Office security systems
Hanwha Vision, a pioneer in security and surveillance solutions, introduces the Audio Beacon, SPS-A100M, an advanced AI-powered audio surveillance solution that ensures users can be alerted and respond rapidly to critical situations. Equipped with a powerful 90dB speaker, five integrated microphones, and intelligent sound classification, the Audio Beacon is engineered to enhance situational awareness and real-time communication. Decision-making and direct communication LED ring provides a vi...
Evolution, the pioneering employee-owned electronic security and life safety systems integrator, has opened a new office in Leeds, to better serve and support the needs of its clients across the north of England. The new office, located in Priestley House, Elland Road – with quick and easy access to the M62 corridor, will be home to a new account management, service and support base to enable the business to meet and exceed ever-changing client needs with its innovative and technical inte...
Against the backdrop of Vietnam’s expanding security, fire safety, and smart building sectors, Secutech Vietnam will return to the Saigon Exhibition and Convention Center (SECC) in Ho Chi Minh City from 14 – 16 August 2025. The 18th edition will span 13,000 sqm, hosting 480 exhibiting brands, presenting the latest solutions driving safer cities and smarter infrastructure. Held with concurrent events Fire & Safety Vietnam and SMABuilding, Secutech Vietnam will spotlight technolo...
Vismo has optimized its mass notification offering to strengthen customers’ employee wellbeing anywhere in the world during an emergency or emerging threat, by including it on the Vismo Monitor App. For the first time, employers can now see their employees' real-time locations on the app instead of a desktop computer, and immediately send mass notifications to staff affected by, or under potential threat from, a crisis, via the app. “Having all the functionality of our mass notifi...
DNAKE, a pioneer in IP video intercom and smart home solutions, has unveiled its latest S414 4.3-inch Facial Recognition Android 10 Door Station, designed to deliver cutting-edge access control with seamless integration and superior performance. This new product reinforces DNAKE’s commitment to providing high-tech, user-friendly smart intercom system for residential and commercial applications. Key Features of the DNAKE S414 Facial Recognition Door Station 1. Advanced Facial Recogn...
When it comes to safeguarding the home or business, the choice between wireless and wired intruder alarms is crucial. Each system has its own strengths and weaknesses, and understanding the differences can help users make an informed decision. This guide breaks down the key aspects of wireless and wired security systems to help users find the perfect fit for user’s needs. Wireless and wired intruder alarm systems differ primarily in how they communicate and operate. While wireless systems...
News
Wavelynx Technologies, a trailblazer in advanced, secure, and versatile reader and credential solutions, showcases its Wallet solution at the Global Security Exchange (GSX) trade show in Orlando, FL, September 23-25, 2024. Wavelynx Wallet transforms mobile devices into secure credentials, bringing access control into the mainstream and paving the way for future credential management. The system enhances security across various facilities and introduces a new level of convenience, reflecting society’s shift toward wallet and mobile-based solutions for all aspects of daily life. Rapid consumer adoption In 2021, over 7.1 billion people used mobile devices; in 2022, 3.4 billion users (42%) utilized digital wallets. This trend projects to continue, with digital wallet users expected to reach 5.3 billion by 2026, highlighting the global shift towards a mobile-first culture. This trend projects to continue, with digital wallet users expected to reach 5.3 billion by 2026 This rapid consumer adoption, driven by the security, convenience, and improved usability of digital wallets in everyday transactions, underscores the need for universal and pervasive wallet solutions in the access control industry. “Mobile wallets have become mainstream, allowing users to pay for lunch, present concert tickets, and navigate airport security, yet the access control industry has been slow to adapt,” said Rob Lydic, President of Wavelynx Technologies. Simplifying credential management “By leveraging mobile wallet technology, we’re not just catching up, we’re leaping ahead. Our wallet solution significantly bolsters security by verifying individuals’ identities and instilling confidence while simplifying credential management and scalability. Our recently launched Configure by Wavelynx app provides cutting-edge encryption and real-time management features, making the transition to wallet-based access control seamless for installers and end users.” Wavelynx Wallet has been deployed with end users across four continents—North America, India, the UK, and Australia— at some of the world’s largest financial and technology institutions. Mobile wallet platforms Key features of Wallet includes: Seamless Integration: Wallet enables access to doors, elevators, parking garages, lockers, printers, and more, through major mobile wallet platforms. It is fully compatible with Wavelynx Ethos™ readers, ensuring a cohesive and user-friendly experience. Additionally, Configure by Wavelynx facilitates effortless setup and management of digital wallets in the field, eliminating the need for physical configuration cards. Enhanced Security: Wallet offers robust security features, including the ability to instantly deactivate credentials if a mobile device is lost or stolen. This capability significantly reduces the risks associated with lost or compromised physical access badges, ensuring continuous facility security. Convenience and Simplicity: Wallet streamlines operations by removing the need for card printing and physical distribution. Credential management and issuance can be handled remotely by simply providing a link to download their credential, enhancing efficiency for both employees and visitors. Scalability: Designed with flexibility in mind, Wallet supports a variety of physical reader manufacturers, integrating seamlessly with existing security systems and adapting to a range of facility needs. Operational efficiency and security Wavelynx successfully deployed digital wallets for NFC access at Stream Realty Partners' RiverSouth in Austin, Texas. This implementation enabled employees and tenants to access the building and amenities securely and conveniently using their company badges in their respective digital wallets. Integrated via SwiftConnect’s AccessCloud platform and supported by credential readers from rf IDEAS, Wavelynx’s advanced readers, and Vecos smart lockers, the solution significantly improved both operational efficiency and security across the facility. The Wavelynx Wallet Solution is poised to set new benchmarks in access control with its focus on security, convenience, and scalability. Discover the future of secure access and meet with Wavelynx at GSX 2024.
RISCO, a globally recognized pioneer in cloud-based security solutions, announces the launch of its latest innovation, the LightSYS Air wireless solution. This state-of-the-art system represents a significant leap forward in wireless security technology for professionals within the industry. LightSYS Air Building upon the success of the widely-praised LightSYS+ hybrid solution, LightSYS Air heeds the call for an enhanced security installer experience akin to its predecessor. By addressing industry feedback, RISCO has engineered a solution that not only simplifies installation procedures but also enhances the operational effectiveness of wireless security systems. Innovative features and advanced technology App-based Configuration Tool: The LightSYS Air wireless system is designed to reduce installation time, utilizing the ‘HandyApp Configurator’ smartphone app tool. This has been developed to significantly reduce many of the complexities of setup, providing a simpler, faster, and installer-friendly experience. Enhanced RF: The RF has seen substantial enhancement, ensuring optimal performance of the wireless technology in the system, even in the most challenging environments. It has been engineered for robustness and high reliability. New Colour Options: With an eye for modern aesthetics, LightSYS Air is available in stylish white and black color selections across its panel and accessory suite. Onboard IP and Wi-Fi It introduces an impressive array of features and pricing set to disrupt the current market standard LightSYS Air is a Grade 2 solution, catering to the security demands of residential and small business sectors and is available in a range of kits and bundles. The innovative offering also boasts onboard IP and Wi-Fi, along with options for GSM connectivity and support for up to 128 zones. It introduces an impressive array of features and pricing set to disrupt the current market standard, ensuring that RISCO remains at the forefront of security technology developments. Insights Dave Strawson, Head of Sales at RISCO UK, highlights the significance of LightSYS Air's introduction, stating, "With the launch of LightSYS Air, RISCO has set a new standard in professional wireless security. Our dedication to innovation is evident in every feature of this system." "We offer an unparalleled blend of convenience, performance, aesthetics, and technological advancements."
