Airport security
The number of women in the civil aviation workforce, especially in leadership positions like CEOs, pilots, air traffic controllers, and aircraft engineers, has been on an ascent, especially in the Middle East and North Africa (MENA) region as the global aviation industry heads toward growth and expansion. To boost their presence in leadership roles in the US$553.9 billion-value global airlines market, the International Air Transport Association (IATA), the trade association representing a...
Enhancing physical security, especially perimeter intrusion detection (PID) at critical infrastructure sites like airports, data centers, warehouses, and utilities, is increasingly crucial due to growing threats such as theft, protests, sabotage, terrorism, and war. Quanergy 3D LiDAR Solutions In its latest whitepaper, Quanergy 3D LiDAR Solutions Redefining the Physical Security of Critical Infrastructure, global technology intelligence firm ABI Research forecasts the worldwide physica...
Multinational companies are tapping the pioneering annual airport industry-dedicated event, set to take place in Dubai, to enter into meaningful networking as the regional airports hunt to acquire the latest technology and innovative services to meet the expectations of the fast-growing air travel market. Airport Show 2024 The 23rd edition of the dedicated B2B platform for the airports industry in the Middle East, North Africa, and South Asia (MENASA) region will be held from May 14&...
Morse Watchmans, the industry pioneer in key control and asset management systems, is proud to be showcasing its line of key control and asset management solutions at Expo Seguridad Mexico 2024, April 16-18 at the Centro Citibanamex, Mexico City. Morse Watchman’s new Emergency Key Grab (EKG) EKG will be on display alongside additional key control and asset management solutions at stand # 1837. New and award-winning products “Following a successful showing at ISC West,...
Genetec, a provider of unified security, public safety, operations, and business intelligence solutions, is pleased to announce its plans for the Passenger Terminal Expo 2024, taking place in Messe Frankfurt, Germany from April 16 – 18, 2024. Airport portfolio The company will be present at stand #D220, demonstrating its full airport portfolio designed to reduce security risk, improve planning, and automate airport operations. Representatives will be on hand to discuss the latest Genetec...
OSI Systems, Inc. (the ‘Company’ or ‘OSI Systems’) has announced that its Security division has been awarded a $16 million contract by an international airport to enhance its checkpoint security infrastructure. Checkpoint lane upgrade This checkpoint lane upgrade includes supplying advanced 920CT screening systems integrated with automated tray return systems (TRS) lanes to streamline security operations. As part of this award, OSI Systems is also expected to provide mu...
News
Gunnebo Entrance Control, a global pioneer in innovative entrance security solutions, is attending Passenger Terminal Expo 2024 to debut its latest airport entrance systems alongside new advancements in security technology. Visitors to booth E340 will be able to see live demonstrations of Gunnebo Entrance Control's latest systems, offering intelligent passenger flow management for all stages of the airport journey. Whole boarding process This includes PreSec which operates as a self-service to check boarding passes before security This includes PreSec which operates as a self-service to check boarding passes before security. Gunnebo Entrance Control will also display LoungeSec with biometric capability and facial data capture to ensure controlled access for authorized customers to Lounge areas. BoardSec will be presented as an automated self-boarding eGate to accelerate the whole boarding process alongside ImmSec to maximize resources with efficient verification of passengers at border control. Says Nathan Anstee, VP Mass Transit Gunnebo Entrance Control: “Securing airports at every stage of the passenger journey is crucial for maintaining safety and efficiency in today's fast-paced travel environment. As airports continue to serve as critical gateways connecting millions of travelers worldwide, the evolving security threats must be met with proactive and advanced entrance control security." New airport entrance control system Gunnebo Entrance Control will debut an innovative new airport entrance control system Anstee added: “At Gunnebo Entrance Control, we understand the significance of effective entrance control systems in mitigating risks and ensuring seamless passenger processes for all key touchpoints. Our complete airport portfolio demonstrates how we are supporting airports to manage their passenger flow, combining self-service automated gates with the latest biometric technology and intuitive design.” At Passenger Terminal Expo 2024, Gunnebo Entrance Control will debut an innovative new airport entrance control system, designed to offer a compact solution with no compromise to the use of the latest security technology, compliant data capture, or stylish design. Entrance control solution requirements Nathan concluded: “Passenger Terminal Expo 2024 presents the perfect opportunity to discuss bespoke airport entrance control solution requirements. We are especially excited to launch our new system that will demonstrate our commitment to research and development in delivering advanced entrance control." “We are looking forward to demonstrating how we can support airport passenger flow throughout an airport complex, right from the moment a passenger arrives to the moment they leave. We invite attendees to explore how our solutions redefine the importance of airport entrance control and contribute to safer travel experiences for everyone.”
As the number of airline passengers has exploded to surpass the high pre-pandemic levels, airports across the world have been expanding and improvising their security regime and devoting wider resources to make the systems and processes smoother and free of glitches and shortcomings. The entire aviation value chain has been playing a key role in keeping the airports safe and secure as threats have remained a priority since the start of the 21st century. The threats continue to evolve and determine the present and future framework of airport security on the planet. Use of data and technologies By 2030, it is expected that the better use of data and new technologies and processes will all be involved in mitigating much of the checkpoint stress passengers endure. Airport security is continuously being expanded and upgraded through building wider collaborative relationships with governments, aviation regulators, and airport operators. Risk assessments in most parts of the world are being carried out in advance and screening technologies are becoming more discrete and decentralized, happening mostly at gates or along airport corridors rather than at a central location. Foundations for aviation security The improvements to and expansion of airport security are crucial for smoother movement Most experts believe that the foundations for aviation security in 2030 are already in place but there are issues to be resolved and improvised, and standards need to be determined for successful product design, with facial recognition and biometrics becoming the most coherent part of the aviation security infrastructure. The improvements to and expansion of airport security are crucial for the smoother movement of about seven billion air passengers by 2030. Off-site airport security The trend is towards moving the airport security processes off-site across several countries including the Middle East region, to cope with the rising passenger numbers and limited infrastructure development, according to officials of the Airports Council International (ACI-World) whose members operate 1925 airports in 171 countries, including the DXB, the world’s top airport for international passengers. Technologies were being tweaked for newer and emerging security environments and crucial data getting shared along the entire passenger journey to deal with threats including cybercrimes and explosive devices, according to the International Air Transport Association (IATA). Current and future of aviation/airport security Airport Show in Dubai in May, to recommend measures to fill up the gaps and improve the systems and procedures The world’s leading experts and officials will discuss the current and future of aviation/airport security, during their participation at the upcoming Airport Show in Dubai in May, to recommend measures to fill up the gaps and improve the systems and procedures. The 23rd edition of the Airport Show, with its co-located events Air Traffic Control (ATC) Forum, Airport Security Middle East, and the Global Airport Leaders Forum (GALF), will be held over three days from May 14 to 16. Sustainability and Innovation The much-anticipated event will bring together the world’s leading airport suppliers and service providers, as well as aviation leaders and regional decision-makers to showcase the latest innovations and technologies. The theme, Sustainability, and Innovation, reflects the airport industry’s focus on embracing cutting-edge technology and greener initiatives