Smart Cities
Axis Communications, a pioneer in network video, has announced the launch of a powerful bullet camera that delivers superior image quality and excellent forensic value. This all-in-one, outdoor-ready camera features a custom-made, tele lens ideal for long-distance surveillance to deliver extremely high pixel density even in low-light conditions. With many possible applications from smart cities and airport perimeters to stadiums and transport hubs, this powerful camera is ready out-of-the-box....
Comcast Smart Solutions, a division of Comcast that specialises in smart technologies for businesses and communities, announced expanded strategic relationships with Eagle Eye Networks, a global pioneer in cloud video surveillance with AI and analytics, and C2RO, a pioneer in Privacy-Aware AI-powered video analytics software, to provide customers with a new, broader set of AI video analytics solutions. This collaboration expands Comcast Smart Solutions’ existing Video Analytics...
Being the catalysts of growth, smart cities are founded on a technology-powered infrastructure. Digitisation in global economies has led the way to a transformative shift to smart security, universal convenience, and accelerated advancements. By 2026, smart cities will be expected to generate an economic benefit of USD 20 trillion globally. Reliable technological solutions Unfortunately, crimes and offences are also becoming high-tech, challenging the balance in the socio-economic ecosystem....
Automation Anywhere, a pioneer in AI-powered automation, announced its new AI + Automation Enterprise System that puts AI to work with automation to drive exponential outcomes. Unveiled during Imagine 2024, the company's new offering is infused with its second-generation GenAI Process Models to speed up the discovery, development, and deployment of AI process automation. AI Agents The company also launched new AI Agents to manage complex cognitive tasks and automate more than ever before poss...
Halftime in the run-up to the next INTERSCHUTZ (1 to 6 June 2026 in Hannover): the next edition of the world’s pioneering trade fair for the fire and rescue services, civil protection, safety, and security opens its doors in two years. The focus topics have already been finalised. Alongside the impacts of climate change and a turning point in civil protection, the spotlight will also be on the integration of artificial intelligence (AI) in control centers, situation centers, and at the sc...
Innodisk, a pioneering global AI solution provider, is showcasing its comprehensive new products at Computex 2024 with a focus on edge AI. Key highlights include the industry's pioneering CXL 2.0 memory expansion, E3.S SSD, and innovative MIPI over Type-C camera technology for machine vision. Live demonstrations of smart manufacturing PPE recognition and intelligent people tracking will emphasise Innodisk’s custom edge AI capabilities. This event also unveils Innodisk’s new brand vi...
News
With the rapid development of AI and IoT technology, the role of the NVR has had to adapt to keep up. Dahua Technology’s AIoT Console meets this new challenge by becoming the nerve centre of all devices on a network – whether they are cameras, alarms, access controllers, or video intercoms. The result is a unified, integrated network seamlessly controlled and managed via the AIoT Console. Data convergence and control In using the AIoT Console, end-users can benefit from data convergence and control, integrated responses to alarms, multi-angle video archiving, multi-type event retrieval, and flexible operations such as one-key arming and disarming. This redefines the value of an NVR for the user, providing more comprehensive, secure, and flexible visual intelligence solutions. Advanced video AI analytics AIoT Console delivers a brand-new user interface, unified device management, arming and disarming In the video arena, the AIoT Console provides advanced video AI analytics capabilities, such as face recognition, smart motion detection (SMD Plus), and vehicle/person detection, to get the most out of cameras including cameras without onboard analytics. The AIoT Console delivers a brand-new user interface, unified device management, arming and disarming, and event management. New user interface: this splits the configuration module and the business module delivering a more logical structure that better matches the respective requirements of installers and end users and introduces a secondary-level menu to manage all functions of specific modules, increasing ease of use and reducing complexity. Unified device management: enables managing different devices from different systems in one NVR, saving system operation and maintenance costs and realising multi-data convergence. Unified arming and disarming: this can be enabled by keyfob, DMSS, and by group via NVR. It helps enhance scenario adaptation and group devices based on actual scenarios and enables quick management of different types of devices in the same scene. What’s more, it integrates the alarm system with the CCTV system, allowing easy arming and disarming by device group, and offering diverse methods for arming and disarming for easier and more convenient operation. Unified event management: alarm triggers are linked to the activation of video recordings, historical alarm events are linked to specific video recordings and access control events can be seen from multiple camera angles, camera activations can be linked to wireless sirens to deter intruders, and custom events can be freely added and managed. Simple and more seamless configuration Dahua’s AIoT Console enables simpler and more seamless configuration and control of a network comprised of AI and IoT devices, making it ideal for various application scenarios such as villas, offices, and warehouses. It is well-placed as a successor to the NVR, providing a unified recording and management tool for diverse AI and IoT devices and networks.
There is much excitement around the potential of AI to transform entire industries, from streamlining operations to creating new revenue streams. Indeed, as research from global vision solution provider Hanwha Vision reveals, AI is a top investment priority for pioneers to drive innovation, increase profitability and improve security. AI's operational efficiencies Yet these benefits can only be realised if there is sufficient trust in the AI being used and the insights it delivers - among people, who give consent for their data to be collected and analysed, and employees who will act on AI’s results and recommendations. What’s more, some employees may also worry that AI could take their jobs, and so consequently disengage with AI implementation. Unlocking AI's operational efficiencies and revenue potential can create momentum across the workforce, which will prove critical for AI's long-term success across all industries. That is why many organisations are increasingly looking to appoint a senior figure to champion the responsible use of AI and, ultimately, see the company-wide view of how AI can augment the workforce. Introducing the Chief AI Officer Security pioneers are increasingly partnering with their IT and functions mates as video security Research shows that more than one in five (21%) organisations are planning to hire a Chief AI Officer for their leadership team. The Officer’s remit is anticipated to expand far beyond IT to encompass all uses of AI in the company. Security pioneers are increasingly partnering with their IT and operations counterparts as video security systems become increasingly complex, move to the cloud, and deliver added value through AI and analytics. Therefore, the Chief AI Officer is expected to take an active, interested role in the adoption and use of AI-enabled video across the organisation. Interest in AI-enabled video AI-enabled video will be particularly attractive to the Chief AI Officer because of the business value-beyond security-that it promises. Retail, manufacturing, and smart city pioneers recently surveyed by Hanwha Vision expressed eagerness to use AI-enabled video to support wider operations such as health and safety, maintenance and staffing schedules, optimisation of store layouts, city planning and optimised traffic flow. In fact, AI-enabled video is now deemed a major asset in overcoming common business hurdles such as finding new efficiencies, cost control and managing complicated supply chains, with nearly one-third (31%) of pioneers backing it, according to Hanwha Vision’s research. For comparison, this is almost double the number (17%) of pioneers turning to automation and robotics to address their business needs. A unique skill set Crucially, they will also be responsible for sharing with stakeholders about AI's use of data A Chief AI Officer will possess unique skills, including the ability to align AI with business goals, create use cases, engage stakeholders with AI plans, ensure AI use complies with local and global legislation, and the technical knowledge needed to invest in and deploy AI solutions. As the most senior person responsible for governing the use of AI, they will drive the training required to help people work alongside and oversee AI. Crucially, they will also be responsible for communicating with stakeholders about AI's use of data and the protections put in place to keep it secure. Balancing use and identifying reliable partners Of course, the Chief AI Officer will be highly AI and data literate and will stay abreast of new AI developments to assess how their strategy impacts the use of AI in their organisation. They must also balance the benefits and risks of AI and be able to communicate this to stakeholders. Research shows that for every $1.00 (US) invested in AI across companies, an average of $3.50 is returned They will know which manufacturers to work with based on their attitude to responsible use, ethical manufacture, and commitment to cybersecurity. A strong business acumen will also allow Chief AI Officers to evaluate and demonstrate AI's return on investment (ROI). Research shows that for every $1.00 (US) invested in AI across companies, an average of $3.50 is returned. This impressive ROI is the result of greater insights, productivity gains, and automated workflows. Security’s ally As AI becomes ever more prevalent, a Chief AI Officer will no doubt join the company in the coming years. Having this individual in the corner will prove invaluable, as they will bring deep AI and business expertise to the use of AI, including video. In turn, they will help them extract greater value from the data collected by the security system. Furthermore, as the regulatory environment shifts, the Chief AI Officer will be able to guide their organisations as they navigate the introduction of new laws around the use of AI, such as the EU’s Artificial Intelligence Act (AI Act), which passed into law in March 2024 and comes into effect later in the year. By spotting patterns, identifying trends and alerting managers to the situations that deserve their attention, AI and the Officer responsible for its use will transform how they do business.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, concluded its “Powering Innovation 2024: A Genetec Empower 360 roadshow” in Saudi Arabia. The roadshow took place on 13 May at the Narcissus Hotel Riyadh and showcased the company’s latest innovations and strategic vision for the future. Genetec roadshow As Saudi Arabia continues to prioritise smart city initiatives, physical security assumes paramount importance within the nation's overarching security infrastructure. Echoing this dedication, the Genetec roadshow delved into critical topics impacting security professionals. In collaboration with Axis Communications, HID Global, and Ipsotek, the event explored biometrics, video analytics, and access control solutions that transcend conventional boundaries. Central to the discussions was the exploration of a unified approach to seamlessly integrate these solutions. Regional physical security Attendees gained exclusive insights into the latest Genetec technologies, upcoming product launches The event covered important themes around the state of regional physical security and the evolving trends and best practices for safeguarding assets and infrastructure. Attendees gained exclusive insights into the latest Genetec technologies, upcoming product launches, and strategic initiatives shaping the industry landscape. Additionally, they had the opportunity to engage in live demonstrations of solutions and connect with both industry experts and partners to explore emerging trends and technologies. Innovation and collaboration "At Genetec, we're committed to shaping the future of physical security and public safety through innovation and collaboration," said Firas Jadalla, Regional Director – Middle East, Turkey & Africa, Genetec Inc. “Our goal is to equip our customers in with the resources and knowledge they need to effectively navigate the complex world of physical security. The roadshow was a testament to our dedication to empowering professionals with cutting-edge solutions. In collaboration with our long-standing partners, we hope this event in Riyadh paves the way for a safer, smarter tomorrow." SaaS solution The “Powering Innovation 2024: A Genetec Empower 360 roadshow” also showcased Security Center SaaS, a massively scalable, open, and unified software as a service (SaaS) solution. The new offering combines access control, video management, forensic search, intrusion monitoring, automation, and many other advanced security capabilities.
