Everon - Experts & Thought Leaders

Latest Everon news & announcements

Everon Enhances Chemical Plant Emergency Response

Having an emergency response plan is essential for businesses of all sizes, across every industry. But in energy facilities, particularly those dealing with hazardous or explosive materials, it becomes a crucial, and often strictly regulated life safety requirement. In an emergency, not only is it critical to identify where all employees are located, but also that any visitors, contractors, or vendor partners are all accounted for and safely evacuated. When an alarm sounds, duty of care requirements and regulatory requirements dictate that companies have protocols in place to effectively respond to an emergency and know precisely who is on-site and that everyone can exit as quickly and safely as possible. Equally important is making sure that everyone at the facility is aware of and follows emergency guidelines. Challenge According to data compiled in the 2021 Guide to the Business of Chemistry from the American Chemistry Council, “Facilities in Texas and Louisiana produce 80 percent of the nation’s primary petrochemical supply, and Texas chemical production tops the nation by far, with chemical shipments valued at $117.5 billion, representing a major portion of the region’s economy, but also the potential for significant security risks and challenges.” Some petrochemical plants use a traditional, paper-based mustering solution for emergency response scenarios. These manual methods of notifying, mustering, and accounting for personnel can result in costly, potentially dangerous inefficiencies during an emergency. Site access control and visitor management processes are also typically stand-alone and do not communicate with each other, which forces manual processes to log and reconcile individuals when mustering during an emergency response evacuation or a required emergency drill. To do this, chemical plant security staff typically prints the logs from on-site access control and visitor management systems, then crosses off the names of individuals from the lists when they are accounted for manually. Each list is reconciled on its own and by hand. This outdated process can take hours to complete and holds a potentially high risk of error. Solution Everon is working with various Houston area petrochemical plants to update their emergency notification systems with innovative, cost-effective solutions. According to these customers, Everon provides comprehensive solutions to fit their needs, and maintains a level of professionalism and dedication to service excellence that other companies too often fail to meet. One solution Everon has proposed to combat this problem across chemical plant facilities consists of three integrated technologies that include: Cloud-Based Access Control: An access control system that is cloud-based may be easier to implement and have a lower cost of entry. This system provides a log of all badged personnel on site to the mustering system for accounting of personnel during an emergency. Visitor Management System: This system allows visitors to pre-register and be managed electronically when they come to the plant while providing visibility in case of an emergency. Mustering Software and Card Readers: These provide seamless management of emergency events, including electronic mustering, unit accountability, and ERT readiness. Access control logs from the cloud-based system With this solution, access control logs from the cloud-based system and visitor management logs can automatically tell plant operations how many people are on-site through the mustering software. A number of portable mustering units were commissioned with card readers, which allow for quick and easy confirmation of badge reads from fixed muster locations. In addition, warning lights and speakers were also added at plant entrances to alert personnel to emergency events.  The mustering system’s mustering software takes the information directly from the access control and visitor management logs and communicates directly with the plant operators. This allows them to manage the entire emergency using the software, starting with an accurate count of who is in the plant and then quickly and easily managing individuals as they safely exit. Emergency response events can be initiated with the click of a button and significantly improve the amount of time needed to accurately count the number of people evacuating the plant. Installations are consistently performed with personal safety in mind. Everon believes that no work is worth doing if it’s not done safely and in full compliance with governing regulations and standards. No recordable injuries or lost-time events were recorded during any of the projects completed by Everon at any Houston area petrochemical plants. Results According to one client, "Our previous method of pen and paper was very inefficient and antiquated. Everon's solution with our emergency response protocol gives us the cutting edge in technology. Not only does it allow us to become well-organized and systematic, but safer." Emergency response drills at each petrochemical plant are now completed in minutes, not hours, and emergency responders receive visual confirmation when everyone is confirmed as safe. The plants consider having digital reports of employees that are on- and off-site at the plant a major bonus, along with the ability to deploy mass notifications between the plant and local communities. Said another client, "We are extremely satisfied with our choice of Everon as our life safety partner and are currently working with them to update analog cameras in our plant, as well as advance our infrastructure to bring other innovative security, health and operational monitoring technology solutions to our facility."

BESS Safety In The Energy Storage Industry

As the world transitions to renewable energy, Battery Energy Storage Systems (BESSs) are helping meet the growing demand for reliable, yet decentralized power on a grid scale. These systems gather surplus energy from solar and wind sources, storing it in batteries for later discharge. This process helps stabilize the grid by ensuring a steady power supply and mitigating the variability associated with renewables. Excess daytime electricity from solar farms, for instance, can be stored at a BESS facility for use overnight. More than 90% of these grid-sized energy storage systems utilize lithium-ion batteries with spending for new facilities expected to grow at an annual rate of more than 30%, reaching $12.1 billion by 2025. Lithium-ion batteries offer higher energy density, faster charging and longer life than traditional batteries. Addressing BESS safety concerns Lithium-ion batteries in energy storage systems have distinct safety concerns that may present a serious fire hazard unless operators understand and address the risk proactively with holistic, advanced fire detection and prevention methods. Once a lithium-ion battery overheats in a BESS and the process of “thermal runaway” occurs, it can be nearly impossible to extinguish, potentially causing catastrophic damage and risking the lives of first responders called to put out the fire. Such an event occurred in April 2022 at a 10 MW storage facility in Chandler, AZ, where fire crews struggled to extinguish a blaze for four days. In 2019, a fire and explosion at an energy storage system in Surprise, AZ, near Phoenix, was triggered by an overheated lithium-ion battery injuring several first responders and resulting in significant damage to the facility and disruption to the surrounding community. Abuse Factors Lithium-ion cells are prone to failing if not kept within specific environmental conditions. When these conditions are compromised, so-called abuse factors can lead to thermal runaway. Awareness of these abuse factors can help operators prevent thermal runaway at its earliest stage. Electrical Abuse: This occurs when a battery exceeds voltage limits during charge or discharge and overheats. The simultaneous operation of these batteries poses the risk that any one of the battery cells could exceed voltage limits during charge or discharge and can cause overheating that triggers a potential fire event. Mechanical Abuse: This can be caused by physical or mechanical damage to the battery such as a crush, indentation, or puncture from vibration or shock. Thermal Abuse: This is initiated when the operational temperature exceeds the limits of the battery. If caused by overcharging, the extra current triggers a chemical reaction that breaks down the battery’s organic liquid electrolytes and changes them from a liquid to a highly flammable gaseous state. Why is the earliest possible detection of a battery failure When an abuse factor continues unaddressed, more of the liquid electrolyte from the battery will convert to gas, causing an internal build-up of pressure sufficient to vent or rupture the battery seals and resulting in an off-gassing event. Eventually, as more gas is generated, internal pressure and heat continue to increase rupturing, melting the separator, and releasing the smoke. By this point, thermal runaway is imminent. A single cell failure can quickly overheat and spread to surrounding cells. That’s why the earliest possible detection of a battery failure is crucial to preventing a potential disaster caused by thermal runaway. It is common for mobile BESS units to utilize traditional heat and smoke detectors in interior spaces, but these sensors are not equipped to provide sufficiently early warning of an impending fire. They are only sensitive enough to detect smoke after a fire has started, which is much too late to stop thermal runaway from igniting an entire bank of batteries. Furthermore, these pre-installed systems cannot be serviced, monitored, or maintained to ensure they are in basic working order due to unit design. The best protection is prevention A holistic approach using advanced detection and performance-based solutions combined with battery management systems can work together to establish layers of safety and fire protection. Battery Management Systems monitor voltage, current, and temperature to identify any battery abuse factors. While this is an important initial layer, it should not be the only layer of protection. Temperature and Humidity Sensors measure the temperature of the air surrounding the sensor including ambient room temperature, shock/vibration/AC power quality and conditions. Advanced detection innovations provide the very earliest possible intelligence about conditions inside the BESS. These early warning systems can be professionally tested, serviced, maintained, and monitored at the fire alarm control panel. Thermal Imaging Cameras graphically illustrate the temperature of the objects and equipment the camera can see. Off-Gas Detection technologies can provide an alert in the initial stage of lithium-ion battery failure when venting of electrolyte solvent vapors begins and prior to thermal runaway. Very Early Warning Smoke Detection systems use ultra-sensitive sensors to provide early warning of an impending fire event, buying time to initiate an appropriate emergency response to prevent injury, property damage or business disruption. If an off-gas event occurs, sensors can be used to quickly notify facility operators to shut down the system or contact first responders to mitigate the spread of fire from cell to cell. Responding to the ever-evolving fire and life safety industry Fire and life safety industry standards are evolving to minimize the fire risks associated with BESSs. Ensuring appropriate criteria to address the safety of such systems in building codes and fire codes is an important part of protecting the public, building occupants, and emergency responders. International Fire Code (IFC) 2021 1207.8.3 Chapter 12, Energy Systems requires that storage batteries, prepackaged stationary storage battery systems, and pre-engineered stationary storage battery systems are segregated into stationary battery bundles not exceeding 50 kWh each, and each bundle is spaced a minimum separation of 10 feet apart and from the building wall. National Fire Protection Agency (NFPA) 855 establishes requirements for design, construction, installation, commissioning, operation, maintenance and decommissioning of stationary energy storage systems and applies to battery installations over 70 kWh. UL 9540—Standard for Safety Energy Storage Systems and Equipment outlines safety requirements for the integrated components of an energy storage system requiring that electrical, electro-chemical, mechanical and thermal energy storage systems operate at an optimal safety level. UL 9540A—Test Method for Evaluating Thermal Runaway Fire Propagation in Battery Energy Storage Systems implements quantitative data standards to characterize potential battery storage fire events and establishes battery storage system fire testing on the cell level, module level, unit level and installation level. Design, construction, installation, and operation of a BESS Because these requirements are continuously evolving, careful investigation of all standards must be performed before beginning the design, construction, installation, and operation of a BESS. Lithium-ion battery storage facilities are pivotal to the transition to a greener economy. Just as eco-friendly technology is evolving to strengthen the renewable energy industry, advanced fire prevention and life safety technology must also advance to protect it. Off-gas detection, very early warning smoke detection and thermal imaging camera systems combined with advanced alarm monitoring can help keep BESSs operating at the highest levels of safety.

Photovoltaic Systems: Risks And Fire Detection

The use of Photovoltaic power systems (PV), also known as solar panels, has grown over the last decade in commercial settings as many corporations have made commitments to reach zero-carbon emissions in the next few decades to help combat climate change. Solar energy has proven to be a reliable way for corporations to power their facilities without interruption to their day-to-day operations but may come with possible risk. Increased usage of PV power systems has raised awareness of the fire risks these technologies may present. According to The Hartford, “From 2017 to 2018, solar-related fires rose 36%, with the majority of fires affecting commercial buildings.” Overcharging and overheating of electrical equipment There are many possible causes of fire outbreaks due to the use of solar panels, including abuse factors like poor maintenance of the PV panels themselves, delayed cleanings and debris removal, and failure or inability to protect panels against damage. Other factors like lightning and surge suppression, overcharging and overheating of electrical equipment, and short circuiting also pose an increased risk. In large-scale commercial facilities like warehouse distribution centers, solar panels are often installed on the roof of the building, making a fire event difficult to spot until the fire has already spread and increased in temperature, posing a life safety risk to all those working inside. Traditional fire suppression solutions Additionally, traditional fire suppression solutions like sprinklers are unable to be installed on the roofs of these facilities due to possible risk of damage done to the roof, environmental conditions, and an overall lack of space, meaning there is no suppression technology available to slow or prevent the rate of growth of a fire.  This makes a solution that can detect a fire as soon as possible very necessary to help protect the building itself, your assets, and most importantly, your people. Identifying a cost-effective, reliable solution Linear heat detectors (LHDs) have proven to be the most effective and inexpensive solution to detect a fire event. LHDs are comprised of a copper wire with an outer sheath that melts away in the event of a fire, thus setting off an alarm. Solar panels installed on the roof of the facility makes them susceptible to environmental factors like weather, and the jacket or sheath outside the LHD wire itself can withstand environmental conditions that could deteriorate other forms of detection. The LHDs are installed directly underneath the PV panel wires, and when paired with Confirmed Temperature Initiation technology, they can discern whether an increase in temperature has been caused by a mechanical short in the linear heat detector and a thermal alarm activation – helping reduce the rate of false alarms. Roof fire caused by PV panels Due to their proximity to the solar panels, fire events are detected quickly, triggering alarms as soon as high-heat temperatures reach the copper wire – allowing for a timely response. Having the LHD installed directly underneath the solar panels also helps pinpoint exactly where the fire outbreak started, leading to a more effective response when first responders arrive on the scene, making this solution more practical and cost-effective than spot detection sensors that require costly maintenance and inspection. A timely and accurate response to a roof fire caused by PV panels can determine the difference between stopping significant damage to the roof and major reconstruction of the entire facility. Importance of enhanced protection and routine maintenance There are a multitude of actions that can be taken to prevent a PV or solar panel fire event from occurring, including routine maintenance and cleaning, clearing debris, and ensuring solar panels are not overcharged or overheating. The placement of solar panels on roofs makes a potential fire risk especially dangerous to occupants inside of the facility due to the overhead location. Fire events can occur due to outstanding factors like weather, making fire detection solutions necessary to, first and foremost, help protect occupants inside large-scale commercial warehouses, while ensuring assets and the building itself are safe. Linear Heat Detectors are an inexpensive solution that can quickly identify a fire event, alert first responders for a timely response, and withstand environmental conditions – remaining reliable and able to detect a fire event even in harsh conditions and suitable for the protection of facilities, assets, and most importantly, life. Everon can help implement linear heat detectors that provide comprehensive fire protection within critical equipment and across large areas while lowering the total cost of ownership.

Insights & Opinions from thought leaders at Everon

GSX 2025 Highlights Security's Rapid Shift To Smart Solutions

There was high-level energy at GSX 2025, befitting an industry undergoing massive change. Artificial intelligence (AI) was everywhere, but not so much in the booth signage. Rather, AI has made its way beyond marketing claims and solidly into the core of the products themselves. There were hundreds of examples of how AI is changing how security systems operate, all for the better. Clearly on display at GSX 2025 was an industry in the midst of metamorphosis.  Deep integration of AI My conversations with companies across the security ecosystem revealed an industry heavily focused on leveraging advanced technologies like AI and the cloud to address increasingly complex global and localized threats. Several key themes emerged at the Global Security Exchange (GSX), sponsored by ASIS International, held Sept. 29–Oct. 1 at the Ernest N. Morial Convention Center in New Orleans, La. Themes I heard repeated throughout the show floor included deep integration of AI, the ongoing shift toward cloud-based and hybrid architectures, and a sharp focus on modernizing security systems to meet current challenges. AI and intelligent automation transform security The use of GenAI is moving beyond simple search functions into real-time decision support Companies are integrating AI and intelligent technologies to enhance analytics, streamline incident response, and improve internal efficiency. The use of Generative AI (GenAI) is moving beyond simple search functions into real-time decision support. For example, Bosch Video Systems introduced a "second tier" to its video analytics capabilities by combining highly sensitive edge detection with GenAI models in the cloud. For example, in visual gun detection, edge analytics might flag a potential gun (yellow), but the cloud-based GenAI then quickly reviews and confirms the threat (red), helping to filter out false alarms. Bosch is also using GenAI for more open-ended searches, such as a "Where's Waldo" application demonstrated at their booth. GenAI-powered system  Eagle Eye Networks says they are focused on helping integrators "organize the AI chaos” through their cloud-based video platform. Their precision person and vehicle detection capabilities work across multiple cameras. Motorola Solutions introduced Inform, an AI-assisted incident response solution designed to bring clarity to the "noise" and help security teams respond to complex threats. They also offer Avigilon Visual Alerts, an on-prem GenAI-powered system that expands the natural language interface. AI internally to improve processes The Body Workforce Mini protects frontline workers and businesses "amid rising violence and theft." The Axon Body Workforce Mini, a small “computer with a lens” for non-police applications, is AI-capable and can perform real-time translations, automated report writing, and summarization, and can even act as a personal assistant by incorporating company policies. All those functions are built into a lightweight body-worn camera designed to safeguard frontline workers in retail and healthcare verticals. The Body Workforce Mini protects frontline workers and businesses "amid rising violence and theft." Beyond products, integration company Everon is using AI internally to improve processes, such as handling commoditized tasks, which they expect will result in better customer satisfaction. Everon wants to be known as a premier service provider and will be introducing new services in the video realm. AI-powered search and continuous system upgrades Genetec prefers the term Intelligent Automation (IA), instead of AI, to describe its empathetic interface, which can "know" what additional information a security professional needs when they click on an image, for example. Genetec says the advantages of the cloud include AI-powered search and continuous system upgrades. Their Security Center SaaS has had a fast and successful launch. It enables cloud-based systems with local storage.  Genetec also highlighted the Cloudlink 210, a cloud-managed appliance designed to unify physical security operations that can be simply plugged in without involving IT staff. They call it a “headless appliance.” Cloud migration and the push for hybrid systems Hanwha debuted OnCAFE (Cloud Access for Everyone), a new cloud-based access control product The industry continues its strategic march toward the cloud, often through hybrid applications that blend on-prem strength with cloud flexibility. Acre's access control is described as "cloud-first technology," and they continue to focus on cloud solutions, incorporating AI. To help customers transition, they offer the "Bridge," a migration tool that allows systems to communicate throughout the move. At the same time, they are continuing to develop and enhance their core on-prem products – DNA Fusion and AccessIt!. Adding access control to supplement their video product line, Hanwha debuted OnCAFE (Cloud Access for Everyone), a new cloud-based access control product. The goal is to provide “access control that is easy;” It works alongside their OnCloud direct-to-cloud VMS as a Service platform. Future of video management The future of video management is increasingly hybrid. Milestone recently completed a three-year process of updating XProtect and building for the future of hybrid applications. At GSX, they showcased how their XProtect Evidence Manager seeks to "democratize evidence management" by collecting video, cell phone data, notes, and other metadata related to a case for easy sharing and prosecution. Also, Milestone’s “app center” enables additional features to enhance XProtect without involving integration.  Milestone is also focusing on "Metadata Ingest," which collects and aggregates data from various manufacturers (including Genetec, Motorola, and Exacq) for use by AI. Strategic modernization and open integration Convergint and Genetec collaborated on a "2026 Technology Modernization Outlook" white paper A key theme for the future is the shift toward open systems and strategic modernization, enabling security professionals to better utilize new technology. Convergint and Genetec collaborated on a "2026 Technology Modernization Outlook" white paper, arguing that dealers and end-users need to think more strategically when buying technology. They predict that "2026 will be the year of modernization," with tangible results including unified intelligence, flexible deployment, and lower total cost of ownership. The call for open standards and architecture was also strong. What AI needs from open systems Johnson Controls noted that cloud, AI, and open standards are its three big focus areas. Their C-CURE IQ 3.10 is gaining adoption as it unifies access and video. OpenEye is seeking to address the "AI disruption anxiety" in the industry, focusing on what AI needs from open systems. The emphasis is on the value of a Model Context Protocol (MCP), an open standard and framework to enable AI systems to integrate and share data with external tools and sources. Addressing shifting global and local threats Allied Universal's "World Security Report 2025" highlights a risen focus on executive protection Companies unveiled solutions targeted at new security concerns, particularly the rising threat of violence, theft, and misinformation. Allied Universal's "World Security Report 2025" highlights an increased focus on executive protection and cites the rise of misinformation and disinformation as the number two threat. They noted that macro trends around instability and the political and social environment are driving security threats globally. To combat physical threats, Shooter Detection Systems introduced a new outdoor sensor, which is now generally available after a favorable feedback period that included an apprehension in one municipality. The company notes the unique challenge of developing technology for a "non-cooperative" threat like a person with a gun, in contrast to most security technologies that are "cooperative" and depend on user compliance. Implementation of integrated security Flock Safety is expanding its focus beyond license plate readers into solutions for retail, with a new initiative to automate and streamline investigative processes, which are often manual. The company also showcased "drones as automated security guards," which can be deployed within 90 seconds to provide "eyes" on a site and enhance safety. The system works on its own network and is firewalled away from the city system A tour of the City of New Orleans' Real Time Crime Center (RTCC), hosted by Axis Communications, demonstrated a mature implementation of integrated security. The RTCC uses Axis cameras, Genetec VMS, and is tied to a Motorola Solutions Command Center to enhance efficiency and effectiveness, operating independently of the police department. They measure success in terms of valuable hours saved in an investigation or even when an event is happening. The system works on its own network and is firewalled away from the city system. Rapidly changing industry on display The GSX 2025 highlights an industry that is moving toward more intelligent and integrated solutions. The investment in AI is shifting security from reactive monitoring to proactive, automated assistance. Throughout the show floor, the continued embrace of hybrid cloud architectures, coupled with an emphasis on open standards and modernization roadmaps, suggests a security ecosystem built for agility and future growth.  These trends, and the GSX show itself, collectively underscore the industry's commitment to delivering scalable, next-generation solutions for a changing threat landscape.