to drive growth and efficiency. Safety, efficiency, and security The imperative to enhance competitiveness, our company stands at the forefront" Emaratech Group CEO, Thani Alzaffin said, "As airports grapple with the complexities of rising passenger volumes, changing regulations, and the imperative to enhance competitiveness, our company stands at the forefront of addressing these challenges." "Through innovative IT solutions and advanced technologies, we are empowering airports to fortify their safety, efficiency, and security measures. Our state-of-the-art solutions, including biometric identification, and artificial intelligence, contribute significantly to the modernization of airport security." Secured and integrated process "In the realm of smart travel, the company has been playing a major role in pioneering advancements, particularly in collaboration with the General Directorate of Residency and Foreign Affairs-Dubai (GDRFA-Dubai), Emirates Airlines, and Dubai Airports." "It foresees a customer-focused experience achieved through a highly secured and integrated process that seamlessly encompasses all airport touchpoints." Biometrics and touchless experiences From the perspective of airports and aviation authorities, the new experience holds immense promise "The future of travel pivots significantly on the transformative power of biometrics technology and touchless passenger experiences." "These innovations are designed to reshape the landscape of air travel, offering a multitude of benefits for all stakeholders involved especially when such seamless processes are introduced across countries," he said. From the perspective of airports and aviation authorities, the new experience holds immense promise. Stringent security measures According to industry insiders, airport security is a complex and crucial aspect of the Middle East region’s aviation infrastructure. Given the geopolitical situation and heightened security concerns, airports have been prioritizing stringent security measures that cover passenger and baggage screening, access control, surveillance systems, and collaboration. Middle Eastern airports are at the forefront of implementing advanced technologies like biometric scanning, explosive detection systems, and AI-driven surveillance to enhance security. Additionally, stringent regulations are applied and airports and airlines adhere to international safety standards. Global airport security market These challenges significantly impact how airports approach and implement security measures The global airport security market size is expected to reach US$26 billion by 2030, according to a research report published by Spherical Insights & Consulting. It says the Middle East Airport Security Market faces unique security challenges primarily due to the complex geopolitical factors prevalent in the region. These challenges significantly impact how airports approach and implement security measures given their proximity to active conflict zones. Physical inspection + technology Middle Eastern airports are employing a combination of methods, including physical inspections and advanced technology. Passengers are screened through metal detectors, full-body scanners, and explosive trace detection machines. Additionally, hand luggage and personal items are subjected to X-ray scans to identify any prohibited or potentially dangerous items. In some cases, passengers may also undergo secondary screenings based on behavioral profiling or random selection, ensuring a thorough assessment of potential risks. State-of-the-art baggage screening systems Trained staff meticulously examine flagged items, ensuring that nothing poses a security threat before allowing baggage Middle Eastern airports use state-of-the-art baggage screening systems that employ X-rays and computed tomography (CT) scans to create detailed images of the contents of checked baggage. These technologies help security personnel identify any suspicious or prohibited items, including explosives, weapons, or contraband. Automated systems also flag anomalies for further inspection. Trained staff meticulously examine flagged items, ensuring that nothing poses a security threat before allowing baggage onto the aircraft. AI, facial recognition, and iris scans They are at the forefront of adopting advanced security technologies to enhance safety. Biometric systems like facial recognition and iris scans are increasingly being used for identity verification and access control, streamlining the passenger journey while ensuring security. Additionally, Artificial Intelligence (AI) and Machine Learning (ML) algorithms are deployed to analyze passenger behavior and detect anomalies that may indicate potential threats. Explosive Detection Systems (EDS) These systems use sophisticated algorithms to analyze X-ray images and detect trace amounts of explosives Explosive Detection Systems (EDS) are being widely employed to identify explosive materials in checked baggage. These systems use sophisticated algorithms to analyze X-ray images and detect trace amounts of explosives, providing an additional layer of security. CCTV, video analytics Furthermore, Middle Eastern airports are investing in surveillance technologies, including high-definition CCTV cameras and video analytics, to monitor passenger and staff activities across the airport premises. Real-time intelligence sharing has been enabling airports to proactively respond to potential threats and adjust security measures accordingly. Enhanced screening processes Facial recognition, iris scanning, and fingerprint recognition, are being widely adopted The region’s airports also benefit from access to cutting-edge equipment and systems that enhance screening processes and improve security outcomes. They have aligned their security protocols with internationally recognized guidelines, ensuring consistency and compatibility with airports worldwide. Biometric systems, including facial recognition, iris scanning, and fingerprint recognition, are being widely adopted at Middle Eastern airports. Passenger identity verification These technologies provide secure and efficient methods for passenger identity verification at various touchpoints, such as check-in, security screening, and boarding gates. Passengers can move seamlessly through the airport, reducing wait times and enhancing overall convenience while ensuring the highest levels of security. Travel trends to 2050 Airports will be core drivers of industrywide change, while themselves being transformed in the process" Talking about the travel trends to 2050, an Oliver Wyman analysis says by 2040 more than 19 billion passengers will pass through world airports each year, and the global commercial aviation fleet will expand by 33 percent, to more than 36,000 aircraft by 2033. It noted: “Airports will be core drivers of industrywide change, while themselves being transformed in the process." Customized and contactless experience "Airports are, after all, where air travel journeys begin and end. Going forward, the passenger experience will be customized, on-demand, contactless, and efficient." "The digitization of airports will enable a tailored end-to-end journey through the airport and will create new retail and commercial revenue opportunities.” On-demand services The reduction in check-in counters and security screening queues will provide new opportunities" The transformation of passenger processing will drive a significant change in the internal layout of airport terminals where the future line of demarcation between the airside and landside is expected to be very different from today. “The reduction in check-in counters and security screening queues will provide new opportunities for commercial retail and relaxation spaces in terminals. By 2030, the expectation is that the integration of new technologies will enable airports to deliver passengers customized, on-demand services to improve their airport experience." Touchless travel digital ID cards "For passengers, touchless travel digital ID cards may replace paper passports by 2040, the year when the travel hub will be all about open-airport architecture, with physical and software design interfacing and allowing for touchless security and check-in," it said. By 2050, processes within airports will be fully autonomous, increasing the speed and quality of activities, from security to immigration and boarding. Internationally recognized digital identity By 2050, it can be assumed that robots and automation will have taken on most of the current roles at airports Through coordinated efforts by governments and regulatory bodies, there is a prospect of having an internationally recognized digital identity for all passengers by 2050. By that year, it can be assumed that robots and automation will have taken on most of the current roles at airports. One-stop processing Zero-queue terminals will be a reality by 2050, with customized and pre-planned processes creating a seamless journey from home to destination, and back. Passengers will use their devices or travel and airport apps to control every aspect of their journey and experience. Remote processing and one-stop processing pods which may be available during the transit time to the airport, will simplify boarding and security procedures.
