Commercial security
Johnson Controls, the global pioneer for smart, healthy, and sustainable buildings, is showcasing its industry-pioneering products, digitally-enabled solutions, and service offerings at Global Security Exchange (GSX) 2024 in Orlando, Florida, from Sept. 23-35. At booth 1275, the company will discuss how its proven solutions address every stage of a building’s lifecycle, and proactively mitigate everyday security challenges and emerging threats, while promoting smarter, safer, and more sus...
Pimloc a world-pioneering AI video privacy, redaction, and intelligence company announces a project pilot with Sussex Police and Microsoft. The collaboration helps to make multimedia redaction for subject access requests and digital evidence faster and more accurate through the implementation of cutting-edge artificial intelligence technologies, which marks the start of an exciting business development for Pimloc. Pimloc’s advanced AI Secure Redact is the ideal key for this union, as it...
Rhombus, a pioneer in cloud-managed physical security, announced the availability of two additions to its comprehensive lineup of security solutions: the R600 Multisensor Camera and the E50 Environmental Sensor. The two new products streamline operations, create safer environments, and offer scalable solutions for meeting the critical physical security requirements in industries including education, food and beverage, healthcare, manufacturing, retail, and storage and warehousing. Rhombu...
Camelot Secure, a revolutionary new cybersecurity company, announced that it has been named a finalist in two prestigious categories for the 2024 Cybersecurity Association of Maryland, Inc. (CAMI) Cybersecurity Awards: Cybersecurity Innovation of the Year and Diversity Trailblazer of the Year. These awards celebrate Maryland-based companies and individuals driving innovation and promoting inclusivity in the cybersecurity industry. APT Hunting service Camelot Secure has made significant stride...
Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announced the launch of Genetec Cloudlink™ 110, the latest addition to its line of cloud-managed security appliances. This compact device is specifically designed to simplify video management in low-density deployments, providing a versatile solution that enables customers to transition to cloud or hybrid environments at their own pace. Genetec Clo...
Cowbell, a pioneering provider of cyber insurance for small and medium-sized enterprises (SMEs) and middle-market businesses, is expanding its capacity to underwrite businesses with an annual revenue of up to dollar 1 billion, it was announced. With capacity from of global specialty (re)insurance leader Chaucer Group, America’s middle-market businesses - who continue to battle with the increasingly complex world of cyber risks and technology errors and omissions (E&O) - will now be ab...
News
Bugcrowd, the pioneer in crowdsourced security, announced that Patrick Morley has joined its board of directors. Morley served as CEO of Carbon Black, a cloud-based endpoint security software provider, for 14 years. He led the company from its early days to an IPO on Nasdaq in 2018 and subsequently oversaw its acquisition by VMware in 2019. Bugcrowd Platform Morley joins a seasoned board at Bugcrowd, which has guided the company through significant growth in 2024. This growth includes a major $102 million funding round, the acquisition of Informer, and the addition of over 130 new customers to the Bugcrowd Platform in the first half of this year. “I joined Bugcrowd because I believe they’re going to win the market—and I want to help make that happen,” said Patrick Morley, Board Member, Bugcrowd. Real innovation in cybersecurity Morley aided grow the firm from 20 employees to 1,200, servicing over 20,000 customers Morley added: “Bugcrowd has proven its platform leadership in crowdsourced security and is perfectly positioned to lead this space. It’s an exciting time to be part of a team that’s driving real innovation in cybersecurity, and I’m eager to contribute to that success alongside such a talented Board and leadership team.” During his tenure as CEO of Carbon Black, Morley helped grow the company from 20 employees to 1,200, servicing over 20,000 customers. In 2019, VMware acquired Carbon Black for $2.1 billion. Before his time at Carbon Black, Morley was CEO of digital-identity company Imprivata, followed by COO of former software company Corel Corporation. Bugcrowd Platform capabilities “With Patrick, we are adding another seasoned cybersecurity operator to our accomplished team on the board,” said Dave Gerry, CEO, Bugcrowd. “Bugcrowd is growing quickly and doing so in many ways. The company itself continues to grow, the Bugcrowd Platform capabilities are advancing, and we are finding market success through a slew of new customers." "During this period of growth, I am delighted to add another experienced voice to the company’s leadership and particularly someone who has led a company in a similar stage as Bugcrowd is now. I look forward to working with Patrick as Bugcrowd continues to make strides in the second half of 2024.” Bugcrowd’s unique approach Bugcrowd’s unique "skills-as-a-service" approach has uncovered more high-impact vulnerabilities The Bugcrowd Platform connects organizations with trusted security researchers and hackers to help proactively defend themselves against sophisticated threats. For over a decade, Bugcrowd’s unique "skills-as-a-service" approach has uncovered more high-impact vulnerabilities than traditional methods, along with clearer ROI, for more than 1,200 customers – including OpenAI, Google, T-Mobile, Carvana, the US DoD’s CDAO, ExpressVPN, Rapyd, New Relic, and OpenSea. Bugcrowd’s crowdsourced solutions With unmatched flexibility and access to a decade of vulnerability intelligence, the Bugcrowd Platform has evolved to address a changing attack surface influenced by the adoption of mobile infrastructure, hybrid work, APIs, crypto, cloud workloads, and AI. Bugcrowd’s crowdsourced solutions include penetration-testing-as-a-service, managed bug bounties, vulnerability disclosure programs (VDPs), and AI Safety and Security products.
Hikvision, a world-pioneering manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, has launched a promotional offer through December 31, 2024, on its suite of value-added services designed to enhance business operations and unlock new streams of recurring revenue for dealers. For a nominal fee, customers can now access powerful tools aimed at improving device management, streamlining access control, and enhancing productivity. Investment in Hikvision products "We're excited to announce the new promotional offer on our value-added services, designed to help businesses maximize their investment in Hikvision products," said John Xiao, Vice President of Marketing, Hikvision USA. "For a limited time, customers can access powerful tools to streamline operations, improve device management, and unlock new revenue streams. These services offer exceptional value and can help businesses stay ahead of the curve in today's competitive landscape." Value-added features Hikvision’s value-added features covered in the promo include: Health Monitoring: Enables real-time monitoring of device status with alerts and regular reports for proactive system management. Video Management Channel: A vital tool for seamless device management, offering centralized control to optimize performance, streamline operations, and efficiently manage all connected devices in one intuitive platform. This special offer gives security dealers—whether existing Hikvision partners or new—a valuable opportunity to boost productivity and increase recurring revenue, all at a low, attractive price point.
