Mergers & Acquisitions
They are excited to announce that RapidSOS is officially integrated with Apple Emergency SOS Live Video, now available with the release of iOS 18! Emergency SOS Live Video allows those in need to share streaming video and recorded media during emergency calls. During an emergency call, participating emergency dispatchers can send a request to share live video or photos over a secure connection, making it quicker and easier to provide urgent assistance. Emergency SOS Live Video ECC telecommuni...
Pimloc a world-pioneering AI video privacy, redaction, and intelligence company announces a project pilot with Sussex Police and Microsoft. The collaboration helps to make multimedia redaction for subject access requests and digital evidence faster and more accurate through the implementation of cutting-edge artificial intelligence technologies, which marks the start of an exciting business development for Pimloc. Pimloc’s advanced AI Secure Redact is the ideal key for this union, as it...
Quanergy Solutions, Inc. invites attendees of GSX Orlando 2024 to experience the “next big thing” in physical security with their Q-Track™ 3D LiDAR (Light Detection and Ranging) solution on show, designed for advanced security and business intelligence applications. “At Quanergy, we believe that 3D LiDAR technology is a game-changer for the physical security landscape,” said Enzo Signore, CEO of Quanergy. “GSX Orlando is the perfect stage to showcase how our...
Dataminr, one of the world’s pioneering AI companies, is launching ReGenAI (Regenerative AI), a new form of generative AI that automatically regenerates textual descriptions as events unfold. Using predictive AI to analyze and synthesize key developments detected in more than one million public data sources, ReGenAI distills multidimensional events into concise event briefs that dynamically update. Regenerating event Customers can gain a rapid understanding of an evolving event th...
MERON, a new entry in the cyber-physical security marketplace, is showcasing its innovative new Physical Identity, Access and Incident Management solution branded MERON PIAM+ here at GSX 2024 in booth 1955. The new highly scalable, intelligent, and fully integrated platform leverages the most advanced modern technologies to establish new benchmarks in performance and cost efficiency for large enterprise applications. Advanced AI engine MERON PIAM+ uses the latest ideas in computer science in...
A new entry in the cyber-physical security marketplace making its first public introduction, MERON is demonstrating a groundbreaking new solution for Physical Identity and Access Management (PIAM) branded PIAM+ here at GSX 2024 in booth 1955. MERON is launched by industry veterans Sharad Shekar and Imran Rana with the mission to usher in the next generation of AI-driven PIAM and Security Incident Management that overcomes the longstanding shortfalls of legacy solutions. Robust PIAM...
News
Securitas Technology, a world pioneer and global provider of security, health, and safety technologies, unveiled its Sustainability Initiatives, a pioneering effort to promote environmentally sustainable solutions in the electronic security industry. This initiative will be launched at the Global Security Exchange (GSX) 2024 show, September 23-25, in Orlando, Florida. Consumption of security devices Securitas Technology incorporates data on greenhouse gas emissions in all new sales proposals As part of this initiative, Securitas Technology will now incorporate data on greenhouse gas emissions in all new sales proposals to clients and prospective clients in the United States and Canada. The information will be calculated based on the annual energy consumption of security devices or systems, expressed in CO2 equivalent. Research shows that approximately 70% of the lifetime emissions of electronic security equipment are attributed to power consumption. Committed technology partners “Achieving a more sustainable future requires collective action, and sustainability is increasingly at the forefront of our clients’ priorities,” said Tony Byerly, Global President and CEO, Securitas Technology. “We are proud to step out and lead the industry to be more environmentally responsible, alongside our committed technology partners who have provided essential data for this important initiative. By offering clients accurate data on the emissions from the power consumption of our solutions, we empower them to make informed choices that not only enhance security but also reduce the environmental impact.” Data for client proposals Emissions data for client proposals developed in collaboration with Securitas Technology The emissions data for client proposals has been developed in collaboration with Securitas Technology’s strategic partners, representing many of the world’s pioneering manufacturers and innovators in the security industry. “As the world’s second-largest commercial electronic security company, we take our leadership role in seeing a different world seriously, and this is just the start of our journey,” declared Byerly. Expanding remote services In addition to providing emissions data, Securitas Technology is committed to expanding its remote services to help clients reduce or eliminate travel to sites and the associated emissions. The company aims to help clients minimize their environmental footprint through insights on occupancy patterns to optimize heating and lighting, transitioning clients to more efficient cloud-based systems, and building a more sustainable security ecosystem. Sustainable security solutions “Just as every client has unique security needs, they also have specific sustainability targets,” said John Tomin, Global Sustainability Officer, Securitas Technology. “By gaining a deep understanding of these challenges from the outset, we can work in partnership with clients to offer more sustainable security solutions that contribute positively to our shared sustainability goals.” Aligned with the SBTi Securitas is the first security solutions firm to have its sustainability targets validated by SBTi The Sustainability Initiative is structured to align with the Science Based Targets initiative (SBTi), a global commitment made by Securitas AB, the corporate parent of Securitas Technology. Securitas is the first global security solutions company to have its sustainability targets validated by SBTi, committing to reducing absolute scope 1, 2, and 3 greenhouse gas emissions by 42% by 2030 from a 2022 base year. This commitment is aligned with the Paris Agreement’s 1.5-degree Celsius goal. Expanding remote service Securitas Technology measures and reports on its sustainability progress under the SBTi framework annually. The company is actively pursuing several actions to reduce its own emissions, including the adoption of circular economy practices, and expanding remote service offerings, among many other considerations.
