GDPR
Suprema, a pioneer of AI-powered security solutions, announced that BioStation 3 is expected to set a new annual global sales record by the end of this year. This represents the highest annual sales record for Suprema’s biometric devices and highlights the accelerating global demand for facial authentication solutions. Global security market Importantly, this growth reflects balanced momentum across major regions rather than a temporary spike in a single market. BioStation 3 has achieve...
Genetec Inc., the global pioneer in enterprise physical security software, highlights why data sovereignty has become a central concern for physical security leaders as more surveillance, access control, and IoT systems move into the cloud. Surveillance video, access control logs, and IoT sensor readings are among an organization's most sensitive assets. As they are increasingly hosted in data centers around the world, questions such as where that data resides, who governs it, and how it can le...
Milestone Systems will use the GEFION supercomputer to accelerate the development of sovereign, responsible, and high-performance AI within Europe. The work will focus on the deployment and fine-tuning of the world’s most advanced AI Vision Language Model (VLM) for traffic and smart city applications, developed by Milestone in collaboration with NVIDIA. Today, millions of video cameras capture valuable footage that could improve everyday life. Yet much of this potential remains untap...
Flexxon, a pioneer in industrial NAND flash storage, announced the launch of X-Mask Pro – the next evolution of the company's best-selling X-Mask. Designed to secure and conceal sensitive data in mission-critical operations, X-Mask Pro delivers plug-and-play functionality, paired with unmatched durability, built-in encryption, and regulator-ready compliance, ensuring that vital information remains secure, intact, and invisible to unauthorized individuals. Infrastructure monitoring a...
iDenfy, a Lithuania-based identity verification and fraud prevention software provider, has announced the integration of BankID, Sweden’s most widely used electronic identification system, into its multi-feature Know Your Customer (KYC) platform. This update enables a secure, government-compliant verification method that accepts electronic identities (eIDs). The new integration is particularly valuable for strictly regulated sectors, such as fintech, banking, and other online financial s...
ASSA ABLOY Entrance Systems announced that its AI-powered solution for automatic sliding doors, ecoLOGIC, has earned the Certified Energy Savings Certification from GreenCircle Certified, LLC—a major independent third-party organization that verifies environmental claims. “By earning our Certified Energy Savings certification, ASSA ABLOY has demonstrated a measurable reduction in energy consumption, aligning with a higher level of environmental responsibility,” said Sara Risle...
News
Optalysys, a company enabling the future of secure computing, has launched the world’s first dedicated enterprise-grade server for blockchain — LightLocker™ Node, designed to enable Fully Homomorphic Encryption (FHE) and ensure complete confidentiality on any transaction. Traditionally, public blockchain transactions are fully transparent, meaning all activity between wallets is visible and recorded — a significant challenge for industries handling sensitive information such as financial services. LightLocker Node LightLocker Node allows encrypted data to be processed directly on blockchain without decryption LightLocker Node allows encrypted data to be processed directly on blockchain without decryption. It maintains the decentralization that blockchain offers, while adding the confidentiality, performance, and scalability required for widespread enterprise adoption of FHE. With the ability to process over 100 encrypted transactions per second, LightLocker Node provides the performance needed to efficiently support real-world use cases such as confidential token transfer, private lending and automated market markers (AMMs), where true end-to-end encryption is becoming a critical requirement. Efficient performance The global blockchain market is projected to reach $248.9 billion by 2029 The global blockchain market is projected to reach $248.9 billion by 2029 at a compound annual growth rate (CAGR) of 65.5%, as companies develop infrastructure for widespread adoption. Optalysys’ LightLocker Node is purpose-built for blockchain encryption, offering an alternative to the current reliance on costly and inefficient GPU-based systems. Its modular upgrades and cloud integration enable businesses to scale blockchain operations without increasing costs. Available as a complete server solution, LightLocker Node uses 40% less energy than traditional GPUs, offering a secure, scalable, cost-effective and energy-efficient alternative for the next-generation of encrypted blockchain infrastructure. It is the first product to be launched in Optalysys’ product roadmap. Authority Comment Dr Nick New, CEO of Optalysys, said: “Blockchain has the potential to underpin not just the future of financial services, but the next generation of the internet itself. However, its lack of confidentiality has held it back from widespread enterprise adoption, especially in financial services.” “For blockchain technologies to be adopted at scale, infrastructure that supports confidential computing is essential. Traditional hardware solutions for encrypted blockchain are costly and inefficient.” “General-use chips are also not designed for the specific requirements of encrypted transaction processing. LightLocker Node, Optalysys’ dedicated FHE hardware for blockchain, addresses this problem. It is quantum resilient and enables secure, confidential data processing directly on the blockchain, without impacting performance.”
After launching in the USA, Milestone’s Project Hafnia is now engaged in Europe with the city of Genoa, Italy. The aim is to develop AI-driven solutions to enhance traffic management systems and create smarter cities with high-quality, regulation compliant video data trained with NVIDIA NeMo Curator on NVIDIA DGX Cloud. Milestone is one of the early adopters of the newly announced NVIDIA Omniverse Blueprint for Smart City AI, a reference framework for optimizing city operations with digital twins and AI agents. Milestone is also expanding its data platform with NVIDIA Cosmos to generate synthetic video data from real-world inputs. Leveraging both real and synthetic data, Milestone will build and train vision language models (VLMs) responsibly. European cloud provider Nebius will provide the required GPU compute to train the models. New horizons AI opens up new horizons for smarter, more efficient cities with Project Hafnia’s data platform AI opens up new horizons for smarter, more efficient cities with Project Hafnia’s data platform - from intelligent traffic and transportation management to better safety and security for people and property. VLMs learn to map the relationships between text data and visual data such as images or videos, allowing these AI-models to generate summaries and insights from visual inputs. Milestone Systems is working with NVIDIA to empower European cities like Genoa to build and fine-tune computer vision and AI applications on a foundation of fully compliant and ethically sourced data. Transparency and fairness The project is rooted in regulatory integrity, data diversity, and AI relevance, aligning with the EU’s legal frameworks, including GDPR and the AI Act. This ensures both transparency and fairness in the development of AI technologies. “I’m proud that with Project Hafnia we are introducing the world’s first platform to meet the EU’s regulatory standards, powered by NVIDIA technology,” says Thomas Jensen, CEO of Milestone. “With Nebius as our European cloud provider, we can now enable compliant, high-quality video data for training vision AI models — fully anchored in Europe. This marks an important step forward in supporting the EU’s commitment to transparency, fairness, and regulatory oversight in AI and technology — the foundation for responsible AI innovation.” Milestone’s Project Hafnia Milestone’s Project Hafnia provides the missing link for developing video-centric AI innovation with a fully compliant and ethically sourced data library for fine tuning classical video analytics models and VLMs. The VLM’s accuracy and performance optimizations are tuned for running on NVIDIA GPUs and in NVIDIA AI Blueprint for video search and summarization (VSS). First service offering trained on transportation data from Genoa Project Hafnia now offers a fully European Visual Language Model for transportation management Project Hafnia now offers a fully European Visual Language Model for transportation management. The VLM is powered by NVIDIA and trained on a large volume of responsibly sourced and compliant transportation data from Genoa, Italy. "AI is achieving extraordinary results, unthinkable until recently, and the research in the area is in constant development. We enthusiastically joined forces with Project Hafnia to allow developers to access fundamental video data for training new Vision AI models. This data-driven approach is a key principle in the Three-Year Plan for Information Technology, aiming to promote digital transformation in Italy and particularly within the Italian Public Administration,” says Andrea Sinisi, Information Systems Officer, City of Genoa. Focus initially on video data While the focus of these collaborations is initially on video data, the framework is designed to scale across multiple domains and modalities, enabling future expansion and adaptation, improving the value of the data. Both the compliant dataset and the fine-tuned VLM will be made available to the cities using Project Hafnia through a controlled access license model, facilitating Europe’s AI ambitions without compromising ethical standards. Nebius to serve as European cloud solution NVIDIA cloud provider, Nebius, will serve as the EU-based cloud solution for Project Hafnia’s collaboration with Genoa. Choosing Nebius as a sovereign cloud provider ensures full compliance with European data protection regulations, supports digital sovereignty objectives, and guarantees that sensitive public-sector data remains securely within EU jurisdiction. “Project Hafnia is exactly the kind of real-world, AI-at-scale challenge Nebius was built for,” says Roman Chernin, Chief Business Officer of Nebius. “Supporting AI development today requires infrastructure engineered for high-throughput, high-resilience workloads, with precise control over where data lives and how it’s handled. From our EU-based data centers to our deep integration with NVIDIA’s AI stack, we’ve built a platform that meets the highest standards for performance, privacy and transparency.”
