SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6
Cyber security
  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos

Check Out Our Special Report On Casino Security

Get it now!

AI And The Cloud Provide New Solutions To Old Problems At GSX 2023

AI And The Cloud Provide New Solutions To Old Problems At GSX 2023
Larry Anderson
Larry Anderson
icon Add as a preferred source Download PDF version
Quick Read
⌵
Summary is AI-generated, newsdesk-reviewed
  • GSX 2023 showcases AI and cloud advancements for security industry challenges.
  • i-PRO expands edge AI, increases warranties, and enhances video management systems.
  • Verkada boosts retail security with integration and international expansion efforts.
Related Links
  • Verkada And Convergint Partner To Deliver Smarter, Safer Buildings
  • Ontic Announces It Has Surpassed 60 Different Data, Technology, And Systems Integrations In Its Connected Ecosystem Program

Companies at GSX 2023 emphasized new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market.

Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways.

Expanding AI at the edge 

i-PRO is a company reflecting the continued expansion of edge AI capability in the security market.

Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. 

  • AI processing relay, extended warranty

i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases

I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points.

i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management.

  • Active Guard, MonitorCast

The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. 

“We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.”

Emphasis on retail and other verticals 

Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” 

“Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds.

  • Intrusion detection

Verkada has an intrusion product that will notify a central station if there is an alarm

On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm.

Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. 

  • International expansion

Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management.

Verkada emphasizes ease of use, including a mobile application to allow access to be managed across the user base.

  • Forging partnerships

“We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito.

Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. 

  • Working with other verticals

They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage

Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage.

They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems.

Transitioning the Mid-Market to the Cloud 

Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems.

Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud.

  • Benefits of cloud

It’s a market that may not be ready for pure cloud, but there are benefits to be realized from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. 

The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics.

  • Cloud add-on capabilities

We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive"

Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers.

“We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. 

  • Vaidio AI technology

Salient seeks to be a transition pioneer to help customers realize the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage.

Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems.

Addressing ‘Soft’ Features for Integrators

AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG.

In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel.

  • Integrator channel

Rebuilding a process to make your organization more efficient, is relatively easy; it just takes a lot of persistence"

“We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. 

“Developing new features takes time, but rebuilding a process to make your organization more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. 

Disrupting the cloud based on price 

Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centers around the world.

Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. 

  • Cloud storage

“We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing.

“We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.”

  • Performance, protection (cybersecurity), and price

Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies

Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone.

Emphasizing performance, protection (cybersecurity), and price, their data centers are certified to SOC 2 and ISO 27001 standards. 

Faster throughput for weapons detection

Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas.

These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. 

  • Cost savings solution

Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives.

Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time.

  • Purpose-built sensors

The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties

In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business.

“We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. 

Providing early warning of violence

ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon.

In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act.

  • Increased response with AI-enables images

Images are identified by AI and sent to a monitoring center where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders.

The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times. 