International Security Expo is delighted to announce that it has appointed a new Chairwoman. Responsibilities Angela Essel, Senior Account Director MoD HQ at Thales UK, and Former Head of JSaRC, Homeland Security Group, Home Office, will be taking on the role effective immediately. Taking over from Admiral the Rt Hon Lord West of Spithead GCB DSC PC DUniv, former UK Security Minister, who steps down after having served eight years in the role, Angela will spearhead an Advisory Council that consists of an envious selection of the industry's foremost experts representing private companies, global transport hubs, critical national infrastructure, public sector, Government and more, all helping to steer the future direction and growth of International Security Expo. Work experience This broad experience working within both Government and the private sector makes her ideally suited In her previous position as Head of JSaRC, the UK Home Office’s Joint Security and Resilience Centre, Angela was a member of the International Security Expo Advisory Council and has spoken at the event’s Summit and Conferences numerous times. Angela held the post of Head of JSaRC for almost four years, moving into the private sector in April 2023 to work for Thales UK. This broad experience working within both Government and the private sector makes her ideally suited to understand the challenges and complexities of the industry as a whole, and she will bring an expert level of knowledge to the role. Targeted international delegation In 2024, International Security Expo will look to expand its international reach further, bringing together more visitors and exhibitors from even more countries through a targeted international delegation program supported by UK Defense & Security Exports (UKDSE), Department for Business & Trade. Buyers with active or future projects around the world will be attending to review cutting-edge solutions to enhance their security measures and learn more about the most pressing homeland and global security challenges and how best to solve them. Innovative solutions and services A new Aviation Security Zone will be dedicated to showcasing innovations in airport security, air traffic control systems Innovation will once again be at the heart of the event, with the exhibition floor showcasing a vast range of the latest security products and services from hundreds of exhibitors, providing groundbreaking solutions and interactive displays that collectively demonstrate the depth and breadth of innovation the security sector has to offer. A new Aviation Security Zone will be dedicated to showcasing innovations in airport security, air traffic control systems, cybersecurity for aviation, passenger screening technologies, and aircraft safety measures, aiming to bring together stakeholders who are committed to enhancing aviation security through the exploration of new technologies and strategies. Key themes In addition to focusing on international and homeland security development, key themes will also include policy updates from the Government, combatting the most prevalent serious and organized crime threats, people & skills, diversity, and sustainable security. Visitors can expect even more exciting live demonstrations, that will bring products and their applications in real-life scenarios even more to life. The event will also once again be co-located with the International Cyber Expo which will guide visitors through the ever-evolving landscape of digital security, bursting with networking and business opportunities and providing access to a highly sophisticated visitor base of IT security professionals. Positive impact International Security Expo is seen throughout the industry as one of the most respected security events" Speaking of her appointment Angela says, “I am thrilled to be taking on the Chairwoman role. International Security Expo is seen throughout the industry as one of the most respected security events, not just in the UK but globally." "I know first-hand the positive impact the event has on the industry, as well as on the safety and security of the public, so to be representing the event and leading this incredible Council of esteemed experts is a real honor. I cannot wait to help shape and develop this September’s event and those in future years.” Admiral's comment Admiral Lord West says, “It has been a privilege to spend so many years as Chairman of this exceptional event." "It is immensely gratifying to see the many thousands of visitors come through the doors each year in search of ways to make us all safer, and the positive impact this has on our security the world over. Angela did a tremendous job heading JSaRC and I have no doubts whatsoever that she will make a superb Chairwoman. I wish her the best of luck in the role.” Director's comment Rachael Shattock, Group Event Director, added, “Angela has been a valued friend of the International Security Expo for several years now, so we are delighted that she has agreed to take on the role of Chairwoman." "I am excited to see the influence she brings to the event this year and going forward, and it marks an exciting time for the International Security Expo following our recent rebrand and the exciting plans we have in place for this year. I would also like to thank Admiral Lord West for the fantastic work he has done guiding the Advisory Council and helping make the event the success it is.”
inter airport Southeast Asia 2023 (IASEA), Asia’s international airport exhibition and conference, concluded on an upbeat note in Singapore. Held from 1-3 March 2023, the event featured a high-level conference and a sold-out exhibition featuring ground support equipment, airport operations & maintenance solutions, airside support services, and many more. A showcase of latest offerings Over the 3-day exhibition, IASEA saw 3,131 trade attendees and 150 exhibitors congregate at the biennial event after a four-year hiatus. Leveraging the gathering of airport decision-makers at IASEA 2023, multiple exhibitors presented their newest products and solutions on the exhibition floor. These included: ITW GSE’s 7400 eGPU, a battery-powered ground power unit that helps reduce carbon footprint. Sanxing’s TowFLEXX TF5 Towbarless remote-control aircraft tug helps reduce damage to aircraft. Cognitec’s FaceVACS-Entry, which provides improved face recognition technology for security, and many more. Strategic Partnership To support the growth and development of critical airport infrastructure in the Philippines, including GSE Participating exhibitor, Weihai Guangtai Airport Equipment Co. Ltd., signed a Memorandum of Understanding (MOU) with Macroasia Corporation, a pioneering provider of aviation-related support services in the Philippines. This MoU establishes a long-term strategic partnership between both companies to support the growth and development of critical airport infrastructure in the Philippines, including ground support equipment (GSE). Networking platform Rene van Joost, Cargo & Ground Handling Senior Expert, PMO Aviation Services & Cargo (ASC), Angkasa Pura I – injourney said of the event, “It is a great platform for networking." "For example, while preparing the merger of the subsidiary companies of Angkasa Pura I and Angkasa Pura II, for logistics and catering under one sub-holding, we needed to collaborate with international partners, and through IASEA. I have met a lot of potential partners at IASEA, which I’ll be following up with.” Extensive array of airport-related technology Shows like IASEA are fabulous for meeting old friends in the industry and making new ones" “The experience was good. IASEA 2023 offered an extensive array of