RecFaces, in collaboration with Startologic, successfully hosted its three-city ‘Project Day’ event, held in Delhi on September 12, Bengaluru on September 5, and Mumbai on August 29. The event provided an in-depth exploration of cutting-edge facial recognition technologies, highlighting how these solutions can revolutionize security systems across industries. Project Day events The Project Day events brought together system integrators, technology partners, and industry professionals, all eager to explore the latest advancements in facial recognition technology. Attendees were enthusiastic about the potential of these solutions to transform security frameworks across various sectors, including critical infrastructure, finance, transportation, and enterprise operations. Id-Guard and Id-Gate Facial recognition technology can enhance security operations, minimize risks RecFaces experts, Oleg Kurochkin, Business Development Director for Asia-Pacific, and Mohammed Bajarsh, VP of Product for the MENA region, led detailed discussions on the company’s flagship products, such as Id-Guard and Id-Gate. Their presentations showcased the real-time capabilities of these solutions, emphasizing how facial recognition technology can significantly enhance security operations, minimize risks, and streamline project workflows. Customized project solutions Shashi Kumar Yadav, CEO of Startologic spoke about the overall potential of this technology, highlighting its transformative impact on security systems and project management. The event underscored the importance of creating customized project solutions tailored to the unique needs of end users. By integrating facial recognition technology into existing systems, businesses can streamline security processes, reduce human error, and substantially improve project outcomes. Operational efficiency Attendees participated in hands-on demonstrations of RecFaces’ facial recognition solutions, with Id-Guard and Id-Gate impressing them through their precision, speed, and flexibility. Participants explored how these technologies could enhance their security operations by improving efficiency, reducing risks, and offering tailored solutions to meet specific requirements. "With RecFaces Facial Recognition Solutions, we're providing businesses with the tools they need to enhance operational efficiency and minimize risks while delivering customized solutions that address their unique challenges," said Sukrit Varma, Global Marketing Partner, RecFaces.
Nice, a global pioneer in Home and Building Management solutions, is excited to announce the appointment of Joe Mac McConnell as Vice President of Security Sales. With extensive leadership and expertise in the security industry, McConnell is well-positioned to drive acceleration for the Nice security business unit in North America. McConnell's new responsibilities In this role, McConnell will focus on the expansion of the Nice security solutions portfolio and the 2GIG brand, which recently announced the launch of E+ Extended Range Sensors, delivering cutting-edge solutions tailored to the unique needs of both residential and commercial markets. His extensive experience in security positions him as a strategic pioneer who will elevate Nice's offerings and further solidify the company’s commitment to smart and integrated security solutions. Forward-thinking approach “We are thrilled to have Joe Mac join the Nice North America team,” said Julio Ferreira, Chief Sales Officer at Nice North America. “His leadership and forward-thinking approach align perfectly with our vision and bring a unique perspective on the needs of our dealers, integrators, and end users. Joe’s deep understanding of the market and his commitment to innovation will play a key role in driving our next phase of growth.” Work experience McConnell’s focus will be on enhancing the market presence of Nice and 2GIG and pioneering strategies McConnell’s focus will be on enhancing the market presence of Nice and 2GIG, pioneering strategies that meet the evolving demands of partners and customers. He brings a proven track record of leadership and revenue growth, having previously served at ADT Security Systems, where he led both the Residential and Commercial Sales Divisions across North America, and launched Cox Communications security solutions into a multi-million-dollar revenue division. Most recently, McConnell served as Chief Sales Officer at Osprey Fire & Life Safety in Carlsbad, CA. Customer experience “Nice has a remarkable global legacy of pioneering smart and integrated solutions,” said Joe Mac, Vice President of Security Sales at Nice North America. “I'm thrilled to join the team and contribute to its ongoing vision of cutting-edge technologies for our customers. With both sides having decades dedicated to advancements in the security industry, I am confident we will rapidly expand our footprint and deliver unparalleled customer experiences.” Smart home and security McConnell’s appointment underscores the commitment from Nice to push boundaries in the smart home and security sectors, ensuring the company continues to deliver world-class solutions that are both innovative and reliable.
A few decades ago, people lived with minimum security. Only a few facilities hired physical security, but most buildings relied on locks and vigilance. Currently, some companies are integrating modernized video security with other building systems. For example, the video integrated with access control allows security to visually verify individuals entering secured areas. Video Security Video security has evolved over the last few years from single-application technology to solutions that use the cloud and even artificial intelligence (AI) to meet business challenges. By leveraging integrated building security systems, facility managers can create a unified platform for managing security, access control, and more, ultimately pioneering to a safer and smarter environment for staff. How are security systems integrated? Security system integration is the process of combining different security technologies and building systems into a unified and interconnected network. When users integrate these systems, they’re able to communicate with each other, share data, and operate cohesively to enhance the overall security measures within a building or facility. Here’s how integrated security systems typically work: These systems can share data in real time, allowing for a more comprehensive view of security incidents and events. Facilities have centralized control and monitoring, which simplifies operations and improves response times. Integration enables the automation of certain security processes and generates alerts based on predefined rules. Integrated systems can provide deeper insights through data analytics and enable better decision-making. These systems are often scalable, allowing for potential expansion or modification as the security needs evolve. To install or integrate new security systems, users need to meet a few requirements: Internet Protocol (IP): the security devices need to be able to connect to the Internet. Open-source software: Although not the case for all systems, most brands operating on open-source software can be integrated. Single camera system: Users need IP cameras that are compliant with the Open Network Video Interface Forum (ONVIF) so they can connect and work together from one integrated system. Hardwired system: For the most reliable security, ensure the system is hardwired with low-voltage cabling. Network infrastructure: Have a robust network infrastructure in place to support the IP cameras and ensure they can communicate effectively with the open-source software. Software security: Protect the IP cameras, network, and open-source software from potential cyber threats by updating firmware and software regularly. Key integrated building systems Both closed-circuit television (CCTV) and IP security camera systems can be combined with other security systems to provide a comprehensive security solution, depending on whether upgrades are needed. If users are considering integrated CCTV security