Discover how AI, biometrics, and analytics are transforming casino security

Download PDF version Download PDF version
Google logo Add as a preferred source on Google
  • Network / IP
  • Biometrics
  • Remote surveillance
  • Retail surveillance
  • Digital video surveillance
  • Remote video surveillance
  • Electronic security systems
  • Residential security systems
  • Retail security systems
  • Shop security systems
  • Campus security systems
  • Airport security
  • Application security
  • Industrial security
  • Remote security
  • Mall security
  • Hospital security
  • Commercial security
  • Perimeter security
  • Healthcare security
  • Nightclub security
  • Shopping centre security
  • Security management
  • Security policy
  • Security devices
  • Security installation
  • Security tagging
  • Security cameras
  • PTZ cameras
  • Covert cameras
  • Security camera systems
  • Security monitoring system
  • Security access systems
  • Radio frequency Identification
  • Facial recognition systems
  • Network monitoring
  • Vehicle tracking
  • Video analytics
  • Remote video monitoring
  • Metal detectors
  • Electronic door locks
  • Electronic access control
  • Intrusion detection
  • Identity management
  • Stadium security
  • Stadium surveillance
  • Explosives detection
  • Store security
  • Store surveillance
  • School security
  • Industrial security systems
  • Retail security
  • Wireless security
  • Network cameras
  • Door access control
  • Security software
  • Security service
  • Video compression
  • Coastal surveillance
  • Industrial surveillance
  • Resort security
  • Resort surveillance
  • Museum surveillance
  • Museum security
  • Mobile surveillance
  • Green security
  • Near Field Communication
  • Outdoor video surveillance
  • Visitor management systems
  • Physical Security Information Management (PSIM)
  • Bullet cameras
  • Indoor surveillance
  • Covert Surveillance
  • Security communication
  • Testing & Approvals
  • Integration software
  • Key management
  • Perimeter protection
  • Research & Testing
  • Cyber security
  • Mobile communications
  • Video Management System
  • Internet of Things (IoT)
  • Crowd Management
  • Corporate Security
  • Outdoor Security
  • Indoor Security
  • Central Monitoring
  • Fingerprint Locks
  • Data Security
  • Mechanical Locks
  • IR cameras
  • Network Video Recorders
  • Digital Video Recorders
  • Warning Devices
  • Smoke Detection
  • Incident Management
  • Cloud security
  • PoE
  • Artificial intelligence (AI)
  • Mobile access
  • Smart home
  • Video surveillance
  • Weapon detection
  • COVID-19
  • Mergers & Acquisitions
  • Smart Cities
  • Machine Learning
  • Related links
  • Global Security Exchange (GSX) 2023
  • AMAG Access control software
  • AMAG Video Surveillance software
  • Briton Mechanical digital locks
  • Genetec Video Surveillance software
  • Genetec Access control software
  • Ingersoll Rand Access control software
  • Salient Systems Video Surveillance software
  • Schlage (Allegion) Access control software
  • Verkada Access control software
  • Verkada Intruder alarm communicators
  • Verkada Video Surveillance software
  • Verkada Intruder alarm warning devices
  • AMAG Access control readers
  • Briton Electronic lock systems
  • Genetec IP cameras
  • i-PRO IP cameras
  • Ingersoll Rand Access control readers
  • IR Recognition Systems Access control readers
  • Schlage (Allegion) Access control readers
  • Schlage (Allegion) Electronic lock systems
  • Verkada IP cameras
  • Verkada Access control readers
  • AMAG Network Video Recorders (NVRs)
  • Genetec Network Video Recorders (NVRs)
  • Ingersoll Rand Access control cards/ tags/ fobs
  • Salient Systems Network Video Recorders (NVRs)
  • Schlage (Allegion) Access control cards/ tags/ fobs
  • Verkada Network Video Recorders (NVRs)
  • Verkada Access control cards/ tags/ fobs
  • Infrared IP cameras
  • Card Access control cards/ tags/ fobs
  • Networkable Access control readers
  • Magnetic Stripe Access control cards/ tags/ fobs
  • Infrared Surveillance cameras
  • Biometric Access control software
  • GSM Intruder alarm communicators
  • Event Network Video Recorders (NVRs)
  • Self Contained - External Intruder alarm warning devices
  • Access Control Software Access control software
  • ANPR Software Video Surveillance software
  • Card Access control software
  • Mortice deadlatch Mechanical digital locks
  • Self Contained - Internal Intruder alarm warning devices
  • Area Lockout Option Access control software
  • Control Software Video Surveillance software
  • Biometric Access control readers
  • PC-based Access control readers
  • ISDN Intruder alarm communicators
  • Card Swipe Access control readers
  • Standalone Access control readers
  • Internal Intruder alarm warning devices
  • Contact Access control software
  • Network IP cameras
  • Fob Access control cards/ tags/ fobs
  • Detection Software Video Surveillance software
  • Proximity Access control cards/ tags/ fobs
  • Thermal Surveillance cameras
  • PTZ IP cameras
  • Tag Access control cards/ tags/ fobs
  • Smart Card Access control cards/ tags/ fobs
  • PSTN Intruder alarm communicators
  • Contact Access control readers
  • Standalone / Networkable Access control readers
  • Real Time / Timelapse / Event Network Video Recorders (NVRs)
  • IP Surveillance Software Video Surveillance software
  • Wireless Surveillance cameras
  • Infrared Access control readers
  • Thermal IP cameras
  • Proximity Access control software
  • Radiowave Intruder alarm communicators
  • Smart Card Access control software
  • TCP / IP / GPRS Intruder alarm communicators
  • Magnetic Stripe Access control readers
  • Timelapse Network Video Recorders (NVRs)
  • Central Monitoring Option Access control software
  • Management Software Video Surveillance software
  • Timelapse / Event Network Video Recorders (NVRs)
  • Centrally managed access solution Access control software
  • TCP/IP Intruder alarm communicators
  • Recording Software Video Surveillance software
  • Proximity Access control readers
  • Monitoring Software Video Surveillance software
  • WAN Intruder alarm communicators
  • Surveillance Software Video Surveillance software
  • RFID Access control readers
  • IP / GPRS Intruder alarm communicators
  • Transmission Software Video Surveillance software
  • Smart Card Access control readers
  • Video Signal Generator Video signal devices & accessories
  • Warning Sign Video signal devices & accessories
  • Version Upgrade Access control software
  • Visitor Management tool Access control software
  • Warning Sticker Video signal devices & accessories
  • Related categories
  • Mechanical digital locks
  • Access control software
  • Intruder alarm communicators
  • Intruder alarm warning devices
  • Surveillance cameras
  • Digital video recorders (DVRs)
  • Video Surveillance software
  • Electronic lock systems
  • IP cameras
  • Access control readers
  • Network Video Recorders (NVRs)
  • Access control cards/ tags/ fobs
  • Video signal devices & accessories
Related white papers
Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
System Design Considerations To Optimize Physical Access Control

System Design Considerations To Optimize Physical Access Control

Download
Related articles
How Physical Security Consultants Ensure Cybersecurity For End Users

How Physical Security Consultants Ensure Cybersecurity For End Users

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

How Managed Detection And Response Enhances Cybersecurity Management In Organizations

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Drawbacks Of PenTests And Ethical Hacking For The Security Industry

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance RSS
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Cyber security
  4. News
  5. Security beat
About this page

"Explore the latest developments in AI, cloud solutions, and physical security at GSX 2023. Experience cutting-edge products and services that address modern security challenges, lower costs and promote safety."

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec