Drones
The Security Industry Association (SIA) has appointed Brett Feddersen – vice president of strategy and government affairs at D-Fend Solutions – as chair of the SIA Counter-UAS Working Group. Many facilities are limited in their ability to establish counter-uncrewed aircraft systems (UAS) given the myriad of regulatory nuances and lack of a clear national framework for addressing the topic. UAS National Action Plan SIA Counter-UAS Working Group was created in 2023 to...
Highly satisfied visitors, a significant 25 percent increase in exhibitors, and countless successful discussions at the trade fair stand: After four intensive days, the pioneering trade fair for the security industry, Security Essen, has come to a successful close. With more than 500 exhibitors from 36 nations and over 20,000 trade visitors - an increase of 17 percent - from 86 nations, the trade fair offered a comprehensive platform for innovations and future trends relating to secur...
Artificial intelligence, public, school, and corporate security, and cyber- and tech-related crimes are growing concerns making headlines daily. Global Security Exchange (GSX) by ASIS International brings together thousands of security professionals from approximately 100 countries to address these issues and more. Members of the press are eligible to receive a free all-access pass. For security reasons, a press badge is required to enter the event, so if they are interested in attending,...
ISC East, with its premier sponsor the Security Industry Association (SIA), and in partnership with the ASIS NYC Chapter, announced 2024’s slate of speakers that will headline the Keynote Series at The Bridge, ISC East’s mainstage destination. ISC East Keynote Series Day 1 Keynote: Proactive Security Strategies at Navy Pier, Chicago: A Unified Approach to Emergency Preparedness and Response – Brian Murphy, chief operating officer at Navy Pier in Chicago, Illinois, will disc...
Teledyne FLIR, part of Teledyne Technologies Incorporated, announced a limited-time promotion for SIRAS™, a professional drone that includes a quick-connect dual radiometric thermal and visible camera payload. First responders, including police, fire, and search and rescue agencies, can now purchase one unit per agency at a significantly marked-down price of $6,995, a discount of more than 28 percent, through the end of the 2024 calendar year. SIRAS drones SIRAS drones are engineer...
Over the past decade, scientists have proved that engineered microbes are capable of exhibiting a range of sense-and-response functions. They can be programmed to convert input signals into detectible outputs, such as a change in color when they encounter specific toxins. They can sense and respond to physical stimuli such as light or magnetic fields. They can even produce an electric current to actuate a tiny gear. Microbe-based sensing technologies Draper is looking to test the bounda...
News
The assassination attempt on Trump has shifted attention to the complex challenge of securing large-scale public events in open spaces, such as King Charles' coronation ceremony, the Paris Olympics, and election rallies across the U.S. David Douglas, a retired California law enforcement officer with over 30 years of experience and affiliations with FBI Infragard, NYPD Shield, and the Terrorism Early Warning Group (TEWG), explains: "The first challenge in securing election rallies that include public appearances by a sitting president or presidential candidate in front of tens of thousands of citizens in an open area is to define a sterile zone and perform screening for every person found or entering the sterile area, days before the event itself. This ensures that no people who might pose a danger, and no weapons or bombs, enter the sterile area." Real-time forensic investigation Douglas added: "The second challenge is meticulous security maintenance inside and around the sterile area in real-time. High-secured events are typically covered by hundreds of surveillance cameras, drones, and bodycams scanned by AI algorithms to identify known terrorists or criminals and to detect suspicious patterns and anomalies, such as the presence of an unknown person on a rooftop within shooting range of the event center." "If an assassination attempt or terrorist attack occurs, there is a critical need for real-time forensic investigation. For example, an immediate examination if the assailant was seen frequently with a second suspect in footage taken before the incident. The live surveillance cameras should be scanned immediately to identify and apprehend this additional suspect as soon as possible." AI-based security solutions Douglas is the Client Business Executive Director at AWZ, a venture capital firm investing in companies David Douglas is the Client Business Executive Director at AWZ, a venture capital firm investing in companies operating in the field of advanced AI-based security solutions. “Corsight AI is renowned for its facial intelligence technology, which rapidly identifies specific individuals and predefined scenarios posing potential security threats. By analyzing facial features in real-time and in real-world conditions, Corsight AI aids law enforcement and private security entities worldwide in securing public spaces, mass events, transportation hubs, and critical infrastructure.” X-ray screening and detection solutions Gabriel Lerner, CEO of ISEG Corp, a pioneering security provider in Latin America said: “This technology is effective thanks to its ability to identify a specific person in a crowded environment in conditions of low visibility, poor video quality, limited camera angles, distance and motion. We’ve tested several technology vendors and chose to go with Corsight AI for its military-grade reliability in real-world conditions.” Douglas adds: “Neural Guard specializes in automated X-ray screening and detection solutions. Their technology interprets X-ray images using advanced AI algorithms, detecting concealed threats such as weapons and explosives. This capability is vital in screening mass audiences in sterile zones such as election rallies, airports, and other high-security areas, where traditional methods may fall short.” Advanced security solutions Douglas adds: "In a world where security threats are increasingly complex, integrating sophisticated AI-based technologies is crucial. The ability to expose hidden threats and react to them before they materialize can significantly enhance our preventive strategies." Following the recent high-profile violent events, the annual GSX 2024 security expo to be held in Orlando, Florida, in September is expected to garner special interest. At GSX, Corsight AI, Neural Guard, and other advanced security solutions will be demonstrated live, enabling security professionals to evaluate new advancements in pre-event threat detection, real-time investigation, and immediate reaction to prevent the next assassination or terror attack.
In a landmark achievement to strengthen European security, CNS Solutions & Support, as a member of the Frequentis Group, has announced the completion of the CBRN Reconnaissance and Surveillance System (RSS). In response to evolving threats, the Frequentis Group has developed an innovative data fusion cell (DFC) to integrate sensor and uncrewed systems data, through its incident crisis management (ICM) technology. Innovative data fusion cell (DFC) The DFC serves as a centralized hub, seamlessly integrating information from various sources including sensors and drones, therefore enabling comprehensive analysis and rapid decision-making. "Our DFC has transformed CBRN defense in Europe, empowering military personnel with real-time intelligence to respond swiftly and effectively to emerging threats," Peter Skiczuk, Frequentis Vice President of Defense. Mitigating risks The adoption of state-of-the-art technologies, including drones equipped with sensors and uncrewed robotic vehicles “CNS is dedicated to enhancing CBRN defense technologies. Future phases will focus on readiness for full military deployment, ensuring continued security for European nations," says Stefan Ringsmuth, Managing Director of CNS Solutions & Support GmbH. The adoption of state-of-the-art technologies, including drones equipped with sensors and uncrewed robotic vehicles heralds a new era in CBRN defense. These uncrewed assets swiftly detect and assess hazardous substances, mitigating risks to human personnel. Data fusion and real-time analysis By leveraging data fusion and real-time analysis, commanders gain critical insights to make informed decisions, ensuring the safety of both military personnel and civilians. "Normally, it would take us two hours to achieve this result. With the use of these modern technologies, we can reduce this time to 40 to 45 minutes, and we don’t have to bring soldiers directly to the source of danger, as this is taken over by robots and drones," says Colonel Schlechter, Commander of the CBRN Defense Center/Austria (ÖBH).
D-Fend Solutions, the pioneer in field-proven radio frequency (RF), cyber-based, non-kinetic, non-jamming, counter-drone takeover technology, announced the release of EnforceAir2 version 24.04.2, which includes all upgrades to the system released since the launch of the product last year. This new software version comprises major upgrades to its award-winning capabilities and builds upon its proven C-UAS power, performance, portability, and range. Version 24.04.2 of EnforceAir2 includes a range of refined improvements that have been rolled out so far this year, including new user interface (UI) features, expanded detection and mitigation coverage, and enhanced capabilities for deployment on naval vessels. UI Enhancements: EnforceAir2's user interface now offers: An AI-based mitigation engine that recommends appropriate drone mitigation options for each individual drone to simplify mission-critical decisions by the operator in real time. Direct UI integration linking drone tickets with map representation of drone location to enhance situational awareness when dealing with drone swarms. New graphic representation of the threat level and the possible intentions of the pilot. Improved quick, single-click access to detailed drone information to enable operators to dive into specific characteristics to assess a drone's threat level. Upgraded API: Application Programming Interface (API) upgrades include: Strengthened support for the exchange of information with external command and control (C2) systems in real time. Additional feeds into EnforceAir2 SDR to facilitate tagging of large numbers of authorized drones for the control airspaces that may contain thousands of drones operating as a baseline. Enhanced Naval Vessel Deployment Capabilities: Updates for EnforceAir2 naval deployments include: Support for multiple sensors deployed on a moving platform utilizing D-Fend's MSC2 technology. Enhanced mobile C-UAS plans. Dynamic updating of warship operational area map. Disrupted GNSS Mode: The system now provides: Operational support in zones with disrupted GNSS environments through advanced logic that optimizes the system in such scenarios. In addition to these software enhancements, D-Fend Solutions has significantly expanded EnforceAir2's detection and mitigation drone coverage with the inclusion of many additional drone models. Advanced counter UAS capabilities "Given the rapid advances in drone and UAS technology we see across the globe, it's important that EnforceAir2 equips our customers with the most advanced counter UAS capabilities possible while maintaining the simplicity of operation," said Yaniv Benbenisti, President and Chief Product Officer at D-Fend Solutions. "Breakthrough innovations, such as the AI-based mitigation engine and disrupted GNSS environment mode, bring significant advantages to safely protect against the threats posed by maliciously or irresponsibly piloted commercially available drones and custom-built drones."
Sensor specialist HENSOLDT is providing massive support for the German ‘European Sky Shield Initiative’ ESSI: As part of an order from Diehl Defense worth more than 100 million euros, HENSOLDT is supplying its high-performance TRML-4D radars, including a maintenance and training package, to Latvia and Slovenia. The radars will be deployed in the two ESSI countries as part of the IRIS-T SLM air defense system. This means that HENSOLDT currently has more than 80 air defense radars of various ranges under contract as part of the ESSI initiative alone. Latest AESA radar technology HENSOLDT CEO Oliver Dörre said: "The pent-up demand in European air defense is enormous. We have already made so much progress with the expansion of our production capacity that we can already supply all customers in record time." TRML-4D has delivered excellent detection skit in Ukraine and prevailed against strong competition The TRML-4D has delivered exceptionally good detection performance in Ukraine and prevailed against strong competition during live tests in Latvia. It is based on the latest AESA (Active Electronically Scanned Array) radar technology and ensures the rapid detection and tracking of around 1,500 targets within a radius of up to 250 kilometers. It is capable of quickly and reliably detecting and tracking all types of air targets - cruise missiles, rockets, drones, and aircraft - and classifying them for engagement. Development of key technologies HENSOLDT has decades of experience with radar systems for air defense and is actively driving the further development of key technologies in this field. In addition to the TRML-4D high-performance radar, the company's portfolio includes the SPEXER short-range radar, the Twinvis passive radar, and radars for securing ship and air traffic. Both the TRML-4D and the SPEXER are part of the German Armed Forces' NNbS air defense system for close and short-range protection, which was commissioned in January. HENSOLDT also supplies radars for the German Navy's new frigates and corvettes, for airspace surveillance and for approach control at military airfields.
With approximately 3,000 sheriffs covering 70% of the United States, managing resources efficiently is paramount. The integration of security cameras, drones, and body cameras with powerful facial recognition systems enables law enforcement to scan large areas in real-time or retrospectively, identifying suspect appearances and gathering valuable information. Some of these technologies will be showcased at the National Sheriffs' Association Conference in Oklahoma this week. Drones enhancing search and rescue operations Drones have become essential tools for sheriff departments, particularly in search and rescue operations. In Sumter County, Florida, the sheriff's office has utilized high-tech drones to quickly locate missing individuals, saving numerous lives. These drones provide real-time aerial surveillance, which is crucial in vast and challenging terrains where traditional search methods may be less effective. Body cameras identifying suspects in real-time Body cameras are now widely adopted to ensure transparency and accountability in law enforcement. These devices record interactions between officers and the public, providing evidence in cases of allegations of misconduct. Moreover, body cameras help in documenting crime scenes and capturing real-time events, essential for accurate forensic analysis and legal proceedings. Facial recognition for quick identification Facial recognition is rapidly being merged into law enforcement plans to expedite the process Facial recognition technology is rapidly being integrated into law enforcement systems to expedite the identification process. This technology is particularly useful for spotting wanted individuals and verifying the identities of inmates transported to court. Sheriff's departments use facial recognition to cross-reference faces with databases of known offenders, ensuring that suspects are correctly identified and apprehended swiftly. Corsight AI's advanced facial intelligence platform Corsight AI provides an advanced facial intelligence platform to law enforcement agencies worldwide. According to Shay Poleg, Corsight AI U.S. Sales Director: "Our platform allows for real-time scanning and post-event analysis, recognizing wanted individuals and identifying suspicious scenarios. We provide sheriffs with the tools they need to enhance public safety and streamline operations. To be able to do this, you'll need a software able to reliably recognize a face in real-world conditions of low visibility, poor video quality, limited camera angles, distance, motion, facial coverage, and outdoor darkness." Speeding forensic investigations In forensic investigations, advanced technologies play a pivotal role. When evidence is collected from crime scenes, drones and body cameras help document the scene meticulously. Video analytics and facial recognition further aid in the fast analysis of long hours of video footage to identify suspects or witnesses, significantly speeding up the investigative process. Sheriff departments across the U.S. are committed to leveraging these technologies to enhance their capabilities, improve public safety, and maintain the highest standards of accountability in their operations. As these tools continue to evolve, their integration into everyday law enforcement activities is expected to become even more widespread and sophisticated.
Teledyne FLIR, part of Teledyne Technologies Incorporated, released its next generation of high-performance Hadron 640 dual radiometric thermal and visible camera modules. The ITAR-free Hadron 640+ and radiometric Hadron 640R+ provide industry-pioneering thermal sensitivity. All models are size, weight, and power (SWaP) optimized for integration into unmanned aircraft systems (UAS), unmanned ground vehicles (UGV), robotic platforms, and emerging AI applications utilizing Teledyne FLIR Prism™ software. Teledyne FLIR’s new Prism AI detection “The Hadron 640 series gives integrators the opportunity to deploy AI-ready, high-performance dual-camera modules into small unmanned systems where SWaP, performance, run time, and battery life are mission critical,” said Michael Walters, Vice President Product Management, Teledyne FLIR. “With Teledyne FLIR’s new Prism AI detection, tracking, and classification models and Prism ISP libraries offering super-resolution, turbulence mitigation, contrast enhancement, and more, Hadron 640 also enables effective AI-based applications.” New Hadron 640 modules Addition of a 64MP visible camera enables the Hadron 640 series to provide thermal and visible imagery The new Hadron 640 modules include a 640 x 512 resolution Boson+ longwave infrared (LWIR) camera module with industry-pioneering thermal sensitivity of 20 millikelvin (mK) or better. It sees through total darkness, smoke, most fog, and glare allowing operational awareness day and night. The Hadron 640R+ provides temperature measurements for every pixel in the scene. The addition of a 64MP visible camera enables the Hadron 640 series to provide both thermal and visible imagery within a single camera module. Innovation for Teal drones “Continued collaboration with Teledyne FLIR enables rapid payload and performance innovation for Teal drones, accelerates time to market, and equips warfighters with the best possible technology for operational success,” said George Matus, CTO of Red Cat. “The Hadron 640 series features enhanced thermal sensitivity and HD visible cameras to provide superior performance within a compact package for the support of our NATO allies and the U.S. Army’s Short Range Reconnaissance Tranche 2 program of record.” Teledyne FLIR support team To reduce development costs and time-to-market for integrators and original equipment manufacturer (OEM) product developers, the Hadron 640 series offers a complete system through a single supplier. This includes drivers for market-pioneering processors from NVIDIA, Qualcomm, and more, plus industry-pioneering integration support and service from a Teledyne FLIR support team of experts. The Hadron 640 series products are all dual-use and classified under the US Department of Commerce jurisdiction. It is available for purchase globally from Teledyne FLIR and its authorized dealers.
Expert commentary
As city managers, law enforcement agencies, and first responders face mounting pressure to combat crime and respond to emergencies with limited resources, real-time crime centers empowered by a new generation of data-driven technologies are emerging as an effective force multiplier. Real-time crime centers Real-time crime centers (RTCCs) serve as centralized hubs where dedicated personnel leverage pioneering-edge technologies to analyze diverse data streams and provide critical support to law enforcement and emergency operations. These 24/7 facilities are transforming how agencies gather, process, and act upon information, enabling more proactive and efficient policing strategies. The core functions of RTCCs These centers provide officers with unprecedented situational awareness and real-time intelligence At their core, RTCCs are tasked with three primary objectives: enhancing safety, facilitating identification, and supporting apprehension. By integrating data from a wide range of data sources, these centers provide officers with unprecedented situational awareness and real-time intelligence. Integrated data approach This integrated data approach allows RTCCs to alert officers to potential threats, quickly identify suspects, and guide responders during critical incidents. For instance, in the event of a robbery, RTCC operators can rapidly search camera and license plate data to track suspect vehicles, significantly improving the chances of a swift arrest. According to the Bureau of Justice Assistance at the U.S. Department of Justice, the mission of an RTCC is to centralize a broad range of current and evolving technologies, coordinate sworn and non-sworn human resources, and direct the attention to high-crime areas, active crimes in progress, high-profile or highly recidivistic offenders, and large-scale public events that may require law enforcement presence or response. The technology powering RTCCs The effectiveness of an RTCC hinges on its ability to seamlessly integrate a wide array of technologies: Open Platform Video Technology: At the heart of many crime centers is an open platform video management software (VMS) that serves as the central nervous system, unifying diverse data streams into a cohesive operational picture. By leveraging open APIs and SDKs, the VMS can incorporate a wide range of cameras, sensors, and analytics tools. This data-driven approach to video technology enables seamless alert distribution to both the RTCC and field officers via mobile applications. IP Camera Networks: The eyes of an RTCC, these systems combine fixed, PTZ, multi-sensor, thermal, and other specialty cameras to provide continuous city monitoring. Strategically placed throughout urban areas, cameras offer comprehensive coverage of critical locations such as transportation hubs, commercial districts, and high-crime zones. This network forms the foundation for real-time monitoring and incident response. Sensor Arrays: Beyond visual data, RTCCs employ various sensor technologies. Acoustic sensors can detect sounds such as gunshots, shouts for help, breaking glass, and other sounds instantly alerting officers and cueing nearby cameras. Environmental sensors monitor air quality for gasses, smoke, and other non-visible hazards. License Plate Recognition (LPR): LPR systems act as a force multiplier, continuously scanning for vehicles of interest. By generating real-time alerts for stolen or wanted vehicles, these systems significantly enhance the ability to track suspects and recover stolen property, contributing to reduced auto theft rates. Aerial Surveillance: Many RTCCs incorporate drone technology, providing on-demand aerial perspectives of developing situations. This capability is particularly valuable for monitoring large-scale events, assessing natural disasters, supporting operations in hard-to-reach areas, and serving as a powerful first response for crime scene situational awareness. AI-Powered Analytics: At the heart of many RTCC operations are sophisticated AI algorithms that analyze video data in real-time. These systems can identify a range of suspicious activities, from unattended packages to unauthorized intrusions. By rapidly processing vast amounts of video data, they help operators focus on potential threats and anomalies. Geospatial Mapping: To make sense of the influx of data, RTCCs rely on advanced mapping software. These tools visualize events, alerts, and data streams geographically, allowing operators to quickly identify patterns, clusters of activity, and relationships between incidents. Database Integration: RTCCs maintain direct connections to various law enforcement databases, including local, state, and federal resources like the National Crime Information Center (NCIC). This integration allows for rapid background checks and threat assessments, providing crucial context for ongoing operations. Cloud Infrastructure: The scalability and flexibility of cloud computing are revolutionizing RTCC capabilities. Cloud and hybrid solutions offer secure, off-site storage and facilitate easy data sharing between agencies. This approach not only reduces initial costs but also allows for incremental upgrades, making advanced RTCC functionality accessible even to agencies with limited budgets. Real-world impact RTCC operators tracked shooting suspects via camera feeds, guiding officers to their locationThe proliferation of RTCCs across the United States with over 80 centers in operation speaks to their proven effectiveness. Cities that have implemented these high-tech command centers are reporting significant improvements in response times, clearance rates, and overall public safety. Real-time surveillance In Winston-Salem, North Carolina, the local RTCC leverages over 1,300 live video feeds to provide real-time surveillance across the city. This extensive network, combined with gunshot detection technology and license plate readers, has already demonstrated its value. In a recent incident, RTCC operators were able to track shooting suspects via camera feeds, guiding officers to their location for a quick apprehension. Video analysis by RTCC Similarly, Newport News, Virginia, saw an immediate impact after launching its RTCC in 2021. The center has played a crucial role in solving homicides caught on video and rapidly closing a series of carjacking cases. These success stories underscore the game-changing potential of RTCCs when it comes to solving crimes and gathering evidence. In Memphis, Tennessee, video analysis by RTCC detectives helped identify a shooter in custody following an incident at a community basketball court even when no witnesses had come forward. Identifying suspects with RTCC Officers and analysts can view street and body camera footage to monitor crowds at parades The Jackson Police Department in Mississippi has seen similar benefits since building an RTCC in 2019, part of a broader effort that included deploying 100 cameras and 271 body cams. Officers and analysts can view street and body camera footage to monitor crowds at parades and other events. During pursuits, the cameras provide extra surveillance, allowing officers to identify suspects or witnesses to help solve crimes. Enhancing crime mitigation and emergency response While RTCCs have proven their worth in responding to active incidents, their true potential lies in proactive crime prevention and enhanced emergency preparedness. By leveraging advanced analytics and integrated data sources, RTCCs are evolving into powerful predictive tools for law enforcement. Pattern recognition algorithms For instance, pattern recognition algorithms can analyze historical crime data alongside real-time video feeds to identify potential hotspots for criminal activity. This allows law enforcement to strategically deploy resources, increasing visible presence in high-risk areas before crimes occur. Similarly, anomaly detection systems can alert RTCC operators to unusual behaviors or suspicious activities, enabling early intervention in potentially dangerous situations. Asset and property protection, automated alerts RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7 Asset and property protection is another area where RTCCs excel. By integrating with access control systems and using AI-powered video analytics, RTCCs can monitor critical infrastructure, government buildings, and other high-value assets 24/7. Automated alerts for perimeter breaches, unauthorized access attempts, or suspicious objects left in restricted areas allow for an immediate response, significantly enhancing security postures. Emergency response and preparedness In terms of emergency response and preparedness, RTCCs serve as vital command and coordination centers during crises. Whether facing natural disasters, major accidents, or other large-scale emergencies, RTCCs provide a centralized hub for information gathering and dissemination. Real-time video streams from affected areas, combined with data from environmental sensors and emergency service communications, allow for rapid situational assessment and coordinated response efforts. Post-incident investigation and analysis RTCCs can also play an active role in post-incident investigation and analysis. The ability to quickly compile and analyze vast amounts of data from multiple sources can significantly accelerate case resolution and help identify patterns to prevent future incidents. As RTCCs continue to evolve, their capacity for integrating diverse data streams and leveraging advanced analytics positions them as indispensable tools in modern law enforcement strategy. The future of technology-driven policing The integration of artificial intelligence and machine learning promises to enhance video analytics As RTCCs continue to evolve, they are likely to incorporate even more advanced technologies. The integration of artificial intelligence and machine learning promises to enhance video analytics capabilities, enabling faster and more accurate threat detection. Additionally, the expanding use of drones, subject to FAA regulations, could provide RTCCs with cost-effective aerial surveillance options. Effective and ethical operations However, the implementation of RTCCs is not without challenges. Agencies must navigate issues of privacy, data security, and community trust. Ongoing training for personnel and careful planning are essential to ensure these centers operate effectively and ethically. Data-driven approach Despite these hurdles, the trend toward technology-driven policing shows no signs of slowing. RTCCs represent a shift from reactive to proactive law enforcement strategies, offering a data-driven approach to crime prevention and response. As these centers become more prevalent, they will play an increasingly vital role in helping agencies maximize their resources and make informed decisions, ultimately contributing to safer communities for all.
