a head” in the traditional sense of computer interaction: It performs its intended function, but without any visual output or input device for local interaction. In physical security, such devices are increasingly part of cloud-based systems in which the centralised software manages and operates all the disparate “headless” devices. A headless appliance does not have a Windows management system. “The whole thing is managed through the as-a-service cloud system,” says Elvish. With a headless device, you just plug it into the network, and it is managed by your system. You manage the Linux-based device remotely, so configuring and deploying it is easy. Democratising AI You hear the term democratising AI used by camera manufacturers who are looking to expand AI capabilities throughout their camera lines, including value-priced models. For example, even i-PRO’s value-priced cameras (U series) now have AI – fulfilling their promise to democratise AI. Another approach is to connect non-AI-equipped cameras to the network by way of an AI-equipped camera, a process known as “AI-relay.” For instance, i-PRO can incorporate non-AI cameras into a system by routing/connecting them through an X-series camera to provide AI functionality. Bosch is also embracing AI throughout its video camera line and enabling customers to choose application-specific analytics for each use case, in effect, tailoring each camera to the application, and providing AI to everyone. Context Cloud system also enables users to ask open-ended queries that involve context, in addition to detection Context refers to an AI system that can understand the “why” of a situation. For example, if someone stops in an area and triggers a video “loitering” analytic, the event might trigger an alarm involving an operator. However, if an AI system can provide “context” (e.g., he stopped to tie his shoe), then the event can be easily dismissed by the automated system without involving an operator. Bosch’s IVA-Pro Context product is a service-based model that adds context to edge detection. The cloud system also enables users to ask open-ended questions that involve context in addition to detection. For example, rather than asking "do you see a gas can?" you can ask "do you see any safety hazards in this scene?" The pre-trained model understands most common objects, and understands correlations, such as "a gas can could be a safety hazard.” A scaled-down on-premise version of the IVA Context product will be available in 2026. Bosch showed a prototype at ISC West. Most video data is never viewed by an operator. Context allows a system to look at all the video with "almost human eyes." Cameras are essentially watching themselves, and understanding why something happened and what we can do. All that previously unwatched video is now being watched by the system itself, boosted by the ability to add “context” to the system. Any meaningful information based on context can trigger a response by an operator. Data lake A data lake is a centralised repository that allows one to store vast amounts of structured, semi-structured, and unstructured data in its native format. In the case of the physical security marketplace, a data lake includes data generated by systems outside the physical security infrastructure, from inventory and logistics systems, for example. A data lake is where an enterprise can accumulate all their data, from the weather to Point-of-Sale information to logistics, to whatever they can gather. Putting the data in one place (a “data lake”) enables them to mine that data and parse it in different ways using AI to provide information and insights into their business. Notably, a data lake contains all a company’s data, not just security or video data, which opens up new opportunities to leverage the value of data beyond security and safety applications. Crunching the various information in a data lake, therefore, security technology can be used to maximise business operations.