Regula, a developer of forensic devices and identity verification (IDV) solutions, has made its inaugural appearance in the KuppingerCole Leadership Compass for Identity Verification 2025. Mentioned in the Innovation Leaders category, the company is recognized for its 100% in-house R&D, forensic-grade technology, global document coverage, and advanced liveness detection capabilities. Cybersecurity industry analysis Specializing in IDV and cybersecurity industry analysis, KuppingerCole forecasts that the global IDV market will grow from $18.4 billion in 2025 to $50.07 billion by 2030, driven by increasing identity fraud, compliance requirements, user expectations, and technological advancements. As identity verification rapidly shifts toward fully remote and automated environments, innovation has become a key differentiator. Customer-oriented upgrade approach Innovation pioneers in IDV are defined by taking a customer-oriented upgrade approach According to KuppingerCole, innovation pioneers in IDV are defined by taking a customer-oriented upgrade approach, delivering customer-requested and forward-thinking features, while ensuring seamless compatibility with existing systems. Positioning Regula in the Innovation Leaders category, KuppingerCole analysts highlight: “Regula’s products are mature and often used to supplement other identity verification vendors’ offerings. While not as feature-complete as other offerings, Regula is a best-of-breed document and biometric verification solution with strong global coverage. With expertise across diverse industries and a global reach, Regula is positioned as a verification provider with in-house expertise for adaptable and scalable solutions.” KuppingerCole analysts In their Leadership Compass, KuppingerCole analysts pay special attention to the fact that IDV vendors have in-house technology development, strong data privacy policies, wide geographical coverage for their ID databases, and automation and machine learning (ML) to facilitate processes and user experience. On these fronts, Regula stands out by: Best-of-breed on-premises document and biometric verification solution. Comprehensive ID template database made of 15,000+ templates from 251 countries and territories. In-house R&D capabilities with significant domain-specific expertise. Advanced liveness detection technology supporting enhanced security. A mature organization with products often used to supplement other IDV vendor offerings. Regula’s recognition Regula Document Reader SDK provides automated reading and comprehensive verification of all types At the heart of Regula’s recognition are its flagship software products, which serve clients in finance, government, healthcare, education, aviation, and more. Regula Document Reader SDK provides automated reading and comprehensive verification of all types of identity documents. It reads data in all document zones, verifies security features—including dynamic ones such as holograms—and cross-checks all the data to spot forgery. Advanced spoof detection For biometric checks, Regula Face SDK enables real-time face matching, image quality assessment, and both passive and active liveness detection—the latter tested and certified under iBeta’s Presentation Attack Detection (PAD) Level 1 and 2. The solution supports 1:1 face matching and 1:n face identification with advanced spoof detection via texture and movement analysis, using both 2D and 3D methods. Regula’s solutions All biometric templates are driven locally by the client, with no data processed or stored by Regula Importantly, Regula’s solutions are designed for privacy-first deployments. All biometric templates are managed locally by the customer, with no data processed or stored by Regula. The face-matching algorithms undergo continuous testing and are benchmarked through programs like the NIST Face Recognition Vendor Test (FRVT). Document verification to biometrics “Being named an Innovation Leader by KuppingerCole is a significant milestone for us. It highlights our decades-long commitment to building all our solutions in-house, from document verification to biometrics, and doing so with the precision and trustworthiness that customers demand." "As identity verification principles and standards rapidly evolve, our focus remains the same: delivering technology that’s not only robust but also deeply practical, scalable, and privacy-conscious,” says Ihar Kliashchou, Chief Technology Officer at Regula.
At a time when quantum computing is rapidly emerging as an entirely new security challenge for organizations and governments around the world, Commvault, a major provider of cyber resilience and data protection solutions for the hybrid cloud and one of the first cyber resilience vendors to support post-quantum cryptography (PQC), announces enhancements to its PQC capabilities. These advancements are designed to help customers protect their highly sensitive, long-term data from a new generation of imminent but unknown cyber threats, creating an additional layer of support, when needed. Quantum computing 63% of technology and cybersecurity professionals say quantum will increase or shift cybersecurity risks Quantum computing uses quantum mechanics to process data and solve complex problems that could take decades with classical computers. However, these advancements bring unprecedented security challenges, along with the potential for threat actors to use quantum computing to decipher and unlock traditional encryption methods. According to the Information Systems Audit and Control Association’s (ISACA) Quantum Computing Pulse Poll, 63% of technology and cybersecurity professionals say quantum will increase or shift cybersecurity risks and 50% believe it will present regulatory and compliance challenges. Now is the time to prepare and take action. Support for quantum-resistant encryption standards Commvault has provided support for quantum-resistant encryption standards, like CRYSTALS-Kyber, CRYSTALS-Dilithium, SPHINCS+, and FALCON, as recommended by the National Institute of Standards and Technology (NIST) since August 2024. It was then that Commvault introduced a cryptographic agility (crypto-agility) framework, enabling its customers, via the Commvault Cloud platform, to address rapidly evolving threats without overhauling their systems. With today’s announcement, Commvault has built on that framework by adding support for Hamming Quasi-Cyclic (HQC), a new error correcting code-based algorithm designed to defend against threats like 'harvest now, decrypt later' where adversaries are intercepting encrypted network traffic and storing it for a later time when quantum computers are powerful enough to decrypt it. Quantum threat “The quantum threat isn’t theoretical,” said Bill O’Connell, Chief Security Officer at Commvault. “We were among the first cyber resilience vendors to address post-quantum computing, and by integrating new algorithms like HQC and advancing our crypto-agility framework, we are providing our customers with the tools to navigate this complex landscape with confidence.” “Our goal is simple and clear: as quantum computing threats emerge, we intend to help our customers keep their data protected.” Post-quantum cryptography For industries where long-term data storage is required, like finance and healthcare, Commvault's expanded post-quantum cryptography capabilities provide access to a variety of safeguards that can help fortify network tunnels against quantum-based attacks. With Commvault’s Risk Analysis capabilities, customers can discover and classify data to determine where these cryptographic capabilities may be helpful. In addition, Commvault’s capabilities are simple to implement, often using a checkbox configuration, making it easy for customers to utilize when needed. The evolving quantum landscape – the need for speed As investments pour into the quantum field, the time to address emerging threats is shrinking As investments pour into the quantum field, the time to address emerging threats is shrinking. This makes proactive adoption of post-quantum cryptography critical. “Quantum readiness has become a business imperative, particularly for industries which handle data that remains sensitive for decades. The time when currently encrypted data can be decrypted using quantum technology is closer than many people think,” said Phil Goodwin, Research VP, IDC. “Commvault’s early adoption of quantum-resistant cryptography and commitment to crypto-agility positions it at the forefront among data protection software vendors in proactively addressing quantum threats. Organizations with sensitive, long-term data need to prepare now for a quantum world.” Commvault: An invaluable partner “Commvault has been an invaluable partner in our journey to enhance cyber resilience. Their leadership in adopting post-quantum cryptography, combined with their crypto-agility framework, is exactly what we need to meet stringent government security mandates and protect highly sensitive information from emerging quantum threats,” said Jeff Day, Deputy Chief Information Security Officer, Nevada Department of Transportation. “Safeguarding sensitive data is paramount, and the long-term threat of quantum decryption is a significant concern. Commvault's rapid integration of NIST's quantum-resistant standards, particularly HQC, gives us great confidence that our critical information is protected now and well into the future,” said Peter Hands, Chief Information Security Officer, British Medical Association. “Their commitment to crypto-agility is important for healthcare organizations like ours.” Availability Commvault’s post-quantum cryptography capabilities, including support for NIST’s HQC algorithm, are immediately available to all Commvault Cloud customers running software version CPR 2024 (11.36) and later, enabling seamless adoption of quantum-resistant protection.
Global security technology pioneer, Gallagher Security, has successfully achieved certification to the updated ISO/IEC 27001:2022 standard for Information Security Management Systems (ISMS). This accomplishment builds on previous certifications under ISO/IEC 27001:2013 and reflects a continued commitment to maintaining the highest standards of information security. Gallagher’s proactive approach Transition to the 2022 version shows Gallagher’s proactive approach to evolving cybersecurity The transition to the 2022 version demonstrates Gallagher’s proactive approach to evolving cybersecurity risks and dedication to protecting clients' and stakeholders’ data through continual improvement and robust risk management practices. “Achieving ISO 27001 recertification demonstrates the strength and resilience of our information security practices,” says Mike Randle, Compliance Engineer at Gallagher. Best practices for risk management Randle added: “Our customers expect us to meet globally recognized standards like ISO 27001 because they rely on us to safeguard their sensitive data." "This certification provides assurance that their information is being managed and protected with the highest level of care, in line with best practices for risk management.” Security of sensitive information Gallagher’s uplift to meet the latest 2022 version of the standard has driven improvements As a rigorous and globally recognized framework, ISO 27001 helps organizations manage and continually improve the security of sensitive information. Gallagher’s uplift to meet the latest 2022 version of the standard has driven improvements across its systems and processes, further strengthening the integrity, confidentiality, and availability of critical data. Gallagher’s track record “This is more than a compliance milestone - it’s a reflection of our long-term commitment to security,” says Sam Dowse, Governance, Risk, and Compliance Lead. “As the threat landscape expands in complexity and scale, it’s important that we demonstrate to our end customers that we take data protection seriously. This certification gives them confidence that we are doing just that.” The recertification reinforces Gallagher’s track record of meeting international security standards and regulatory expectations across the globe. It forms part of a broader commitment to excellence that underpins Gallagher’s leadership in high-security solutions.