IDEMIA Secure Transactions (IST), a division of IDEMIA Group, is a provider of payment and connectivity solutions for financial institutions, mobile network operators, and automotive manufacturers. Bamboo TAP Card By introducing the Bamboo TAP Card, IST is setting a new standard for environmental responsibility in urban mobility. The TAP team at L.A. Metro became the first player to symbolically deploy these cards which were sold at the Los Angeles Times Festival of Books on April 20 and 21, and distributed throughout the Metro bus and rail system on April 22 2024. Eco-conscious alternative This launch reflects IST’s broader mission to support its clients in their transition, moving towards sustainable practices Crafted from FSC™-certified bamboo, an exemplary sustainable resource, the Bamboo TAP Card offers an eco-conscious alternative to traditional transit fare cards. Its distinctive texture and its natural origin not only enhance the user experience but also symbolise the user’s commitment to protecting the environment. This launch reflects IST’s broader mission to support its clients in their transition, moving towards sustainable practices and reducing reliance on non-renewable resources. IST innovates to find ways of reducing the impact of its products, for example by offering cards made from recycled and recyclable plastic. Reducing plastic usage The collaboration between IST and TAP comes at a crucial time when global initiatives are focused on reducing plastic usage. Earth Day 2024, with its theme of combating plastic pollution, presented the perfect backdrop for this launch, emphasising a shared dedication to environmental stewardship. Seamless and secure transactions Bamboo TAP Card, like all IST’s technologies, ensures seamless and secure transactions while redefining the standards The Bamboo TAP Card, like all IST’s technologies, ensures seamless and secure transactions while redefining the standards of eco-consciousness in the urban mobility sector. The bamboo is certified by the Forestry Stewardship Council™ (FSC™), assuring no deforestation, the protection of plant and animal species, fair wages and a safe work environment for the workers, and the respect of the local communities. A sustainable solution "At IDEMIA Secure Transactions, we are driven by the conviction that our technological innovations can foster a more sustainable and inclusive world," said David MITEL, Urban Mobility Business Line Director at IDEMIA Secure Transactions. "The introduction of the Bamboo TAP Card is a testament to this belief, offering a tangible solution that aligns with the environmental values of our clients. All our teams are dedicated to finding solutions to contribute to the transition towards a more sustainable future."
New Government regulations mandate that all internet-connected smart devices, spanning from phones to TVs to smart doorbells, adhere to minimum-security standards by law. Groundbreaking legislation is in effect in the UK, aimed at shielding consumers and businesses from cyber threats. Cyber laws This initiative, spearheaded by the Department for Science, Innovation and Technology, the National Cyber Security Centre, and the Office for Product Safety and Standards, along with the efforts of Julia Lopez MP and Viscount Camrose, marks a pivotal moment in safeguarding against cyber criminals. Under these world-first laws, manufacturers are compelled to defend their products against hackers and cyber intrusions, effectively making the UK the global frontrunner in such protective measures. Key provisions This proactive approach aims to mitigate threats such as the notorious Mirai attack of 2016 Key provisions include the prohibition of easily guessed default passwords like 'admin' or '12345', with users prompted to change any common passwords upon setup. This proactive approach aims to mitigate threats such as the notorious Mirai attack of 2016, which exploited weak security features in over 300,000 smart devices, wreaking havoc on major internet platforms and services, including significant disruptions on the US East Coast. Recent findings to address cyber assaults The significance of this legislation extends beyond immediate protection, as recent statistics reveal that nearly all UK adults possess at least one smart device, with households averaging nine connected devices. By instating these measures, not only are consumers shielded from potential cyber assaults, but their confidence in purchasing and utilising such products are bolstered, fostering economic growth and business expansion. Robust network visibility Oseloka Obiora, CTO, RiverSafe said, “There is no doubt smart devices have become a big part of our day-to-day lives, creating an open door for hackers to gain all kinds of personal information and data. Now, we must aim to make the UK a safer place online, in response to the increasing rise of cyber attacks.” "To enhance readiness, security teams require robust network visibility to promptly identify and resolve vulnerabilities across systems, minimising the impact of cyber threats." Cyber resilience Andy Ward, VP of International for Absolute Security, commented, “With smart devices being increasingly hacked, new rules must be put in place to toughen cyber resilience and make the UK a safer place online." "As the UK confronts rising cyber threats, it's crucial to strengthen cybersecurity by focusing on threat protection, deterring attacks, and preparing for defence for all internet-connected gadgets, especially in a world where smart devices are an integral part of our daily lives. Achieving this involves ensuring clear visibility and effective control over networks, and demanding a robust framework to improve network supervision and establish a solid defencive stance."
Delta, a global pioneer in power management and a provider of IoT-based smart green solutions announced its participation in the upcoming Advanced Factories 2024 with a showcase under the theme "Connecting Devices, Shaping Solutions." VTScada and the IIoT The exhibit will include the VTScada energy management solution and the IIoT Solution for Industry 4.0. VTScada is a cutting-edge SCADA software that has been supporting the world’s largest mission-critical applications for over three decades. For instance, almost 40% of offshore vessels operating in the Gulf of Mexico are supported by VTScada. Enhanced connectivity and intelligent automation Jose Salgado, Country Manager for Iberia at Delta's Industrial Automation Business Group, said, "In the Iberia market, we are observing a few critical trends, including the digitisation and the adoption of smart manufacturing technologies, as well as the adoption of energy management systems for higher production efficiency." "Delta’s solutions are designed to address these key market trends of enhanced connectivity and intelligent automation. By integrating our advanced IIoT solutions and automation technologies, we empower businesses to streamline their operations and achieve unprecedented levels of performance." Lineup of advanced automation solutions Delta's exhibition at Advanced Factories 2024 will feature an impressive lineup of advanced automation solutions, including: Energy Management Solutions – VTScada: By integrating data through an Ethernet Switch to the VTScada primary server, this solution offers unparalleled visibility Delta's VTScada offers a comprehensive energy management system that enables users to monitor and control energy consumption across multiple systems, including HVAC, EV charging, energy storage, and solar energy infrastructure. By integrating data through an Ethernet Switch to the VTScada primary server, this solution offers unparalleled visibility and control. Visitors can witness the success of VTScada through real-time remote monitoring of Delta Americas Headquarters and Raleigh Office, showcasing system-wide redundancy, built-in data historian, and remote access capabilities. IIoT Solution for Industry 4.0: Expanding its presence in the Industrial Internet of Things (IIoT) and Industry 4.0, Delta introduces three significant enhancements to its IIoT solutions. The DOP HMI acts as a gateway to DIACloud, facilitating OT data sharing and remote maintenance without the need for VPN routers. DIAWeb Designer simplifies data visualisation and decision-making with its user-friendly dashboard editor, while AS-FFTP01 Function Card offers cost-effective IIoT access for AS PLC users with support for OPC UA server, MQTT client connectivity, and Node-RED web-based dashboard. These innovations demonstrate Delta's commitment to bridging the gap between operational technology (OT) and information technology (IT) layers, enhancing connectivity and intelligence in industrial environments. Pick-and-Place Articulated Robot: Showcasing Delta's expertise in robotics, this solution demonstrates the efficiency and adaptability of Delta's robotic arms for automating "pick & place" tasks. The demonstration features the AX-8 as the core motion controller, illustrating how it controls kinematic transformations for articulated robotic arms and manages various production line devices. With support for multiple communication protocols and cloud connectivity, this solution emphasises the cost-saving and integration benefits of combining PLC, motion control, robotics, and HMI functions into one compact, efficient package. AX-5 PLC-Based Motion Controllers: The Delta AX-5 Series represents the cutting edge in motion control, featuring the latest multi-core processor for rapid response and high-performance automation. With its ultra-slim design and support for a wide range of communication protocols, including EtherCAT, CANopen, Profinet, and MQTT, the AX-5 Series offers unmatched flexibility and space savings in automation cabinets. Visitors will learn how the AX-5 Series enhances industrial automation with its powerful features and seamless integration capabilities, making it an ideal choice for a broad spectrum of applications. VP3000 Drive for Fan, Pump, HVAC, Chiller, and Compressor: Highlighting Delta's innovation in drive technology, the VP3000 frequency drive showcases advancements in component lifetime and predictive maintenance. Its low harmonic and built-in EMC filter makes it ideal for commercial HVAC and industrial applications. The drive's focus on energy efficiency, with support for high-efficiency IM, PM, IE4/IE5 PMa SynRM motor, and advanced communication options, represents Delta's commitment to sustainable and intelligent industrial solutions. Delta invites attendees to Booth D472 in Hall 2 from 9 to 11 April at Fira Barcelona – Gran Via to experience firsthand how Delta's advanced solutions are overcoming industry challenges, boosting productivity, and enhancing efficiency.
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realise, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionising the overnight security business. Minimising criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilises a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimise the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is remote guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilises a combination of methods to effectively analyse potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyse the situation in real-time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command centre, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customised remote guarding When properly deployed, remote guarding systems are also customised to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional security shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A bounty of benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilise targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyse incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilise this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilises a decentralised ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralised, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimise threats or attacks to organisations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorised entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organisation. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organisation to undergo authentication, authorisation, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilises the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organisations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organisations in proper data control, handling, and security. These policies guide organisations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
What would it take to make an office building perfectly secure, with 100% impregnability? Would you put padlocks on every door and window, and security gates in every corridor? Certainly, this would be very secure, but it doesn’t take a security expert to see how such a setup would be a huge waste of resources, nor would it be convenient for the people who need to work in the building. Cybersecurity challenges But while most businesses recognise that complete perfection in physical security is neither realistic nor desirable, they often fail to make the same judgment when it comes to their cybersecurity arrangements. In their quest for perfect cybersecurity, the vast majority of organisations end up with misallocated budgets, poor prioritisation, or completely overwhelmed IT and security teams, resulting in these organisations suffering from cybersecurity paralysis. Cyber threats A steady stream of stories relating to cybersecurity and data breaches has caused businesses to enter panic mode Certainly, cyber threats are a major problem, with the global costs associated with cybercrime predicted to rise to $10.5 trillion by 2025. However, the steady stream of alarming news stories relating to cybersecurity and high-profile data breaches has caused many businesses to enter panic mode. This is exasperated by the overarching narrative from the media and security industry that “nobody is safe” when it comes to hacking. Measured and sober risk assessments While it is true that all organisations are technically “hackable”, it's important that they make measured and sober risk assessments when it comes to their cybersecurity. They need to look at the bigger picture: cybercriminals tend to focus their efforts primarily on the most valuable and highest-yielding targets. As such, striving for cybersecurity perfection is simply unnecessary for a large swathe of the business community. Physical and digital security This is true for both physical and digital security: perfection can easily become the enemy of progress. Ultimately, trying to be perfectly secure is unrealistic and unachievable. Chasing such a goal is likely to cause a massive detriment to both productivity and innovation. Rather than pursuing perfection, organisations must adopt a pragmatic approach to making themselves less vulnerable and focus their energy primarily on the risks that matter most to cyber criminals. This more measured and strategic approach to cybersecurity is likely to produce the most efficient benefits, while also protecting and ensuring the organisation's capacity for innovation and productivity. In the grand scheme, most companies will not get hacked Hackers will select the easiest targets in terms of stealing data or extorting money It is important to recognise that cybercriminals are rational actors. Hackers will select the easiest targets in terms of stealing data or extorting money. For instance, unless a new website can generate a large amount of revenue, there is no urgent requirement to make it 'perfectly secure', because the majority of hackers will not be interested in attacking small, unprofitable targets. Vulnerabilities But how can a company tell whether they are an easy target or not? Often, businesses will invest in scanning tools that indicate how many vulnerabilities exist within their infrastructure to gauge their current situation. However, simply knowing the number of vulnerabilities that exist across their websites or systems is only the first step, and is necessarily useful information. If an IT department is told there are 100 vulnerabilities, what should they do with that data? Is that a lot, or is it very little? How serious are these vulnerabilities and which ones should be prioritised? Instead, benchmarking can be a more useful metric, by showing an organisation how “hackable” they are compared to their peers. Instead of trying to fix every vulnerability, companies just need to ensure they remain above the industry average for hackability, as this will help decrease the likelihood of an attack as cybercriminals are more likely to go after softer targets. Also, companies can set milestones in the development lifecycle of their new apps and products to decide the right time to introduce robust cybersecurity measures. This will help organisations prioritise their cybersecurity efforts to maximise their impact. Walking a tightrope: balancing risk aversion with innovation Businesses do not allow overzealous cybersecurity measures to harm their capacity to innovate As the CEO of a cyber security service provider, here is my somewhat controversial opinion: security is not the most important part of any business. Of course, the threat from cybersecurity is rising, so every organisation must implement a robust security strategy. However, it is also vitally important that businesses do not allow overzealous cybersecurity measures to harm their capacity to innovate, take risks, and embrace new tools and technology. Unfortunately, this is the case within many organisations. Addressing vulnerabilities Today, CSOs, CISOs, and IT leaders face many competing priorities within their organisations. They are pulled in multiple directions and are expected to juggle an overwhelming amount of information while also making quick decisions to ensure all vulnerabilities are addressed. As a result, many are suffering from burnout and are deciding to quit the industry altogether. Risk-averse approach Meanwhile, others have adopted “healthy paranoia” in their efforts to defend against the growing number of security threats in existence. This leads them to become resistant to adopting new technology and being extra forceful with their input. This risk-averse approach is akin to using a sledgehammer to crack a nut: a disproportionate amount of effort that results in unintended negative impacts on other parts of the organisation. Tunnel-vision approach While risk aversion can be healthy, implementing overzealous security measures are likely to stifle company culture While risk aversion can be healthy, and it is in the best interests of a company to invest in cybersecurity, implementing overzealous security measures are likely to stifle the aspects of a company culture that can lead to global success. A tunnel-vision approach to security that neglects innovation in favour of preventing total disaster could produce a culture without the aptitude for innovation or the appetite for taking chances on new ideas. This will demoralise the workforce, leading to lower productivity as the company is too fearful to take worthwhile risks, all of which are harmful to a company’s long-term survival as it loses market share to more fearless competitors. Cybersecurity is a marathon, not a sprint Fortunately, businesses do not need to panic when confronted with the scale of cybercrime, because for most organisation the risks are much lower than they may assume. Security experts can see threats around every corner, and while this is an important skill, it also needs to be kept in check. Businesses must regularly take a step back and regain a sense of perspective on which risks are real and imminent, and which may become a danger in the future but do not require immediate measures. Risk assessment Companies can improve their cybersecurity incrementally, rather than race to fix every vulnerability Of course, that is easier said than done, but there are tools and services on the market to help organisations assess risk realistically while providing warning of potential threats. This way, companies can improve their cybersecurity incrementally, rather than race to fix every vulnerability as soon as it is discovered. By equipping IT teams with such tools, companies can take the necessary steps to reduce the risks of a cyberattack in the long term while spending fewer hours and resources on cybersecurity, thus ensuring budgets are spent more effectively. A balanced perspective on cybersecurity Security experts and their companies need to think rationally from a hacker’s perspective about which risks will lead to genuine harm and which are purely speculative. By adopting a more balanced perspective on cybersecurity, businesses can focus on pursuing opportunities and innovation without unnecessary paranoia. A healthy dose of fear can be a good thing, but developing strong, sensible, and sustainable security foundations require practicing moderation and reason, not perfectionism.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Acre is a company built on mergers and acquisitions (M&A). Since its founding in 2012, Acre acquired several familiar access control companies, from Vanderbilt to RS2 Technologies, Open Options to Feenics, and several others. Acre itself was acquired in 2021 by UK-based private equity firm Triton, thus launching a new chapter in the company's history. Don Joos was named the new CEO in 2022 and set about transforming Acre from a collection of acquired companies into a coherent whole (representing various brands). A year later, we recently caught up with Don Joos to discuss the "new Acre" and what's ahead. Q: How does your background inform your approach to leading Acre Security? In physical security, there is a shift to more of a software-centric versus hardware approach Joos: This is my fourth company as CEO. What I’ve found along the way is that no matter the size or type of business, there’s a common theme, the business is going through some form of evolution or transformation because the industry they're in is going through an evolution. And today, in physical security, there is a shift to more of a software-centric versus hardware approach, and there’s a shift occurring that’s pulling us to the cloud. I think a key thing here is that while the industry is evolving, we must keep a careful eye on the evolution of the customer because the customer is the one who will dictate the pace of change, and I think that is what a lot of people sometimes lose sight of. Q: It seems Acre is on the path from being a “collection of small companies” to “a collection of brands within a single company.” Joos: I think most people think of Acre as a federation of companies. Acre Security was seen more as a holding company. For me, I think the biggest misconception is just that: “This is just a federation of companies” versus “This is a business.” Acre Security is a business that has a range of portfolios to address key verticals and pivotal business problems for customers. Because of what’s happening now and the market dynamics that are occurring, it ties back to “Who is Acre Security?” We have a clear answer as to where we want to be from cloud access control versus on-premise access control. We have clear answers regarding market segments, visitor management, and intrusion. When you think about it, those are the core areas of our business. Q: What has surprised you the most in your first year or so at Acre? Joos: I think the thing that surprised me the most was how similar the problems are because I was coming into a new industry. It’s surprising how strong a correlation [security has] to other industry transformations that I’ve been a part of. Q: What are the points of differentiation among the various Acre Security brands? Joos: I think if you go back to the history of the company, it was designed to compete. That is, that's how it was set up under the logic of, “If we have three bids in a deal, it increases the odds that we're going to win one of them.” As we evolve, to have sustained scalable growth, it is not just about going shallow and casting a wide net. It’s about creating a concentrated focus. Some of the technology is just inherently older technology. And so for me, it’s about creating migration paths for the customers to move to more modern technology, such as the cloud. I love our installed base. When you think about the cost of acquisition to get a new cloud customer, it costs a lot less when you have an installed base that you can migrate to the more modern solution versus having to spend the money and the sales energy to hunt for that next opportunity. Q: Where has Acre positioned itself in the marketplace? We can take care of your current needs, but we also have a clear migration path to take care of your future needs Joos: If you're ready to go to the cloud, we have an answer for you. If you're not ready to go to the cloud, but you're ready to take more cloud-based applications to continue to evolve, we have an answer for you. If you're not quite ready yet and you're still looking for a market-leading premises solution, we have an answer for you, and we have a migration path when you're ready down the road. So, you have a safe bet with Acre because we can take care of your current needs, but we also have a clear migration path to take care of your future needs. Q: How are you building up your team? Joos: In 2023, we’re getting a lot of core building blocks in place and making investments in people who have experience in this space or aligned industries. It is a balance. I think we need a group that understands the industry and a group that's going to come into it and challenge why we do things the way we do. I think that makes us unique: we have fresh eyes looking at things from a different perspective. With that, you’re naturally going to end up with a better answer to problems because people are comfortable challenging the status quo. Q: How are you seeking to expand your dealer channel and/or transition it from the various dealers “inherited” in previous acquisitions? Joos: The channel invests in Acre Security. Our success is their success, and so what we're proposing to them is a range of solutions that supports their longevity and their financial success. But we also continue to build out our portfolio through organic technology innovation or M&A. We're continuing to make investments in our channel strategy and how our partners interact with us We're continuing to expand their addressable market if they want to make investments with us. We're continuing to make investments in our channel strategy and how our partners interact with us. The design of our upcoming technology right now is built with the channel in mind. We want to ensure that we are not creating any channel conflict or any perceived channel conflict. I think that's usually the worst kind: when it's perceived but not real. You need to be very upfront and clear with communications. Q: What is the biggest challenge in the industry right now? Joos: Companies and customers are looking to embed security into their workflows. What I mean is these are not just standalone solutions anymore. They’re integrating with enterprise resource planning (ERP) and human resource (HR) software systems. In property management, they want it integrated into the fitness center, they want it integrated into the cafeteria areas and the dry cleaners, and so forth. So, this is about an ecosystem, and there are times when we are going to be the core, and there is going to be a lot of technology that is adjacent to us. There are times when we are the adjacency to someone else's core in a smart city or a smart building. This gets to why having an open application programming interface (API) is going to be an important part of the technology evolution. It cannot be a closed environment anymore; that is part of the past. Q: What’s next for Acre? We're constantly evolving our cloud access control as well as our on-premise access control Joos: There is a lot of work going on with integrating the business into a single Acre Security company. This is an investment year for us, we are adding people to our team. We are making a lot of investments from a systems and technology perspective. We have a lot of work right now going into integrating the business from an IT infrastructure perspective and all the tools that we use from an employee perspective. We are making a lot of investment as it relates to the commercial side. You're going to see some next-gen technology coming out from an intrusion perspective. We're constantly evolving our cloud access control as well as our on-premise access control. We're also bringing software applications, too. Q: What is Acre’s “message” going forward? Joos: One of the takeaways for me is this is not the Acre of the past. We are making some bold changes. New things are happening here; you better pay attention because clearly, something is different. I think that's one. I think the second is that as they spend time within us, they're going to realize the wide range of solutions and use cases that we can address, whether you're in access control or cloud, whether you're in intrusion, whether you are in visitor management, or whether you're looking at some network connectivity solutions. The third thing that I think people are going to see is a whole lot of energy as they talk to our people and the passion that you see from the team. If I wrap those three points up in one kind of statement there, I think my goal is that people walk away saying “Something is going on at Acre Security. We better pay attention.”