upgrades, assess the current security measures and identify potential challenges that the user would like to address. Some examples of key systems to add to the building include: Fire and life safety: Video surveillance systems help detect fire or safety incidents. With integrated systems integrated fire alarm systems can trigger specific responses. For example, in the event of a fire, safety doors can unlock for prompt and safe evacuation procedures. Intrusion detection: When all security measurements are combined, including burglar alarm systems, users are left with a more proactive system. If an alarm is triggered, the necessary authorities can be alerted while surveillance cameras provide real-time visual confirmation of the area. Access control: An access control and video security integration provides comprehensive security, especially where individuals often access secured areas. With an integrated alarm system, cameras can focus on the location if an unauthorized access attempt is made. Additionally, integrating access control with smart locks and intercom systems will allow users to manage and track visitor access with seamless communication from any location. Building automation: Use video feeds to provide floor access permissions through elevators or increase visibility with strategically designed lighting. Users can also activate certain appliances when needed to reduce unauthorized use and lower potential security vulnerabilities. Benefits of integrating video surveillance with building systems Integrating video surveillance with current building systems offers several benefits: Enhanced security: By integrating video surveillance with access control, intrusion detection, and alarm systems, users can create a comprehensive security network that provides real-time monitoring and alerts. These integrations improve the security measures overall. Improved response times: Integrated systems enable quicker response times to security incidents by allowing immediate visual verification of events and reducing false alarms. This also helps security personnel to react promptly to any threats or safety concerns. Operational efficiency: Having a centralized monitoring and control system with video surveillance alongside other building systems streamlines operations. It enhances efficiency and reduces the need for manual oversight. Cost savings: Integration can lead to cost savings in terms of reduced manpower required for monitoring, improved incident management, and potentially lower insurance premiums due to better security measures. Data insights: Integrating video surveillance with building systems allows for data correlation and analysis, providing valuable insights for optimizing building operations and security protocols. Flexibility: Many integrated systems are scalable, allowing for easy expansion of modification as security needs evolve or building requirements change. Technology and integration solutions Security system integrations mainly work via the Internet, which means video data is exchanged between different systems. Instead of managing separate databases, users only need one management platform. This is possible with multiple integration solutions: Cloud-based integration: Cloud video storage integration provides flexible software options to store, safeguard, and access video surveillance footage on the cloud. It reduces infrastructure and maintenance costs and videos can be accessed remotely with an Internet connection. Unified security platform: A centralized platform integrates various building systems, such as video surveillance, access control, and alarms, giving users a comprehensive view of building operations on a single interface. POS and inventory management integration: Integrating video security with point-of-sale (POS) systems helps with inventory management in retail environments. Through video analytics and transaction data, users can improve customer service while enhancing inventory control. Virtualized infrastructure: Virtualising the hardware protects the system from data loss and lowers storage costs while enhancing system performance and optimizing resource allocation. This infrastructure offers a scalable option for building managers who want to make the most of their system resources. AI appliances: Incorporating AI-powered video appliances for video analytics enables automated monitoring, intelligent alerts, and advanced security features. With improved threat detection, proactive security measures, and increased operational efficiency, this intelligent automation solution can enhance security response times. Use BCD’s solutions in the next integration project Technology has changed the potential of security measures for company buildings and facilities. With the possibility of integrating different building systems with video security, users can improve a structure’s operational efficiency and overall security. Whether users manage a small building with four cameras or a large facility with thousands, BCD’s products can enhance any security infrastructure. Its configured hardware and software solutions can be deployed into security integration projects and customized to the needs.
An air of excitement circled the Gallagher Security booth at the recent TSE event in Birmingham, as the award-winning, global security manufacturer demonstrated the latest innovations in their security ecosystem. The annual event, held from 30 April – 2 May which attracted more than 14,000 visitors to Birmingham’s NEC, brought together manufacturers, distributors, installers, consultants, and end users, and displayed the latest products, technologies, and solutions from the world’s security brands. Controller 7000 Single Door Gallagher showcased their Controller 7000 (C7000) released on November 2023 and the Controller 7000 Single Door, as well as their high-security solutions, but the demonstration that got visitors talking was the recently released employee badge in Apple Wallet, available with Gallagher’s latest version of their award-winning site management software, Command Center v9.10. Gallagher Security Regional General Manager UK and Europe, Richard Huison says, “TSE was an excellent opportunity to showcase our evolving Gallagher Security ecosystem including the recently released employee badge in Apple Wallet." Safeguarding people, places, and assets "We also observed a growing interest in our Automatic Access Control Systems (AACS), and Cyber Assurance of Physical Security Systems (CAPSS) approved high-security solutions." "There was a growing consciousness among businesses about the importance of safeguarding their people, places, and assets to the highest standard.” Access control in critical infrastructure TSE proved to be a networking opportunity with channel partners, end users, and other professionals Richard joined a panel hosted by security influencer Lee Odess, where they discussed access control within the critical infrastructure sector. Gallagher Security Sales Manager UK South, Gordon Swallow also joined the ASIS International UK panel, to discuss the true value of a security system in the procurement journey. Among the solution demonstrations and panel discussions, TSE proved to be another excellent networking opportunity with channel partners, end users, and other security industry professionals using the event as a platform to share insights and connect. End-to-end solutions “These events are always valuable in terms of understanding the changing needs of our customers and the wider industry." "There were many conversations about the shift to end-to-end solutions and the speed and security they provide, plus plenty of discussion around mobile/digital wallets and the enhanced convenience and flexibility they offer,” says Richard. Employee badge in Apple Wallet Employee badge in Apple Wallet is fully integrated with Gallagher Command Center, making it easy for customers to issue and manage access credentials for their employees with in-app provisioning via Gallagher’s Mobile Connect app. It is available for approved Gallagher customers in the United States with global availability to be announced soon.


Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realize, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionizing the overnight security business. Minimizing criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilizes a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimize the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is Remote Guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilize a combination of methods to effectively analyze potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyze the situation in real time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command center, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customized remote guarding When properly deployed, remote guarding systems are also customized to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional Security Shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A Bounty of Benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilize targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyze incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilize this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilizes a decentralized ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralized, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimize threats or attacks to organizations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organization. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organization to undergo authentication, authorization, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilizes the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organizations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organizations in proper data control, handling, and security. These policies guide organizations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security systems represent a significant investment, yet many organizations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control, and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance, or drive operational efficiencies. Consumption gap When users aren’t tapping into the full power of the solution they bought, they aren’t realizing their full return on investment. This creates a consumption gap. It’s a situation that has the potential to go in one of two very different directions. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction Left unchecked a consumption gap can create frustration for system integrators, manufacturers, and end users alike. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction. Leading to a greater likelihood that they’ll look to change or focus investment into overlapping and likely competing solutions. Customers’ security goals Addressed appropriately it can help manufacturers, system integrators, and end users to build trusted partnerships in which everybody wins. Understandably, systems integrators are primarily focused on installation—delivering reliable solutions that meet customers’ security goals to ensure their long-term success. However, engagement can go beyond deployment. Closing the consumption gap can be a strategic way to differentiate yourself from competitors. The deeper you understand your customer’s business, the better advice you’re able to offer—and the stronger the partnership you form. Why do consumption gaps exist? For customers, finding the time to learn multiple capabilities of a security system can be time-consuming. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks There are many reasons why customers may not be taking full advantage of the features available to them in their security platform. They may feel overwhelmed by a steep learning curve after deployment and might delay diving into the additional system features. Sometimes, there might be a lack of awareness of the technology’s full capabilities, and despite a willingness to learn, there are few options for training. Often, it can simply be they are not aware of the benefits of their system or are too busy with day-to-day and urgent tasks to learn other features. Bridging the consumption gap Systems are built to deal with a wide variety of use cases and broaden market appeal, but the goal isn’t to get everyone to use all the features of every product. You want to guide your customers toward the features and functionality that best meet their needs. This could entail reducing the friction they experience in their day-to-day operations, solving unique issues related to their business, or addressing their most important challenges. Having these conversations with your customers deepens your relationship and can organically open up new revenue streams. Continuous engagement allows you to recommend other relevant products or services that they may find helpful. Customized training plan Customers can learn at their own pace and gradually expand their understanding of their system Furthermore, customers are often not able to implement all features at once. You can help by proposing a plan to gradually evolve systems and processes over time. This could include a customized training plan to get the most value from their investment. Some manufacturers are also now providing learning management tools that system integrators can pass on to their customers. Customers can learn at their own pace and gradually expand their understanding of their system in accordance with their bandwidth. This allows them to get more out of their system. Simplifying deployment With the right software partners, systems integrators can focus on solving customer problems, not reactively troubleshooting issues. Look for manufacturers who offer good support systems for integrators. This includes not only quality technical support but also configuration and training services you can build on. Look for partners that offer tools and consultation services you can use to complement your value-added services, either to spend less time on the basics or for specialized expertise on complex projects. Beyond support and services, one telling sign is the configuration interface and tools that you as an integrator will primarily interact with. Ask yourself whether the manufacturer invests in their back-end tools and their primary user interface. Is there a noticeable difference between these two interfaces in terms of look and feel? Does one feel more dated? Widening consumption gap The harder it is to implement upgrades, the more reticent customers are to make the changes If the end user interface is easy to use but changes on the back end are difficult, the resulting friction can contribute to the widening consumption gap. It can become too time-consuming or difficult to upgrade or make changes to the system. The harder it is to implement upgrades, the more reticent customers are to make the changes. Configuration should be painless. If the system has a solid graphical user interface, you’ll be able to interact with the software in a fluid and intuitive way. When the system is intuitive for both you and your customers, you spend less time on setup and training. You can invest more attention in value-added activities. Conclusion A consumption gap could be a sign that technological innovation is outpacing people's ability to implement them in their day-to-day lives. You can work with your customers to simplify the adoption of the innovations so they can more easily implement them and realize the full value of their investment. By reviewing opportunities to bridge the consumption gap for your customers, you increase the likelihood of growing and renewing your system and service contracts. You also build relationships as a trusted partner. Customers will turn to you when looking to expand their security system and proactively solve new and incipient problems.
Security beat
In an emergency, information is pivotal. More information provides better understanding of an emergency and empowers potentially life-saving decision-making. Emergency response teams depend on information to guide their efforts and to deliver targeted assistance. On the front lines of emergency response are 911 and field responder agencies, which must direct reaction to life-or-death situations rapidly and efficiently. Historically, 911 operators had to respond based on very little information, perhaps just a voice on the phone or a location on their screen. Providing critical information Today, there are literally millions of information sources available, ranging from connected buildings to vehicle telematics to live video streams to health information from wearable devices. In fact, there are 540 million connected devices, any one of which could provide critical information in an emergency. But how can those information sources be leveraged to improve emergency response? That’s the mission and value proposition of RapidSOS, an ‘intelligent safety platform’ company that connects 911 operators with the vast universe of information available to promote better and faster emergency response. Highly sophisticated operation The platform is integrated into every major public safety software system and first responder agency “RapidSOS fuses human and artificial intelligence to put critical information from any connected device directly into the existing systems and operating procedures of first responders across the United States,” says Michael Martin, CEO of RapidSOS. RapidSOS is widely used by first responders. The platform is integrated into every major public safety software system and first responder agency. There are more than 4,600 software integrations that serve more than 21,000 first responders and 911 agencies. In 2023, RapidSOS supported the lifesaving work of public safety across 171 million emergencies with 3.3 billion data payloads. The system is adaptable and configurable to support any agency, from a highly sophisticated operation in New York City to a local sheriff running their own 911 center. Intelligent analytics and reporting RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation, rich content pathways, redundant connection to caller phones, and access to millions of connected devices. In an emergency, Unite intelligently fuses data from among millions of sensor feeds into a unified picture of an incident, allowing public safety officials to view real-time location, health profile, telematics, alarm data, and more. RapidSOS Unite is the latest evolution of the product, a single solution that includes AI automation RapidSOS offers core modules that handle call, text, video, sensor, mapping, and administration tools, and that provide partner data from connected devices. Additional modules provide enhanced geographic information system (GIS) data, and automated translation and transcription. There is also a single sign-on (SSO) upgrade, intelligent analytics and reporting, and seamless integration into field responder applications. Field responder applications Consider how an emergency might unfold and how RapidSOS can help. In a car accident, data from a modern automobile telematics system can alert a 911 operator of the accident as it happens. Data from a passenger’s wearable device might provide information about their health and condition. A nearby video or traffic camera could fill in details of how the accident occurred. Useful information in an emergency might come from any one of thousands of sources, including public safety data, sensor feeds, enterprise security systems, smart phones, etc. In a train derailment, electronic access to the cargo manifest can identify which train cars contain hazardous materials and how to manage the specific type of hazmat. This information could save valuable time when responding to incidents like the Feb. 3, 2023, Norfolk Southern train derailment involving 38 cars in East Palestine, Ohio. Consider how an emergency might unfold and how RapidSOS can help Institutional security partners Norfolk Southern is one of the companies that provides information to first responders using RapidSOS; in effect, the company provides a direct digital link from their rail security operations to any first responder in the United States. Amazon’s global operations centers also interface with RapidSOS to provide critical information to first responders. Partnering with corporate security helps to better support the flow of data from institutional security partners and their solutions. Information can transform and guide emergency responses. For example, in a structure fire, real-time sensor feeds throughout a building can help 911 and first responders understand how the fire is progressing. Real-time security camera footage Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR Leading the way to providing video feeds from private camera systems to 911 operators is an agreement between Eagle Eye Networks and RapidSOS, which was announced in April 2024. The agreement allows an enterprise to opt-in to share real-time security camera footage from an Eagle Eye video stream during a live 911 call. Having access to live feeds can save lives as 911 provides pre-arrival instructions such as CPR. “Security cameras are crucial in many locations, including schools, but previously those cameras could not be accessed by 911 during an emergency but were only used for investigation after an incident,” says Martin. Improving fire and life safety systems RapidSOS is also integrated with Honeywell’s Connected Life Safety Services (CLSS) system, a cloud platform that combines software and hardware to improve fire and life safety systems. Technology integrations between the two companies further modernize and digitize the public safety communications process to provide faster, more accurate communications with emergency centers (i.e., 911 agencies). RapidSOS technology securely transmits detailed data about an emergency CLSS provides real-time visibility and connectivity to help systems integrators and facilities managers make informed decisions and manage fire systems more efficiently. When combined with Honeywell's solutions, RapidSOS technology securely transmits detailed data about an emergency, such as the type of hazard, severity, and location within the impacted building, to emergency response centers. Video object detection Rapid SOS’s emerging Harmony artificial intelligence (AI) product serves as a ‘co-pilot’ for 911 operators, helping them manage the high volume of emergencies by making their response more efficient. Harmony pulls all the sensor feeds in an emergency and works to make only the most important information available in the hands of 911 and first responders. Harmony can take key insights from text and video data, use ‘sentiment analysis’ to determine the emotion tone of a message, and help 911 professionals using language translation, keyword alerts and video object detection. Harmony can help local agencies as they address a 25% average staffing shortage by providing additional support to 911 professionals while lessening the workload. Harmony is also working to help RapidSOS expand the ecosystem, stitching more data together and quickly making it more actionable than ever. Emergency response system RapidSOS also interfaces with Iamresponding, a comprehensive end-to-end emergency response system for first responders in the fire and other emergency sectors. Iamresponding’s field responder application is used by RapidSOS to get information out to first responders in the field. More than 650,000 first responders use RapidSOS’s field application RapidSOS’s recent acquisition of Iamresponding helps the company improve the connection with the last mile “in-the-field” piece of the puzzle, ensuring partners across computer-aided dispatch (CAD), integrated applications, mobile data terminals, body cameras and other responders have access to critical data. More than 650,000 first responders use RapidSOS’s field application. Enhancing emergency response RapidSOS’s Safety Pioneer Program formalizes the important partnership between RapidSOS and public safety agencies. Participants in the program receive early access to new platform features, contribute to the platform roadmap, and drive feedback to enhance emergency response. “911 and first responders do incredible lifesaving work,” says Martin. “Everything we have done and built at RapidSOS is a direct result of the engagement, partnerships, inside advice and insight we have gotten from public safety. We have learned from them, developed new technologies and tested them.” Martin adds: “Companies have data and we now know how to make that data actionable into the hands of 911 and first responders to save lives. This is an exciting moment for us continuing our mission in partnership with public safety, and for technology and security companies to have a major hand in that.” {##Poll1719488782 - What is the most valuable benefit of artificial intelligence (AI) in an emergency call center?##}
PKOC stands for Public Key Open Credential. It is a new standard that will meet a 30-year industry challenge and strip away much of the complexity and cost involved in protecting and administering credentials for access control. It could also accelerate the transition from cards to mobile access control. PKOC is a standards-based mobile credential that is essentially free, vendor-agnostic, and interoperable across multiple devices and systems. It is a highly secure access credential that can live on a mobile phone, in a plastic access card, or in any device capable of generating a public-private key pair. Access control systems PKOC is the newest standard of the Physical Security Interoperability Alliance (PSIA), a tax-exempt organization created to define, recommend, and promote standards for IP-enabled security devices and systems. PSIA introduced the Physical Logical Access Interoperability (PLAI) specification in 2013 to normalize identity data across disparate physical access control systems. The PKOC specification was introduced in 2021. We’re convinced this is the future A challenge for PSIA in promoting the PKOC mobile credential is to explain it quickly and in layman’s terms “We see the benefit of implementing the PKOC technology and doing it well,” says Sam Siegel, Senior Field Applications Engineer for ELATEC, a manufacturer of credential-agnostic readers/writers. “We wanted to get involved and join the discussion.” ELATEC has been participating in PSIA for more than a year. “This is a better way to do things,” says Siegel. “The PSIA, myself included, are convinced this is the future. The challenge is to get enough people to understand that it is a seismic shift away from what has been in place for so long.” A challenge for PSIA in promoting the PKOC mobile credential is to explain it quickly and in layman’s terms. The explanation spans the concept of public key infrastructure (PKI) and the difference between symmetrical and asymmetrical digital keys. Protecting symmetrical keys A symmetrical key system, which has been used historically in the access control market, involves the use of a single proprietary digital key to both encrypt and decrypt information. This means that digital public keys must be incorporated into each access control reader in the form of a module or a license, which the reader uses to read any compatible cards. Protecting symmetrical keys has been an expensive technology challenge the access control world The need to share these digital keys (in effect, the ability to read every compatible card) securely among access control manufacturers, integrators and end users involves extra administration and costs to ensure the security of the system. Protecting symmetrical keys has been an expensive technology challenge the access control world has borne for decades. The use of proprietary keys also promotes dependence on a single manufacturer or vendor to expand the ecosystem. The use of asymmetrical keys takes away these challenges. Advantages of using asymmetrical key pairs PKOC embraces the principle of PKI (public key infrastructure), a two-key asymmetrical system used to ensure confidentiality and encryption. In effect, there are two digital "keys," one public and one private, that are used to encrypt and decrypt information, in this case, a credential for an access control system. The secure credential standard is generated independently of a third-party credential issuer. It is generated within the device. In the access control scenario, the smartphone generates a key pair in the secure element of the phone, including a private key, which is stored on the smartphone, and a public key, which serves as the user’s ID number in the access control system. Sharing the public key is not a security risk because it is worthless without the private key that is locked away on the smartphone. PKOC-enabled smartphone The smartphone must contain the private key in order to interface with the access control system When a PKOC-enabled smartphone approaches a PKOC-enabled reader, the reader sends a one-time random number (a ‘nonce’) to the smartphone, which then encrypts it using the private key, and sends it along with the public key back to the reader. The reader uses the public key to decrypt the random number, which confirms the authorized access associated with the smartphone. The signals are sent via Bluetooth Low Energy (BLE). Importantly, the private key never leaves the smartphone and is never shared with any other elements of the access control system. Therefore, there are no administrative or technical costs associated with protecting it. The smartphone must contain the private key in order to interface with the access control system using the public key. Mobile credentialing system For ELATEC, embracing PKOC provides a new way to highlight the company’s value proposition and promote it to a new group of companies; i.e., those who adopt the PKOC approach to mobile credentialing. The ‘universal’ configuration of the ELATEC reader hardware is credential-agnostic “PKOC serves as a great way to show off our value and what we do best,” says Siegel. ELATEC provides credential readers/writers that operate in a variety of card and reader environments, incorporating an integrated BLE module to support mobile ID and authentication solutions, including PKOC. Using applicable firmware, the ‘universal’ configuration of the ELATEC reader hardware is credential-agnostic and so compatible with any RFID card or mobile credentialing system, all in a small form factor (around 1 1/2 inches square). How readers and smartphones interact The PKOC standard addresses the variables of how the reader and the smartphone share information. Currently, the PKOC standard addresses communication via BLE, but the principle is the same for systems using near-field communication (NFC), ultra-wideband (UWB), or any future protocols. PKOC also defines how device manufacturers can enable devices (readers, locks, control panels, biometric devices, etc.) to securely consume the credential for authentication and access. PKOC can be used with smart cards as well as with smartphones. In the case of a smart card, the public and private keys are contained on the smart card, which communicates via NFC with the reader. The encryption/decryption scenario is exactly the same. PKOC enables users to ‘bring your own credential’ (BYOC). Public key number ELATEC is proud to have played an instrumental role with the PSIA in the implementation of PKOC" BLE offers a broader read range than NFC; the read range can be managed using software and/or by signaling intent or two-factor authentication. Because private keys remain secure inside a smartphone, they do not have to be incorporated into a digital wallet for security purposes, although they could be incorporated for matters of convenience. To simplify administration, the public key number can be used as a badge number. If badge numbers have already been assigned, a column could be added to the database to associate badge numbers with public key numbers. “ELATEC is proud to have played an instrumental role with the PSIA in the implementation of PKOC,” said Paul Massey, CEO of ELATEC, Inc. “End-users should not be limited in their solution mix to one or two vendors due to their proprietary technology. PKOC now provides the ideal combination of security, convenience, interoperability, and cost for industry participants, by industry participants.” ‘Experience PSIA’ will promote PKOC at ISC West ISC West participants include PSIM manufacturer Advancis Software and Services The flexibility of PKOC will be on display at ISC West 2023, where ‘Experience PSIA’ will register attendees and provide them with a PKOC credential that can be used with a variety of readers throughout the show. Also showcasing the PLAI standard, PSIA’s presence at ISC West will include ELATEC along with several other vendors/manufacturers. A special PSIA event will be held from 5:30 to 7:30 p.m. on March 29 at the Venetian Ball Room B&C in Las Vegas. ISC West participants include PSIM manufacturer Advancis Software and Services, which acquired Cruatech software in 2012; and Idemia, specializing in identity-related security services including facial recognition and other biometrics. Integrated security systems Also involved are Johnson Controls (JCI), an integrated security systems provider that offers a range of security products and services; and Siemens, which offers its own range of security solutions and systems. Other participants include Last Lock, which has a unique spin on internet-enabled locks; while SAFR from Real Networks offers accurate, fast, unbiased face recognition and additional computer vision features, and Sentry Enterprises provides the SentryCard biometric platform for a privacy-centric, proof-of-identity solution. Finally, rfIDEAS manufactures credential readers.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanization, and the growing expectations of commuters and governments are pressuring transit industry players to modernize. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organizations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organizations looking to drive higher productivity and profitability margins should consider security upgrades that prioritize integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organized retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetize theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organizations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimizing overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
Case studies
Centro Ilarco is a state-of-the-art commercial office building in the heart of Bogotá, Colombia. Designed to accommodate three corporate towers with a total of 90 offices, this landmark structure focuses on providing innovative, secure, and seamless access experiences for its tenants. The solution As a multi-building office complex, Centro Ilarco required a robust access control system to ensure security, manage tenant entry, and streamline visitor access at every entry point. To meet these needs, the DNAKE S617 8” Facial Recognition Door Station was installed across the building. Since its implementation, Centro Ilarco has experienced a significant boost in both security and operational efficiency. Tenants now enjoy hassle-free, touchless access to their offices, while building management benefits from real-time monitoring, detailed access logs, and centralized control of all entry points. DNAKE smart intercom solution has not only enhanced security but also improved the overall tenant experience. Installed products S617 8” Facial Recognition Android Door Station Smart Pro APP
Alarming increases in vehicle thefts, unsolved traffic collisions, and stolen cargo in the Mexican State of Tlaxcala, motivated the Executive Commission of the State Public Security System (CESESP) to expand and upgrade its video security system. To counter the rise in crime, the CESESP sought a flexible, scalable, open-platform video management system (VMS) that could seamlessly incorporate existing cameras as well as over 800 new cameras and edge devices from a range of hardware and software providers. Tlaxcala Located in East-Central Mexico, Tlaxcala is one of 32 states within the Federal Entities of Mexico. With a population of approximately 1,343,000, based on the 2020 census, Tlaxcala is the smallest yet one of the most densely populated states in Mexico. The CESESP of Tlaxcala is tasked with safeguarding residents across the state's 60 municipalities. C4 center C4 center has multiple teams of six security professionals who monitor the system around the clock At the core of all security operations, including the 911 emergency response and 089 confidential tip line, is the CESESP's Control, Command, Communications, and Computing Center (C4). The state’s C4 center has multiple teams of six security professionals who monitor the system around the clock on a large, 24-screen video wall. The C4 also houses the system’s HP and Lenovo servers. Flexibility, scalability, and budget “Flexibility, scalability, and strictly adhering to the budget were top requirements for this critical, state-wide project,” said Maximino Hernández Pulido, Executive Commissioner of the State Public Security System. “We considered a variety of proposals and providers, but we ultimately followed the advice of our integrator, Digital Information Systems, and selected XProtect Corporate from Milestone Systems.” XProtect Corporate The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco, all integrated within the system and managed by XProtect Corporate VMS from Milestone Systems. The system is also fully integrated with the BriefCam Video Analytics Platform, delivering video intelligence for system managers to identify, monitor, investigate, and visualize incidents plus video data to make smarter decisions. Efficient and cost-effective integration “Because state officials rely on their video system 24/7, the update needed to be gradual with no downtime. As new cameras were integrated into the Milestone platform, the previous system slowly disappeared,” said Isaac Sánchez Morales, an engineer at Digital Information Systems (SDI), an integrating company. “The XProtect Corporate open platform VMS allowed us to leverage our existing cameras and servers, integrate new equipment and devices, making the process very efficient and cost-effective, and we never had a gap in service.” Data-driven video for fast response times BriefCam video analytics technology The solution detects, identifies, and classifies video metadata to drive more efficient investigations The BriefCam video analytics technology seamlessly integrates into Milestone’s XProtect Smart Client. The solution detects, identifies, and classifies video metadata to drive more efficient investigations and business decisions, such as finding missing persons, investigating vandalism, theft, assaults, accidents, injuries, or acts of violence, as well as extracting and analyzing through heatmaps, dashboards, and visualizations. The analytics have proven beneficial in accelerating investigations, attaining situational awareness, and optimizing operational intelligence for enhanced video search, alerting, and data visualization. Real-time alerts, situational awareness “We installed the BriefCam Insights and Investigator products, and regularly use the platform’s RESPOND and RESEARCH capabilities. One of the advantages of all these XProtect-integrated analytics is that operators do not have to open additional windows or enter new credentials to access them,” said Sánchez. “With this integration of technologies, operators can trigger real-time alerts based on complex object classifications and filter combinations to increase situational awareness meaning authorities can react to events as they unfold.” Proactive policing with LPR With the BriefCam RESPOND solution, object characteristics and license plate recognition tools can be used" Sánchez added, "With the BriefCam RESPOND solution, object characteristics such as vehicle, person, or animal, and license plate recognition tools can be used to trigger rule-based alerts." "These tools can help overcome the challenges of urban video surveillance and drive proactive policing in Tlaxcala." Video technologies reduce state crime rates Following the comprehensive expansion of the security infrastructure, statistics from the Executive Secretariat of the National Public Security Systems revealed Tlaxcala boasted the lowest crime rate nationwide. With the modernized system in place, officials documented a 93% reduction in pilfered freight from transport companies. Similarly, vehicle theft declined by 22.5%. A cost-efficient and flexible way Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance According to Sánchez and the SDI team, it is expected that each municipality within the territory will soon have its own locally focused VMS. With the use of Milestone Interconnect, all the municipality subsystems will integrate directly with the state-wide platform. Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance of multiple sites spread across a region. C4 video surveillance operation “The integrated solution delivered through Milestone is a robust, efficient, and secure system that provides all the necessary tools for the C4 video surveillance operation,” added Executive Commissioner Hernández-Pulido. “In addition, the excellent technical and post-sales support from Milestone and SDI has led us to meet the system and performance goals we set for ourselves.”
