SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Dahua Smart Dual Illumination Active Deterrence Network PTZ Camera

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Hikvision DS-K6B630TX: Smart Pro Swing Barrier for Modern Access Control

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Climax Mobile Lite: Advanced Personal Emergency Response System (PERS)

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

    Hanwha Vision OnCAFE: Cloud-Based Access Control for Modern Enterprises

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • Hikvision Gets ISO 37301 Certification For Compliance Management System
    • SentriGuard: Revolutionizing Key Management Solutions
    • Axis Signs CISA Secure By Design For Cybersecurity
    • Xtract One's SmartGateway Boosts Security In Nova Scotia
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    • How Should Security Adapt To The Unique Aspects Of Healthcare?
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    Technology Summit International 2025

    Technology Summit International 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    Gartner IT Infrastructure, Operations & Cloud Strategies Conference 2025

    G2E Philippines 2025

    G2E Philippines 2025

    IFSEC India 2025

    IFSEC India 2025

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

    Enhancing Physical Access Control Using A Self-Service Model

    Enhancing Physical Access Control Using A Self-Service Model

About us Advertise
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • Cloud-based security
  • 6

Intrusion detection

  • Home
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Securitas UK & Hays Travel Partnership Milestone

Securitas UK & Hays Travel Partnership Milestone

Corporate
Ranger Acquires Universal Fire & Security In UK Expansion

Ranger Acquires Universal Fire & Security In UK Expansion

Corporate
Detection Tech Unveils DT2030 Strategy For X-ray Growth

Detection Tech Unveils DT2030 Strategy For X-ray Growth

Corporate
FRG Tremors: Combat Cable Theft In Rail And Energy

FRG Tremors: Combat Cable Theft In Rail And Energy

Corporate
Interface Unveils TamperShield For Alarm Systems

Interface Unveils TamperShield For Alarm Systems

Product

News

Cyware & Microsoft: AI Threat Intelligence Partnership
Cyware & Microsoft: AI Threat Intelligence Partnership

Cyware, a pioneer in AI-powered threat intelligence management, automation, and security orchestration, announced a strategic partnership with Microsoft built on deep product integrations to help global enterprises and public sector organizations operationalize threat intelligence with greater speed, ease and confidence. The partnership delivers a uniquely integrated threat intelligence workflow across Cyware and Microsoft Sentinel, giving customers a faster path from threat insights to action. Expanding partnership As a Microsoft partner, Cyware’s solutions are already available in the Microsoft Commercial Marketplace, simplifying procurement for commercial and government buyers. The companies are now expanding on their partnership to deliver an end-to-end solution that modernizes security operations automating threat intelligence ingestion, enrichment, and actioning. The deep integration between Microsoft Sentinel and Cyware Intel Exchange enables bi-directional threat intelligence exchange, including support for STIX/TAXII-based threat intelligence sharing to validate indicators at scale for mutual customers. Operationalizing threat intelligence Many security teams still struggle to operationalize threat intelligence at scale due to siloed data, inconsistent context and validation, and manual handoffs between tools. With this collaboration, Microsoft Sentinel can ingest actionable threat intelligence from Cyware, while Cyware can receive intelligence from Microsoft Sentinel to drive faster investigations and response with real-time context sharing and actioning. AI-powered threat intelligence operations “This partnership with Microsoft brings together Cyware’s strength in AI-powered threat intelligence operations and Microsoft’s security technology to help customers make smarter, faster decisions,” said Anuj Goel, CEO and Co-Founder, Cyware. “By meeting defenders directly in Microsoft Sentinel, and making Cyware deployable through Microsoft Commercial Marketplace we are reducing friction from purchase to value while giving security teams enriched, high-fidelity intelligence they can act on immediately.” Intelligence-driven experience “We’re focused on empowering every defender with a more connected, intelligence-driven experience,” said Erez Einav, Corporate Vice President, Sentinel and Defender XDR at Microsoft, adding “This partnership with Cyware extends how threat intelligence is shared, validated, and automated across Microsoft Sentinel, helping customers streamline workflows, strengthen detection quality, and accelerate response.” In addition to the Microsoft Sentinel integration, Cyware Intel Exchange also integrates with Microsoft Defender, enabling Defender Threat Intelligence feeds to flow into Cyware for enrichment and automated indicator searches against Microsoft Defender data, speeding triage and investigation. Cyware’s inclusion in MISA This announcement also builds on Cyware’s recent inclusion in the Microsoft Intelligent Security Association (MISA) and continued momentum with Microsoft Security Copilot, where Cyware participated as one of the inaugural Copilot launch partners. The collaboration strengthens ongoing integrations between Cyware Intel Exchange, Microsoft Sentinel, and Microsoft Defender and supports Azure-hosted deployment options for customers standardizing on Microsoft.

Amthal & MERKUR Ensure Fire Safety Compliance
Amthal & MERKUR Ensure Fire Safety Compliance

Amthal Group Companies has partnered with MERKUR Casino to manage life safety across its growing UK estate. The collaboration is focused on ensuring full compliance with fire safety regulations and maintaining safe environments for customers, colleagues and visitors. Now comprising more than 220 high street slots venues, the relationship with MERKUR Casino is built on close communication, including with its Facilities Management function and Fire Safety Officer (FSO). Maintenance of fire alarm systems Amthal supports each site with maintenance of fire alarm systems and emergency lighting, as well as responsive remedial work where issues are identified. This ensures life safety systems are always maintained in compliance with current legislation. “Our priority is creating safe, welcoming spaces where people can enjoy our gaming facilities with complete confidence,” said Ben Hunter, Head of Construction & Facilities at MERKUR Casino. “In a highly regulated leisure sector, fire safety is non-negotiable and Amthal brings the right level of expertise and responsiveness. They understand our estate, work efficiently and allow us to stay on top of our compliance obligations with minimal disruption.” Integrated security measures Amthal’s team works closely with MERKUR to carry out planned maintenance and respond quickly to remedial needs. Site visits are coordinated around operational schedules, ensuring business continuity while maintaining a consistent standard of safety across the estate. Amthal has also supported MERKUR in the design and maintenance of integrated security measures across several sites. This includes, access control and intrusion detection technologies, all designed to blend with the venue environment and operate seamlessly 24/7. Amthal’s collaborative approach “MERKUR’S sites are consistently busy, which brings real operational pressure when it comes to maintaining compliance,” said Matt Johnson, Strategic Accounts Manager at Amthal Group Companies. “Our role is to alleviate that pressure by responding quickly, understanding each site’s requirements, and making sure life safety systems are always up to date. We’re helping them stay ahead of risk, so they can focus on running their business and delivering a great experience for their guests.” Amthal’s collaborative approach ensures each site benefits from tailored solutions aligned with operational requirements and industry regulations. With a national footprint and flexible service model, it is well-positioned to support MERKUR as its portfolio evolves.

Security 101 Acquires SETEC For Mid-Atlantic Growth
Security 101 Acquires SETEC For Mid-Atlantic Growth

Security 101, a portfolio company of Gemspring Capital and a national provider of comprehensive commercial security solutions, announced the acquisition of Security & Energy Technologies Corporation ("SETEC"), a Chantilly, Virginia–based systems integrator with deep expertise serving both commercial and federal government clients. This transaction marks Security 101's 19th strategic acquisition, further strengthening its presence in the Mid-Atlantic market. Integration of complex access control Founded in 1987, SETEC has earned a decades-long reputation for technical excellence and exceptional customer service, providing design, installation, and integration of complex access control, video surveillance, intrusion detection, and life-safety systems.  The company maintains long-term maintenance and service contracts and is widely recognized for its trusted relationships across enterprise and government sectors. SETEC's operations SETEC was founded and co-owned by Chet Hahne and Mark Morgan, who led the company through decades of steady growth. Robert Donnelly, a long-time member of the leadership team, will now serve as General Manager, overseeing SETEC's operations across the Washington, D.C. region. "We're excited to welcome SETEC to the Security 101 family," said Greg Daly, CEO of Security 101. "Their strong reputation, technical expertise, and customer relationships in the D.C. corridor align perfectly with our growth strategy and strengthen our ability to serve the federal market." "For nearly four decades, SETEC has been built on hard work, integrity, and a commitment to doing what's right for our customers," said Chet Hahne, Co-Owner of SETEC. "Joining Security 101 ensures that legacy continues to grow within a national organization that shares our values." Security 101's continued nationwide expansion Robert Donnelly, General Manager, added, "Our dedication to customer service hasn't changed, but now we have the strength of a national network behind us. With Security 101, we're positioned to take on larger, more complex projects across both commercial and federal markets." The acquisition underscores Security 101's continued nationwide expansion, reinforcing its position as one of the fastest-growing security integrators in the United States and establishing a strong foundation for further growth in the Washington, D.C. and federal markets.

Radiflow360: AI-Enhanced OT Cybersecurity Platform
Radiflow360: AI-Enhanced OT Cybersecurity Platform

Radiflow, a pioneering provider of cybersecurity solutions for industrial automation networks, announced that the company has launched the new Radiflow360, a unified, AI-enhanced OT cybersecurity platform that delivers full visibility, risk management and streamlined incident response for mid-sized industrial enterprises. Radiflow360 now enables mid-sized industrial operators to gain full visibility and control over their OT networks and risks, and is supported by an AI analyst assistant that speeds up assessments and prioritizes threats. Unified approach to OT cybersecurity The built-in AI analyst assistant seamlessly interfaces with retail GenAI engines to bridge skill gaps This new platform streamlines compliance, accelerates incident response and integrates seamlessly with other Radiflow and third-party tools, delivering a scalable, unified approach to OT cybersecurity. The built-in AI analyst assistant seamlessly interfaces with commercial GenAI engines to bridge skill gaps and accelerate incident investigation. Initial phases of asset discovery Radiflow360 targets OT security teams at mid-sized industrial enterprises that need comprehensive, real-time control of their operational environments, but often struggle with manual processes and siloed tools. The platform frees these organizations from the need to juggle multiple systems by unifying intrusion and anomaly detection with the initial phases of asset discovery and risk assessment in a single pane of glass. New Radiflow360 platform For Radiflow’s partners, the new Radiflow360 platform offers a centralized solution to deliver scalable services This integrated platform enables precise asset mapping, automated risk and compliance scoring, streamlined security control planning and continuous anomaly monitoring, dramatically reducing complexity and accelerating response times. For Radiflow’s partners, the new Radiflow360 platform offers a centralized solution to deliver scalable, differentiated OT security services to their mid-range industrial enterprise and OT operator customers. OT Managed SOC service “Barrier has been working with Radiflow for many years and the company’s solutions add significant agility to our OT Managed SOC service we provide to industrial enterprises across the UK,” said Iain Slater, Sales Director at Barrier Networks. “The new Radiflow360 platform, in particular its unified approach to OT security, is exactly the kind of innovation our mid-market OT operator customers need at a time when UK industrial organizations are facing an increasing wave of targeted OT cyber-threats.” OT cybersecurity risks and threats “2025 marks a pivotal year for Radiflow — we have doubled our sales in the first half of the year and are stepping forward with a renewed focus on our mission to deliver solutions for our industrial enterprise and critical infrastructure customers and partners to efficiently manage the lifecycle of OT cybersecurity risks and threats,” said Ilan Barda, CEO at Radiflow. “The launch of our new Radiflow360 platform is an exciting milestone in our ongoing mission with a focus on providing mid-market industrial operators with a unified framework to manage their OT security lifecycle - from asset discovery to risk assessment and anomalies monitoring to AI-powered risk assessments and prioritizations." Radiflow will be presenting its new Radiflow360 platform at the IT-SA Expo Congress on October 7 to 9 in Nuremberg, Germany.

View all

Expert commentary

“Mission: Possible”—Stopping The Heist Before It Happens With LiDAR
“Mission: Possible”—Stopping The Heist Before It Happens With LiDAR

Seven minutes. That’s how long the recent Louvre heist took. In broad daylight, a group of thieves rode up on a construction platform, smashed display cases, stole several historical jewels tied to the Napoleonic dynasty and escaped on scooters before anyone in the control room even realized what was happening. It sounds like a scene straight out of “Mission: Impossible.” Only this time, Tom Cruise wasn’t there. In movies, we often see tight webs of red laser beams guarding treasures, with the hero gracefully sliding between them. Reality, however, is far less cinematic. Most museums still rely on mechanical sensors, simple infrared barriers, cameras and the most fallible component of all: the human eye. But the human eye doesn’t measure space. A camera records an image, but it doesn’t know that a display case has shifted by three centimeters, or that a visitor’s hand just crossed an invisible boundary. That’s where a new kind of perception comes in — LiDAR. From Hollywood fantasy to real-world security Forget the tangled maze of laser beams you’ve seen in films. A modern 128-channel rotating LiDAR fires hundreds of thousands of laser pulses per rotation — and it does this up to 10 times per second. That’s millions of spatial measurements every second, creating an invisible web of light that maps the scene in 3D, without anyone ever noticing. What LiDAR builds is called a point cloud — a live three-dimensional model of the environment. The system constantly compares this “snapshot” with the current scene. If anything changes — a hand moves closer to an artifact, a case is displaced or an object disappears — LiDAR detects it instantly. When technology sees in 3D Pan-tilt-zoom (PTZ) cameras automatically turn to the exact spot and start recording LiDAR technology (such as LidarVision, developed by Hexagon), brings true 3D situational awareness into museums and galleries. It doesn’t just see that someone is moving; it knows where, how fast and in what trajectory. Each detected object is tracked with its precise dimensions, velocity and spatial position. If a visitor steps too close to a protected exhibit, the system triggers an alarm. Pan-tilt-zoom (PTZ) cameras automatically turn to the exact spot and start recording. The operator no longer has to stare at dozens of screens, hoping to catch the right moment. LiDAR data also serves as forensic evidence — allowing investigators to replay the incident as a full 3D reconstruction. They can see exactly how intruders moved, from entry to exit, with centimeter precision. Beyond thieves: Everyday situational awareness LiDAR isn’t just a tool against master criminals. It helps with daily operations, too — recognizing when someone lingers suspiciously near a sensitive exhibit, when an unauthorized object enters the room or even when a visitor collapses. The system can trigger a silent alert, notify security staff or automatically redirect nearby cameras. History that never comes back 13 paintings worth more than half a billion dollars vanished from Boston’s Isabella Stewart Gardner Museum Art theft is not a cinematic rarity — it’s a recurring tragedy. In 1990, 13 paintings worth more than half a billion dollars vanished from Boston’s Isabella Stewart Gardner Museum. None have ever been recovered. Even Leonardo da Vinci’s Mona Lisa was stolen from the Louvre in 1911 — though it was miraculously found two years later. That case, however, remains the exception. Thieves often fail to realize that cultural artifacts are not commodities. When they melt them down for gold or strip them for gems, they don’t just destroy value — they erase history. Spatial understanding is the future of security No security system is flawless. But while cameras merely watch, LiDAR understands space. From a single compact device, it monitors the 3D environment in real time, detects anomalies and reacts immediately. Modern security is no longer about higher fences or better cameras. It’s about spatial understanding — knowing what is happening in the room right now. And that’s something even Tom Cruise wouldn’t be able to slip through.

How Partnering Builds Vendor Value
How Partnering Builds Vendor Value

In the realm of physical security, the distinction between being perceived as a security vendor and a security partner holds great importance. While both may seem interchangeable at first glance, how an organization is viewed by its clients can have a huge impact on the success of its security programs. At the heart of this differentiation is the concept of relationships and how they shape the dynamics between providers and their clients.  Time, care, and diligence For security vendors such as systems integrators, security dealers, monitored services providers or manufacturers that sell directly to the end user elevating from supplier to partner requires a greater investment of time, care, and diligence. However, the eventual payoff can be incalculably advantageous to the organization. Not only does this approach better serve the client but it also cultivates longer-term business and is more likely to generate referrals. Clients will change vendors often but stick with partners for the long haul.  Simple installation and/or service Security end-users should look to their security products and service providers to partner with them Security end-users should look to their security products and service providers to partner with them, be vested in their success, and be part of the solution. They should seek out and expect more than a simple installation and/or service in the absence of any real, tangible, and value-added relationship with stakeholders. That means looking deeper than the similar cameras or equipment most vendors provide. Doing so brings benefits from the partnership in solving problems and creating strategies for mitigation.  Vendors have short shelf lives  A security vendor is typically seen as a transactional company that offers products or services to address specific security needs or challenges. When an organization engages with a vendor, the focus is primarily on the exchange of goods and/or services for a fee. The relationship tends to be more transactional, with limited interaction beyond the scope of the security solution being provided.  Tools, technologies, or service offerings The relationship between a security vendor and a client is often short with a one-time purchase Security vendors often play a crucial role in the security industry by offering specialized tools, technologies, or services that can help organizations improve their defenses against threats. Examples would be video surveillance, access control, intrusion detection, or fire/life-safety systems, as well as the monitoring of any of them from a central monitoring station or security operations command center. The thing about it is, however, that the relationship between a security vendor and a client is often short with a one-time purchase and limited ongoing engagement or consultation.  Partners prove their value  On the other hand, a security partner is viewed as a member of the team that works closely with an organization to address its security challenges. Unlike a vendor, a security partner is invested in the long-term success of their clients and is committed to building a strong relationship based on expertise, trust, and transparency.  Creating custom solutions Security partners go beyond offering products or services by engaging with companies and organizations Security partners go beyond offering products or services by engaging with companies and organizations to understand their unique security needs, goals, and challenges. They work concurrently with organizations to develop customized security solutions, provide support and guidance, and adapt to ever-changing threats and risks.  When this kind of scenario is developed, the potentially distracting and detracting focus on monetary cost moves to the back burner because the value and return on investment (ROI) are so thoroughly compelling.   Relationships bring real benefits  The core of the difference between being perceived as a security vendor and a security partner hinges on the crucial role of relationships. While vendors focus on transactions and sales, partners prioritize collaboration and a sense of being in it together. Building strong relationships based on trust, communication, and shared goals is essential for forging a successful security partnership.  Personalized approach Security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients. They can be reached easily when needed and emphasize a personalized approach with custom-tailored solutions. By building strong relationships based on respect and understanding, security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term.  Operational opportunities Businesses and facilities often encounter or face very specific security needs that can only truly be solved in concert with a vendor that essentially acts like an extension of the end-user organization. Furthermore, when communicating and collaborating on that level, additional security/safety and sometimes even operational opportunities for improvement come to light. This amplifies the value for both the end customer and their security vendor. Talk about a win-win!  Prosper with partner power  While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment At the end of the day, the difference between being a security vendor and a security partner is not merely a matter of semantics. It is about the fundamental difference in approach and mindset toward physical (electronic and networked) security. While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment to reducing losses and crime.   Quality of relationships Ultimately, it is the quality of relationships that separates providers in the security space and determines the success of security initiatives in the current rapidly changing security landscape. This unification of intent, practice, and purpose enables practitioners and the public alike to harness the full power of pioneering-edge technologies that support the security industry’s core mission of protecting people and property. Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients. 

Four Misconceptions Regarding AI And Analytics In Video Security
Four Misconceptions Regarding AI And Analytics In Video Security

Misconceptions about AI and analytics in video security are common due to the rapid evolution of the technology and varying levels of understanding. Artificial Intelligence (AI) and analytics are increasingly used as interchangeable terms when discussing video security cameras. AI v/s analytics While there is some overlap, it is important to articulate the differences between them when speaking to stakeholders or customers. As the myriad types of AI gain more prominence in the global dialog and privacy concerns are increasingly raised, security professionals need to take extra care to educate executives and management in any organization so that they can, in turn, represent the company's use of AI tools accurately. AI and analytics in video security Security cameras use subsets of AI, namely machine learning and deep learning, to recognize and classify objects The intent of this article is not to do an academic deep-dive on either AI or analytics, but instead to position each discipline as it relates to modern AI-based video security. The goal is to educate operations and management about the use of AI in video surveillance to support informed decision-making across the organization. It’s worth mentioning that while AI is often used as a catch-all term, security cameras use subsets of AI, namely machine learning and deep learning, to recognize and classify objects.  Misconceptions Here are four common misconceptions about AI and analytics:  Misconception #1: AI and analytics are the same  People often confuse AI with analytics, but they're distinct. AI is used in the video industry to enhance analytics and analysis capabilities. The technique involves the use of machine and deep learning algorithms to recognize or classify known objects like a person or vehicle. AI can further detect unique attributes of objects such as the color of clothing, or additional objects that are carried or worn such as backpacks or glasses. Object detection  The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviors Analytics, on the other hand, refers to the process of analyzing what the detected object is doing. The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviors. Is a vehicle traveling left or right in the camera’s field of view, possibly going the wrong way down a one-way street? Did it enter a restricted zone? Should a car arrive in this area at 3 a.m.? These are basic binary (yes/no) analytic tasks. Ascertaining whether two people are fighting or if someone is shoplifting is a more nuanced analysis that requires a sophisticated AI algorithm capable of considering multiple data points before alerting staff to suspicious behavior.​ Addressing false positives with AI-assisted analytics ​Before AI-based object detection, analytics were prone to false positives any time the lighting changed (a passing cloud could change the pixels). Working together, AI and analytics have largely solved the issue of false positives for the objects they recognize. On a properly installed camera, AI-assisted analytics can issue proactive alerts or search through hours of footage for humans or vehicles with specific attributes incredibly quickly. AI adds classification and behavior information to raise the overall accuracy of analytics and analysis. AI can also be used to enhance image quality in cameras, so there are many other ways it can be utilized.  Misconception #2:  AI can operate autonomously and replace security personnel  AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events While AI can enhance surveillance and response, the nuanced understanding and decision-making capabilities of humans are still crucial in most scenarios. AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events that may warrant attention, but the decision on how to act still firmly rests with the operator. This increasingly ‘intelligent’ assistant represented by AI helps security teams focus on what matters in an increasingly complex world, but it’s a team effort. And while AI’s capability to operate autonomously will surely improve, it’s hard to imagine a world in which it would be wise to let it make important decisions without human oversight.  Misconception #3: AI-based security cameras are invading the privacy Safeguarding personally identifiable information (PII) is a critical responsibility of any organization. Because of the prevalence of data breaches, everyone is keenly aware of the risks of PII ending up in the wrong hands. For video security systems, it’s essential to realize that the descriptive metadata an AI-based camera captures is composed of anonymous data about the humans it detects.  Attributes such as the color of clothing and whether a person is carrying a backpack or wearing a hat are certainly not sufficient to identify anyone personally. And while there may be grey areas with some AI systems that attempt to classify gender and age, they are still not identifying a specific person. Facial recognition Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques Most importantly, AI does not equal facial recognition. Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques, facial recognition has had its separate evolution distinct from AI. Facial recognition has privacy implications, while most AI implementations do not.  AI-based detection Additionally, AI-based detection of humans and vehicles typically happens “on the edge”, processed within the camera itself, while facial recognition almost always requires a separate VMS/server application and database to function. So, AI-based cameras don’t, by themselves, do facial recognition.  Misconception #4: AI can learn anything on its own  AI-based algorithms are only as good as the training they’ve received While AI can significantly enhance video surveillance capabilities, the machine and deep learning algorithms are not infallible. They require human oversight to manage false positives and interpret complex situations. AI-based algorithms are only as good as the training they’ve received. For example, human and vehicle detection algorithms have been carefully trained by R&D departments in laboratory settings with hundreds of thousands, if not millions, of representative images. This is why they can be very accurate when installed correctly. AI ‘on-site learning’ cameras For AI-based systems to truly learn to recognize something, they must also be informed when they get something wrong. This type of training usually occurs under the supervision of experienced AI developers. Recently, new AI ‘on-site learning’ cameras have become available. These can be trained by operators to recognize unique, customizable objects such as forklifts, shopping carts, airplanes, logos on vehicles, or any object an organization might want to track or count. These systems must also be trained to be accurate. Intelligent training application AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives A typical on-site training challenge would be to capture an object in every lighting condition. To overcome this, forward-thinking vendors include an intelligent training application that automatically generates additional images across a range of luminance values, saving operators substantial time and effort while increasing accuracy. AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives.  Conclusion  Understanding these misconceptions is crucial for making informed decisions when implementing AI and analytics in video security systems and gaining consensus from stakeholders. As AI becomes ubiquitous across industries, it has the potential to lose its true meaning, particularly because we are only scratching the surface with machine and deep learning applications.  AI’s current capabilities and limitations Most importantly, we have to help educate all of our constituents that AI and analytics are not the same It’s also important to recognize that general (or strong) ‘AI’ does not yet exist. This is the ability of a machine to do any intellectual task a human can do. However, the marketing ship has long since sailed, so the best we can do is stay informed about AI’s current capabilities and limitations. Most importantly, we have to help educate all of our constituents that AI and analytics are not the same. AI does not equal facial recognition. Nor does it replace the need for human oversight. AI-based technology AI is a long way from non-structured, comprehensive learning and decision-making in a way humans would describe as ‘intelligent.’ With those caveats in place, the current AI-based technology functions as a fantastic assistant for security teams helping them to better protect people and property. 

View all

Security beat

Acre Is Propelling Deployment Of Generative AI For Access Control
Acre Is Propelling Deployment Of Generative AI For Access Control

AI has the potential to enhance the usability of traditionally complex access control and physical security systems. The application of AI (artificial intelligence) within access control is still relatively new, but rapid advancements in generative AI are already transforming how security systems operate. acre security is driving the deployment of generative AI in access control through its acquisition of REKS earlier this year. REKS is a purpose-built generative AI solution designed specifically for acre’s access control platform. Unlike generic AI tools, REKS understands both system and security-specific terminology, allowing users to ask natural-language questions like, “Show me all access denied events at a specific location,” and receive instant results. AI workflows and AI agents “We're starting to see how AI workflows and AI agents, that leverage language models, can potentially be used in conjunction with access control to create new, automated processes around false alarm reduction, system configuration, report generation, data analysis, threat detection, and in-system customer support,” says Adam Groom, Director of Business Development, AI Development Team, acre security. “We expect AI-driven capabilities to evolve rapidly, but the full range of benefits will depend on continued development and real-world application,” he adds. Integrate AI-driven capabilities acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions The best way to think of REKS is as an acre access control expert you can talk to, says Groom. “As AI adoption grows in security, REKS will expand its capabilities, making access control more usable and more efficient.” Groom says acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions the company as a pioneer in next-generation physical security. “These features will add long-term value by enhancing usability and operational insights across various segments,” says Groom. “Work is already under way to incorporate REKS into acre access control, and we’ll evaluate other integration opportunities in the future.” REKS' AI capabilities According to acre, REKS simplifies daily operations, automating routine tasks, and delivering real-time, actionable intelligence. With REKS' AI capabilities, users can interact with the system to retrieve more detailed insights and actionable information from their acre access control system. “This eliminates the need for complex reports, navigating drop-down menus, or manually reviewing logs,” says Groom. “It significantly enhances efficiency and usability for security professionals.” Enhancing productivity and customer satisfaction Key concern is ensuring that system configuration, enactment, and servicing remain within their scope  For integrators, the key concern is ensuring that system configuration, implementation, and servicing remain within their scope of expertise. With REKS, that doesn’t change — but the process becomes significantly faster and more efficient. Instead of manually configuring every panel, input, and output — a traditionally time-consuming task — REKS enables integrators to use natural language commands to streamline setup and adjustments, says Groom. This eliminates tedious steps and dramatically improves operational efficiency, allowing integrators to deploy and fine-tune systems with greater speed and accuracy, ultimately enhancing both productivity and customer satisfaction, he adds. Cloud-enabled ecosystems “We are committed to helping organizations modernize their security infrastructure by transitioning from legacy systems to cloud-enabled ecosystems at their own pace — ensuring minimal disruption while maximizing value,” says Groom. “By integrating AI-driven capabilities, we enhance usability and deliver deeper operational insights across all segments.” “Security’s future isn’t about forcing change — it’s about empowering choice,” adds Groom. “Whether staying on-prem, migrating to the cloud, or adopting a hybrid model, we plan to provide a seamless, zero-disruption transition, prioritizing interoperability, automation, and security at every stage.” Generic AI tools AI must be purpose-built for security applications because security demands precision, reliability, and context-aware decision-making, which only focused AI offerings like REKS bring to the table, says Groom. In contrast, generic AI tools, like ChatGPT, are designed to perform a wide variety of tasks, like how humans can learn and do many different things. Instead, purpose-built AI is built to do just one specific function. “REKS adds specially designed artificial intelligence to our access control solutions to enhance both intelligence gathering and the user experience,” says Groom. New applications in access control The integration of generative AI into acre's access control platforms and their broader portfolio A new AI development team will lead AI initiatives at acre, driving the integration of generative AI into acre's access control platforms and their broader portfolio.  This team will seek to push boundaries in applying AI to new applications in access control, intrusion detection, and beyond, empowering security professionals to interact with their systems in a smarter, more intuitive way. But don’t worry, AI will not take the human element out of security entirely. AI human capabilities “The reality is that AI will improve upon human capabilities because it is a versatile tool that supports and strengthens security operations, not a replacement for human decision-making,” comments Groom. “It helps operators process large amounts of data quickly and detect patterns that might be missed otherwise.” Rather than removing the human element, AI allows security teams to work more efficiently by automating repetitive tasks and providing actionable data, enabling professionals to focus on critical responsibilities.

2024 Was A Big Year For M&A In The Security Market
2024 Was A Big Year For M&A In The Security Market

Big news on the mergers and acquisitions (M&A) front is closing out 2024, a year in which several shifts changed the face of the physical security manufacturer community. Announced in December, German giant Bosch Group is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton.  Bosch division selling to Triton  The transaction encompasses three business units – Video, Access and Intrusion, and Communication – and thus the entire product business of Bosch Building Technologies that was offered for sale. All 4,300 associates employed in these units at more than 90 locations worldwide will be taken over. The transaction reflects a growing confidence in the security market among private equity companies such as Triton, Becklar, and Volaris.   Sharing best practices Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership Acre Security, previously acquired by Triton, has benefited from Triton’s strategic guidance and expertise, according to the company, which is confident Bosch will experience the same level of support and opportunity to thrive. Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership, but will benefit from the potential to collaborate and share best practices as part of the broader Triton portfolio.  Resideo acquires Snap One  Earlier in 2024, there were other large M&A transactions. In the spring, Resideo Technologies, Inc., a manufacturer and distributor of technology-driven products and solutions, agreed to acquire Snap One Holdings Corp., a provider of smart-living products, services, and software to professional integrators. The transaction is valued at $1.4 billion, inclusive of net debt. Upon closing, Snap One becomes part of Resideo's ADI Global Distribution business.  Honeywell buys Carrier’s Access Solutions  In late 2023, Honeywell announced plans to enhance and strengthen its building automation capabilities with the acquisition of Carrier Global Corporation’s Global Access Solutions business for $4.95 billion, in an all-cash transaction.  The acquisition, which played out through 2024, includes both hardware and software solutions, adding three respected brands to Honeywell’s portfolio with a focus on life safety and digital access solutions. Acquired brands include LenelS2, commercial and enterprise access solutions; Onity electronic locks; and Supra cloud-based electronic real estate lock boxes. Hirsch reemerges as an iconic brand  The Identiv sale was originally announced in April, subject to regulatory approval Identiv announced plans to sell its physical security business and assets to Vitaprotech, the security solutions provider that also acquired British manufacturer, TDSI, in 2019. The Identiv sale was originally announced in April, subject to regulatory approval.  As a result of the sale, Hirsch, a global security technology pioneer advancing physical security, video intelligence, cybersecurity, and digital identification solutions, announces the relaunch of its iconic brand and strengthened focus on the industry’s most complete high-security, end-to-end platform.  Ease of use security solutions The move seeks to reposition Hirsch as the global pioneer in physical security, video intelligence, and identity solutions, protecting everything from small enterprises to critical national infrastructure. With a 43-year-strong foundation in the industry, Hirsch’s mission has always been empowering a secure, connected world, combining government-grade high security with ease of use. Milestone and Arcules unite  Effective July 1, 2024, global video technology company Milestone Systems announced its merger with the cloud-based video surveillance solutions provider, Arcules. Both companies are owned by Japanese multinational Canon Inc. Based in Irvine, Calif., Arcules was spun off from Milestone in 2017. The merger brings together Milestone and Arcules’ best-in-class capabilities within video management software (VMS), video analytics, and video surveillance as a service (VSaaS), providing a complete video technology offering.  More M&A stories in 2024  In other M&A moves in 2024, cloud-based workforce management software provider Synerion USA Inc. acquired cloud-based video surveillance and access control solutions platform Qumulex Inc. Also, the global pioneer in airspace awareness and security, Dedrone, became part of the public safety and technology company Axon. The acquisition unites two companies with a shared mission to improve public safety and national security by staying ahead of persistent and escalating threats, enabling faster, more effective responses and ultimately protecting more lives in more places.

Ascending In The U.S., Gallagher Security Emphasizes Culture And ‘People-First’
Ascending In The U.S., Gallagher Security Emphasizes Culture And ‘People-First’

Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems.  Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company.  “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap.  Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends.  However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.

View all

Case studies

VIVOTEK AI Security Solutions For Campus Safety
VIVOTEK AI Security Solutions For Campus Safety

In recent years, campus safety and student mental health have drawn growing attention. Government data in Taiwan show a rise in emotional and stress-related issues among students aged 15–24. Unauthorized attempts to enter campuses still occur, unsettling students and staff. Strengthening security management and proactive alerting has therefore become a priority for schools. To address risks such as expansive campuses, multiple entry points, blind spots, and potential intrusions, VIVOTEK (3454-TW), the leading global security solution provider, has been promoting its AI-driven education security solutions, designed to proactively detect risks and safeguard school environments. Era of real-time detection and proactive response According to a report by research firm GII, the global education security market is projected to reach USD 910 million in 2025 and grow to USD 1.6 billion by 2030, representing a compound annual growth rate (CAGR) of 11.96%. As AI video analytics, edge computing, and cloud management platforms mature, security systems are evolving beyond passive video playback into an era of real-time detection and proactive response.  In education settings, AI can automatically detect intrusions into restricted zones and trigger instant alerts, enabling security personnel to make swift and informed decisions. VSS Pro platform Recently, VIVOTEK deployed a comprehensive education security solutions at a renowned national university in Taiwan, installing hundreds of AI Bullet and Fixed Dome cameras across entrances, rooftops, classrooms, corridors, walls, elevators, and parking areas. Integrated with the VAST Security Station (VSS) Pro platform, the system delivers: Proactive prevention: AI virtual fence defines restricted zones, detects loitering, notifies the security center, triggers on-site audio alerts, and coordinates real-time response. Efficient investigations: Broad coverage flags abandoned objects, while AI deep search traces intruders or vehicles in the shortest time using attributes (e.g., clothing color, backpack, vehicle type) to quickly assemble event timelines. VIVOTEK’s education security solutions With comprehensive, AI-enabled coverage, schools can monitor in real time and avert risks, fostering safe, welcoming, and sustainable learning environment.  Beyond Taiwan, VIVOTEK’s education security solutions are also used in the United States, Belgium, and Indonesia, tailored to local needs to build a global network of smart, sustainable campuses.

Dahua Cameras Safeguard Magna Carta At Salisbury Cathedral
Dahua Cameras Safeguard Magna Carta At Salisbury Cathedral

As custodians of one of the world’s most important historical artefacts, Salisbury Cathedral required a highly specialized surveillance system to safeguard its copy of the Magna Carta – housed in a controlled low-light environment within the Chapter House. ARC Fire Safety & Security, a long-term partner of Dahua Technology and trusted security provider at Winchester, Chichester and St Albans Cathedrals, was appointed to take over the servicing of the fire and intruder alarms, as well as the existing surveillance systems at Salisbury Cathedral. During this transition, ARC were also tasked with reviewing and upgrading the surveillance around the Magna Carta. The Magna Carta is displayed in a specially designed dark room to prevent light damage. Strict visitor control measures are in place – only one person may enter at a time, and flash photography is strictly prohibited. The surveillance solution had to meet demanding requirements – most notably, that the camera must not face the document directly and must emit less than 10 LUX of light to protect the ancient parchment. Solution With the support of Oprema, ARC Fire Safety & Security specified a range of Dahua cameras that met the project’s unique constraints. Central to the installation was Dahua’s 5MP IR Fixed-focal Eyeball WizSense Network Camera (DH-IPC-HDW3541EM-S-S2), selected for its compact design, superior low-light performance and adaptability. To comply with conservation restrictions, the infrared (IR) lamp was disabled and cameras were configured to operate via motion detection only. When a visitor enters the exhibition area, a dim cabinet backlight is activated. This soft, indirect light is sufficient for the Dahua camera to generate high-resolution color footage without emitting harmful direct illumination. The full deployment of Dahua’s solutions included six strategically positioned cameras to cover the Magna Carta, Chapter House, and entrance areas without violating historical preservation protocols. Results The installation was delivered with precision and sensitivity to the historic environment. ARC Fire Safety & Security and Dahua were able to meet the Cathedral’s requirements entirely, protecting an 800-year-old document while integrating the solution into a larger Dahua-based network infrastructure that is already in place across the site. “The cameras specified met the client’s brief perfectly. Despite the strict requirements around light emission and camera positioning, Dahua’s technology offered a reliable, image-rich solution. This ensures that Salisbury Cathedral’s Magna Carta is protected – discreetly and effectively – from intentional damage or interference,” ARC Fire Safety & Security Ltd. With all engineers recently completing Dahua Level 1 certification, ARC Fire Safety & Security is well-positioned to expand this trusted partnership for future heritage projects. The success of this project was made possible by the ongoing dedication of Salisbury Cathedral’s staff, whose careful stewardship of the Magna Carta and commitment to its preservation ensure this national treasure remains protected for future generations. Thanks are also due to the Cathedral’s visitor team, whose efforts in guiding guests through this remarkable piece of history continue to enrich the experience for thousands each year.

Siemens' AI-Powered Building Solutions In Healthcare
Siemens' AI-Powered Building Solutions In Healthcare

Siemens Smart Infrastructure has partnered with San Juan de Dios Hospital in Seville, Spain, to transform it into a smart and sustainable asset. With buildings accounting for around 40 percent of global carbon emissions, and healthcare facilities increasingly facing financial and sustainability pressures, improving operational efficiency is crucial. At San Juan de Dios Hospital, Siemens has turned this challenge into an opportunity with its AI-based digital building technology. By deploying its innovative solutions, Siemens enabled the hospital to cut operating costs of the analyzed assets by 35 percent, setting another benchmark for hospitals across the globe. Siemens’ AI-powered building platform The solution integrates energy and security control, as well as HVAC automation into a single system San Juan de Dios Hospital, which enjoys a history spanning more than 450 years, has undergone an impressive transformation using Siemens’ fully digital, AI-powered building platform Building X and digital services. The solution integrates energy and security management, as well as Heating, Ventilation, and Air Conditioning (HVAC) automation into a single system. This leads to significant operational, as well as energy efficiency gains for building managers. Siemens’ technology and services are expected to enable a further reduction of 10 percent in operating costs, thanks to early fault detection and optimized equipment use. Harnessing AI and interoperable platforms “With Siemens’ technology, we have gone beyond simple automation. We now have an intelligent system that coordinates, optimizes, and anticipates the functioning of our facilities, improving care quality and the well-being of those around us,” said María Jesús Pareja, Managing Director at San Juan de Dios Hospital. “This project sets another benchmark for hospital digitalization globally. By harnessing AI and interoperable platforms, healthcare facilities can transform operational complexity into simplicity and resilience – ultimately improving care outcomes while cutting costs,” said Delphine Clément, Global Head of Verticals at Siemens Smart Infrastructure Buildings. Integrates remote digital services Siemens deployed a digital layer that merges remote digital features for fault detection and diagnostics At San Juan de Dios Hospital in Seville, Siemens has deployed a digital layer that integrates remote digital services for fault detection and diagnostics, intrusion detection via Siemens Siveillance Suite, and the Desigo CC building management system.  As part of the Building X platform, Operations Manager and Energy Manager provide real-time visibility into building performance and energy consumption, enabling smarter decision-making, improved operational efficiency, and measurable sustainability gains. Digital building platform Building X is a digital building platform that supports customers to digitalize, manage, and optimize their building operations. It is part of Siemens Xcelerator, an open digital business platform that enables customers to accelerate their digital transformation easier, faster and at scale.

Copper Cable Theft Rising: DeterTech Reports Threat
Copper Cable Theft Rising: DeterTech Reports Threat

Crime analysts at DeterTech, a trusted security partner to critical infrastructure and law enforcement, are warning of a major rise in reported incidents of copper and cable theft across Greater Manchester and Lancashire. Believed to be orchestrated by Organized Crime Groups (OCGs), the direct to threat to UK infrastructure is being driven by the sustained high price of copper, which hit $10,300 per ton on 25th September 2025 – the highest recorded price since April 2024. Cable theft from rail network Cable theft from the rail network in Wigan resulted in widespread passenger disruption There have been six key incidents reported in the North-West of England since 14th September, impacting energy, transport, utilities and renewables infrastructure. For example, in Bolton a site was targeted for 33 kv copper cable valued at just under £500,000. Meanwhile, the theft of a significant quantity of string cable from a solar farm near Preston reduced the site’s energy output by around 40% risking the local power supply. Back in August, cable theft from the rail network in Wigan resulted in widespread passenger disruption and estimated losses to the UK economy of more than £1million. Deal with the threats Rachael Oakley, Head of Crime Intelligence, DeterTech, says: "The substantial price of copper is unfortunately driving high rates of offending across all forms of critical infrastructure. In order to protect energy, utilities, transport, and renewable infrastructure, it is imperative that fence lines are checked regularly, CCTV cameras are functioning correctly, and alarm monitoring centers are correctly equipped to deal with the threats posed." Critical infrastructure providers, particularly those with sites in the North-West of the UK, are urged to audit site security plans and to consider taking additional steps to deter unwanted attention from OCGs.  Direct threat to infrastructure The current intelligence picture points toward an on-going direct threat to infrastructure, with implications for asset loss service disruption, regulatory penalties and public safety. Operators are reminded to continue reporting all incidents of theft, suspicious vehicles, and hostile reconnaissance to DeterTech and Opal, the national police intelligence unit focused on serious organized acquisitive crime.

View all

Round table discussion

What Are The Advantages Of Installing Security As A Unified Platform?
What Are The Advantages Of Installing Security As A Unified Platform?

Access control, video surveillance, and intrusion detection systems evolved largely independently in the physical security industry. Integrating those systems to the benefit of an enterprise's overall security has traditionally fallen on security integrators working in cooperation with manufacturers. However, today's market has also evolved to include companies that provide "unified platforms,” bringing together various disparate security systems and functions under a single, centralized management interface. We asked our Expert Panel Roundtable: What are the advantages of installing physical security systems as a unified platform?

What’s New In Command-And-Control Systems For Security?
What’s New In Command-And-Control Systems For Security?

A software platform designed to centralize and manage various physical security systems within an organization used to be called a PSIM (physical security information management) system. Generally speaking, however, the PSIM term has fallen out of favor because the systems were seen as expensive and difficult to manage. The phrase has been replaced by command-and-control, referring to software that combines access control, video surveillance, intrusion detection, and other systems into a unified platform. It’s a ripe area for innovation in the physical security space. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact? 

What New And Emerging Threats Do Security Professionals Face?
What New And Emerging Threats Do Security Professionals Face?

There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organizations to take proactive steps to protect themselves, but the first step is to identify what those threats are. Early detection of threats can minimize the impact of a successful attack, whatever the vulnerability at issue. We asked this week’s Expert Panel Roundtable: What new and emerging threats will physical security professionals need to be prepared for in the future? 

View all

Products

Software House IP-ACM2A-EM 2-Reader Ethernet Door Module

Software House IP-ACM2A-EM 2-Reader Ethernet Door Module

Software House C-CURE 9000 v2.90 Access Control Software

Software House C-CURE 9000 v2.90 Access Control Software

Software House RM2L-NH Keypad Arming Station

Software House RM2L-NH Keypad Arming Station

Software House iSTAR Ultra SE - Ultra Mode Network-Ready Door Controller

Software House iSTAR Ultra SE - Ultra Mode Network-Ready Door Controller

Software House IP-ACM2A-MB 2-Reader Ethernet Door Module

Software House IP-ACM2A-MB 2-Reader Ethernet Door Module

Software House C-CURE 9000 Enterprise Access Control Software

Software House C-CURE 9000 Enterprise Access Control Software

Software House AS0073-CSI Input Module

Software House AS0073-CSI Input Module

Software House RM-DCM-2 Door Control Module

Software House RM-DCM-2 Door Control Module

Dahua Technology ARK50C-R Alarm Keypad

Dahua Technology ARK50C-R Alarm Keypad

Software House IP-ACM2A-EP 2-Reader Ethernet Door Module

Software House IP-ACM2A-EP 2-Reader Ethernet Door Module

Software House iSTAR Ultra SE - Pro mode Network-Ready Door Controller

Software House iSTAR Ultra SE - Pro mode Network-Ready Door Controller

Dahua Technology ARK50C Alarm Keypad

Dahua Technology ARK50C Alarm Keypad

Software House STAR016-4UW Rack Mount Door Controller

Software House STAR016-4UW Rack Mount Door Controller

Software House STAR008-2UW Rack Mount Door Controller

Software House STAR008-2UW Rack Mount Door Controller

Software House STAR008-4UW Rack Mount Door Controller

Software House STAR008-4UW Rack Mount Door Controller

View all

White papers

Precision And Intelligence: LiDAR's Role In Modern Security Ecosystems

Precision And Intelligence: LiDAR's Role In Modern Security Ecosystems

Download
The Top 4 Reasons To Upgrade Physical Security With The Cloud

The Top 4 Reasons To Upgrade Physical Security With The Cloud

Download
11 Advantages Of A Combined System For Access Control And Intrusion

11 Advantages Of A Combined System For Access Control And Intrusion

Download
Optimize Your Business with Analytics and AI

Optimize Your Business with Analytics and AI

Download
How End-to-End Video Security Solutions Can Help Your Organization With Social Distancing

How End-to-End Video Security Solutions Can Help Your Organization With Social Distancing

Download
Schooling the Market on Education Security

Schooling the Market on Education Security

Download
How To Catch Shoplifters With Thermal Imaging

How To Catch Shoplifters With Thermal Imaging

Download
What Do I Need To Know To Successfully Deploy Mobile Access?

What Do I Need To Know To Successfully Deploy Mobile Access?

Download
View all

Videos

Saving Lives With FLIR At Solna Fire Station

Saving Lives With FLIR At Solna Fire Station

OPTEX FlipX Standard - Internal Intrusion Sensor

OPTEX FlipX Standard - Internal Intrusion Sensor

OPTEX – FlipX Advanced model

OPTEX – FlipX Advanced model

Milestone Gives A Demo Of Alarm Manager

Milestone Gives A Demo Of Alarm Manager

View more

Intrusion detection: Manufacturers & Suppliers

  • Bosch Intrusion detection
  • Dahua Technology Intrusion detection
  • OPTEX Intrusion detection
  • Hikvision Intrusion detection
  • DSC Intrusion detection
  • Climax Technology Intrusion detection
  • Visonic Intrusion detection
  • Honeywell Security Intrusion detection
  • Vanderbilt Intrusion detection
  • Senstar Intrusion detection
  • Pyronix Intrusion detection
  • NetworX Intrusion detection
  • Verkada Intrusion detection
  • RISCO Group Intrusion detection
  • Texecom Intrusion detection
  • Software House Intrusion detection
  • Axis Communications Intrusion detection
  • Ajax Intrusion detection
  • Gallagher Intrusion detection
  • Enforcer Intrusion detection

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Intrusion detection
About this page

In-depth coverage of Intrusion detection, featuring latest news and company announcements, products and solutions and case studies. Read insightful analysis of product, technology and business trends related to Intrusion detection from security industry experts and thought leaders.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Addressing Cybersecurity Vulnerabilities In The Physical World
Addressing Cybersecurity Vulnerabilities In The Physical World
Artificial Intelligence in Security
Artificial Intelligence in Security
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec