Network cameras
IDEMIA Secure Transactions (IST), a division of IDEMIA Group, is a provider of payment and connectivity solutions for financial institutions, mobile network operators, and automotive manufacturers. Bamboo TAP Card By introducing the Bamboo TAP Card, IST is setting a new standard for environmental responsibility in urban mobility. The TAP team at L.A. Metro became the first player to symbolically deploy these cards which were sold at the Los Angeles Times Festival of Books on April 20 and 21,...
Hikvision unveils its highly anticipated 5th generation LED cabinet, introducing the latest breakthroughs in display technology. With advanced industrial design, this new release promises industry-pioneering performance and convenience, setting a new standard for visual experience. Advanced industrial design The Hikvision’s 5th generation LED cabinet represents a great example of design and functionality. Its sleek yet robust structure, combined with big board splicing, stre...
76% of the UK’s critical national infrastructure (CNI) organizations have identified the use of AI to drive cyber threats as a current security concern. This dramatic rise in concern about how cybercriminals use AI is revealed in new research by pioneering cyber security services firm Bridewell, surveying 521 staff responsible for cyber security at UK CNI organizations in sectors such as civil aviation, telecommunications, energy, transport, media, financial services, and water supp...
DeterTech, renowned as the pioneering gold standard for temporary site security, is pleased to announce it will be bringing its full portfolio of site security, crime intelligence, and forensic marking solutions to the Welsh Construction Shows. Having just opened its new Welsh office, DeterTech invites visitors to the Cardiff City Stadium on the 15th of May and the Swansea.com Stadium on the 9th of October to get up close and personal with the ultimate intruder deterrence and detection technolo...
Sepura recently announced that it has been awarded the contract to supply the Department of Health and Social Care via the NHS Ambulance Radio Program, its next generation of hand-portable mission-critical communications devices for frontline ambulance staff across England. The contract will enable 11 English NHS Ambulance Trusts to benefit from the very latest broadband technology, which addresses the need for optimum performance across the testing environments and working practices of ambulan...
SharpEagle Technology, a pioneer in innovative safety solutions for industrial operations, is excited to announce the launch of the Safe Zone Corner Guard, a ground-breaking device designed to prevent collisions and enhance safety in blind corners within industrial environments. Safe Zone Corner Guard The Safe Zone Corner Guard is equipped with advanced motion-sensing technology that triggers visual and audio warnings, when movement is detected from both directions, making it an essentia...
News
FLIR, a Teledyne Technologies company announced the FLIR A6301, a highly sensitive, cooled mid-wave thermal imaging camera designed for 24/7 inspection and automation applications aimed at making production lines more efficient and improving product quality. The A6301 offers a new level of thermal imaging capabilities to process control and quality assurance applications in the manufacturing industry. FLIR A6301 Capturing high-speed product movement with up to 20 times less motion blur, the A6301's rapid integration times significantly reduce image blur, ensuring precise temperature readings even on the go. It detects small thermal variations and accurately measures temperatures on moving products, providing machine builders and integrators with the cutting-edge tools they need to tackle challenging machine vision applications boosting throughput, cutting disruptions, and minimizing downtime with sharper measurements. Thermal imagining capabilities “The A6301 camera offers a new level of thermal imagining capabilities to process control and quality assurance applications in the manufacturing industry. FLIR is driving the market forward with the latest in thermal imaging automation innovation, meeting the demanding requirements for production floors, while also delivering the most platform flexibility for integrators, all in a single solution,” said Jerry Beeney, Business Development Director, FLIR. GEV and GenICam industry protocols Camera interfaces, commands, and connectors are all purpose-built to industry standards FLIR developed the A6301 camera with customers and integrators at the forefront. Camera interfaces, commands, and connectors are all purpose-built to industry standards. Simple, standard GEV and GenICam industry protocols make implementation easy, and the long-life cooler reduces concerns about costly annual maintenance. Smallest commercial-cooled camera platform Going further, the FLIR A6301 is the smallest commercial-cooled camera platform ever built by FLIR, so size and weight won’t get in the way of system integration. When integrated with additional sensors within a broader automation system, advanced machine learning, and deep learning methods, the FLIR A6301 can help provide for a smarter, more efficient process.
The integration of cutting-edge technology, spurred on by innovation, is propelling efficiency and productivity to new heights. In turn, this opens up prospects for manufacturers across security, smart building, fire safety, and mobility sectors through the rising development of IoT and AI trends. To capitalize on the opportunities created by technological advancements, Messe Frankfurt and CCPIT-Shanghai are partnering on a new security, safety, and fire protection fair – Intersec Shanghai. The trade fair is set to launch on 13 to 15 May 2025 at the National Exhibition and Convention Center, Shanghai. The organizers will utilize their expertise and resources to establish a gateway between the dynamic Chinese and international security and safety sectors. Application of smart security products Introducing the new fair at the press conference, Mr Johannes Moeller, Director of Brand Management Safety, Security & Fire, Messe Frankfurt Exhibition GmbH, said: “Messe Frankfurt has a solid network of security trade fairs that offer access to markets all over the world. This being said, we are constantly looking for locations that can add value to our current portfolio, rising to the demand of providing opportunities for business exchange and trade. The addition of Intersec Shanghai will do just that. With 30 years of organizing events in Asia and a well-developed China portfolio, I believe the fair can debut strongly to shed light on new security technologies in China.” The application of smart security yields is widely used in public sectors including carrier China has a prominent presence in the safety and security market, with over 30,000 related enterprises operating in the country. This position has fueled the continuous development and maturity of smart hardware such as cameras and facial recognition, as well as software technologies such as AI and big data. The application of smart security products is widely used in public sectors including transportation, finance, culture, and education. With sustained momentum in various markets, the country’s security industry has grown by 4.9% in 2023. Development of innovative security solutions To facilitate the market’s expansion, the debut of Intersec Shanghai in 2025 will connect China’s fast-growing sector with global suppliers and buyers to promote international trade and development. Scheduled for 13–15 May 2025, around 150 exhibiting exhibitors will ensure a comprehensive showcase of the latest commercial & perimeter security, public security & policing equipment, fire & rescue, safety & health, and cyber security innovations across 13,000 sqm of exhibition space. The debut of Intersec Shanghai in 2025 will connect China’s fast-growing sector with global suppliers Discussing the event’s potential, Mr Gu Chunting, Vice Chairman of the Council for the Promotion of International Trade Shanghai (CCPIT Shanghai), shares his optimism about the future of the domestic security market: “Technological advancements have led to the development of innovative security solutions in China, meeting diverse consumer needs across industries. With the addition of Intersec Shanghai, I believe industry players will find more opportunities for international cooperation as the show will provide an important international gateway into China’s promising safety and security market, as well as support the domestic business community to expand abroad.” Integrated development of services Intersec Shanghai will be strategically held alongside the concurrent Yangtze River Delta International Emergency Disaster Reduction & Rescue Expo (EDRR), co-located at the National Exhibition and Convention Center. EDRR specializes in government emergency management systems and disaster prevention. EDRR specializes in state crisis management systems and disaster prevention The event aims to promote the integrated development of services around the Yangtze River Delta region. The previous edition of EDRR attracted more than 600 exhibitors and 80,000 visitors. It is expected that both fairs will draw a larger audience of trade visitors, providing attendees the opportunity for cross-sector sourcing in security, safety and disaster risk reduction. Focusing on commercial security Intersec Shanghai is organized by Messe Frankfurt (HK) Ltd and CCPIT Shanghai. Safety and security are increasingly important basic needs and, therefore, stand for a growing global market. With ten trade fairs, congresses, and forums around the world, Messe Frankfurt brings together demand and supply worldwide with progressive, connected products, applications and services focusing on commercial security and the protection of buildings, spaces, and people. The Safety, Security & Fire business cluster offers access to the dynamic markets of the Arabian Peninsula, Asia, Europe, and South America.
