Store security
Carlisle Support Services appoints public and private security expert, John Lambert as Managing Director of Security and Events in the North. With a background that stems across 15 years within the public and private sectors, John is well-placed to advise, facilitate, and manage this division for all Carlisle contracts. Responsible for the delivery of the Northern security and events division for the business, he will ensure that the division continues to deliver market-pioneering solutions to...
Appdome, the mobile app economy’s one-stop shop for mobile defense, announced it has enhanced its award-winning Geo-Fraud Detection service to include two new defences: Geo-Location Fencing and Geo DeSync Attack Detection. Combined with other Geo-Compliance features available on the Appdome platform, mobile app developers and enterprises can eliminate location-based fraud, ensure geo-compliance and deliver location-relevant user experiences in mobile apps free from location spoofing, fake...
The faulty CrowdStrike Falcon Sensor update and subsequent outage – the CrowdOut Event – underscore the potential for Single Point of Failure (SPoF) technology outages to impact the global digital economy. CyberCube is advising clients on how to use SPoF Intelligence to identify exposed insureds and estimate the exposure footprint of the event. SPoF Intelligence is the definitive source for analysing a portfolio's digital supply chain, integrated with the industr...
Corsha Inc., a Washington D.C.-based cybersecurity firm, known for its innovative Identity Provider for Machines, pioneering the way in Machine-to-Machine (M2M) security solutions, has been awarded an SBIR Phase III contract by the United States Air Force Sustainment Centre (AFSC). This initiative will focus on developing a blueprint for streamlining how to get Authority to Operate (ATO) and Interim Authority to Test (IATT) certifications for new technologies on the Industrial Depot Maint...
Own Company, the industry pioneer for SaaS data protection and activation, strengthens its commitment to US government agencies with FedRAMP-authorised backup and recovery solution for ServiceNow. Own’s backup and recovery solution for ServiceNow, Own Recover, is now a FedRAMP-authorised data protection solution. In recent years, U.S. government agencies have made significant strides in modernising and adopting Software as a Service (SaaS) applications to enhance their efficiency and serv...
Camden Door Controls is pleased to introduce to the market the CX-ED0010 Electromechanical Cabinet Lock. Representative of the impressive technological evolution in secure locking systems, it is designed for a variety of enclosures that use swinging doors, drawers, and sliding doors. This lock introduces the flexibility of operating in either field selectable fail-safe or fail-secure modes and supports both 12V and 24V power supplies. Functionality of the CX-ED0010 This flexible and affordab...
News
Red Lion, a manufacturer of innovative technologies that empower industrial organisations to access, connect and visualise their data, is pleased to announce the launch of N-Tron® NT116 unmanaged industrial Ethernet switch, designed for industrial applications needing dependable performance for mission-critical applications under harsh conditions. The NT116 unmanaged switch offers exceptional reliability and performance for data acquisition, Ethernet I/O and process control. Compact in size and including 16 high-performance copper ports (10/100BaseTX RJ45), the unit is housed in a rugged industrial metal enclosure. Robust network support NT116 offers high shock and vibration tolerance, and all ports have built-in ESD and surge protection The NT116 offers high shock and vibration tolerance, and all ports have built-in ESD and surge protection. Users benefit from an exceptional 1.2M hour MTBF rating, in a slim, space-saving design that operates in temperatures from −40°C to 85°C. For robust network support, the NT116 supports full wire speed communications of up to 3.2 Gb/s throughput. The unit uses store-and-forward technology and supports full and half duplex operation. Two 10-49 VDC power inputs are provided for redundancy. Red Lion’s new N-Tron® NT116 The N-Tron® NT116 is the next evolution of Red Lion’s 116TX unmanaged industrial ethernet switch. In addition to IEEE 802.3 compliance and marine, railway, and rolling stock certifications, the new switch carries UL Ordinary and Hazardous locations as well as ATEX and IECEx certifications. New switch carries UL Ordinary and Hazardous locations and ATEX and IECEx certification Red Lion’s new N-Tron® NT116 makes critical performance data easier to gather. Its rugged and hardened design provides the durability and reliability needed to withstand the extreme conditions found on factory floor control networks and in oil and gas, utilities, wastewater treatment, alternative energy, rail, intelligent traffic control and transportation applications. Industrial ethernet switch “When industrial equipment operators and business pioneers can access their data seamlessly and quickly, they derive more value from it." "The N-Tron® NT116 unmanaged industrial ethernet switch minimises downtime and maximises throughput to improve efficiency and drive operational performance,” said Diane Davis Product Manager.
Comcast Smart Solutions, a division of Comcast that specialises in smart technologies for businesses and communities, announced expanded strategic relationships with Eagle Eye Networks, a global pioneer in cloud video surveillance with AI and analytics, and C2RO, a pioneer in Privacy-Aware AI-powered video analytics software, to provide customers with a new, broader set of AI video analytics solutions. This collaboration expands Comcast Smart Solutions’ existing Video Analytics expertise while giving clients more flexibility to choose the right smart video solution. Access to video analytics "As technology continues to innovate and industries continue to face new challenges, organisations must reassess how they are using and managing their video and analytics systems,” said Michael Slovin, Vice President and General Manager of Comcast Smart Solutions. "By solidifying our relationships with Eagle Eye Networks and C2RO, two distinct video analytics pioneers with highly valuable and complementary offerings, we are providing our clients with stronger and more flexible solutions. Our goal is to provide broader access to video analytics and AI-powered technologies that can deliver the data, insights, and real-time alerts they need. This includes everything from consumer journeys and inventory shrinkage to traffic patterns and licence plate reading—and that’s just the start.” AI video analytics tools Solutions are trade configured with Comcast Business, provider of the largest gig-speed network Comcast Business and Xfinity Communities customers - including municipalities, commercial and residential properties, retailers, fast-casual and quick-service restaurants (QSR), and more - can now leverage AI video analytics tools and cloud-based platforms from Eagle Eye Networks and C2RO. These technologies transform video footage into data-driven insights that can help businesses, retailers, and communities enhance security, optimise operations, improve service quality, and mitigate IT costs. Solutions are custom configured with Comcast Business connectivity, provider of the nation’s largest gig-speed network. Range of benefits Eagle Eye Networks and C2RO’s solutions offer a range of benefits, including: Enhanced security and smart search: Cloud-based Video Management System (VMS) offers entry and perimeter detection with real-time alerts to help increase safety. Access remotely and search for people, vehicles, and objects across all recorded footage using keywords in a simple search-engine style experience. Data privacy compliance: Personal information and uniquely identifying information is never leveraged for marketing and operational analysis, enabling strict compliance for data privacy regulations. Additionally, clients can securely store all their security-related video footage in the cloud with robust and redundant safety measures, including encryption and 24/7 monitoring, to help ensure it remains secure, protected, and private. Personal information and uniquely identifying information is never captured, facilitating privacy compliance. Cost savings: Scalable cloud technology can reduce or eliminate the need for physical hard drives and dedicated storage racks for video footage. Clients can often integrate software into existing cameras for increased savings. Deeper understanding of customer journey: Strategic insights into customer journeys and behaviours with anonymous AI-driven data of customer flow, product interactions, and transactions, informing current performance and future actions. Security and operational challenges AI video analytics solutions effectively address security and operational challenges across multiple sites Eagle Eye Networks simplifies AI video analytics and video footage management with its secure cloud-based storage and intuitive software platform. Its AI video analytics solutions effectively address security and operational challenges across multiple sites, while economically securing data in their own data centres. Plus, its ability to integrate with existing camera infrastructure allows for increased savings and makes it particularly suited for local governments as well as multifamily, commercial, and mixed-use properties and their businesses. “Business owners, smart cities, and commercial properties are increasingly adopting cloud video surveillance with AI and video analytics for business intelligence as well as for security. Eagle Eye Networks is pleased to partner with Comcast Smart Solutions to deliver powerful video analytic tools that help businesses become more efficient and help make the world a safer place," said Dean Drako, CEO and Founder of Eagle Eye Networks. C2RO’s distinct solutions C2RO’s distinct solutions address challenges across a wide range of industry sectors C2RO complements this with its highly advanced AI video analysis, which enables organisations to generate valuable data-driven insights that inform critical business decisions. C2RO’s unique technology provides detailed and accurate learnings about specific customer behaviour while prioritising anonymity and compliance with the strictest data privacy regulations. Whether an organisation is focused on enhancing customer engagement, streamlining operations, or deterring in-store theft, C2RO’s distinct solutions address challenges across a wide range of industry sectors such as retail, shopping centres, hospitality, and more. Benefits of AI-driven video analytics “We are very proud and excited to partner with Comcast Smart Solutions and Eagle Eye Networks to expand the reach of our AI-based analysis and theft deterrence software solutions within the Comcast Business and Xfinity Communities,” said Riccardo Badalone, CEO of C2RO. “Customers will directly benefit from the combined resources and highly complementary solutions of three organisations to fully exploit the benefits of AI-driven video analytics solutions.” Comcast Business and Xfinity Communities customers looking to reassess and enhance their video monitoring and analytics system for maximum impact now have access to Eagle Eye Networks and C2RO video analytics solutions.
IDEMIA Public Security North America, the pioneer secure identity solutions provider, in partnership with the New York State Department of Motor Vehicles has launched the next-generation of mobile ID. New York residents can now assert their identity securely and easily from their mobile phone by downloading the free app from either the Apple App Store or Google Play. State residents can use the app immediately to verify their identities directly from their mobile phones at TSA checkpoints at John F. Kennedy International Airport (JFK) and LaGuardia Airport (LGA), as well as 27 other participating airports around the country. Interactive identity solution This comprehensive and interactive identity solution can be used for identity verification both in-person and online by various government agencies, businesses, and organisations. Created with IDEMIA’s patented technologies, robust security features, and a focus on privacy and interoperability at the forefront, the New York Mobile ID (mID) app is designed to conform to the International Organization for Standardization (ISO) standard for the mobile driving license (ISO 18013-5). This provides a high level of assurance that mobile ID verifiers and relying parties of mobile ID can trust This provides a high level of assurance that mobile ID verifiers and relying parties of mobile ID can trust. The New York Department of Motor Vehicles (NY DMV) pushes on-demand credential updates to the app, ensuring verifiers have the most-up-to-date status, including real-time notification if an ID has been revoked or cancelled. Easy and contactless way The New York mID app provides an easy and contactless way for users to verify their identity while protecting their privacy and ensuring security. Mobile ID holders are the only ones who can access the Mobile ID by unlocking the app using their biometrics or their personal six-digit pin. Users must consent to sharing their information when using their Mobile ID, an improvement in consumer privacy compared to the physical credential. “Everything is on your cell phone these days, and now, your ID can be too. This is an exciting way to provide identification without having to dig through your wallet or purse to find your physical document. Rather than handing over your physical ID with lots of personal information, the Mobile ID gives you greater control over what personal data you share. We are proud of the product we built with our partners at IDEMIA and look forward to New Yorkers using it,” said Mark J.F. Schroeder, DMV Commissioner. Demonstrating collective commitment IDEMIA’s partnership with New York Department of Motor Vehicles is an example of iron sharpening iron" “IDEMIA’s partnership with New York Department of Motor Vehicles is an example of iron sharpening iron. Throughout the development and launch of New York’s mobile ID, leaders in the State challenged us to do more and make important improvements to our mID offering. Ultimately, the State of New York is launching a best-in-class solution to its citizens, something they should all be proud of.” “Together, we are demonstrating our collective commitment to expanding the use of mobile ID while implementing technologies that are convenient, secure, and equally accessible to all citizens. We’re excited for New York residents to be able to use this technology to verify their identities seamlessly and securely and for acceptors of mobile ID to gain important benefits as well,” said Donnie Scott, CEO of IDEMIA Public Security North America. Significant user experience The NY mID app was designed with IDEMIA’s most advanced features to improve usability for all residents. The NY DMV and IDEMIA teams collaborated to make significant user experience improvements including enhancements to screen reader compatibility, adjustable text and contrast, voice command, keyboard navigation, and much more. Arizona, Delaware, Iowa, and Mississippi are additional states that have rolled out IDEMIA’s Mobile ID technology, with more states to launch later this year.
Intellicene, the pioneer in intelligent security management platforms, announced the appointment of Greg Colaluca as General Manager. With more than 20 years of global leadership experience, Colaluca will guide the company into its next growth phase, emphasising the delivery of intelligent security solutions for mission-critical environments. Colaluca brings a wealth of experience in customer success, growth, profitability, and operational excellence. He leverages vision, analytics, and continuous process improvement to develop successful business models and plans, and his technical background and business development skills ensure focused sales, product development, and service delivery. Delivering innovative technologies “Greg’s experience and proven track record in global leadership and customer-focused solutions will drive a continued focus on market leadership and innovation,” said Becky Stout, Volaris. “We are confident in his ability to lead the company with his extensive experience in delivering innovative technologies, his proven history of program development, and his unwavering commitment to the organisation’s mission and values.” Prior roles of Colaluca Colaluca brings extensive experience to his new role as General Manager of Intellicene Colaluca brings extensive experience to his new role as General Manager of Intellicene. At Sensormatic, he led the Global Services team, providing solutions in design, RFID consulting, solutions design/architecture, implementation, and analytics. Before Sensormatic, he led Global Delivery at Astreya Partners, managing network engineering, network operations, and IoT services. At Hewlett Packard Enterprise, he served as Senior Director for the Consumer and Retail Industry, overseeing IT delivery across the Americas, EMEA, and APAC regions. Intelligence and stronger risk mitigation "Intellicene is well-positioned to deliver on its promise of helping organisations achieve greater intelligence and stronger risk mitigation in an evolving business environment,” Colaluca said. “Backed by a world-class team and a robust technology portfolio, I am excited to lead this organisation into its next era and help customers around the globe achieve safer and stronger operations.”
Allegion US, a pioneering provider of security solutions, technology and services, is excited to announce the launch of the Von Duprin 70 Series Exit Devices. This new product line combines the quality and trust associated with Von Duprin with a medium price point, making it an ideal choice for a wide range of applications including warehouse, industrial, office, multifamily, retail and hospitality spaces. The Von Duprin 70 Series Exit Devices are ANSI/BHMA Grade 1 certified, ensuring the highest standards of quality. The series offers both panic and fire-rated options that are available in both the 78 series wide stile and the 75 series narrow stile form factors. Rim, surface vertical rod and concealed vertical rod configurations are available for both the 78 and 75 series. Additionally, the 70 series offers a wide range of device lever designs and finishes that suite across the Von Duprin portfolio. Feature of the 70 Series Quick shipping is available for time-sensitive projects, allowing customers to meet their deadlines "The Von Duprin 70 Series Exit Devices serve as a testament to our commitment to delivering durable and high-performance solutions for a diverse range of applications," said Marli Williams, general manager of exits for Allegion US. "We are proud to offer customers the quality and trust they expect from Von Duprin at a medium price point." One standout feature of the 70 Series is the Quiet Electric Latch Retraction (QEL) option, which provides electronic control of an exit device with limited operational noise. This option is particularly beneficial in environments where noise reduction is desired. Furthermore, quick shipping is available for time-sensitive projects, allowing customers to meet their deadlines without compromising on quality. Von Duprin family of products In terms of aesthetics, the 70 Series boasts a modern look with harder lines, perfectly complementing the existing Von Duprin family of products. This enables customers to seamlessly incorporate a blend of premium and mid-priced exit devices in their projects, creating a visually captivating and economically sensible space. Von Duprin's commitment to excellence extends beyond the product itself. Supported by a team of experts well-versed in door hardware applications and code compliance, Von Duprin provides unmatched customer support. From expert advice and architectural consulting to specification writing, code and compliance coordination, safety and security consulting, technical support, and training, Von Duprin ensures that customers have the resources they need every step of the way.
Across Europe, security services are on high alert to a potential increase in subversive attacks, following a spate of arson and sabotage strikes on infrastructure and businesses in the Baltics, Germany and the UK. Recent examples include a fire at a homeware store in Lithuania in May, which the Polish Prime Minister suggested may have been started by a foreign saboteur; investigators alleged an arson attack in London showed signs of overseas involvement; an inferno destroyed Poland’s biggest shopping mall and attempted sabotage on a military facility in Germany. G4S’s first-ever World Security Report The threat from subversives is on the increase with almost half (44%) of European Chief Security Officers (CSOs) expecting to be impacted by this group, up from a third in the previous year. 447 CSOs were surveyed in Europe for G4S’s first-ever World Security Report, which surveyed 1,775 CSOs in 30 countries globally. CSOs from Austria were the most concerned in Europe about being impacted (60%). 447 CSOs were surveyed in Europe for G4S’s first-ever World Security Report Noah Price, G4S Academy International Director, said: "The anticipated rise in subversive threats across Europe signifies a critical juncture for corporate security. These threats are becoming increasingly more prevalent, so businesses must adopt a proactive and comprehensive approach to safeguard their operations and assets. Businesses must invest in physical security measures such as AI-enabled surveillance systems, fire suppression systems, and multi-layered access controls. This should be done in conjunction with cybersecurity measures and fostering a work culture of vigilance and security awareness." What businesses need to do to reduce the threat Companies of all sizes can play a crucial role in preventing subversive threats against their organisation, and securing their country’s national infrastructure. Tips include: Enhancing Cybersecurity Infrastructure: Invest in advanced cybersecurity technologies and ensure systems are regularly updated to protect against the latest threats. Implement multi-factor authentication, encryption, and regular security audits. Physical Security Enhancements: In addition to cybersecurity, enhance physical security measures such as surveillance, access controls, and secure facilities to protect against sabotage and espionage. Employee Training and Awareness: Conduct regular training sessions to educate employees about the latest security threats, phishing schemes, and safe online practices. Awareness is the first line of defence against subversive activities. Incident Response Planning: Develop and maintain a robust incident response plan. This should include procedures for identifying, containing, and mitigating security breaches, as well as communication strategies for internal and external stakeholders. Regular Risk Assessments: Conduct regular risk assessments to identify potential vulnerabilities and implement appropriate mitigation strategies. This should cover both physical and digital assets. Supply Chain Security: Ensure that third-party vendors and suppliers adhere to stringent security standards. A compromised supplier can be a weak link that exposes the organisation to subversive threats. Collaborate with Security Experts: Engage with security experts and participate in information-sharing networks. Collaboration with industry peers and security experts can provide valuable insights and enhance threat detection and response capabilities. Concluding, Price said: “Proactively incorporating as many of the above physical and cyber security measures will deter saboteurs and threat actors before they strike. A preventative approach is the best approach and one that all organisations must look to foster.”
Expert commentary
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint method have made it among the most widely used for biometric authentication across industry sectors ranging from banking and finance, retail, and healthcare, to government and law enforcement. It performs biometric technology’s “something you are” function while offering unique characteristics that make it particularly valuable for many applications. Unique identifier The fingerprint biometric has the permanency of being reasonably stable and consistent over time Among these characteristics is the pervasiveness and special nature of the fingerprint -- almost everyone has one, and each is a unique identifier. The fingerprint biometric has the permanency of being reasonably stable and consistent over time. It is also easy to acquire, measure, and process. High adoption rate Another key attribute of a fingerprint biometric is its ability to be protected against threats ranging from abuse and misuse to theft, imitation, and substitution. When it is used with recognition techniques the resulting solution performs with a combination of accuracy, speed, scalability, and ease of use. Fingerprint biometric solutions also have the highest adoption rate among biometric authentication solutions according to an industry report published by Payments Journal. Three interrelated components There are three basic components in any fingerprint biometric system as shown in Figure 1: capture (using a sensor that can capture even the most difficult finger types); liveness detection (using the Presentation Attack Detection – or PAD – technique); and matching (including preventing rejection of a legitimate user). Biometric algorithm The sensor captures and pre-processes the fingerprint data. It must be able to successfully capture fingerprint images for a range of skin types and print conditions under diverse temperatures, humidity, light, surface oil, dust, dirt, and other environmental conditions. A biometric algorithm then extracts minutiae data about the fingerprint ridges (endings, bifurcations, islands, etc.) and their orientation and position. PAD technique Implementing a presentation attack detection (PAD) technique at this stage activates the fingerprint biometric system’s second key element: liveness detection. This verifies the fingerprint’s authenticity and that it belongs to a living person. The system’s third element – matching – occurs after the PAD-verified fingerprint dataset has been securely stored as a record, known as a template, inside an enclave with cryptographic protection. Check for liveness The corresponding template of the legitimate user is then retrieved from secure storage When the fingerprint is presented for matching, it is rechecked for liveness. The corresponding template of the legitimate user is then retrieved from secure storage and the process of matching the fingerprint with this template is executed. This must be completed accurately and without rejecting a legitimate user. Types of fingerprint sensing technologies There are four prevailing categories of sensing technologies used with fingerprint readers: optical, capacitive, thin-film transistor (TFT), and multispectral imaging (MSI). Optical and capacitive method Optical is the most mature sensor technology and offers the benefits of a compact size, good capture Optical is the most mature sensor technology, and offers the benefits of a compact size, good capture and matching performance, a small enough size to fit in most desktop environments or shared workstations, and a high level of accuracy at a cost-effective price point across all use cases. The capacitive method, on the other hand, is less prone to fake finger attempts while also offering a thin and compact size for space-limited applications, the power efficiency to support battery-operated devices, and the ability to handle both indoor and outdoor lighting conditions. TFT technology The third technology goes a step further in capture accuracy. TFT technology can accurately recognise the smallest fingerprint features with ultra-high resolution and is used either as a larger-size matrix capacitive proximity detector (capacitive fingerprint sensor) or a larger-area matrix light detector (optical fingerprint sensor). It is ideal for in-the-field mobile identification applications that require a cost-effective, ultra-slim, and lightweight solution with low power consumption. MSI technology MSI technology differs from all three approaches, projecting multiple colors of light into the finger from different angles to collect both surface and subsurface biometrics data. It captures the most difficult fingerprints of diverse demographics, in a wide range of challenging environments. HID has used this patented technology in fingerprint readers that are compliant with ISO 30107-3 PAD Level 2 for advanced anti-spoofing against fraud. The technology also improves matching and offers sophisticated endpoint security that prohibits cyber criminals from gaining unauthorised access to networks by turning fingerprint readers into secure endpoints. Best practices for technology selection Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership. There are three top considerations: security, suitability, and usability. Each is important and the best approach is to strike a balance between all three. Following are the questions to ask during the selection process: Security: What is the regulatory environment? Financial and government services, healthcare, and law enforcement are some examples of highly regulated sectors with elevated security compliance requirements. Are there mandates in place for advanced capturing and biometric authentication specifications? How important is it to ensure anti-spoofing through liveness detection? Will endpoint security be required so that, if the fingerprint device is hacked, no network, system, or data behind the firewall will be impacted? Suitability: Where will the biometric technology be implemented? There will be additional considerations if it is to be embedded in portable, battery-operated devices that require low power consumption. Where will the technology be used? Will it need to fit into small spaces or be used in challenging indoor or outdoor conditions and environments? Will durability be important? Some deployments will face unpredictable weather and difficult lighting conditions for image capture. Will the technology be used for mission-critical border control or a more common – and less demanding -- commercial use? Usability Is it critical that the technology easily and consistently perform capture and matching? Will there be high volumes of fingerprint captures and matches? Is “friction frustration” a concern? If so, the solution must perform matching quickly and accurately to sustain high levels of user productivity. Will the fingerprint device be used by one person exclusively, or multiple people in a shared workstation setting? How diverse is the user population? Some readers are designed to handle all types of fingerprints and diversified demographics. Different applications Fingerprint biometrics is a proven solution to address real-world challenges, each with its requirements The answers to these questions will help determine the best choice of fingerprint technology. Different applications apply fingerprint biometrics to very different use cases but in all cases. It is a proven solution to address real-world challenges, each with its requirements. For instance, in a healthcare clinician’s terminal area or a similar shared environment with limited space, a durable, low-profile capacitive sensor may be the right answer. For an organisation in a highly regulated, mission-critical environment like a bank or border control agency, advanced technologies such as MSI readers may be needed to avoid the serious repercussions of a spoofed identity or the rejection of a legitimate one. Requirements for a biometric solution These are just a few of the requirements to consider when choosing a fingerprint solution. In banking and finance, alone, fingerprint biometrics is used for applications ranging from transacting at the ATM to customer onboarding (eKYC), compliance (AML/KYC), and fraud prevention. The retail sector adds even more, including age verification, loss prevention, point of sale (POS) security, self-service checkout, and secure time and attendance. Law enforcement organisations have their unique requirements, using fingerprint biometrics for background checks, criminal booking, crime investigation, inmate management, mobile identification, and more. For government agencies, typical applications include benefits distribution, border security, citizen ID, employ authentication (SSO/MFA), and voter registration. Each application requires a thorough assessment of the best fingerprint technology for the job. The right touch The right solution will deliver the optimal balance of security, suitability, and usability Fingerprint biometric solutions empower a wide range of use cases with the simple touch of a finger. The right solution will deliver the optimal balance of security, suitability, and usability based on an analysis of criteria including specific application requirements, the characteristics and size of the user population, and challenges posed by environmental conditions. Accuracy, efficiency, and security The world faces increasingly dangerous fraud, account takeover, and impersonation threats. As industries and enterprises work to improve and evolve their identity and access strategies to combat these threats, fingerprint biometrics continue to prove their value through solutions that meet the key selection criteria while delivering the highest levels of accuracy, efficiency, and security.
With the rise of organised retail crime (ORC) making headlines, retailers are grappling with the dual challenge of safeguarding both their staff and store assets, while addressing the economic pressures that impact profitability and consumer demand. RFID technology The key lies in identifying effective solutions to counter the current surge in ORC, enabling retailers to secure their vulnerable staff and protect inventory for paying customers. Technology plays a crucial role in supporting brands on this mission, with RFID technology continuing to be a valuable solution. It aids retailers in gaining better control over retail crime, leveraging inventory data. The ongoing surge in retail crime Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector Seen as a global issue, the British Retail Consortium recently reported that incidents of theft have increased by 27% across 10 of the largest cities in the UK, with some cities reporting up to a 68% increase. In the US, retailer Target reported an inventory loss of $500 million for 2023, amounting to a 100-basis point hit to gross margins in 2023. The current surge in theft is not attributed to a singular cause. Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector. Lack of preventive measures A significant contributing factor is the lack of sufficient preventive measures by law enforcement, which in some cases has led to a rise in more severe incidents. However, the implementation of technologies like RFID allows retailers to efficiently build cases against criminals, putting them in a stronger position when it comes to reporting thefts. Not all retail crimes are orchestrated by large entities or executed through sophisticated methods. Some stores have seen a reduction in staff numbers and, as a result, there are fewer people on the shop floor, making it easier for shoplifters to carry out their activities unnoticed. The true impact of retail crime Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey The impact of retail crime on businesses extends beyond financial and economic consequences; it has also led to a surge in violence against retail staff, an ongoing trend elevated by the pandemic. Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey conducted by the National Retail Federation. This escalation in violence not only results in immediate repercussions but also contributes to long-term mental health issues for staff, fostering an atmosphere of insecurity that has compelled some retailers to close their physical stores. Policy implementation Given the challenge of staff retention across various businesses, addressing retail crime becomes an even more urgent matter. Additionally, retailers are wary of their employees facing potential danger and the prospect of legal action. Consequently, many have implemented policies prohibiting employees from actively intervening when confronted with shoplifters. Privacy concerns with facial recognition Retail crime also affects customers, as businesses seek to offset losses by raising prices Retail crime also affects customers, as businesses seek to offset losses by raising prices, further burdening financially strained consumers. The presence of visible security systems not only makes stores more hostile but also diminishes the overall customer experience. While facial recognition technology is considered a potential solution, privacy concerns have emerged in its various applications. Today’s problems, yesterday’s solutions Retailers are resorting to historic measures such as steel cables, physical monitoring, or plastic screens to resolve customer issues. However, the reality is that these solutions are unfit for solving the problem, causing friction for both customers and staff. Digital solutions The newer approach involves equipping retail staff with body cams and providing new training The newer approach involves equipping retail staff with body cams and providing new training to deter shoplifters. Some stores are even offering the police discounted food and beverages to encourage their presence. The responsibility lies with management teams to seek effective solutions. In an era dominated by data and technology, retailers must shift their focus from traditional security methods to digital solutions that align with the challenges of today’s society and modern retail environments. Shrinkage When discussing theft or organised retail crime, retailers commonly use the term "shrinkage," referring to not only theft but the broader issue of lost inventory. Additional drivers of shrinkage include damage, fraud, and internal theft. A significant problem arises as losses are often based on guesswork and estimates rather than concrete numbers. Retailers may lack a comprehensive understanding of their inventories, further increasing the issue of shrinkage. Combating shrinkage Utilising RFID technology notably helps in boosting inventory accuracy Some retailers still struggle with limited knowledge of the whereabouts of items, a challenge heightened by the issue of shrinkage. Utilising RFID technology notably helps in boosting inventory accuracy. This enhancement enables retailers to obtain a clearer understanding of their inventory and the precise locations of items. Comprehensive strategy Changes in the in-store experience have highlighted the relevance of RFID, especially as self-service checkouts encounter double the shrinkage levels compared to traditional checkout stores. To combat retail theft effectively, a comprehensive strategy should involve the integration of labels, deactivation, electronic article surveillance, and data analytics. This combination works synergistically to reduce shrinkage and enhance product availability. Retail data analytics platforms RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors Linking hardware to an underlying data analytics platform empowers retailers to make more informed decisions. Retail data analytics platforms delve into alarms, deactivations, and visitor metrics, providing a deeper understanding of theft patterns. RFID technology drives efficiency by pinpointing frequently stolen items, allowing for the identification of theft patterns. In instances of flash mobs in major metropolitan areas, RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors and incoming customers. Real-time optimisation The crucial question remains whether both shoppers and retailers are prepared to shoulder the responsibility for these additional precautions. Nevertheless, these changes leverage data more effectively, optimising loss prevention strategies almost in real-time rather than relying on biannual inventory counts, therefore transitioning from static to dynamic loss prevention. Holistic approach Striking a balance between security measures and providing a seamless shopping experience is key In a retail environment, not all items require protection, and prioritising the safeguarding of the most frequently stolen and valuable items can significantly impact shrinkage. A holistic approach to retail theft is imperative, considering the entire journey of an item through the retail environment. Striking a balance between security measures and providing a seamless shopping experience is key. Protection without hindrance As stores move towards being checkout-free, retail criminals (or ORC gangs) will be presented with lucrative opportunities to steal, so retailers need to be one step ahead by introducing unobtrusive and effective technology solutions. For example, case building can be improved with item-level data. RFID data offers a more precise means of assessing the value of stolen items compared to relying solely on CCTV. It provides detailed insights into the specific items removed from the store and the timing of these incidents. This proves beneficial in tracking repeat offenders. Increased visibility with a proactive approach The modern retail environment continues to evolve and criminals are never far behind. RFID technology plays a crucial role in minimising shrinkage by enhancing inventory visibility. Moreover, it leverages the power of data to stay ahead, enabling better predictions of retail crime and the formulation of prevention strategies. This proactive approach allows for the implementation of more tailored solutions to alter outcomes positively.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town centre stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behaviour also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorised access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimise this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorised entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