As one of the main tourist destinations in the Caribbean, The Bahamas welcomes nearly seven million visitors every year. Unfortunately, the City of Nassau, the capital of the Bahamas, has seen increased crime in certain parts of the city over the last several years from pickpockets and vehicular crimes to armed robberies and kidnappings. Policing, safety, and security Based in Nassau, the Royal Bahamas Police Force (RBPF) employs over 3,000 officers and provides policing, safety, and security services to residents and visitors. However, the RBPF was challenged to keep up with the rising tide of criminal activity. The government fully supported the RBPF’s initiative to expand the country's surveillance system as a strategic tool in the fight against crime. Track and monitor, situational awareness The RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence" “There are known criminal hotspots across the city that people of interest frequent," said Ethan Munnings, CTIO at Proficient Business Services, Bahamas, and the lead engineer for the City of Nassau video surveillance project. “To curb incidents in those areas and to better track and monitor suspects, gain situational awareness, and to be able to help locate or identify people after leaving the scene, the RBPF added system infrastructure and hundreds of new IP-video cameras to increase police presence. One of those areas, for example, is the surroundings of the house of the Prime Minister.” Milestone video management system In 2011, the city set up its initial Milestone video management system, overseeing around 250 cameras. Later, in 2019, Nassau officials collaborated with Proficient Business Services to integrate almost 500 additional cameras and edge devices into the system. A restructuring of the network infrastructure was required to consolidate all data feeds to the city's Real-Time Crime Center. The new crime center, located at the police headquarters, opened in February 2021, acting as the Royal Bahamas Police Force's technological epicenter. Innovative technology Integration In early 2020, the Ministry of National Security of the Bahamas began expanding its existing Milestone XProtect video management system. Milestone's open platform data-driven video technology system is compatible with various hardware and software vendors. The upgrade led to redesigning of the network infrastructure and the addition of over 500 high-quality network cameras from Axis Communications. Facial recognition and video analytics ShotSpotter, the gunshot detection system was also integrated into the greatly expanded system The project involved several Milestone technology partners, including system servers from Rasilient Systems, and video analytics applications such as License Plate Recognition (LPR) and facial recognition from BriefCam. ShotSpotter, the gunshot detection system from SoundThinking, was also integrated into the greatly expanded system. Artificial intelligence and deep learning Within the Milestone VMS, the cameras and servers integrate with BriefCam’s video analytics, providing facial recognition and person/object tracking. By harnessing the power of artificial intelligence and deep learning, integrated BriefCam technologies transform video data into valuable insights for rapid video review, search, and real-time alerting. Two types of LPR The system also offers two types of License Plate Recognition. The first is via the Milestone LPR add-on, and the second is through direct integration with BriefCam. A team of 14 operators relies on Auvik for device monitoring and SolarWinds to manage the core network. The fiber network, with a 10G backbone, is based on Cisco technologies. Traffic safety revolutionised Video technology was pivotal in this endeavor, with fatal accidents in New Providence dropping to 33 in 2019 Beyond enhancing security, Nassau's updated city video system has proved instrumental in monitoring traffic accidents and holding drivers responsible for their behavior. Eyewitness News from Nassau reported 69 deaths related to traffic in 2018. After witnessing an almost 30 percent surge in fatalities from 2017 to 2018, authorities committed to reducing traffic-related deaths and accidents. Video technology was pivotal in this endeavor, with fatal accidents in New Providence dropping to 33 in 2019. Traffic surveillance “The cameras we have strategically installed on traffic lights around the city use LPR integrated with Milestone Systems, which have helped control hit-and-run accidents,” said Munnings. “There have been cases of pedestrians being hit by vehicles that didn’t stop; now the police can track those vehicles and bring those drivers to justice. The new surveillance system has also helped prevent human abductions.” Technology and innovation For more than 12 years, the City of Nassau has been relying on and expanding the capabilities of its video surveillance system. With the help of technologies and deep integration within an open platform VMS ecosystem, the city's authorities and police have effectively addressed evolving challenges to ensure safety for both residents and tourists. “Technology and innovation have taken off at the speed of light and this will only accelerate. Embracing the innovations that improve police work is no longer optional," said Zhivago Dames, Assistant Commis.
Sandwell Aquatics Centre in Smethwick is a state-of-the-art leisure center that originated as a purpose-built arena for the 2022 Commonwealth Games in Birmingham. The facility played host to the highest number of medal events compared to any other, showcasing both swimming and diving competitions. The newly constructed complex included a competition pool for swimming and diving, a temporary pool for swimming and para-swimming warm-up, and an area dedicated to dry-dive training. Reclaiming the space Following its key role in the games, the original structure was reconfigured so it could be used by the local community from the summer of 2023 onwards. The 4000 temporary seats have been removed and fresh facilities tailored for community use have replaced them. The leisure hub boasts a gym with over 100 stations, a specialized ladies-only gym with 25+ stations, along with amenities such as a sauna, steam room, football pitch, two 4-court sports halls, three exercise studios, an indoor cycling studio, and a trio of swimming pools. Plant noise assessment The anticipated noise levels generated by various mechanical components within the plant room In the proposal documents, Mach Acoustics included two detailed acoustic reports – one addressing operational noise and the other focusing on plant noise. The plant noise assessment specifically outlined the anticipated noise levels generated by various mechanical components within the plant room, which includes several pumps and air handling units. Acoustic barrier with integrated louvre The acoustician's initial recommendation proposed an acoustic barrier with integrated louvre features to ensure adequate airflow while mitigating noise. However, a subsequent design amendment specified a solid acoustic barrier with slatted top sections to maintain airflow and enhance aesthetics. Additionally, steel louvre doors were specified for access. Absorptive acoustic barriers These barriers effectively reduce noise pollution originating from mechanical plant areas It has become standard practice to install absorptive acoustic barriers around new and renovated leisure centers. These barriers effectively reduce noise pollution originating from mechanical plant areas and operational compounds. It's not uncommon for heat pumps and air conditioning units to produce a continuous low-level hum or buzzing noise, which can disrupt neighboring properties and create an unpleasant auditory environment for facility members and visitors alike. Game-changing solutions With prior experience in similar acoustic installations for aquatic and leisure centers, Jackson Fencing successfully secured a subcontractor contract with Wates. They designed, manufactured, and installed customized acoustic fencing and gates across three elevations: The first elevation covered 16.5m and featured 2.8m high Jakoustic Reflective panels with 2.1m high timber slats above. The second elevation spanned 11m, incorporating 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above, 9.64m of 5.3m high panels, and 11.3m of 3.2m high panels with 2.1m high timber slats. The third elevation extended 16.5m and used 3.2m high Jakoustic Reflective panels with 2.1m high timber slats above. Benefits of solid acoustic barriers These barriers offer an appealing noise reduction solution that conceals machinery and serves as a robust security barrier The different heights of the solid acoustic barriers were strategically chosen to benefit noise reduction, with timber slats enhancing aesthetics and airflow. The project also included matching double-leaf acoustic gates for access. In the first elevation, two apertures were left for steel louvre panels. The acoustic barriers, mounted on galvanized steel posts, were constructed from tongue and groove boards with a deep V profile, tightly slotting together to reflect noise by up to 28dB. These barriers not only offer an appealing noise reduction solution that conceals machinery but also serve as a robust security barrier, devoid of footholds and challenging to scale. Tailored security solutions Peter Jackson, Managing Director, of Jacksons Fencing says, “The Sandwell Aquatics Centre serves as a remarkable example of how facilities can undergo effective reconfiguration to align with their new objectives to ensure they are being utilized effectively." "This project showcases our team's dedication to tailoring security solutions precisely to the task at hand, achieved through the customization of acoustic fencing. The outcome not only exudes a sleek and sophisticated appearance but also fulfills its vital function. Coupled with a reliable 25-year guarantee, this acoustic fencing ensures enduring noise reduction, cost efficiency, and sustainability.”
