Perimeter protection
Oakdoor, a pioneer in hardware-enforced security solutions, which is part of PA Consulting (PA), and Nexor, the pioneering specialist in Secure Information Exchange, have announced a strategic partnership to advance a high assurance cross-domain solution for secure data sharing. The partnership will start to create highly integrated software guarding and hardware verification solutions – with the aim of making access to data more secure and manageable for customers using multiple security...
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, concluded its “Powering Innovation 2024: A Genetec Empower 360 roadshow” in Saudi Arabia. The roadshow took place on 13 May at the Narcissus Hotel Riyadh and showcased the company’s latest innovations and strategic vision for the future. Genetec roadshow As Saudi Arabia continues to prioritize smart city initiatives, physical security assumes paramount imp...
When it comes to protecting the environment, the security industry has historically been perched on the sidelines. For instance, the amount of electricity that physical security systems use is minimal when compared to the total energy usage in a typical building. However, as awareness of environmental issues has surged, and as some of the "low-hanging fruit" has been harvested, attention has come back to opportunities for additional, if small, savings. The lifecycles of security products are als...
Quanergy Solutions, Inc., continues to gain momentum since reformulating its business operations to focus exclusively on physical security and business intelligence applications. Quanergy’s groundbreaking 3D LiDAR (Light Detection and Ranging) solutions provide users with real-time data to detect potential threats and abnormalities for immediate remediation with unparalleled levels of precision and range in virtually any environment or operating conditions. Accelerate Quanergy&rsquo...
ZBeta, a pioneer in delivering comprehensive physical security consulting services, announced the launch of its engagement model designed to transform the landscape of security strategy development and implementation. This comprehensive approach extends beyond traditional consultancy services, providing clients with a sustained advisory, advanced technology and system design, and ongoing operational support. Integrity of security architectures Rooted in a philosophy that seeks to overcome the...
Security Industry Authority announced the award of £72,000 from its grant for good causes fund to seven registered charities and community interest companies across the UK. This brings the total grants awarded by the SIA using cash confiscated from criminals to over £250,000. Through this fund, the UK’s private security industry regulator distributes money recovered through proceeds of crime confiscation orders. Grants are used to benefit the private security industry and impr...
News
Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announced the launch of “Powering Innovation 2024: A Genetec Empower 360 Roadshow.” The Middle East tour will spotlight the company’s product roadmap, featuring the latest innovations and strategic vision for the future. In partnership with Axis Communications, HID Global, and Ipsotek, the event will commence in Doha on May 2nd, followed by pivotal stops in key markets such as Abu Dhabi on May 13th and Riyadh on May 16th. Evolving trends and best practices Delving into crucial topics impacting physical security professionals, this roadshow will feature Genetec’s experts exploring biometrics, video analytics, and access control solutions that go beyond the door. Central to the discussions is the exploration of a unified approach to seamlessly integrate these solutions. Central to the talks is the quest for a unified policy to seamlessly integrate these keys The event will cover important themes around the state of regional physical security and the evolving trends and best practices for safeguarding assets and infrastructure. Attendees will gain exclusive insights into the latest Genetec technologies, upcoming product launches, and strategic initiatives shaping the industry landscape. Additionally, they will have the opportunity to engage in live demonstrations of solutions and connect with both industry experts and partners to explore emerging trends and technologies. Future of physical security "At Genetec, we're committed to shaping the future of physical security and public safety through innovation and collaboration," said Firas Jadalla, Regional Director – Middle East, Turkey & Africa, Genetec Inc. "Our goal is to equip our customers with the resources and knowledge they need to effectively navigate the complex world of physical security. The upcoming roadshow is a testament to our dedication to empowering professionals with cutting-edge solutions. In collaboration with our long-standing partners, we hope this event paves the way for a safer, smarter tomorrow." Advanced security capabilities The “Powering Innovation 2024: A Genetec Empower 360 roadshow” will also showcase Security Center SaaS, a massively scalable, open, and unified software as a service (SaaS) solution. The new offering combines access control, video management, forensic search, intrusion monitoring, automation, and many other advanced security capabilities.
Security is in high demand. In times of growing uncertainty, the need for armored and civilian special protection vehicles is rising. More and more individuals, professionally, politically, or economically prominent, seek protection while on the move. Security Essen, the pioneering trade fair for security, will showcase the options and discreet nature of this protection from September 17th to 20th at Messe Essen/Germany, featuring its own exhibition area. The concept has garnered significant industry support. Stoof International is the first company to register its participation in the special protection vehicles category. Customized specialty models The manufacturer is among the German market pioneers in armored vehicles. For over 150 years, their experts have been building customized specialty models. Whether limousines, specially protected SUVs or trucks, cash and valuables transporters, or vehicles for specialized emergency forces - vehicles that meet global security standards are manufactured in the ultra-modern factory halls in Brandenburg, Germany. For over 150 years, their experts have been building customized specialty models "We are thrilled to now be able to convince the high-caliber audience of Security Essen of our individual, powerful, and uncompromisingly secure vehicles," says Stoof CEO Fred Stoof. The company will bring several exhibits to Essen, including two vehicles and various security components. Topic of networked security Special protection vehicles are positioned in the Galeria to attract attention During Security Essen, the new offer will be placed in the Galeria of Messe Essen to attract the public. This spacious, light-filled connection between the exhibition halls is highly frequented and invites people to talk. Additionally, it provides direct access to the new and thematically relevant exhibition area "Civil Protection and Civil Defense" in the adjacent exhibition hall 4. Thus, Security Essen expands its focus and shows authorities and organizations with security tasks (BOS) and municipalities how to prepare for increasing challenges such as unrest, extreme weather events, or major incidents. Individual protection will also play a major role in the supporting program accompanying the trade fair. In the Drone Zone, for example, exhibitors will demonstrate how drones can support the security industry as well as companies and institutions in need of protection. The Digital Networking Security Conference will focus on a high-level professional exchange on the topic of "networked security". An extensive lecture program also offers information on a wide range of security-related topics.