Matter is a new open-source interoperability standard that will simplify the connectivity of smart home systems, including security. The growing popularity of the Matter 1.0 standard was evident at the large Consumer Electronics Show (CES) in January in Las Vegas, where the standard was heavily promoted by companies including Google, Amazon, and Samsung. A flood of Matter-connected products is on the horizon for ship dates in the second half of 2023. Evolve, and manage IoT standards Creating the standard is the Connectivity Standards Alliance (CSA), formerly the Zigbee Alliance, which changed its name in May 2021. With 300 companies as members, CSA seeks to create, evolve, and manage Internet of Things (IoT) technology standards through a well-established, collaborative process. CSA promotes the benefits of global, open standards, and the value of the IoT to customers and consumers, and seeks to break down the barriers to broad access and adoption of IoT technologies and solutions. Matter The new brand name Matter was launched in May 2021 to designate the standard formerly known as Project CHIP (Connected Home over IP), developed by CSA member companies including Apple, Google, Samsung, and Amazon. There are currently 800 devices and apps certified to the new smart home standard, including various smart home equipment (except video cameras, which will be included in a major release in the fall of 2023). Matter version 1.0 was initial launch in October 2022. Matter 1.0 release Twice a year moving forward, Matter plans a minor release each spring and a major release each fall As part of the Matter 1.0 release, authorised test labs are open for product certification, the test harnesses and tools are available, and the open-source reference design software development kit (SDK) is complete, thus enabling new products to be brought to market. Twice a year moving forward, Matter plans updated releases, a minor release each spring and a major release each fall. Smart home interoperability Currently, a variety of CSA working groups are addressing various aspects of interoperability in the smart home, including issues such as data privacy, security, energy management, and health and wellness, says Christopher LaPré, CSA’s Head of Technology. “Implementing elements requires that the standards alliance be able to multitask on several tracks,” says LaPré. Some development is centering around connectivity and the need for a “hub” to which multiple systems can communicate and incorporate an “identity” to regulate the availability of information to various systems. The standards will enable both do-it-yourself (DIY) systems and devices deployed by professional installers. Addressing privacy requirements The new development will be guided by what installers need to succeed in the home automation" Ecosystems depend on the availability of some type of “identity” to meet privacy requirements. Rules must be implemented across the ecosystem that deploys a “trust system” to ensure privacy. Solving the challenge involves getting all the major players to the table at the technical level to meet the bar from the business and technology perspective. “Integrators and retailers will play a role as Matter continues to evolve,” says LaPré. “New development will be guided by what installers need to succeed in the home automation market.” Matter-certified devices There is still work to be done to expand the 800 certified devices to function throughout the Matter ecosystem and to add new devices over time. One goal is to simplify an integrator’s solution using fewer hubs (and possibly a single hub) to provide a wide variety of services. The timeline of adding new Matter-certified devices may be delayed by the availability of equipment in the global supply chain, says LaPré. Flexibility Multi-admin provides for the simultaneous operation of devices in multiple smart home systems A multi-admin feature of Matter enables more flexibility for multiple ecosystems. A core feature of Matter, multi-admin provides for the simultaneous operation of devices in multiple smart home systems. Accordingly, family or household members could operate the device with the digital assistant or smartphone app of their choice. A bridging protocol helps to tie existing systems together. Amazon, Apple, Comcast, Google, SmartThings, and the Connectivity Standards Alliance came together in 2019 to develop and promote this new standard, joined by fellow Alliance board member companies IKEA, Legrand, NXP Semiconductors, Resideo, Schneider Electric, Signify, Silicon Labs, Somfy and Wulian. Smart device communication Currently, member organisations span all sizes, across a range of business categories. More than 1,700 Member individuals participate in bringing the Matter specification, reference implementations, testing tools, and certification programs to life. Matter's underlying network technologies are Wi-Fi and Thread. Wi-Fi enables Matter devices to interact over a high-bandwidth local network and allows smart home devices to communicate with the cloud. Thread provides a mesh network within the home. Both the Wi-Fi Alliance and Thread Group partnered with the Connectivity Standards Alliance to help realise the vision of Matter.
Case studies
San Luis Obispo (SLO), the gem of California's central coast, is renowned for its picturesque vineyards, historic architecture, and vibrant community life. Quiet but lively, it is also home to the California Polytechnic State University, located halfway between San Francisco and Los Angeles. Ensuring safety and security Because of its distance from major metropolitan areas, SLO has retained its rural, small-town character, along with a bustling downtown and beautifully preserved Spanish Mission. The San Luis Obispo Police Department (SLOPD) is focused on ensuring safety and security across expansive terrains, reducing crime, and enhancing the quality of life while upholding the principles of service and integrity. The challenge The secluded Reservoir Canyon is just one area that has been a hotspot for vehicle break-ins For San Luis Obispo, two priorities were crime prevention and the protection of sprawling outdoor spaces popular for hiking and biking. Hidden from public view, the secluded Reservoir Canyon is just one area that has been a hotspot for vehicle break-ins. However, its remote nature made installing a traditional security system nearly impossible. The initial cost to secure three city parking structures was also cost-prohibitive, with quotes of over $1 million for network connectivity alone. Need for a robust and reliable solution "We've dealt with products that were essentially consumer-grade equipment repackaged as professional security solutions,” said Chad Pfarr, Administrative Lieutenant. "We needed a more robust and reliable solution. Creating our own was time-consuming and beyond our expertise, highlighting the need for a specialised, cost-effective solution.” Why Verkada A system that could operate in remote locations, areas typically beyond the reach of standard CCTV “We were drawn to the hardware and software quality. But what truly set Verkada apart was the willingness to innovate in ways that traditional security solutions did not. We can now bring Verkada devices into the wild, in the middle of nowhere, without traditional city network infrastructure." A system that could operate in remote locations, areas typically beyond the reach of standard CCTV technology was a leap forward for community safety. Use cases include: Protecting remote locations with the GC31 Cellular Gateway. Licence Plate Recognition (LPR) monitoring to streamline vehicle investigations. Protecting evidence in cold storage with Air Quality Sensors. Improving check-in and registrant compliance with Workplace solutions. "Verkada's willingness to venture into uncharted territory with us to ensure security systems could be deployed where they were most needed, regardless of existing connectivity, was what got us so excited. Beyond just adapting to what’s available, it’s continuously improving to meet our needs." Protecting remote locations with the cellular gateway In San Luis Obispo, the GC31 Cellular Gateway bridges the gap between the need for remote security and limited infrastructure. The police department protects areas previously deemed inaccessible without the high costs of traditional network installations, leading to savings of over $1 million for connectivity alone. Bridging the connectivity gap "Before Verkada, the idea of installing a security system in remote locations was a logistical nightmare. The cost of establishing connectivity alone was prohibitive, not to mention the technical hurdles of operating without power or a network." "But with the Cellular Gateway, we've been able to overcome these barriers, bringing security and peace of mind to once vulnerable areas." Licence Plate Recognition (LPR) capabilities SLOPD can install Verkada products in locations that are hard to wire or lack connectivity SLOPD can install Verkada products in locations that are hard to wire or lack connectivity, such as parking lots, construction sites, trailheads, and natural terrain. Within the city, the GC31 also protects busy intersections by supporting cameras with Licence Plate Recognition (LPR) capabilities. Streamline vehicle investigations Paired with the cellular gateway, CB62 outdoor bullet cameras are deployed on streetlight poles to monitor moving traffic, covering up to three lanes with a single camera. Using Verkada’s edge-based processing and computer vision technology, the LPR solution captures licence plates at speeds of up to 80 mph (128 kph). Flexibility and versatility The cameras' versatility in both covert and overt operations allows SLOPD to adapt its security tactics The cameras' versatility in both covert and overt operations allows SLOPD to adapt its security tactics to each location. This includes monitoring busy intersections, remote trailheads, or railroad crossings. This flexibility is crucial in a community that values its open spaces and balances accessibility with safety. "We've not only deterred potential criminal activities but also enhanced the overall safety for residents and visitors alike. The ability to monitor these areas remotely has been a game-changer, allowing us to extend our reach without stretching our resources too thin." Protecting evidence in cold storage with air quality sensors The introduction of Verkada's air quality sensors into the SLPD’s evidence management protocol has marked a significant improvement in securing critical evidence that requires refrigeration. “Sensors protect the evidence entrusted to us." "They monitor the conditions within our cold storage facilities in real-time, ensuring that any deviation from the norm is immediately flagged. This allows us to act swiftly to address any issues before they impact the evidence.” Sensors mitigate the risk of loss and help maintain the overall integrity of the evidence, which is crucial for the judicial process. Ensuring that evidence is stored under optimal conditions preserves its validity and reliability, which can be decisive in court cases. Guest and Workplace Solutions Verkada Guest supports security and compliance as well as administrative processes At the police department, Verkada Guest supports security and compliance as well as administrative processes and community interactions. "We're not just looking at improving how we manage security systems; we're also opening up opportunities to better serve our community in every interaction they have with us. This is about making our department more accessible, efficient, and responsive to the needs of San Luis Obispo.” Automated notification "Registrants can sign in digitally, similar to the check-in process at a doctor's office. This system automatically notifies the assigned detective, who can then prepare before meeting the registrant." "It's a welcome shift from our current, more manual process, and we're excited about the potential to make our operations more efficient while improving the experience for everyone involved.” Digitisation of visitor check-in The registration of certain types of visitors is a legal requirement that, until now, has placed a burden The registration of certain types of visitors is a legal requirement that, until now, has placed a burden on the department's space and resources. By digitising the initial check-in and form completion process, the department can handle sensitive registrations with greater discretion and efficiency. "We can integrate specific forms and requirements into the Guest system." Minimising congestion "This customisation ensures that we can maintain legal compliance while respecting the needs of our community and the constraints we operate under." "Guest reduces wait times, frees up essential space in the lobby, and minimises the congestion that can occur during peak registration periods.” Solar and Battery SLOPD is also exploring alternate power options to enable more deployments across San Luis Obispo, further ensuring the safety and security of their community. "Our partnership with Verkada has already improved our operations. The next step involves incorporating solar and battery backup systems for our cameras and bridge devices. This will not only expand our public safety reach but also ensure that our security measures are sustainable and resilient against power outages."