The PSA Network (PSA), the world's largest consortium of professional systems integrators, will host its annual convention October 14–17 in Marco Island, Florida, at the JW Marriott Beach Resort. The event is exclusive to PSA's network of security integration members and owners. Attendees will travel from across the country to attend top-tier education sessions, network with peers and participate in planned excursions in paradise. PSA Convention 2024 “Our team has worked hard to ensure PSA Convention 2024 is an exceptional event,” said Matt Barnette, president and CEO of PSA. “From the educational lineup to the networking opportunities, PSA members will be impressed. We cannot wait to see the impactful conversations and collaborations that will emerge.” Data-driven insights Jeremy Bess and Patrick Luce will assign attendees with data-driven insights to cut via the noise Josh Linkner will headline PSA Convention with his keynote address on how small, everyday innovations can drive oversized results. In this inspiring, timely and high-impact keynote, Linkner will show attendees how to de-risk the creative process, build the capacity to unlock breakthrough transformations and gain the creative confidence to take responsible risks. Likewise, economists Jeremy Bess and Patrick Luce will empower attendees with data-driven insights to cut through the noise. The presentation will connect the microeconomic dynamics of the security markets with the core economic phenomena that PSA integrators deal with every day. Key technology partners Another excellent dynamic of PSA Convention is the opportunity for integrators to make personal connections with key technology partners. Sponsors of this year's event include: Aiphone Ai-RGUS AirSight Altronix AMAG Technoogy Arxys ASSA ABLOY BCD Bosch Security and Safety Systems ComNet by acre security Digital Watchdog Hanwha Vision HID IML Security Solutions LenelS2 Pelco SECLOCK Snellings Walters Velasea VICON Windy City Wire Zenitel Zitko If they are a PSA member interested in attending PSA Convention 2024, visit the PSA Convention website. Registration includes a three-night hotel stay if they register before September 23.
ADI Global Distribution, a pioneering wholesale distributor of security, AV and low-voltage products, announced it has expanded its operations into Germany. This expansion marks a significant milestone in the company's growth strategy, and underscores its commitment to delivering innovative and reliable security, AV and low voltage products. Integrated solutions “ADI's entry into Germany represents a pivotal moment for our company, and we are excited to bring our extensive product portfolio to this market,” said Hemant Trivedi, Vice President & General Manager, International, ADI. “Our goal is to support German customers with the products, support, and services they need to build complete, integrated solutions. We're committed to fostering strong customer and supplier relationships to drive shared success, and continue expanding our presence across the country." ADI's comprehensive portfolio ADI has staffed a full team across a variety of functions to support German customers With a new country headquarters office located in Düsseldorf, Germany, ADI has staffed a full team across a variety of functions to support German customers including dedicated field sales, inside sales support, technical field and desk-based support, marketing, digital experience, finance and more. ADI's comprehensive portfolio includes products from more than 45 pioneering brands across video surveillance, intrusion and smart home, access control and communications, fire, data communications and audio visual. In addition to a diverse range of products, ADI offers numerous value-added services including pre- and post-sales support, local expertise, training, online ordering, and more. ADI's extensive product and services To commemorate its entrance into Germany, ADI will exhibit at the upcoming Security Essen international trade fair from 17-20 September. Attendees are invited to stop by Hall 5, stand 5B33 to meet the local ADI team, learn more about ADI's extensive product and services offering, and see how ADI can help to grow their business. ADI Germany will be led by Frank Lehrich, Country Sales Pioneer, who is focused on ensuring the company's offerings are tailored to meet the evolving needs of the German market.
Allied Universal®, the world’s pioneering security and facility services company, is proud to celebrate all security professionals during the 2024 National Security Officer Appreciation Week starting on September 16 through September 22. In celebration of this week, the company recognizes the special honor bestowed on one of its own, Frederick Tucker, who received the 2023 Ralph Day Memorial Security Officer Heroism Award earlier this month. Safety and security The award is the highest recognition a security officer can receive for an act of heroism This award is presented each year by ASIS International, a security trade organization, for his life-saving actions during a shooting at the Nashville Metro Public Library. The award is the highest recognition a security officer can receive for an act of heroism. “National Security Officer Appreciation Week serves as a great reminder to thank all security professionals around the world, and at Allied Universal, we are proud to celebrate our security professionals each and every day,” said Steve Jones, Global Chairman and CEO of Allied Universal. “Please take the time this week to thank the hard-working men and women who dedicate themselves to maintaining the safety and security of our communities." Roles and responsibilities Everyday security professionals keep them safe by observing potential threats and swiftly responding to emergencies. These brave individuals help deter crime, maintain order in times of panic, work closely with law enforcement and are unwavering in their desire to keep them safe. Join Allied Universal in celebrating National Security Officer Appreciation Week, September 16–22, 2024. In 2015, Allied Universal established National Security Officer Appreciation Week with the goal of recognizing security professionals’ important contributions to their daily lives, debunking misconceptions and stereotypes surrounding the roles and responsibilities of security professionals and raising awareness of the numerous career opportunities in the security services industry.
SentinelOne and Lenovo announced a multi-year collaboration to bring AI-powered endpoint security to millions of Lenovo devices across the globe. Lenovo will include SentinelOne’s industry-pioneering Singularity™ Platform and generative AI capabilities (Purple AI) in new PC shipments, as well as offer upgrades to existing customers, to expand its ThinkShield security portfolio and autonomously protect devices from modern attacks. SentinelOne's Singularity Platform "The complexity and speed of today's cyberthreats demand an intelligent, adaptable defense," said Nima Baiati, Executive Director and General Manager, Cybersecurity Solutions, Intelligent Devices Group, Lenovo. "SentinelOne's Singularity Platform and Purple AI are at the forefront of this evolution, offering unparalleled, AI-powered protection. As Lenovo introduces groundbreaking new AI PCs to the market, we are integrating these cutting-edge AI-powered endpoint security capabilities into Lenovo's ThinkShield security platform. This will enhance endpoint protection and fortify enterprise resilience against the ever-evolving threat landscape." SentinelOne’s AI-powered security Lenovo’s direct sales team and channel partners can provide cutting-edge, built-in security to businesses of all sizes Lenovo is a pioneering enterprise PC vendor that sells tens of millions of devices annually. The new agreement between the long-time strategic partners is designed to significantly increase the number of Lenovo devices that ship with SentinelOne’s AI-powered security and will benefit from Lenovo’s broad global sales and partner network. As a result, Lenovo’s direct sales team and channel partners can provide cutting-edge, built-in security to businesses of all sizes. “Cyber resilience is incredibly important for business continuity as organizations increasingly face the unpredictable. Our security services collaboration with SentinelOne is another key aspect of Lenovo’s cybersecurity and cyber resilience services intended to help protect customers from anomalous threats,” said Patricia Wilkey, SVP and GM of Lenovo Solutions and Services Group International Sales. New MDR service As part of the expanded collaboration, Lenovo will also build a new Managed Detection and Response (MDR) service using AI and EDR capabilities from SentinelOne’s Singularity Platform as its foundation. “The endpoint remains a primary vector of cyberattacks and the most critical part of a business' ongoing operations. By working with market pioneers like Lenovo, we can rapidly scale AI-powered security to millions of PCs and servers across the globe,” said Akhil Kapoor, Vice President Embedded Business, SentinelOne. “It’s an opportunity for Lenovo and SentinelOne to give Lenovo customers a clear security and resiliency advantage by delivering intelligent devices that defend themselves in real time.”
Expert commentary
These days, business is more collaborative, adaptable, and connected than ever before. In addition to offering new identities and access privileges, new applications and data also increase the attack surface available to cyber criminals, hacktivists, state actors, and disgruntled insiders. These new identities need to be handled carefully. CISOs must develop an identity management strategy that is consistent across on-premises, hybrid, and cloud systems. Good security is built on solid identity governance and administration (IGA) principles. From ransomware to supply chain intrusions, high-profile cybersecurity events frequently take advantage of weak identity and access management procedures. The Identity Defined Security Alliance found that 84% of organizations experienced an identity-related breach during its one-year study period. Robust IGA system Consequently, organizations need to find best-of-breed solutions for each section of the fabric Some of the most well-known cyber-attacks have not been made possible by a nation-state exploiting a remote zero-day vulnerability; rather, they have been made possible by something as basic as a hacked orphaned account. This resulted in lateral movement from an insecure platform to a high-value system, illegitimate privilege escalation, or unsanctioned access to a computer system. To safeguard against such attacks, organizations must be aware of who has access to their systems and apps, and guarantee that access is revoked when it is no longer required. Here, a robust IGA system is helpful. It is not the whole picture, though; IGA is part of a larger identity fabric. A report by KuppingerCole noted that “Identity Fabrics are not necessarily based on a technology, tool or cloud service, but a paradigm for architecting IAM within enterprises.” The report pointed out that the paradigm is created using several tools and services. That’s because, contrary to marketing claims, no one vendor has a platform that provides all the needed elements. Consequently, organizations need to find best-of-breed solutions for each section of the fabric. Threats to the new corporate landscape Due to their exclusion from the corporate firewall and the security culture that comes with working on-site, remote employees and third parties are desirable targets for hackers. The transition to online office suites is another vulnerability that hackers are taking advantage of–for instance, through bogus authentication login dialogs. Additionally, hackers are using technologies like machine learning and artificial intelligence to circumvent current security tactics. A cyberattack powered by AI will imitate human behavior and develop over time. Even publicly available information might be used by this "weaponized AI" to learn how to get past a target’s defenses. CISO and the business users Attackers will finally find an entryway, but firms can protect the new perimeter–their identities It's no longer possible to secure the traditional perimeter. Attackers will eventually find an entryway, but businesses can protect the new perimeter–their identities. To defeat these threats, organizations must look again at identity and access management tools and how they are weighed against the impact on the organization. Should you mandate multi-factor authentication (MFA) more often and earlier? Should only company-owned devices have access to networks, or should access be restricted to specific business hours or regions? Should access to sensitive information and critical systems be given just temporarily or should it be offered on a task-by-task basis? Both the CISO and the business users they assist should be asking these questions. Staying ahead of threats with identity Access control limits decrease dangers but can come with a cost. If you give your users too much access, your organization becomes susceptible; if you give them too little, productivity suffers. But there are ways to strike a balance with security, compliance and productivity. More CISOs are turning to Zero Trust–which is based on the principle of maintaining strict access controls and not trusting anyone by default–to protect their systems from new attack types. However, Zero Trust is reliant upon having a thorough and baked-in strategy that underpins it. Other actions that companies can take include implementing automation for identity management, such as automating workflows for approval. This would significantly lessen the administrative burden and friction that security solutions like multifactor authentication (MFA) or time-restricted access to critical systems have on business users. This might include restricting access to particular devices, capping access hours during the day or enforcing MFA based on user behavior. Identity fabric: Putting it all together Make sure your identity architecture is scalable, secure, and provides a seamless user experience These are just two elements of the identity fabric approach. Most organizations today have implemented pieces of an identity fabric, which is basically an organization’s identity and access management (IAM) infrastructure and typically includes a mix of modular IAM solutions for multi-cloud and/or hybrid environments. Now, organizations need to define, enhance and develop this infrastructure. They must also institute guiding principles for how it should operate, meet current and future business requirements as well as identity-related cybersecurity challenges. In doing so, businesses can move past identity platforms and adopt an identity fabric perspective. The key is to make identity governance the starting point of your identity fabric strategy, ensuring seamless interoperability within your identity ecosystem. Make sure your identity architecture is scalable, secure, and provides a seamless user experience. Aligning security with business Due to the increase in knowledge workers using the cloud and working remotely, attackers are focusing on this group. These employees are easier to compromise, give access to valuable data and offer more attack targets. Knowledge workers also lack an administrator’s level of security expertise. Therefore, as part of their security fabric strategy, enterprises require a scalable IGA system. It is easier to comply with security and access regulations and takes less time for IT teams to do normal administrative activities when they invest in IGA, a crucial tenet of identity security. CISOs and boards, though, are currently looking at more than identity management. IGA is at the center of the debate about security and governance. Taking an identity fabric-based approach, with a foundation built on modern, cloud-based IGA, will safeguard identities, increase productivity, and make staff adherence to organizational procedures easier.