A prominent figure in the Security and Telecom sector, Matrix concludes its successful participation at SAFE West Expo 2024 in Mumbai. With over three decades of industry expertise, Matrix seized the opportunity to engage with industry peers, gain valuable insights, and explore avenues for collaboration. Technology-centric solutions Matrix is steadfast in its dedication to delivering technology-centric solutions, with a paramount focus on ensuring customer contentment. This dedication is evident in the creation of cutting-edge products stemming from internal research and design endeavors. By purposefully allocating resources, 40% of its workforce is devoted to continuous innovation through research and development. This effort yields a comprehensive portfolio comprising over 60 technologically advanced products across four distinct domains. Strategic approach Matrix directs its sales endeavors exclusively through a vast and well-established partner ecosystem Matrix's global footprint is reinforced by a robust network of over 4000 partners, facilitating access to a user base exceeding 1 million worldwide. Demonstrating steadfast commitment, Matrix directs its sales endeavors exclusively through a vast and well-established partner ecosystem. This strategic approach underscores its dedication to delivering top-notch solutions and fostering enduring partnerships within the technological realm. Identifying growth areas At the expo, Matrix actively participated in discussions, seminars, and networking sessions, deepening its understanding of emerging trends and customer preferences in the safety and security landscape. The event served as a platform to exchange ideas, forge partnerships, and identify potential areas for innovation and growth. Innovation, collaboration, and value Matrix remains dedicated to driving continuous improvement and innovation in security and telecom Reflecting on the learnings from the event, Matrix acknowledges the importance of staying attuned to market dynamics and customer needs. Moving forward, the company plans to enhance its participation in similar expos, with a focus on showcasing its commitment to innovation, fostering industry collaboration, and delivering value to customers. Matrix remains dedicated to driving continuous improvement and innovation in the security and telecom domain. Leveraging market insights By actively participating in industry events and leveraging market insights, Matrix reaffirms its position as a trusted partner in providing cutting-edge solutions to businesses worldwide. Kaushal Kadakia, Head of Marketing at Matrix, highlighted the significance of events like SAFE West Expo in shaping the company's strategic initiatives. He emphasized the importance of leveraging market insights gained from such expos to refine product offerings and enhance customer engagement strategies.
VIVOTEK (3454TW), the global security solution provider, expands its AI security business and announces its AI entry-tier 9383-Series network camera, which allows users to utilize AI video analytics services at affordable costs, easily recognize attributes of people and cars, and enhance operation and management efficiencies. Core+ AI NVR or VSS Moreover, the camera seamlessly integrates with Core+ AI Network Video Recorder (Core+ AI NVR), or the VAST Security Station (VSS) system. With the addition of the new feature “Case Vault,” VSS can quickly compile and produce needed video data within one minute and provide a complete report for critical videos. This addresses the previous challenge of the time-consuming organization of image data, establishing a comprehensive security environment through an AI solution that integrates both hardware and software. Combining AI technology According to research, the B/B ratio of IP cameras with embedded AI functionality will double by 20271 According to research, the B/B ratio of IP cameras with embedded AI functionality will double by 20271. “VIVOTEK has been devoted to the security industry for 24 years, and to keep pace with the rapidly growing AI market, VIVOTEK continues to launch customer-centered diverse products,” said Louis Liao, Director of Product Planning at VIVOTEK. “To expedite AI application and expand product market share, VIVOTEK C-Series launches for the first time AI entry-tier 9383-Series network camera, which is combined with the industry-pioneering AI smart surveillance system VSS to target global SME owners, helping them to build complete AI solutions under limited budgets, creating more intelligent and efficient operational environments.” 9383-Series AI network camera comes with 3 advantages Precise AI Analytics: The AI algorithm is used to analyze subjects like people and cars, including color, car model, backpack, and cap, enhancing detection efficiency. Clear Imaging: the 9383-Series camera is equipped with a 5-million-pixel lens and advanced video sensors, which delivers 2.5x greater dynamic range than sensors of the previous generation. Not only does it prevent over-exposure, but also captures clear videos at night. Durability: Weather-resistant and vandal-proof ratings of IP66 and IK10, ensuring durability even in harsh outdoor conditions. New “Case Vault” feature of AI smart surveillance system VSS In addition to introducing AI technology to more IP cameras, VIVOTEK also offers an AI surveillance system Core+ AI Network Video Recorder, and VSS to build AI solutions. Both Core+AI Network Video Recorder and VSS have Deep Search technology. VSS is equipped with powerful AI analytics capabilities; connecting up to 22,400 cameras, VSS utilizes the Deep Search feature, which includes three major assisted searches: attribute search for people/vehicles, scene search, and research. Security efficiency and accuracy VSS can find needed images organize video clips based on the designated time and location, and generate a complete report Combined with the outstanding AI video detection capability of VIVOTEK’s cameras, the system can precisely search for key videos. With the newly added “Case Vault” feature, VSS can find needed images organize video clips based on the designated time and location, and generate a complete report, enhancing security efficiency and accuracy. 5-Year Warranty on 9383-Series Network Camera VIVOTEK continues to introduce edge computing to front-end cameras and backend systems, and adds AI applications to enhance product efficiency, while also realizing business sustainability. VIVOTEK offers a 5-year warranty on the 9383-Series network camera and Core+ AI NVR to satisfy ever-changing market needs, realizing a new future of smart security for its customers.
Milestone Systems, a global pioneer in video technology, is at the forefront of the video security industry, emphasizing responsible technology innovation across its operations. The company will host this free, one-day event on May 7 in Toronto. Geared to IT pioneers and security professionals, the day will feature engaging presentations from Milestone's technology partners across key industries such as education, healthcare, city surveillance, and hospitality. Attendees will gain insights into the latest developments in AI technologies, cloud video strategies, and Milestone's newest product offerings. Reshaping the future of security A keynote session from renowned AI expert Steve Brown promises to be a highlight of the event A keynote session from renowned AI expert Steve Brown promises to be a highlight of the event. Brown, a former executive at Google Deepmind and Intel, and an advisor to Fortune 100 pioneers on how to innovate with AI, will share his insights on how artificial intelligence is transforming video technologies and reshaping the future of security and business operations. "We are excited to bring together security professionals from across Canada to explore the cutting-edge video technologies that are shaping the future of our industry," said Peter Lintzeris, Director of Sales, Canada, at Milestone Systems. "The Toronto XPerience Day offers a unique opportunity to learn from experts, network with peers, and discover how Milestone's open platform solutions can help organizations optimize safety and efficiency." Video management innovations The event will be held at Steam Whistle Brewing in the heart of downtown Toronto. Following the day's presentations, attendees are invited to network with fellow security professionals and speak one-on-one with Milestone experts during a relaxed social hour. "Milestone is committed to empowering our partners with the knowledge and tools they need to succeed in today's fast-paced security landscape," said Lintzeris. "We look forward to an engaging and informative event, and to continuing to support the Canadian security community with our open platform video management innovations."
Hikvision, a world-pioneering manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, will proudly unveil its Solar Solutions lineup at a May 23 webinar, showcasing this unprecedented solution to security challenges in standalone sites and hard to reach remote locations. Attendees will receive a 50% discount on the 4 MP Kit DS-2XS2T47G1-LDH/4G/C18S40 when purchased within 30 days of the webinar. Solar Kits with ColorVu technology “From highly affordable 4 MP Solar Kits with ColorVu technology to options with 8 MP resolution and features like License Plate Recognition, Hikvision is bringing unmatched technology to remote and hard-to-reach locations, everywhere from rural farms to urban parking lots,” said John Xiao, Vice President of Marketing, Hikvision USA. Unlike rival products, Hikvision offers a complete system, ready to deploy, with all parts included “In an era where sustainability meets innovation, Hikvision is driving the charge, with competitive technology that is easy to deploy and ready to solve end-user challenges.” Unlike competitor products, Hikvision offers a complete system, ready to deploy, with all components included. It is easy to select the best model and install it, and the entire system has been tested for safety and reliability. Six models with a broad feature Hikvision’s Solar Solutions include six models with broad feature sets for various applications: The 4 MP ColorVu Solar-Powered Security System features 24/7 full-color with ColorVu technology, human detection, and two-way audio for real-time deterrence. The 4 MP Motorized Varifocal Bullet Solar Kit is available in two models: the DS-2XS6A47G1-IZS/C36S80 2.8-12 mm (focal length/FOV) and 8-32 mm. Both feature an 80-watt solar panel and 360 WH chargeable lithium battery. Other technology includes WDR, deep-learning human and vehicle target classification, smart battery management, and a high-capacity 1TB built-in SSD. The 4 MP ANPR License Plate Recognition (LPR) Bullet Camera Solar System is available in two versions: 2.8-12 mm focal length/FOV and 8-32 mm. Each one boasts all the features of the motorized varifocal model above delivering valuable license plate recognition and road traffic controls where wired network and electric supply lines are impractical or otherwise impossible. The 8 MP ColorVu Fixed Bullet Solar-Powered Camera System has 24/7 colorful video with ColorVu, WDR technology, deep-learning human and vehicle target classification, and smart battery management. It boasts a larger 80-watt solar panel and 360 WH chargeable lithium battery. By harnessing the power of the sun, Hikvision empowers businesses to improve ROI, eliminate power cords, and bid farewell to internet cables. The Solar-Powered Camera Kits deliver full-color video security, anytime, anywhere, without the need for a traditional power supply or internet connection.