As a longtime maintenance provider for Trafalgar Theatres at their Orchard Theatre site in Dartford, Blake Fire & Security and Cygnus’ distributor Illumino Ignis (Kent) Ltd (IIKL) were approached for a solution to a unique problem: Satisfying the stringent fire safety requirements of their new temporary venue to hold 1,091 audience members, while the main Orchard Theatre was closed due to RAAC Works. SmartNet-Pro fire detection With a very short turnaround of a week, Blake Fire & Security and IIKL instantly knew that the Cygnus EN 54 certified, fully wireless SmartNet-Pro fire detection and alarm system would be a perfect fit for the venue. It provides an aesthetically pleasing solution and quick installation, with full EN 54 and BS5839 Part 1 compliance, while also allowing the right cause and effects for the theatre operation. SmartNet-Pro range’s wireless network features SmartNet-Pro range’s wireless network features give a minimum of two communication paths to each wireless device Designed to deliver a reliable and safe solution, the SmartNet-Pro range’s wireless network features patented Cygnus technology and is run by battery-powered radio devices as part of a robust, self-forming, and self-healing mesh network, giving a minimum of two communication paths to each wireless device for maximum reliability. “We have worked with Cygnus and the SmartNet-Pro system previously and knew it would be ideal for this unique project,” comments Rory Foster, Fire Safety Systems Manager at Blake Fire & Security. 100% wireless “SmartNet-Pro is 100% wireless as well as being robust and reliable, it was exactly what we needed for the complexities of this project. We also knew we could rely on the Cygnus team to help deliver the project in a timely and efficient way.” Given the nature of the venue, the fire alarm system needed to have some advanced features to give the theatre control of the system. Factors to consider The Blake Fire & Security and IIKL team were required to consider these factors when creating the system: Smoke Machines being used during the performances. A function of the SmartNet-Pro panel allowed us to program a function on the button on the control panel to isolate the smoke elements of the detectors in the auditorium during performances (Show Mode) while keeping the Heat elements of the detectors functioning as normal. Heating pipes with hot air being blown throughout the site. By utilising the Cygnus SmartNet-Pro Combi Smoke/Heat A1R detectors, we were able to only have the smoke detection parts active for devices in the stream of the hot air, to avoid A1R false alarms. The costly effect of a false alarm and evacuating the venue during a performance. By having a 30-second initial delay, and a 2.5-minute investigation delay, we satisfied both the Fire Service and the Theatre by allowing the theatre staff to assess the cause of the alarm before evacuating the venue, without leaving too long without the fire alarm activating if no one responded. The combustible nature of the building is mostly dressed in linen throughout. Additional smoke detectors were installed on the edges of the linen-draped ceilings at the request of the local fire authority, with high-sensitivity smoke and heat detection to raise the alarm extremely quickly if the linen was likely to become compromised by fire. Specification and design The whole process was taken care of without any design surprises at the end of the project After a free site survey and design service, Blake Fire & Security and IIKL provided the specification and design to the theatre who then got the design signed off by the local council and local fire authority. Working closely with the theatre and local council, amendments and additions were made to the design, so the whole process was taken care of without any design surprises at the end of the project. Testing and demonstrations The SmartNet-Pro system of 65 devices was installed in a day, with another day allowed for testing and demonstrations; using rods and Unistrut fixings to fix detectors into positions where wired detectors would not feasibly be able to be installed. The fire alarm panel was installed by the stage door so that the stage door staff could hear when an activation has occurred, and then decide on whether to initiate the investigation delay. Zone Plan and As-Fitted Drawing The system was demonstrated to the crew, so they knew what the alarm sounded like, and how to react As with all Blake Fire & Security and IIKL installations, a framed Zone Plan and As Fitted Drawing were fitted by the Control Panel, to give the Theatre Staff and Fire Brigade instant knowledge of the building, and where the Fire Alarm activation has occurred. All members of the Stage Door crew were trained by Blake Fire & Security and IIKL in the operation of the system including all the advanced functions like the delays and “Show Mode”. The system was demonstrated to the crew, so they knew what the alarm sounded like, and how to react when the panel buzzer activates. High-level detection Rods with the detectors mounted onto them were clamped onto the trusses for the lighting, giving high-level detection in the auditorium where it was not possible to fix the black linen ceiling. These detectors were then programmed on the SmartNet-Pro system to be Heat Only when the system is in “Show Mode” to prevent unwanted alarms from special effect smoke used during performances. Manual Call Points Combi detectors were mounted just below the linen ceiling using rods clamped to the metal structure Ensuring all exits including stage exits were covered by Manual Call Points which would instantly evacuate the building without delay was imperative to allow occupants and staff in the venue to feel safe in the knowledge that if a person identifies a real fire, the fire alarm can be raised instantly at any exit from the building. The ceilings in the Front of the House have heating tubes running through them, so combi detectors were mounted to the side of this, just below the linen ceiling using rods clamped to the metal structure above the linen. Smoke detection Extra smoke detection was installed along the low-level edges of the linen ceilings, on L Brackets, so that a fire could be detected quickly before the linen ceilings caught alight. These detectors were supplementary to the main detection along the apex of the ceilings. Given the nature of the ceilings, conventional wiring methods would not have been possible without a very unsightly installation, so the wireless nature of the Cygnus SmartNet-Pro system was an obvious choice. Ongoing maintenance Blake Fire & Security and IIKL issued the O&M Manual with all certificates and drawings required for Building Control Following the completion of the installation, commissioning, and testing Blake Fire & Security and IIKL issued the O&M Manual with all certificates and drawings required for Building Control to sign off the system and deem the venue safe to open to the public. Blake Fire & Security and IIKL will provide ongoing maintenance of the system to ensure that the system is kept up-to-date and compliant. EN 54 certified, and BS 5839 compliant fire detection SmartNet-Pro is the world’s first 100% wireless, EN 54 certified, and BS 5839 compliant fire detection and alarm system while the new SmartNet-100 is ideal for small to medium-sized projects, where the scalability of SmartNet-Pro is not required. Cygnus was thrilled to support the project by providing a complete SmartNet-Pro system to guarantee the fire safety requirements were met.