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Case studies
Amthal has delivered a complete security upgrade at The Maltings Shopping Centre, building on a partnership of more than three decades to transform the way the centre is monitored and managed. In supporting The Maltings since 2013 and taking on full management in 2017 Amthal could ensure the system remained effective through a dedicated maintenance programme until the time came for a complete upgrade. Integrated with the barrier system The new solution introduces 39 state-of-the-art Dahua cameras, including PTZ, 180-degree and AI-powered people-counting models, to provide full coverage across all seven entrances and car parks. Automatic number plate recognition has been integrated with the barrier system to improve vehicle access control, while people-counting technology now delivers reliable visitor data to track peaks and troughs. Active deterrent measures and signage strengthen site protection, supported by EMCS Sentry software to continuously monitor hardware performance and camera availability. Secure on-premises storage ensures all data remains under the centre’s direct control. Redesigned digital control desk Says Richard Marrett, Centre Director at The Maltings: “The new systems have changed the way we manage the centre. The cameras and control desk give us clearer oversight and together with features like people counting and vehicle access ensures we can identify incidents, respond quickly and review activity with confidence. Behind it all is the trust we have in Amthal, built over three decades of working together to keep The Maltings safe and welcoming.” A redesigned digital control desk now brings all live feeds, recordings and analytics together on a single platform, giving the security team clearer visuals and wider oversight than ever before. These features provide greater efficiency, faster response times and stronger protection. Management and security teams All installation work was carried out while the centre remained fully open. Amthal partnered with Dahua together with the management and security teams to plan the schedule so that tenants, staff and shoppers experienced no disruption. Kris Hallett, Business Development Director at Dahua Technology UK, added: “The upgraded cameras now capture detail even in low light, and features like auto-tracking reduce the need for constant manual monitoring. People-counting sensors give the team reliable data across key areas, while number plate recognition integrated with the car park barrier has streamlined vehicle access and reduced misuse." "All can be accessed at any time, even remotely. Working alongside Amthal, we were able to introduce all of this without disruption to the centre’s daily operations.” New requirements and advances in security technology The original system was first installed in 1995, marking the beginning of a long-term relationship that has seen Amthal support The Maltings in adapting to new requirements and advances in security technology. Paul Rosenthal, Amthal Group Business Development Director, concluded: “Our established partnership with The Maltings demonstrates how we work with clients over the long term. This complete upgrade with latest Dahua technology has delivered an integrated system that is straightforward for the team to use and manage via the new control centre. It ensures the centre remains safe, accessible and an enjoyable experience with complete peace of mind for tenants and shoppers alike.”
Mall of America®, the largest shopping and entertainment complex in North America, announced an expansion of its ongoing partnership with Axis Communications to deploy cutting-edge car-counting video analytics across more than a dozen locations. With this expansion, Mall of America (MOA) has boosted operational efficiency, improved safety and security, and enabled more informed decision-making around employee scheduling and streamlining transportation for large events. AI-enabled video analytics Mall was able to meet its needs for a reliable, accurate, and scalable key to support its security Standing at 5.6 million square feet and home to more than 500 retailers, restaurants, and more, MOA hosts more than 300 events each year, and has more than 32 million visitors annually from around the globe. Scheduling those events, ranging from a concert to a massive outdoor food festival, requires careful planning to ensure the Mall can support parking operations and provide safety and security to those in attendance. By expanding its surveillance system and investing in AI-enabled video analytics with Axis Communications, the Mall was able to meet its requirements for a reliable, accurate, and scalable solution to support its 24/7 security and safety operations. Accuracy and reliability "We needed technology that could keep pace with our evolving needs and make sure our security team could focus on the highest-priority tasks,” said Aaron Nielsen, Vice President of Information Technology at MOA. “Our previous solution struggled with the unpredictable Midwestern weather, including snow, rain, and cold, all impacting accuracy and reliability. Car counting is one of the most important operational metrics we have." Micro-level scheduling