Cowbell, a pioneering provider of cyber insurance for small and medium-sized enterprises (SMEs) and middle-market businesses, is expanding its capacity to underwrite businesses with an annual revenue of up to dollar 1 billion, it was announced. With capacity from of global specialty (re)insurance leader Chaucer Group, America’s middle-market businesses - who continue to battle with the increasingly complex world of cyber risks and technology errors and omissions (E&O) - will now be able to benefit from dollar 5M primary and excess limits on Cowbell’s Prime 250 cyber and Prime Tech E&O products. Risk management services Customers will also have access to Cowbell 365, which offers on-demand risk management services Customers will also have access to Cowbell 365, which offers on-demand risk management services, and Cowbell Academy, an e-learning center for brokers. Cowbell’s decision to expand into the middle market is a direct response to the growing cyber risk landscape for businesses of this size. According to the National Center for the middle-market, middle-market companies represent only 3% of US businesses, yet are responsible for providing one-third of private sector jobs and generating more than dollar 10 trillion in annual revenue. Suite of policyholder services These companies, however, are often underprepared for cyber threats; 24% of mid-sized firms say they have suffered a cyberattack in the last 12 months, while 61% lacked dedicated cybersecurity personnel, according to reports. As well as extending the availability of its market-pioneering cyber insurance offerings beyond SMEs, the firm has also built a refined suite of policyholder services both in-house and with the help of new partners, designed to support the complex needs of businesses with dollar 250M to dollar 1B in annual revenue. Middle-market policyholders will benefit from: An experienced and responsive underwriter assigned to every account, offering Select Services and collaboration. A range of cybersecurity services, including Micropen testing, individualized risk consultations, and 12 months of free cybersecurity awareness training for employees - valued at up to dollar 40,000 depending on company size. Strengthened cyber resilience managed intelligence packages that may include, but are not limited to, company-level threat assessments, executive-level security monitoring and protection, a dedicated customer success director and RFI and report package subscriptions. Cybersecurity services Piers Tuggey, Head of Cyber at Chaucer Group, says: “America’s middle-market businesses are increasingly reliant on technology to deliver their services to customers. With the growing complexity of operations and the ever-changing cyber threat landscape, they’re also facing unprecedented exposure to cyber risks and for them, more traditional offerings may fall short." "Our partnership with Cowbell will help customers access the most suitable, and robust packages of tailored cybersecurity services. This collaboration is about strengthening the cyber resilience for a segment of companies that provide a huge proportion of US private sector jobs and GDP.” Cowbell’s expansion announcement Cowbell’s latest growth report comes after a successful track record serving SMEs Aiming to contribute to the resilience of the American business landscape, Cowbell’s latest expansion announcement comes after a successful track record serving SMEs and follows the successful dollar 1 billion playbook developed over the past year in the UK. As well as leveraging its extensive and continuously monitored risk pool-comprising 45 million US- and UK-based SMEs, with up to dollar 1B in annual revenue-the company’s extensive data and insightful educational tools are shared with brokers in both regions, empowering them to engage in more informed discussions with their clients, and facilitate better understanding and assessment of cyber risk scenarios. Employee training programs Trent Cooksley, Co-founder & Chief Operating Officer at Cowbell, says: “By leveraging our proven track record, vast risk pool and innovative technology Cowbell will be able to strengthen the cyber resilience of not only SMEs, but also businesses with greater complexities and larger operations." "But this is also about relationship-building, collaboration, and trust-we’re committed to helping brokers and their clients recognize the full scope of benefits that we bring to the table, whether it's savings on employee training programs or having a dedicated, responsive underwriting partner who provides transparent communication and tailored solutions.”
Bugcrowd, the pioneer in crowdsourced security, announced that Patrick Morley has joined its board of directors. Morley served as CEO of Carbon Black, a cloud-based endpoint security software provider, for 14 years. He led the company from its early days to an IPO on Nasdaq in 2018 and subsequently oversaw its acquisition by VMware in 2019. Bugcrowd Platform Morley joins a seasoned board at Bugcrowd, which has guided the company through significant growth in 2024. This growth includes a major $102 million funding round, the acquisition of Informer, and the addition of over 130 new customers to the Bugcrowd Platform in the first half of this year. “I joined Bugcrowd because I believe they’re going to win the market—and I want to help make that happen,” said Patrick Morley, Board Member, Bugcrowd. Real innovation in cybersecurity Morley aided grow the firm from 20 employees to 1,200, servicing over 20,000 customers Morley added: “Bugcrowd has proven its platform leadership in crowdsourced security and is perfectly positioned to lead this space. It’s an exciting time to be part of a team that’s driving real innovation in cybersecurity, and I’m eager to contribute to that success alongside such a talented Board and leadership team.” During his tenure as CEO of Carbon Black, Morley helped grow the company from 20 employees to 1,200, servicing over 20,000 customers. In 2019, VMware acquired Carbon Black for $2.1 billion. Before his time at Carbon Black, Morley was CEO of digital-identity company Imprivata, followed by COO of former software company Corel Corporation. Bugcrowd Platform capabilities “With Patrick, we are adding another seasoned cybersecurity operator to our accomplished team on the board,” said Dave Gerry, CEO, Bugcrowd. “Bugcrowd is growing quickly and doing so in many ways. The company itself continues to grow, the Bugcrowd Platform capabilities are advancing, and we are finding market success through a slew of new customers." "During this period of growth, I am delighted to add another experienced voice to the company’s leadership and particularly someone who has led a company in a similar stage as Bugcrowd is now. I look forward to working with Patrick as Bugcrowd continues to make strides in the second half of 2024.” Bugcrowd’s unique approach Bugcrowd’s unique "skills-as-a-service" approach has uncovered more high-impact vulnerabilities The Bugcrowd Platform connects organizations with trusted security researchers and hackers to help proactively defend themselves against sophisticated threats. For over a decade, Bugcrowd’s unique "skills-as-a-service" approach has uncovered more high-impact vulnerabilities than traditional methods, along with clearer ROI, for more than 1,200 customers – including OpenAI, Google, T-Mobile, Carvana, the US DoD’s CDAO, ExpressVPN, Rapyd, New Relic, and OpenSea. Bugcrowd’s crowdsourced solutions With unmatched flexibility and access to a decade of vulnerability intelligence, the Bugcrowd Platform has evolved to address a changing attack surface influenced by the adoption of mobile infrastructure, hybrid work, APIs, crypto, cloud workloads, and AI. Bugcrowd’s crowdsourced solutions include penetration-testing-as-a-service, managed bug bounties, vulnerability disclosure programs (VDPs), and AI Safety and Security products.