ISC West 2024, held in Las Vegas, marked a significant milestone for PureTech Systems as it announced reseller agreements with two major companies in the security industry, i-PRO and Magos. This strategic move not only expands PureTech Systems’ portfolio but also reinforces its commitment to provide the most comprehensive, easy-to-integrate, and reliable AI-boosted, geospatial video analytics and sensor fusion software solution for perimeter protection. With these initiatives, PureTech Systems aims to deliver a comprehensive turn-key solution equipping organizations with the tools they need for effective perimeter security and threat detection. Expanding horizons with i-PRO The addition of i-PRO cameras in PureTech’s arsenal brings together PureTech's geospatial AI-boosted video analytics and i-PRO's cutting-edge cameras. This collaboration is poised to offer unparalleled situational awareness, enhancing overall security measures and operational efficiency. During the event, PureTech illustrated the power of this combined technology, offering attendees a direct glimpse into the enhancements it promises for surveillance and perimeter security. Forging ahead with Magos Reseller agreement with Magos introduces an exciting addition to PureTech’s product lineup Similarly, the reseller agreement with Magos introduces an exciting addition to PureTech’s product lineup. Magos is known for its cost-effective, low-power, high-performance radars, which, when coupled with PureTech’s patented video analytics, promises to enhance security posture and operational performance. The synergy between Magos’s radar systems and PureTech’s AI-boosted geospatial video analytics was demonstrated through various recorded demonstrations at PureTech’s booth drawing attention from industry professionals and potential clients alike. A successful showcase The atmosphere at ISC West was charged with a growing number of innovative and forward-thinking professionals united by a shared goal of securing the future. The success of ISC West 2024 for PureTech Systems was not just in expanding industry affiliations, but also in the optimistic reception from the market and the potential for future growth opportunities these collaborations could unfold. Industry experts and attendees praised the strategic direction PureTech is taking, highlighting the company’s initiative to continue to deliver technological advancements to the security sector. Announcement of the reseller agreements with i-PRO and Magos not only enhances PureTech's market ISC West also provided an excellent platform for networking, with PureTech Systems capitalizing on the opportunity to connect with other industry pioneers, current and potential clients. The event facilitated rich discussions on emerging trends, current challenges, and innovations in security technology, further positioning PureTech at the forefront of the industry. ISC West 2024 proved to be a success for PureTech Systems. The announcement of the reseller agreements with i-PRO and Magos not only enhances PureTech's market offering but also sets the stage for a new era of delivering turn-key, integrated security solutions. As PureTech Systems continues to navigate the evolving landscape of security technology, its participation in ISC West has undoubtedly bolstered its position as a pioneer committed to excellence and innovation in the industry. Looking Ahead As they look forward to the next big events, PureTech Systems will be exhibiting at the Border Security Expo at booth #1001 in El Paso, TX in May, and later at the GSX in booth #1954 in Orlando, FL in September. These events will provide additional opportunities for PureTech to showcase its geospatial AI-boosted video analytics and integrated security solutions.
Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announces its plans for The Security Event, taking place at the NEC arena in Birmingham, from 30 April to 2 May 2024. Visitors will have the opportunity to visit Genetec at booth #5/H45 for an exclusive unveiling of Security Center SaaS, its new enterprise-grade, physical security as a service solution. It combines access control, video management, forensic search, intrusion monitoring, automation, and many other advanced security capabilities. This new offering, built with cybersecurity and privacy at its core, is a massively scalable, open and unified software-as-a-service (SaaS) solution. The Genetec team will be on-site to present the solution to visitors. Innovation at The Security Event The company will also be conducting live demonstrations of Security Center 5.12 “The physical security sector has been eagerly anticipating an enterprise-grade solution that can be implemented in the cloud or in a hybrid deployment. Security Center SaaS not only addresses this market gap but also redefines the possibilities for cloud-based physical security. We're thrilled to unveil this innovation at The Security Event, marking its debut in the UK market,” comments, Paul Dodds, Country Manager at Genetec Inc UK & Ireland. The company will also be conducting live demonstrations of Security Center 5.12 and other cutting-edge technological solutions designed to enhance security and operational efficiency. Agenda of experts from Genetec Additionally, Genetec will actively engage in the event's speaker program. Please find below the agenda of experts from Genetec, who will lead and present key topics sessions. Wednesday 1 May: 11:00 – 11:30, Kris Houle, Product Line Commercial Lead - Security Center SaaS, Genetec and Felix Camire, Product Marketing Specialist, Genetec - ‘Cloud technology and adaptation for UK businesses’ Thursday 2 May: 13:00 – 13:30, Jon Hill, Account Executive, Genetec - ‘Public sector safety with unified solutions.’
Johnson Controls, the global pioneer for smart, healthy, and sustainable buildings, has announced the renewal of its reseller partnership with Everbridge. The collaboration aims to assist security pioneers with a centralized view of physical assets and external risk factors—such as geopolitical threats or natural disasters—that could impact organizational safety and resiliency. Partnership with Everbridge “Not only do today’s security pioneers face the challenge of staying ahead of new and emerging threats to their physical facilities and cyberinfrastructure, but they also need to consider how public safety events or extreme weather may affect their operations,” said Greg Parker, global vice president of Security and Fire Life Cycle Solutions at Johnson Controls. “Through our continued partnership with Everbridge, we’re helping customers navigate an increasingly complex threat landscape and protect their organizations’ assets.” Mass communication functionality Additionally, two-way and mass communication functionality helps to deliver instructions Data collected by Johnson Controls OpenBlue and Everbridge 360 provides security professionals with information to assess risk and initiate automated security workflow and emergency operating procedures. Additionally, two-way and mass communication functionality helps to deliver instructions and keep employees and company assets safe, regardless of their location. “Our collaboration with Johnson Controls improves the ability of customers to ensure business continuity, life safety, and security across a wider range of scenarios and be better prepared for the unexpected,” said Dominic Jones, SVP Business Development, Partnerships & Alliances, Everbridge. “Our combined technology offers security pioneers the ability to not only identify the security risks that they are facing—both internally and externally—but to also help mitigate or manage them effectively, reducing the impact of an event and protecting their operations from interruption, damage, or loss of life.” Technologies with AI capabilities In FY24, Johnson Controls expanded its security solution portfolio and partnerships to address the common goals faced by security professionals, including investing in technologies with AI capabilities and the need to move to service models to address staffing shortages. In addition to this renewed partnership with Everbridge, Johnson Controls launched its Security Operations Centers (SOC) service offering to the North American market. Building on 50 years of central monitoring and response services internationally, the SOC offering is available to North American customers seeking to improve business continuity and help reduce risk at a predictable as-a-service fee.