for vendors The success of the initial test led MOA to rapidly expand the implementation to more than a dozen locations Nielsen added: "Implementing a system that delivers accurate data allows us to quickly scale from one location to more than a dozen additional locations throughout the Mall, providing efficiency and invaluable information for our team.” The success of the initial test led MOA to rapidly expand the implementation to more than a dozen locations. The car-counting data now drives macro-level decisions about Mall hours and event planning, as well as micro-level scheduling for vendors and staff, empowering operational agility across the organisation. State-of-the-art expansion With this state-of-the-art expansion, MOA can: Deploy Solutions Anywhere: A trial began with an Axis camera deployed in a particularly challenging location—on a light pole isolated from the building. Despite difficult access to power and data, the trial system proved over 99% accurate. After minor adjustments, the performance improved even further. Drive Decisions with Analytics: By deploying AI-enabled line-crossing analytics at the edge, MOA benefits from a more rugged, scalable, and cost-effective approach to decision-making, powered by the business intelligence these devices gather. This is especially useful in locations where the Mall entrance meets busy intersections, as the line-crossing technology can precisely draw the distinction between a car entering the Mall versus one that is merely passing by. Create a Smarter Security Strategy: Beyond parking intelligence, Axis’ technology supports the Mall’s broader security strategy. Cameras and Axis network speakers installed in restricted areas detect and deter unauthorised access in real-time, and alerts are immediately sent to the Mall’s central dispatch centre. Prioritize Employee Safety: With unpredictable Minnesota winters, keeping employees and customers safe was key to this technology deployment. With this new system, adjustments to the devices are intuitive, and what used to require ladders, lifts, and multiple people can now be done from a desktop. Non-technical team members can review audits, make changes, and immediately analyse results from a safe location. Experiential retail and entertainment MOA is exploring additional possibilities as it continues aligning resources for future phases of the project “Mall of America presented us with a challenge that required not just technology, but collaboration, trust, and innovation,” said James Stark, Segment Development Manager, Retail at Axis Communications. “We’re honoured to be part of their forward-looking approach to safety and operational intelligence. As Mall of America continues to lead the way in experiential retail and entertainment, we remain committed to delivering the reliability, flexibility, and insight-driven technology that their dynamic environment demands.” Advanced capabilities Looking ahead, MOA is exploring additional possibilities as it continues aligning resources for future phases of the project. From advanced capabilities like people counting and licence plate recognition to leveraging line analytics to better understand visitor trends—such as distinguishing hotel guests from shopping centre visitors—the potential for smarter, more efficient operations is there.
Richard Thorp has been fascinated with aviation since childhood. A self-described “aviation geek,” Thorp is now the Chief Technology Officer at Swissport International AG, where he leads IT infrastructure strategy for the world’s largest ground-handling company, ensuring seamless operations across 276 airports in 45 countries, handling approximately 247 million airline passengers per year, as of the end of 2024. “If we were an airline, we’d actually be the biggest airline in the world in terms of a number of passengers we support and handle,” he says. Security challenges Swissport’s goal is to make a tangible impact on people’s lives by enabling smooth air travel Swissport’s goal is to make a tangible impact on people’s lives by enabling smooth air travel. “If the things we do get people to their destinations safely and on time, then magically, we become more successful and profitable as an organisation,” he says. But casting that spell had been challenging for Swissport. Three years ago, legacy IT leadership at Swissport had overcome network challenges with Cato, but more work was needed to address their security challenges, particularly in securing endpoints. Thorp and Swissport CISO, Giles Ashton-Roberts, joined Swissport in the middle of the Cato deployment. Having deep experience with a legacy zero trust provider, they were skeptical that Cato could meet Swissport’s requirements. Cato platform Over the next 10 months of meetings, investigation, and testing Thorp and Ashton-Roberts challenged Cato, ultimately changing their perspective. “IT is no longer seen as a blocker; it just works,” says Thorp. “I relax a bit more with the Cato platform around. It’s given us holistic way of protecting ourselves today, and a secure foundation for everything we want to do in the future.” The challenges of a global, always-on operation Swissport’s network helps millions of passengers, cargo shipments, and lounges worldwide