There’s a new security paradigm emerging across malls, server farms, smart office buildings, and warehouses, and its advantage over the status quo are so broad they are impossible to ignore. Instead of a lecture, let’s start with a short narrative scenario to illustrate my point. Darryl's work Darryl works as a security guard at the Eastwood Mall. Like any typical evening, tonight’s shift begins at 9:30 PM, as the stores close and the crowds thin. His first task: Ensure that by 10 pm, all mall visitors have actually left and that all doors, windows, and docks are locked securely. As he walks through most major areas throughout the mall, he checks them off his list. All’s quiet, so after a 45-minute patrol, he stops for a quick coffee break before heading out again. He repeats the process throughout the night, happy to finish each round’s checklist and rest his feet for a few minutes. Challenge: Vandalism during the shift A few cameras located sporadically throughout the mall recorded two dark figures moving in and out of the shadows As usual, there’s nothing notable to report, he clocks out and heads home. The next morning, however, he's greeted by an angry mall manager. He learns that sometime during his shift, three stores were robbed and a back hallway vandalized. A few closed-circuit cameras located sporadically throughout the mall recorded two dark figures moving in and out of the shadows at about 4 am. The mall manager demands an explanation, and Daryl has none, “They must have been hiding during closing time and then waited for me to pass before acting,” he says. “I can only be in one place at one time. And if they were hiding in a dark hallway, I would never have seen them.” Theft explanation “Actually,” explains the manager, “we found a loading door ajar near the furniture store. We’re guessing that’s how they got in, but we can’t be sure. Do you check all the docks? We need to know if we need to replace a lock. Look at your logs - tell me exactly what you saw and when.” Daryl tries to recall. “I'm pretty sure I checked that one a couple of times. I checked it off my list.” Darrell decides not to mention that at 4:00 AM, he was feeling the night's fatigue and might have skipped that area a couple of times. That's the end of our tale. Poor Daryl is not a bad security guard, but he’s only human. His job is repetitive and unstimulating. Darryl's work log He checks off each location for the record, but there's no way for him to record the thousands of details Let’s discuss his hourly log. He checks off each location for the record, but there's no way for him to record the thousands of details he sees to later zoom in on the few observations that might be helpful for an investigation. He has walked by that loading dock door hundreds of times, and it's all a blur. This isn’t an unusual story; Darryl is doing the same job that humans have been doing in almost precisely the same way for millennia. And, like last night, the criminals have always found a way to avoid them. But there is a better way. Solution: Fully-automated indoor drone Replacing a human guard with a fully-automated indoor drone eliminates virtually all the problems we've identified in this story as it flies through the facility: Drone teams can work 24/7: While each drone needs to dock to recharge its battery periodically, a fleet working in concert can patrol around the clock in multiple areas simultaneously. This makes it much more difficult for an intruder to move freely, without risk of discovery. A drone can even keep an eye out and keep recording while docked. Drones see and log everything: Everything is recorded and stored in full detail as they compare what they see with what they expect to see High-resolution onboard cameras and ultrasensitive sensors can detect heat, movement, and moisture, and see into dark areas much more effectively than the human eye. As they aren't limited to the floor, they can also fly high in the air to look above obstacles and at high windows or warehouse shelves. And they don’t lose focus or get bored as the night drags on: Everything is recorded and stored in full detail as they compare what they see with what they expect to see based on a previous flight. Anything unusual triggers an alert. Drones don’t need vacations, snack/bathroom breaks, or new-recruit training: Without the need to deal with biological requirements, you aren't paying for non-work hours, and there’s no overtime for extra hours or holiday shifts. In a high-turnover business like security, there's no time spent training new employees; adding drones to your fleet simply means installing your existing procedures onto each. There is certainly room for judgment calls that require human intervention, but these can often be handled remotely using a control panel that provides all relevant data and alerts from the drones on duty. That means no scrambling to the office in the middle of the night for a false alarm. Drones outshine stationary cameras and the people staring at those screens: A guard in the security office staring at dozens of these screens usually loses their attention span throughout the shift Close-circuit cameras are expensive to install, maintain, and periodically replace. In addition, they are limited in their scope and, almost by definition, leave large blind spots. A guard in the security office staring at dozens of these screens (that generally show nothing notable) usually loses their attention span throughout the shift. Conclusion In short, there is a good reason that our industry is following close on the heels of the manufacturing industry, which has been eagerly adopting robotics as a more cost-effective and precise solution for years. It is simply becoming harder and harder to justify the expense of the traditionally error-prone and monotonous work that we ask of our security guards.
Although video camera technology has been around since the early 1900s, it was not until the 1980s that video started to gain traction for security and surveillance applications. The pictures generated by these initial black and white tube cameras were grainy at best, with early color cameras providing a wonderful new source of visual data for better identification accuracy. But by today’s standards, these cameras produced images that were about as advanced as crayons and coloring books. Fast forward to 2022, where most security cameras deliver HD performance, with more and more models offering 4K resolution with 8K on the horizon. Advanced processing techniques, with and without the use of infrared illuminators, also provide the ability to capture usable images in total darkness; and mobile devices such as drones, dash cams, body cams, and even cell phones have further expanded the boundaries for video surveillance. Additionally, new cameras feature on-board processing and memory to deliver heightened levels of intelligence at the edge. A new way of doing things But video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends: 1) Purpose-built performance Several video analytics technologies have become somewhat commoditized “intelligent” solutions over the past few years, including basic motion and object detection that can be found embedded in even the most inexpensive video cameras. New, more powerful, and intelligent video analytics solutions deliver much higher levels of video understanding. Vintra custom-built their platform to focus on what matters most to security professionals: speed and accuracy.” This is accomplished using purpose-built deep learning, employing advanced algorithms and training input capable of extracting the relevant data and information of specific events of interest defined by the user. This capability powers the automation of two important workflows: the real-time monitoring of hundreds or thousands of live cameras, and the lightning-fast post-event search of recorded video. Vintra video analytics, for example, accomplishes this with proprietary analytics technology that defines multi-class algorithms for specific subject detection, classification, tracking, and re-identification and correlation of subjects and events captured in fixed or mobile video from live or recorded sources. 2) Increased security with personal privacy protections The demand for increased security and personal privacy are almost contradictory given the need to accurately identify threatening and/or known individuals, whether due to criminal activity or the need to locate missing persons. But there is still societal pushback on the use of facial recognition technology to accomplish such tasks, largely surrounding the gathering and storage of Personally Identifiable Information (PII). The good news is that this can be effectively accomplished with great accuracy without facial recognition, using advanced video analytics that analyze an individual’s whole-body signature based on various visual characteristics rather than a face. This innovative approach provides a fast and highly effective means of locating and identifying individuals without impeding the personal privacy of any individuals captured on live or recorded video. 3) Creation and utilization of computer vision Computer vision-driven video analytics transform professional video security systems from being purely reactive to proactive and pre-emptive solutions.” There are a lot of terminologies used to describe AI-driven video analytics, including machine learning (ML) and deep learning (DL). Machine learning employs algorithms to transform data into mathematical models that a computer can interpret and learn from, and then use to decide or predict. Add the deep learning component, and you effectively expand the machine learning model using artificial neural networks which teach a computer to learn by example. The combination of layering machine learning and deep learning produces what is now defined as computer vision (CV). A subset but more evolved form of machine learning, computer vision is where the work happens with advanced video analytics. It trains computers to interpret and categorize events much the way humans do to derive meaningful insights such as identifying individuals, objects, and behaviors. 4) Increased operational efficiencies Surveillance systems with a dozen or more cameras are manpower-intensive by nature, requiring continuous live or recorded monitoring to detect and investigate potentially harmful or dangerous situations. Intelligent video analytics, which provides real-time detection, analysis, and notification of events to proactively identify abnormalities and potential threats, transform traditional surveillance systems from reactive to proactive sources of actionable intelligence. In addition to helping better protect people, property, and assets, advanced video analytics can increase productivity and proficiency while reducing overhead. With AI-powered video analytics, security and surveillance are powered by 24/7 technology that doesn’t require sleep, taking breaks, or calling in sick. This allows security operations to redeploy human capital where it is most needed such as alarm response or crime deterrence. It also allows security professionals to quickly and easily scale operations in new and growing environments. 5) A return on security investment “With video analytics, what has always been regarded as a cost center is now being looked at as a profit center.” The advent of advanced video analytics is slowly but surely also transforming physical security systems from necessary operational expenses into potential sources of revenue with tangible ROI, or as it is better known in the industry, ROSI – Return on Security Investment. New video analytics provide vast amounts of data for business intelligence across the enterprise. Advanced solutions can do this with extreme cost-efficiency by leveraging an organization’s existing investment in video surveillance systems technology. This easy migration path and a high degree of cost-efficiency are amplified by the ability to selectively apply purpose-built video analytics at specific camera locations for specific applications. Such enterprise-grade software solutions make existing fixed or mobile video security cameras smarter, vastly improving how organizations and governments can automatically detect, monitor, search for and predict events of interest that may impact physical security, health safety, and business operations. For example, slip-and-fall analysis can be used to identify persons down or prevent future incidents, while building/area occupancy data can be used to limit crowds or comply with occupancy and distancing guidelines. In this way, the data gathered is a valuable asset that can deliver cost and safety efficiencies that manual processes cannot. 6) Endless applications The business intelligence applications for advanced video analytics platforms are virtually endless including production and manufacturing, logistics, workforce management, retail merchandising and employee deployment, and more. This also includes mobile applications utilizing dashboard and body-worn cameras, drones, and other forms of robotics for agricultural, oil and gas, transportation, and numerous other outdoor and/or remote applications. An added benefit is the ability to accommodate live video feeds from smartphones and common web browsers, further extending the application versatility of advanced video analytics. Navigating a busy intersection The accelerated rate of development for new advanced video analytics makes the intersection of video and AI technologies a very busy one to navigate. Just like crossing the street, one needs to be cautious in their approach. There are a lot of players entering this space who are making big statements and claims about their solutions. When vetting a provider, consider that it’s all about how they develop their technology, the accuracy they deliver, and their ability to leverage this new source of data to improve the specific outcomes you need to achieve. And most of all, it’s about proof of performance and how they arrived at the desired outcomes. Navigate your way across this busy intersection pragmatically, and you will find intelligent video analytics to be a real game-changer for your organization’s physical security operations.