Expert commentary
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint method have made it among the most widely used for biometric authentication across industry sectors ranging from banking and finance, retail, and healthcare, to government and law enforcement. It performs biometric technology’s “something you are” function while offering unique characteristics that make it particularly valuable for many applications. Unique identifier The fingerprint biometric has the permanency of being reasonably stable and consistent over time Among these characteristics is the pervasiveness and special nature of the fingerprint -- almost everyone has one, and each is a unique identifier. The fingerprint biometric has the permanency of being reasonably stable and consistent over time. It is also easy to acquire, measure, and process. High adoption rate Another key attribute of a fingerprint biometric is its ability to be protected against threats ranging from abuse and misuse to theft, imitation, and substitution. When it is used with recognition techniques the resulting solution performs with a combination of accuracy, speed, scalability, and ease of use. Fingerprint biometric solutions also have the highest adoption rate among biometric authentication solutions according to an industry report published by Payments Journal. Three interrelated components There are three basic components in any fingerprint biometric system as shown in Figure 1: capture (using a sensor that can capture even the most difficult finger types); liveness detection (using the Presentation Attack Detection – or PAD – technique); and matching (including preventing rejection of a legitimate user). Biometric algorithm The sensor captures and pre-processes the fingerprint data. It must be able to successfully capture fingerprint images for a range of skin types and print conditions under diverse temperatures, humidity, light, surface oil, dust, dirt, and other environmental conditions. A biometric algorithm then extracts minutiae data about the fingerprint ridges (endings, bifurcations, islands, etc.) and their orientation and position. PAD technique Implementing a presentation attack detection (PAD) technique at this stage activates the fingerprint biometric system’s second key element: liveness detection. This verifies the fingerprint’s authenticity and that it belongs to a living person. The system’s third element – matching – occurs after the PAD-verified fingerprint dataset has been securely stored as a record, known as a template, inside an enclave with cryptographic protection. Check for liveness The corresponding template of the legitimate user is then retrieved from secure storage When the fingerprint is presented for matching, it is rechecked for liveness. The corresponding template of the legitimate user is then retrieved from secure storage and the process of matching the fingerprint with this template is executed. This must be completed accurately and without rejecting a legitimate user. Types of fingerprint sensing technologies There are four prevailing categories of sensing technologies used with fingerprint readers: optical, capacitive, thin-film transistor (TFT), and multispectral imaging (MSI). Optical and capacitive method Optical is the most mature sensor technology and offers the benefits of a compact size, good capture Optical is the most mature sensor technology, and offers the benefits of a compact size, good capture and matching performance, a small enough size to fit in most desktop environments or shared workstations, and a high level of accuracy at a cost-effective price point across all use cases. The capacitive method, on the other hand, is less prone to fake finger attempts while also offering a thin and compact size for space-limited applications, the power efficiency to support battery-operated devices, and the ability to handle both indoor and outdoor lighting conditions. TFT technology The third technology goes a step further in capture accuracy. TFT technology can accurately recognize the smallest fingerprint features with ultra-high resolution and is used either as a larger-size matrix capacitive proximity detector (capacitive fingerprint sensor) or a larger-area matrix light detector (optical fingerprint sensor). It is ideal for in-the-field mobile identification applications that require a cost-effective, ultra-slim, and lightweight solution with low power consumption. MSI technology MSI technology differs from all three approaches, projecting multiple colors of light into the finger from different angles to collect both surface and subsurface biometrics data. It captures the most difficult fingerprints of diverse demographics, in a wide range of challenging environments. HID has used this patented technology in fingerprint readers that are compliant with ISO 30107-3 PAD Level 2 for advanced anti-spoofing against fraud. The technology also improves matching and offers sophisticated endpoint security that prohibits cyber criminals from gaining unauthorized access to networks by turning fingerprint readers into secure endpoints. Best practices for technology selection Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership. There are three top considerations: security, suitability, and usability. Each is important and the best approach is to strike a balance between all three. Following are the questions to ask during the selection process: Security: What is the regulatory environment? Financial and government services, healthcare, and law enforcement are some examples of highly regulated sectors with elevated security compliance requirements. Are there mandates in place for advanced capturing and biometric authentication specifications? How important is it to ensure anti-spoofing through liveness detection? Will endpoint security be required so that, if the fingerprint device is hacked, no network, system, or data behind the firewall will be impacted? Suitability: Where will the biometric technology be implemented? There will be additional considerations if it is to be embedded in portable, battery-operated devices that require low power consumption. Where will the technology be used? Will it need to fit into small spaces or be used in challenging indoor or outdoor conditions and environments? Will durability be important? Some deployments will face unpredictable weather and difficult lighting conditions for image capture. Will the technology be used for mission-critical border control or a more common – and less demanding -- commercial use? Usability Is it critical that the technology easily and consistently perform capture and matching? Will there be high volumes of fingerprint captures and matches? Is “friction frustration” a concern? If so, the solution must perform matching quickly and accurately to sustain high levels of user productivity. Will the fingerprint device be used by one person exclusively, or multiple people in a shared workstation setting? How diverse is the user population? Some readers are designed to handle all types of fingerprints and diversified demographics. Different applications Fingerprint biometrics is a proven solution to address real-world challenges, each with its requirements The answers to these questions will help determine the best choice of fingerprint technology. Different applications apply fingerprint biometrics to very different use cases but in all cases. It is a proven solution to address real-world challenges, each with its requirements. For instance, in a healthcare clinician’s terminal area or a similar shared environment with limited space, a durable, low-profile capacitive sensor may be the right answer. For an organization in a highly regulated, mission-critical environment like a bank or border control agency, advanced technologies such as MSI readers may be needed to avoid the serious repercussions of a spoofed identity or the rejection of a legitimate one. Requirements for a biometric solution These are just a few of the requirements to consider when choosing a fingerprint solution. In banking and finance, alone, fingerprint biometrics is used for applications ranging from transacting at the ATM to customer onboarding (eKYC), compliance (AML/KYC), and fraud prevention. The retail sector adds even more, including age verification, loss prevention, point of sale (POS) security, self-service checkout, and secure time and attendance. Law enforcement organizations have their unique requirements, using fingerprint biometrics for background checks, criminal booking, crime investigation, inmate management, mobile identification, and more. For government agencies, typical applications include benefits distribution, border security, citizen ID, employ authentication (SSO/MFA), and voter registration. Each application requires a thorough assessment of the best fingerprint technology for the job. The right touch The right solution will deliver the optimal balance of security, suitability, and usability Fingerprint biometric solutions empower a wide range of use cases with the simple touch of a finger. The right solution will deliver the optimal balance of security, suitability, and usability based on an analysis of criteria including specific application requirements, the characteristics and size of the user population, and challenges posed by environmental conditions. Accuracy, efficiency, and security The world faces increasingly dangerous fraud, account takeover, and impersonation threats. As industries and enterprises work to improve and evolve their identity and access strategies to combat these threats, fingerprint biometrics continue to prove their value through solutions that meet the key selection criteria while delivering the highest levels of accuracy, efficiency, and security.