Swissport’s network supports millions of passengers, cargo shipments, and lounges worldwide. Three years ago, scale was an enormous challenge—ensuring reliable connectivity for operations spanning locations and time zones. The company relied on a mix of MPLS and regional SD-WAN solutions across its now 320+ sites and airport locations. But bandwidth limitations and performance variability impacted many applications, including cloud-based, mission-critical applications. As a result of that complicated network, expanding to new locations was resource-intensive, requiring manual setup and multiple vendor dependencies. Differences between networking tools made troubleshooting inconsistent and time-consuming. The IT team in turn had to maintain expertise in multiple networking technologies, increasing operational overhead. What security inspection existed for unencrypted traffic Visibility was an enormous challenge. With multiple network platforms in place, Swissport’s IT team lacked a centralised view of network performance and security threats. “In the past, working with multiple systems meant inconsistency,” says Thorp. “Different platforms required different configurations, which complicated troubleshooting and made security enforcement a challenge.” Swissport relied on a patchwork of security appliances, including firewalls and web gateways. Remote users are connected through different VPN servers deployed across different regions. The complex appliance stack required manual maintenance and lacked centralised visibility and control. Security patching was manual and error-prone and implementing consistent security policies was practically impossible, weakening Swissport’s security posture. What security inspection existed was relegated to unencrypted traffic due to the well-founded concern that inspecting encrypted traffic could break the application experience that in this case were airline partners’ systems. Finally, the lack of consistent, advanced threat detection worldwide limited Swissport’s ability to detect and stop threats. Visibility differentiates the Cato SASE cloud platform Thorp and the IT team had initially leaned away towards deploying that architecture Recognising these inefficiencies, Swissport’s legacy IT team initiated the Cato relationship, connecting many of the now 320+ sites and instances in AWS and Azure to the Cato SASE Cloud Platform. When Thorp and the new IT leadership joined Swissport, about two-thirds of the connections had been deployed. Having been familiar with a legacy cybersecurity provider, Thorp and the IT team had initially leaned away towards deploying that architecture. Hearing about the value of Cato they decided to have a closer look. “What really drew me to Cato is the visibility the platform provides. It’s incredibly easy to pinpoint connectivity issues, analyse traffic patterns, and secure our network from a single interface,” says Thorp. Cato uniquely stores the metadata of all enterprise traffic crossing the Cato SASE Cloud Platform — whether to the Internet or another location — from all endpoints — in the office and outside of it — in a single data store. This incredible resource provides Cato customers with deep, end-to-end insight into their complete network. Much improved security and a better network With a platform that is resilient, secure, and easy to manage, Swissport has been able to take a more proactive approach to security, streamline IT processes, and ensure a seamless digital experience for employees across the globe. Advanced threat prevention now operates globally and protects against malware and ransomware even in encrypted traffic. “Cato’s TLS Inspection gives us the ability to inspect encrypted traffic while avoiding unintended service disruptions,” says Ashton-Roberts. “It’s been a major improvement to our security posture.” Fine-grained access control through the always-on Cato Client connects remote users to Cato, granting access only to permitted resources. The Cato Client fully implements zero trust principles and operates outside and inside the office under one common policy set. “With Cato, every device—whether in a Swissport office or in an airport lounge—operates under the same set of security policies. That level of consistency wasn’t possible before,” says Ashton-Roberts. Deploying new network sites Cato not only delivers optimised network version worldwide but also makes deploying new networks Access is across the Cato Global Private Backbone built into the Cato SASE Cloud Platform, delivering an exceptional, secure user experience anywhere in the world. Cato not only delivers optimised network performance worldwide but also makes deploying new network sites effortless. “Connecting new airlines or contracts now takes just a few clicks,” says Thorp. Thorp’s team has also dramatically reduced network resolution times. “We recently identified and solved a performance issue in a South African location that would have taken us days before Cato,” says Thorp. “Within 15 minutes, our team identified excessive database traffic, blocked the device, and restored normal operations.” Transforming IT by transforming the infrastructure The transformative impact of the Cato SASE Cloud Platform on the IT team has been profound. Previously, managing multiple networking platforms required maintaining expertise in diverse technologies, creating an operational burden. The IT staff was constantly troubleshooting connectivity issues, manually configuring security appliances, and dealing with inconsistent policies across different locations. The shift to Cato not only simplified management but also allowed the IT team to focus on higher-value strategic initiatives. “Before Cato, we had to maintain different skill sets for different platforms, which spread the team thin. Now, we have one standardised system that allows us to be much more efficient,” Thorp says. Newfound network visibility Swissport has been able to optimise resource allocation and improve overall productivity By consolidating security and networking into a single platform, Swissport has been able to optimise resource allocation and improve overall productivity. The newfound network visibility has also brought a shift from reactive to a proactive IT strategy that has helped the company ensure consistent service delivery across its global operations. “For me, Cato future proofs Swissport’s IT infrastructure,” says Thorp. “The platform constantly evolves, adapts to new technologies, and provides the visibility and security we need to support our business today and tomorrow.” Partnership with Cato proved unique The success of Swissport’s IT transformation was built on more than just technology—it was about forming a strong, collaborative relationship with Cato Networks. From the start, Cato worked closely with Swissport to understand its unique challenges and deliver tailored solutions that addressed its global security and networking needs. “We worked directly with Cato’s product team to enhance capabilities—not just for us, but for all customers,” says Thorp. The success of Swissport’s IT transformation was built on more than just technology Features requested by Swissport were implemented on schedule, unlike other vendors who provided only lip service. Thorp says, “Many vendors say they listen, but Cato actually delivers on what they promise.” This close partnership has given Swissport confidence that its evolving needs will continue to be met as Cato refines its platform. “With Cato, we’re not just another customer; we’re part of a continuous innovation cycle that ensures our IT infrastructure remains future-ready,” says Thorp. “It’s rare to find a vendor so responsive and committed to delivering what they promise.” Looking ahead to the future Swissport IT requirements continue to evolve with Cato remaining a key pillar. “With Cato in place, we know that our network is not the limiting factor in our growth,” Thorp explains. The ongoing partnership between Swissport and Cato ensures that as technology continues to evolve, Swissport’s IT infrastructure remains secure, scalable, and adaptable to the demands of a fast-paced aviation industry. On a personal level, Cato has given Thorp peace of mind. “I relax a bit more with the Cato platform around. It’s given us a holistic way of protecting ourselves today and a secure foundation for everything we want to do in the future. Swissport’s IT leadership now can focus on innovation rather than crisis management.”
Like any retail franchise, car dealerships that have multiple locations nationwide require comprehensive, reliable, and scalable video surveillance solutions to protect their businesses. With dealership theft increasing by 7% since 2021, protecting high-value inventory, mitigating liability risks, and ensuring compliance with video data retention standards have become critical priorities. Future surveillance solutions BCD is vital to guarding functions, protecting valuable assets, and maintaining peace of mind Additionally, managing surveillance across multiple sites demands systems that are easy to deploy, cyber-hardened, and capable of centralised oversight. As dealerships continue to expand, investing in future-ready surveillance solutions with a trusted systems builder like BCD is essential to safeguarding operations, protecting valuable assets, and maintaining peace of mind. The challenge Car dealerships face distinct challenges when it comes to security and operations, such as: Asset Protection: Showrooms and lots house high-value vehicles and parts, making them prime targets for theft and vandalism. Cybersecurity Threats: Surveillance systems needed to be cyber-hardened to prevent breaches that could compromise sensitive footage or customer information. Reliable Recording: Continuous operation is essential to ensure no gaps in security coverage, particularly during off-hours or high-traffic events. Scalable Storage Across Locations: With multiple sites generating large volumes of video footage, dealerships need a solution to store data for 30-90 days to comply with industry regulations and internal policies. Centralised Management: Managing surveillance across dozens of locations required a solution that simplified oversight while enabling scalability for future growth. The solution BCD’s All-in-One Hybrid Cloud NVR is a cutting-edge video surveillance solution designed to address these challenges. The solution offers: Integrated PoE Switch: The All-in-One NVR includes a built-in