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town center stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behavior also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorized access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimize this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorized entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realize, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionizing the overnight security business. Minimizing criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilizes a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimize the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is Remote Guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilize a combination of methods to effectively analyze potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyze the situation in real time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command center, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customized remote guarding When properly deployed, remote guarding systems are also customized to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional Security Shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A Bounty of Benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
Security beat
The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years. There is a higher demand for integrated solutions that go beyond just security at the device and software level, and manufacturers have been continuously developing improved application programming interfaces (APIs), and hybrid and cloud-connected solutions. Artificial intelligence (AI) Also, artificial intelligence (AI) plays an important role in modern intrusion systems by helping enable automated threat detection, real-time response, and predictive analysis. AI algorithms can analyze vast amounts of data to identify patterns and anomalies that may indicate security breaches. Security solutions are being developed with a focus on AI and machine learning to provide more proactive and resilient defenses against increasingly sophisticated cyber threats. Benefits of AI AI-driven security solutions can continuously learn and adapt to new threats, providing more robust protection “The practical benefits of AI in security systems include enhanced accuracy in detecting threats, reduced response times through automation, and the capability to anticipate and prevent potential vulnerabilities before they are exploited,” says Sergio Castillejos, President, of Commercial Security at Honeywell. Additionally, AI-driven security solutions can continuously learn and adapt to new threats, providing businesses with more robust and dynamic protection. Unified Intelligent Command user interface Honeywell meets the challenge of better-integrated systems with a unified Intelligent Command user interface (UI). Castillejos says Honeywell continually innovates with the latest analytics and encryption to keep up with evolving threats. Honeywell’s products integrate with many offerings for partners to construct a robust and modern system relevant to their security needs. Advanced cloud-based security Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection, and remote management, essential for hybrid work environments, says Castillejos. “These solutions enhance scalability, improve data analytics capabilities, and provide seamless updates reducing significant maintenance costs that help companies to respond swiftly to emerging threats and enable robust, adaptive security measures.” Physical and digital security The best security systems are a combination of physical, digital, and national security, says Castillejos. While Honeywell focuses on providing the best in physical and digital security within their solutions, protecting sensitive and/or personal information must also be within the responsibility of the organizational policy. Cybersecurity for connected devices Some of the challenges in the next five years will likely include integrating advanced technologies Security systems can safeguard this information by being highly configurable while also notifying users of unwanted activity. Sometimes, just restricting access to sensitive areas can be enough. However, in the world of data analysis and machine learning, security systems can audit and report on users who have accessed data to ensure that the protections are in place. Some of the challenges in the next five years will likely include integrating advanced technologies such as AI and the Internet of Things (IoT) while securing cybersecurity for connected devices, notes Castillejos. Balancing act “Additionally, there will be a growing need for skilled professionals to manage and maintain these complex, connected systems,” he says. “Balancing cost-effectiveness with the demand for resilient security solutions will also pose a significant challenge, especially for smaller businesses.” Legacy systems that are susceptible to vulnerabilities like cloning or unauthorized access present the largest challenge to overcome. “However, as technology evolves, it becomes more challenging for a customer to manage a unified security system rather than a collection of unique solutions that all operate independently,” says Castillejos. Disruptive technology But investing in the newest analytics, AI and IoT will not improve a company’s physical security systems if they do nothing with the data. “They are not a replacement for the devices that keep people and property safe,” says Castillejos. “They can enhance a user’s experience and speed up the time to respond when they are planned correctly.” The best security systems will look at disruptive technology as another tool in the overall system. However, the focus should remain on the user experience. If the latest technology is not properly integrated or configured, it will turn into more noise that most operators will ignore. {##Poll1720586145 - Which is the most useful benefit of artificial intelligence (AI) in security systems?##}
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-center at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Center SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call center software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasizing feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrollment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defense in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panelists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasizing tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt, and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalized a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
The sale of Carrier’s Global Access Solutions to Honeywell in December amounted to a dramatic finish to a big year in 2023 for mergers and acquisitions (M&A) in the physical security market. In the transaction between two industry giants, Honeywell sought to enhance and strengthen its building automation capabilities with the acquisition of Carrier’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. Honeywell acquires Carrier Access business The acquisition, which includes both hardware and software solutions, will mean a new corporate owner for the LenelS2 brand, a pioneering business for over 25 years in commercial and enterprise access solutions, including well-known offerings Onguard and Netbox. In addition, the acquisition covers the Onity brand of electronic locks, including hospitality access, mobile credentials, and self-storage access; and the Supra brand of cloud-based electronic real estate lockboxes. ADT sells commercial business, which rebrands as Everon ADT Inc. announced the sale of its commercial security, fire, and life safety business unit to GTCR ADT Inc., another industry giant and a trusted brand in smart home and small business security, announced the sale of its commercial security, fire, and life safety business unit to GTCR, a private equity firm, for a purchase price of $1.6 billion. ADT Commercial, a security integrator and premier provider of commercial security, fire, and life safety in the United States, announced that it will move forward as a standalone organization and rebrand as Everon. Bosch to sell building technologies products Bosch Building Technologies announced in 2023 that it is realigning its Building Technologies division to