In the historic city of Pavia in the heart of Lombardy, historical buildings meet state-of-the-art video technology. Panomera® multifocal sensor cameras from Dallmeier are used to provide a comprehensive overview of the popular Piazza della Vittoria and to protect locals and tourists from vandalism and crime. Lively city at the Ticino The Italian city of Pavia is not only one of the oldest but also one of the most beautiful cities in Lombardy. Located about 35 kilometres south of Milan, Pavia's picturesque location on the banks of the Ticino River, its historic centre with its many narrow streets and its important churches and buildings attract many travelers from all over the world every year. The heart of the city beats in Piazza della Vittoria, not far from the cathedral: locals and tourists alike meet for a coffee in the beautiful long square, and in the evenings it is a vibrant place for nightlife and events. Challenges: vandalism and crime But like so many other cities, Pavia also struggles with the darker side of such a lively square But like so many other cities, Pavia also struggles with the darker side of such a lively square. There have been incidents of vandalism and crime. “Unfortunately, there have been more and more problems with people behaving badly and not following the rules,” explains Pietro Trivi, councillor for security. Less is more In the past, the city tried to get a handle on the situation with a large number of conventional single-sensor cameras. But the image quality was not good enough to recognise or even identify people. So the security managers looked for a new solution and found it in Dallmeier's multifocal sensor technology. Panomera® multifocal cameras Dallmeier Italia, together with its partner Enet Solutions, carried out an on-site demonstration that was immediately convincing. “The image quality over the entire area was simply impressive,” said Luca Ceriani, Sales Manager at Enet Solutions. Meanwhile, the many single-sensor cameras have been replaced by just two Panomera® multifocal cameras. Patented technology Panomera® series, by combining sensors and lenses with different focal lengths, always captures a very large area They differ from other cameras by their patented technology: several sensors with different focal lengths are combined in a single system. Whereas with conventional cameras, the image resolution decreases towards the background of the image, the Panomera® series, by combining sensors and lenses with different focal lengths, always captures a very large area with the minimum resolution precisely defined in the planning. High-resolution images all day and night The two Panomera® cameras have been installed on two opposite sides of Piazza della Vittoria. In this way, the police in their headquarters, where the video system is in operation, can keep an eye on the situation in the busy square at all times. Flaviano Crocco, commander of the local police, is pleased, “The two cameras provide high-resolution images at any time of the day or night. In the event of an investigation or the presentation of evidence in court, this guarantees the clear identification of possible perpetrators. In addition, the system is much easier and less complicated to operate than before.” Multifocal sensor technology advantages In practice, the multifocal sensor technology offers many advantages. For the user, for citizens and tourists, and the city as a whole, as Daniele Sisinio, Director Dallmeier Italia, explains, “The police always have an overall view of the entire square and at the same time any number of detailed views can be displayed in high resolution." "The detail zooms can be easily opened with a mouse click in the overall image like ‘virtual’ PTZ cameras – both live and in recording. This means that any number of operators can view the footage at the same time. And everything is always recorded at the highest resolution. This means that incidents can be traced and reconstructed for use in court, and perpetrators can be identified.” Improved economy and aesthetics The two Panomera® cameras blend in discreetly and disturb the aesthetics of the square much less In addition to more user-friendly operation and a better overview, the new solution is also more economical: With only two cameras instead of ten, the operating and infrastructure costs are significantly lower. There was another aspect that was important to the city of Pavia's security managers: the two Panomera® cameras blend in discreetly and disturb the aesthetics of the square much less than the many scattered single-sensor cameras before. Proven in practice Meanwhile, the Dallmeier video system has proven itself in practice. So well, that the next expansions are already being planned. The Piazza del Duomo, the square in front of the city's impressive landmark, will also be secured with Panomera® cameras in the future. “It was not only the technology that convinced us, but also the cooperation with Dallmeier and Enet Solutions,” says Pietro Trivi. “We are very happy with our decision, which is why we also decided to expand the video system. With Dallmeier we have found a high-quality and future-proof solution.”
Located in downtown Houston, Texas, USA, at the George R. Brown Convention Center (GRB), the Houston Living Lab (HLL) serves as a testing ground for city departments and partners to test and validate new technology. In 2017, the Houston First Corporation (HFC) established the lab following a successful collaboration with Milestone Systems and several other security manufacturers to rapidly deploy video technologies for nearly one million attendees at the Super Bowl Live festival. Now HLL develops smart city solutions for deployment across Houston. Security technology solutions With the help of the Houston First Corporation — a local government corporation created to operate the city's convention and performing arts facilities — the City of Houston hosts many high-profile events annually. One of HFC's long-term goals is establishing Houston as a pioneer in smart city initiatives to further promote the region as a tourism and convention business destination. City of Houston and HFC needed to bring together technology partners and build on living infrastructure To accomplish this goal, the City of Houston and HFC needed to bring together technology partners and build on existing infrastructure to further enhance public safety and security during events. In 2017, the city hosted Super Bowl LI, an event that became a literal game changer in how the city rapidly deploys integrated security technology solutions. Legacy security systems The 10-day Super Bowl Live festival at the 12-acre Discovery Green featured free well-known music artist concerts and other attractions. The neighbouring GRB hosted the NFL Experience event with interactive activities and player appearances. When hosting large events spread out over several venues, the city found that the added congestion from portable event stages, booths, and attendees changed the environment. This rendered the standalone legacy security systems inadequate when hosting the events. “In these situations, the green space is no longer open; it’s cluttered with event structures, banners, and everything that comes with a festival. We found that our existing camera system was getting either visually or audibly interfered with,” said Jack C. Hanagriff, former Program Manager for the City of Houston’s Office of Public Safety and Homeland Security. Access to the camera system In the six-month planning period before the festival, Verizon installed fibre-optic cable for the event Determining a temporary system was needed to provide security at Super Bowl Live, Hanagriff and his team brought in Milestone Systems on the recommendation of HFC's long-time integrator Teksys and manufacturer Axis Communications. Milestone helped design and test a rapidly deployable, fully integrated supplemental camera and video management software (VMS) system at Discovery Green. In the six-month planning period before the festival, Verizon installed fibre-optic cable for the event. This allowed access to the camera system with Axis F Series modular cameras, Q Series PTZ dome cameras, and thermal imaging systems. Milestone open platform Using a Milestone open platform system design, the temporary festival infrastructure easily integrated with the non-Milestone VMS already used at GRB. The system was built on the Milestone design. “We were able to tie both VMS networks into our existing homeland security network. We converged the two systems to give law enforcement, the fire department, and other agencies access to all systems seamlessly,” said Jack C. Hanagriff, adding “Again, this system did not exist just four days prior.” Houston Living Lab inspires Smart City R&D HLL allows city departments and partners to test and validate technology in an active environment After successfully collaborating with Milestone Systems and other security manufacturers for the Super Bowl Live events, HFC established the Houston Living Lab. The HLL allows city departments and partners to test and validate technology in an active environment. Technology partners include Milestone Systems, Axis Communications, Cradlepoint, Dell Technologies, Haystax, Acre Comnet (formerly Razberi), Siklu, and Verizon. Video analytics are provided by Athena Security, Citilog, EAGL Technology, Evolon Technology, Irisity (formerly Agent Vi), Sound Intelligence, and AirSight (formerly 911 Security). Technology Partnerships Enhance Public Safety The 1.9 million-square-foot GRB Convention Center has diverse security needs. Beyond public safety and monitoring aggressive behaviour in and around the centre, the security team proactively improves traffic at intersections and manages four large parking garage operations. In 2021, HFC worked with Houston Public Works (HPW) on designing and installing an on-premises software solution to easily bring together the latest technologies at GRB. The 1.9 million-square-foot GRB convention centre has diverse security needs Milestone video management technologies provide seamless integrations with cutting-edge security applications. Nearly 600 legacy Axis Communications cameras are integrated with Milestone Smart Walls in multiple security and parking command centres spread across facilities in the theatre and convention districts, providing complete situational awareness at any given moment. Relationships built at the HLL HFC wanted to be able to identify dangerous situations and be proactive rather than reactive to help mitigate risks. They now have visibility into different situations, such as vehicles driving the wrong way, large crowds gathering in an area or even listening for glass breaking, car alarms, gunshots, or aggressive behaviours. “The relationships built at the HLL were instrumental in helping us support the needs at other high-profile sites throughout the city that were identified with concerns regarding general public safety and quality of life,” added Jack C. Hanagriff.
SeeTrue, a global AI software solution pioneer for security screening, disclosed its recent entry into the realm of urban security through a strategic partnership with Israel Railways. This collaborative effort has resulted in the seamless integration of SeeTrue's cutting-edge AI solution into security screening checkpoints at railway stations throughout Israel, including the country's largest stations, where more than 1,000 bags require screening every hour. Faster, smoother security process The integration of SeeTrue into train station security processes has proven to be transformative, maintaining a consistently high level of security and operating continuously around the clock. Passengers benefit from a faster, smoother security process minimising stress and ensuring that critical security checks do not result in bottlenecks that can negatively impact the journey. Security screening solution This incident offers concrete proof of SeeTrue's invaluable contribution to ensuring public safety In a recent incident at one of the busiest and most central train stations, SeeTrue's AI security screening solution identified a bag containing a concealed 30-centimetre knife, alerting security personnel in real-time. As a result, the potential threat was swiftly and effectively neutralised, resulting in the arrest of the individual carrying the concealed knife. This incident offers concrete proof of SeeTrue's invaluable contribution to ensuring public safety in high-traffic transportation hubs. AI technology Assaf Frenkel, Co-Founder and CEO of SeeTrue, "We take immense pride in deepening our expertise in AI technology to include urban security, an endeavour that complements our pioneering work in aviation, customs, and other urban security checkpoints." Assaf Frenkel adds, "Partnering with a high-quality, innovative mass-transit organisation like Israel Railways is a testament to our commitment to revolutionising safety and security across multiple domains, making our cities and transportation systems safer and more efficient." Innovation and intelligence in railway security Hagay Rozenfeld, Head of Innovation, Israel Railways, said "Innovation at Israel Railways is a key part of our strategy, and AI plays a pivotal role in strengthening our pledge to passenger safety, seamlessly infusing intelligence into our security strategies and enabling us to provide optimal security for our passengers and our employees." Shaked Bar, Head of Security, Israel Railways, said "Acknowledging our responsibility to top-tier security at Israel Railways, we harness the power of AI to provide the highest security standards, ensuring the best passenger experience and safety."
As one of the main tourist destinations in the Caribbean, The Bahamas welcomes nearly seven million visitors every year. Unfortunately, the City of Nassau, the capital of the Bahamas, has seen increased crime in certain parts of the city over the last several years from pickpockets and vehicular crimes to armed robberies and kidnappings. Policing, safety, and security Based in Nassau, the Royal Bahamas Police Force (RBPF) employs over 3,000 officers and provides policing, safety, and security services to residents and visitors. However, the RBPF was challenged to keep up with the rising tide of criminal activity. The government fully supported the RBPF’s initiative to expand the country's surveillance system as a strategic tool in the fight against crime. Track and monitor, situational awareness The RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence" “There are known criminal hotspots across the city that people of interest frequent," said Ethan Munnings, CTIO at Proficient Business Services, Bahamas, and the lead engineer for the City of Nassau video surveillance project. “To curb incidents in those areas and to better track and monitor suspects, gain situational awareness, and to be able to help locate or identify people after leaving the scene, the RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence. One of those areas, for example, is the surroundings of the house of the Prime Minister.” Milestone video management system In 2011, the city set up its initial Milestone video management system, overseeing around 250 cameras. Later, in 2019, Nassau officials collaborated with Proficient Business Services to integrate almost 500 additional cameras and edge devices into the system. A restructuring of the network infrastructure was required to consolidate all data feeds to the city's Real-Time Crime centre. The new crime centre, located at the police headquarters, opened in February 2021, acting as the Royal Bahamas Police Force's technological epicentre. Innovative technology Integration In early 2020, the Ministry of National Security of the Bahamas began expanding its existing Milestone XProtect video management system. Milestone's open platform data-driven video technology system is compatible with various hardware and software vendors. The upgrade led to redesigning of the network infrastructure and the addition of over 500 high-quality network cameras from Axis Communications. Facial recognition and video analytics ShotSpotter, the gunshot detection system was also integrated into the greatly expanded system The project involved several Milestone technology partners, including system servers from Rasilient Systems, and video analytics applications such as Licence Plate Recognition (LPR) and facial recognition from BriefCam. ShotSpotter, the gunshot detection system from SoundThinking, was also integrated into the greatly expanded system. Artificial intelligence and deep learning Within the Milestone VMS, the cameras and servers integrate with BriefCam’s video analytics, providing facial recognition and person/object tracking. By harnessing the power of artificial intelligence and deep learning, integrated BriefCam technologies transform video data into valuable insights for rapid video review, search, and real-time alerting. Two types of LPR The system also offers two types of Licence Plate Recognition. The first is via the Milestone LPR add-on, and the second is through direct integration with BriefCam. A team of 14 operators relies on Auvik for device monitoring and SolarWinds to manage the core network. The fiber network, with a 10G backbone, is based on Cisco technologies. Traffic safety revolutionised Video technology was pivotal in this endeavor, with fatal accidents in New Providence dropping to 33 in 2019 Beyond enhancing security, Nassau's updated city video system has proved instrumental in monitoring traffic accidents and holding drivers responsible for their behaviour. Eyewitness News from Nassau reported 69 deaths related to traffic in 2018. After witnessing an almost 30 percent surge in fatalities from 2017 to 2018, authorities committed to reducing traffic-related deaths and accidents. Video technology was pivotal in this endeavour, with fatal accidents in New Providence dropping to 33 in 2019. Traffic surveillance “The cameras we have strategically installed on traffic lights around the city use LPR integrated with Milestone Systems, which have helped control hit-and-run accidents,” said Munnings. “There have been cases of pedestrians being hit by vehicles that didn’t stop; now the police can track those vehicles and bring those drivers to justice. The new surveillance system has also helped prevent human abductions.” Technology and innovation For more than 12 years, the City of Nassau has been relying on and expanding the capabilities of its video surveillance system. With the help of technologies and deep integration within an open platform VMS ecosystem, the city's authorities and police have effectively addressed evolving challenges to ensure safety for both residents and tourists. “Technology and innovation have taken off at the speed of light and this will only accelerate. Embracing the innovations that improve police work is no longer optional," said Zhivago Dames, Assistant Commis.
Round table discussion
Technology can be a powerful tool, but it can also be misused. Ethical principles help ensure that technology is used in a way that minimises risks and avoids causing harm to people or society. Issues could include factors such as data privacy and algorithmic bias of certain technologies. As the security industry embraces advanced and evolving technologies, we asked this week’s Expert Panel Roundtable: What are the biggest ethical considerations of using emerging technologies in physical security?
By all reports we have heard, 2024 is rushing by at a rapid pace. Many of us are just now catching our breaths after the busy holiday season, even though spring is practically here. Having had a healthy taste of 2024 already, our Expert Panel Roundtable is eager to weigh in on what lies ahead for the rest of the year to come. We asked this week’s panel: What large trends are driving growth in the physical security industry in the year ahead?
With the new year well underway, 2023 seems almost like a distant memory. However, a bit of distance might be just the thing to enable us to examine the impact of the year 2023 on the physical security marketplace. We asked this week’s Expert Panel Roundtable: What factors had the biggest impact on the security marketplace in 2023?
White papers
Guide for HAAS: New choice of SMB security system
DownloadUnderstanding all-in-one solutions
DownloadImproving city mobility using connected video technology
DownloadVideo technology: making cities safer & improving lives
DownloadCharting the path to safe cities
DownloadConnected video technology for safe cities
DownloadCloud video and smart cities
DownloadSinaloa, Mexico: Connected cities are safer cities
DownloadHoneywell GARD USB threat report 2024
DownloadThe role of artificial intelligence to transform video imaging
DownloadAccess control system planning phase 1
DownloadKey Findings from the 2024 Thales Cloud Security Study
DownloadFacial recognition
Download