PureTech Systems, a pioneer in geospatial AI-boosted video analytics, is excited to announce the addition of i-Pro cameras to its lineup of security products through a new reselling agreement. This initiative marks the next step in PureTech's offering. i-Pro cameras are renowned for their advanced surveillance sensing technology designed to meet the diverse needs of evolving security challenges. By incorporating i-Pro's cutting-edge cameras into its product portfolio, when coupled to PureTech’s patented, field-proven geospatial AI-boosted video analytics, PureTech Systems is set to offer more robust automated perimeter security solutions, tailored to the unique requirements of its clients. Advanced surveillance cameras Larry Bowe, President & CEO of PureTech Systems, expressed his enthusiasm for the new addition, stating, "Adding i-Pro cameras into our product offerings represents a step forward in our pursuit to provide customers with a comprehensive turn-key solution for perimeter protection.” Bill Brennan, President of i-Pro, also shared his optimism about the relationship, saying, "This collaboration not only broadens the awareness and deployment of our advanced surveillance cameras but also aligns us with a pioneer in video analytics to deliver unparalleled perimeter security solutions." AI-boosted video analytics The reseller relationship between PureTech Systems and i-Pro will enable PureTech to deliver plug-and-play security solutions that leverage the best in video surveillance camera technology and geospatial AI-boosted video analytics. These solutions are designed to cater to a broad range of industries looking to protect their critical infrastructure ensuring customers have access to the most sophisticated and effective security solutions on the market. Additionally, PureTech Systems will be exhibiting at ISC West in Las Vegas, from April 9-12. Visit them at booth #7055 to experience their latest security solutions and innovations, including the newly added i-Pro cameras.
Expert commentary
The autumn equinox, which marks the start of autumn, occurs this weekend on Saturday, September 23. With darker evenings ahead, the experts at ADT have shared five ways to maximize your home's security. Author's quote Michele Bennett, General Manager at ADT UK&I comments: “Opportunistic thieves use darkness to their advantage, so it’s no surprise that the number of burglaries committed increases when the darker nights draw in." He adds, "Our 2022 burglary report found that burglaries are most common at night, with 58% of burglaries occurring between 6 p.m. and 6 a.m. Taking steps to optimize your home’s security before the clocks go back this year will provide reassurance that your property is as secure as possible.” Five ways to secure your property: Get a monitored alarm installed: A visible alarm system is a strong deterrent to potential burglars, as criminals are less likely to target a home that is protected. In the event of a break-in, a monitored alarm will alert you, your keyholders and depending on the package you take out, the police, ensuring a swift response to an alarm activation. Light up the dark: Well-lit exteriors make your home less appealing to potential intruders. Install motion-activated lights around any entry points, particularly porches and gardens, which alert you to movement on your property. This will also prevent burglars from operating under the cloak of darkness and increase the chance of a passerby spotting suspicious activity. Trim your garden landscape: Thieves look for escape routes and hiding spots when deciding which homes to break into, making gardens with high, overgrown hedges more likely to be targeted. This is especially true in the darker evenings, so be sure to give your garden a thorough tidy-up to make your property less likely to be targeted. It’s also advisable to ensure any tools are locked away in sheds and garages that could assist a burglar such as ladders, or a garden spade to force entry. Be smart with your lights: Using smart plugs allows you to turn on a few well-appointed lights and radios or televisions from any location from your phone. Used in conjunction with an outdoor camera or video doorbell, you can have lamps plugged into smart plugs come on when motion is detected. Programming lights to come on at different times throughout the night will help to deter burglars by making your property look occupied. Purchase a smart doorbell or outdoor camera: Smart doorbells are an effective way to deter burglars as they provide evidence in the event of a break-in, package theft, or other suspicious activity around your home. They also notify you when someone is at your door reducing the chance of you being caught out by a late evening or early morning robbery. Further encroachment Smart doorbells also act as a deterrent to unscrupulous door-to-door sellers and con artists, as video footage is recorded. In the event of a late-night door knock, you can see and speak to whoever is at your front door, without having to open the door. ADT’s new outdoor camera also has two-way audio and a high-pitch deterrent siren so you can warn off anyone from your property to deter any further encroachment.
Daniel May of Consort reviews the integration of access control systems in healthcare settings, outlining the benefits and key considerations decision-makers must make throughout product specifications. From patient safety and traversal to the protection of sensitive data and pharmaceuticals, healthcare environments are faced with several operational challenges. And where security remains at the forefront of decision-making, modern access control systems may often hold the answers. Physical security systems Hospitals in particular have developed into multi-faceted spaces that house hundreds to thousands of patients, staff, and visitors at any one time. In England for example, research has found in the three months leading to June 2023, an average of 44,626 people visited major hospital A&E departments each day, with over 16 million attendances typically recorded over the course of a year-not to mention an additional nine million logged at other minor units. For any building, this level of sustained footfall can request severe security difficulties For any building, this level of sustained footfall can invite severe security tests. With that, the need to deploy effective physical security systems in healthcare is clear. And so, as access control continues to become more readily adopted and new products enter the market, decision-makers are reminded to consider the requirements of their building, ensuring they select the solutions most suited to their settings and budget. Security controlled Patient safety will always remain the top priority in healthcare settings, and where matters of health and social care come into question, a diverse set of professional regulatory bodies are tasked with setting and maintaining high standards. When it comes to healthcare premises specifically, patient security and perimeter security often come hand in hand and are amongst the most pressing of challenges that decision-makers must face. To help address operational planning and potential design concerns in the NHS, the Health Building Note (HBN), provides general design guidance for healthcare buildings under HBN 00-01-citing the use of access control measures as a way of maintaining security and protecting the safety of patients, staff, and visitors. Use of access control Hospital buildings control varied levels of access for a number of security purposes Hospital buildings, for example, must control varied levels of access for a number of operational and security purposes. Routine scenarios exist where vulnerable patients are under monitoring and thus refrained from exiting the premises for their own safety, while at the same time, permitted staff must be able to reach their patients and medicines when required. For this, the use of access control is key. Equally, access credentials can also help management teams keep track of those who may be entering or exiting rooms with equipment and pharmaceutical supplies, deterring any unwanted visitors and opportunists in the process. Incorporation of access control systems On a similar note, regulations have set a minimum standard for how personal data should be stored and managed in healthcare environments, giving decision-makers an added responsibility to regulate staff-controlled areas with patient medical records. While instances of personal data breaches are rare, healthcare facilities and professionals are at legal risk should confidential data be found misused or missing. As such, the incorporation of access control systems has become essential in keeping data storage areas secure, with intuitive online systems capable of permitting access to staff with the correct credentials while simultaneously tracking who has requested clearance at digital entry points. HBN guidance Healthcare experts are better fitted to control the sheer volume of people entering and exiting To function effectively, healthcare facilities must always be perceived as safe places by the people who reside within them, and as HBN guidance implies, a unified physical security system can help address key safety and security concerns while enhancing patient and staff experience. Opportunely, access control systems are more accessible and adaptable than ever and combine several technologies such as mechanical locks and automatic doors with electronic access credentials in the form of smartphone apps, badge readers, and biometric scanners. By integrating these systems into the building’s existing infrastructure, healthcare professionals are better equipped to control the sheer volume of people entering and exiting the premises without impairing the general flow of movement and coordination around the facility. Better by design Despite the clear benefits offered to healthcare facilities, there are a number of considerations to be mindful of when choosing an access control solution. Poorly implemented systems can have an adverse effect on security and functionality - quickly costing healthcare organizations time and budget to rectify and replace the inadequate products that don’t meet the building’s requirements. For that reason, decision-makers and design teams are reminded that there is no single solution that fits all healthcare buildings. As such, it’s crucial for decision-makers to understand the systems that are being put in place throughout each of the touchpoints in their facility. Clear collaboration is required during periods of specification, where together, teams can ensure the selected product works on all angles, from meeting fire safety and sustainability standards to aesthetics and scalability. Modern access control products Scalability is a key area that decision-makers must review when selecting access control systemsFrequently overlooked, scalability is a key area that decision-makers must review when selecting access control systems. Such is their diverse nature; healthcare facilities can often change and develop as years go by, and by selecting a system that facilitates growth, such as a cloud-based solution-security and efficiency is long-established. While modern access control products are known for seamless integration, there are some systems that may restrict the ability to use different vendors throughout the remainder of the building’s infrastructure. This, in effect, causes a monopolization of products throughout the estate, which can have an adverse effect on growth by increasing costs and reducing the levels of service associated with the security system already in place. Improve security and safety A scalable and reliable access control system will continue to improve security and safety by adapting to a building’s new requirements-and all while having minimal impact on its operational network. And so, while technology will no doubt continue to influence and transform the access control market, healthcare facilities and their professionals must continue to remain educated on their own systems, ensuring they have the best options in place to keep their patients, staff, and visitors safe and secure for years to come.
Security systems represent a significant investment, yet many organizations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control, and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance, or drive operational efficiencies. Consumption gap When users aren’t tapping into the full power of the solution they bought, they aren’t realizing their full return on investment. This creates a consumption gap. It’s a situation that has the potential to go in one of two very different directions. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction Left unchecked a consumption gap can create frustration for system integrators, manufacturers, and end users alike. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction. Leading to a greater likelihood that they’ll look to change or focus investment into overlapping and likely competing solutions. Customers’ security goals Addressed appropriately it can help manufacturers, system integrators, and end users to build trusted partnerships in which everybody wins. Understandably, systems integrators are primarily focused on installation—delivering reliable solutions that meet customers’ security goals to ensure their long-term success. However, engagement can go beyond deployment. Closing the consumption gap can be a strategic way to differentiate yourself from competitors. The deeper you understand your customer’s business, the better advice you’re able to offer—and the stronger the partnership you form. Why do consumption gaps exist? For customers, finding the time to learn multiple capabilities of a security system can be time-consuming. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks There are many reasons why customers may not be taking full advantage of the features available to them in their security platform. They may feel overwhelmed by a steep learning curve after deployment and might delay diving into the additional system features. Sometimes, there might be a lack of awareness of the technology’s full capabilities, and despite a willingness to learn, there are few options for training. Often, it can simply be they are not aware of the benefits of their system or are too busy with day-to-day and urgent tasks to learn other features. Bridging the consumption gap Systems are built to deal with a wide variety of use cases and broaden market appeal, but the goal isn’t to get everyone to use all the features of every product. You want to guide your customers toward the features and functionality that best meet their needs. This could entail reducing the friction they experience in their day-to-day operations, solving unique issues related to their business, or addressing their most important challenges. Having these conversations with your customers deepens your relationship and can organically open up new revenue streams. Continuous engagement allows you to recommend other relevant products or services that they may find helpful. Customized training plan Customers can learn at their own pace and gradually expand their understanding of their system Furthermore, customers are often not able to implement all features at once. You can help by proposing a plan to gradually evolve systems and processes over time. This could include a customized training plan to get the most value from their investment. Some manufacturers are also now providing learning management tools that system integrators can pass on to their customers. Customers can learn at their own pace and gradually expand their understanding of their system in accordance with their bandwidth. This allows them to get more out of their system. Simplifying deployment With the right software partners, systems integrators can focus on solving customer problems, not reactively troubleshooting issues. Look for manufacturers who offer good support systems for integrators. This includes not only quality technical support but also configuration and training services you can build on. Look for partners that offer tools and consultation services you can use to complement your value-added services, either to spend less time on the basics or for specialized expertise on complex projects. Beyond support and services, one telling sign is the configuration interface and tools that you as an integrator will primarily interact with. Ask yourself whether the manufacturer invests in their back-end tools and their primary user interface. Is there a noticeable difference between these two interfaces in terms of look and feel? Does one feel more dated? Widening consumption gap The harder it is to implement upgrades, the more reticent customers are to make the changes If the end user interface is easy to use but changes on the back end are difficult, the resulting friction can contribute to the widening consumption gap. It can become too time-consuming or difficult to upgrade or make changes to the system. The harder it is to implement upgrades, the more reticent customers are to make the changes. Configuration should be painless. If the system has a solid graphical user interface, you’ll be able to interact with the software in a fluid and intuitive way. When the system is intuitive for both you and your customers, you spend less time on setup and training. You can invest more attention in value-added activities. Conclusion A consumption gap could be a sign that technological innovation is outpacing people's ability to implement them in their day-to-day lives. You can work with your customers to simplify the adoption of the innovations so they can more easily implement them and realize the full value of their investment. By reviewing opportunities to bridge the consumption gap for your customers, you increase the likelihood of growing and renewing your system and service contracts. You also build relationships as a trusted partner. Customers will turn to you when looking to expand their security system and proactively solve new and incipient problems.
Security beat
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
Active shooter situations grab the most attention, but there is a long list of other threats facing schools, including bullying, vandalism and emergency medical situations. Broadly speaking, a comprehensive approach to school security should prioritize prevention, preparedness and response to all threats. Holistic security approach “Fostering a culture of safety within a school, which involves strong relationships, trust, and communication, is highly effective and does not require significant costs,” says Christin Kinman, End User Sales Consultant with Allegion, a security manufacturer. “It is crucial to educate stakeholders about the unintended consequences of quick fixes, like barricade devices, to ensure informed decision-making and a holistic security approach. The goal should be to promote safety and security for all, every day, in every situation.” Integrated and successful security plans While this might solve a particular challenge, it can also create unintentional conflicts" "Creating an integrated security plan requires a multi-faceted approach," says Kinman. "Too often, security measures are implemented as a reaction to either an event or a specific vulnerability. While this might solve a particular challenge, it can also create unintentional conflicts," adds Kinman. “Creating a successful security plan involves a comprehensive approach,” she says. “An effective, systematic approach begins with assessing, identifying, and valuing assets, identifying threats and vulnerabilities, quantifying the impact of a loss, analysis, and prioritization, and finally, development of mitigation measures.” Safety and Security An effective resource is the Partner Alliance for Safer Schools (PASS), which provides a framework to help with school assessments, including identifying and valuing assets, identifying external threats and internal vulnerabilities, assessing the impact of loss, and analyzing and prioritizing mitigation measures. Safety and security are words used seemingly interchangeably when it comes to schools, but they mean different things. “How we define these terms influences planning and addressing challenges,” says Kinman. “It is easiest to think of these terms as being either external or internal to the individual.” Coordinated security Safety is internal to the individual and relates to the individual’s perception of being free from harm Security is external to the individual and encompasses the protective physical, emotional, and environmental measures implemented in conjunction with policies, procedures, and training, as well as mental health measures and social and emotional learning. Safety is internal to the individual and relates to the individual’s perception of being free from harm or danger. Coordinated security measures create an environment of safety. Four main elements of physical security Kinman lists four main elements of physical security, often referred to as the 4D’s. These elements are deter, detect, delay, and deny: Deter refers to measures implemented to prevent an attack or threat from happening. These are usually visual deterrents that communicate legitimate use. Detect refers to measures that can detect the presence of a threat, such as video surveillance and monitoring. Delay refers to measures that slow down an attack or increase the level of effort needed for an incident to occur. Finally, deny refers to measures that prevent or restrict access to valued assets. Four layers of ground perimeter A layered approach to school security creates “layers” that must be defeated for an event to occur, says Kinman. Typically, the four layers are the ground perimeter, the private grounds around the building, the building perimeter, and the building interior. The ground perimeter layer demarcates public vs private space, and deterrence is the primary objective. The grounds layer allows for identification of legitimate vs illegitimate users and detection is the primary objective. The building perimeter layer prevents illicit users’ intent on harm from gaining access. The primary objectives at this layer are delay/deny. The building interior protects the most valuable assets, and the denial of an unauthorized individual is the primary objective. Report on Indicators of School Crime and Safety The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic “Quantifying loss and assessing risk is one of the most important steps in creating an integrated security plan,” says Kinman, who explains that the two elements that guide this step are probability and impact. Probability is the likelihood that an event will occur, typically rated on a scale of 1-5 ranging from rare to almost certain. The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic. “Probability multiplied by impact equals risk, which has a score ranging from 1-25,” says Kinman. “The higher the score, the higher the risk.” An analysis of vulnerabilities and threats using a matrix yields a systematic approach to prioritize improvements and identify mitigation measures. For statistics on crime and safety in schools, visit the Report on Indicators of School Crime and Safety: 2022. Security improvements “The costs of school security encompass various aspects, including physical measures, personnel, training and policy enforcement,” says Kinman. “While there is no fixed amount, it often involves investments in technology, such as access control and emergency response systems. Many security improvements do not require additional funding, like training staff and students on security protocols and implementing policies to create a culture of safety.” Generally, funding for public school security is a shared responsibility among federal, state, and local governments; communities also contribute. “Striking a balance between shared responsibility and ensuring adequate resources is crucial for effective school security,” says Kinman. K-12 school security Community members and parents can donate by being vigilant and noting any suspect activities Various stakeholders play crucial roles in enhancing K-12 school security in addition to schools and communities. Stakeholders include community members, parents, local government, local law enforcement, first responders, and non-profit organizations. “Engaging these stakeholders fosters a comprehensive approach to school security,” says Kinman. Community members and parents can contribute by being vigilant and reporting any suspicious activities. Local government can support schools with funding and resources, while local law enforcement and first responders can provide expertise, conduct drills, and establish emergency response protocols. Safe and secure learning environment In addition, non-profit organizations can offer valuable resources, training, and support programs to address specific security concerns. “By involving all these stakeholders, schools can tap into a diverse range of expertise, resources and perspectives, pioneering to a more effective and comprehensive approach to school security,” says Kinman. “Collaboration and communication among these entities are vital to ensure a safe and secure learning environment for students and staff.”
Companies at GSX 2023 emphasized new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasizes ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the Mid-Market to the Cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for pure cloud, but there are benefits to be realized from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realize the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘Soft’ Features for Integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organization more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organization more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centers around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasizing performance, protection (cybersecurity), and price, their data centers are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring center where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
The University of California San Diego (UCSD) Police Department is a full-fledged law enforcement agency responsible for patrolling, investigating, and preventing crime within its jurisdiction. Spanning over 1,200 acres and comprising 900 buildings, UCSD’s campus presents unique challenges for law enforcement. The department’s Communications Division serves as the nerve center, coordinating responses to emergencies, managing communications, and ensuring coordination among officers. Garrett Williams, a seasoned Sergeant at the University of California San Diego (UCSD) Police Department, oversees the Communications Division. With over two decades of experience, Williams understands the critical role technology can play in public safety. The challenge Before partnering with RGB Spectrum, UCSD faced significant obstacles in its dispatch operations Before partnering with RGB Spectrum, UCSD faced significant obstacles in its dispatch operations. Dispatchers juggled multiple computers, including a CAD, radio, and phone computer, each requiring separate keyboards and mice. “I didn’t look to RGB to solve all my problems. However, I understood all that could be accomplished once the team showed us how the technology operated and what was possible,” Garrett Williams, Sergeant, University of California San Diego Police Department. “Three separate mice and operators constantly moving side to side to look from one to the other and then having to move their hands back and forth between control devices - anytime they have to do that, it’s slowing their workflow down; we figured there had to be a better solution,” shared Williams. “And up to 25% of our