airport-related technology that we could explore more in the future and consider how we could use them to enhance our current airport,” said Mohd Hashriq Adzaman Abd Rahman, Senior Engineer - Malaysia Airports. "It’s great to be here. Shows like IASEA are fabulous for meeting old friends in the industry and making new ones,” said Philip Marks, Operations Manager, CU Phosco Lighting. Resounding success "These are vital in providing opportunities for me to meet with customers. They know where we are, and we’ve talked to them before we arrived. We come to IASEA and we meet up. We cannot wait to be back in 2025.” Yeow Hui Leng, Group Project Director, IASEA said, “We are delighted IASEA 2023 was a resounding success." Positive and encouraging feedback IASEA will set the stage to become the marketplace for deals to be made and the dedicated place to draw connections" "It is heartening to witness the event in full swing and receive positive and encouraging feedback from attendees." "As the aviation industry continues its flight path towards recovery and with APAC expected to account for more than 36% of the major construction projects worldwide at existing airports, IASEA will set the stage to become the definitive marketplace for deals to be made and the dedicated place to draw connections between international solution providers with airports from Asia.” IASEA 2023 Conference- a knowledge exchange platform Over 30 global airport pioneers and influencers at IASEA 2023 shared insights into the future of airports and how Asia Pacific continues to keep up, cementing its position as the must-attend industry conference to understand and navigate opportunities in Asia. Trending conversations discussed at the IASEA 2023 conference were on sustainability and the next major milestone as airports continue to innovate and reinvent their operational models. Asia Pacific’s aviation demand and recovery The conference is very specific to Asia, enabling global airport professionals to understand region-focused challenges" In conjunction with the event, data analyst, Cirium, also presented an exclusive report covering Asia Pacific’s aviation demand and recovery outlook and airport insights with data analytics. “The conference is very specific to Asia, enabling global airport professionals to understand region-focused challenges, traveling behaviors, and regulation issues,” said Anurag Shandilya, Head of Airport Operations, at Noida International Airport. Interactions lead to innovation "Also, Singapore is the most relevant place to hold such conversations for it being so well-connected and as most technology companies are based here." “The key takeaway from the conference is the interaction with industry people, and it is these interactions that will seed the future development innovation.” Speakers at the conference Themed “Re-Conditioning for Asia's Long-Haul Growth”, the conference was headlined by prominent speakers including: Latchida Apaphant, Executive Vice President (Corporate Strategy), Airports of Thailand PLC Anurag Shandilya, Head of Airport Operations, Noida International Airport Michael Portier, Deputy Director Aviation, Surbana Jurong Private Limited Ng Kuan Luen - Director, Ventures, Changi Airports International Tan Lye Teck, Executive Vice President, Safety & Security, Changi Airport Group Mohd Nadziruddin Mohd Basri, Chief Executive Officer, Aviation Services (AVS), Malaysia Airlines Ali Mushthaq, Deputy Chief Officer, Passenger Services, Maldives Airports Company Limited Rafael S. Regular, Assistant GM for Operations (concurrent) Manager, Airport Operations Department, Manila International Airport Authority Eleuterio A. Torrecampo, Officer-In-Charge, Office of the Terminal Manager, Ninoy Aquino International Airport Terminal 1 Rene van Joost, Cargo & Ground Handling Senior Expert, PMO Aviation Services & Cargo (ASC), Angkasa Pura I – injourney Dwi Ananda Wicaksana, Executive General Manager, Soekarno Hatta International Airport Tan Yen Ling, Head, Sustainability and Strategic Projects, SATS Ltd Angela Ng, Director, Aviation Industry, Civil Aviation Authority of Singapore Saurabh Dalvi, Head of Operations (Mumbai, Goa, Hyderabad), CelebiNAS Airport Services India Pvt. Ltd Ma Yin, Vice President, Beijing Daxing International Airport of Capital Airports Holdings Limited Company Joseph Sweet, Aviation Business pioneer | Australasia, ARUP Tim Aldeburgh, Technical Director, Project Management Consultancy & Advisory, WSP Sia Kheng Yok, Chief Executive, Association of Aerospace Industries (Singapore) Jean Roche, Head of International Engineering Services, ADP International Pang Yee Huat, Solution Consultant, Cirium Piyush Chawla, Managing Director APAC, Cirium Prabin Bhattarai, UAV Expert, Civil Aviation Authority of Nepal Richard Tan, Regional Manager Operations, Safety and Security, APAC, International Air Transport Association (IATA) Ben Dawson, Principal, Populous Shantanu Gangakhedkar, Consultant, Frost & Sullivan Asia Pacific Brendan Sobie, Independent Analyst and Consultant, Sobie Aviation inter airport Southeast Asia 2025 will return from 25 – 27 March 2025.
Carlisle Support Services further strengthens security operations by appointing Stephen Grainger as Senior Security Advisor. This strategic addition underscores the company's commitment to continuous improvement of service delivery to its world-class client profile. Having operated in strategic positions of authority and operations within policing in London, the finance sector, local authorities, and within the sporting and events industry at international levels, Stephen will be bringing a wealth of expertise to Carlisle Support Services. Stephen's experience His extensive background encompasses diverse leadership roles, including serving as the Operational Commander at the Metropolitan Police Training College, and the Royalty Protection Command, acting as the Interim Director of Community Safety for Newham Council and functioning as the Chief Operating Officer for a specialized Asset Management Consultancy. For the past 16 years, he operated at the All England Lawn Tennis Club, and since 2013 held the position of Head of Security, responsible for delivering all security at The Championships. Stephen's responsibilities He will work closely with the Director of Counter Terrorism and Risk to guide client interactions As Senior Security Adviser at Carlisle Support Services, Stephen will provide valuable support in several key areas. These include offering strategic and tactical operational advice, conducting gap analysis, and sharing expertise for both day-to-day security contracts and event management. He will work closely with the Director of Counter Terrorism and Risk to guide client interactions, foster integration, and enhance customer satisfaction. Stephen will also be available to work closely with all of Carlisle’s clients on specific and detailed projects, while also providing executive-level advice where required. Shaping strategic approach Chief Executive Officer at Carlisle Support Services, Paul Evans said, “We are very pleased to welcome Stephen to the Carlisle family." "His extensive wealth of expertise will undoubtedly shape our strategic approach as we further contribute to the industry’s ability to adapt to the ever-changing landscape.” Contributing strategically and operationally On his appointment, Stephen added, “I look forward to being part of the Carlisle family and see this as an exciting opportunity to contribute to the business strategically as well as operationally, utilizing my extensive experience." "I look forward to engaging and supporting all colleagues across the company and thank you all for this special welcome.”