Security beat
Companies at GSX 2023 emphasised new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasises ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the mid-market to the cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for the pure cloud, but there are benefits to be realised from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realise the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘soft’ features for integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organisation more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organisation more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centres around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasising performance, protection (cybersecurity), and price, their data centres are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring centre where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanisation, and the growing expectations of commuters and governments are pressuring transit industry players to modernise. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organisations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organisations looking to drive higher productivity and profitability margins should consider security upgrades that prioritise integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organised retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetise theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organisations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimising overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
The Global Security Exchange (GSX 2022) in Atlanta in September 2022 is the latest example of the energetic post-COVID resurgence of security trade shows. On the vibrant show flow, discussions centered on topics such as the security industry’s need for more employees and the lingering impact of a months-long supply chain crisis. Against a backdrop of continuing industry challenges, exhibitors and attendees were diverted by a wealth of new opportunities as the industry rebounded. Several major players had big product announcements at GSX 2022 in Atlanta. Manufacturers unveil the latest technology The big news at Genetec was “5.11.” That’s the newest version of Security Center, which is “all in,” i.e., providing everything Genetec offers in a single “unified” platform. The unified approach streamlines the process for systems integrators, makes quotes easier, and adds value for customers. Standard, Pro, and Enterprise versions provide video, access, and LPR “right out of the box.” Genetec is also launching a new web and mobile client for the “next generation operator.” Paid intern programme Kyle Hurt says the security industry’s biggest challenge is attracting personnel Kyle Hurt, Genetec’s Senior Sales Director, North America, says the security industry’s biggest challenge is attracting personnel (even more challenging that the supply chain.) Genetec’s response is a robust paid intern programme, welcoming 120 interns into various departments for a full semester. The programme helps to feed Genetec’s need for new talent. “You can’t coach passion,” said Hurt. WiseNet Edge Hanwha Techwin introduced a “serverless camera” at GSX 2022, named the WiseNet Edge. It is a video camera with a built-in solid-state hard drive for storage. The camera can store its own video and take in other camera feeds. In effect, it operates like an NVR but is less expensive and with an internal solid-state drive. Video can be viewed through a cloud browser, and Hanwha’s WAVE software, loaded on the camera, enables the management of several cameras at a site. High-res video is stored inside the camera, and any information can be shared with the cloud according to the needs of the application. i-PRO Mini i-PRO launches its own Video Insight video management system and MonitorCast access control i-PRO has fully transitioned away from Panasonic and is charting its own ambitious future path. Seeking to be “bold, trusted, and flexible,” the company is releasing a raft of new products, filling in previous gaps in the line, and bringing forward new innovations, including a full complement of AI. In addition to hardware, they have their own Video Insight video management system and MonitorCast access control, which was part of the Video Insight acquisition in 2015. An i-PRO Mini is a tiny camera, smaller than a smartphone. All cameras are NDAA compliant. People are coming together “The show has been phenomenal,” said Josh Letourneau, Chief Commercial Officer, Prosegur USA. “It’s very nice to see that people are coming back. After the pandemic, we are finally in a position of coming together. Lots of organisations are coming to see us.” Intelligence-led risk management Prosegur is a global company looking to expand aggressively in the United States, creating multiple “metropolitan service areas,” where the company’s fully integrated offerings are available. What makes the company unique is its “intelligence-led risk management,” says Josh Letourneau, adding “It’s more than AI, it’s about human intelligence, too." Prosegur sees evolution and growth opportunities in the U.S. market. “We are one of the largest companies no one has heard of,” adds Letourneau. “The show seems as back to normal as possible,” said Keith Bobrosky, President of Delta Scientific, who attended the show although his company did not exhibit, adding “There seems to be a generally positive spirit about the show this year.” Physical security protocols Bobrosky sees data centres as the next big market for his company’s vehicle barriers Bobrosky’s company has worked aggressively to avoid the impact of supply chain issues, ordering plenty of extra inventory to avoid the possibility of a part running out of stock. “We got ahead of it and are past the worst of it,” he said. Bobrosky sees data centres as the next big market for his company’s vehicle barriers. “The government will mandate physical security protocols for cybersecurity locations because they house data that affects national security,” he says. Robots and indoor drones ADT Commercial highlighted robots and indoor drones for security apps at their booth. The newest versions of the humanlike robots offer extra padding, more fluid movement, and 360-degree viewing for a better virtual reality (VR) experience, including better peripheral vision. Robots can operate for four hours without a charge and “know” when to return to the charger (to “top off” every hour). Fully autonomous indoor drones can also replace guards, flying near the ceiling and generally after business hours. The use of either robots or drones can lower costs when compared to hiring human guards. Varied uses for canines in security Glen Kucera, Chief Executive Officer, MSA Security, highlighted the capabilities of canines for explosives and firearms detection. “People don’t realise the flexibility of what they can do,” he said. Kucera says canines provide a sophisticated solution to address the escalating active shooter and criminal threat. MSA Security was acquired last year by Allied Universal, adding to the company’s varied offerings for threat detection and management. Rather than individual products, Allied Universal’s emphasis at the show was on bringing solutions together. Their message: Risk is multi-dimensional and different from one client to the next. Access control Access control needs to develop more modern interfaces to compete with new technology companies AMAG’s news at the show included a new president, David Sullivan, who highlighted AMAG’s role as one of the “last independent access control companies.” He said, “The beauty of AMAG is its installed base and loyal integrator channel.” Sullivan sees changing trends in how office space is managed in the wake of the pandemic. More workplace management applications will emerge, with one of the elements being access control. Access control also needs to develop more modern interfaces to compete with new technology companies entering the market. An encouraging sign is that AMAG had its best year ever in 2021. Orion Entrance Control Orion Entrance Control showed off one of its modern new turnstiles at the RealNetworks/SAFR booth at GSX 2022. The turnstile incorporates an access control module from Elatec to update and expand card reader functionality. Using the module streamlines Orion’s processes and avoids having to update a customer’s readers individually. The turnstile at GSX also incorporated a facial recognition system from SAFR, which could be used instead of, or in addition to, the access control reader. Balancing the cloud and on-premise systems Salient Systems is looking to balance the use of on-premise and cloud systems and emphasise data instead of video. Rather than a single market, Salient sees security as a variety of smaller markets, each focused on different needs. Salient’s customers are typically larger and have multi-site deployments with thousands of cameras. On-premise systems appeal here because they offer an element of control. Open-platform APIs Internal teams at customer sites are seeking out and finding new ways to leverage the data from video systems “People have a keen interest in control and ownership of their data,” says Sanjay Challa, Chief Product Officer, Salient Systems. Internal teams at customer sites are seeking out and finding new ways to leverage the data from video systems, and some of the uses fall outside the traditional “security” market. Open-platform application programming interfaces (APIs) enable more integration with various systems, and broader applications enable customers to leverage budgets from other stakeholders in an organisation. Add-on services “They’re unwilling to shift the entire solution to the cloud, but they want to leverage cloud technologies,” says Challa. For Salient, a cloud system provides remote access to monitor and service video installation remotely. “We enable the integrator to reach into your system to provide a higher level of service,” says Sanjay Challa. He concludes, “Our add-on services bring the best of the cloud to on-premise systems, and integrators don’t have to roll a truck to solve a problem with the system. We are focused on helping integrators succeed.”
Case studies
With an impressive 259 charging points and locally generated solar power to charge vehicles, Merklingen train station is the world’s largest e-car charging park. Situated between the cities of Stuttgart and Ulm, Merklingen was inaugurated in December 2022. The new train station serves approximately 1000 to 1300 passengers daily. It has benefitted local hospitality, retail, and tourism since it opened with the state Ministry of Transport calculating that it will eventually generate an annual economic benefit of 4.8 million euros for the region. GDPR perspective As a transport hub for the local municipality of Merklingen, it is important that visitors feel safe and operations run smoothly. Because of this, the management team of the Zweckverband Schwäbische Alb contacted Reif GmbH looking for a new, intuitive video system that was futureproofed and could support the management of the station’s innovative e-car charging park. The customer also wanted an easy-to-use VMS to help with daily operations Existing systems on the market did not meet the customer’s requirements, specifically National Defence Authorisation Act (NDAA) compliance which was important from a GDPR perspective. The customer also wanted an easy-to-use video management system (VMS) to help with daily operations and with event investigations. A new intuitive video system Hanwha Vision was chosen thanks to its intuitive WAVE VMS, NDAA compliance, open platform, and camera features. As a Diamond Partner, Reif GmbH was also able to offer a five-year warranty on the Hanwha Vision cameras. In total, 37 cameras are installed around the station’s car park along with WAVE VMS enabling continuous monitoring of the building and surrounding locations. The cameras include the QNO-8080R, a 5MP Network IR Bullet Camera, a TID-600R Intercom and the XNO-9082R, a 4K IR Bullet Camera with the Wisenet7 chipset and powerful video analytics including directional detection, audio detection, shock detection, and face/upper body detection. The benefits of an open system The open platform also supports future expansion of the station video surveillance if needed Hanwha Vision’s open platform offered the flexibility and futureproofing needed by the operator team, notably in supporting an integration with a custom in-house AI parking control system that was developed in partnership with a regional software company. This system automates parking management removing the need for personnel to issue access, exit, and parking fees for the station car park. The open platform also supports future expansion of the station video surveillance if needed, or additional features and uses. Crucial evidence and insights The cameras work with the in-house parking management system to prevent unauthorised vehicles from entering the premises. They have also captured footage that was later used to investigate damage to property, helping operators to resolve such cases clearly and effectively with the video evidence. The XNO-9082R shows excellent performance in different lighting conditions thanks to Wisenet7 The XNO-9082R shows excellent performance in different lighting conditions thanks to Wisenet7, delivering clear images back to operators to help with situational awareness day and night. IK10 water and vandal protection was another selling point for the station team, as the cameras are all situated outdoors. Meeting GDPR requirements Hanwha Vision cameras are NDAA compliant, meeting the GDPR requirements for the station. No productive data is passed on to external third parties and the system can be operated completely on-premise to meet data protection regulations. Data can only be viewed by explicitly authorised individuals. Due to the WAVE VMS, maintenance staff can access the on-premise server in an emergency or malfunction with remote access through WAVE Mobile. “The performance and quality of Hanwha Vision cameras along with the open WAVE VMS that could work with the in-house AI parking management system made it the logical choice for the Merklingen station project,” explained Andreas Baumann, Managing Director at Reif GmbH.
Geekplus, the global pioneer in mobile robot and smart logistics solutions, has deployed the first Shelf-to-Person PopPick project in the Nordics for one of the biggest online pharmacy wholesalers in the region, Med24.dk. System Teknik partnered on the Denmark project, which includes three PopPick stations and 30 Shelf-to-Person robots, bringing a flexible solution to a region where fixed automation still dominates. "With the rise of e-commerce, Med24.dk had been struggling with huge sales growth coupled with fast delivery demands from customers in Denmark, Norway, Sweden searching for pharmacy, health and beauty products. Peak season events had also caused considerable strain to their operations," said Blond Shkodrani, channel partner manager for the Nordics at Geekplus. "Due to their overwhelming success, Med24.dk needed a modular, automated order fulfilment solution for fast, efficient order fulfilment." Order fulfilment challenges Shelf-to-Person takes goods of all sizes while removing the need for infrastructure investment The Geekplus modular Shelf-to-Person solution optimises warehouse operations using mobile robots to transport shelves. In a region where fixed and cubic solutions have been the trend during recent years, Shelf-to-Person handles goods of all sizes while removing the need for infrastructure investment, making it the most flexible response to order fulfilment challenges. PopPick workstations use two retrieval arms and four presentation locations to present pickers with multiple, moveable 78-tote racks at one time, resulting in an industry-pioneering throughput of 450 totes per hour. PopPick can store goods of all types and sizes; the solution is not limited to small pieces and improves ergonomics for workers while picking. It also takes up less space than traditional systems, so customers can use more stations without adding facility space. Mobile order fulfilment solutions "We are very pleased to invest in flooring robots from Geekplus," said Med24.dk CEO Nils Træholt. "We believe that this new and innovative technology can help us realise our growth ambitions, while maintaining good delivery times for the benefit of our customers." Morten Kirch, System Teknik's CSO, added: "Due to Med24.dk's growth, we are thrilled to be able to deliver a tailor-made, automated solution that matches their needs." Geekplus offers a suite of Goods-to-Person mobile order fulfilment solutions-the only comprehensive robotic offering controlled by a single software platform. "Through trusted partners like System Teknik, we're showing customers all over Europe that Geekplus truly is a one-stop shop for modular warehouse automation," Shkodrani said.
360 Vision Technology, the UK manufacturer of ruggedised HD, radar, and thermal PTZ imaging cameras, has been chosen to supply the camera surveillance technology for a historically important English Heritage site, at the Transit Shed, Exeter Quayside. Installed by Select Electrics and specified by Derek Maltby of Global MSC Security, the inclusion of additional CCTV was required to monitor the Exeter Quayside area, covering the canal side, shops, restaurants, bars, and attractions. Security and safety Kevin Tyrrell, CCTV Technical Manager for Select Electrics explains the requirement for an expansion to the current CCTV system, “With accessible funding granted from a successful Safer Streets 2 application, Exeter City Council looked to expand the surveillance coverage of the Quayside area and integrate it into the existing town centre CCTV network, for monitoring at the Exeter City Council control room." “Coverage was required to provide safety and security surveillance in an area that is popular with both locals and visitors. Additionally, as the Quayside includes a canal side, should coverage of the canal be required in an emergency, high-definition footage of any incident here would be advantageous.” High-definition images We required a camera that would provide reliable HD images but also one that would withstand high winds" With all these requirements considered and the tender bid successfully accepted by the council, Select Electrics was selected to implement the expansion of surveillance coverage. “To cope with the harsh conditions to be found at Exeter Quayside, we required a camera that would not only provide reliable high-definition images but also one that would withstand high winds and rain, that can combine to make a difficult operational environment for electronic equipment, such as a CCTV camera,” continues Kevin. Camera applications “We’ve enjoyed a long-term technical relationship with 360 Vision Technology for several years, having employed their camera technology in many varied applications, and based on this experience, we were confident in their ability to provide a camera that could satisfy our demanding requirements.” “Additionally, and further complicating matters regarding the installation of cameras, many parts of the Quayside area are historically important, such as the cobbled areas and streets, as well as the English Heritage-protected Transit Shed, which occupies a large part of the area.” Need for an alternative solution The logistical effects of installing traditional CCTV infrastructure were considered too disruptive and expensive" The centrepiece for many music, dance, and street theatre events held in the area, the Transit Shed is an open-plan building set on cast iron uprights, historically, used to store cargo unloaded from ships. “The historically important parts of the area could not be disturbed,” adds Derek Maltby. “The logistical effects of installing traditional CCTV infrastructure, such as fibre cabling under streets and a network of CCTV cameras on poles was considered too disruptive and prohibitively expensive so an alternative solution needed to be found.” Perfect line-of-sight “We have always had a great relationship with the research and development team at 360 Vision and this project was no different." "We had identified the Transit Shed as a possible location for the siting of a single PTZ camera, where it would have a perfect line-of-sight to all of the areas that required coverage on this project, but we knew that any camera mounted on, or near the Transit Shed would have to meet strict English Heritage requirements, including a specific body colour, to match the exact heritage hue of the Transit Shed, to blend within the historic architecture." Invictus TX wireless camera Very quickly, we determined a solution using the 360 Vision Invictus TX wireless camera" “We outlined the technical requirements and restrictions of the project to the team at 360 Vision and were delighted with their enthusiasm and technical understanding of the demanding requirements of this installation." "Very quickly, we determined a solution using the 360 Vision Invictus TX wireless camera but in a one-off specific colour, specifically matched to blend with the painted roof of the Transit Shed.” Key features of the camera With continuous rotation pan, unobstructed 360-degree view, and 160-degree tilt, the 360 Vision Invictus camera can deliver unhindered views to the control room and for night-time vision, is equipped with on-board LED white light technology. Considering camera performance, unlike many other camera products that utilise ‘belt-drive’ PTZ systems, Invictus incorporates ultra-reliable and extremely quiet Direct Drive mechanisms, resulting in consistent pre-set accuracy and long-term reliability for its installation at the Quayside. HD and ultra-low-light camera imaging The camera is designed to provide trouble-free service in harsh Quayside conditions The Invictus TX’s high-performance, ruggedised PTZ camera with full 1080P HD and ultra-low-light camera imaging technology, made it the perfect choice for deployment in this application. Supplied in a specific green Pantone reference, the camera is designed to provide years of trouble-free service in harsh Quayside conditions and provides comprehensive coverage of the area, at a fraction of the cost of multiple traditional units and associated traditional hard-wired transmission infrastructure. Day and night surveillance “In operation, system operators can instantly switch on the LED white light mounted onboard the Invictus camera, to illuminate the scene and inform people at the Quayside that they are being monitored, both for security and safety purposes, for example, if anyone falls into the water at the Quayside at night,” adds Dennis Cavanagh, Control room Operations Manager, Exeter City Council. “Since the 360 Vision Invictus TX camera has been added into the system, we have had many positive comments from residents and local businesses, complementing the non-invasive nature of the colour-matched camera in the historical surroundings and confirming the feelings of security the camera coverage now provides to the area both during the day and night.” Increase surveillance coverage The combined Invictus TX camera and integrated LED white light technology make it the perfect choice" The Invictus camera on the Transit Shed is part of a wider project to increase surveillance coverage and improve image quality across the Exeter CCTV network, with over 40 cameras already installed to either replace existing cameras or extend coverage to new areas, as part of a rolling programme of improvement made possible by funding from Safer Streets Fund. Jason Wyatt, National Account Manager at 360 Vision Technology says, “The combined Invictus TX camera and integrated LED white light technology makes it the perfect choice for the technically demanding environment at the Exeter Quayside." Surveillance upgrade "Invictus’ ultra-low light technology from 1/1.9’’ ULL sensors also delivers a brighter, crisper, and more defined colour images at night, for the ultimate performance at the Quayside." "We are proud to have delivered a bespoke Invictus camera version in a one-off colour, to enable use on the English Heritage protected Transit Shed, as part of an overall upgrade to the Exeter City Council city-wide CCTV network and its ongoing surveillance upgrade using 360 Vision’s Invictus cameras.”
A multinational corporation, headquartered in Mumbai, ranked among the Fortune 500, is sustained by an exceptional workforce exceeding 187,000 individuals from 100 different nationalities. The corporation is founded on the principles of creating value for stakeholders, with a history of over seven decades of responsible business practices. Need for a modernised solution Their enterprises have evolved into global pioneers in various sectors including metals, pulp and fiber, chemicals, textiles, carbon black, telecom, cement, financial services, fashion retail, and renewable energy. The financial services arm of this conglomerate, to expand its business, needed a well-crafted, modernised Telecom solution, thus bringing them to the forefront of Matrix. Conglomerate's challenges The Financial services arm of this multinational corporation in Mumbai was facing issues ranging from modernisation to optimisation of communication. The challenge of telecommunication without laying Telephone cables for their new office was prominent. An arrangement had also to be made for utilising existing PRI lines and modernising them to meet their demands for new establishment. To elaborate on their challenges: Adoption of modern communication with existing Infrastructure: Their investment in existing infrastructure needed protection, and a provision had to be made to modernise the communication using existing infrastructure. Scalability: They required a Telecom solution that was future-proof, that is, easily scalable to fulfill the needs of future applications. Additionally, it had to be ensured that the operations were flawless, especially during critical work hours. Requirement of modern phone features: They required advanced features like Global Abbreviated Dialing, Auto Redial, Call Pick Up, and Internal Call Restriction, to become efficient in day-to-day operations. Managing different protocols: Interface with existing and different telecom networks requires managing different protocols, which can be cumbersome, time, and energy-consuming. Stipulated Time-frame: The transition and modernisation, simultaneously, had to be completed within a stipulated time frame. Solution The solution was based on the prelude of utilising existing infrastructure and amalgamation of Matrix solutions Matrix Comsec in partnership with SMB Automation analysed the challenges of communications and crafted a Telecom solution that was the best fit. The solution offered was based on the prelude of utilising existing infrastructure and amalgamation of Matrix Telecom Solutions within a stipulated time frame. VoIP-based communication This included employing Embedded IP-PBX to empower VoIP-based communication, and simultaneously integrating VoIP-PRI Gateway that optimised the feasibility of communication and helped the firm become more efficient by terminating PRI lines. The Telecom solutions include: The Embedded IP-PBX, PRASAR UCS - SPARK200, enabled them up to 2100 IP users. Additionally, features like up to 550 Concurrent calls, Concurrent 21 Calls Tapping, etc. took them to a notch above through a uniquely crafted telecom solution. The VOIP-PRI gateway included SETU VTEP 2P, which comes with features of 125 SIP Trunks and 120 simultaneous calls. The gateway enabled them to terminate 8 Copper PRI lines and thus transition towards IP. The VARTA Extensions enabled them to access Real-time UC features like one-touch access to Extension numbers, Instant messaging, monitoring the Real-time status of employees, etc. The IP phones included SPARSH VP510E and SPARSH VP210. This came with features like an LCD Graphical display, Context-sensitive keys, Built-in 16 DSS Keys, Polyphonic ring tune, and more. Results and benefits The implemented Telecom solutions enabled them to reap the benefits of modern communication while also enabling them to make the best out of the existing infrastructure. Matrix engineered a Telecom solution with our Embedded IP - PBX, PRASAR UCS enabling them to transit towards wire-free and modern communications, addressing the challenge of telephone cabling. The VOIP-PRI gateway, SETU VTEP, provided much-needed Least-cost routing ensuring that the call is always placed on the most appropriate network resulting in the optimisation and feasibility of calls. Access to the gateway was secured through PIN Authentication, while Digest Authentication ensured verification and protection of user credentials during the authentication process. The Real-time UC features were provided in the form of soft IP extensions through the VARTA UC Client. A complete Collaboration solution was made possible through Laptop/Desktop extensions to work remotely. The IP desk phones helped provide advanced features like Call Pick up, Call Forward, Call Waiting, and Call Transfer along with an Intuitive interface, that enabled employees to become efficient while simultaneously, enhancing user experience.