To help organizations stay ahead of tightening data privacy regulations, Regula, a global developer of identity verification solutions, has extended its personal data masking functionality to Regula Forensic Studio (RFS), software that powers forensic devices. This new update helps document experts protect personal data with a single click, meeting growing privacy demands without disrupting workflows. Regula ecosystem Personal data hiding feature is now also a part of the RFS toolset used by border control officers Already available in the Regula Document Reader SDK, the personal data hiding feature is now also a part of the RFS toolset used by border control officers, forensic professionals, and law enforcement agencies. This means the entire Regula ecosystem—from real-time ID verification to in-depth forensic analysis—now supports robust privacy controls natively. Regula's global survey This enhancement comes at a time when compliance is not just a checkbox, but a business-critical imperative. According to Regula's global survey, 28% of companies cite regulatory compliance as the primary reason for implementing identity verification solutions. Among large enterprises, that figure rises to 35%. Sensitive data The new capability allows document experts to easily blur or hide PII The new capability allows document experts to easily blur or hide personally identifiable information (PII), such as names, photos, and ID numbers, directly within forensic workflows. This ensures that sensitive data is handled responsibly while meeting strict global requirements like GDPR, CCPA, and others. ID verification tools “Regula’s forensic tools are trusted by professionals who handle the most sensitive identity documents, so privacy and compliance can’t be an afterthought,” said Ihar Kliashchou, Chief Technology Officer at Regula. “With one-click data masking now built into our ID verification tools, experts can instantly anonymize personal information during analysis, enabling secure, compliant workflows for audits, training, or database creation, without sacrificing speed or accuracy.” What else is new in Regula Forensic Studio? In addition to the personal data masking feature, the latest RFS release includes 40+ updates focused on speed, customization, and forensic precision: New analysis tools: Yellow dot analysis for tracing document origins and detecting unauthorized duplicates. Smarter imaging: Per-light-source gamma correction and full-spectrum HDR imaging (not just UV), improving clarity across all materials. Streamlined collaboration: Video screen capture and camera recording capabilities support team training and case reviews. Faster insights: Hyperspectral imaging is now 20% faster without compromising detail. Improved digital zoom: Expanded up to 16x for detailed inspections. Visual reporting: Ability to generate composite images under varied lighting, ideal for expert reports or courtroom presentations. Integrated workflows: Automated document searches in the Information Reference System (IRS) after MRZ reading to reduce manual steps. Flexible video modes: Three options for different examination tasks—real-time viewing without frame skipping, high-resolution capture, and an expanded A4 field-of-view mode. Wider OS compatibility: Now supports Rocky and Debian Linux distributions, expanding deployment options.


Expert commentary
The physical security industry has been in love with the cloud for quite some time. And understandably so. The promise of instant scalability, centralized access, and simplified maintenance is hard to ignore, especially in an era of remote work and distributed facilities. But reality is catching up to the hype. For many, especially those dealing with video surveillance at scale, the cloud is no longer the catch-all solution it once seemed. Rising costs, bandwidth limitations, and latency issues are exposing its shortcomings. And the more resolution increases, from HD to 4K and beyond, the heavier that burden becomes. Modern security cameras This is where edge computing, specifically AI-enabled edge processing available in modern security cameras, starts to look less like an option and more like a necessity. But it’s not just about adding intelligence to cameras. It’s about how that intelligence is deployed, scaled, and maintained. This leads us to containerization and tools such as Docker, which are a revolutionary piece of the puzzle. When cloud isn't enough Cloud analytics for video sounds great in theory: stream everything to the cloud Let’s start with a basic issue. Cloud analytics for video sounds great in theory: stream everything to the cloud, let powerful servers do the thinking, then serve up results to end-users in real time. However, in practice, this model can break down quickly for many end-users. Raw video is heavy. A single 4K camera streaming 24/7 can generate terabytes of data per month. Multiply that by hundreds or thousands of cameras, and the bandwidth and storage costs become unsustainable. Then there’s latency. If AI needs to detect a person entering a restricted area or identify a license plate in motion, seconds count. Routing video to a cloud server for analysis and waiting for a response can introduce delays. Adding in concerns about uptime, such as what happens if the internet connection goes down, it becomes clear why relying exclusively on the cloud creates friction for mission-critical deployments. The edge advantage Edge processing turns that model on its head. Instead of sending everything out for analysis, edge-enabled cameras do the heavy lifting on-site. AI algorithms run directly on the device, interpreting what they see in real time. They generate metadata—lightweight descriptions of events, objects, or behaviors—rather than raw video. This metadata can be used to trigger alerts, inform decisions, or guide further review. The benefits are obvious: latency drops, bandwidth use plummets, and storage becomes more efficient. Edge processing solves many cloud deployment issues by keeping the compute where the data is generated, on the device. This frees the cloud up to do what it’s best at: providing scalable and centralized access to important footage. But where does the edge go from here? How do we evolve these powerful IoT devices to deliver even more situational awareness? Enter Docker: An app store for edge AI They package an app along with everything it needs to run: the code, settings, libraries, and tools This is where the concept of containerization and open development platforms like Docker comes in. Let’s start with an analogy that is helpful for understanding containers. Imagine you're getting ready for a trip. Rather than hoping your hotel has everything you need, you pack a suitcase with all your essentials: clothes, toiletries, chargers, maybe even snacks. When you arrive at your destination, you open the suitcase and you’re ready to go. You don’t need to borrow anything or adjust to whatever the hotel has, since you’ve brought your own reliable setup. Containers in software work the same way. They package an app along with everything it needs to run: the code, settings, libraries, and tools. This means the application behaves exactly the same, whether it’s running on a developer’s laptop, on the edge in an IoT device, or in the cloud. Security camera with a powerful edge processor There’s no last-minute scrambling to make it compatible with the environment it lands in, because it’s self-contained, portable, and consistent. Just like a well-packed suitcase simplifies travel, containers simplify software deployment. They make applications faster to start, easier to manage, and more predictable, no matter where they’re used. For a security camera with a powerful edge processor, it’s like giving the camera its own specialized toolkit that can be swapped out or upgraded without touching the rest of the system. It also means you can run multiple AI applications on a single camera, each in its own isolated environment. Integrators and end-users These applications don’t interfere with each other and can be updated independently Want to add fall detection to a healthcare facility’s camera network? Just deploy the analytics in a container. Need to monitor loading docks for pallet counts at a warehouse? Spin up a different container. These applications don’t interfere with each other and can be updated independently. As a developer, if you use an open container platform like Docker, any system that supports Docker can utilize your software. This removes the need to do expensive custom work for each partner and ecosystem. This is one reason Docker containers are tried and true in the larger IT space and are just starting to get traction in the security sector. Docker also makes this scalable. Developers can build AI tools once and push them out to hundreds or thousands of devices. Integrators and end-users can customize deployments without being locked into proprietary ecosystems. And because containers isolate applications from core system functions, security risks are minimized. Metadata, not megabytes Traditional video analytics systems often require full video streams to be processed One of the most underappreciated aspects of this method is the way it redefines data flow. Traditional video analytics systems often require full video streams to be processed in centralized servers, either on-premises or in the cloud. This model is brittle and costly, and it’s also unnecessary. Most of the time, users aren’t interested in every frame. They’re looking for specific events. Edge AI enables cameras to generate metadata about what they see: “Vehicle detected at 4:02 PM,” “Person loitering at entrance,” “Package removed from shelf.” This metadata can be transmitted instantly with minimal bandwidth. Video can still be recorded locally or in the cloud, but only accessed when needed. This dramatically reduces network load and allows the cloud to be used more strategically: for remote access, long-term archiving, or large-scale data aggregation, without being overwhelmed by volume. Building smarter systems, together A single camera can run analytics from multiple third parties, all within a secure, containerized framework An equally important aspect of containerization is how it opens up the ecosystem. Traditional security systems are often built as closed solutions. Everything—from the cameras to the software to the analytics—comes from a single vendor. While this simplifies procurement, it limits innovation and flexibility. Docker flips that model. Because it’s an open, well-established standard, developers from any background can create applications for edge devices. Integrators can mix and match tools to meet unique customer needs. A single camera can run analytics from multiple third parties, all within a secure, containerized framework. This is a profound shift. Security cameras stop being fixed-function appliances and become software-defined platforms. And like any good platform, their value increases with the range of tools available. Hybrid: The realistic future So, where does this leave the cloud? It is still essential, but in a more specialized role. The most robust, future-proof architectures will be hybrid: edge-first and cloud-supported. Real-time detection and decision-making happen locally, where speed and uptime matter most. The cloud handles oversight, coordination, and data warehousing. Real-time detection and decision-making happen locally, where speed and uptime matter most This hybrid model is especially useful for organizations with complex deployments. A manufacturing plant might retain video locally for 30 days but push older footage to the cloud to meet retention requirements. A retail chain might analyze customer flow on-site but aggregate trend data in the cloud for HQ-level insight. Hybrid gives organizations the flexibility to optimize cost, compliance, and performance. Regulatory realities It’s also worth noting that not every organization can, or should, store data in the cloud. Privacy regulations like GDPR in Europe or similar laws elsewhere require strict control over where data is stored. In many cases, sensitive footage must remain in-country. Edge and hybrid models can make compliance easier by minimizing unnecessary data movement. Conclusion: Smart security starts at the edge The next wave of innovation in physical security won’t come from bigger cloud servers or faster internet connections. It will come from smarter edge devices, with cameras and sensors that don’t just record, but understand and classify events. And the foundation for that intelligence isn’t just AI, but how that AI is deployed. Containerization via platforms like Docker is unlocking new levels of flexibility, security, and scalability for the physical security industry. By embracing open standards, supporting modular applications, and rethinking how data flows through the system, physical security professionals can build solutions that are not only more effective but also more sustainable, secure, and adaptable. The cloud still has its place. But the edge is essential to the future for real-time intelligence, mission-critical uptime, and cost-effective deployment.
In the ever-evolving struggle between cyber offense and defense, attackers have almost always moved first. In the emerging domain of artificial intelligence, this pattern appears to be repeating itself. Yet, global cybersecurity pioneers appear disconcertingly disengaged. Just over half even agree that AI-driven attacks are set to become dramatically more complex and widespread. Equally concerning is the widespread apathy regarding AI’s role in expanding an already sprawling corporate attack surface. This is no small oversight. A recent global Trend Micro study showed that 73 percent of organizations have already suffered cybersecurity incidents due to unknown or unmanaged assets. In an era where digital blind spots are both common and consequential, hesitation is a risk few can afford. Security has to shift from reactive protection to proactive risk exposure management. The opportunity and the risk of AI Threat actors are now using jailbroken versions of legitimate generative AI tools such as ChatGPT The potential for AI to transform enterprise operations is enormous, but so is the risk. The warnings have been loud and clear. As early as the first quarter of 2024, the UK’s National Cyber Security Center (NCSC) stated that AI would “almost certainly increase the volume and heighten the impact of cyber-attacks over the next two years.” Their prediction is proving accurate. Threat actors are now using jailbroken versions of legitimate generative AI tools such as ChatGPT, freely traded as services on the dark web, as well as malicious models like FraudGPT, built on open-source large language models (LLMs). These tools are no longer just about automating tasks; they are turbocharging the entire attack lifecycle. From more convincing phishing emails and precise target selection, to sophisticated malware creation and lateral movement within breached systems, AI is driving a step-change in threat actor capability. Integrating open-source models However, this is only one side of the coin. The other, often overlooked, is AI’s impact on the corporate attack surface. Even well-meaning employees can unintentionally expand organizational risk. The widespread use of AI-as-a-service tools like ChatGPT introduces significant shadow IT concerns, especially when sensitive business information is input without proper oversight. Data processing and storage practices for many of these services remain opaque, raising additional compliance concerns under regulations like the UK GDPR and the EU’s AI Act. For those organizations that choose to build or customize their own LLMs, the risks multiply. Integrating open-source models may expose businesses to vulnerabilities, misconfigurations and flawed dependencies. Each new tool and environment adds to the complexity of an attack surface already strained by remote work setups, sprawling cloud deployments, IoT ecosystems, and accelerating digital transformation programmes. Managing the expanding risk landscape Many have already shared security incidents where a lack of asset visibility was the root cause Many security pioneers do understand what is at stake. Nine in ten agree that effective attack surface management is tied directly to business risk. They cite a long list of potential consequences, disruptions to operations, reputational damage, declining competitiveness, strained supplier relationships, financial losses and reduced staff productivity. Many have already experienced security incidents where a lack of asset visibility was the root cause. Despite this recognition, however, the response remains largely inadequate. Fewer than half of global organizations use dedicated tools to monitor their attack surface proactively. On average, only a quarter of cybersecurity budgets are allocated to managing cyber risk exposure. Third-party risk management is similarly neglected: fewer than half of firms actively monitor their vendors for vulnerabilities. This inertia creates an obvious contradiction. Security pioneers understand the business implications of unmanaged risk, but they are not equipping themselves with the tools or processes to respond. That needs to change—and fast. How AI can help defenders take the lead There is good news: AI is not only a weapon for cybercriminals. It can also be a powerful ally for defenders, particularly in the field of Cyber Risk Exposure Management (CREM). The best tools in this category use AI to continuously scan an organization’s entire digital footprint. They can automatically detect vulnerabilities, spot misconfigurations, identify rogue or shadow assets, and provide prioritized remediation recommendations. CREM platforms apply contextual filtering to reduce false positives and elevate the most urgent threats Intelligent algorithms can also analyze network behavior to identify anomalies that could signal a breach in progress. Unlike traditional tools, which often drown analysts in noise, CREM platforms apply contextual filtering to reduce false positives and elevate the most urgent threats. For overburdened security teams, this enables a far more focused and effective response. However, the keyword here is “continuous.” The nature of today’s IT environments, especially in the cloud, is dynamic and fast-moving. Assets appear and disappear within minutes. Static, point-in-time assessments are no longer sufficient. Yet more than half of organizations still lack continuous scanning processes. This leaves them exposed to risks that might persist undetected for weeks or months. Overcoming barriers to adoption So what is holding organizations back? In many cases, it’s not the technology itself but the internal politics of investment. Security pioneers interested in CREM tools often prioritize real-time alerting, clear dashboards, and seamless integration with their existing environments. All of this is now achievable. The challenge lies in securing board-level support. Many security teams still work in silos, disconnected from the broader business Boards are often cautious when it comes to cybersecurity investment, particularly when immediate ROI is not clear. To gain their trust, security pioneers must learn to speak the language of business risk, not technical threat. They must frame cyber exposure in terms of reputational impact, regulatory liability, operational continuity, and investor confidence. There is also a cultural component. Many security teams still work in silos, disconnected from the broader business. This limits their influence and makes it harder to embed security as a strategic enabler. In the AI era, this divide must be bridged. Cybersecurity must become a board-level concern, and risk exposure must be treated as a fundamental operational issue. Time to act We are at a critical inflection point. The AI revolution is not on the horizon, it is already here. Threat actors are moving rapidly to exploit it, leveraging tools and techniques that were unthinkable just a few years ago. Meanwhile, organizations remain slow to respond. Too few are investing in the tools, processes, and people needed to manage their risk exposure effectively. AI can be used not only to attack but to defend. CREM tools powered by AI offer a powerful way to regain visibility, restore control, and build lasting resilience. They enable proactive rather than reactive security. And they help organizations align their cybersecurity strategy with their broader business objectives. Security teams have to elevate the conversation. They must advocate not just for new tools, but for a new mindset, one that treats cyber risk as an enterprise risk, and one that prioritizes continuous visibility as a prerequisite for resilience.
In today’s fast-evolving aviation landscape, innovation isn’t optional — it’s essential. With passenger traffic in the Asia-Pacific continuing to surge, the region is facing a pivotal moment: adapt with scalable tech, or fall behind. In January 2025 alone, APAC carriers accounted for 56.6% of global passenger traffic growth. Airports are operating at near capacity, with a record-high Passenger Load Factor (PLF) of 82.1%, leading to pronounced congestion at check-in counters, security checkpoints, and boarding gates. Increasing passenger volumes As airports strive to manage increasing passenger volumes without resorting to costly and time-consuming infrastructure expansions, technology — particularly facial recognition and biometric automation — emerges as a viable solution. However, the full realisation of these innovations requires more than just installing new system However, the full realisation of these innovations requires more than just installing new systems. It’s about building the right ecosystem of partners, processes, and policies to ensure sustainable, secure, and scalable growth. Presenting physical documents According to their estimates, over 120 APAC airports have already deployed biometric solutions at key travel touchpoints, including check-in, bag drop, security, and boarding. Thailand exemplifies this shift, with facial recognition deployed at six major airports — Suvarnabhumi, Don Mueang, Chiang Mai, Chiang Rai, Phuket, and Hat Yai — dramatically reducing passenger processing times. These systems allow travelers to verify their identities seamlessly at multiple touchpoints, from check-in and security screening to boarding gates, without presenting physical documents. This case reflects the Airports of Thailand’s (AOT) commitment to leveraging technology to improve operational efficiency and passenger experience. Digital identity programs Biometric solutions also extend beyond the airport: digital identity programs enable travelers to verify their identities before arriving at the terminal, creating seamless journeys from curb to gate. In this environment, facial recognition is not merely a futuristic innovation; it has become an operational imperative. Airports that fail to adapt risk falling behind, unable to manage burgeoning passenger volumes or meet evolving traveler expectations. True operational efficiency Despite its transformative potential, biometric technology cannot be successfully deployed in isolation. Achieving true operational efficiency through facial recognition requires strategic collaboration among technology vendors, IT integrators, airports, airlines, and regulatory authorities. Several pillars underpin a successful biometric implementation: Interoperability: Biometric systems must integrate seamlessly with a wide array of airline platforms, security protocols, and airport infrastructure. Lack of interoperability can lead to fragmented systems that frustrate staff and passengers alike. Scalability: Passenger volumes are forecasted to continue rising. Biometric solutions must be designed to scale rapidly in response to demand surges and future security challenges. Data Privacy and Security: With growing public scrutiny over personal data usage, airports must implement robust security frameworks that prioritize privacy and transparency. Encryption, consent-based use, and strict access controls are critical to gaining and retaining passenger trust. Future security challenges BKI can achieve significant throughput gains without major construction disruptions A case study illustrates these points: Malaysia’s planned revamp of Kota Kinabalu International Airport (BKI) aims to boost capacity by 33% over the next few years. Rather than expanding physical infrastructure alone, authorities are exploring facial recognition solutions to increase efficiency within existing spaces. By integrating biometric checkpoints at key touchpoints, BKI can achieve significant throughput gains without major construction disruptions. Such outcomes are only possible through well-coordinated technology partnerships, where vendors, airports, and integrators work toward a shared vision of future-ready travel. AI-powered computer vision What’s Next: Fully Biometric-Enabled Travel Looking ahead, the pressure on APAC airports is set to intensify. Airports Council International projects 9.5 billion air travelers globally by the end of 2025, a volume traditional processing methods cannot manage effectively. In response, AI-powered computer vision and facial recognition will continue to refine biometric processes, delivering higher accuracy rates and faster verification. Future systems will leverage real-time liveness detection, predictive analytics for crowd management, and seamless integrations across all travel stages. A fully biometric-enabled journey is becoming reality: Check-in with a glance at a kiosk Drop bags without producing an ID or boarding pass Clear security with automated facial recognition portals Board flights through biometric-enabled gates — without ever presenting a physical document. Experiencing significant growth Seamless integration across touchpoints creates a unified, frictionless journey In this vision of the future, identity becomes the ticket. Seamless integration across touchpoints creates a unified, frictionless journey. For APAC airports experiencing significant growth, full biometric enablement is becoming increasingly important for maintaining efficiency and staying competitive. At the same time, such a future demands robust technology ecosystems, where ongoing innovation is supported by partnerships that align regulatory, operational, and technological goals. Expanding physical infrastructure Building the Smart Airports of Tomorrow: Join the Conversation The aviation sector in APAC stands at a critical crossroads. Passenger growth, operational challenges, and heightened security requirements are converging, creating an urgent need for innovation. Facial recognition and biometric automation offer a clear path forward, enabling airports to handle growing volumes, enhance security, and deliver superior passenger experiences without necessarily expanding physical infrastructure. Facial recognition solutions Yet, the success of these innovations hinges on strategic, trusted technology partnerships. Airports must collaborate with technology vendors, IT system integrators, airlines, and regulators to ensure interoperability, scalability, and data security. At RecFaces, they believe the future of APAC airports is fully biometric-enabled. To explore how tech collaborations and advanced facial recognition solutions can transform airport operations, they invite users to join their free online panel discussion on April 30: ‘Smart Airports Start With Smart Tech: Facial Biometrics for APAC Airports.’
Security beat
Matter is a new open-source interoperability standard that will simplify the connectivity of smart home systems, including security. The growing popularity of the Matter 1.0 standard was evident at the large Consumer Electronics Show (CES) in January in Las Vegas, where the standard was heavily promoted by companies including Google, Amazon, and Samsung. A flood of Matter-connected products is on the horizon for ship dates in the second half of 2023. Evolve, and manage IoT standards Creating the standard is the Connectivity Standards Alliance (CSA), formerly the Zigbee Alliance, which changed its name in May 2021. With 300 companies as members, CSA seeks to create, evolve, and manage Internet of Things (IoT) technology standards through a well-established, collaborative process. CSA promotes the benefits of global, open standards, and the value of the IoT to customers and consumers, and seeks to break down the barriers to broad access and adoption of IoT technologies and solutions. Matter The new brand name Matter was launched in May 2021 to designate the standard formerly known as Project CHIP (Connected Home over IP), developed by CSA member companies including Apple, Google, Samsung, and Amazon. There are currently 800 devices and apps certified to the new smart home standard, including various smart home equipment (except video cameras, which will be included in a major release in the fall of 2023). Matter version 1.0 was initial launch in October 2022. Matter 1.0 release Twice a year moving forward, Matter plans a minor release each spring and a major release each fall As part of the Matter 1.0 release, authorized test labs are open for product certification, the test harnesses and tools are available, and the open-source reference design software development kit (SDK) is complete, thus enabling new products to be brought to market. Twice a year moving forward, Matter plans updated releases, a minor release each spring and a major release each fall. Smart home interoperability Currently, a variety of CSA working groups are addressing various aspects of interoperability in the smart home, including issues such as data privacy, security, energy management, and health and wellness, says Christopher LaPré, CSA’s Head of Technology. “Implementing elements requires that the standards alliance be able to multitask on several tracks,” says LaPré. Some development is centering around connectivity and the need for a “hub” to which multiple systems can communicate and incorporate an “identity” to regulate the availability of information to various systems. The standards will enable both do-it-yourself (DIY) systems and devices deployed by professional installers. Addressing privacy requirements The new development will be guided by what installers need to succeed in the home automation" Ecosystems depend on the availability of some type of “identity” to meet privacy requirements. Rules must be implemented across the ecosystem that deploys a “trust system” to ensure privacy. Solving the challenge involves getting all the major players to the table at the technical level to meet the bar from the business and technology perspective. “Integrators and retailers will play a role as Matter continues to evolve,” says LaPré. “New development will be guided by what installers need to succeed in the home automation market.” Matter-certified devices There is still work to be done to expand the 800 certified devices to function throughout the Matter ecosystem and to add new devices over time. One goal is to simplify an integrator’s solution using fewer hubs (and possibly a single hub) to provide a wide variety of services. The timeline of adding new Matter-certified devices may be delayed by the availability of equipment in the global supply chain, says LaPré. Flexibility Multi-admin provides for the simultaneous operation of devices in multiple smart home systems A multi-admin feature of Matter enables more flexibility for multiple ecosystems. A core feature of Matter, multi-admin provides for the simultaneous operation of devices in multiple smart home systems. Accordingly, family or household members could operate the device with the digital assistant or smartphone app of their choice. A bridging protocol helps to tie existing systems together. Amazon, Apple, Comcast, Google, SmartThings, and the Connectivity Standards Alliance came together in 2019 to develop and promote this new standard, joined by fellow Alliance board member companies IKEA, Legrand, NXP Semiconductors, Resideo, Schneider Electric, Signify, Silicon Labs, Somfy and Wulian. Smart device communication Currently, member organizations span all sizes, across a range of business categories. More than 1,700 Member individuals participate in bringing the Matter specification, reference implementations, testing tools, and certification programs to life. Matter's underlying network technologies are Wi-Fi and Thread. Wi-Fi enables Matter devices to interact over a high-bandwidth local network and allows smart home devices to communicate with the cloud. Thread provides a mesh network within the home. Both the Wi-Fi Alliance and Thread Group partnered with the Connectivity Standards Alliance to help realize the vision of Matter.
For an enterprise, addressing cyber security requires that stakeholders have immediate access to critical information compiled from multiple sources and presented where and how they need it. Various data sources monitor the cyber security status of a company’s computer systems to provide real-time visibility. Aggregating that data into visual dashboards and presenting it to operators enables any cyber security problems to be flagged quickly and resolved. Software system enhances cyber security Userful Corporation provides a software system that enhances cyber security operations for an enterprise Userful Corporation provides a software system that enhances cyber security operations for an enterprise, enabling stakeholders to envision various cyber security factors, such as application security, network security, cloud security and IoT (Internet of Things) security. The software system empowers operators to respond more efficiently. Working in conjunction with a company’s existing IT infrastructure, Userful software combines datasets from diverse systems into a visual format and delivers the information to a desktop computer, a video wall, or even to a home office. Real-time visibility “It provides a new dynamic to how cyber security issues are resolved,” said Shane Vega, Userful Corporation’s Vice President (VP) of Product Marketing, adding “The individuals who have flagged a cyber security issue may not be the ones to respond. Having real-time visibility provides more value to the overall response.” A typical cyber security operations center resembles a physical security command or emergency management hub – large video walls, individual desktop workstations, and operators that need to share information and respond quickly to any incident. Userful’s software helps in managing operations centers Userful’s software manages how data is presented in an operations center environment, without relying on proprietary hardware, operating outside an end-user customer’s IT infrastructure. Managing operations centers is a core offering for Userful Corporation, including command centers of all types, from traditional network operation centers to emergency network systems to security systems. The ability to use one software system throughout an enterprise is appealing to companies that have historically grappled with proprietary and siloed systems. Solutions that are easy to deploy, manage and scale Cyber security professionals need solutions that are easy to deploy, manage and scale" “We are a platform that can be utilized across the enterprise,” said Shane Vega, adding “Cyber security professionals need solutions that are easy to deploy, manage and scale, so they can manage all the threats every day.” Compiling and displaying information to an operations center has historically involved silos of proprietary audio/video (AV) hardware. Ironically, the hardware approach presents cyber security risks that undermine the very mission of protecting a company’s data and networks. The proprietary systems operate outside the company’s network infrastructure, and IT professionals do not have visibility into the systems. Security Orchestration, Automation and Response (SOAR) Instead of hardware, displaying information on Security Orchestration, Automation and Response (SOAR) can be accomplished using software running on off-the-shelf components, managed by the IT department and featuring all the cyber security protections required, throughout the enterprise’s network infrastructure. SOAR includes threat and vulnerability management, security incident response and security operations automation, enabling companies to collect threat-related data from several sources and automate the responses. Cyber security threats Possible threats might include an influx of packet generation, malware, someone seeking access to the network, or a malicious email. Various tools manage each threat, and each must be visualized. Because the threats are related, a comprehensive dashboard enables operators to create parallels and respond more efficiently. The software-as-a-service system ensures that all software is updated and can operate on the latest hardware In the Userful AV-over-IP scenario, an IT department takes full ownership of the computers and subsystems installed on the network. The software-as-a-service system ensures that all software is updated and can operate on the latest hardware. Companies always have an ecosystem of interconnectivity. Single platform/solution The single platform/solution also extends beyond operations centers to include meeting rooms and digital signage. All images are captured using existing protocols, such as Real Time Streaming Protocol (RTSP), HTTP Live Streaming (HLS), Web Real-Time Communication (WebRTC), and so forth. In contrast, the AV industry is hardware-centric and has been known to circumvent software approaches in order to justify selling more hardware. AV systems typically operate in terms of pixels rather than bytes of information and use proprietary software. Companies always have an ecosystem of interconnectivity Different departments in a company have historically installed their own specific AV systems, based on proprietary hardware, so that each department is siloed from the rest of the organization. Dangers of random hardware on a network Random hardware on a network, beyond the reach of the IT department, can provide access points to the network for hackers and other cyber security threats. Each proprietary hardware system exists outside the existing security protocols of the enterprise and each represents a cyber security vulnerability. Some companies end up with five or six different operations centers that involve three or four manufacturers, all siloed. Software versus hardware Our biggest challenge is to get people to understand what is possible with software versus hardware" “Our biggest challenge is to get people to understand what is possible with software versus hardware,” said Shane Vega, adding “The industry is inundated with hardware, and the risk is the unknown. Customers may not be familiar with a software solution that can accomplish what they have historically depended on hardware for.” Userful Corporation works through channel partners (integrators), who assemble complete systems using Userful software and other components, such as video screens, large-format commercial displays, groups of tiled displays, projectors – any type of display with an input. Corporate policy specifies security at every level Userful’s corporate policy specifies security at every level, including user authentication, encryption, endpoint security, air-gapped servers, information security policies, General Data Protection Regulation (GDPR), and a solution built on industry-leading IT standards. To spread the word about Userful Corporation’s capabilities related to cyber security, the company will be participating in Infosecurity Europe 2022, taking place from June 21 to June 23, 2022 at ExCeL, London, United Kingdom (UK).