IDEMIA, the world-renowned secure identity solutions provider, in partnership with the Iowa Department of Transportation (Iowa DOT), has launched the next-generation of Mobile ID. Iowa residents can download the Iowa Mobile ID app from the Apple App Store or Google Play and start using it immediately to verify their identity from their mobile phone at TSA PreCheck® checkpoints at both the Des Moines International Airport and Cedar Rapids Municipal Airport, in addition to other participating airports in the country. Fully interactive identity solution This fully interactive identity solution has the capability to be used for identity verification This fully interactive identity solution has the capability to be used for identity verification at participating businesses, government agencies, and other organizations both in-person and online. Developed with IDEMIA’s patent portfolio and with principles of privacy by design, end-to-end security, and interoperability in mind, the Iowa Mobile ID is designed to conform to the International Organization for Standardization (ISO) standard for the mobile driving license (ISO 18013-5). Robust security features provide a high level of assurance, so relying parties of mobile ID can be confident that mobile ID holders are who they say they are. IDEMIA’s Mobile ID verification technology (ID Verify SDK) The state of Iowa has also integrated IDEMIA’s Mobile ID verification technology (ID Verify SDK) in the Iowa Alcoholic Beverages Division’s Age to Purchase app, which enables users to scan driver’s licenses with their smartphone. This app allows anyone selling age-restricted products such as alcohol or tobacco to quickly and directly determine the validity of the digital driver’s license and age of the customer using a built-in scanning function. Mobile ID allows Iowans greater control of their information Mobile ID allows Iowans to be in greater control of their information Mobile ID allows Iowans to be in greater control of their information, as users approve requests for each transaction, before any information is shared. Kim Reynolds, the Governor of Iowa, said “Iowa is the first state in the nation to roll out a mobile ID with a large number of businesses across the state capable of accepting the ID. I’m so proud of the DOT and the Department of Revenue’s Alcoholic Beverages Division working together on an innovative solution that provides convenience and added security for Iowans as they use their IDs for a variety of purposes.” Mobile ID App registration process The mobile ID App registration process contains multi-step verification for security and protection. Users register their device’s phone number, binding the mobile ID to their device and their device only. Next, following IDEMIA’s patented methodology, users capture both sides of their state issued physical ID using their smartphone camera and take a selfie that includes liveness detection. This information is verified against what is on file with the system of record, the Iowa Department of Transportation (Iowa DOT), as the second authentication factor. Once identity is confirmed, registration is complete. The third and final authentication factor is when users select and confirm a personal identification number, stored only on the device. Use biometrics, such as Face ID or fingerprint to access the app Users can also use other biometrics such as Face ID or fingerprint to access the app. With IOWADOT pushing regular credential updates to the Iowa Mobile ID app, Iowa businesses can have the most-up-to-date status, including if an ID has been revoked or canceled. With our long-standing partnership, Iowa has been a key player in this transformation since Day 1" Michael Hash, the Senior Vice President (SVP), Civil Identity for IDEMIA Identity and Security North America, said “As the world becomes increasingly more technologically advanced, it is vital state governments join the digital transformation journey, in order to continue to serve their residents, such as offering a convenient, secure, and trusted mobile identification.” He adds, “With our long-standing partnership, Iowa has been a key player in this transformation since Day 1, leading not only their state, but also other states along this journey.” Iowa – first state to deploy IDEMIA’s mobile ID platform Iowa was the first to launch a mobile driver license pilot in the nation using IDEMIA’s technology in 2015 and paved the way for states to step into mobile identification. Now, Iowa is the first state to launch IDEMIA’s latest mobile ID platform, which is designed to support the evolution of the ISO 18013 standard and AAMVA mID Implementation guidelines. With mobile ID, users must consent to sharing their information. Verifiers can identify customers while guaranteeing their privacy, as no personal customer information is stored on the device. Oklahoma, Delaware, Arizona, and Mississippi are additional states that have rolled out IDEMIA’s Mobile ID technology, with more states to launch later this year.
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realize, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionizing the overnight security business. Minimizing criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilizes a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimize the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is Remote Guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilize a combination of methods to effectively analyze potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyze the situation in real time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command center, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customized remote guarding When properly deployed, remote guarding systems are also customized to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional Security Shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A Bounty of Benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilize targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyze incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilize this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilizes a decentralized ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralized, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimize threats or attacks to organizations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organization. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organization to undergo authentication, authorization, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilizes the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organizations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organizations in proper data control, handling, and security. These policies guide organizations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Open platform video technology software is more than just a product; it's a tool that helps customers achieve their desired business outcomes. Safety, round-the-clock security, and increased operational efficiencies are now the norm due to video technology. Responsible Technology Despite humanity’s impressive technological advances, we also recognize the immense responsibility that comes with technological innovation. It's not enough to focus solely on the positive impact video technology can make, we must also be vigilant in identifying and addressing any potential negative consequences it can have on society and its citizens. This is the role of Responsible Technology. Data privacy We want to use all the good things that technology innovation brings, whether it be video, AI, ML, facial recognition, etc. We want to use all the good things that technology innovation brings, whether it be video, Artificial Intelligence, machine learning, facial recognition, etc. to serve people in societies in a responsible way. That means making sure that we regulate technology in a way that respects human rights and data privacy. Addressing the challenges The challenge is, that rather often technology leaders and policymakers either have conflicting interests or collaborate too late. To be responsible, business leaders must support their societies and policymakers in making regulations in the interest of the common good. At Milestone Systems, we are actively looking at how we develop our software responsibly, how our partners responsibly sell our software, and very importantly, how our customers use our software with a responsible mindset. Ensuring good corporate governance As a long-time partner within the security industry, we’re celebrating our 25th Anniversary this year, we are supporting the regulation of video technology for the good of society. However, it of course needs to strike the fine line between the right legislation and not hindering innovation. UNGP The UNGP is the most authoritative and widely adopted set of principles for responsible business At Milestone Systems, we want to play an active role in this and that is why we have pledged our support to the UN's Guiding Principles on Business and Human Rights (UNGP). The UNGP is the most authoritative and widely adopted set of principles for responsible business. The principles call on governments and companies to identify, prevent, mitigate, and remedy actual and potential human rights abuses. Since its launch in 2011, the UNGPs have received wide support from states, civil society organizations, and the private sector, making them the key global foundation for business and human rights. Protect, respect, and remedy Through this commitment, we are taking steps to ensure good corporate governance and ethical standards in the development of our technology. We're generating mechanisms to prevent misuse and we are building educational practices internally. Based on the UNGP’s three pillars: protect, respect, and remedy, we are developing a set of Responsible Technology Principles and procedures for the development, selling, and use of our products. Need for video technology regulation In addition, we are currently evaluating all the various technology areas in which our video software can be used, such as with third-party integrations that utilize e.g., facial recognition. We are mapping out the advantages and disadvantages for societies. One key area of concern is how local authorities are mapping and storing data about us as individuals. This is the reason why we're inviting more legislation to regulate video technology rather than less. Engaging With policymakers We are meeting ministers and trade organizations as we believe this needs to be a joint effort where all parties are heard We are proactively reaching out to and connecting with policymakers and other relevant stakeholders to discuss our approach to and take on Responsible Technology and encouraging the political landscape to work with us around regulation and legislation. We are meeting ministers and trade organizations as we believe this needs to be a joint effort where all parties are heard and where we can openly weigh the advantages and the challenges of technology, whether it is video, facial recognition, machine learning, Artificial Intelligence, or other technologies. Striking a balance Implementing Responsible Technology is a journey, not a destination. To give it the focus needed, we have created a dedicated team to implement this initiative at Milestone Systems. At the same time, we are reaching out to the political landscape to discuss how we balance regulation without hindering innovation. Video technology used ethically We are a global company with worldwide operations, and we are having dialogues about how video technology is being used and how we can have meaningful talks about what regulation and legislation should look like. However, we don’t necessarily want to limit access to the technology itself. Facial recognition We encourage the policymakers to engage with us in the industry so that together we can strike the fine line Facial recognition is a great example of this. The EU is considering making live facial recognition illegal. That would be a huge inhibitor of proactive terrorism prevention. For example, if a well-known terrorist is walking down the street and is being mapped out against Interpol’s most wanted list, the authorities should be able to react. However, if a person walking down the street but is not mapped out or does not have any priors then the city should not be allowed to store the data of that individual’s whereabouts at that point in time. This potential legislation is concerning to me as a citizen of Europe. Instead, we encourage the policymakers to engage with us in the industry so that together we can strike the fine line for the better good of all of us. Maintaining high ethical standards We have a firm understanding and expectation that ethical standards are a huge driver in the security business. Citizens are not in favor of technology companies abusing data about them and monetizing from things that they have not opted in to do. Soon, I think we will see many more companies and governments leaning toward suppliers that do have a responsible mindset and high ethical standards for partnerships. Ethical practices Our journey toward Responsible Technology is an ongoing process, and we must remain steadfast in our commitment to ethical practices and the protection of human rights. We recognize that the rapidly changing technological landscape continually presents new challenges and opportunities. For this reason, we continuously look into how we can improve, for example, our end-user license agreements to avoid potential human rights abuses. An industry responsibility Security companies must prioritize careful planning and preparation, including developing policies and procedures For Responsible Technology to truly become a reality, compliance with international human rights laws and data privacy regulations is critical. Security companies must prioritize careful planning and preparation, including developing policies and procedures that govern the ethical use of video surveillance systems. The secure and ethical community In today's technology environment where deep integrations, machine learning, and artificial intelligence are becoming the norm, Responsible Technology is more relevant than ever. The security industry has a unique opportunity to set an example for other sectors by promoting a secure and ethical development community that prioritizes Responsible Technology, trustworthy data collection, and the protection of human rights. We must all rise to this challenge and embrace our role as ethical leaders for the greater good of both people and societies.
Security beat
Companies at GSX 2023 emphasized new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasizes ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the Mid-Market to the Cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for pure cloud, but there are benefits to be realized from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realize the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘Soft’ Features for Integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organization more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organization more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centers around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasizing performance, protection (cybersecurity), and price, their data centers are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring center where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Audio-video technologies have historically been a silo in the enterprise, separated from the larger network infrastructure by their use of analog, hard-wired and proprietary connections. Software-defined system However, AV devices such as video walls and corporate signage add more value to security and emergency response operations when they are connected to the larger IT network and can interface seamlessly with other systems. That’s the approach provided by Userful, which offers a software-defined system for end-to-end control of audio-video applications in an enterprise, using a web browser and standard industry protocols. The use of software avoids the need for proprietary hardware and the compatibility challenges of multiple hardware systems operating in silos. It also yields visibility and control throughout the system. Single software system The single software system grants IT, administrators, the ability to govern multiple platforms The single software system grants IT, administrators, the ability to govern multiple platforms, while providing individual departments access to the specific applications they need. The emphasis is on meeting stakeholders’ functional requirements using a system governed by the IT department. The data travels across the IT network infrastructure without being blocked by the use of proprietary hardware and cabling, for example. Digital transformation Avoiding the analog (hardwired) approach enables enterprises to “digitally transform” the operation of their audio-video devices. The approach is especially useful at the intersection of security and digital signage. “We give the power back to the local IT administrators, who can govern the system and enable customers to govern their applications,” says Shane Vega, VP of Product Marketing at Userful. The company’s software aggregates video information and distributes it as needed to individual video displays. Real-time event monitoring The software enables various video devices to become a seamless part of the IT infrastructure. It also facilitates sharing of information throughout the enterprise, even in an emergency. In contrast, proprietary, siloed systems hamper the free flow of information when it is needed the most. For example, if there is an emergency or active shooter situation, video devices throughout an organization can be leveraged to inform occupants about the details of the event in real-time and to provide actionable instructions specific to an occupant’s location in the building. Visual communications When security is integrated into a larger platform, it can spread the message visually throughout the enterprise Visual communications, such as digital signage, comprise a powerful extension of a security system that actively monitors threats, and offers the ability to communicate to a large group of people. When security is integrated into a larger platform, it can spread the message visually throughout the enterprise. Strategic messaging can guide building occupants to their best course of action during an emergency, whether it is to flee or to shelter in place. Situational awareness The software-driven IT system can aggregate information from multiple sources, such as video camera feeds or information from an access control system, and display it on a large video wall, for example. Free-flowing information promotes situational awareness in a control room, and enables immediate response, whether it’s to call the fire department, sound an alarm, or initiate a mass exodus of building occupants. IT software approach “It makes everyone strategically aware and sends the appropriate messaging to those who need it, rather than to everyone at once,” says Vega. Facilitating more effective operations centers is the “tip of the spear” of what Userful offers customers, he adds. The IT software approach simplifies video wall applications, which are becoming increasingly complex, by enabling content to be scaled, chopped, and aggregated to fit the demands of a display wall. An analytic might trigger the system to enlarge a camera view on the full screen, to send video to the police, or “take over” screens throughout a building to provide strategic messaging. Third-party integrations Designing video walls more strategically in an operations center can help operators interpret information quickly Designing video walls more strategically in an operations center can help operators avoid fatigue and interpret information quickly and efficiently. “Userful’s role in the display world is to make sure software can distribute the information despite the hardware,” said Vega. Userful works with third-party integration to add system functionality and automate responses. Software flexibility “We’re a platform that pulls in sources of information, maybe it’s a hundred cameras, and then we manage the entire solution,” says Vega. “We enable users to take data from multiple sources and send it to a wide range of displays, creating a repository of information.” “When you have a software-defined platform, you can extend the solution using the flexibility of the software into a system that cannot be achieved with hardware,” says Vega. “If people want to scale their system to multiple locations, we can add a source remotely.” Proactive responses to security “Security is an important market for everyone, paramount for any organization,” says Vega. “Individuals are responsible for the safety and security of constituents and require a proactive, not reactive response.” “We can provide proactive responses because of the nature of AV-over-IP, which is interoperability. It can draw attention to threats and proactively communicate response plans.” Managed service provider The “software-defined” approach can help systems integrators position themselves as a managed service provider Getting away from siloed solutions should be a priority for any IT purchase by an organization, says Vega. “We need to train end-users to take a holistic view and not to look at it from a siloed perspective. A fuller understanding helps them gain efficiencies.” The “software-defined” approach can help systems integrators position themselves as a managed service provider rather than just “selling boxes.” “Think about how you can partner with end-users over the long term,” advises Vega. Information-based automation “Think of technology as a holistic part of the business for better outcomes across the whole business. More information is better information, and integrators can help customers create automation that will provide more awareness.” The Userful proposition offers especially good value in transportation markets, such as ports and airports; and in campus environments, such as enterprise, higher education, and airports. In any scenario where there are a lot of screens, the system can distribute corporate and emergency messaging, whether on a baggage claim screen or a way-finder screen.
Travel volumes at airports have been increasing of late, although still below the 2.5 million or so passengers the Transportation Security Administration (TSA) screened every day, on average, before the pandemic. As passengers return, they will notice the airport security experience has changed during the pandemic – and many of the changes are likely to continue even longer. Need for touchless technology The lowest U.S. air travel volume in history was recorded last April, with approximately 87,500 passengers. As passenger traffic plummeted, the aviation community sought to explore the potential of new technologies to make security checkpoints more contactless and flexible when the traffic numbers return. The pandemic has seen an increase in touchless technology deployed in the screening area. Used for cabin baggage screening, Computed Tomography (CT) produces high-quality, 3-D images to enable a more thorough analysis of a bag’s contents. Imaging Technology Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method Enhanced Advanced Imaging Technology (eAIT), which uses non-ionizing radio-frequency energy in the millimeter spectrum, safely screens passengers without physical contact for threats such as weapons and explosives, which may be hidden under a passenger’s clothing. Millimeter-wave body scanners began replacing metal detectors globally as a primary screening method. AI algorithms Other innovations include an automatic screening lane, centralized image processing, and artificial intelligence (AI). Looking ahead, AI algorithms have the ability to clear most passengers and bags automatically, making the process smoother and freeing up staff to focus only on alarms. The pandemic’s need for contactless screening may accelerate the adoption of AI. CAT machine Credential Authentication Technology (CAT) machines automatically verify identification documents presented by passengers during the screening process. The TSA continues to accept expired Driver’s Licenses and state-issued IDs for up to a year after expiration, based on the premise that license renewals may be delayed and/or more difficult during the pandemic. The REAL ID enforcement deadline was extended to Oct. 1, 2021. Health precautions Checkpoint health precautions have been a part of the airport screening experience since early in the pandemic. Last summer, the TSA announced the “Stay Healthy. Stay Secure” campaign, which included requirements such as social distancing among travelers, ID verification without physical contact, plastic shielding installed at various locations, and increased cleaning and disinfecting. In January 2021, President Biden signed an Executive Order requiring travelers to wear face masks when in airports and other transportation facilities (to remain in effect until May 11). Checkpoint screening Clear is a privately owned company that provides expedited security that uses biometrics either a person’s eyes or face to speed along the process of getting people through checkpoints. TSA officers wear masks and gloves at checkpoints and may also wear eye protection or clear plastic face shields. The limits on allowable liquids a passenger may take on board were broadened to include a hand sanitizer container of up to 12 ounces, one per passenger in a carry-on bag. a paradigm shift Just as aviation security changed after 9/11, the COVID-19 crisis is expected to lead to a paradigm shift to create a safer and more secure environment. Measures were implemented so that passengers, staff and other stakeholders could have continued assurance and confidence in airports amid and after the pandemic.
Case studies
RecFaces, a facial recognition software company, has announced the successful deployment of its flagship product, Id-Guard at Jorge Chávez International Airport in Lima, Peru. This implementation marks a significant milestone in bolstering security measures at one of South America's busiest airports, underscoring the importance of maintaining a high level of safety at public transportation hubs. Jorge Chávez International Airport Jorge Chávez International Airport serves as a vital gateway for travelers and cargo, welcoming more than 20 million international and national passengers every year. With such a high flow of people, ensuring the safety and security of passengers and airport personnel becomes crucial. Recognizing this need, RecFaces collaborated with airport authorities to implement their state-of-the-art Id-Guard solution and help ensure the safety of the facility. Enhanced security measures The solution's features enable airport authorities to prevent suspicious individuals from accessing the site The implementation of Id-Guard has significantly enhanced security measures, allowing for proactive monitoring and rapid response to potential security threats. The solution's features enable airport authorities to prevent suspicious individuals from accessing the site, thereby safeguarding the safety of passengers and staff. Highest level of security “Airport representatives felt the need for facial recognition to strengthen the security structure within the airport as a whole,” notes Maria Kazhuro, Business Development Director for the LATAM region, RecFaces. Maria Kazhuro adds, “Our goal was not only to provide the highest level of security but also to simplify work processes for security guards. We can confidently say that the installation of an ID guard has significantly improved security in the facility. Now both airport visitors and employees can be sure that they are under even greater protection than before.” Id-Guard facial recognition The deployment of Id-Guard at the Peruvian airport demonstrates RecFaces' dedication to excellence and innovation in the field of facial recognition technology. As airports worldwide continue to prioritize security and passenger experience, RecFaces remains at the forefront of delivering advanced biometric solutions tailored to the evolving needs of the aviation industry.
In a landmark achievement for air travel technology, Zayed International Airport has successfully processed over one million passengers through Abu Dhabi’s new terminal since its inauguration on 15 November 2023. This marks a significant milestone in the journey towards enhanced travel efficiency and security, showcasing the power of cutting-edge biometric technology. Building on a long-term commitment to advancing airport capabilities, IDEMIA has been at the forefront of innovation in the UAE since 2011. The deployment of a comprehensive border management solution at Abu Dhabi Airport, featuring the world’s first multi-biometric entry/exit system, has significantly bolstered border security while simultaneously enhancing the passenger experience and throughput. The success of this groundbreaking project has led to its extension to the country’s four other international airports. Rollout of cutting-edge biometrics STJ solution uses advanced facial recognition technology to simplify the passenger venture The Single Token Journey (STJ) solution, a highlight of this collaboration, employs advanced facial recognition technology to streamline the passenger experience. By assigning a unique digital identifier to every traveler, the STJ solution eliminates the need for multiple documents, enabling passengers to move from curb to gate, including the border clearance step, in a record time of just 12 minutes. "The initial rollout of cutting-edge biometrics at Zayed International Airport underscores our dedication to enhancing airport experiences through innovation and technology, ensuring efficiency, convenience, and superior service. Once fully implemented, Abu Dhabi will pioneer as the world’s first airport with biometrics integrated at every stage, ensuring travelers enjoy a seamless, safe, and secure journey," Elena Sorlini, MD and CEO, Zayed International Airport. Efficiency of the STJ solution "We are thrilled to witness the transformative impact of our biometric solutions at Zayed International Airport’s new terminal. This milestone is not just a testament to our successful collaboration with Zayed International Airport but also a clear indicator of our commitment to enhancing the travel experience through innovation." "The processing of over one million passengers since November is a significant achievement for us, and it underscores the scalability, security, and efficiency of the STJ solution. Together, we are setting a new global standard for passenger facilitation," Osama Al Makhamreh, Vice President, Sales – Middle East & Africa, IDEMIA Public Security. Zayed International Airport’s commitment This innovative approach not only enhances security but significantly improves the overall passenger experience. The success of the STJ solution at Zayed International Airport marks a pioneering step towards transforming air travel across the Middle East and potentially the world. The initiative aligns with Zayed International Airport’s commitment to adopting cutting-edge technologies that streamline the travel process, reinforcing the UAE’s position as a pioneering hub for technological advancement and superior passenger facilitation.
On Saturday, the 27th Of January, 2024 an intoxicated man managed to gain access to The Indira Gandhi International Airport’s runway, he was soon after arrested on the tarmac of the runway by the Central Industrial Security Force and then handed to the New Delhi police force. Luckily this man was only drunk, what if he was a determined criminal or even worse a terrorist, think about what damage could have happened in the time between the perimeter being breached and by the time he was arrested. Airport perimeter security deficiencies This starkly illustrates the glaring deficiencies in airport perimeter security, underscoring the urgent need for businesses and proprietors to prioritize this aspect. Perimeter security serves as the first line of defense against unauthorized access, theft, and all threats With such lapses evident in major airports globally, it serves as a compelling reminder of the vulnerability that extends to all. Perimeter security serves as the first line of defense against unauthorized access, theft, and all threats to physical and digital assets. It establishes a boundary, safeguarding critical infrastructure, sensitive information, and personnel. APS Electro-Fence and Flexiguard By deterring intruders and providing early detection, it mitigates risks, enhances safety, and preserves the integrity of protected areas. Advanced Perimeter Systems provides a variety of different perimeter security systems to help prevent events such as this from happening, APS Electro-Fence and Flexiguard would have prevented this from happening.
Chopin Airport in Warsaw, named after the famous Polish composer Frédéric Chopin, has recently undergone an impressive improvement in acoustic technology. System features The installation of an extensive Praesensa system from Bosch Building Technologies marks a turning point in the way information and music are transmitted and played in the airport building. The new system features advanced loudspeaker technology and a high level of automation, providing outstanding sound quality and clear, crisp voice transmission, which is of great benefit to the operator, passengers, and ground staff. Innovative technology for precise communication It uses LS1-OC100E-1 hemi-directional ceiling loudspeakers and LC1-UM12E8 built-in loudspeakers The new passenger information system is based on the Praesensa solution from Bosch. It uses LS1-OC100E-1 hemi-directional ceiling loudspeakers and LC1-UM12E8 built-in loudspeakers, which ensure that passengers at every gate are addressed with pinpoint accuracy and excellent intelligibility. Text-to-speech solution By integrating a text-to-speech solution from a third-party provider, the flight number, airline, destination, and boarding information are automatically retrieved from the central computer at Chopin Airport and reproduced in synthesized voice information. These are output in Polish and English as well as other available languages, achieving a previously unattainable sound quality. The result is a significant reduction in the workload of airport staff. Overcoming old challenges The modernization of the public address and voice alerting system was urgently needed The modernization of the public address and voice alerting system was urgently needed, as the old analog system had reached its limits. Information was often lost in an indistinct fog of sound, and manual announcements of boarding information were both time-consuming and labor-intensive. Enthusiasm for efficiency and quality The integration of the new system into the airport's existing infrastructure went smoothly, which significantly shortened the installation time. The automation and increased efficiency provided by the Praesensa system is appreciated by both staff and passengers alike. The scalability of the system ensures its suitability for future developments and requirements. “Chopin Airport now has a state-of-the-art public address system. The fact we could build on the existing IP infrastructure significantly reduced the amount of time for the installation work,” says Józef Bycul, Project Manager at Bosch Building Technologies.
IDEMIA has been selected by ACSA to implement its solution in South Africa’s three main international airports: OR Tambo, Cape Town, and King Shaka including the border clearance process using the latest e-Gates technologies. Interconnected with all the major airlines in the world, South Africa is a key country when it comes to air transportation in Africa. ID2Travel The four-year project started in October 2023 and will be deployed in three phases. As soon as 2026, nine South African airports will be equipped with IDEMIA’s end-to-end PFF solution: ID2Travel. IDEMIA’s win was made possible by the long-standing relationship with South Africa and in particular the successful implementation of the ABIS program with the Department of Home Affairs (DHA). Biometric solutions IDEMIA’s expertise and solutions regarding its biometric technologies, combine efficiency, accuracy, and equity The biometric solutions deployed in these airports (three international and six domestic) will enhance the quality of services offered to passengers all along their journey, from the check-in to the boarding of the plane. IDEMIA’s expertise in biometrics, repeatedly recognized in industry rankings, enables it to offer advanced fingerprint, facial, and iris biometric technologies that enhance passenger security while making their experience more seamless. The National Institute of Standards and Technology (NIST) latest test results underscore IDEMIA’s outstanding expertise and solutions regarding its biometric technologies, combining efficiency, accuracy, and equity. Facial recognition technology This partnership with ACSA builds on IDEMIA’s long-standing expertise in equipping world-class airports around the globe with its cutting-edge technologies. From Singapore’s Changi airport, which facilitates passenger flow from baggage check-in to boarding the plane, to India’s Delhi, Hyderabad, and Goa airports where facial recognition technology verifies the identity of domestic flyers, to trials at Lyon-Saint Exupéry and Paris-Orly (France), IDEMIA’s solutions are proven to be highly accurate, thereby offering the best security and an efficient and smooth passenger journey. Passenger facilitation solution This new solution will offer our passengers a seamless, unique, and secure new airport experience" "We are thrilled to be launching a new passenger facilitation solution at our nine ACSA airports, and for the first time in Southern Africa. Based on biometrics, airport processes will be automated using state-of-the-art technology from our partner IDEMIA," said Mthoko Mncwabe, Chief Information Officer, ACSA. "This new solution, which we are currently deploying in our airports, will offer our passengers a seamless, unique, and secure new airport experience. In line with our Sustain, Grow, and Digitise strategy, this solution positions ACSA as the pioneering airport management services company in Africa." Safe and smooth passenger experience "We are delighted to have been awarded this landmark contract for IDEMIA in Africa, which demonstrates the competitiveness and quality of the solutions that we provide to our clients worldwide," said Matt Cole, IDEMIA Executive Vice President of Public Security and Identity. "We are looking forward to working with ACSA on this historic and ambitious partnership, which will ultimately ensure a safer and smoother passenger experience at these nine South African airports."
OSI Systems, Inc. (the ‘Company’ or ‘OSI Systems’) (OSIS) has announced that its Security division was awarded a contract from an international airport for approximately $18 million to provide various checkpoint and hold baggage screening solutions. Among the systems to be provided are the RTT®110 (Real Time Tomography) explosive detection system for screening hold baggage, Metor® Walk-Through Metal Detector, and Itemiser® 5X explosive trace detection system for secondary screening of passengers. OSI Systems' checkpoint and hold baggage screening solutions The Company is also engaged to provide comprehensive multi-year maintenance, service, and support As part of this award, the Company is also engaged to provide comprehensive multi-year maintenance, service, and support. OSI Systems, Inc.’ Chairman and Chief Executive Officer (CEO), Deepak Chopra, commented, “We are delighted to work with this major airport customer and look forward to providing our inspection system platforms with advanced technologies that are designed to achieve the highest airport security standards, enhancing both the safety and the overall experience of air passengers.” OSI Systems, Inc. OSI Systems, Inc. is a vertically integrated designer and manufacturer of specialized electronic systems and components for critical applications in the homeland security, healthcare, defense, and aerospace industries. The Company combines more than 40 years of electronics engineering and manufacturing experience with offices and production facilities in more than a dozen countries, in order to implement a strategy of expansion into selective end product markets.
Round table discussion
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Driving the smart homes market is the convenience of simple technology solutions. Almost every home now has a “smart speaker” that makes it easier than ever for homeowners to interface and control their technology. But where does security fit into the new landscape of smart home systems? We asked this week’s Expert Panel Roundtable: What’s new in smart homes and residential security systems?
Products
White papers
Precision And Intelligence: LiDAR's Role In Modern Security Ecosystems
DownloadHow Security Systems Ensure Healthy Workplaces During COVID and After
DownloadEnsuring Cybersecurity Of Video
DownloadRFID and Smartphone Readers in Physical Access Control
DownloadAccess Control & Intelligent Vehicle Screening
DownloadVideos
Airport security: Manufacturers & Suppliers
Multi-Residential Access Management And Security
DownloadGuide For HAAS: New Choice Of SMB Security System
DownloadPrecision And Intelligence: LiDAR's Role In Modern Security Ecosystems
DownloadHikvision: Solar Powered Product Introduction + HCP
DownloadBank Security
Download