Educational institutions worldwide increasingly rely on robust wireless networks to enhance academic pursuits, safety measures, and operational efficiency. The campus environment, a complex network of interconnected buildings, and the humans navigating them require innovative technologies to meet these diverse needs. The solution lies in a new wireless protocol that provides an ideal fit for the long-range, low-power connectivity requirements of educational campuses: Wi-Fi-certified HaLow. Wi-Fi HaLow: Wi-Fi HaLow, a new Wi-Fi certification released by the Wi-Fi Alliance in November 2021 and incorporating the IEEE 802.11ah standard, is optimized for the unique requirements of Internet of Things (IoT) applications. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs Its combination of long-range connectivity, low power consumption, advanced Wi-Fi CERTIFIED WPA3 security features, and the ability to connect more than 8,000 devices from a single access point makes the protocol a game changer for campus environments. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs between range and speed that limit the effectiveness of conventional Wi-Fi in the 2.4, 5, and 6 GHz frequency bands for campus applications. Robust, secure connections for access control Operating at sub-GHz frequencies, the Wi-Fi HaLow protocol's unparalleled ability to penetrate physical barriers and its advanced security features make it an ideal wireless technology for supporting access control systems throughout campuses. Credential systems for students, badge scanners, cameras, and dormitory door locks can work efficiently and securely in hard-to-reach locations, providing an interconnected and safe environment for the campus community. Enhancing safety through improved connectivity Body-worn cameras used by public safety officers can remain connected to the wireless local-area network The low-power and long-range attributes of Wi-Fi HaLow can play a significant role in strengthening campus safety systems. Body-worn cameras used by public safety officers can remain connected to the wireless local-area network (WLAN) or mobile router in their patrol vehicles even at a long distance, reducing the need to consume cellular data. Wi-Fi HaLow enables the development of robust wireless networks that can reliably support campus-wide, two-way video intercoms, potentially enhancing response times and safety measures. Streamlining outdoor equipment automation Outdoor equipment automation, such as irrigation systems, smart lighting, and robotic lawnmowers, can leverage Wi-Fi HaLow's power efficiency, and long-range and expansive coverage. Automation of these systems with such efficient wireless connectivity can lead to significant energy savings, improved productivity, and reduced operational costs. Delivering superior speed and range 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second A Wi-Fi HaLow network shatters the traditional tradeoff of wireless communications between speed and range. A single-stream, 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second at sub-GHz frequencies, enabling live streaming on large screens, connecting multiple real-time AI edge cameras, as well as thousands of low-power IoT devices, all connected without compromising on range. Wi-Fi HaLow signals can extend beyond 1 kilometer, up to 10 times farther than traditional forms of Wi-Fi in the 2.4, 5, and 6 GHz frequency bands, and are capable of connecting far-flung devices and systems across campus environments. Setting a new standard for campus connectivity By addressing the connectivity needs of modern campuses, Wi-Fi HaLow paves the way for future campus applications. As we navigate the digital era, Wi-Fi HaLow presents a compelling solution that significantly enhances connectivity, safety, and efficiency. This leap in wireless capabilities isn’t merely incremental; it represents a transformative stride toward a smarter, more connected future. Wide-reaching wireless network Educational institutions can leverage Wi-Fi HaLow to create safer, more efficient, and interconnected campus environments. By providing a robust, reliable, and wide-reaching wireless network, Wi-Fi HaLow enables campuses everywhere to fulfill their diverse connectivity needs without compromise.
Changing customer needs can make specifying an alarm system that will continue to deliver in the long term a challenge. However, the latest modular alarm solutions provide the opportunity to build a more individualized system from the outset, as well as offering the ability to up-scale in the future without causing disruption. Martin Wilson, North EMEA Regional Director at Resideo, looks at how alarm specialists can use this style of solution to both benefit customers and build their own business opportunities. Holistic sense of home security An alarm system no longer needs to function on one level, alerting only to a break-in taking place In a survey of 1,000 homeowners undertaken by Resideo, the results revealed that, although deterring burglary was still a top priority, consumers were moving to a more holistic sense of home security, wanting to bring convenience, and property and life safety, into the mix. Indeed, an alarm system no longer needs to function on one level, alerting only to a break-in taking place. The latest modular alarm systems offer the flexibility to create a scalable security and life safety platform for homes and small businesses, as well as giving installers the ability to suggest future update options that can be added as and when budget or requirement allows. Valuable up-scales Finding an alarm that can be scaled over time has the obvious business benefit of ensuring it is easy to revisit and add to as customers naturally expand their existing security. With many modular designs connected via WiFi, this not only means installers can opt for the right mix of sensor options from the get-go but also that any additions can be connected to the panel and system with ease. Many control hubs have winning features in their own right. The ProSeries security panel by Resideo, for instance, has an intuitive touchscreen, easy-to-read, full-color display to reduce false alarms, plus a built-in camera, speaker and microphone, intuitive icons, and even five-day weather alerts. The ProSeries security panel by Resideo has an intuitive touchscreen Natural up-scale opportunities For instance, for those in a property prone to flooding, a flood sensor may be a worthwhile addition For the installer, it has a plug-in power connection, trouble-shooting videos, and end-user-replaceable batteries to reduce unnecessary callouts. However, to build a scalable system, this needs to be coupled with the right, flexible solutions to tackle customer concerns. Taking the time to find out what is important to the end user is vital here and can lead to natural up-scale opportunities. For instance, for those in a property prone to flooding, a flood sensor may be a worthwhile addition. Similarly, a panic button and even medical transmitters may be of benefit to others. All this, as well as other options, such as glass break detectors, door and window sensors, and indoor and outdoor MotionViewers™, are available within the ProSeries range, and can be updated or added to an installation as needed or as a property grows with minimum disruption. Adding life safety The ability to propose an alarm system that can bring together alerts for different threats – for both the home and life – under one platform, also has real appeal. Indeed, in a survey of 1,000 homeowners undertaken on behalf of Resideo, a system’s ability to alert to the dangers presented by fire and CO was mentioned as an important part of the decision-making process by 41% of participants. For many, this increased awareness may stem from the many regulation updates regarding smoke and carbon monoxide (CO) alarms that took place in 2022. In Scotland, for instance, carbon monoxide detectors were required to be fitted in any room with a carbon-fueled appliance in all homes, rented or owned. Social housing properties In England, smoke and carbon monoxide alarms were required in all social housing properties In England, from the 1st of October 2002, smoke and carbon monoxide alarms were required in all social housing properties, with carbon monoxide alarms now mandatory in the private rented sector. Wales followed suit in December for rented accommodation. The new guidance for England and Wales requires at least one smoke alarm to be installed on each storey of a property, to help alert to domestic fires more quickly, ensuring a quicker evacuation and reduced risk of fatality. For professionals, systems such as ProSeries, can be connected to a series of smoke and carbon monoxide detectors, in a ‘one-go-all-go’ setup that means the alarm will go off if one of these threats are identified. Smart and connected benefits The total Connect 2.0 app gives ProSeries end-users the ability to view and control the security platform remotely. The Resideo Pro app currently gives installers the ability to view the system and connect to the central monitoring system. The platform also supports home automation as it works with Zwave devices. The platform also supports home automation as it works with Z-wave devices. The platform also supports home automation as it works with Z-wave devices There are also extra benefits for alarm professionals too. The AlarmNet 360™platform on which ProSeries is configured gives greater insight to improve business operations, increase efficiency and deliver insights on accounts to identify additional upsell opportunities and ongoing services. Providing the ability to remotely diagnose brings valuable time-saving options and avoids unnecessary callouts. It also means the ProSeries panel and peripherals programming can be accessed anytime, anywhere, using the cloud, allowing ease of programming, troubleshooting and account management on the go. Needs and future possibilities Changing a complete alarm system to apply new functions is never going to feature highly with the end user, nor does it work where longevity and sustainability is concerned. Having the ability to build a modular system and add to this as needed, whether this is at a property or a small business, provides benefits for both customers and professionals when it comes to meeting immediate needs and future possibilities. Add connectivity and remote access to this and you have a platform that can help streamline business operations, putting professionals more in touch with customers, and helping to spot future opportunities.
Security beat
Security professionals are recognizing the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organizations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analyzing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognize the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilizing open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualized through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritize critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratization of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivize bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimizes the occurrence of analytic errors caused by inaccurate machine translations. This minimizes the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognize its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyze massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
As the physical security and cybersecurity worlds converge, many industry professionals are finding themselves moving from one realm to the other. Or, more likely, they are embracing both disciplines as integral to the future of security as a whole. One security professional bringing her cybersecurity expertise to the physical security market is Wendy Hoey, Director of Sales, US Sales Leadership, North America, for Milestone Systems. With more than 23 years of experience in cybersecurity, Wendy Hoey now works with a global company dedicated to empowering people, businesses and societies with data-driven video technology. Author's quote Caught up with Wendy Hoey to discuss how the security market can harness innovation “I'm thrilled to be joining the physical security industry at this transformative time when there's such tremendous potential to update legacy systems with pioneering technologies like AI and the Internet of Things,” says Hoey. “I'm energized by the chance to collaborate with colleagues to help transform physical security, enhance predictive capabilities, and realize a shared vision of seamless protection across the digital and physical realms.” Caught up with Wendy Hoey to discuss how the security market can harness innovation to make the world safer and more secure. “The future is bright, and I'm honored to be part of this community,” says Hoey. Q: What can physical security learn from the world of cybersecurity? Hoey: Physical security can learn a great deal from the world of cybersecurity. With the rise of IoT and IP-connected devices, the lines between physical and digital security are blurring. Like cybersecurity, physical security needs to take a proactive approach to protecting core systems and perimeter access points. Understanding potential vulnerabilities and attacks is key. Physical security pros should continuously educate themselves on emerging technologies and threats and stay up to date on best practices. Adopting a customer-centric mindset is also critical. Rather than just selling technologies, physical security providers should focus on understanding clients' unique risks, objectives, and pain points. By taking cues from cybersecurity, the physical security industry can transform itself, innovate, and provide smarter solutions. Q: How is physical security a unique application for IT? How do physical security (and/or video) systems differ from “other” IT systems? Hoey: Physical security has unique challenges compared to traditional IT systems, but also shares some commonalities. At its core, physical security relies on networked hardware like cameras, access control and detectors that must be online and recording effectively at all times. This is like IT infrastructure in that uptime and availability are critical. With the rise of IoT, cyber and physical security are converging. Physical security systems have vulnerabilities that didn't exist before everything became IP-connected. Staying on top of emerging technologies and threats is crucial. At the end of the day, both physical and cyber security share the goal of minimizing organizational risk, and both disciplines must come together and cooperate to optimize security and safety. Q: How can security integrators ensure their workforce (i.e., installers) have the required IT skills to address the needs of the physical security market? Hoey: As security networks converge more deeply with IT infrastructure, integrators must invest in training to ensure their installers have the required skills. Whether pursuing vendor certifications, in-house training programs, or partnerships with IT services firms, integrators must recognize that security solutions require IT fluency. A willingness to upskill installers and keep pace with technological change will prepare integrators to deliver the solutions end users demand in an increasingly connected physical security ecosystem. Q: What is the role of the manufacturer to ease the application of IT technologies to the physical security market? Hoey: The role of the security manufacturer is to simplify and facilitate the application of IT technologies by serving as a trusted advisor and educator. Manufacturers must provide guidance, case studies, and domain expertise to help partners and end users understand the full capabilities of technologies and how they can be leveraged most effectively. Rather than just promoting a specific product, manufacturers should always take an active role in informing the channel and customers on available possibilities, bringing real partnership through tailored advice and solutions. Q: What challenges remain relating to implementing IT technologies in the physical security industry? How will new technologies (e.g., AI) transform the IT environment for physical security now and in the future? Hoey: When implemented thoughtfully, AI has enormous potential to transform physical security by helping security professionals identify anomalies and patterns in data to enable predictive analytics. With the right solutions, AI can act as a force multiplier by monitoring behaviors and giving security teams advance warnings before incidents occur. As AI and other emerging technologies mature, they will bring the industry in line with the most advanced security tools available. The future looks bright for a truly integrated physical and digital security environment with AI pioneering the charge.
Companies at GSX 2023 emphasized new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasizes ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the Mid-Market to the Cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for pure cloud, but there are benefits to be realized from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realize the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘Soft’ Features for Integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organization more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organization more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centers around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasizing performance, protection (cybersecurity), and price, their data centers are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring center where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
The University of California San Diego (UCSD) Police Department is a full-fledged law enforcement agency responsible for patrolling, investigating, and preventing crime within its jurisdiction. Spanning over 1,200 acres and comprising 900 buildings, UCSD’s campus presents unique challenges for law enforcement. The department’s Communications Division serves as the nerve center, coordinating responses to emergencies, managing communications, and ensuring coordination among officers. Garrett Williams, a seasoned Sergeant at the University of California San Diego (UCSD) Police Department, oversees the Communications Division. With over two decades of experience, Williams understands the critical role technology can play in public safety. The challenge Before partnering with RGB Spectrum, UCSD faced significant obstacles in its dispatch operations Before partnering with RGB Spectrum, UCSD faced significant obstacles in its dispatch operations. Dispatchers juggled multiple computers, including a CAD, radio, and phone computer, each requiring separate keyboards and mice. “I didn’t look to RGB to solve all my problems. However, I understood all that could be accomplished once the team showed us how the technology operated and what was possible,” Garrett Williams, Sergeant, University of California San Diego Police Department. “Three separate mice and operators constantly moving side to side to look from one to the other and then having to move their hands back and forth between control devices - anytime they have to do that, it’s slowing their workflow down; we figured there had to be a better solution,” shared Williams. “And up to 25% of our operators were suffering from repetitive movement and neck Injuries, resulting in downtime and light duty restrictions.” Why UCSD chose XtendPoint KVM-over-IP UCSD wanted a seamless KVM solution that integrated multiple systems over IP under a unified interface. It explored various options before discovering RGB Spectrum’s XtendPoint™ solution, which provides local and remote access to source computers, consolidates separate monitors into multi-view displays, and unifies control for more streamlined operation and enhanced efficiency. With RGB’s XtendPoint KVM system, UCSD grew access to the fire alarm system at each operator’s station UCSD’s key selling point was its ergonomic benefits. It offered a solution to the ergonomic challenges plaguing dispatchers by minimizing the need for multiple keyboards and mice. So did replacing monitor clutter. With the XtendPoint solution, single-signal monitors are consolidated on each console using multiview displays that can handle up to four computer signals each or up to eight signals displayed on just two pieces of glass. A notable feature of this solution is the ability to offer each operator customized display viewing, even in a multi-shift operation. A KVM-over-IP backbone offers additional benefits. Before, only one dispatcher station could see the fire alarm system. With RGB’s XtendPoint KVM system, UCSD expanded access to the fire alarm system at each operator’s station. Now, no matter where dispatchers are seated, they have access to all needed systems. How UCSD uses RGB’s solution The RGB Spectrum solution marked a significant turning point for UCSD’s dispatch operations. Dispatchers experienced a dramatic improvement in efficiency, ergonomics, and situational awareness. Gone are the days of dispatchers juggling multiple control devices. With a unified interface, dispatchers can control all systems from a single keyboard and mouse. A streamlined workflow accelerated response times and reduced errors. Video integration proved invaluable. Dispatchers can now access live video feeds and additional mission-critical systems directly within one system interface, providing them with real-time visual information as required. With a unified interface, dispatchers can control all systems from a single keyboard and mouse Additionally, support for video integration with a video wall provided opportunities for enhanced collaboration and situational awareness. Commented Williams, “The flexibility of the RGB system also allowed UCSD dispatchers to leverage video wall capabilities. They can easily share critical information and task lists with colleagues. A more collaborative environment has facilitated communication and coordination among dispatchers, ensuring that tasks are efficiently managed and prioritized during high-stress situations. We can use the RGB system to throw things up on the wall so other dispatchers can see what’s happening and interact as needed.” “In addition," said Williams, “the resilience of the RGB XtendPoint system is invaluable in maintaining operational continuity. For example, in the event of a problem at a station, technicians can work on the issue while the dispatcher moves to a backup computer or station, allowing dispatchers to continue critical work without interruption. This proactive approach to system maintainability and resilience saves time and resources and ensures that dispatch operations remain fully functional at all times.” The result The impact of XtendPoint KVM-over-IP on UCSD’s dispatch operations has been profound. UCSD witnessed significant improvements in efficiency, ergonomics, and situational awareness. Efficiency soared as dispatchers seamlessly controlled multiple systems from a single interface. Ergonomic issues were mitigated, and dispatcher morale improved, enabling dispatchers to respond more effectively to emergencies. Future plans with RGB Spectrum Williams is enthusiastic about the wraparound monitors RGB has announced Looking ahead, UCSD sees opportunities to leverage RGB Spectrum’s technology further to enhance operations. RGB system’s versatility also enables UCSD to adapt to evolving threats and emergencies. In the event of, say, a building evacuation or siege, for example, UCSD could almost immediately establish a satellite facility. Williams is enthusiastic about the wraparound monitors RGB has announced. “We are looking at RGB’s new, yet to come to market, 43-inch curved monitors that will be the finishing touch for even better ergonomics and a customized workspace.” Another potential interest is a “flyaway” kit, a transportable command-and-control system with integral radio access. This mobile system would enable UCSD to monitor special events, such as festivals, where real-time situational awareness is crucial for ensuring the safety of attendees and staff. Williams notes, “We can have a mobile command post set up near a festival or special event, take one of our dispatch systems and put it there without having to move a lot of equipment or figuring out how to get it on the network.” Implementing RGB Spectrum’s solutions UCSD also aims to extend the reach of its dispatch operations by providing in-the-field personnel with access to real-time information. By equipping mobile units with RGB’s AV-over-IP systems via smartphones, police officers could receive critical updates and better collaborate with dispatchers to respond to incidents. “If you think of the unthinkable, like a school shooting, it would be ideal to share live coverage of what’s happening, detailed building schematics, and info on weapons the assailant might be using. Who doesn’t want to know what’s potentially happening behind closed doors before walking in? It’s situational awareness on a whole new level,” commented Williams. The partnership between the UCSD Police Department and RGB Spectrum has proven successful. By implementing RGB Spectrum’s solutions, UCSD transformed its dispatch operations to achieve unprecedented levels of efficiency, ergonomics, and situational awareness. And it is just a start.