Mergers and acquisitions are among the most disruptive forces in the security marketplace. However, they are also both a reality and a growing trend. Whenever there is value to be leveraged, companies tend to enter into business transactions to maximize that value. For the security industry, the result is a continually shifting collection of manufacturer companies seeking new ways to provide value to customers. M&A activity continued unabated in 2021, despite residual industry challenges such as dysfunctional supply chains and lingering consequences of a global pandemic. Here are some of the larger and/or most impactful M&A transactions of 2021. Stanley Black & Decker sells to Securitas Stanley Black & Decker announces an agreement to sell most of its Security assets to Securitas AB for $3.2 billion in cash. The transaction includes Stanley Black & Decker's Commercial Electronic and Healthcare Security business lines. The businesses carry 2021 forecasted revenues of approximately $1.7 billion. “The business is well-positioned for ongoing growth within Securitas, a global pioneer in the security industry,” says James M. Loree, Stanley Black & Decker's CEO. Openpath’s solution makes businesses more secure with multi-factor authentication Motorola acquires Openpath and Envysion Motorola Solutions adds to its security industry portfolio with the acquisition of Openpath Security Inc.., a cloud-based mobile access control provider. Openpath’s solution makes businesses more secure with multi-factor authentication, enables a contactless entry experience, and can be easily scaled and managed due to its cloud-based architecture. Motorola also announces the acquisition of Envysion, a provider of video security and business analytics solutions for quick-service restaurant and retail industries. Delta Electronics buys March Networks Delta Group, a provider of power and thermal management solutions, purchased 100% of the shares in Infinova (Canada) Ltd., owner of Canadian-based video surveillance and business intelligence company March Networks, from Infinova International Ltd. through its subsidiary Delta International Holding Limited B.V. Following the close of the transaction, it was expected that March Networks will continue to operate from its Canadian headquarters, and the March Networks executive management team will continue to lead the organization. Delta Electronics is also the parent company of VIVOTEK. APi Group acquires Chubb Fire and Security Business APi Group Corp. acquire the Chubb Fire & Security Business from Carrier Global Corporation for an enterprise value of US$ 3.1 billion. Headquartered in the United Kingdom, Chubb has approximately 13,000 employees globally and a sales and service network that spans 17 countries, serving more than 1.5 million customer sites in Europe, Asia Pacific, and Canada. APi Group is a business services provider of safety, specialty, and industrial services in more than 200 locations worldwide. Teledyne Technologies Inc. will acquire FLIR in a cash and stock transaction valued at approximately $8.0 billion Teledyne acquires FLIR Teledyne Technologies Inc. and FLIR Systems, Inc. jointly announced that they have entered into a definitive agreement under which Teledyne will acquire FLIR in a cash and stock transaction valued at approximately $8.0 billion. Jim Cannon, President and Chief Executive Officer of FLIR, said, “We could not be more excited to join forces with Teledyne through this value-creating transaction.” Resideo adds Norfolk Wire and Electronics Resideo Technologies, Inc. acquired privately held Norfolk Wire & Electronics, based in Richmond, Virginia. Norfolk was founded in 1985 and is a regional distributor of security, telecom, network, and audio-video (AV) related products, supplies, and tools. With 11 full-service retail locations and a 43,000 sq. ft. distribution center, Norfolk serves customers across the mid-Atlantic region and will be part of Resideo's ADI Global Distribution business, a wholesale distributor of security, AV, and low-voltage products. Triton acquires ACRE, which acquires Feenics and Matrix Triton Partners acquired ACRE, an end-to-end security solutions provider based in Dallas/USA and Dublin/Ireland. Triton is investing alongside the current management team of ACRE. Weeks later, ACRE acquired cloud-based workplace solutions company Time Data Security (TDS). Later in the year, ACRE announced acquisition of Feenics and Matrix Systems. Feenics brings cloud-based access control solutions brings cloud-based access control solutions to ACRE’s rapidly growing network of global customers while also expanding its portfolio to support the growing demand for cloud-based security solutions. Matrix enables ACRE to expand the addressable market for the company’s technology portfolio. Brivo, Inc. and Crown PropTech Acquisitions have entered into an agreement making Brivo a publicly listed company Brivo becomes publicly traded through the merger Brivo, Inc., a cloud-based access control and smart building technologies company, and Crown PropTech Acquisitions, a publicly traded special purpose acquisition company (SPAC), have entered into a definitive merger agreement that will result in Brivo becoming a publicly listed company. The transaction values the company at a pro forma enterprise value of $808 million. Upon closing, the combined company will operate as Brivo, and its Class A common stock is expected to be listed under the ticker symbol “BRVS.” Nice buys Nortek Security Nice, a global manufacturer of smart home, security, home, and building automation solutions, , acquired Nortek Security & Control from Melrose Industries. Nortek Security & Control is a developer of technology for security, home automation, control, power, AV and entertainment, access control, health, and Artificial Intelligence (AI) systems, for residential and commercial markets. Eagle Eye acquires Uncanny Vision Eagle Eye Networks, a cloud video surveillance solutions company, has acquired Uncanny Vision Solutions, an artificial intelligence (AI) analytics and Solutions Company. The acquisition accelerates the company’s leadership in providing AI and analytics, to make customers’ businesses more efficient and the world a safer place. The acquisition also includes research and development (R&D) capabilities and a new regional office located in Bangalore, India.
Case studies
Stratas is a UK-based specialist in document automation, finance automation, and intelligent document processing (IDP). Its solutions help organizations automate processes underpinned by documents and improve control across finance and operations. Stratas needed a new, secure, and scalable data storage solution after notification that its remote storage provider planned to discontinue services. Richard Webb, the company’s Professional Services Technical Consultant, explains: “We weren’t confident that the physical servers were being properly maintained. Our provider was using older machines and running Windows Server 2012, which presented us with reliability and security challenges. If we had continued with our arrangement, things would have had to change.” Solution After considering several options, Richard and his team selected Node4’s Virtual Data Center (VDC) offering – the company’s managed, hosted Infrastructure as a Service platform. As the first step in deployment, Node4 set up a bespoke landing zone to assist Richard with data migration from his organization’s legacy servers. Node4 also configured VDC access via a secure, high-speed VPN. Public cloud solution “We told Node4 from the outset that we wanted a managed, hosted environment. We’re a lean business with no physical premises and didn’t want the overheads and complications of managing physical servers,” Richard comments. “On paper, a public cloud solution might have seemed logical. But we run several niche applications with specialized workflow and process requirements. Node4’s VDC was a better fit – we got the scalability and flexibility of public cloud without the complexity and administration headaches. But we also benefit from Node4’s support and expertise. It’s the best of both worlds.” Node4’s data center “We also wanted our data to remain in the UK on servers owned by a UK company,” he acknowledges. “That’s important for GDPR compliance and data sovereignty." "It was also a bonus that Node4’s data center is just down the road from us, so we’re hyperlocal, I guess. It all adds to the feeling that we’re not dealing with some faceless conglomerate – that there are real people on hand with a genuine interest in helping our business to thrive.” Results Stress-free migration With the landing zone operational and VPN connectivity established, Richard and his team began migrating applications and clients to their new Virtual Data Center. “Clients using our invoicing and accounting service can’t be offline for a long time – especially around month-end. So, although it was slower for us, we migrated one customer at a time at a rate of about five per week,” he explains. “Node4’s landing zone also allowed us to test migrations to ensure everything worked as expected before going live. This kept downtime to an absolute minimum and reduced many of the risks associated with migration to hosted environments.” Enhanced backup, recovery, and resiliency Richard and his team immediately benefited from switching to Node4’s virtual data center. “Our previous provider offered only basic backups, and their infrastructure lacked resiliency,” he recalls. “We could start work on a Monday and, without any prior warning, find half our servers were down. Switching to Node4’s virtual data center with modern, resilient servers – alongside built-in comprehensive backup and disaster recovery – improved our day-to-day operations and customer experience right from the outset.” Richard admits that the connectivity and reliability improvements far exceeded anything he’d hoped for. “It’s amazing! Even basics like logging in are easier. On our old system, it would take several attempts, and there was always a chance you’d get kicked out after a couple of hours. Getting online first time probably saves each of us around ten minutes a day. That may not sound much, but it quickly adds up as the weeks and months go by.” Advanced, integrated security Richard also notes that the VDC offers a range of security benefits, including firewall defences, DDoS protection and secured instances. “We’re planning to introduce multi-factor authentication to access our VPN. It’s a vital identity management tool for all businesses,” he comments. “But especially ones like ours with a 100% remote workforce.” Consumption-based model: Pay for used compute, network, and storage Richard is also keen to highlight the advantages of a consumption-based model. “The VDC is fully self-service. We can adjust compute, network, storage, and services on demand with just a few clicks – giving us complete control over our environment and costs." "This is important right now and also helps us plan ahead; for example, we can now see a pathway to rolling out AI and advanced automation in the coming years.” Transparent pricing “I like the fact that VDC pricing is transparent,” Richard admits. “We did our due diligence and looked at a few other companies. Their project and operational costs seemed lower. But there were lots of gotchas – like fixed data charges and data limits – hidden in the small print. So, when we weighed it all up, Node4, with its consumption-based pricing, was far better value and a much better organizational fit.” He concludes: “What does that mean on a day-to-day basis? Currently, we’ve scaled requirements as we’re carrying out some server consolidation work. But all that extra capacity is still there for us. And while we’re waiting, we’re not being charged for it. That’s a huge benefit. It helps us remain competitive and responsive to changing market and economic conditions.”
Located in the tranquil surroundings of Addlestone, Surrey, Rodwell House serves as part of the renowned Graham Care Group. This 79-bed nursing facility specializes in providing exceptional care for residents with dementia and physical frailties, continually seeking innovative ways to enhance service delivery. Meeting the evolving needs of modern care As a forward-thinking facility, Rodwell House sought to enhance the entry experience for both staff and visitors. The management team understood that the existing manual entry system, which required staff to remember and input codes throughout their shifts, could be improved to allow more time for resident care. For visiting relatives, many of whom are elderly themselves, the facility wanted to create an entry experience that was more welcoming and accessible. "We wanted to make visiting easier and more comfortable for families," says care home manager, Janet Bromley. Quality assurance initiatives "With the nature of the care that we provide, we need comprehensive oversight of people as they come in go out," explains Bromley. “Our commitment to provide excellent care means we recognize the value of having detailed access records throughout the building." "These support quality assurance initiatives and provide us with the insights we need to optimize the quality of our service. It was important, for example," says Bromley, “that we could get a clear record of which staff have been in different areas at particular times.” Facial recognition access control meets compassionate care Working closely with Graham Care's IT team, Rodwell House selected Hikvision's Face Recognition Terminals (DS-K1T342MWX-E1(O-STD)). 160 terminals have been strategically positioned at entry points, communal areas, and ward locations, with dedicated units for both entry and exit monitoring. Each terminal features a 4.3-inch LCD touch screen and built-in card reading functionality, supporting multiple access methods including facial recognition, card access, and traditional code entry. A particularly valuable feature for healthcare settings is the system's face-with-mask recognition capability, helping to maintain security protocols without compromising hygiene requirements. HikCentral Professional platform The terminals integrate seamlessly with the HikCentral Professional platform, creating a centralized management system that generates detailed access logs showing who entered which areas and when. This provides administrators with comprehensive visibility into facility access patterns while enabling quick retrieval of specific entry records for quality assurance or incident review purposes. To ensure full compliance with privacy regulations, Rodwell House obtained proper consent from all staff, residents, and families before implementing the system. The installation follows strict GDPR protocols, with alternative keypad access remaining available for those who prefer traditional entry methods. Delivering measurable improvements in service quality The implementation has generated significant improvements across multiple areas of facility operation. Staff members have embraced the technology enthusiastically, with entry processes becoming notably more efficient and secure. "From the staff perspective, it's brilliant," says Bromley. "I find it so easy to just go in—and other staff do, too. When it comes to entry, it's been a real and very popular success." The enhanced security capabilities of the new system now provides crucial support for safeguarding procedures. The system maintains comprehensive access records that can be quickly retrieved when investigating incidents or addressing concerns. "If we need to review any safeguarding situations, we can now easily access the entry records," explains Bromley, highlighting how detailed logging supports resident protection protocols. Relatives in the facial recognition system The new system has also revolutionized service oversight through better visibility into care delivery patterns. By recording access patterns to resident areas, management can confirm that care schedules are being followed appropriately. This enables them to verify that residents receive regular attention and ensures service consistency across all areas of the facility. Accessibility improvements are particularly significant for visiting families. The planned expansion to include relatives in the facial recognition system will eliminate the challenges associated with visitors remembering codes and operating keypads. "Facial recognition will make life a lot easier," says Bromley, emphasizing the technology's role in creating a more welcoming environment for elderly family members. A blueprint for future-ready healthcare facilities Rodwell House's successful deployment demonstrates how AIoT (AI-powered Internet of Things) technologies can enhance both security and care quality while maintaining the dignity and comfort that residents deserve. The scalable solution will be adopted across four other Graham Care facilities, with plans for over 800 additional terminals, establishing a new benchmark for smart, secure elderly care environments throughout the organization.
DFNBG Gastro GmbH & Co. KG, operator of 48 Dunkin' branches and other catering establishments in Germany, has migrated to the MOBOTIX CLOUD for the central management of its video surveillance. DFNBG partnered with MOBOTIX Diamond Partner VALEO IT Neteye GmbH for more than ten years, who have implemented and continuously optimized secure and efficient MOBOTIX video solutions in the 48 Dunkin' branches. Data protection regulations The operation of local storage systems was proving particularly difficult in shopping centers Due to the strong growth of DFNBG, the demands on the existing video management system increased. The local storage of video data became increasingly complex - both in terms of data protection regulations and the management of access rights. The operation of local storage systems was proving particularly difficult in shopping centers. The solution: a gradual migration from local NAS storage to the data protection-compliant MOBOTIX CLOUD. Access management and GDPR: the MOBOTIX CLOUD as a solution The MOBOTIX CLOUD video surveillance-as-a-service (VSaaS) offering allows users to conveniently control their cameras via a free app. The recorded videos are stored in highly available and cyber-secure data centers located close to the user. This ensures data protection-compliant storage in accordance with the GDPR. Intelligent camera technology A key advantage of the MOBOTIX CLOUD is the combination of intelligent camera technology A key advantage of the MOBOTIX CLOUD is the combination of intelligent camera technology and a powerful cloud platform. The cameras analyze events on site and only transfer relevant data to the cloud. This minimizes bandwidth requirements while maintaining the highest security standards. MOBOTIX Bridge Communication between the cameras and the cloud takes place via the MOBOTIX Bridge, a highly secure connection unit that ensures protected data transmission. The cloud solution also eliminates the need to operate separate server rooms with high security standards on site - a clear advantage for branches in shopping centers or high-traffic locations. DFNBG can control access rights Around half of the Dunkin' branches have already been converted to the MOBOTIX CLOUD Cloud data is managed directly by the users themselves. This means that companies such as DFNBG can control their access rights centrally without having to create individual solutions for each branch. “It was clear to us that the system is secure - including cyber-secure - and exceeds our requirements. But the central management of all access rights really saves us time and money,” says Harry Taubert, Construction & Development Manager at DFNBG. Around half of the Dunkin' branches have already been converted to the MOBOTIX CLOUD, and the remaining locations will follow successively. VALEO IT Neteye: MOBOTIX Partner for innovative video solutions As a long-standing MOBOTIX Diamond Partner and one of the largest integrators of MOBOTIX systems in Germany, VALEO IT Neteye has been instrumental in delivering customized, future-ready surveillance solutions to DFNBG. VALEO IT Neteye also offers full-service training to DFNBG to ensure everyone stays up to date with industry changes. “We only offer our customers MOBOTIX solutions because we are absolutely convinced of the quality and durability of the products manufactured in Germany,” explains Norbert von Breidbach-Bürresheim, Managing Director of VALEO IT Neteye.
With an impressive 259 charging points and locally generated solar power to charge vehicles, Merklingen train station is the world’s largest e-car charging park. Situated between the cities of Stuttgart and Ulm, Merklingen was inaugurated in December 2022. The new train station serves approximately 1000 to 1300 passengers daily. It has benefited local hospitality, retail, and tourism since it opened with the state Ministry of Transport calculating that it will eventually generate an annual economic benefit of 4.8 million euros for the region. GDPR perspective As a transport hub for the local municipality of Merklingen, it is important that visitors feel safe and operations run smoothly. Because of this, the management team of the Zweckverband Schwäbische Alb contacted Reif GmbH looking for a new, intuitive video system that was futureproofed and could support the management of the station’s innovative e-car charging park. The customer also wanted an easy-to-use VMS to help with daily operations Existing systems on the market did not meet the customer’s requirements, specifically National Defense Authorization Act (NDAA) compliance which was important from a GDPR perspective. The customer also wanted an easy-to-use video management system (VMS) to help with daily operations and with event investigations. A new intuitive video system Hanwha Vision was chosen thanks to its intuitive WAVE VMS, NDAA compliance, open platform, and camera features. As a Diamond Partner, Reif GmbH was also able to offer a five-year warranty on the Hanwha Vision cameras. In total, 37 cameras are installed around the station’s car park along with WAVE VMS enabling continuous monitoring of the building and surrounding locations. The cameras include the QNO-8080R, a 5MP Network IR Bullet Camera, a TID-600R Intercom and the XNO-9082R, a 4K IR Bullet Camera with the Wisenet7 chipset and powerful video analytics including directional detection, audio detection, shock detection, and face/upper body detection. The benefits of an open system The open platform also supports future expansion of the station video surveillance if needed Hanwha Vision’s open platform offered the flexibility and futureproofing needed by the operator team, notably in supporting integration with a custom in-house AI parking control system that was developed in partnership with a regional software company. This system automates parking management removing the need for personnel to issue access, exit, and parking fees for the station car park. The open platform also supports future expansion of the station video surveillance if needed, or additional features and uses. Crucial evidence and insights The cameras work with the in-house parking management system to prevent unauthorized vehicles from entering the premises. They have also captured footage that was later used to investigate damage to property, helping operators to resolve such cases clearly and effectively with the video evidence. The XNO-9082R shows excellent performance in different lighting conditions thanks to Wisenet7 The XNO-9082R shows excellent performance in different lighting conditions thanks to Wisenet7, delivering clear images back to operators to help with situational awareness day and night. IK10 water and vandal protection was another selling point for the station team, as the cameras are all situated outdoors. Meeting GDPR requirements Hanwha Vision cameras are NDAA compliant, meeting the GDPR requirements for the station. No productive data is passed on to external third parties and the system can be operated completely on-premise to meet data protection regulations. Data can only be viewed by explicitly authorized individuals. Due to the WAVE VMS, maintenance staff can access the on-premise server in an emergency or malfunction with remote access through WAVE Mobile. “The performance and quality of Hanwha Vision cameras along with the open WAVE VMS that could work with the in-house AI parking management system made it the logical choice for the Merklingen station project,” explained Andreas Baumann, Managing Director at Reif GmbH.
The new GoldenEye Hotel and Resort on the Bulgarian and Turkish border, Europe’s largest casino development, opened in 2024 by BC Industries is providing enhanced security with more efficient guest services thanks to a 600-camera video surveillance solution from IDIS. The advanced camera system combines 24/7 visibility over gaming tables and public areas, fault-free image capture and recording of UHD video footage, a more efficient real-time monitoring platform for multiple users, and options for rapid targeting of AI analytics. End-to-end visibility As well as meeting the higher security requirements typical of casino operations, the system from South Korea’s largest in-country video tech manufacturer supports the GoldenEye resort in providing a more impressive welcome for hotel guests with full visibility over corridors, communal areas, and back-of-house operations ensuring the ultimate guest experience. The end-to-end solution has been installed by Volga Elektronik to cover the casino, hotel, and car parks. High-definition image capture IDIS 12MP Super Fisheyes, 8MP IR, and 5MP IR dome cameras allow broad scene surveillance A combination of IDIS 12MP Super Fisheyes, 8MP IR, and 5MP IR dome cameras allows broad scene surveillance of all internal areas, without blind spots, plus targeted coverage of priority locations such as cashier cages and slot machines. High-definition image capture allows gaming tables to be monitored in fine detail with operators able to identify card suits, and chip denominations and quickly detect any suspicious player activity, regardless of low light or cigarette smoke. Instant and smooth dewarping Instant and smooth dewarping of the fisheye images supports efficient real-time viewing and playback, allowing incidents to be resolved rapidly and preventing game stoppages. This ensures positive experiences, and confidence, for both customers and staff. External areas, including parking bays and entrances, are covered using IDIS 5MP IR bullet cameras and 2MP IR PTZs. IDIS Solution Suite VMS, NVRs IDIS Solution Suite VMS allows 24/7 monitoring by six operators and two supervisors, using a control room video The system also comprises seven 64-ch NVR recorders; and IDIS Solution Suite enterprise-class VMS and Critical Failover to protect continuous access to video and provide full redundancy in the event of a range of fault conditions. IDIS Solution Suite VMS allows 24/7 monitoring by six operators and two supervisors, using a control room video wall, with live viewing and simultaneous playback. The solution is NDAA compliant, with inherent cybersecurity protection; and it meets GDPR requirements, with IDIS’s dynamic video privacy masking allowing footage to be easily exported without privacy infringement. Advanced surveillance capabilities “IDIS video technology is perfectly designed for casino security,” said Mert Çalışkan, BC Industries’ Casino Operations Director. “Our new system gives us all the advanced surveillance capabilities we need to protect our guests and our facilities. And we’ll be able to easily adapt and extend it in the future and take advantage of exciting new capabilities.” ERP software The resort would be taking advantage of this future-proofing capability that comes with all IDIS technology In the next project phase analytics data integration with the casino’s ERP software is being introduced, along with transaction data overlaid on recorded video for efficient incident investigation. Koray Ozyildirim, IDIS Türkiye Country Manager confirmed that the resort would be taking advantage of this future-proofing capability that comes with all IDIS technology. IDIS AI video solutions and integration “Across the casino sector there is huge potential for adopting IDIS AI video solutions and integration capabilities,” he said. “IDIS’s industry-pioneering analytics are flexible and powerful and can be targeted at specific locations to enable highly accurate people counting, heat maps, and occupancy monitoring. Along with seamless systems integration, this will increasingly deliver a host of competitive advantages including enhanced security, better customer service, and, ultimately, greater profitability.”
Security office in commercial and residential building requires state-of-the-art solutions that can keep up with the demands of modern surveillance and threat detection. With space-efficient design, high-performance processing, coupled with advanced data protection, NVR NViS 5704, a powerful video analytics solution, enable seamless surveillance operations and enhanced security measure in edge AI applications. These capabilities empower security office to efficiently monitor and analyze video streams, identifying potential threats and recognizing objects or individuals of interest in real-time. Optimal Space Utilization The NVR NViS 5704 boasts a compact 1U form factor with rack depth only 56cm, making it an ideal choice for security office with limited space. Its space-efficient design ensures seamless integration into existing infrastructure without compromising on performance. At the heart of the NVR NViS 5704 lies the 13th Gen Intel® Core™ Processor with Performance Hybrid Architecture, delivering up to 16 cores, including a balance of performance cores for intensive tasks and efficient cores for power optimization. NViS 5704 also features a PCIe x16 expansion with the flexibility to integrate accelerator cards or powerful graphics cards. This groundbreaking processing power and accelerator card support enable edge AI applications in video analytics, such as face/motion detection, object recognition, ensuring enhanced surveillance capabilities and efficient decision-making. Fortified Data Protection and Backup Data security is of utmost importance in commercial and residential building security operations Data security is of utmost importance in commercial and residential building security operations. The NViS 5704 comes equipped with TPM2.0 and Bitlocker drive encryption, providing robust data protection to safeguard sensitive information from unauthorized access and potential threats, especially when hard disk is lost or stolen. In addition, Intel RAID technology is utilized for secure data backup. With RAID D 0, 1, 5, 10 support, critical data can be mirrored or distributed across multiple drives, ensuring data redundancy and protection against data loss. The NVR NViS 5704 offers an unparalleled blend of power, flexibility, and security, delivering a comprehensive solution for these mission-critical environments, With its accelerator card support, advanced Intel® Core™ processors, and enhanced data protection features, the NViS 5704 empowers security professionals to stay one step ahead in their efforts to safeguard communities and assets. Safeguarding communities and assets Main Features of NVR NViS 5704 are as follows: System 1U Rackmount 12/13th Gen Intel® Core-i platform DDR4 up to 64GB HDD 4-Bays 3.5” (support RAID 0,1,5,10) 1 x NVME SSD, 1 x M.2 2242 SATA SSD Display DP1.4, 1 x HDMI 2.0b, 1 x HDMI 1.4 2 x 2.5GbE Intel® Ethernet Audio in/out/Mic PCIe x16


Round table discussion
The most common wearable device deployed by security professionals is the body-worn camera. Traditionally used by law enforcement professionals, these devices are finding more and more uses in the corporate security world, and even impacting issues such as customer service. However, the term “wearables” also encompasses a range of other devices, including many worn by consumers. We asked this week’s Expert Panel Roundtable: How are wearable technologies impacting the security market?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Facial recognition is a mature technology that continues to change and evolve. New innovations such as artificial intelligence (AI) are expanding facial recognition capabilities, even as privacy concerns, though often misguided, undermine wider acceptance in the market. We asked this week’s Expert Panel Roundtable: What are the new developments in facial recognition?
Products