Security beat
Security applications for drones have evolved to provide benefits such as bird's-eye views of large areas, easy access to remote locations, and rapid deployment. However, to date, most drone applications have been outdoors. Not for long. Today, indoor drones are also finding unique opportunities for enhanced surveillance, security, and operational efficiency in indoor environments such as offices, warehouses, self-storage facilities, and malls. Indoor drones can navigate complex indoor spaces, providing real-time data and monitoring without the limitations of fixed cameras. New era of autonomous robotics A significant advantage of using drones indoors, as opposed to outdoors, is their ability to operate fully autonomously, circumventing U.S. Federal Aviation Administration (FAA) regulations that restrict such autonomy in outdoor environments. A new era of autonomous robotics enables drones to work seamlessly for users without the need for specialized flight training. A single security manager can oversee multiple indoor drones simultaneously with simple map clicks or prompts. A new era of autonomous robotics enables drones to work seamlessly for users Indoor monitoring and inspection Indoor Robotics is a company seeking to revolutionize indoor monitoring and inspection through its Control Bridge platform guiding indoor drones. Since its founding in 2018, Indoor Robotics has evolved through years of market engagement and product development. After initially recognizing a demand for autonomous indoor monitoring, the company found that existing hardware fell short. “However, we understood the challenges of full autonomy and knew we would solve it using drones,” says Bar Biton, Marketing Manager of Indoor Robotics. Indoor Robotics has evolved through years of market engagement and product development Hardware challenges Seven years later, with the hardware challenges addressed, the company is shifting focus to continually increasing value for security managers, especially with generative AI (artificial intelligence). In 2018, the problem was charging methods, which has been solved with ceiling docking stations and five patents. “Today it’s about making indoor environments safer and even saving lives by identifying blocked emergency exits, missing safety gear, leaks, fire hazards, and more,” says Biton. While indoor navigation presents challenges—such as the unreliability of GPS and the need for precision — Indoor Robotics has dedicated significant resources to achieve centimeter-level accuracy and ensure the utmost safety, maintaining a record of zero safety incidents to date, says Biton. Indoor navigation presents challenges—such as the unreliability of GPS and the need for precision Advanced AI-driven navigation systems Navigation challenges for indoor drones include maneuvering through confined spaces, avoiding obstacles, and maintaining stable flight in varied lighting conditions. To address these, Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle avoidance technologies. These solutions enable drones to adapt to dynamic environments, ensuring precise and safe navigation. Additionally, the Control Bridge platform provides real-time data and monitoring, allowing drones to adjust their routes and respond to changing conditions effectively, thus enhancing their operational reliability. Highly versatile indoor drones find applications across numerous vertical markets such as retail, logistics, healthcare, and corporate settings. Key use cases encompass security surveillance, where drones monitor premises continuously; maintenance checks, especially in hard-to-reach areas; safety inspections to comply with regulations and company policies; and emergency response to provide real-time data during incidents. In warehouses, drones efficiently inspect high shelves. Healthcare facilities and data centers use them to oversee restricted zones. Additionally, corporate offices employ drones to automate after-hours security, safety, and maintenance routines. Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle-avoidance technologies Alerts to the remote management team One Indoor Robotics client, a global tech company, deploys drones to enhance site surveillance and operational efficiency across six offices in three countries. The drones conduct regular security patrols after-hours, monitor facility activities, and ensure compliance with safety standards. This deployment has significantly improved the overall safety and security of their offices. The drones provide real-time alerts to the remote management team, enabling prompt responses to any anomalies, such as maintenance issues or unauthorized access. “The key advantage is the unified security standard provided by our Control Bridge operating system, allowing them to oversee all their sites from one centralized platform, ensuring consistent security management across all locations,” says Biton. When indoor drones co-exist with human workers, primary challenges include ensuring safety and preventing disruptions. Drones are equipped with advanced sensors and AI-driven obstacle avoidance systems to detect and navigate effectively around people. Strict operational protocols and designated flight paths are implemented to minimize interactions. Additionally, many drone operations are scheduled for after-hours to further reduce potential disruptions. “Safety is our top priority, and we invest significant resources to ensure it,” says Biton. “We are proud to report zero safety issues to date, reflecting our commitment to maintaining a secure environment for both drones and human workers.” Deploys drones to enhance site surveillance and operational efficiency across six offices in three countries Implementation of indoor drones Indoor drones are significantly more cost-effective and affordable when compared to traditional security methods like additional cameras, sensors, manpower, and even ground robots, says Biton. They cover larger areas and provide dynamic surveillance in less time, offering real-time data collection and enhanced flexibility. Unlike cameras or ground robots, drones eliminate blind spots and adapt to environmental changes autonomously. They also offer substantial indirect savings by optimizing maintenance routines, according to Indoor Robotics. For instance, a drone can instantly identify issues in hard-to-reach areas, allowing for immediate, targeted responses, instead of requiring an inspector first and then a technician, thus streamlining maintenance processes. “The biggest obstacle to greater implementation of indoor drones is education and awareness,” says Biton. “Many people are not yet exposed to the concept of autonomous indoor drones and may find it hard to believe they really work.” To overcome this, Indoor Robotics focuses on creating awareness and educating customers about the reliability and benefits of the technology. Demonstrations, case studies, and clear communication about the capabilities and safety of drones are key. By showcasing successful implementations and providing hands-on experiences, Indoor Robotics seeks to build trust and drive wider adoption of indoor drone technology in security applications. Control Bridge operating system Drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms A common misconception is that indoor drones are intrusive and pose significant privacy risks. However, drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms. They operate primarily during off-hours and are programmed to avoid sensitive areas, focusing solely on enhancing security and operational efficiency. The solution also includes rigorous data protection measures to safeguard any collected information, ensuring compliance with privacy regulations and addressing concerns effectively. Soon, automation will become integral to tasks across all facility types, from manufacturing and logistics to retail and office spaces. Using Indoor Robotics’ Control Bridge operating system, facility managers will deploy fleets of robots to identify issues, collect data, and gain insights to enhance operations, maintenance, and safety. Facilities will benefit from 24/7 AI-driven monitoring, eliminating the need for occasional surveys. Managers will receive immediate alerts for any anomalies, with preventive maintenance tasks seamlessly integrated into building management platforms, ensuring optimal performance and safety. New standards in the industry The Indoor Robotics platform-agnostic approach provides flexibility and scalability. “As we continue to evolve, we support more and more platforms, enabling our clients to tailor their indoor monitoring solutions to their specific needs,” says Biton. “We believe that the future of security lies in intelligent, automated systems that can adapt to dynamic environments and provide real-time insights,” says Biton. Indoor Robotics seeks to be at the forefront of this transformation, setting new standards in the industry and paving the way for a safer, more efficient future.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanization, and the growing expectations of commuters and governments are pressuring transit industry players to modernize. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organizations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organizations looking to drive higher productivity and profitability margins should consider security upgrades that prioritize integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organized retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetize theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organizations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimizing overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
The Global Security Exchange (GSX 2022) in Atlanta in September 2022 is the latest example of the energetic post-COVID resurgence of security trade shows. On the vibrant show flow, discussions centered on topics such as the security industry’s need for more employees and the lingering impact of a months-long supply chain crisis. Against a backdrop of continuing industry challenges, exhibitors and attendees were diverted by a wealth of new opportunities as the industry rebounded. Several major players had big product announcements at GSX 2022 in Atlanta. Manufacturers unveil the latest technology The big news at Genetec was “5.11.” That’s the newest version of Security Center, which is “all in,” i.e., providing everything Genetec offers in a single “unified” platform. The unified approach streamlines the process for systems integrators, makes quotes easier, and adds value for customers. Standard, Pro, and Enterprise versions provide video, access, and LPR “right out of the box.” Genetec is also launching a new web and mobile client for the “next generation operator.” Paid intern program Kyle Hurt says the security industry’s biggest challenge is attracting personnel Kyle Hurt, Genetec’s Senior Sales Director, North America, says the security industry’s biggest challenge is attracting personnel (even more challenging that the supply chain.) Genetec’s response is a robust paid intern program, welcoming 120 interns into various departments for a full semester. The program helps to feed Genetec’s need for new talent. “You can’t coach passion,” said Hurt. WiseNet Edge Hanwha Techwin introduced a “serverless camera” at GSX 2022, named the WiseNet Edge. It is a video camera with a built-in solid-state hard drive for storage. The camera can store its own video and take in other camera feeds. In effect, it operates like an NVR but is less expensive and with an internal solid-state drive. Video can be viewed through a cloud browser, and Hanwha’s WAVE software, loaded on the camera, enables the management of several cameras at a site. High-res video is stored inside the camera, and any information can be shared with the cloud according to the needs of the application. i-PRO Mini i-PRO launches its own Video Insight video management system and MonitorCast access control i-PRO has fully transitioned away from Panasonic and is charting its own ambitious future path. Seeking to be “bold, trusted, and flexible,” the company is releasing a raft of new products, filling in previous gaps in the line, and bringing forward new innovations, including a full complement of AI. In addition to hardware, they have their own Video Insight video management system and MonitorCast access control, which was part of the Video Insight acquisition in 2015. An i-PRO Mini is a tiny camera, smaller than a smartphone. All cameras are NDAA compliant. People are coming together “The show has been phenomenal,” said Josh Letourneau, Chief Commercial Officer, Prosegur USA. “It’s very nice to see that people are coming back. After the pandemic, we are finally in a position of coming together. Lots of organizations are coming to see us.” Intelligence-led risk management Prosegur is a global company looking to expand aggressively in the United States, creating multiple “metropolitan service areas,” where the company’s fully integrated offerings are available. What makes the company unique is its “intelligence-led risk management,” says Josh Letourneau, adding “It’s more than AI, it’s about human intelligence, too." Prosegur sees evolution and growth opportunities in the U.S. market. “We are one of the largest companies no one has heard of,” adds Letourneau. “The show seems as back to normal as possible,” said Keith Bobrosky, President of Delta Scientific, who attended the show although his company did not exhibit, adding “There seems to be a generally positive spirit about the show this year.” Physical security protocols Bobrosky sees data centers as the next big market for his company’s vehicle barriers Bobrosky’s company has worked aggressively to avoid the impact of supply chain issues, ordering plenty of extra inventory to avoid the possibility of a part running out of stock. “We got ahead of it and are past the worst of it,” he said. Bobrosky sees data centers as the next big market for his company’s vehicle barriers. “The government will mandate physical security protocols for cybersecurity locations because they house data that affects national security,” he says. Robots and indoor drones ADT Commercial highlighted robots and indoor drones for security apps at their booth. The newest versions of the humanlike robots offer extra padding, more fluid movement, and 360-degree viewing for a better virtual reality (VR) experience, including better peripheral vision. Robots can operate for four hours without a charge and “know” when to return to the charger (to “top off” every hour). Fully autonomous indoor drones can also replace guards, flying near the ceiling and generally after business hours. The use of either robots or drones can lower costs when compared to hiring human guards. Varied uses for canines in security Glen Kucera, Chief Executive Officer, MSA Security, highlighted the capabilities of canines for explosives and firearms detection. “People don’t realize the flexibility of what they can do,” he said. Kucera says canines provide a sophisticated solution to address the escalating active shooter and criminal threat. MSA Security was acquired last year by Allied Universal, adding to the company’s varied offerings for threat detection and management. Rather than individual products, Allied Universal’s emphasis at the show was on bringing solutions together. Their message: Risk is multi-dimensional and different from one client to the next. Access control Access control needs to develop more modern interfaces to compete with new technology companies AMAG’s news at the show included a new president, David Sullivan, who highlighted AMAG’s role as one of the “last independent access control companies.” He said, “The beauty of AMAG is its installed base and loyal integrator channel.” Sullivan sees changing trends in how office space is managed in the wake of the pandemic. More workplace management applications will emerge, with one of the elements being access control. Access control also needs to develop more modern interfaces to compete with new technology companies entering the market. An encouraging sign is that AMAG had its best year ever in 2021. Orion Entrance Control Orion Entrance Control showed off one of its modern new turnstiles at the RealNetworks/SAFR booth at GSX 2022. The turnstile incorporates an access control module from Elatec to update and expand card reader functionality. Using the module streamlines Orion’s processes and avoids having to update a customer’s readers individually. The turnstile at GSX also incorporated a facial recognition system from SAFR, which could be used instead of, or in addition to, the access control reader. Balancing the cloud and on-premise systems Salient Systems is looking to balance the use of on-premise and cloud systems and emphasize data instead of video. Rather than a single market, Salient sees security as a variety of smaller markets, each focused on different needs. Salient’s customers are typically larger and have multi-site deployments with thousands of cameras. On-premise systems appeal here because they offer an element of control. Open-platform APIs Internal teams at customer sites are seeking out and finding new ways to leverage the data from video systems “People have a keen interest in control and ownership of their data,” says Sanjay Challa, Chief Product Officer, Salient Systems. Internal teams at customer sites are seeking out and finding new ways to leverage the data from video systems, and some of the uses fall outside the traditional “security” market. Open-platform application programming interfaces (APIs) enable more integration with various systems, and broader applications enable customers to leverage budgets from other stakeholders in an organization. Add-on services “They’re unwilling to shift the entire solution to the cloud, but they want to leverage cloud technologies,” says Challa. For Salient, a cloud system provides remote access to monitor and service video installation remotely. “We enable the integrator to reach into your system to provide a higher level of service,” says Sanjay Challa. He concludes, “Our add-on services bring the best of the cloud to on-premise systems, and integrators don’t have to roll a truck to solve a problem with the system. We are focused on helping integrators succeed.”
Case studies
A damning new report shows theft from construction sites is surging nationwide, detrimentally affecting projects, firms and employees. Key findings Spike in cases: Two-thirds of respondents say the rate of theft increased in 2023, as the resale value of goods reached record levels. Criminals are getting smarter: one in three believe crime, including theft, physical violence, harassment and vandalism, is becoming more sophisticated. It comes as reports of criminals using drones to target sites become more frequent. A hidden productivity drain: A third of projects have been delayed due to crime, with copper and cable topping the tables as the most frequently targeted goods–delaying the development of critical infrastructure, such as railways. Workers bear the brunt of poor security: one in four workers have been left out of pocket, after having to replace stolen tools, and say being robbed is their “biggest fear.” However, security is seen as a “low priority” on sites they work on (30%). Underestimation of the risks BauWatch, examines the senses of building workers, to understand their incidents of theft at work The “Unseen Threats: 2024 Construction Crime Index,” from pioneering site-security provider, BauWatch, examines insights from construction workers, to understand their experience of theft at work. It suggests a “perfect storm” of factors, including goods inflation, increasingly sophisticated criminal tactics, and a general underestimation of the risks, are making sites vulnerable to crime, in turn causing major delays to projects, as well as denting staff morale. It also identifies the types of perpetrators that might pose a threat, including opportunists, professional gangs, and “insiders” (criminals posing as legitimate personnel), and outlines a list of best practice measures that can be immediately employed to minimize the risk of a robbery. BauWatch’s crime index We’ve observed that, since the Government removed the construction industry’s access to red diesel Rico Wojtulewicz, Head of Policy and Market Insight at the National Federation of Builders said: “We’ve observed that, since the Government removed the construction industry’s access to red diesel, fuel theft has risen, as indicated by responses in BauWatch’s crime index. CCTV has therefore become an even more important tool to help tackle site crime, not only because it acts as a deterrent and helps collect video evidence but as it also offers an insight into how and where a site might be better protected.” With criminals seemingly becoming more brazen, BauWatch, which supplies CCTV security to over 5000 active Construction sites across the UK and Europe, and the National Federation of Builders, are calling for firms to take extra preventative action against thieves, rather than taking a “wait and see” approach. Author's quote “Construction sites have always attracted thieves, but with the resale value of goods going through the roof, they’re now prime targets. So, it’s worrying to see that some workers don’t feel confident about on-site security,” said Alexis Potter, BauWatch’s Managing Director. Potter added: “Repeated incidents, even small ones, have huge repercussions if left unchecked as we can see in this report. The best way to minimize the impact of theft is to deter criminals from entering at all, so we are advocating for the adoption of preventative security measures to protect staff, safeguard investments and maintain project schedules.”
Artificial Intelligence Technology Solutions, Inc., a global pioneer in AI-driven security and productivity solutions along with its wholly owned subsidiary, Robotic Assistance Devices, Inc. (RAD), announced that it is in preparation to ship an order of 10 ROSA™ security devices to a major urban East Coast University. This multiple ROSA deployment will also see the implementation of RAD Light My Way™, providing the students and university staff with an additional layer of safety and security as they move about the campus. ROSA's cutting-edge AI ROSA units will also allow students and staff to instantly summon powerful deterrence This major deal marks a game-changer for campus safety, as the tech-savvy school aims to replace outdated call boxes with ROSA's cutting-edge AI and security capabilities. Equipped with RAD's innovative RAD Light My Way system, the ROSA units will also allow students and staff to instantly summon powerful deterrence and emergency assistance. Enhanced safety measures The CEO of AITX and RAD, Steve Reinharz, expressed that the deployment of RAD's security devices and solutions is an essential step in updating obsolete security measures. The robots will be positioned in busy areas on the campus, replacing old call boxes and enhancing the safety measures currently in place. AI-driven security solutions The university's decision to implement these AI-driven security solutions reflects the ongoing trend of using advanced technology to combat campus crime. According to findings published in June 2022 from the School Survey on Crime and Safety, postsecondary education campuses experienced a total of 27,300 crimes during the 2019-2020 period. Crimes reported Forcible sex offenses accounted for 43%, burglaries for 33%, and motor vehicle thefts for 11% The reported crimes amounted to approximately 19 incidents per 10,000 full-time students. Among these reported offenses, forcible sex offenses accounted for 43%, burglaries for 33%, and motor vehicle thefts for 11%. The Company confirmed that one of RAD’s largest dealers has received the purchase order from the university. The names of the university and dealers are expected to be announced in the future. RAD Light My Way “This marks another highly visible deployment of RAD Light My Way,” said Steve Reinharz, adding “The ROSA devices will be positioned in busy locations throughout the campus replacing obsolete and ineffective call boxes." He continues, "Like so many other colleges and universities, this school has experienced an increase in crime and a sharp decline of student confidence in the safety measures that are in place.” Easy-to-use devices “We welcomed a large contingent of the university’s administrative and security staff to the REX a few months ago,” said Mark Folmer, CPP, PSP, FSyI, President of RAD. He adds, “They were so impressed with RAD Light My Way and how easy it is to use. We are looking forward to having much of the school enrolled in RAD Light My Way soon. Collectively, we expect this and the deployment of the ROSAs to be welcomed throughout the campus.” Ship and deploy units The Company stated that all units are expected to be shipped and deployed within the next 2 weeks The Company stated that all units are expected to be shipped and deployed within the next 2 weeks. The Company anticipates receiving permission from its largest RAD Light My Way user, an East Coast regional hospital group, to be named and provide testimonials on its application and use shortly. ROSA AI-driven security analytics ROSA is a multiple award-winning, compact, self-contained, portable, security and communication solution that can be installed and activated in about 15 minutes. Like other RAD solutions, it only requires power as it includes all necessary communications hardware. ROSA’s AI-driven security analytics include human, firearm, and vehicle detection, license plate recognition, responsive digital signage and audio messaging, and complete integration with RAD’s software suite notification and autonomous response library. Two-way communication Two-way communication is optimized for cellular, including live video from ROSA’s dual high-resolution, full-color, always-on cameras. RAD has published three case studies detailing how ROSA has helped eliminate instances of theft, trespassing, and loitering at car rental locations and construction sites across the country. RAD Light My Way has been the recipient of two Secure Campus 2022 Awards from Campus Security & Life Safety Magazine. In October 2021 RAD Light My Way along with RAD's ROSA won CBRE’s 2021 Best Workplace Experience Solution Award. AI-driven Solutions-as-a-Service business model RAD solutions are specifically designed to provide cost savings to businesses of between 35%-80% AITX, through its subsidiary, Robotic Assistance Devices, Inc. (RAD), is redefining the $25 billion (US) security and guarding services industry through its broad lineup of innovative, AI-driven Solutions-as-a-Service business model. RAD solutions are specifically designed to provide cost savings to businesses of between 35%-80%, when compared to the industry’s existing and costly manned security guarding and monitoring model. Cost savings RAD delivers this tremendous cost savings via a suite of stationary and mobile robotic solutions that complement, and at times, directly replace the need for human personnel in environments better suited for machines. All RAD technologies, AI-based analytics, and software platforms are developed in-house. Sales opportunities RAD has a prospective sales pipeline of over 35 Fortune 500 companies and numerous other client opportunities. RAD expects to continue to attract new business as it converts its existing sales opportunities into deployed clients generating a recurring revenue stream. Each Fortune 500 client has the potential of making numerous reorders over time.
Latvia has a burgeoning community of drone enthusiasts with around 6,000 registered pilots, an increase of more than 60 percent since 2021. However, there are many more who are unlicensed. The Civil Aviation Agency, which regulates the use of drones in the country in line with wider European rules, says around only half of the pilots registered qualify to fly an unmanned aircraft. Challenge with drone “We face a real challenge in Latvia with drones due to the risks in crowded areas and to critical national infrastructure with an increasing number of drones being produced and sold every year,” said Aleksandrs Šnevels, Head of Technology for G4S in Latvia. “This is a persistent and escalating threat to public safety. However, the public wants to have the freedom to be able to use and enjoy drones, so a balance needs to be found.” Drone detection solution G4S offers Dedrone’s command and control drone detection, tracking, and identification product in over 50 countries The State Police of Latvia wanted to find a security partner and a drone detection solution that would help it balance the freedom of the public to enjoy flying unmanned aerial vehicles while protecting the public and busy events such as festivals, concerts, and other gatherings. G4S was chosen by the force to put in place a mobile drone detection system and to provide training for officers using the technology. The company has entered into a partnership in EMEA with Dedrone, the pioneer in smart airspace security, and will offer Dedrone’s command and control drone detection, tracking, and identification product suite to its customers in more than 50 countries. Latvia’s State police force will be the first customer to benefit. No-fly zones Under the country’s laws, it is illegal to fly a drone over a military installation and drones must fly at least 8 km away from airports, 3 km from heliports and they must be a least 1km away from residential areas. There are also restrictions on how high a drone may fly. ”What we need is a flexible system that can detect any drone that can be deployed in different situations to provide an essential layer of security,” said Aleksandrs. “Drones have advanced significantly over the past few years and can pose a serious threat either malicious or inadvertent when someone is not properly qualified to fly one.” Dedrone technology provides continuous, autonomous interrogation and verification of drones, allowing users to detect, track, identify, analyze and mitigate threats posed by drones. Mobile drone detection systems Dedrone is a significant addition to the State Police's ability to effectively control the traffic of unmanned aircraft" G4S won a tender to provide the State Police in Latvia with six mobile drone detection systems across Riga, to track how many devices are flying across the capital city and monitor activity close to key buildings used by the police, councils, and government. "This detection equipment is a significant addition to the State Police's ability to effectively control the traffic of unmanned aircraft. The first tests with the Dedrone equipment have proven that it's of high quality and is good value for money; it will undoubtedly improve our ability to strengthen Latvia’s internal national security,” said Māris Vitkovskis, Latvia State Police representative with responsibility for unmanned aircraft systems and air navigation. Public safety “These devices make it possible to determine the height, route, and, most importantly, the location of a drone’s remote pilot, which is essential for detecting any potential law-breaking. We will use the equipment to ensure public safety, including during public events, to prevent violations, including those that may threaten the safety of the public." G4S will also pilot the use of Dedrone systems to monitor and analyze the threat drones pose across Riga. State and municipal organizations will be able to use this service to protect facilities and other sensitive buildings or areas on a subscription basis.
Protecting a site that is 15 km squared and has a perimeter measuring 19 km is quite an undertaking. Add in high winds which rule out the use of drones in the area and no phone or internet reception either and have a challenge on hands. This was the situation G4S in Turkey was faced with when they took on a two-year contract in 2022 to secure Öksüt Mine. Based in the middle of the country to the east of Ankara, it is owned by Centerra Gold and is forecast to produce 4 million tonnes of gold a year when fully operational. With potential threats from robbers, terrorists, and environmental campaigners, the site requires a 24/7 security presence. Risk assessment G4S’ first step was to conduct a risk assessment to identify the most appropriate security solution. Halil Yetik, Regional Manager at G4S in Turkey, said: “While Oksut isn’t the largest mining site that we secure, it’s still one of the most challenging. We knew we couldn’t pull something off the shelf for this kind of project given the constraints we were up against - we knew we’d need a tailor-made solution.” The use of traditional video monitoring was ruled out (several hundred cameras would be required to cover the whole site which wouldn’t be financially viable) so other options were explored. The team wanted to have maximum flexibility since the digging areas change regularly. 'View and Drive' security cameras The cameras don’t require any setup or cables and come with a generator and a solar kit After installing 250 fixed cameras around the site and perimeter, the team also came up with the ‘View and Drive’ concept: cameras (one dome and two CCTV) are attached to a telescopic pole with zoom functionality that is fitted to a trailer, allowing them to be easily moved around the site. It also doesn’t require any setup or cables and comes with a generator and a solar kit connection in case of any power shortages. Perimeter security and monitoring “We can move these cameras around the site to any area that we want to monitor closely, depending on where the most activity is on that particular day or week,” said Halil Yetik, adding “We also patrol the perimeter in vehicles every two hours to check for any suspicious activity, so we’re covering all bases.” Body-worn camera and radio It’s not just cameras that are relied on to secure the site, with 69 security professionals also stationed at the mine at any one time. Most are posted to different security points spread across the site which are equipped with panic buttons linked to the G4S central operations center in İstanbul. Each security professional also has a body-worn camera and radio (while the site has no phone or internet connection, a radio network has been established). Tailor-made training program There are strict control measures for officers assigned to the processing room who are required to wear PPE" The G4S team also wanted to create a specially designed training program for security professionals, who are often required to work alone during their eight-hour shifts. “We designed a training program with a particular focus on perimeter security, entrance and exit rules, and how to identify a suspicious package or person,” said Halil. “Health and safety are also really important because officers are often on their own, so we have a clear protocol for what to do if someone feels ill while on duty. There are also very strict control measures for officers assigned to the processing room who are required to wear PPE.” Kokpit: a security operation management software Security professionals can also share videos and images of any incidents that occur through Kokpit, a security operation management software developed by G4S in Turkey. Accessible via a mobile phone, videos or images of any incidents can easily be shared with the operations center and Centerra Gold, which Halil says, “helps us to be transparent and builds trust with them.” Critically, Kokpit can work offline too. Integrated security solution “This project is the perfect example of an integrated security solution with people and technology working hand in hand,” said Halil, adding “A lot of time and thought went into developing security cameras that are mobile, but it was just as important that the same attention was given to training our people to ensure they are well-prepared to work on such an unusual and challenging site.”
Dedrone, the market renowned company in smart airspace security, has announced that it has partnered with Threat Management Group (TMG), to provide airspace security for South Carolina Law Enforcement Division (SLED), during the popular Cooper River Bridge Run. Due to the COVID-19 pandemic, the annual race was held twice within a six-month period, in September 2021 and again in April 2022. Smart Airspace Security solution South Carolina Law Enforcement Division utilized Dedrone technology to secure the airspace for runners and spectators, during both events. Using funding from the 2020 Port Security Grant Program (PSGP), SLED leveraged Dedrone’s Smart Airspace Security solution, deploying mobile DedroneSensors on marine vessels and installing Dedrone Sensors around the bridge in a static configuration to ensure wide-area security. Dedrone’s technology helped ensure the safest and most secure events in the history of the 10K race During the 2021/2022 events, three drones were intercepted and the South Carolina Law Enforcement Division was able to quickly de-escalate the threat. Dedrone’s technology helped ensure the safest and most secure events in the history of the 10K race, the third largest of its kind in the United States of America (USA). Scalable drone detection solution “We needed a scalable drone detection solution capable of detecting a wide variety of drones and flexible enough to be deployed in our highly complex race environment, which includes both the land and marine components,” said Trey Elrod at SLED. Trey Elrod adds, “After an extensive analysis of available solutions, Dedrone was the clear market leader. The ease of deployment, robust drone detection library and simplicity of the user interface made it much easier for law enforcement to successfully protect our annual Bridge Run.” Drone detection is complex Drone detection is complex. Drones come in various shapes, sizes and control mechanisms, with fixed wings or a varying number of rotors. Radio frequencies also vary - many drones are controlled using common radio protocols, but others are controlled via Wi-Fi. Dedrone shines a light on the ‘blind spot’ of suspicious drones, ensuring airspace is safe from unwanted aircraft and providing tools to help mitigate threats. Dedrone partnership with TMG and SLED Airspace security is now a critical part of ensuring the safety of participants in any live event" Aaditya Devarakonda, the Chief Executive Officer (CEO) of Dedrone, said “We were honored to work with TMG and SLED, to help secure the iconic Cooper River Bridge Run, especially as these were the first events following the pandemic and the community was excited to be together again.” Aaditya Devarakonda adds, “Airspace security is now a critical part of ensuring the safety of participants in any live event and Dedrone makes it easy for law enforcement to quickly and easily manage unauthorized drones.” Races, stadiums and live events vulnerable to drone threats Races, stadiums and live events are especially vulnerable to drone threats, both from nefarious actors and individuals seeking to get their own unique footage. Spectators and participants alike are vulnerable to physical threats, while event organizers also worry about copyright infringement issues. Dedrone and TMG have successfully partnered to secure additional events, including NASCAR. Counter technologies for Unmanned Aircraft Systems (UAS) “TMG provides a wide range of counter technologies for Unmanned Aircraft Systems (UAS), including risk management, training, TTP (tactics, training, and procedures) development and drone detection solutions,” said Brandon Cox, the Chief Executive Officer (CEO) of Threat Management Group (TMG). Brandon Cox adds, “Dedrone is the company we trust most to provide our clients with a complete end-to-end, drone-agnostic detection solution.” Global deployments Dedrone works across 35 countries, in order to deliver best-in-class detection, identification, tracking, and mitigation of drones. The company’s technology is used by four of the G-7 nations, nine U.S. federal agencies, including the Department of Defense (DOD), and more than 70 critical infrastructure sites, 20 airports and 50 correctional facilities worldwide.
As drones are becoming commercially available to a wider audience, effective drone detection and monitoring have become increasingly important, especially for critical infrastructures and sites, such as power plants, utility centers, and airports. However, effective and accurate drone detection is challenging. In contrast to land-based monitoring and detection, aerial detection has a much wider, dome-shaped area to cover, with no real reference points. In addition, current drones are fast and small, and they can demonstrate erratic flying behavior. Visual detection systems have an additional challenge, in that they need to detect objects in variable sky and weather conditions. Drone detection for critical infrastructures Teledyne FLIR recently provided a robust drone detection system for a Swedish critical infrastructure customer. The project completed in early 2022 was also made possible by Teledyne FLIR’s longtime distributor and integration partner CCTV-Systems AB, a company that has been in the video surveillance systems business since 1982. Just like Teledyne FLIR, CCTV-Systems AB has vast experience in providing threat detection systems for industrial and security sectors all over the world. Slew-to-cue feature The system detects the drones from a long distance and automatically points the FLIR PTZ camera to the exact position Teledyne FLIR offered an integrated drone detection system based on radar and a combination of thermal and visible sensors. The system uses a so-called slew-to-cue feature, where a radar will continuously scan the sky, detect the drones from a long distance and automatically point the FLIR PTZ camera to the exact position of the detected drone, whereupon the camera will continue to track the moving object using its pan/tilt mechanism. An integrated drone detection system “Today, Teledyne FLIR is the only company that can provide a total, integrated solution for this application,” says Johan Eklund, Managing Director at CCTV-Systems AB. “The company’s radar, dual thermal and visible PTZ system, and software platform are all seamlessly integrated to provide a high-performance surveillance system. And what’s more, all of the system’s components have been thoroughly tested and proven in the field.” Technical expertise “We are very fortunate to have such a dedicated and skillful partner in CCTV Systems AB,” says William Turner, Northern European Sales Manager at Teledyne FLIR. “To satisfy the complex requirements of a demanding client, this project cut new ground and called for high levels of technical expertise and customer commitment from Johan and his team.” FLIR Ranger R8SS-3D radar R8SS-3D provides hemispherical detection and can monitor the coverage area four times per second The system includes the FLIR Ranger R8SS-3D radar, which can detect objects within a three-kilometer range and track up to 500 drone targets simultaneously, while effectively filtering bird detections. The R8SS-3D provides complete hemispherical detection and can monitor the coverage area four times per second, run 24/7, and detect all ground and aerial threats in virtually any climate, day and night. Software surveillance system Radar detections are continuously tracked with the FLIR Ranger HDC MR, a high-definition mid-range surveillance system that uses thermal imaging technology to detect threats, even in conditions where visibility is poor, at night, or in degraded weather conditions, such as fog, rain, and clouds. Everything the system picks up is monitored through FLIR’s Cameleon software platform. This software enables operators to control the surveillance system and share all detector information with other agencies. Maximum detection accuracy Teledyne FLIR also ensures that the system can operate with maximum uptime with 24/7 situational awareness From the project onset, the end-users minimum requirement was to obtain 100% accurate classification at 500 meters. Teledyne FLIR was able to far exceed this requirement due to thorough tuning and calibration and to the system’s superior optics and high-performance radar capability. Teledyne FLIR also ensures that the system can operate with maximum uptime, not considered a luxury for a critical infrastructure where 24/7 situational awareness is always needed. Minimal maintenance The system makes use of an uncooled thermal sensor, which requires minimal maintenance leading to practically zero downtime. On the other hand, a cooled camera would require periodic replacement of the cooling elements. “This system is an ideal configuration for any critical infrastructure site that wants to keep its airspace free from threats and that needs 24/7 decision-making support,” says Eklund. “The system we installed in Sweden could also be used as a reliable, mid-range drone detection system for airports, refineries, nuclear plants, utilities, and more.”
Round table discussion
The Metaverse sounds like the plot of the latest summer action movie. In reality, it’s a technology - or, more accurately, a group of technologies - that will likely have a transformational impact on a host of markets. For security, the Metaverse has an extensive list of needs. It also presents some opportunities. We asked this week’s Expert Panel Roundtable: What does the Metaverse mean for security?
Perimeter security is the first line of defense against intruders entering a business or premises. Traditionally associated with low-tech options such as fencing, the field of perimeter security has expanded in recent years and now encompasses a range of high-tech options. We asked this week’s Expert Panel Roundtable: What are the latest trends in perimeter security technology?
What is a business, or an industry, but a collection of people and the results of their work? People make all the difference in the destiny of a business or industry. And the people involved in a business reflect the impact of demographic changes – and the passage of time. The security industry has been largely built by Baby Boomers, who are getting older and increasingly stepping aside to make way for younger folks. We asked this week’s Expert Panel Roundtable: Is there a “new generation” of employees and managers entering the physical security marketplace, and what will be the impact?
The 2024 State Of Physical Access Trend Report
DownloadThe Security Challenges Of Data Centers
DownloadSecurity Practices For Hotels
DownloadHow To Solve The Disparate Systems Challenge
DownloadFacial Recognition
Download