In the heart of Aalborg is a lovely and well-kept private home. Here lives a family of five who in 2016 would rent out their basement to utilize the home’s square metres. WHY – To access the basement, the tenants must go through the back door. The family and the tenants thus share the same entrance at the back of the house. Therefore, the family was looking for a solution on how they could give the tenants access to the basement without them also having access to the family’s private residence. WHAT – It was important for the family to keep the architectural style of the house. However, it was not entirely straightforward to find an access control solution where the solution only sat on one side of the door, says Michael Goth-Rindal. Together with CONLAN’s CEO, Ejner Hansen, the family found a solution where they could both preserve the old door and at the same time avoid pulling wires for electricity. Tenants keyless access The keyboard can go through many cycles before the battery needs to be replaced The CT1000 keypad is installed on the back door of the house, giving both family and tenants keyless access to the house. In addition, the C1000LP keypad is installed on the front door of the private home, where the solution is only visible from the side of the staircase. From the inside of the house, they can not see that the door is powered by a keypad. The keypad on the front door of the private residence is battery-powered, meaning the old door could remain, without the pull of wires. As the keypad is a low-power device, the keyboard can go through many cycles before the battery needs to be replaced. The family changes the battery themselves, and the keyboard tells when it’s time. Keypad’s daycode function This allows them to create a code for, e.g., the cleaning, which only works the one-day Benefits - With this solution, the family can access their home, completely without the need for keys. “We are really happy with our solution. It works and is a flexible system that we can easily handle ourselves,” says Michael Goth-Rindal. In addition, the family also uses the keypad’s daycode function. This allows them to create a code for, e.g., the cleaning, which only works the one day. With this, the family has full control over who has access to the house and when. Low power consumption CT1000 reader on the back door – A standalone reader with code. Possibility of up to 28 user codes. The keypad can also be connected to the alarm, so that the alarm is switched off at the same time as the door is unlocked. C1000LP reader on the entrance door for the private home – Reader with code and low power consumption for access control. Several options for access with codes, including one-time, day and period codes that are active from one to 28 days. In addition, the keypad can be powered by both battery or wired power.
An end-to-end IDIS video solution has overcome performance, quality, and affordability challenges that had hampered public space surveillance in Bristol city center. The upgrade, which tackled a growing list of problems including degraded picture quality, unreliable transmission and data storage, and poor usability, has been completed at Temple Quay and Glass Wharf by KIS Fire & Security. GDPR-compliant video surveillance The successful project is enabling significant operational improvements by the 24/7 security team that manages the site, according to Property Manager, Avison Young. The company reports faster responses to medical incidents and more effective prevention of petty crime and antisocial behavior, thanks to surveillance coverage without blind spots and the ease with which officers can retrieve and export GDPR-compliant video evidence to support police investigations. Temple Quay and Glass Wharf The original video system at the site was almost twenty years old and proving to be increasingly unreliable Temple Quay and Glass Wharf are part of the Bristol Temple Quarter Enterprise Zone which is home to hundreds of businesses, government offices, serviced offices and co-working spaces, bars, restaurants, and residential properties. The original video system at the site was almost twenty years old and proving to be increasingly unreliable, with underground cabling and equipment prone to flooding and cameras producing increasingly poor-quality images. Challenges faced "The problems were made worse by a cumbersome VMS operating system," says KIS Director - Rob Morgan, adding “The prospect of a complete system upgrade seemed daunting because it would need a complete replacement of the backbone infrastructure, cameras, recorders, etc. and a new VMS management system." He continues, "But we were able to satisfy Avison Young with IDIS technology, showing them a major public space system that we’d recently completed for Bristol Zoological Society.” IDIS Center VMS The new solution, managed by the cost and license-free IDIS Center VMS, includes NDAA-compliant 8MP IDIS PTZ cameras delivering superior images at up to 31x zoom; vandal-resistant 5MP IR dome cameras; 8-ch 4K recorders supporting UHD display; a specialist network operator’s keyboard; plus, mountings, POE switches, and all other network accessories. The system is easier to use and gives the security team complete area coverage, including full visibility KIS completed the upgrade ahead of schedule in under four months, with rapid installation supported by IDIS plug-and-play DirectIP® technology ensuring instant and seamless functionality of all devices. The system is also easier to use and gives the security team complete area coverage, including full visibility along – and across – a waterway that runs through the site. Instant device functionality “With IDIS, the instant full functionality of all devices means we can be more certain about completion times, even for major public space projects like Temple Quay and Glass Wharf,” says Rob Morgan. He adds, “The system also comes with extended warranties, and failover protection against loss of data in the event of network instability - for public area surveillance this kind of reliability is essential.” Award-winning solution “Following our successful partnership with the award-winning solution for Bristol Zoo, IDIS was delighted to support KIS with this major city center surveillance project,” says Jamie Barnfield, Senior Sales Director, IDIS Europe. He adds, “Both these projects show video technology at its best, helping to create welcoming public spaces where people can feel safe.”
Crystal Mountain Resort is Washington's largest winter and summer getaway. For over 60 years, the picturesque resort near Mount Rainier has drawn millions of sports enthusiasts around the world. An early adopter of new technology, the resort was also the first in Washington to install a high-speed, detachable quad chairlift, Rainier Express. Technology solution needed As the resort's Director of IT, Perry Turner is in charge of protecting over 400,000 guests and 2,600 acres of land all year long. The resort is open for skiing and snowboarding from November to April, and summer activities with scenic gondola rides from May to September. This meant that any technology solution had to withstand snow and low temperatures during the winter and high humidity levels during the warmer months. "The elevation tops out at a little over 7,000 feet, so the weather conditions can get extreme. The technology we use needs to be able to withstand everything from snowstorms to 100 MPH winds." The challenges Low-quality legacy cameras and limited connectivity led to gaps in coverage with lens fogging and weather-sealing issues "The combination of moisture and cold temperatures was wrecking our older cameras, which couldn't survive the harsh conditions.” Remote areas with limited infrastructure are difficult to wire and get power to. Low-quality legacy cameras and limited connectivity led to gaps in coverage, while lens fogging and weather-sealing issues led to malfunctioning cameras and poor visibility. Loss of time in retrieving images If footage was available, retrieving and sharing even a minute from two different network video recorder (NVR) systems was an excruciating process. "If I had to pull 10 minutes of footage, it would take three to four hours to get the right clip and to download it. It would crash all the time, and I'd have to start the process all over again." Why Verkada? "The interface is excellent, the app is easy to use and the cameras are rock solid. The hybrid cloud infrastructure also helps with reliability. I don't need an on-premise device to handle all the recording since the camera does that. It's a lot less to maintain from my end." Seamless operation From a single pane of glass, Perry simplifies management and ensures the seamless operation of the resort. He was an early adopter and beta tester for the Verkada Cellular Gateway, a new product that allows him to deploy cameras in any location. With more coverage and connectivity solutions, he leaves no room for oversight – no matter how minute the detail is. "We have Verkada coverage in remote areas with access to power but no internet. Across our 2,600 acres, the possibilities are endless: up on the mountains, out in parking lots, over shuttle stops, and even gondola stations." The results Cellular deployments in remote and hard-to-wire areas Cameras built to handle 100 MPH winds and -40°F Livestream ski conditions in high-image resolution A platform that saves time and reduces work Risk and liability prevention 1. Cellular deployments in remote and hard-to-wire areas Until recently, Perry's camera deployments were limited to places where he could run ethernet cable. While cellular data was available, it would require him to piece together different components - an LTE router, a PoE switch, a NEMA enclosure, and a data plan - all sourced from disparate vendors. His GC31 Cellular Gateway combines all the above into a single device that provides both power and data to any Verkada device. The result is a simple, seamless operating experience with minimal setup needed. LTE coverage “It took only a few minutes to install the cellular gateway and connect it to our PTZ, which monitors our moving snow stake." "The snow stake has to be in a remote corner so it’s not wind-affected, but we can now use the cellular gateway to take advantage of LTE coverage in the area.” 24/7 technical support Perry has Verkada’s unlimited data plan on the cellular gateway, which comes with the 24/7 technical support he’s used to from Verkada. The cellular gateway bridges gaps in coverage and opens a new world of use cases for Perry, "The GC31 allows us to install cameras along the road coming into the resort and at our parking lots. On busy weekends, we can easily monitor traffic and parking lot capacity.” 2. Cameras built to handle 100 MPH winds and -40°F The lack of issues with their hardware surprised Perry and his team. All the Verkada cameras onsite are enterprise-graded and are IP67 and IK10-rated. Additionally, they come with an integrated temperature gauge and built-in heaters that automatically turn on once the temperature hits -20°C (-4°F). Verkada outdoor cameras are fully functional at sub-zero and high heat temperatures and can withstand temperatures ranging from -40°C to 50°C (-40°F to 122°F). 10-year warranty Backed with an industry-pioneering 10-year warranty, Perry can install cameras anywhere at the resort – from the retail shops to the top of Mt. Rainier – and not have to touch them again. "We mounted a camera on top of a building that gets hit by 100 MPH winds and beyond freezing conditions, and it's had zero problems. We just set it and forget it." 3. Livestream ski conditions in high-image resolution Low-quality images and footage are no longer an issue with Verkada. The cameras come with advanced image sensor technology, which allows them to produce crystal-clear footage. Even in low-light conditions, like the resort's "Night Skiing" events, the built-in infrared LEDs make capturing footage in darker environments possible. Live video feeds No matter the conditions or location, Perry and his team have a clear view of the people and property at the resort No matter the conditions or location, Perry and his team have a clear view of the people and property at the resort. The Marketing department shares current skiing and snowboarding conditions on the website, and they have multiple cameras placed throughout the resort that share live video feeds. "Our website has live video feeds of the slopes, and as soon as we switched to our first Verkada camera, the jump in image quality was evident. The guests love it. The Marketing team now wants to add more for the public-facing side of things." 4. A platform that saves time and reduces work Verkada cameras come with built-in video storage capabilities of up to 365 days, removing the need for on-premise servers and all the associated work and time required to maintain them. Plug-and-play cameras are pre-configured and fully operational within minutes. When it comes to pulling footage, the process is night and day. Footage on Command Before, there were a lot of requests for footage pulls from the Security and Lift Operations teams. These teams can securely access footage themselves on Command through their mobile phones, eliminating most of these requests. If Perry does have to pull and share a snippet of footage, it takes a fraction of the time it did beforehand. With Verkada, that process is straightforward and seamless. "Pulling and sharing video footage now takes minutes, not hours. And when other teams need to pull footage, they can access it directly from their phones. This has removed multiple steps in our workflow and saves everyone a ton of time." 5. Risk and liability prevention Placing Verkada cameras at vulnerable and high-risk areas at the resorts (including retail shops and chairlifts) has helped thwart thefts of thousands of dollars worth of ski equipment and dispute false claims. If an incident arises, Perry can corroborate the witness accounts with easily accessible footage to see how the facts line up. Within Command, Perry can choose the camera he wants to view the history of, jump to a specific date and time, and review other data and analytics. Once he finds what he's looking for, he can share the footage with anyone through text, email, or a link. Guest safety Safety issues can arise if someone falls in the chairlift area so additional visibility is crucial Guest safety is another key priority for the resort, especially on the slopes. The cameras positioned at and near the chairlifts help monitor that guests are seated correctly. Safety issues can arise if someone falls in the chairlift area so additional visibility is crucial to protect both the guests and the resort. "Verkada provides peace of mind and liability protection. We can quickly verify what happened with a past incident and address any security or safety issue as it's happening. If someone is in trouble at the chairlifts or on the slopes, we can respond immediately." Looking Ahead Crystal Mountain Resort's success in deploying Verkada cameras has led to rave reviews from various internal teams. They are exploring how they can leverage the platform to improve the customer experience at the resort. "We recently learned about the Occupancy Trends feature, and there are so many potential applications. Foot traffic is just one thing that we want to keep track of in our rental shops and restaurants." Lower cost of ownership Most critically, leadership loved the enthusiasm surrounding the platform and has performed further financial analysis. What they found were more possible benefits, including a lower cost of ownership. "The more teams interact with the platform, the more buy-in we've received from leadership. They realized that Verkada is more cost-effective in the long run.”
San Luis Obispo (SLO), the gem of California's central coast, is renowned for its picturesque vineyards, historic architecture, and vibrant community life. Quiet but lively, it is also home to the California Polytechnic State University, located halfway between San Francisco and Los Angeles. Ensuring safety and security Because of its distance from major metropolitan areas, SLO has retained its rural, small-town character, along with a bustling downtown and beautifully preserved Spanish Mission. The San Luis Obispo Police Department (SLOPD) is focused on ensuring safety and security across expansive terrains, reducing crime, and enhancing the quality of life while upholding the principles of service and integrity. The challenge The secluded Reservoir Canyon is just one area that has been a hotspot for vehicle break-ins For San Luis Obispo, two priorities were crime prevention and the protection of sprawling outdoor spaces popular for hiking and biking. Hidden from public view, the secluded Reservoir Canyon is just one area that has been a hotspot for vehicle break-ins. However, its remote nature made installing a traditional security system nearly impossible. The initial cost to secure three city parking structures was also cost-prohibitive, with quotes of over $1 million for network connectivity alone. Need for a robust and reliable solution "We've dealt with products that were essentially consumer-grade equipment repackaged as professional security solutions,” said Chad Pfarr, Administrative Lieutenant. "We needed a more robust and reliable solution. Creating our own was time-consuming and beyond our expertise, highlighting the need for a specialized, cost-effective solution.” Why Verkada A system that could operate in remote locations, areas typically beyond the reach of standard CCTV “We were drawn to the hardware and software quality. But what truly set Verkada apart was the willingness to innovate in ways that traditional security solutions did not. We can now bring Verkada devices into the wild, in the middle of nowhere, without traditional city network infrastructure." A system that could operate in remote locations, areas typically beyond the reach of standard CCTV technology was a leap forward for community safety. Use cases include: Protecting remote locations with the GC31 Cellular Gateway. Licence Plate Recognition (LPR) monitoring to streamline vehicle investigations. Protecting evidence in cold storage with Air Quality Sensors. Improving check-in and registrant compliance with Workplace solutions. "Verkada's willingness to venture into uncharted territory with us to ensure security systems could be deployed where they were most needed, regardless of existing connectivity, was what got us so excited. Beyond just adapting to what’s available, it’s continuously improving to meet our needs." Protecting remote locations with the cellular gateway In San Luis Obispo, the GC31 Cellular Gateway bridges the gap between the need for remote security and limited infrastructure. The police department protects areas previously deemed inaccessible without the high costs of traditional network installations, leading to savings of over $1 million for connectivity alone. Bridging the connectivity gap "Before Verkada, the idea of installing a security system in remote locations was a logistical nightmare. The cost of establishing connectivity alone was prohibitive, not to mention the technical hurdles of operating without power or a network." "But with the Cellular Gateway, we've been able to overcome these barriers, bringing security and peace of mind to once vulnerable areas." License Plate Recognition (LPR) capabilities SLOPD can install Verkada products in locations that are hard to wire or lack connectivity SLOPD can install Verkada products in locations that are hard to wire or lack connectivity, such as parking lots, construction sites, trailheads, and natural terrain. Within the city, the GC31 also protects busy intersections by supporting cameras with License Plate Recognition (LPR) capabilities. streamline vehicle investigations Paired with the cellular gateway, CB62 outdoor bullet cameras are deployed on streetlight poles to monitor moving traffic, covering up to three lanes with a single camera. Using Verkada’s edge-based processing and computer vision technology, the LPR solution captures licence plates at speeds of up to 80 mph (128 kph). Flexibility and versatility The cameras' versatility in both covert and overt operations allows SLOPD to adapt its security tactics The cameras' versatility in both covert and overt operations allows SLOPD to adapt its security tactics to each location. This includes monitoring busy intersections, remote trailheads, or railroad crossings. This flexibility is crucial in a community that values its open spaces and balances accessibility with safety. "We've not only deterred potential criminal activities but also enhanced the overall safety for residents and visitors alike. The ability to monitor these areas remotely has been a game-changer, allowing us to extend our reach without stretching our resources too thin." Protecting evidence in cold storage with air quality sensors The introduction of Verkada's air quality sensors into the SLPD’s evidence management protocol has marked a significant improvement in securing critical evidence that requires refrigeration. “Sensors protect the evidence entrusted to us." "They monitor the conditions within our cold storage facilities in real-time, ensuring that any deviation from the norm is immediately flagged. This allows us to act swiftly to address any issues before they impact the evidence.” Sensors mitigate the risk of loss and help maintain the overall integrity of the evidence, which is crucial for the judicial process. Ensuring that evidence is stored under optimal conditions preserves its validity and reliability, which can be decisive in court cases. Guest and Workplace Solutions Verkada Guest supports security and compliance as well as administrative processes At the police department, Verkada Guest supports security and compliance as well as administrative processes and community interactions. "We're not just looking at improving how we manage security systems; we're also opening up opportunities to better serve our community in every interaction they have with us. This is about making our department more accessible, efficient, and responsive to the needs of San Luis Obispo.” Automated notification "Registrants can sign in digitally, similar to the check-in process at a doctor's office. This system automatically notifies the assigned detective, who can then prepare before meeting the registrant." "It's a welcome shift from our current, more manual process, and we're excited about the potential to make our operations more efficient while improving the experience for everyone involved.” Digitisation of visitor check-in The registration of certain types of visitors is a legal requirement that, until now, has placed a burden The registration of certain types of visitors is a legal requirement that, until now, has placed a burden on the department's space and resources. By digitising the initial check-in and form completion process, the department can handle sensitive registrations with greater discretion and efficiency. "We can integrate specific forms and requirements into the Guest system." Minimizing congestion "This customization ensures that we can maintain legal compliance while respecting the needs of our community and the constraints we operate under." "Guest reduces wait times, frees up essential space in the lobby, and minimizes the congestion that can occur during peak registration periods.” Solar and Battery SLOPD is also exploring alternate power options to enable more deployments across San Luis Obispo, further ensuring the safety and security of their community. "Our partnership with Verkada has already improved our operations. The next step involves incorporating solar and battery backup systems for our cameras and bridge devices. This will not only expand our public safety reach but also ensure that our security measures are sustainable and resilient against power outages."
The Winston-Salem Police Department (WSPD), internationally accredited by the Commission on Accreditation for Law Enforcement Agencies (CALEA), is dedicated to proactive, data-driven approaches to law enforcement. Through initiatives like "Smart Policing," a collaboration with the local community and Winston-Salem State University, the department aims for systemic change in crime reduction and community safety. Real-time intelligence Lieutenant Ben Jones oversees the Real Time Crime Center (RTCC) housed in the Criminal Intelligence Bureau, a crucial nerve in the department’s operations. Under his stewardship, the team assists officers in protecting over 253,020 people across 133.7 square miles. “A more informed officer makes better decisions. We provide as much real-time intelligence as possible to detect, deter, and solve crime.” The challenge Get Connected Winston-Salem campaign integrates community-owned cameras into the police's video security Facing violent crime and an annual increase in homicides, the WSPD emphasizes rapid responses underpinned by precise and accurate data. A particularly innovative step is the "Get Connected Winston-Salem" campaign, which integrates community-owned cameras into the police's video security system through Fūsus. This not only broadens the scope of crime monitoring but also exemplifies the department's commitment to collaborative crime-fighting. However, finding suspects’ vehicles was a logistical nightmare and still relied heavily on witness accounts. “We began looking at LPR solutions to assist in shootings, homicides, and cases involving vehicles.” Intelligence gathering with LPR and Multisensor To elevate its crime-solving capability, the city has strategically placed Verkada License Plate Recognition (LPR) and Multisensor cameras at traffic light intersections. “Our goal is to improve the solvability and speed of investigations by being able to identify suspects' vehicles across different intersections. We tie LPR with the Multisensor, which gives a four-way view across the intersection. No other solutions we evaluated offer this capability.” The nature of the incident When an incident is reported, the initial call is directed to the Patrol Divisions, and first responders are dispatched accordingly In partnership with the Winston-Salem Department of Technology (DoT), Jones plugs Multisensor cameras directly into the city system where there's Fiber and power. When an incident is reported, the initial call is directed to the Patrol Divisions, and first responders are dispatched accordingly. The nature of the incident determines its next course: for instance, serious shooting incidents are relayed to the Violent Firearms Investigative Team, while homicides are dealt with by the Criminal Investigation Division. Real-time Verkada Analytics “Before, we relied on witness information. Now, with Verkada and Fūsus, finding what we need can take just minutes instead of days.” The Verkada software, in conjunction with Fūsus, enhances the accuracy and speed of investigations, particularly in locating vehicles associated with a crime and finding missing people. People and Vehicle Analytics allow for the swift identification of both suspects and missing people throughout the city. Finding missing people - Detailing a success story, Lt. Jones recounts, “We found a missing person on a Verkada camera, and used People Analytics to find her at different times. We were able to confirm that she was alive at particular times, which gave investigators a starting point.” Coupled with ShotSpotter, a gunfire detection system, the team swiftly locates suspects using real-time analytics Finding suspects by vehicle - Coupled with ShotSpotter, a gunfire detection system, the team swiftly locates suspects using real-time analytics. “As soon as there is a shooting, the team uses Verkada to quickly locate suspects’ vehicles based on their description and color." "A high percentage of violent crimes involve suspects who arrive, leave, or commit the crime from a vehicle. Verkada helps us identify where they’ve been, where they are, and where they’re headed.” Alerting with video context - Verkada goes a step beyond the image of a vehicle tag, providing a video of the car, its tag, and other vital details. “In the past, we might’ve stopped every red car. With Verkada, we have higher accuracy and less chance of mistaken identity." "I've been in the LPR market for a while and found that most solutions only give you a picture of the tag and vehicle. Verkada associates a video with each tag, so we have additional context easily available for intelligence gathering.” What's next Entering phase two, the goal is to place Multisensors closer together and increase the Verkada security These use cases with Verkada are just the beginning. Lt. Jones envisions a future where the department can seamlessly locate vehicles from one intersection to another, making suspect identification efficient and precise. Entering phase two, the goal is to place Multisensors closer together and increase the Verkada security coverage across the city. Real-time problem solving "The LPRs and Multisensor fit into our overlapping technology strategy, and we plan to increase the density of our deployment. If we’re pursuing an active shooter for example, having the cameras near our shotspotter areas allows us to use both technologies in conjunction with one another to locate the shooter.” Furthermore, by showcasing the efficacy of Verkada to other police departments, Winston-Salem aims to set a benchmark in crime-solving on the East Coast. Lt. Jones adds, “My goal is real-time problem solving; witnessing events as they unfold, not after. With Verkada, we’re turning that goal into reality.”
Round table discussion
Every day, the physical security industry succeeds in applying technologies that make the world a safer place. Manufacturers, integrators, and end users are eager to share their success stories, and their successes can inspire others to implement the same technology solutions. But, occasionally, technology does not live up to expectations and, in fact, fails to perform as promised. We asked this week’s Expert Panel Roundtable: How has the physical security industry failed to meet customer needs?
For many years, security systems produced their share of "data exhaust." Every access control action and each video image became a data point to be stored in perpetuity, with no practical way to use the data. More recently, systems have been developed to enable organizations to analyze data from sensors and other connected devices to gain valuable insights into how their systems are being used, to identify potential vulnerabilities; and even to provide insights into broader enterprise operations. We asked this week’s Expert Panel Roundtable: How are data analytics changing the course of the security marketplace?
In the United States, they are called license plate recognition (LPR) systems. In Europe, the more common term is automated license number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle color, type, make, and model. We asked this week’s Expert Panel Roundtable: What's new with license plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?
Products
White papers
Video Technology: Making Cities Safer & Improving Lives
DownloadIntegrated Access Control: Reap The Benefits Of Connected Security
DownloadSecuring Unmanned Infrastructure at the Network Edge
DownloadConnected Video Technology for Safe Cities
Download10 Top Insights In Access, Cloud And More
DownloadProtecting Dormitory Residents and Assets
Download11 Reasons Video Surveillance Is Moving To The Cloud
DownloadHow To Migrate To An IP-based Access Control System
DownloadThe Inevitability of The Cloud
DownloadMaking Sense of Today’s Security Camera Options
DownloadSmart Security Cameras: Excellence in Retail
DownloadAccess Control & Intelligent Vehicle Screening
DownloadHow To Get Buy-In From IT Departments On IP Video Installations
DownloadHikvision DarkFighter Technology For High-quality Images At Night
DownloadEnhanced Ethernet Technology (ePoE)
DownloadVideos
Network cameras: Manufacturers & Suppliers
- Hikvision Network cameras
- Dahua Technology Network cameras
- Axis Communications Network cameras
- exacqVision Network cameras
- Bosch Network cameras
- Honeywell Security Network cameras
- VIVOTEK Network cameras
- Hanwha Vision Network cameras
- AV Costar Network cameras
- LILIN Network cameras
- Messoa Network cameras
- Panasonic Network cameras
- Sony Network cameras
- Vicon Network cameras
- eneo Network cameras
- Pelco Network cameras
- FLIR Systems Network cameras
- Surveon Network cameras
- Avigilon Network cameras
- IDIS Network cameras
Multi-Residential Access Management And Security
DownloadGuide For HAAS: New Choice Of SMB Security System
DownloadPrecision And Intelligence: LiDAR's Role In Modern Security Ecosystems
DownloadHikvision: Solar Powered Product Introduction + HCP
DownloadBank Security
Download