Intruder detectors - Expert commentary

Reopening Doors: What Steps Should be Taken to Ensure Safety and Security?
Reopening Doors: What Steps Should be Taken to Ensure Safety and Security?

A total of £1.6 billion worth of goods are reported as ‘lost’ to in-store theft in supermarkets each year, with figures increasing steadily. The presence of self-checkout systems have increased in supermarkets, as well as other industry retailers. By 2021, we’re globally on track to have 468,000 self-checkout machines in operation, nearly double the 240,000 in existence since 2016. While this increase comes with such benefits as reduced wait times for customers and staff costs, it also comes with a risk of retail theft at self-checkouts. With the circumstances the world now finds itself in i.e. mass unemployment, financial uncertainty, the retail industry has seen an influx in these types of petty crimes, hitting retailers during an already turbulent period. While retailers are taking precautions to protect themselves and their patrons in this new era of in-person shopping, it’s important to ensure the business itself is protected. A popular method to combat these fears is to employ on-site security personnel, however, as we continue to adapt to new operating guidelines, retailers must begin thinking past the immediate future, and begin implementing long-term security solutions to prepare for life after lockdown such as strong CCTV systems with remote access. How has the security industry adapted its services to a post-lockdown world? Technological innovations like thermal recognition are key to adapting security systems for a post-lockdown world. Businesses which previously relied on facial recognition now must update their methods to account for shoppers wearing masks on-site and in-store. By 2021, we’re globally on track to have 468,000 self-checkout machines in operation, nearly double the 240,000 in existence since 2016 Biometric systems are now able to identify people with face masks, and thermal recognition such ADT’s Thermi-Scan system which can track human body temperature without the need for contact. Implementing these safe protocol procedures protect both employees and customers against virus outbreaks such as COVID-19. The need for these advances in video surveillance will reportedly increase the biometric facial recognition market by 14 per cent by 2027. Artificial intelligence has been hailed recently as the way forward for remote security needs, and while business-owners continue to navigate procedures of returning to work post-lockdown, having remote access to real-time security monitoring is essential now more than ever. What are the main measures stores can take to prevent or reduce theft? Strategically placing a multi-camera surveillance system to ensure clarity, eliminate blind spots, and deter thieves should be top priority. It’s equally essential to invest in a system which has an efficient playback program, particularly in situations where reviewing important footage efficiently can offer vital information to the police force. Advances in video surveillance will reportedly increase the biometric facial recognition market by 14 per cent by 2027 As business-owners continue operating at reduced hours and with limited on-site staff, being able to access camera footage quickly and remotely is a key factor to consider. Whether owners opt to receive an alert on a mobile device allowing them to review notifications, or if their system is monitored by a remote security center, it’s important to be able to access footage quickly for added efficiency and ease. Facial recognition and AI have been popular points of discussion in relation to security cameras and CCTV. While careful considerations must be taken prior to utilising any sort of facial recognition technology, including conducting a Privacy Impact Assessment, the benefits include being provided with real-time tracking of repeat offenders which immensely helps the prevention of in-store theft. Here are some key points to consider when choosing in-store surveillance: Assess your needs – To get the best out of your security system, it is essential to analyze what your requirements are for your business as they might have changed to adapt to a post-lockdown world Camera setup – With store layouts shifting to accommodate social distancing guidelines, it’s important to re-evaluate the current set-up of any security cameras. Depending on any layout updates, it might be important to consider operating multiple cameras in one area to ensure a peripheral view and eliminate any blind spots Camera positioning – For optimal performance, check that light sources are not obstructing your view such as glare from the sun. It is also worth considering the height at which cameras are installed to maximize surveillance Check the focus – It is worth testing camera lenses bi-monthly to ensure that lighting or weather hasn’t affected the focus of the lens, resulting in a blurry visual Remote access – As guidelines continue to evolve, ensure you’re able to access any necessary camera footage quickly and safely in case of emergency Will we begin to see a reduction of theft as new technology is implemented? We’re beginning to see incidents of shoplifting and theft being taken more seriously by law enforcement. In the coming months, for the first time in Britain nearly twenty shoplifters who were either caught red-handed or identified on CCTV will be appearing before magistrates. While currently these court cases are being pursued by a private police force, these actions come after a Government plea to high-level police to prosecute shoplifters stealing under £200. Retailers have long voiced concerns that forces have abandoned low-level thefts and these steps are small but show that businesses are being heard. As innovations in surveillance security continue, we’ll be seeing a move away from human involvement which will create a more reliable and efficient system able to rely on machine learning and analytics. While there have been wider strides made in utilising AI for surveillance, these are largely being used currently by local governments to alert police forces to threats of criminal activity. It’s not unreasonable to think that in the near future, these types of smart technology will be employed by private businesses to analyze suspicious behavior or possible theft. However, as we see an increase in the advancement of security technology, we anticipate that those inclined to commit in-store theft will adapt their methods, therefore retailers should look to regularly evaluate their security needs to keep risks at bay.

Wireless Technology Is Transforming Motion Detection
Wireless Technology Is Transforming Motion Detection

Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localization. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymized and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.

The Digital Transformation Of Modern Access Control Solutions
The Digital Transformation Of Modern Access Control Solutions

The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorization and the appropriate credentials. The access control business, like many industries before it, is undergoing its own digital transformation But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customized and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms powers continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.

Latest Touchless Biometric Systems (TBS) news

COVID-19 Worries Boost Prospects Of Touchless Biometric Systems
COVID-19 Worries Boost Prospects Of Touchless Biometric Systems

Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. Touchless biometric systems in demand The trend has translated into a sharp decline in purchase of touch modality and a sharp increase in the demand for touchless systems, says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Biometrics solutions are being affected unequally, depending on whether they involve touch sensing, he says. Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads “Users do not want to touch anything anymore,” says Zarrabi. “From our company’s experience, we see it as a huge catalyst for touchless suppliers. We have projects being accelerated for touchless demand and have closed a number of large contracts very fast. I’m sure it’s true for anyone who is supplying touchless solutions.” Biometric systems are also seeing the addition of thermal sensors to measure body temperature in addition to the other sensors driving the system. Fingerscans and hybrid face systems TBS offers 2D and 3D systems, including both fingerscans and hybrid face/iris systems to provide touchless identification at access control points. Contactless and hygienic, the 2D Eye system is a hybrid system that combines the convenience of facial technology with the higher security of iris recognition. The system recognises the face and then detects the iris from the face image and zeros in to scan the iris. The user experiences the system as any other face recognition system. The facial aspect quickens the process, and the iris scan heightens accuracy. TBS also offers the 2D Eye Thermo system that combines face, iris and temperature measurement using a thermal sensor module. TBS's 2D Eye Thermo system combines face, iris and temperature measurement using a thermal sensor module Another TBS system is a 3D Touchless Fingerscan system that provides accuracy and tolerance, anti-spoofing, and is resilient to water, oil, dust and dirt. The 2D+ Multispectral for fingerprints combines 2D sensing with “multispectral” subsurface identification, which is resilient to contaminants and can read fingerprints that are oily, wet, dry or damaged – or even through a latex glove. In addition, the 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue. The system fills the market gap for consent-based true on-the-fly systems, says Zarrabi. The system captures properties of the hand and has applications in the COVID environment, he says. The higher accuracy and security ratings are suitable for critical infrastructure applications, and there is no contact; the system is fully hygienic. Integration with access control systems Integration of TBS biometrics with a variety of third-party access control systems is easy. A “middleware” subsystem is connected to the network. Readers are connected to the subsystem and also to the corporate access control system. An interface with the TBS subsystem coordinates with the access control system. For example, a thermal camera used as part of the biometric reader can override the green light of the access control system if a high temperature (suggesting COVID-19 infection, for example) is detected. The enrollment process is convenient and flexible and can occur at an enrollment station or at an administration desk. Remote enrollment can also be accomplished using images from a CCTV camera. All templates are encrypted. Remotely enrolled employees can have access to any location they need within minutes. The 3D+ system by TBS provides frictionless, no-contact readings even for people going through the system in a queue Although there are other touchless technologies available, they cannot effectively replace biometrics, says Zarrabi. For example, a centrally managed system that uses a Bluetooth signal from a smart phone could provide convenience, is “touchless,” and could suffice for some sites. However, the system only confirms the presence and “identity” of a smart phone – not the person who should be carrying it. “There has been a lot of curiosity about touchless, but this change is strong, and there is fear of a possible second wave of COVID-19 or a return in two or three years,” says Zarrabi. “We really are seeing customers seriously shifting to touchless.”

IFSEC 2017: Collaboration And Customer-centric Solutions Stand Out
IFSEC 2017: Collaboration And Customer-centric Solutions Stand Out

With global events putting security at the forefront of everyone’s minds, IFSEC International 2017 was a chance for the industry to come out in force. Over 600 exhibitors and numerous seminars kept visitors informed on the latest innovations in security products, solutions and best practice. Despite the challenging heatwave, exhibitors were raring to go for the three mercifully air-conditioned days of the exhibition. SourceSecurity.com took to the show floor to check out what exhibitors were talking about. [Pictured: Nedap Security Management welcomes new Managing Director Fokko van der Zee] Increasing ROI in vertical markets Sustainable partnerships overtake integrations Power in the hands of the customer Adding Value In Vertical Markets The big question for many exhibitors was how to stand out on a show floor (and in a market) dominated by larger commoditized brands. Manufacturers rose to the challenge by deliberately positioning themselves as solutions providers within specific vertical markets, rather than trying to compete on low cost products. For Vivotek, the Taiwanese IP surveillance specialists, the emphasis was on adding value in particular markets such as transport and retail. Alongside a lineup of 180° and 360° solutions, the manufacturer debuted its 12-megapixel fisheye camera, FE9391-EV, whose 360° lens technology makes it ideal for crowd detection and loitering-time analysis in the retail sector, in addition to traditional security applications. Vivotek’s vertical market focus was further reinforced by demonstrations of its integrations with SeeTec and Wavestore. This collaboration forms part of the company’s Solution Integration Alliance program, which aims to create better end-user solutions through integration of Vivotek products with partner technologies. Collaborating On Technology And Customer Support This was a theme which resonated across the show floor. The Promise Technology stand firmly emphasized collaboration, with presentations from the storage provider’s IP camera partners including IronYun and Axis Communications. Particular importance was given to education and training for partners and end users to get the most out of integrated solutions. The emphasis for Promise Technology was on education and training for partners and end users Similarly, for Nedap Security Management, the increasing demand for connected systems means that open platform solutions are essential to excel within the security industry. As well as welcoming new Managing Director Fokko van der Zee, Nedap used its presence at the show to inform visitors about new and ongoing partnerships with key players in the industry. These partnerships include ASSA ABLOY, Touchless Biometric Systems and Milestone Systems. According to Jeroen Harmsen, Nedap’s Director of Product Management, the ability to provide collaborative solutions is becoming a key differentiator in the security sector and beyond. While many companies pursue product integrations, what makes sustainable partnerships stand out is ongoing cooperation on issues such as customer support. This, according to Harmsen, is why the deep integration of Milestone’s XProtect VMS and Nedap’s AEOS access control system has been so successful. Making Customers’ Lives Easier This insistence on customer service as a differentiating factor also extended to video surveillance manufacturers. However, not all exhibitors were aiming to achieve this through increased integration. Cisco Meraki, whose cloud-managed video system is relatively new to the security market, deliberately steers clear of the market trend for integration in favour of the ‘Apple’ approach, aiming to provide a comprehensive solution on one easy-to-use platform. The architecture is intended to make customers’ lives easier by removing the NVR from the equation - video is stored on the edge and managed via the cloud, eliminating the ongoing costs and maintenance associated with traditional hardware solutions. Eagle Eye Networks president Ken Francis was also hoping to highlight the benefits of customer-friendly cloud surveillance at the show. The acquisition of Panasonic's Cameramanager has allowed Eagle Eye Networks to cater to smaller businesses with cameras connected directly to the internet. The company’s cloud storage solution also includes Remote Power Cycling via an integrated PoE switch, allowing users to remotely repower cameras themselves with no training or expertise. Crucial to Eagle Eye Networks' customer-friendly outlook is the possession of its own local data centers worldwide, reducing cloud storage costs and allowing customers to choose where their video is stored. Making your security products stand out on a crowded show floor is no easy task, but IFSEC 2017 saw plenty of innovation from video surveillance, access control and intrusion providers alike. As competition increases, added value solutions, collaboration and ease-of-use are sure to help manufacturers make a splash at future shows!  