Power over Ethernet (PoE) switch, simplifying installation and reducing the need for additional network infrastructure, which saves time and costs while simplifying the overall infrastructure. Cyber-Hardened Security: BCD’s solutions are all certified as cyber-hardened solutions to maximise data protection and minimise the risk of data breaches. Always-On Recording: With features like RAID storage for redundancy and failover capabilities, along with the Harmonise Remote Monitoring and Management plugin, the All-in-One solution ensures uninterrupted recording, and with customised notifications, can mitigate hardware or network disruptions. Hybrid Cloud Architecture: The All-in-One NVR provides 80TB of local storage for immediate access to live footage while seamlessly integrating with cloud storage for long-term retention. This hybrid approach ensures franchises can store footage for 30 days or more without overwhelming local resources. Centralised, Scalable Management: BCD’s solution is simple to deploy and typically takes 30 minutes or less, allowing franchises to monitor and manage surveillance across all locations from a single interface, simplifying administration and reducing operational overhead. The results Deploying BCD’s All-in-One Hybrid Cloud solution has the potential to drive significant improvements across multiple aspects of a franchise’s video surveillance operations, including: Enhanced Security: Reliable and cyber-hardened surveillance protect valuable inventory and reduce the risk of theft or vandalism. Continuous Uptime: The system’s failover mechanisms along with Harmonise Remote Monitoring and Management Plug-in ensures 24/7 recording with no interruptions, providing full coverage for liability and security events. Regulatory Compliance: Hybrid cloud storage allows each location to easily meet the 30-90-day retention requirement without costly local storage upgrades. Operational Efficiency: Centralized management and user-friendly tools reduce the complexity of overseeing surveillance across multiple locations, cutting costs and improving oversight. Future-Ready Scalability: As franchises expand, BCD’s solutions are designed to scale effortlessly to accommodate new locations and increased storage demands, providing a future-proof investment. Conclusion BCD’s All-in-One Hybrid Cloud NVR is an ideal solution for national franchises, such as car dealerships, and offers a secure, reliable, and scalable video data infrastructure. By leveraging hybrid cloud technology and simplified management, franchises will experience peace of mind knowing their assets are protected, compliance requirements are met, and their operations will be optimised for growth.
Established in 1997, Dubai-based BMA International operates fashion retail in the Middle East and Asia across the Kingdom of Saudi Arabia (KSA), United Arab Emirates (UAE), Bahrain, Oman, Kuwait and Qatar with more than 250 stores offering two major brands — Redtag and twenty4. BMA’s steady growth is a testament to its focus on building trust with its shoppers, employees, suppliers and stakeholders to create a company that is people-centric, ambitious and results-oriented. Challenge Fraud is a common problem in the retail sector, particularly within large chains with hundreds of locations and tens of thousands of employees. BMA’s retail stores were no exception. Following an internal audit, security of point-of-sale (POS) terminals in retail outlets were identified as a serious concern, particularly the misuse of floor supervisors’ credentials to access terminals and modify or cancel transactions. The problem persisted even after BMA switched from passwords to a smart card-based authentication system The problem persisted even after BMA switched from passwords to a smart card-based authentication system. The most common issues involved supervisors leaving smart cards with cashiers to use in their absence and failing to return the cards when separation from an employer occurs — a frequent occurrence as many of BMA’s retail employees are expatriates who often return to their home countries. Fraudulent use of the smart card was also a common problem. Once a sale was completed and the customer had left the store with their purchased items, the smart card could be used to improperly access the system so the cashier could void the transaction and pocket the “refund,” resulting in both monetary and inventory losses. Biometric-based system “BMA’s internal auditors were concerned with the lack of control over the cards and the potential for fraudulent transactions due to their mishandling. They observed clear gaps in security and authentication practices that led directly to fraud and revenue leakage, resulting in the Internal Audit Committee recommending to the BMA Board of Directors that action be taken to plug the security holes by tightening the authentication process,” said Nainan M. Kurian, CEO of Technowave International LLC. The decision was made to transition authentication to a biometric-based system that would provide the required security at a competitive price that aligned with the aesthetics of the retail stores. The system also needed to be compatible with the Oracle Retail Xstore Office Cloud Service, which BMA International was adopting across its brands. Solution A fingerprint reader from HID is ideal for use by multiple people in a shared environment BMA International and its technology partner, Technowave International LLC, determined that the HID DigitalPersona® 4500 Fingerprint Reader met all their requirements — a decision supported by recommendations from other retailers that had deployed the product, and by the fact that competitive solutions were incompatible with Oracle Retail Xstore, a crucial requirement. A USB peripheral with a compact design to conserve space, this fingerprint reader from HID is ideal for use by multiple people in a shared environment. Its professional, modern design looks elegant in retail settings while offering superior authentication control via biometric functionality that uses optical scanning technology to achieve excellent image quality and reliability. HID DigitalPersona 4500 Fingerprint Reader With this easy-to-use technology, floor supervisors simply place their finger on the reader window, which rapidly captures and encrypts the fingerprint image, and then provides a red flash as a visual cue indicating that it was properly captured. That image is sent to the DigitalPersona FingerJetTM biometric engine for verification, and once the user has been authenticated, access to the POS terminal is granted. “Deploying the HID DigitalPersona 4500 Fingerprint Reader was simple and caused no disruption to retail operations. It paved the way for significant reduction in the malpractice that had been occurring with the smart card system,” said Kurian. Result Since deploying more than 1,100 HID fingerprint readers in retail outlets across KSA, UAE, Oman, Bahrain, Kuwait and Qatar, BMA has eliminated nearly all POS fraud and abuse. The system has also driven tangible improvements in the attendance and punctuality of floor supervisors, who must now be physically present in the store for authentication to take place. The HID authentication system is also capable of multiple types of authentications — providing flexibility that is appreciated by users who work at multiple locations. “Because the HID DigitalPersona 4500 Fingerprint Reader requires proof of presence for authentication, there is greater accountability among supervisors which resulted in immediate cessation of POS fraud and stopped both revenue and inventory leakage. The exceptional support provided by HID Global has also allowed BMA to take full advantage of the system’s functionality and flexibility,” said Kurian.
Up-to-date and accurate maps of the waterways are a prerequisite for safe and efficient shipping in Germany. Authorities such as the Federal Maritime and Hydrographic Agency, but also private harbour operators, are obliged to provide these in an up-to-date form at all times. The main reason for this is to avoid accidents caused by an incorrect or outdated card. This includes the classification of federal waterways, their kilometres, existing locks, lifting and barrages, other surrounding waters, places and borders. Currently, mapping is carried out by conventional ships with trained personnel, which is time-consuming and expensive. This can result in long intervals between measurements at a particular location. 3D map of the surroundings Bank areas and surface forms are monitored by an optical plan with two integrated cameras (Semi-)automated monitoring of waterways by autonomous platforms with obstacle avoidance and traffic detection could optimise this process and provide maps in less time. To this end, the Fraunhofer Institute of Optronics, System Technologies and Image Exploitation IOSB has developed an autonomous surface vehicle capable of autonomously surveying bodies of water as part of a three-year in-house research project. For this purpose, the river bed is recorded using sonar. Furthermore, the bank areas and surface structures are monitored by an optical system with two integrated industrial cameras from IDS Imaging Development Systems GmbH. The information obtained in this way is then merged and transferred to a 3D map of the surroundings. Application The precise surveying of water bodies is a demanding task. TAPS, the Fraunhofer IOSB's semi-automatic direction-finding system for rivers and lakes is able to perform this task both under and above water. The vehicle, which measures approximately 2 x 1.5 x 1 metres, travels along the relevant waterway and automatically avoids obstacles, whether stationary or moving. At a speed of two knots - which corresponds to around 3.7 kilometres per hour - such a mission can last up to 20 hours. For visual mapping of the shore areas, TAPS has two cameras attached to a mast, each pointing to starboard or port and whose fields of view do not overlap. Due to their high resolution, they allow a visual inspection of relevant infrastructure, such as quay walls, as well as 3D modelling of the shore area based on the recorded image data. Orientation of the TAPS platform GNSS and IMU data serve as the basis for picking the position and exposure of the TAPS platform "We use an automated system for intelligent image capture. As soon as one or both cameras are focussed on a predefined area of interest, image recording is started. The vehicle's own movement is also used to store only image data that is recorded from different angles and therefore offers added value in terms of content," explains Boitumelo Ruf, expert in photogrammetry in the Autonomous Robot Systems research group at Fraunhofer IOSB. GNSS (Global Navigation Satellite Systems, such as GPS) and IMU (Inertial Measurement Unit for position determination) data serve as the basis for determining the position and orientation of the TAPS platform. "When the images are captured, they are enriched with the current GNSS position data. The latter are required later for the assignment of precise coordinates," Ruf continues. COLMAP photogrammetric toolbox After data acquisition, the recorded images are transmitted together with the GNSS data to a ground control station, where a photogrammetric reconstruction is carried out. Boitumelo Ruf describes the procedure in more detail: "Among other things, we use the COLMAP photogrammetric toolbox. It uses outstanding image features to first compare the input images, calculate their relative positions and create a true-to-life 3D model of the environment." "We then use the tool to match the images pixel by pixel, i.e. we search for corresponding pixels and merge them exactly. The result is a dense 3D point cloud that is georeferenced using the GNSS positions, i.e. provided with the corresponding current coordinates." The 3D model can then be used for other tasks, such as visual inspections or bank monitoring. Robust industrial cameras defy wind and weather On the camera side, the Fraunhofer Institute relies on two uEye FA industrial cameras from IDS. The robust and resilient models with PoE are ideal for demanding environments. Camera housings, lens tubes and the screwable connectors meet the requirements of IP code IP65/67 and are thus optimally protected against dirt, dust and splash water. The robust and resilient models with PoE are ideal for demanding environments The model used has the large-format 1.1" CMOS sensor IMX304 from Sony and delivers very clear, noise-free images with a resolution of 4096 x 3000 pixels. Thanks to its remarkable dynamic range and very high sensitivity, the global shutter sensor of the second pixel generation of the Pregius series is particularly suitable for metrology applications, among others. It was precisely these characteristics that were decisive for the Fraunhofer IOSB's choice of camera. In addition to robustness and weather protection, important requirements for the cameras included a compact form factor and high image resolution to enable detailed visual inspections. The sensor should also offer a high dynamic range in order to capture images with a high level of detail in both sunny and shady areas. Integration via the standard GigE Vision interface enables the development and use of one driver for several systems with different cameras. Outlook The shortage of skilled labour is also a major issue in the surveying of waterways. Automated mapping of the waterways could not only reduce costs but also the time and, above all, the labour required. The aim of the TAPS project was to develop a prototype for this task and to demonstrate its potential in relevant scenarios. As a research organisation, Fraunhofer typically develops technologies up to a level at which the functionality and suitability of the system have been proven. The next step is now cooperation with industrial partners. Dr. Janko Petereit, head of the Autonomous Robot Systems research group at Fraunhofer IOSB, explains: "We are actively looking for partners to take this final step towards commercialisation together. In view of the positive results of our initial tests and the increasing demand for accurate, up-to-date waterway maps, we expect strong demand for our technology in the coming years. The knowledge gained can be used in a variety of ways. Autonomous watercraft can be used to transport people and goods by sea or inland waterways. The excavation of waterways and the autonomous surveying of fairways are also conceivable. “ The project demonstrates the high potential of the interaction between robot systems and digital image processing. The cards could be reshuffled in the future, particularly with regard to visual environment detection and scene interpretation.


Round table discussion
Video storage has come a long way since rooms full of VCRs stored video from an entire system of cameras. Video storage equates to data storage, and there are multiple options ranging from hard disk storage to the cloud to storage on each individual camera using SD cards. Increasingly, cloud-based storage is an attractive option to store video footage conveniently and safely. We asked this week’s Expert Panel Roundtable: How is expansion of video storage capabilities impacting the security industry?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Products


Videos
Shopping centre security: Manufacturers & Suppliers
Aligning physical and cyber defence for total protection
Download
Understanding AI-powered video analytics
Download
Enhancing physical access control using a self-service model
Download
How to implement a physical security strategy with privacy in mind
Download
Security and surveillance technologies for the casino market
Download