focus solely on its regional integrator business, with solutions and services for building security, energy efficiency, and building automation. Therefore, Bosch plans to sell most of the Building Technologies division’s product business. At year-end, Bosch was seeking a buyer who would take on all three business units with their associates and locations. This includes the Video, Access and Intrusion, and Communication business units, and affects some 4,300 associates at more than 90 locations worldwide. Building its integrator business earlier in 2023, Bosch announced the acquisition of Paladin Technologies, Inc., headquartered in Vancouver, Canada, a provider of security and life safety solutions and system integration services in North America. Motorola acquires IPVideo, creator of HALO Sensor In another deal emerging late in 2023, Motorola Solutions acquired IPVideo Corp., Bay Shore, N.Y., the creator of the HALO Smart Sensor, an all-in-one intelligent sensor that detects real-time health and safety threats. The powerful capabilities of the HALO sensor extend Motorola’s end-to-end physical security offering by integrating a non-video threat detection product into the safety and security ecosystem. IDIS acquires Costar Technologies Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. Korean video manufacturer IDIS and U.S. company Costar Video Systems had enjoyed a long-term existing ODM (original design manufacturer) relationship, and approximately 60% of Costar Video products were already made by IDIS. Therefore, it made sense when IDIS Co., Ltd. and Costar Technologies Inc. announced an agreement and plan to merge, with IDIS acquiring Costar. Leveraging Costar's established distribution networks and sales channels in the U.S. gives a significant boost to IDIS' growth strategy, which is founded on building long-term relationships with systems integrators. Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. that will benefit from IDIS’ NDAA-compliant and 100% Korean-made technology. SECOM invests in Brivo and Eagle Eye Eagle Eye Networks, a cloud video surveillance company, and Brivo, a provider of cloud-based access control and smart space technologies, announced one of the largest investments to date in cloud physical security in 2023. SECOM CO., LTD, based in Japan and one of the largest security integration companies in the world, has made a primary equity investment of $192 million in the two companies, $100 million in Eagle Eye Networks, and $92 million in Brivo. $100M primary equity investment Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific Eagle Eye Networks, a global pioneer in cloud video surveillance, announced it will use the $100M primary equity investment to expand its suite of AI-powered products, fund geographic expansion, and enhance its enterprise features. Brivo will use the investment to grow sales and marketing, accelerate product development scale support and operational functions, and evaluate strategic acquisitions. Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific, and enhance the smart spaces and AI functionality in the Brivo Access Platform. ACRE buys PremiSys Portfolio ACRE, a security company built on acquisitions, is continuing to broaden its portfolio and serve the expanding needs of its customer base. In 2023, ACRE acquired the PremiSys software and hardware portfolio and assets from IDenticard. PremiSys’ technologies enable organizations to self-manage door access and view integrated video and lockdown facilities. The acquisition extends opportunities for ACRE in healthcare, education, data centers, and senior living facilities. Qognify is a part of Hexagon Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond Qognify, a provider of video (VMS) and enterprise incident management (EIM) solutions announced that it has become a part of Hexagon. Qognify joins the Safety, Infrastructure & Geospatial division of Hexagon, following the completion of its acquisition originally announced on Dec. 19, 2022. Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond to incidents, providing a more robust offering. ASSA ABLOY continues its acquisition trend ASSA ABLOY continued to acquire companies in 2023 to strengthen its position in mature markets by adding complementary products and solutions to the core business. Among the companies acquired in 2023 were Ghost Controls, a U.S. supplier of automated residential gate openers, and Securitech Group, a manufacturer of high-security mechanical and electronic door hardware products in the U.S. Door and fencing ASSA ABLOY also acquired Leone Fence, a Canadian manufacturer, distributor, and installer of fencing products for commercial and residential applications, and Lawrence Hardware and Gallery Specialty, providers of commercial hinges, locksets, exit devices, and door hardware accessories in Canada. Another new acquisition is Inovadoor Portas Industriais Ltda, a Brazilian manufacturer of sectional and high-speed doors. Earlier in 2023, ASSA ABLOY completed the acquisition of Spectrum Brands’ Hardware and Home Improvement division and the divestment of Emtek and the Smart Residential business in the U.S. and Canada to Fortune Brands.
Case studies
In any construction project, meticulous recording and management of door hardware is critical —although often prone to human error. What if there was a way to harness digital technology to fulfill this crucial requirement in a dependable, efficient, agile way? Located in several cities around India, Edifice Consultants Pvt Ltd. specializes in designing climate-responsive architectural structures that harmonize with their surroundings. Complex standards and regulations Each project undertaken reflects Edifice’s collaborative ethos and dedication to enhance the immediate environment, while fostering the well-being of building users, local residents, and the landscape. Edifice’s work across commercial, residential, industrial, and public service sectors has received multiple prestigious awards. Designing buildings for so many segments and industries requires broad and deep knowledge of complex standards and regulations. The experience and expertise of ASSA ABLOY have proved invaluable. Specification with Openings Studio™ ASSA ABLOY has provided Edifice with solutions for more than 750 fire-rated and non-fire doors To streamline door specification, Edifice requires digital software that can cut manual mistakes and maintain the process’s accuracy, which is essential to efficient building design. Their chosen solution — Openings Studio™ — takes a rigorous approach, speeding up specification iterations to condense the revision cycle, improve time management and help hit Edifice’s ambitious project timelines. To date, ASSA ABLOY has provided Edifice with solutions for more than 750 fire-rated and non-fire doors, via the Openings Studio plugin for Autodesk® Revit®. These include doors and door hardware suited to data center deployment, among them mechanical mortise locks, exit devices, door closers, and master-keying solutions from ASSA ABLOYs portfolio of trusted brands such as Yale and Sargent. Collaborating for transparency and project efficiency An industry-leading specification software tool and BIM plugin, Openings Studio integrates with design software to create and visualize openings for complete door, frame, and hardware schedules and specifications. Its flexibility — and availability on multiple types of devices — means all specification changes are incorporated quickly and transparently, helping project delivery dates to remain on target. The Openings Studio environment also simplifies collaboration and data sharing among all project stakeholders. It helps manage openings over the full project lifecycle, from planning and estimation to installation and beyond. Door solution specifications Openings Studio maintains a unified digital thread that connects all project partners to eliminate confusion For these reasons, Openings Studio is deployed all over the world as a specification and ordering tool for building projects. It can deliver detailed door solution specifications directly to popular packages such as Revit® and ARCHICAD®, drawing on a detailed database with color, size, thickness, and certifications for every product; as well as installation and compliance information, Environmental Product Declarations (EPDs) and more. With ongoing use throughout a building’s lifetime, Openings Studio maintains a unified digital thread that connects all project partners to eliminate the confusion that comes with stakeholders having to juggle multiple versions of documents. Management of door hardware “Openings Studio has always been helpful in projects,” explains Gaurav Nirmalkar, Designer at Edifice. “Personally, I have used it in three of the data centers and it never disappoints. The simple and crisp interface is a plus point.” “Recording and management of door hardware is the most important thing in the construction industry. Openings Studio is a good choice for it.”