911inform, a pioneer in comprehensive emergency response solutions, proudly announces that the U.S. Department of Homeland Security has officially designated its innovative emergency management platform as a Qualified Anti-Terrorism Technology (QATT) under the Support Anti-Terrorism by Fostering Effective Technologies (SAFETY) Act. This prestigious designation recognizes 911inform's critical role in enhancing public safety and its ability to prevent, detect, and deter acts of terrorism. SAFETY Act designation Verified user feedback is reviewed to ensure the technology meets the highest standards of safety Technologies awarded the SAFETY Act Designation undergo a thorough assessment process, including independent system performance testing, real-world operational effectiveness evaluations, and a detailed review of quality control procedures. Verified user feedback is also reviewed to ensure the technology meets the highest standards of safety and effectiveness. “We are honored to receive the SAFETY Act designation, solidifying 911inform’s reputation as a pioneer in emergency management technology," said Ivo Allen, Founder and CEO of 911inform. Cloud-based platform Allen added: "This recognition underscores our commitment to developing technology that improves emergency response and mitigates the risk of school-related violence. It further proves 911inform is a trusted partner for government agencies, schools, and private organizations nationwide.” 911inform’s cloud-based platform provides advanced capabilities like 9-1-1 call location discovery, situational awareness, and event management. It is designed to support school staff, first responders, and emergency personnel in managing and responding to a range of crises—from everyday emergencies to large-scale events. Effective anti-terrorism technologies SAFETY Act encourages the advancement and use of effective anti-terrorism technologies Key features include precise caller location identification, instant notifications, detailed floor plans, and connected building, door, and camera controls. The SAFETY Act, established under the Homeland Security Act of 2002, encourages the advancement and use of effective anti-terrorism technologies by providing support and liability protections for companies that develop and commercialize these innovations. The designation is valid through September 2029. 911inform’s technology 911inform’s technology is utilized in all 50 states and over 12,000 buildings and schools, delivering immediate response to emergencies with its all-encompassing toolkit. The platform has been shown to reduce a school’s average complete lockdown time from 20 minutes to just 50 seconds and has saved seven lives. The platform is available to a range of institutions, including schools, universities, public organizations, and businesses across various industries.
Rapid7, Inc., a pioneer in extended risk and threat detection, announced the availability of Vector Command, a fully-managed offensive security service. Vector Command combines the external attack surface assessment capabilities of Rapid7’s recently launched Command Platform with continuous Red Teaming services by its internal experts to help customers identify and validate IT security posture weaknesses from an attacker’s perspective. Security risks Vector Command delivers a continuous discovery, assessment, and validation service As the attack surface expands through shadow IT, cloud resources, SaaS solutions, and more, security pioneers must maintain visibility of their organization’s internet-facing assets and the security risks those external exposures introduce. Vector Command delivers a continuous discovery, assessment, and validation service that goes beyond vulnerabilities to confirm that the overall state of an organization's IT security posture and controls are sufficient in thwarting would-be adversaries. Vector Command managed service “Attackers are constantly performing reconnaissance in an effort to get a foot in the door,” said Jeremiah Dewey, senior vice president, service delivery, Rapid7. “The Vector Command managed service proactively assesses the customer’s external attack surface — in the same way a threat actor would — to pinpoint weaknesses like previously unknown vulnerabilities, misconfigurations, or missing security controls. With our skilled Red Teamers continuously emulating real-world attack scenarios, customers will be able to validate exposures and defenses, monitor readiness, and build resiliency against future threats.” Key benefits of Vector Command Customers using Vector Command will note the following key benefits: Increased visibility of the external attack surface with persistent, proactive reconnaissance of both known and unknown internet-facing assets. Improved risk prioritization with ongoing, expert-led Red Team operations that cut through the noise of EASM-only tools as well as the latency of point-in-time security testing exercises to surface validated critical exposures. Guaranteed same-day reporting of successful exploits, clearly visualized attack paths, and regular expert consultation to confidently drive remediation efforts and resiliency planning.
The PSA Network (PSA), the world's largest consortium of professional systems integrators, will host its annual convention October 14–17 in Marco Island, Florida, at the JW Marriott Beach Resort. The event is exclusive to PSA's network of security integration members and owners. Attendees will travel from across the country to attend top-tier education sessions, network with peers and participate in planned excursions in paradise. PSA Convention 2024 “Our team has worked hard to ensure PSA Convention 2024 is an exceptional event,” said Matt Barnette, president and CEO of PSA. “From the educational lineup to the networking opportunities, PSA members will be impressed. We cannot wait to see the impactful conversations and collaborations that will emerge.” Data-driven insights Jeremy Bess and Patrick Luce will assign attendees with data-driven insights to cut via the noise Josh Linkner will headline PSA Convention with his keynote address on how small, everyday innovations can drive oversized results. In this inspiring, timely and high-impact keynote, Linkner will show attendees how to de-risk the creative process, build the capacity to unlock breakthrough transformations and gain the creative confidence to take responsible risks. Likewise, economists Jeremy Bess and Patrick Luce will empower attendees with data-driven insights to cut through the noise. The presentation will connect the microeconomic dynamics of the security markets with the core economic phenomena that PSA integrators deal with every day. Key technology partners Another excellent dynamic of PSA Convention is the opportunity for integrators to make personal connections with key technology partners. Sponsors of this year's event include: Aiphone Ai-RGUS AirSight Altronix AMAG Technoogy Arxys ASSA ABLOY BCD Bosch Security and Safety Systems ComNet by acre security Digital Watchdog Hanwha Vision HID IML Security Solutions LenelS2 Pelco SECLOCK Snellings Walters Velasea VICON Windy City Wire Zenitel Zitko If they are a PSA member interested in attending PSA Convention 2024, visit the PSA Convention website. Registration includes a three-night hotel stay if they register before September 23.
Expert commentary
Security manufacturers throw around the term “scalable” a lot these days, but few dive into what scalable really means for modern organizations and their security programs. Achieving true scalability, or as I like to refer to as “expandable with a purpose,” takes planning and coordination from security pioneers alongside the broader organization. Implementing a flexible strategy is critically important in the age of advancing analytics and intelligence-driven technology. So what exactly do we mean by “scalable”? "Scalable" refers to the capability of a system, process, or technology to handle growth or increased demand without compromising performance, efficiency, or quality. To put it simply, scalability refers to the ability of a solution to expand or adapt to accommodate larger workloads, higher volumes of data, or increased complexity without requiring significant changes to its underlying architecture or design. It’s not enough to create a “fix it and forget it” security program. Not only do the needs of the organizations shift, but growth (or even shrink) is inevitable. How to Approach Growth Pioneers must be prepared to adapt their strategies and approaches to manage security risks For many security pioneers, growth has a trickle-down effect. Expansion through mergers and acquisitions or organic growth, in addition to decreases in facility or employee count, directly impacts the security program. Whether it’s an increase or decrease in size, workload, or scope, these pioneers must be prepared to adapt their strategies and approaches to efficiently manage security risks while maintaining operational efficiency. Here are some ways security pioneers can approach growth: Assess the here and now: Begin by looking at the current state of your security program, including the resources, capabilities, processes, and technology infrastructure. Understanding existing strengths, weaknesses, and areas for improvement can help inform planning for the future. Align with the business: This might be one of the most important considerations to make, but ensuring security pioneers understand the organization’s growth objectives, priorities, and risk tolerance levels is critical to the success of a security program. The most successful security pioneers will be able to align security strategies with business goals to ensure security investments and planning are enabling the company’s growth initiatives. Invest in scalable solutions: Invest in solutions that offer flexibility and can adapt to the changing needs of the organization. Closed systems that can’t integrate fully with new technologies will severely limit the security team’s ability to seamlessly manage the security portfolio. Optimize processes: Reviewing security processes and workflows – or investing in a platform that can streamline this for you – can improve efficiency and effectiveness for your security team. Identifying opportunities for automation and standardization can allow for scaling as business needs change. Collaborate across departments: Preparing for growth initiatives requires extensive communication across departments, including leadership teams, human resources, legal, IT, facilities, and many other stakeholders ensure that security priorities, challenges, and requirements are effectively communicated and integrated. Adopting these approaches helps put security teams in the driver’s seat, effectively managing periods of growth and change without compromising the safety and security of the organization. Technology considerations As security pioneers navigate investments in new technologies that achieve some of the approaches listed above, such as aligning strategy with business goals, optimising processes, and cross-departmental collaboration, there are several considerations to make. Looking at how technology can support (or even hinder) future growth. For example, when making a buying decision around access control systems, security pioneers must consider the number of users, number of credentials, server requirements, facilities, hardware end points, and software features. As these items are being addressed in an RFP or in conversations with a vendor, security pioneers must ask themselves, “Is there a scenario where my program will outgrow the system’s capabilities in any of these areas?” If so, the answer might be to select a different solution. Security pioneers must consider interoperability. We talk a little about this above, but the importance here cannot be overstated: integration is key. The ability to leverage multiple point solutions, such as access control systems and video surveillance cameras – regardless of manufacturer – provides growing companies with the ability to scale quickly and more efficiently than ever before. Centralizing the ability to pull these solutions into a single security operations management platform allows security pioneers a better view of their security programs in a current – and even future – state. Cloud-based solutions can provide the ultimate scalability factor, providing flexibility and accessibility advantages compared to traditional on-premise systems. Cloud-based, or Software-as-a-Service (SaaS) platforms, can easily scale up or down based on changing needs, accommodate distributed environments, and provide remote access and management capabilities, making them well-suited for scalable physical security deployments. Data-driven insights and analytics can drive decision-making beyond security, making technology investments that provide these critical. Automated workflows, event-triggered alerts, and AI-driven analytics can streamline security processes, improve threat detection capabilities, and reduce manual intervention, enabling security teams to manage larger environments more efficiently. Centralised management of technology investments can create cohesion for security teams. Centralised management and monitoring of physical security systems across multiple locations or facilities enables personnel to efficiently oversee and control security operations, access controls, and incident response activities. Being able to manage security in a single platform provides security pioneers with the ability to assess staffing levels, streamline training, allocate resources effectively, and scale to additional sites and/or solutions as needed. Tasked with building a security program that can adapt to the changing needs of the organization, security pioneers must consider a number of factors when setting strategy. First and foremost, taking a close look at the existing program to identify strengths and weaknesses, then truly assessing the technology and processes in place, is the best way to move forward and future-proof the organization.
In the realm of physical security, the distinction between being perceived as a security vendor and a security partner holds great importance. While both may seem interchangeable at first glance, how an organization is viewed by its clients can have a huge impact on the success of its security programs. At the heart of this differentiation is the concept of relationships and how they shape the dynamics between providers and their clients. Time, care, and diligence For security vendors such as systems integrators, security dealers, monitored services providers or manufacturers that sell directly to the end user elevating from supplier to partner requires a greater investment of time, care, and diligence. However, the eventual payoff can be incalculably advantageous to the organization. Not only does this approach better serve the client but it also cultivates longer-term business and is more likely to generate referrals. Clients will change vendors often but stick with partners for the long haul. Simple installation and/or service Security end-users should look to their security products and service providers to partner with them Security end-users should look to their security products and service providers to partner with them, be vested in their success, and be part of the solution. They should seek out and expect more than a simple installation and/or service in the absence of any real, tangible, and value-added relationship with stakeholders. That means looking deeper than the similar cameras or equipment most vendors provide. Doing so brings benefits from the partnership in solving problems and creating strategies for mitigation. Vendors have short shelf lives A security vendor is typically seen as a transactional company that offers products or services to address specific security needs or challenges. When an organization engages with a vendor, the focus is primarily on the exchange of goods and/or services for a fee. The relationship tends to be more transactional, with limited interaction beyond the scope of the security solution being provided. Tools, technologies, or service offerings The relationship between a security vendor and a client is often short with a one-time purchase Security vendors often play a crucial role in the security industry by offering specialized tools, technologies, or services that can help organizations improve their defenses against threats. Examples would be video surveillance, access control, intrusion detection, or fire/life-safety systems, as well as the monitoring of any of them from a central monitoring station or security operations command center. The thing about it is, however, that the relationship between a security vendor and a client is often short with a one-time purchase and limited ongoing engagement or consultation. Partners prove their value On the other hand, a security partner is viewed as a member of the team that works closely with an organization to address its security challenges. Unlike a vendor, a security partner is invested in the long-term success of their clients and is committed to building a strong relationship based on expertise, trust, and transparency. Creating custom solutions Security partners go beyond offering products or services by engaging with companies and organizations Security partners go beyond offering products or services by engaging with companies and organizations to understand their unique security needs, goals, and challenges. They work concurrently with organizations to develop customized security solutions, provide support and guidance, and adapt to ever-changing threats and risks. When this kind of scenario is developed, the potentially distracting and detracting focus on monetary cost moves to the back burner because the value and return on investment (ROI) are so thoroughly compelling. Relationships bring real benefits The core of the difference between being perceived as a security vendor and a security partner hinges on the crucial role of relationships. While vendors focus on transactions and sales, partners prioritize collaboration and a sense of being in it together. Building strong relationships based on trust, communication, and shared goals is essential for forging a successful security partnership. Personalized approach Security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients. They can be reached easily when needed and emphasize a personalized approach with custom-tailored solutions. By building strong relationships based on respect and understanding, security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term. Operational opportunities Businesses and facilities often encounter or face very specific security needs that can only truly be solved in concert with a vendor that essentially acts like an extension of the end-user organization. Furthermore, when communicating and collaborating on that level, additional security/safety and sometimes even operational opportunities for improvement come to light. This amplifies the value for both the end customer and their security vendor. Talk about a win-win! Prosper with partner power While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment At the end of the day, the difference between being a security vendor and a security partner is not merely a matter of semantics. It is about the fundamental difference in approach and mindset toward physical (electronic and networked) security. While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment to reducing losses and crime. Quality of relationships Ultimately, it is the quality of relationships that separates providers in the security space and determines the success of security initiatives in the current rapidly changing security landscape. This unification of intent, practice, and purpose enables practitioners and the public alike to harness the full power of pioneering-edge technologies that support the security industry’s core mission of protecting people and property. Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town center stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behavior also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorized access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimize this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorized entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
Security beat
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-center at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Center SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call center software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasizing feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrollment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defense in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panelists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasizing tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt, and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalized a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
The sale of Carrier’s Global Access Solutions to Honeywell in December amounted to a dramatic finish to a big year in 2023 for mergers and acquisitions (M&A) in the physical security market. In the transaction between two industry giants, Honeywell sought to enhance and strengthen its building automation capabilities with the acquisition of Carrier’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. Honeywell acquires Carrier Access business The acquisition, which includes both hardware and software solutions, will mean a new corporate owner for the LenelS2 brand, a pioneering business for over 25 years in commercial and enterprise access solutions, including well-known offerings Onguard and Netbox. In addition, the acquisition covers the Onity brand of electronic locks, including hospitality access, mobile credentials, and self-storage access; and the Supra brand of cloud-based electronic real estate lockboxes. ADT sells commercial business, which rebrands as Everon ADT Inc. announced the sale of its commercial security, fire, and life safety business unit to GTCR ADT Inc., another industry giant and a trusted brand in smart home and small business security, announced the sale of its commercial security, fire, and life safety business unit to GTCR, a private equity firm, for a purchase price of $1.6 billion. ADT Commercial, a security integrator and premier provider of commercial security, fire, and life safety in the United States, announced that it will move forward as a standalone organization and rebrand as Everon. Bosch to sell building technologies products Bosch Building Technologies announced in 2023 that it is realigning its Building Technologies division to focus solely on its regional integrator business, with solutions and services for building security, energy efficiency, and building automation. Therefore, Bosch plans to sell most of the Building Technologies division’s product business. At year-end, Bosch was seeking a buyer who would take on all three business units with their associates and locations. This includes the Video, Access and Intrusion, and Communication business units, and affects some 4,300 associates at more than 90 locations worldwide. Building its integrator business earlier in 2023, Bosch announced the acquisition of Paladin Technologies, Inc., headquartered in Vancouver, Canada, a provider of security and life safety solutions and system integration services in North America. Motorola acquires IPVideo, creator of HALO Sensor In another deal emerging late in 2023, Motorola Solutions acquired IPVideo Corp., Bay Shore, N.Y., the creator of the HALO Smart Sensor, an all-in-one intelligent sensor that detects real-time health and safety threats. The powerful capabilities of the HALO sensor extend Motorola’s end-to-end physical security offering by integrating a non-video threat detection product into the safety and security ecosystem. IDIS acquires Costar Technologies Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. Korean video manufacturer IDIS and U.S. company Costar Video Systems had enjoyed a long-term existing ODM (original design manufacturer) relationship, and approximately 60% of Costar Video products were already made by IDIS. Therefore, it made sense when IDIS Co., Ltd. and Costar Technologies Inc. announced an agreement and plan to merge, with IDIS acquiring Costar. Leveraging Costar's established distribution networks and sales channels in the U.S. gives a significant boost to IDIS' growth strategy, which is founded on building long-term relationships with systems integrators. Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. that will benefit from IDIS’ NDAA-compliant and 100% Korean-made technology. SECOM invests in Brivo and Eagle Eye Eagle Eye Networks, a cloud video surveillance company, and Brivo, a provider of cloud-based access control and smart space technologies, announced one of the largest investments to date in cloud physical security in 2023. SECOM CO., LTD, based in Japan and one of the largest security integration companies in the world, has made a primary equity investment of $192 million in the two companies, $100 million in Eagle Eye Networks, and $92 million in Brivo. $100M primary equity investment Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific Eagle Eye Networks, a global pioneer in cloud video surveillance, announced it will use the $100M primary equity investment to expand its suite of AI-powered products, fund geographic expansion, and enhance its enterprise features. Brivo will use the investment to grow sales and marketing, accelerate product development scale support and operational functions, and evaluate strategic acquisitions. Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific, and enhance the smart spaces and AI functionality in the Brivo Access Platform. ACRE buys PremiSys Portfolio ACRE, a security company built on acquisitions, is continuing to broaden its portfolio and serve the expanding needs of its customer base. In 2023, ACRE acquired the PremiSys software and hardware portfolio and assets from IDenticard. PremiSys’ technologies enable organizations to self-manage door access and view integrated video and lockdown facilities. The acquisition extends opportunities for ACRE in healthcare, education, data centers, and senior living facilities. Qognify is a part of Hexagon Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond Qognify, a provider of video (VMS) and enterprise incident management (EIM) solutions announced that it has become a part of Hexagon. Qognify joins the Safety, Infrastructure & Geospatial division of Hexagon, following the completion of its acquisition originally announced on Dec. 19, 2022. Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond to incidents, providing a more robust offering. ASSA ABLOY continues its acquisition trend ASSA ABLOY continued to acquire companies in 2023 to strengthen its position in mature markets by adding complementary products and solutions to the core business. Among the companies acquired in 2023 were Ghost Controls, a U.S. supplier of automated residential gate openers, and Securitech Group, a manufacturer of high-security mechanical and electronic door hardware products in the U.S. Door and fencing ASSA ABLOY also acquired Leone Fence, a Canadian manufacturer, distributor, and installer of fencing products for commercial and residential applications, and Lawrence Hardware and Gallery Specialty, providers of commercial hinges, locksets, exit devices, and door hardware accessories in Canada. Another new acquisition is Inovadoor Portas Industriais Ltda, a Brazilian manufacturer of sectional and high-speed doors. Earlier in 2023, ASSA ABLOY completed the acquisition of Spectrum Brands’ Hardware and Home Improvement division and the divestment of Emtek and the Smart Residential business in the U.S. and Canada to Fortune Brands.
Companies at GSX 2023 emphasized new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasizes ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the Mid-Market to the Cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for pure cloud, but there are benefits to be realized from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realize the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘Soft’ Features for Integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organization more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organization more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centers around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasizing performance, protection (cybersecurity), and price, their data centers are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring center where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security Safety Act Designation, announced the expansion of its proactive AI-based gun detection and intelligent situational awareness solution across all middle and elementary schools in Florida’s Leon County School District. This decision follows the successful initial implementation of the technology on five Leon County high school campuses. Reliability and accuracy "After a successful ZeroEyes deployment in our high schools, we are very confident in the technology's reliability and accuracy," said Jimmy Williams, Chief of Safety and Security Staff for Leon County Schools. “ZeroEyes has consistently delivered on its promises, proving effective in distinguishing real threats from non-threatening situations. Expanding this technology to our middle and elementary schools is an essential step in our ongoing commitment to student safety.” ZeroEyes Operations Center Leon County Schools is headquartered in Tallahassee, FL, and is the sole school district of the county Leon County Schools is headquartered in Tallahassee, Florida and is the sole school district of the county. Its mission is to support an engaging, safe and respectful learning environment that embraces change and produces successful learners who value diversity and are conscientious contributors to society. ZeroEyes' AI gun detection and intelligent situational awareness software layers onto Leon County Schools’ existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry’s only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school administrators as quickly as three to five seconds from detection. School security innovation "Leon County Schools has been at the forefront of school security innovation, and we are honored to support their efforts," said Mike Lahiff, CEO and co-founder of ZeroEyes. "Their satisfaction with our system's performance and accuracy confirms the value of our technology in protecting communities. We look forward to continuing our collaboration and helping to ensure the safety of all students and staff across the district."
Corsight AI's facial intelligence technology, in collaboration with Digital Barriers, has enabled Essex Police to recognize faces both in real-time and during retrospective investigations. Digital Barriers, known for its patented AI-based video codec and secure edge platform, specializes in delivering live cellular video solutions for a range of scenarios, including military operations in Afghanistan, securing royal and presidential events, and the Olympics. Facial intelligence technology To ensure privacy, images of people not on the watch list have been deleted almost now, with no data retention or storage The deployment of facial intelligence technology led Essex Police to make three arrests at the Clacton Airshow on August 22 and two additional arrests in Southend on August 25 and 26. These arrests were related to serious offenses, including sexual assault. The technology, provided by Corsight AI and Digital Barriers, not only identified individuals wanted for serious crimes but also enforced orders against those on a watch list and protected vulnerable individuals at risk of harm. To ensure privacy, images of individuals not on the watch list were deleted almost instantly, with no data retention or storage. Utilizing new technology Assistant Chief Constable Andy Pritchard stated, “We’re an innovative and forward-thinking force, utilizing new technology to keep people safe and deter crime. Our live facial recognition technology is used to locate people we want to speak to in connection with ongoing investigations and to manage people with court orders or conditions. Criminals cannot think they can walk around our communities without being caught.” Neil Hendry, Defense & Government Director at Digital Barriers, explained: “Real-time facial recognition from security cameras, vehicle-mounted cameras, and body cameras is a challenge that very few technologies can perform reliably. Digital Barriers provides a reliable video stream, and Corsight AI was chosen for its high reliability in challenging conditions such as poor video quality, limited camera angles, darkness, extreme weather, and disguises.” Safety and security Tony Porter, Corsight AI’s Chief Privacy Officer and former UK Surveillance Camera Commissioner, added: “Drawing on our vast experience with law enforcement agencies worldwide, Essex Police adhere to the highest standards of fair use and transparency.” Rob Watts, President of Corsight AI, said: “It is a privilege for Corsight AI to contribute to the safety and security of the law-abiding people of Essex.”
Sharry, a global workplace experience platform built around digital employee badges, has successfully delivered its enterprise solution to London’s new international hub opened by PATRIZIA, a global real estate investment manager. The state-of-the-art mobile access leverages Gallagher Mobile Connect credentials and, through full integration with the Gallagher Command Center access control system, enhances physical security and significantly improves the workplace experience. PATRIZIA’s international hub Located in London’s Endell Street, PATRIZIA’s new international hub was opened after an extensive brown-to-green refurbishment that delivers sustainable ‘office of the future’ combining smart building tech, wellness amenities, hospitality services, street art, and flexible workspaces. The five-floor hub brings together PATRIZIA’s 200 UK-based employees. Their access to the existing Victorian building is completely managed through the PATRIZIA App and web-based PortalWX developed by Sharry. The workplace experience platform is fully integrated into the Gallagher Command Center access control system allowing users to unlock their office doors simply and quickly by presenting their smartphones. Innovative approach If an employee arrives from another office, they can generate a mobile access badge in the app in seconds “PATRIZIA’s employees in London and those visiting from our other offices can enjoy seamless and touchless mobile access to our new international hub in London’s Covent Garden,” said Shreya Sheth, Associate Director, Building Technology & Sustainability at PATRIZIA. If an employee arrives from another office, they can generate a mobile access badge in the app in seconds. There is no need to send a new badge request, pick up the plastic card in person, or wait for it to be sent, and think about returning it when they leave. This innovative approach saves time while strengthening security policy. Next-generation security solution “We are very excited to be supporting PATRIZIA with their new innovative London office. Their commitment to creating a flagship workspace for the future of work is truly inspiring. It's been an incredible honor to be able to support them with a smart workplace app and integrated access control solution for the space,” said Ondřej Vodňanský, Head of Sales EMEA at Sharry. “We are thrilled to collaborate with Sharry and PATRIZIA to deliver a next-generation security solution at their new London hub. By integrating our Mobile Connect credentials with Sharry's workplace platform, we've created a seamless and secure access experience that not only enhances security but also aligns with the modern, flexible work environment that PATRIZIA envisions,” said Gordon Swallow, UK Sales Manager at Gallagher Security. Enhance experience and operations Beyond mobile access, the PATRIZIA App offers users a comprehensive set of features designed to enhance their workplace experience. To name a few: Reservations: Employees can easily reserve shared workstations or book access to the Health Club. Service Requests: With one tap, users can request any service or maintenance through the app. Guestpasses: The app also simplifies visitor management by allowing users to invite guests to the building and send them a guestpass with all the necessary information. Integrated access control solution Sharry provides an efficient platform for managing workplace access and offers powerful tools For facility and office managers, Sharry provides an efficient platform for managing workplace access and offers powerful tools for communication and engagement with all users, including the ability to send news updates, polls, and event invitations straight to the mobile app. Sharry and Gallagher's integrated access control solution significantly enhances physical security in many areas. For example, a manager can remotely revoke any mobile or plastic badge with just one click in the PortalWX. Even the end-user can immediately report their plastic card as lost in the PATRIZIA app and thus suspend it. The Building Operating System Finally, managers can access real-time data on workplace occupancy, enabling more informed decisions regarding space and amenities utilization thanks to a partnership with Trigrr. The building operating system Trigrr has been deployed in PATRIZIA HQ to simplify system integrations and provide a centralized tool that unifies data, automation, and controls across Sharry, HVAC, IoT, and lighting. Thanks to Trigrr BOS, occupants can remotely control office room temperature, adjust lighting, monitor CO2 levels, or launch smart scenarios directly in the Sharry workplace platform. "Partnering with Sharry on the new PATRIZIA international hub is a fantastic opportunity to generate more value by combining all applications and systems into a flexible tool that can adapt building behavior in real-time according to the needs of the occupants," said Jean-Michel Verhulst, CEO of Trigrr.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced that its AI gun detection solution has been selected by West Feliciana Parish Schools (WFPS) to help mitigate gun-related violence. WFPS, based in St. Francisville, Louisiana, is renowned as one of the state’s highest-ranked educational systems. The district educates approximately 2,300 students from early childhood through 12th grade and is the school system of choice for the overwhelming majority of local students. WFPS boasts a robust early childhood program and a state-of-the-art career tech center, providing national certifications to prepare students for college and career success. ZeroEyes Operations Center "The safety and well-being of our students and staff members is our top priority,” said Hollis Milton, Superintendent of WFPS. “We are constantly considering how we can provide additional safety assurances, and ZeroEyes is one of the most proactive safety measures we could find.” ZeroEyes' AI gun detection and intelligent situational awareness software is layered on digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software is layered on existing digital security cameras. If a gun is identified, images will instantly be shared with the ZeroEyes Operations Center (ZOC), the industry's only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they will dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to local law enforcement and the school security team as quickly as three to five seconds from detection. Enhancing school safety WFPS maintains a comprehensive security program, collaborating closely with the local sheriff's department and employing full-time School Resource Officers (SROs). The district is further enhancing its school safety by deploying ZeroEyes across its Bains Lower Elementary, Bains Elementary, West Feliciana Middle School and West Feliciana High School campuses. "We commend WFPS for their proactive approach in safeguarding their community," said Mike Lahiff, CEO and co-founder of ZeroEyes. "The ability to swiftly identify and locate gun-related threats is a game-changer in securing school campuses. By deploying ZeroEyes, WFPS demonstrates a commitment to leveraging advanced technology to better protect their students and faculty.”