operators were suffering from repetitive movement and neck Injuries, resulting in downtime and light duty restrictions.” Why UCSD chose XtendPoint KVM-over-IP UCSD wanted a seamless KVM solution that integrated multiple systems over IP under a unified interface. It explored various options before discovering RGB Spectrum’s XtendPoint™ solution, which provides local and remote access to source computers, consolidates separate monitors into multi-view displays, and unifies control for more streamlined operation and enhanced efficiency. With RGB’s XtendPoint KVM system, UCSD grew access to the fire alarm system at each operator’s station UCSD’s key selling point was its ergonomic benefits. It offered a solution to the ergonomic challenges plaguing dispatchers by minimizing the need for multiple keyboards and mice. So did replacing monitor clutter. With the XtendPoint solution, single-signal monitors are consolidated on each console using multiview displays that can handle up to four computer signals each or up to eight signals displayed on just two pieces of glass. A notable feature of this solution is the ability to offer each operator customized display viewing, even in a multi-shift operation. A KVM-over-IP backbone offers additional benefits. Before, only one dispatcher station could see the fire alarm system. With RGB’s XtendPoint KVM system, UCSD expanded access to the fire alarm system at each operator’s station. Now, no matter where dispatchers are seated, they have access to all needed systems. How UCSD uses RGB’s solution The RGB Spectrum solution marked a significant turning point for UCSD’s dispatch operations. Dispatchers experienced a dramatic improvement in efficiency, ergonomics, and situational awareness. Gone are the days of dispatchers juggling multiple control devices. With a unified interface, dispatchers can control all systems from a single keyboard and mouse. A streamlined workflow accelerated response times and reduced errors. Video integration proved invaluable. Dispatchers can now access live video feeds and additional mission-critical systems directly within one system interface, providing them with real-time visual information as required. With a unified interface, dispatchers can control all systems from a single keyboard and mouse Additionally, support for video integration with a video wall provided opportunities for enhanced collaboration and situational awareness. Commented Williams, “The flexibility of the RGB system also allowed UCSD dispatchers to leverage video wall capabilities. They can easily share critical information and task lists with colleagues. A more collaborative environment has facilitated communication and coordination among dispatchers, ensuring that tasks are efficiently managed and prioritized during high-stress situations. We can use the RGB system to throw things up on the wall so other dispatchers can see what’s happening and interact as needed.” “In addition," said Williams, “the resilience of the RGB XtendPoint system is invaluable in maintaining operational continuity. For example, in the event of a problem at a station, technicians can work on the issue while the dispatcher moves to a backup computer or station, allowing dispatchers to continue critical work without interruption. This proactive approach to system maintainability and resilience saves time and resources and ensures that dispatch operations remain fully functional at all times.” The result The impact of XtendPoint KVM-over-IP on UCSD’s dispatch operations has been profound. UCSD witnessed significant improvements in efficiency, ergonomics, and situational awareness. Efficiency soared as dispatchers seamlessly controlled multiple systems from a single interface. Ergonomic issues were mitigated, and dispatcher morale improved, enabling dispatchers to respond more effectively to emergencies. Future plans with RGB Spectrum Williams is enthusiastic about the wraparound monitors RGB has announced Looking ahead, UCSD sees opportunities to leverage RGB Spectrum’s technology further to enhance operations. RGB system’s versatility also enables UCSD to adapt to evolving threats and emergencies. In the event of, say, a building evacuation or siege, for example, UCSD could almost immediately establish a satellite facility. Williams is enthusiastic about the wraparound monitors RGB has announced. “We are looking at RGB’s new, yet to come to market, 43-inch curved monitors that will be the finishing touch for even better ergonomics and a customized workspace.” Another potential interest is a “flyaway” kit, a transportable command-and-control system with integral radio access. This mobile system would enable UCSD to monitor special events, such as festivals, where real-time situational awareness is crucial for ensuring the safety of attendees and staff. Williams notes, “We can have a mobile command post set up near a festival or special event, take one of our dispatch systems and put it there without having to move a lot of equipment or figuring out how to get it on the network.” Implementing RGB Spectrum’s solutions UCSD also aims to extend the reach of its dispatch operations by providing in-the-field personnel with access to real-time information. By equipping mobile units with RGB’s AV-over-IP systems via smartphones, police officers could receive critical updates and better collaborate with dispatchers to respond to incidents. “If you think of the unthinkable, like a school shooting, it would be ideal to share live coverage of what’s happening, detailed building schematics, and info on weapons the assailant might be using. Who doesn’t want to know what’s potentially happening behind closed doors before walking in? It’s situational awareness on a whole new level,” commented Williams. The partnership between the UCSD Police Department and RGB Spectrum has proven successful. By implementing RGB Spectrum’s solutions, UCSD transformed its dispatch operations to achieve unprecedented levels of efficiency, ergonomics, and situational awareness. And it is just a start.
Wetlands, the "kidneys of the Earth", are considered one of the three major ecosystems on Earth, along with forests and oceans. Hosting a diverse range of terrestrial and aquatic plant and animal species, wetlands serve as crucial habitats for numerous bird species. Red-crowned cranes Beautiful Wetlands vs Critically Endangered Cranes The Red-crowned Crane is considered as the "God of Wetlands" and is highly sensitive to environmental changes. It is one of 14 bird species in China classified as critically endangered, with only around 2,000 wild Red-crowned Cranes remaining worldwide. Monitoring these rare bird species not only aids in their effective protection but also reflects changes in the wetland ecosystem to some extent. Red-crowned Cranes migrate between the regions of East China and Northeast China In China, during spring and autumn seasons, Red-crowned Cranes migrate between the regions of East China and Northeast China, requiring wetland management personnel to make all necessary preparations in advance every year. Recording and tracking data (e.g. time of arrival/departure, and total number) play a significant role in monitoring both the Red-crowned Cranes and the wetland ecosystem. Hence, monitoring rare bird species is essential not only for their conservation but also for understanding the changes in wetland ecological environments. Vigilant cranes, eager for improved, smarter observation However, Red-crowned Cranes have extremely strong vigilance. Even while foraging or resting, there are often adult birds designated to be on alert, making warning calls and taking flight if any danger is detected. Therefore, it becomes challenging for monitoring personnel to observe them up close, as they need to maintain a distance of several hundred meters using binoculars to avoid disturbing the cranes. Such limitations in observation pose difficulties in monitoring the population distribution and activities of Red-crowned Cranes. To achieve efficient and intelligent monitoring while minimizing human interference, many wetlands have enlisted the assistance of an intelligent "avian expert". Dahua: the guardian of cranes with smart technologies In recent years, avian intelligent recognition systems have been increasingly applied in wetland monitoring. Dahua Technology actively explores the integration of technology and wetland conservation to support the monitoring and protection of bird species across multiple wetlands. Rare bird species like the Red-crowned Crane can be automatically identified and counted By employing high-point video footage combined with avian intelligent recognition algorithms, rare bird species like the Red-crowned Crane can be automatically identified and counted. This allows monitoring personnel to discover and observe various bird species clearly and promptly without disturbing them. Additionally, techniques such as background removal and contour deformation processing help reduce the interference caused by lighting conditions and backgrounds, ensuring that the footage presents the identifying characteristics, location, and time for each bird. With this approach, comprehensive and accurate data recording and result analysis can be achieved without disturbing the Red-crowned Cranes up close. A brighter future for biodiversity using intelligent analysis In addition to population counting, vocalizations play a crucial role in bird research. By utilizing voiceprint recognition, it becomes possible to track and study the population distribution of rare bird species. Many regions have established and improved databases of avian vocalizations, creating a foundation for biodiversity monitoring and analysis. These databases, combined with visual identification, are being cataloged in order to facilitate more comprehensive research and analysis, optimize timely conservation measures, and enhance dynamic and diverse science communication and education. Dahua Technology continues to empower biodiversity conservation through technology. The Dahua AI platform enables continuous algorithm training that helps reduce the development cycle of recognition algorithms for specific species. At present, Dahua has developed over 800 bird recognition algorithms, with more than 500 focused on waterfowl and migratory birds primarily inhabiting wetland environments. This extensive collection of algorithms greatly supports and contributes to biodiversity conservation efforts around the globe.