Matrix's client, a key law enforcement body in Gujarat, plays a crucial role in ensuring the city's safety and security. Serving as the central hub for law enforcement, it is equipped with cutting-edge facilities and a highly efficient organizational structure designed for swift responses to security challenges. This agency coordinates multiple enforcement departments to protect citizens effectively. By adopting advanced telecom solutions, it aims to optimize communication, boost operational efficiency, and enhance its responsiveness in safeguarding the city. Challenge For a law enforcement agency, prompt response and effective grievance redressal are essential. The reliability of the communication system is paramount, especially when it comes to dialing an emergency number and registering complaints. However, the previous communication system faced several challenges: Unrecorded missed calls: Calls that were missed were not logged, preventing attendants from returning calls—an issue of significant concern for a law enforcement agency. Lack of IVR/Call Waiting: If all agents were occupied with calls and a user dialed the '100' emergency number, the call would be disconnected instead of playing an IVR message until an agent became available. Lack of Call Routing: Calls to '100' were always directed to the first available agent, causing that agent to be overwhelmed while others remained idle. This imbalance reduced overall efficiency and responsiveness. Solution Matrix developed a Hybrid Communication system with a mobility application tailored for the law enforcement agency. This solution specifically targeted the challenges citizens faced when dialing ‘100’ to reach the control room, to enhance response efficiency and effectiveness. The system was implemented in the following way: When a user dials '100', the call is directed through the ETERNITY GENX system to the control room, where an agent will handle the call. If Agent 1 is occupied, the ETERNITY GENX PBX system will route the call via the PRI line to another available agent or an open control room. If agents are too busy to answer, citizens calling in can leave a voicemail. A report will be generated for all calls, resolving the issue of missed calls not being logged. Results The customer had previously depended on a third-party open platform for managing complaints and faced numerous challenges. After implementing Matrix’s Hybrid Communication system, many of these issues were effectively addressed individually. For example, Collaboration: The unified communication solution facilitated seamless collaboration between headquarters and mobile staff via VARTA, ensuring uninterrupted call transfer and reception for users. Operational Efficiency: Effective call routing prevented calls from being routed exclusively to one agent, ensuring that calls were distributed among agents and maintaining overall efficiency. Citizen Response Time: The responsiveness to calls improved significantly, leading to a substantial reduction in call response times. Features Enabled: The IVR system reduced response times, and missed calls were recorded in the PBX system, effectively addressing the issue of missed call incidents. Citizen response times have decreased, and operational efficiency has improved due to effective call routing. Matrix’s Hybrid Communication system enables the enforcement body to swiftly address citizen grievances.
Up-to-date and accurate maps of the waterways are a prerequisite for safe and efficient shipping in Germany. Authorities such as the Federal Maritime and Hydrographic Agency, but also private harbor operators, are obliged to provide these in an up-to-date form at all times. The main reason for this is to avoid accidents caused by an incorrect or outdated card. This includes the classification of federal waterways, their kilometers, existing locks, lifting and barrages, other surrounding waters, places, and borders. Currently, mapping is carried out by conventional ships with trained personnel, which is time-consuming and expensive. This can result in long intervals between measurements at a particular location. 3D map of the surroundings Bank areas and surface forms are monitored by an optical system with two integrated cameras (Semi-)automated monitoring of waterways by autonomous platforms with obstacle avoidance and traffic detection could optimize this process and provide maps in less time. To this end, the Fraunhofer Institute of Optronics, System Technologies and Image Exploitation IOSB has developed an autonomous surface vehicle capable of autonomously surveying bodies of water as part of a three-year in-house research project. For this purpose, the river bed is recorded using sonar. Furthermore, the bank areas and surface structures are monitored by an optical system with two integrated industrial cameras from IDS Imaging Development Systems GmbH. The information obtained in this way is then merged and transferred to a 3D map of the surroundings. Application The precise surveying of water bodies is a demanding task. TAPS, the Fraunhofer IOSB's semi-automatic direction-finding system for rivers and lakes is able to perform this task both under and above water. The vehicle, which measures approximately 2 x 1.5 x 1 meters, travels along the relevant waterway and automatically avoids obstacles, whether stationary or moving. At a speed of two knots - which corresponds to around 3.7 kilometers per hour - such a mission can last up to 20 hours. For visual mapping of the shore areas, TAPS has two cameras attached to a mast, each pointing to a starboard or port and whose fields of view do not overlap. Due to their high resolution, they allow a visual inspection of relevant infrastructure, such as quay walls, as well as 3D modeling of the shore area based on the recorded image data. Orientation of the TAPS platform GNSS and IMU data serve as the basis for picking the position and exposure of the TAPS platform "We use an automated system for intelligent image capture. As soon as one or both cameras are focused on a predefined area of interest, image recording is started. The vehicle's own movement is also used to store only image data that is recorded from different angles and therefore offers added value in terms of content," explains Boitumelo Ruf, expert in photogrammetry in the Autonomous Robot Systems research group at Fraunhofer IOSB. GNSS (Global Navigation Satellite Systems, such as GPS) and IMU (Inertial Measurement Unit for position determination) data serve as the basis for determining the position and orientation of the TAPS platform. "When the images are captured, they are enriched with the current GNSS position data. The latter are required later for the assignment of precise coordinates," Ruf continues. COLMAP photogrammetric toolbox After data acquisition, the recorded images are transmitted together with the GNSS data to a ground control station, where a photogrammetric reconstruction is carried out. Boitumelo Ruf describes the procedure in more detail: "Among other things, we use the COLMAP photogrammetric toolbox. It uses outstanding image features to first compare the input images, calculate their relative positions and create a true-to-life 3D model of the environment." "We then use the tool to match the images pixel by pixel, i.e. we search for corresponding pixels and merge them exactly. The result is a dense 3D point cloud that is georeferenced using the GNSS positions, i.e. provided with the corresponding current coordinates." The 3D model can then be used for other tasks, such as visual inspections or bank monitoring. Robust industrial cameras defy wind and weather On the camera side, the Fraunhofer Institute relies on two uEye FA industrial cameras from IDS. The robust and resilient models with PoE are ideal for demanding environments. Camera housings, lens tubes, and screwable connectors meet the requirements of IP code IP65/67 and are thus optimally protected against dirt, dust, and splash water. The robust and resilient models with PoE are ideal for demanding environments The model used has the large-format 1.1" CMOS sensor IMX304 from Sony and delivers very clear, noise-free images with a resolution of 4096 x 3000 pixels. Thanks to its remarkable dynamic range and very high sensitivity, the global shutter sensor of the second-pixel generation of the Pregius series is particularly suitable for metrology applications, among others. It was precisely these characteristics that were decisive for the Fraunhofer IOSB's choice of camera. In addition to robustness and weather protection, important requirements for the cameras included a compact form factor and high image resolution to enable detailed visual inspections. The sensor should also offer a high dynamic range in order to capture images with a high level of detail in both sunny and shady areas. Integration via the standard GigE Vision interface enables the development and use of one driver for several systems with different cameras. Outlook The shortage of skilled labor is also a major issue in the surveying of waterways. Automated mapping of the waterways could not only reduce costs but also the time and, above all, the labor required. The aim of the TAPS project was to develop a prototype for this task and to demonstrate its potential in relevant scenarios. As a research organization, Fraunhofer typically develops technologies up to a level at which the functionality and suitability of the system have been proven. The next step is now cooperation with industrial partners. Dr. Janko Petereit, head of the Autonomous Robot Systems research group at Fraunhofer IOSB, explains: "We are actively looking for partners to take this final step towards commercialization together. In view of the positive results of our initial tests and the increasing demand for accurate, up-to-date waterway maps, we expect strong demand for our technology in the coming years. The knowledge gained can be used in a variety of ways. Autonomous watercraft can be used to transport people and goods by sea or inland waterways. The excavation of waterways and the autonomous surveying of fairways are also conceivable. “ The project demonstrates the high potential of the interaction between robot systems and digital image processing. The cards could be reshuffled in the future, particularly with regard to visual environment detection and scene interpretation.