Quanergy Solutions, Inc., a provider of 3D LiDAR (Light Detection and Ranging) solutions for highly dynamic environments, has successfully partnered with a prominent social media provider to effectively optimize the organization’s use of space across campuses for enhanced productivity and improved employee experience. Improve space utilization The social media giant faced the critical need to improve space utilization across their campuses, which comprised numerous conference rooms, cafeterias, and other general-purpose areas. Existing legacy solutions proved unreliable in these complex environments, failing to provide the desired level of accuracy while compromising employee privacy. Q-Track Q-Track ensures that employees’ privacy is protected while enabling the sensors to track individuals seamlessly To overcome these limitations, Quanergy leverages its seamlessly integrated solution that combines long-range 3D LiDAR sensors with advanced perception software. Quanergy’s solution provides extensive coverage across diverse campus environments, accommodating both large and small rooms with various occlusions, such as tables, chairs, cabinets, columns, and pillars. With a unique object stitching mechanism, Q-Track ensures that employees’ privacy is protected while enabling the sensors to track individuals seamlessly, even when temporarily obscured from view. Hyper-accurate detection, tracking Quanergy’s solution resulted in the hyper-accurate detection, tracking, and classification of employees without compromising privacy or capturing any Personal Identifiable Information (PII). Through the use of occupancy-related insights, the social media giant can optimize the use of available areas and achieve enhanced productivity among its workforce. The result is a comprehensive solution that outperforms traditional camera-based solutions and dramatically lowers total cost of ownership. 3-D LiDAR solutions Quanergy’s success in optimizing space utilization for the social media giant showcases the transformative potential of 3-D LiDAR technology in smart spaces. With its privacy-preserving capabilities and accurate tracking, Quanergy 3-D LiDAR solutions are already the preferred solution at over 100 global locations providing security for critical infrastructure such as data centers, utility plants, and airports, as well as for safe cities, and industrial automation.
Gunnebo Entrance Control solutions have been installed at travel software and technology specialist Sabre’s remodeled office in Uruguay, to ensure the safety and well-being of its employees, clients, and visitors. As a global technology company serving the travel industry, Sabre’s innovative software has revolutionized the way personalized travel experiences can be delivered, pioneering to an increasingly digital and interconnected world. Entrance control requirements With its visionary approach and dedication to customer success, its base in Uruguay is currently home to over 800 staff. To help Sabre meet its entrance control requirements, Gunnebo was invited to work with Abelenda Hermanos as a security system supplier to design and install a comprehensive solution, created to optimize access control while maintaining a seamless flow of people. Author's quote By proactively working with Gunnebo Entrance Control we were able to design a system" Says Natalie Sarmiento, Sabre Security & Safety Manager: “Our vision is always to connect people with travel experiences that matter most. And in doing so, our team is the most important part of our business to think differently and make this happen for our customers. We needed to ensure their security on-site in our remodeled office in Uruguay, with the highest standards." He adds, “By proactively working with Gunnebo Entrance Control we were able to design a system that easily blended with its surroundings, while coexisting with the welcoming environment we wanted to create for our employees and our guests. This is something that flows throughout our offices and has been received well by all on site.” Gunnebo's entrance control solutions Gunnebo Entrance Control worked closely with Sabre to create a bespoke entrance control solution, incorporating its latest sleek design SpeedStile FP 1200 EV speed gates, finished in full stainless steel grade 304, to operate six lanes in place. By implementing Gunnebo's entrance control solutions, Sabre has significantly enhanced security measures, reducing the risk of unauthorized access without compromising on speed or esthetic design. Gunnebo SpeedStile system Real benefit of working with the Gunnebo SpeedStile system is the focus on ease of installation" Says Omar Ferrero, Director at Abelenda Hermanos: “It was an absolute pleasure to work with Sabre and install entrance control for the benefit of its staff and guests. The real benefit of working with the Gunnebo SpeedStile system is the focus on ease of installation, together with its use of advanced technology to balance speed, security and design. The finish is stylish and maintains the highest level of safety for all who work and visit the new facilities.” Gunnebo's SpeedStile FP 1200 EV system enhances security and optimizes the flow of people in office environments. The system's high throughput capability ensures efficient traffic management, allowing for swift and smooth access for authorized individuals. Customized security solutions Equipped with intelligent sensors, it provides accurate and reliable entrance control, effectively preventing tailgating. Additionally, the system's customizable design options enable integration with the surrounding architecture, enhancing the esthetic appeal of the new headquarters. Thomas Axelson, Gunnebo Partner Network Manager – LATAM concluded: “The successful installation of Gunnebo’s entrance control solutions at Sabre’s offices in Uruguay highlights our capability to deliver customized security solutions. We will work with our clients and installers right from the initial design stage to project completion to deliver a solution that presents the highest level of security while maintaining a welcoming feel. We are thrilled with the results and proud to support Sabre as they continue their mission to make travel happen across the globe.”


Round table discussion
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
In the United States, they are called license plate recognition (LPR) systems. In Europe, the more common term is automated license number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle color, type, make, and model. We asked this week’s Expert Panel Roundtable: What's new with license plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Products


White papers
Preventing Loss, Securing Assets
Download
Managing Security In The Age Of Boundaryless Working
Download
The Welcoming Workplace
Download
Access and Security In The Age of Hybrid Working
Download
The Benefits of Edge AI + Cloud For Security Systems
Download
11 Advantages Of A Combined System For Access Control And Intrusion
Download
Integrated Access Control: Reap The Benefits Of Connected Security
Download
Choosing the Right Storage Technology for Video Surveillance
Download
The Role of Access Control in a Safe Return to the Workplace
Download
'Boosting On-Site Safety And Security
Download
RFID and Smartphone Readers in Physical Access Control
Download
Preparing Your Organization With Quality Situational Awareness
Download