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution has been deployed by Michigan’s Pontiac School District (PSD) to protect students and faculty against gun-related threats. Pontiac School District (PSD) PSD includes nine schools and takes pride in offering its students work-based learning opportunities in industries such as Health Sciences, Business/Finance, and Hospitality/Tourism. The district is also at the forefront of security innovation, adding ZeroEyes to a multi-layered approach that includes a visitor check-in system, smart sensors, and video management software, among others, to provide a safe and secure educational environment. Enhance security and safety “At Pontiac, we've dedicated significant resources to fostering opportunities for students, and we've witnessed the positive impact rippling throughout our community,” said Dr. Kimberly Leverette, Interim Superintendent of Pontiac School District. Dr. Kimberly Leverette adds, “Our mission is to cultivate our schools as safe havens, and with ZeroEyes, we can enhance security and safety both during and after school hours.” AI gun detection and intelligent situational awareness software If a gun is identified, images are instantly shared with the ZOC, staffed 24/7/365 by specially trained U.S. military ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement and PSD staff as quickly as 3 to 5 seconds from detection. Gun-related violence “In the past few years, the state of Michigan has experienced great hardship when it comes to gun-related violence,” said Mike Lahiff, CEO of ZeroEyes. He adds, “Pontiac School District continues to show its dedication to safety and eye for innovation with its deployment of ZeroEyes.”
RecFaces, an international facial recognition software developer played an indispensable role in promoting and maintaining safety during the Brazilian Carnival 2024. The company's one of the best and highly accurate products, Id-Guard, was applied to secure an open-air carnival and turned out to be a great solution to the security challenges faced. Facial recognition software The cameras equipped with facial recognition software were placed at mobile control checkpoints, which enabled people to move around and take part in live processions happening at the venue. Because of its fast identification ability, smart surveillance, and immediate notification of unwarranted persons present in the audience, facial recognition technology proved to be a good alternative for securing big events and carnivals. Accurate threat detection alerts FRS minimizes human error and removes proximity challenges of mobile authentication FRS minimizes human error and removes proximity challenges of mobile authentication. In the present-day security landscape, FRS becomes prominent as it contributes to the overall security of big public places, by producing quick but accurate threat detection alerts. Id-Guard's performance Maria Kazhuro, Business Development Director of RecFaces in the LATAM region, expressed pride in Id-Guard's performance, stating, "We are proud to say that our solution has once again performed exceptionally well in supporting security services during a mass outdoor event even under complex conditions of low light, high traffic, masked visitors and crowd." Maria Kazhuro adds, "Confidence in the quality of our facial recognition solutions allows us to look forward to the future with optimism and meet the demands of the most discerning customers. As expected, Id-Guard was vastly praised for being the best solution that elevated the security of the event." Public safety RecFaces will remain in the lead of technological innovation, and thus, it will support and ensure the enhancement of public safety and the well-being of citizens. While Brazilian Carnival 2024 progressed, RecFaces gained a reputation as an indispensable partner ensuring visitors’ safety with its novel facial recognition technology.
GX-MAX-DT35B Smart Care Medical Alarm comes with a brand-new case design. The battery level and the cellular signal strength will be indicated through the white bar on the top cover. The system supports VoLTE (voice over LTE), offering better quality of voice communication and calling experience. In addition, the current status of the system, for example, in learning mode or alarm reporting, will be also indicated through the LED backlight of the large Help button. Users can always be informed of the system status and have peace of mind. GX-MAX-DT35B GX-MAX-DT35B Smart Care Medical Alarm is an all-in-one wellness and personal safety medical alarm solution GX-MAX-DT35B can be compatible with Bluetooth medical devices, like blood glucose/blood pressure monitors, pulse oximeters, etc., to track medical data and remote monitoring directly from caregivers/physicians; and also has telecare alarm features, including emergency monitoring, inactivity monitoring, voice control, and home automation capabilities to assist seniors to have a more secure, healthy living. GX-MAX-DT35B Smart Care Medical Alarm is an all-in-one wellness, and personal safety medical alarm solution, bridging medical health monitoring and emergency alarms to keep seniors safe in their own homes. Functions Bluetooth Medical Device Pairing GX-MAX-DT35B is compatible with BluetoothMedical devices, like blood pressure/blood glucose monitors, pulse oximeters, thermometers, etc., to track health and medical data and allow caregivers/physicians to remotely monitor and provide treatment as needed. Wi-Fi Hotspot GX-MAX-DT35B can serve as a Wi-Fi hotspot, allowing users’ computers, smartphones, or other devices to connect and access the Wi-Finetwork. Smart Home Automation ZigBee, Z-Wave, or Bluetooth automation devices are incorporated into GX-MAX-DT35Bcreates a smarter and safer home, by autotuning on hallway lights at night to decrease the chance of a fall; or auto turn on the heater if there’s a sudden temperature drop. Location Tracking GX-MAX-DT35B can be paired with the BRPD-1 Bluetooth pendant, a small wearable panic button that partners with a smartphone application for GPS location reporting and triggers a help alarm with one button press, whether the user is at home or out for a walk. Connected for Healthier, Secure Living Voice Control GX-MAX-DT35B is compatible with Google Home and Amazon Alexa voice control to control home electronic devices, allowing seniors to use their voice to make their environment more suitable without lifting a finger. Pivotell ® Advance Automatic Pill Dispenser GX-MAX-DT35B is compatible with Pivotell ®Advance Automatic Pill Dispenser, keeping secure of all pills, reminding users to take their medication, keeping track of their medicine intake, and allowing caregiver/physician to monitor pill-taking results/records, and keeping an eye on user needs. Voice over Internet Protocol (VoIP) &DECT GX-MAX-DT35B’s built-in VOIP function allows users to initiate two-way voice calls to contact CMS and family members during alarms and emergencies. With a built-in DECT module (forGX-MAX5/8 models) or plug-in EX-1 DECT module (for GX-MAX15/18 models), GX-MAX-DT35B can pair with voice extenders, talking pendants, call points, etc., placed around the home to create a safety net and peace of mind. Visual Monitoring and Verification GX-MAX-DT35B can integrate Camera PIR Motion Sensors to deliver real-time visual monitoring and verification. When an emergency occurs, alerts are immediately sent to family members, and the Monitoring Center to verify the event and send immediate assistance as needed. Safety & Inactivity Monitoring GX-MAX-DT35B can support wireless sensor devices, allowing users to add in smoke detectors, water leakage sensors, and gas sensors to monitor emergencies; and motion sensors, door contacts, sensor pad transmitters for inactivity monitoring, to build a healthier, safer independent living. Features Communication Path Options: IP (Ethernet), LTE. Support for VoLTE (Voice Over LTE). Built-in Module: RF (for all models), DECT (for GX-MAX5/8 models). Optional DECT Module (for GX-MAX15/18 models). Protocol Module Options: Zigbee, Z-Wave, Bluetooth. Wi-Fi hotspot capability. Support external antenna capability (GX-DT35B-EX only). Able to support multiple Communication protocols with Monitoring Centers for Alarm Reporting. Compatible with Bluetooth (BLE) medical devices. Voice over Internet Protocol (VoIP) capabilities. World-class certified RF range, reliability, and performance. Supports Pivotell ® ‘Advance’ Pill Dispenser integration. ZigBee or Z-Wave compatible home automation features. Compatible with Amazon Alexa & Google Home voice control. 24/7 Environment Safety Monitoring. Energy Management Capabilities. Voice Prompt feature alerts the user upon designated events and status. Comprehensive help/nurse arrival function. Multi-color of the Help button backlight to indicate the current status of the system. Multi-party emergency intercom system capability. Supports multiple programming methods. Automatic check-in reports. Remote firmware update capabilities.
A large-scale sporting event in Chile expects a huge influx of people during their games, prompting the implementation of robust security measures in the venues. The organizers require an efficient and intelligent security system that can manage the entry and exit of spectators, prevent accidents, and detect and handle any abnormal situations in time to ensure the safety of all people during the event. Sporting event challenges The event organizers needed to ensure the safety of the people attending the event, as well as the security of the athletes and staff on the field. The following are the main challenges they encountered: Difficult management: There are several competition venues, which require monitoring of both internal and surrounding areas. The monitoring scope is massive and manual monitoring is inefficient, making it difficult to detect abnormalities and handle them in time. Preventing intrusion and entry of dangerous goods: It is extremely challenging to manually monitor each person entering the venue. The security staff cannot efficiently conduct manual inspections to check people’s items all the time. Challenging security deployment: Security personnel are scattered at various locations on the site. In the event of an emergency, they will not be able to respond in time. Dahua's solution Dahua, together with its local partner, took on the challenge of providing an effective monitoring solution tailored to the sporting event. HD PTZ Cameras: By using HD PTZ cameras (e.g. 2MP 25x Starlight IR WizSense Network PTZ Camera), a wide range of high-definition real-time images are provided via a small number of monitoring points, covering public areas of various venues and significantly improving system deployment efficiency. Security inspection equipment and various intelligent algorithm applications: Walk-through metal detectors were deployed at entrance and exit areas to help prevent people carrying dangerous items from entering the venues. Several cameras (e.g. 4MP IR Vari-focal Vandal-proof Dome WizMind Network Camera) equipped with intelligent functions such as perimeter protection, preset points tour, etc. were also utilized to help detect intrusions and suspicious individuals in time. Intelligent recognition and alarms help security personnel to detect high-risk individuals and respond accordingly. Fully functional Command Center: All devices are connected to the DSS platform, achieving unified management across multiple venues and facilitating coordination of security personnel across different locations. The Command Center is equipped with highly efficient monitoring screens, control keyboards, and decoding boxes. Efficient and intelligent security system Dahua's solution utilizes intelligent and efficient scene-based devices to achieve full video surveillance Dahua and its local partner successfully deployed an efficient and intelligent security system for such a large-scale sporting event. Dahua's solution utilizes intelligent and efficient scene-based devices such as PTZ cameras and intelligent recognition cameras to achieve full video surveillance coverage, significantly enhancing system deployment efficiency. Control Center With the aid of the Control Center and intelligent algorithms, abnormalities were accurately detected and the manual workload of security personnel was greatly reduced. The application of security inspection equipment prevents the entry of dangerous items and ensures safety and security in the game venues. This solution is a notable example of such a scenario and can be applied in other large-scale sports events. Enhancing security and safety “It has been a great honor to be part of this grand sporting event,” says Jason Jin, Project Team Member, and Product Manager at Dahua Technology. "Moving forward, we will continue to develop intelligent products and solutions that can be applied in various types of events to enhance their security and safety, enabling a smarter society and better living."
Products
Round table discussion
In the United States, they are called license plate recognition (LPR) systems. In Europe, the more common term is automated license number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle color, type, make, and model. We asked this week’s Expert Panel Roundtable: What's new with license plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?
Historically, the emphasis of security systems has been on reactivity, whether it’s providing video evidence of an incident or data to support a resulting investigation. Reactivity is core to impactful security, but increasingly, systems are also seeking to be more proactive. A proactive system seeks to prevent events from happening in the first place, thus mitigating the harm to an organization, and making the need for a reactive response moot. We asked this week’s Expert Panel Roundtable: How can security systems be proactive? Please provide a couple of examples.
Some systems and assets are so vital that their incapacity or destruction would have a debilitating impact on security, economic security, public health or safety, or any combination of those factors. This so-called critical infrastructure has historically faced many complex threats. In 2023, we can add growing concerns about cybersecurity to the mix. We asked this week’s Expert Panel Roundtable: What is the largest risk to critical infrastructure in 2023? How can we address it?
Videos
Perimeter protection: Manufacturers & Suppliers
- Dahua Technology Perimeter protection
- Hikvision Perimeter protection
- Senstar Perimeter protection
- Bosch Perimeter protection
- DSC Perimeter protection
- OPTEX Perimeter protection
- Visonic Perimeter protection
- Climax Technology Perimeter protection
- eneo Perimeter protection
- ITI Perimeter protection
- RISCO Group Perimeter protection
Multi-Residential Access Management And Security
DownloadGuide For HAAS: New Choice Of SMB Security System
DownloadPrecision And Intelligence: LiDAR's Role In Modern Security Ecosystems
DownloadHikvision: Solar Powered Product Introduction + HCP
DownloadGunshot Detection
Download