Arana Security, a specialist in providing end-to-end security systems for businesses, has chosen Custom Consoles control room desks for a major client in the manufacturing sector. The project includes a main desk and supervisor’s desk from the Custom Consoles SteelBase series plus a MediaWall and auxiliary furniture. Arana Security was founded in 2013 to serve a growing market of smart card solutions and security systems. In 2015 it started to move towards providing clients with the advanced security that biometric technology offers. The company is a globally active service provider specializing in integrated biometric security solutions for the corporate, financial, governmental, and logistics sectors. Latest-generation models “This is the most recent of many security-related control room commissions we have worked on over the years,” says Gary Fuller, sales manager at Custom Consoles. “Both SteelBase desks are latest-generation models with blue LED lighting on the underside of the worktop. This style of lighting provides sufficient illumination for staff to concentrate on the monitor displays without distraction while still being able to move around the room easily. It also helps to reduce fatigue during a long or uneventful operating shift." “The main desk is a 4.3-meter wide six-bay unit configured for use by two operators. Each bay is fitted with a lockable front and rear door providing easy access to computer equipment and related cabling. The desktop is 80 cm high and has a 120 cm front-to-back reach. A removable section of the worktop covers a full-desk-width cable tray. Four monitor screens are mounted near the rear edge of the desk. The desk faces directly towards a 3-meter wide MediaWall supporting six large multiscreen monitor video screens forming three wide by two high display grid." Desk worktops Desk worktops are finished in gray Marmoleum with black PVC edging, plus matching gray doors Fuller added: “Situated behind and to the right of the main control desk, the supervisor’s desk is a 1.6-meter wide two-bay SteelBase with dual 24-inch monitor screens, again located near the rear of the worktop. This desk too has blue LED underlighting.” The desk worktops are finished in gray Marmoleum with black PVC edging, plus matching gray doors and side panels. Also provided were a dual-bay control room and crisis room storage units with doors, a 2.2 x 1-meter crisis room meeting table, 24/7 operator chairs, monitor arms plus meeting table chairs. Cable management features Custom Consoles' SteelBase is a high-strength desking system developed to withstand the demands of heavy industry. Built around steel frames with hinged lockable front and rear doors, SteelBase can be configured for use by individual operators or teams of practically any number without the cost and long delivery time usually associated with project-specific furniture. Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs Each bay can include an optional sliding shelf which gives easy access to internally stowed PCs. Predrilled monitor arm mounting points are positioned at the rear upper edge of each bay. Cable management features include a removable worktop section with dual brush strips providing an uninterrupted cable exit for telephones, monitor cables, and computer peripherals. Integral cableways allow heavy-duty wiring to be fully concealed within the desk structure while retaining easy access for routine maintenance or adjustment. SteelBase desktops Desktop equipment pods can be specified if required. SteelBase desktops are available in a choice of 120 cm (standard) or 100 cm (SteelBase Lite) front-to-back sizes with a choice of hard-wearing Marmoleum or laminate work surfaces. All elements are guaranteed against component failure for five years of normal use. All elements are guaranteed against component failure for five years of normal use MediaWall is a video and audio monitor support frame system providing a combination of structural rigidity and operational versatility. Flat-screen video displays of practically any size can be mounted in almost any configuration. Video display screens Incorporating height-adjustable horizontal beams and T-slot mounts, MediaWall is fully adjustable to ensure optimal sight lines. Individual or multiple frames can be used in self-supporting mode or coupled directly to the studio wall. Video display screens can be positioned so that the edges meet exactly to form a continuous horizontal display limited only by the monitor panel bezel. Monitor signal and power cables are fully concealed and can enter or leave the structure at any desired point.
Smiths Detection, a global pioneer in threat detection and security screening technologies, announces that it is partnering with Flughafen Zürich AG (Zurich Airport) to trial the use of the industry-pioneering HI-SCAN 6040 CTiX Model S carry-on baggage X-ray scanners and the iLane A20 ATRS, the smart automatic tray return system, at two security lanes in the airport. The 3D images produced by Smiths Detection’s HI-SCAN 6040 CTiX will allow some of Zurich’s 2.7 million monthly passengers to leave their liquids and electronics in their carry-on luggage as they pass through security, resulting in a more convenient and streamlined security screening experience. Installation of CT scanners The iLane ensures a consistent flow of trays and provides a seamless checkpoint journey for passengers In addition to providing more efficient and effective security screening, the HI-SCAN 6040 CTiX is the most energy-efficient scanner of its type available in the market, featuring low noise levels, zero vibration, and a 30% higher belt speed than other CT X-ray scanners – helping to promote a calmer checkpoint. The iLane ensures a consistent flow of trays and provides a seamless checkpoint journey for passengers. Alongside passengers, employees at security checkpoints will also benefit from the installation of CT scanners via the addition of 'remote screening' capabilities. This means that security staff no longer have to check the images of the baggage contents directly next to the devices, but can work from a separate room, facilitating a quieter and more concentrated work environment. Layout of the new security lanes Zurich Airport will test the CT equipment in various configurations over several months, in order to optimize the layout of the new security lanes, with the intention of equipping all 26 lanes with this cutting-edge technology in the future. Although passengers will be able to leave liquids in their bags, the maximum container size of 100 ml and total carry-on size of one-liter rules will remain in place until further notice. Matthew Clark, Vice President (VP) of Commercial, Smiths Detection, commented: "We are delighted that Zurich Airport has selected Smiths Detection to trial the use of this pioneering technology that will enhance security outcomes and improve efficiency, providing a smoother experience for passengers and staff alike."
A major European oil and gas company that acquires, explores, produces and supplies chemical and petroleum products had a cybersecurity challenge. Company leadership wanted a better way to quantify and respond to the industry’s increasing levels of cybersecurity risk. Pioneers were looking for a new way to better understand and improve their company’s OT cybersecurity. As part of this effort, pioneers wanted to compare the company’s current levels of protection against a series of hypothetical attacks to identify gaps. With operations in several locations and a supply chain network of over 1,000 gas stations, auditing and improving the company’s cybersecurity would be no small task. Set of analysis and recommendations The Honeywell csHAZOP solution is designed to deliver a comprehensive set of analysis To help overcome these challenges, the company called in Honeywell and, specifically, its csHAZOP services team to perform a detailed design evaluation based on OT cybersecurity risk. The Honeywell csHAZOP solution is designed to deliver a comprehensive set of analysis and recommendations–it goes beyond the standard cybersecurity vulnerability assessment or IEC 62443 compliance audit by adding deeper analysis that is designed to: Investigate a significant amount of what can go wrong, including approximately 500+ attack scenarios – evaluating these for multiple threat actors and different consequences, Address – via risk assessments – both the likely risk reduction through the regular IT type of countermeasures (AV, firewall, hardening, etc.) and the consequence severity reduction through the implementation of safeguards (e.g., hardwiring critical control signals), Estimate residual risk for each hazard, allowing identification and quantification, making mitigation actionable, Focus on process automation cybersecurity risk (csHAZOP stage 1) or production process cybersecurity risk (by adding csHAZOP stage 2 vs. cybersecurity production risk) to add a higher level of cybersecurity analysis from an OT perspective unique in the industry. Send in the csHAZOP experts Honeywell cyber experts also uncovered some high-risk design deficiencies The Honeywell OT cybersecurity experts worked with the Honeywell proprietary csHAZOP method to uncover several concrete recommendations for immediate remediation and technical design recommendations in the company’s ICS, to be considered in upcoming ICS migrations. Honeywell cyber experts also uncovered some high-risk design deficiencies. The Honeywell csHAZOP framework was used to identify levels of residual risk to determine which security hazard was more critical to address versus others. Honeywell provided targeted guidance on several aspects of the study, using experience from real-world cyber attacks in the industry. Honeywell’s csHAZOP service is one of the few cybersecurity assessments available on the market that is designed to apply counterfactual risk analysis. Honeywell’s csHAZOP report This evaluation now links OT cybersecurity to loss prevention and process safety Given a system’s protective measures, this method helps a company evaluate which cyber attacks (based on countermeasures, security protections and type of threat actor) may succeed. This evaluation directly links OT cybersecurity to loss prevention and process safety. Honeywell’s csHAZOP report for this oil and gas refinery was considered successful by the customer because of its well-defined procedure, the tools Honeywell has specifically designed for OT systems and the team’s experience and efforts in OT cybersecurity. Results of the csHAZOP assessment “The results of the csHAZOP assessment from Honeywell went beyond our expectations. We have received a detailed and analytical cybersecurity hazard and operability report concerning both identified risks and realistic recommendations for remediation." "Additionally, the report is a valuable tool for future upgrades of our systems as well as new projects and the development of an incident response plan. We intend to repeat this assessment periodically, as it is a valuable tool in our continuous efforts to improve security for our systems from the ever-evolving cybersecurity threats,” Major refinery in Europe.
Round table discussion
The most common wearable device deployed by security professionals is the body-worn camera. Traditionally used by law enforcement professionals, these devices are finding more and more uses in the corporate security world, and even impacting issues such as customer service. However, the term “wearables” also encompasses a range of other devices, including many worn by consumers. We asked this week’s Expert Panel Roundtable: How are wearable technologies impacting the security market?
Audio might detect sounds like breaking glass or footsteps before a person even enters the field-of-view of a video camera. Audio also helps to provide context: Someone running in a video image might be suspicious, but the situation is different if they are yelling for help. Furthermore, audio enables operators to talk remotely to people on site, which can deter crime, de-escalate situations, or gather information. And yet, optimizing audio is often an overlooked aspect of physical security system design. We asked this week's Expert Panel Roundtable: What is the expanding role of audio in today's physical security systems?
Inflation, the rise in prices of goods and services over time, can result from a multitude of factors. It happens when there is more money chasing a limited supply of goods. It happens when the cost of producing and transporting goods increases. It can even happen because expectations of future inflation heighten current demand to avoid higher prices. During and after the COVID pandemic, supply chain disruptions, shifting consumer demand, and government stimulus all contributed to higher inflation throughout the broader economy, including the physical security marketplace. Energy price shocks, particularly oil price spikes in late 2021, also increased inflationary pressures. But what is the situation now? We asked this week's Expert Panel Roundtable: Has price inflation ended (or slowed down) in the security market?
Products
White papers
How To Create A Successful Physical Security Roadmap
DownloadIntelligent Video Security Solutions
Download11 Advantages Of A Combined System For Access Control And Intrusion
Download12 Questions To Ask Your Access Control Provider
DownloadSix Things To Look For When Adding AI Cameras To Your Operation
Download10 Step Guide to Staying Ahead of Emerging Security Threats
DownloadExploring New Vertical Markets for Professional Security Systems
DownloadMobile Access- What You Need To Know (Part 1)
Download5 Steps To Finding The Right Access Control System For You
DownloadPreparing Your Organization With Quality Situational Awareness
Download