IFSEC 2017 Day 2: Exhibitors Shift Focus From Products To Solutions
IFSEC 2017 Day 2: Exhibitors Shift Focus From Products To Solutions

Exhibitors at this year’s IFSEC are thinking outside the box in terms of how they communicate their value proposition and how they interface with customers. In the process, some are rethinking how big trade shows like IFSEC fit with their goals. Panasonic's approach to the 'race to the bottom' Thomas Lausten, MOBOTIX new CEO How Gallagher benefits from IFSEC without exhibiting Panasonic Systems Communications Europe Panasonic Systems Communications Europe is one of several companies emphasizing solutions at IFSEC rather than products. In Panasonic's case, the approach helps to explain why the company doesn't have a traditional trade show stand. Instead, Panasonic opted to sponsor sessions in the security management education theater on the show floor, and to host potential customers in a (quieter, cooler) meeting room upstairs. "We are inviting some of our key integrators for general business meetings in a relaxed environment, and offering two lunch-and-learn events about cybersecurity," says John Boyle, Panasonic's Country Manager for the UK and Ireland. There was standing-room only at the cybersecurity events, he adds. TBS specialises in 3D touchless biometrics and offers a full portfolio of fingerprint biometric technologies Compelling Value Proposition Trade shows seem historically to be about "here's our new box," Boyle observes. "We would rather talk to customers and channel partners about what issues they face, whether it's counting people or detecting scenes." Panasonic is creating solutions that combine their own technologies with third party partners filling in any gaps. "We are creating value propositions that we can take to integrators. They need a new story to tell their customers, not just a new box. Let's look at Panasonic's technology and how that adds value. If we have a compelling value proposition, we are giving our integrators an opportunity to get more business." Boyle acknowledges that the Panasonic approach is a way to bypass the price-focused "race to the bottom" that is lowering camera prices. "Pricing comes later if the value of a solution has already been established," he notes. Touchless Biometric Systems Philippe Niederhauser, Head of Sales and Marketing for Touchless Biometric Systems (TBS), Switzerland, is amazed at how many people come to IFSEC seemingly to browse around with little focus on what they need. "There are people who don't really know what they are looking for," he comments. "If I go to a trade show, I know exactly what I want." Niederhauser also sees some of his fellow exhibitors missing the boat in terms of marketing, tending to emphasize products rather than solutions. "Some people just put products out there, and they look similar; it is hard to differentiate," he says. "This is where you need to show a difference in products, and communicate the value proposition." TBS specializes in 3D touchless biometrics, and offers a full portfolio of fingerprint biometric technologies, also including 2D optical, 2D capacitative, and 2D multispectral systems. MOBOTIX Keeps Focus On Technology A challenge in Thomas Lausten's new position is to communicate the advantages of MOBOTIX more effectively to the market Trends at this year's show are a big emphasis on cybersecurity, more integrated systems and applications that extend beyond the traditional definition of security, says Thomas Lausten, who just joined MOBOTIX as the new CEO. Cybersecurity is a strong suit of MOBOTIX, given the German video company's unique platform, an approach Lausten describes as "a computer with a lens." He says a challenge in his new position is to communicate the advantages of MOBOTIX more effectively to the market and to achieve the company's unrealized potential. "I don't see Mobotix as a traditional camera manufacturer," he says. "There is a fundamental difference between launching a camera and having a core philosophy as a company. I have been tasked with [managing] a company with a potential to be re-defined. Our mission is to develop a more open source company, although still an end-to-end solution, and a company that looks at the industry in a different way." He says the industry can expect new camera and software releases as MOBOTIX keeps its focus on technology. Quality Communication Through Smaller Events Gallagher, a New Zealand-based access control and perimeter security manufacturer, is an example of a company that seeks to benefit from IFSEC without exhibiting at the show. Steve Bell, Gallagher's Chief Technology Officer, traveled thousands of miles to the show for the networking opportunities, and Gallagher hosted a channel partner event in the evening, leveraging the fact that others have traveled to the show. "Trade shows are expensive outlays," says Bell. "For our strategy, we like more focused events, getting smaller groups together. Sometimes the big trade shows aren't focused enough. The people we might want to communicate with only have a short time, and it's a noisy environment. We don't have the quality communication we'd like to have. Smaller events provide more quality time." With manufacturers looking for new ways to engage with customers and build their businesses, the role of trade shows like IFSEC will, of necessity, continue to evolve.  

Related white papers

Optimize Your Business with Analytics and AI