Everon’s New CTO Directs Focus On Video Monitoring And Evolving Technology

Ibrahim Kassem, Everon’s new Chief Technology Officer (CTO), has been in the security industry since 1998 in various IT leadership roles. Most recently, he was Chief Information Officer for a video monitoring company. With most of his professional experience rooted in commercial security, Kassem has come to understand how customer needs and demands change with the evolving technology landscape. That understanding is a foundation for his new role at Everon, the national provider of commercial security, fire, and life safety solutions formerly known as ADT Commercial. Integrate AI to security operations “In this role, I am responsible for any customer-facing technology at Everon,” says Kassem. “Our primary focus is to provide a platform that will make it easy to do business with us. That platform will involve most of our solutions, including video monitoring which is the near-future focus for us.” As an integrator, Everon’s objective is to identify the best solutions. “We have partners that we leverage to help develop solutions for our customers that directly respond to their needs,” says Kassem. “For example, we partner with video camera providers to integrate AI to take security operations to the next level.” Demand for video monitoring Everon is looking to shift from reacting to events after they take place toward proactive monitoring Like most security operations, Everon is looking to shift from reacting to events after they take place toward proactive monitoring and preventing crimes as they are happening or deterring them from taking place.  The ability to detect objects and behaviors is possible through AI. “Through this detection, we can respond accordingly – that’s why it’s at the forefront of our video monitoring efforts,” says Kassem. Every pursuit at Everon is in response to customer demand, and there is tremendous demand for video monitoring, says Kassem. Customer needs are the main philosophy behind the development and acquisition of technology, which also ensures that Everon is at the forefront of evolving with the security industry. Video-based security solutions “Right now, we’re noticing a trend towards video-based security solutions versus solely intrusion and guarding,” says Kassem. Everon seeks to strike a balance between “build versus buy.” The integrator prefers to buy when there is a proven product that will bring the most value. “We’re an integrator before we are a developer of technology,” says Kassem. “However, we are not shy about complementing a technology that we purchase with technology that we build if we don’t find the proper platform.” Video monitoring solutions and services Everon continues to evolve in step with ongoing trends, including smarter AI and analytics, smarter cameras Everon continues to evolve in step with ongoing trends, including smarter AI and analytics, smarter cameras, faster internet connectivity, and availability of wireless through 4G, LTE, and 5G connections. All of these are critical pieces of the video monitoring roadmap, says Kassem. “We aim to develop our video monitoring solutions and services to provide the best value to enterprises, reduce false alarms, and focus on relevant activities to save time and money,” he adds. “That’s what we’re looking forward to in the next couple of years.” Dependence on physical security Everon provides video monitoring services on a monthly basis, so the approach plays well with their recurring monthly revenue (RMR) model. Video monitoring is in great demand, and Everon is working towards being pioneers in that space, pushing to make it a major part of their future offerings. Everon is working towards being pioneer in that space, pushing to make it a major part of their future offerings “The dependence on physical security has gotten expensive, and many responding agencies no longer dispatch without video verification, which is the biggest technology challenge currently in the commercial security space,” says Kassem. “Video monitoring is the most direct, effective answer to that challenge, replacing costly, around-the-clock guarding services while also providing video verification for first responders and law enforcement agencies.” Portfolio of security solution offerings Everon roots all its pursuits in responding to the customer. Making the difference in Everon’s approach is an eagerness to listen, an awareness of industry trends and changes, and a full portfolio of security solution offerings.  “Our technological roadmap is ambitious, innovative, and looks to the future through our thoughtful investments in this space, including through acquisitions of technology and top talent,” says Kassem. “All our efforts are supported by our teams of experts with decades of experience.”

Energetic ISC West Reflects Industry On The Cusp Of Accelerated Change

ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-center at the industry’s biggest U.S. show in Las Vegas.  Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Center SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing.  Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call center software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasizing feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrollment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.”  Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds.  Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defense in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panelists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasizing tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt, and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec.  Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalized a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer  ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server.  Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health.  Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.