An IDIS end-to-end retail branch network solution has been adopted across all of Konyalı Saat’s 40 store locations in Türkiye as well as at the pioneering retailer’s warehouse and workshop where high-value watches are repaired, serviced, and calibrated. Konyalı Saat is one of Türkiye’s pioneering independent retail chains in the luxury watches and jewellery sector, with 40 stores selling a wide selection of top brand Swiss-made timepieces, silver and gold accessories with precious gems as well as a range of designer sunglasses. POS integration Systems integrator Secom specified the powerful yet affordable IDIS solution to meet Konyalı Saat’s wide-ranging surveillance and business intelligence needs. Konyali Saat must centralised video control with POS integration and to develop new efficiencies To ensure that all their retail outlets were being run as optimally and securely as possible, Konyali Saat required centralised video management with point-of-sale (POS) integration and to develop new efficiencies using AI-powered video analytics integrated with their wider retail enterprise resource planning (ERP) software. The aim was to boost profitability from strengthened loss prevention as well as improving product management and marketing operations from video data. IDIS AI Box for Retail (DV-1304) Complete HD coverage of each store, without blind spots, was efficiently achieved using a single, NDAA-compliant 12MP IDIS Super Fisheye Camera, plus either one or two 2MP IDIS 2.8 mm fixed lens dome cameras, depending on each store’s layout. The fisheye provides comprehensive domain awareness, providing the same coverage as three or more fixed lens cameras, while the domes located at entrances capture video to support people counting and other analysis functions. These AI capabilities are provided by an IDIS AI Box for Retail (DV-1304), a powerful plug-in video analytics device that can transform IDIS surveillance solutions with functions including people counting, queue management, heat & zone mapping and occupancy monitoring. IDIS DR-2508P NDAA-compliant NVR Footage is recorded locally at each store on an 8-channel IDIS DR-2508P NDAA-compliant NVR An IDIS DP-HE1201 HDMI/VGA Encoder enables simple and cost-effective POS integration, with cash register data overlaid on video footage and time synched with all cameras, allowing suspicious activity or sales anomalies to be investigated quickly and easily while providing a time-stamped visual audit trail. The footage is recorded locally at each store on an 8-channel IDIS DR-2508P NDAA-compliant NVR, and the system is operated in each branch using the cost-free IDIS Centre VMS, as well as being controlled and managed centrally at Konyalı Saats’ headquarters with IDIS Solution Suite (ISS) Expert. IDIS end-to-end solution The IDIS end-to-end solution is allowing Konyalı Saat to analyse sales turnover and conversion rates with visitor numbers by day, month, and week, making it possible to increase boost sales by accurately evaluating store performance including marketing campaigns, product management and staff efficiency more accurately than ever before. IDIS technology is perfectly suited to the demands of high-end retail environments" Yunus Bürge, Information Technology Manager for Konyalı Saat, reports, “We have been deeply impressed with every aspect of the IDIS solution, from the quality and performance of the fisheye cameras to the added value provided by the AI Retail Box including simple integration of video data with our POS. IDIS technology is perfectly suited to the demands of high-end retail environments.” IDIS single source model The chain has recently extended its portfolio with Longines-branded stores, and the owner has ambitious plans to expand further, with four new outlets scheduled to be opened in the next half year and more to follow. Koray Ozyildirim, IDIS Türkiye Country Manager, added, “The project with Konyalı Saat demonstrates IDIS end-to-end solutions for retail can be tailored to meet the needs of stores and retail branch networks of any type and scale. The IDIS single source model gives retailers a choice of cost-effective surveillance technology to tackle challenges such as shrink and safety. Combined with integration options and highly accurate, AI-powered video analytics, we are giving retailers the ability to achieve a rapid return on investment and an enhanced customer experience that positively impacts the bottom line.”
An IDIS end-to-end retail branch network solution has been adopted across all Konyalı Saat’s 40 store locations in Türkiye as well as at the leading retailer’s warehouse and workshop where high-value watches are repaired, serviced, and calibrated. Konyalı Saat is one of Türkiye’s independent retail chains in the luxury watches and jewelry sector, with 40 stores selling a wide selection of top brand Swiss-made timepieces, silver and gold accessories with precious gems as well as a range of designer sunglasses. Affordable IDIS solution Systems integrator Secom specified the powerful yet affordable IDIS solution to meet Konyalı Saat’s wide-ranging surveillance and business intelligence needs. To ensure that all their retail outlets were being run as optimally and securely as possible, Konyali Saat required centralised video management with point-of-sale (POS) integration and to develop new efficiencies using AI-powered video analytics integrated with their wider retail enterprise resource planning (ERP) software. Improve profitability and product management Complete HD coverage of each store, without blind spots, was efficiently achieved The aim was to boost profitability from strengthened loss prevention as well as improving product management and marketing operations from video data. Complete HD coverage of each store, without blind spots, was efficiently achieved using a single, NDAA-compliant 12MP IDIS Super Fisheye Camera, plus either one or two 2MP IDIS 2.8mm fixed lens dome cameras, depending on each store’s layout. Comprehensive domain awareness The fisheye provides comprehensive domain awareness, providing the same coverage as three or more fixed lens cameras, while the domes located at entrances capture video to support people counting and other analysis functions. These AI capabilities are provided by an IDIS AI Box for Retail (DV-1304), a powerful plug-in video analytics device that can transform IDIS surveillance solutions with functions including people counting, queue management, heat & zone mapping, and occupancy monitoring. Simple and cost-effective POS integration The footage is recorded locally at each store on an 8-channel IDIS DR-2508P NDAA-compliant NVR An IDIS DP-HE1201 HDMI/VGA Encoder enables simple and cost-effective POS integration, with cash register data overlaid on video footage and time synched with all cameras, allowing suspicious activity or sales anomalies to be investigated quickly and easily while providing a time-stamped visual audit trail. The footage is recorded locally at each store on an 8-channel IDIS DR-2508P NDAA-compliant NVR, and the system is operated in each branch using the cost-free IDIS Center VMS, as well as being controlled and managed centrally at Konyalı Saats’ headquarters with IDIS Solution Suite (ISS) Expert. IDIS end-to-end solution The IDIS end-to-end solution is allowing Konyalı Saat to analyse sales turnover and conversion rates with visitor numbers by day, month, and week, making it possible to increase and boost sales by accurately evaluating store performance including marketing campaigns, product management, and staff efficiency more accurately than ever before. Yunus Bürge, Information Technology Manager for Konyalı Saat, reports, “We have been deeply impressed with every aspect of the IDIS solution, from the quality and performance of the fisheye cameras to the added value provided by the AI Retail Box including simple integration of video data with our POS." Tailored solution The project with Konyalı Saat demonstrates that IDIS end-to-end solutions for retail can be tailored" "IDIS technology is perfectly suited to the demands of high-end retail environments.” The chain has recently extended its portfolio with Longines-branded stores, and the owner has ambitious plans to expand further, with four new outlets scheduled to be opened in the next half year and more to follow. Koray Ozyildirim, IDIS Türkiye Country Manager, added, “The project with Konyalı Saat demonstrates IDIS end-to-end solutions for retail can be tailored to meet the needs of stores and retail branch networks of any type and scale." Cost-effective surveillance technology "The IDIS single source model gives retailers a choice of cost-effective surveillance technology to tackle challenges such as shrink and safety." "Combined with integration options and highly accurate, AI-powered video analytics, we are giving retailers the ability to achieve a rapid return on investment and an enhanced customer experience that positively impacts the bottom line.”
Round table discussion
Video storage has come a long way since rooms full of VCRs stored video from an entire system of cameras. Video storage equates to data storage, and there are multiple options ranging from hard disk storage to the cloud to storage on each individual camera using SD cards. Increasingly, cloud-based storage is an attractive option to store video footage conveniently and safely. We asked this week’s Expert Panel Roundtable: How is expansion of video storage capabilities impacting the security industry?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Products
Videos
Store security: Manufacturers & Suppliers
Honeywell GARD USB threat report 2024
DownloadThe role of artificial intelligence to transform video imaging
DownloadAccess control system planning phase 1
DownloadKey Findings from the 2024 Thales Cloud Security Study
DownloadFacial recognition
Download