IDEMIA Public Security North America, the premium provider of convenient and trusted biometric-based solutions, has announced the launch of the Iowa mobile ID to Samsung Wallet, in collaboration with the Iowa Department of Transportation (Iowa DOT) and Samsung. Iowa residents can now securely store their mobile ID in their Samsung Wallet and start using it to easily assert their identity from their mobile phone at TSA checkpoints at the Des Moines and Eastern Iowa airports, as well as 25 other participating airports in the country and other participating businesses. Free Iowa Mobile ID app Iowans can easily access their mobile ID in the Samsung Wallet by simply tapping their phone The launch of Iowa mobile ID in the Samsung Wallet brings elevated convenience and security for Iowans with Samsung smartphones for airport security screening, age-restricted products, and other identity checks. Iowans can easily access their mobile ID in the Samsung Wallet by simply tapping their phone near the mobile ID reader or having the mobile ID reader scan the QR code. Iowans can also continue to access their mobile ID through the free Iowa Mobile ID app, which IDEMIA built and rolled out for Iowa in October 2023. "We are pleased to add the Iowa mobile ID in the Samsung Wallet to the list of acceptable IDs at our security checkpoints. Travelers who want to take advantage of this new capability will find that their Iowa mobile ID is a convenient option when going through the security process. TSA will continue to embrace technology that improves security effectiveness while streamlining the passenger experience at airports," John Bright, TSA Iowa Federal Security Director. Partnership with Samsung "We are proud to expand our partnership with Samsung and the Iowa Department of Transportation (Iowa DOT) to bring mobile driver’s licenses and state IDs to Samsung Wallet in Iowa and help accelerate the adoption of mobile ID in the state." Mobile IDs are authenticated and issued by state DMVs or MVDs" "As a convenient and highly secure way to store state-issued IDs and drivers licenses, mobile IDs are authenticated and issued by state DMVs or MVDs and ensure personal information is securely stored on the user’s device, with only the user having control over what personal information is shared," Donnie Scott, CEO of IDEMIA Public Security North America. Long-standing partnership As a pioneer in identity solutions and credentials issuance with a long-standing partnership with government agencies and a commitment to privacy by design, end-to-end security and interoperability, the Iowa DOT partnered with IDEMIA to launch mobile ID in Iowa in October 2023. Later that year, in December 2023, Samsung collaborated with IDEMIA, alongside the Arizona Department of Transportation Motor Vehicle Division (AZ MVD), to roll out mobile ID to the Samsung Wallet in Arizona.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security Safety Act Designation, and Aegix Global, a Utah-based provider of industry-pioneering safety and personal protection resources technology, announced that they have successfully deployed ZeroEyes’ AI gun detection and situational awareness software in more than 200 Utah schools. ZeroEyes’ software has been integrated into the Aegix AIM active incident management platform since spring 2023. Schools and districts that have deployed the combined solution include American Leadership Academy, American Preparatory Academy, and the school districts of Cache County, Carbon, Grand, Juab, Layton City, North Summit, South Summit, Provo, Wasatch, and Waterford School Districts, among others. Aegix AIM platform Aegix AIM platform cuts via chaos to clear guesswork and delays, saving special time in a crisis The Aegix AIM (Active Incident Management) platform cuts through chaos to remove guesswork and delays, saving precious time in an emergency. The system allows individuals in schools, businesses, and other organizations to notify first responders and colleagues about a crisis with the touch of a button. In a worst-case scenario, such as an active shooter, teachers simply push a button in the app to let administrators and first responders know if they are “safe” or “unsafe.” Aegix AIM can be operated from a desktop, laptop, or smartphone. “Incorporating ZeroEyes into our AIM solution to mitigate gun-related violence in Utah schools has provided an additional layer of protection for students and staff statewide,” said Chet Linton, CEO of Aegix. “We look forward to the continued success of our partnership.” ZeroEyes' AI gun detection ZeroEyes' AI gun detection and intelligent situational grasp software layers onto living digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry’s only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and RTC staff as quickly as 3 to 5 seconds from detection. Partnership with Aegix “Amidst the national rise in gun violence, schools shouldn't have to compromise on safety due to financial constraints,” said Mike Lahiff, CEO of ZeroEyes. “We are extremely proud of our partnership with Aegix, which has enabled schools throughout Utah to afford our life-saving gun detection and situational awareness solution."
Round table discussion
Technology can be a powerful tool, but it can also be misused. Ethical principles help ensure that technology is used in a way that minimizes risks and avoids causing harm to people or society. Issues could include factors such as data privacy and algorithmic bias of certain technologies. As the security industry embraces advanced and evolving technologies, we asked this week’s Expert Panel Roundtable: What are the biggest ethical considerations of using emerging technologies in physical security?
As the new year dawns, it's a good time for the security industry to look ahead to 2024. We asked this week's Expert Panel Roundtable: What will be the biggest surprise for security in the year ahead?
Machine learning (ML) is a field within Artificial Intelligence (AI) and one of the more common buzzwords in the physical security market. ML focuses on building computer systems that can learn and improve on their own, without being explicitly programmed for every scenario. Machine learning is poised to revolutionize physical security by offering a more proactive, data-driven approach to securing people and assets. We asked this week’s Expert Panel Roundtable: What is Machine Learning (ML) and how can it benefit physical security?