School security
A wider group of customers can now experience the benefits of Dicentis Hybrid Meetings with the latest rollout of this cloud-hosted end-to-end hybrid conference solution. The technology update is part of an ongoing mission of Bosch Building Technologies to meet the rapidly evolving needs of the modern professional conferencing environment. Hybrid meeting environment Dicentis Hybrid Meetings is a fully native end-to-end solution that ticks all the boxes for highly efficient, legally compliant...
For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdles. A majority of public-school districts today are faced with outdated infrastructure and security controls, requiring necessary upgrades. By addressing these concerns head on, schools will ensure a safer environment for both students and staff, mitigating risks posed by unforeseen physical and digital threats. Common...
ASIS International, the world’s largest association for security management professionals, has announced its programming lineup for Global Security Exchange (GSX) 2024 with in-person and digital experiences taking place 23-25 September at the Orange County Convention Center in Orlando, FL and via the online GSX event platform. "Pioneering this year’s Selection Committee has been a privilege," said Dr. Diana M. Concannon, PsyD, PCI, CTM, 2024 GSX Selection Committee Chair. "Our...
AlarMax, a pioneering national distributor of security, audiovisual (AV), and low-voltage products, appointed James Ure as vice president of sales and marketing. With rich expertise in product development, business strategy and customer engagement, along with a lifelong enthusiasm for AV technologies, James will be an asset to AlarMax as it continues to grow within the residential and pro AV categories. Prior roles of Ure Driven by a passion he discovered in elementary school, Ure&rsquo...
Metrasens, a provider of advanced detection systems for security and safety applications, is pleased to announce its partnership with the Central Indiana Educational Service Center (CIESC), which provides cooperative purchasing programs for member school districts across Indiana. Through this partnership, CIESC member schools, as well as 270 other districts that are members of other Education Service Centers (ESC) across Indiana, can purchase Metrasens Ultra weapons detection systems through th...
Nuke From Orbit, a UK fintech startup, has unveiled findings from its latest research report, ‘Evolving smartphone usage and the growing threat to consumers’. The report sheds light on a concerning trend in smartphone thefts, indicating that in 62% of cases in the UK, the repercussions extend far beyond the initial loss of the device. Digital theft victims According to the research, not only were respondents' social media and email accounts accessed, but one in four individu...
News
ISC West 2024, the comprehensive and converged security trade event, hosted in collaboration with premier sponsor the Security Industry Association (SIA), delivered another year of successful programming and welcomed more than 29,000 security industry professionals to The Venetian Expo in Las Vegas. Improving customer experience ISC West elevated the customer experience by hosting both fan-favorite and brand-new offerings throughout the four-day event, which featured over 750 exhibitors, over 220 speakers, and over 110 education sessions covering the latest trends and solutions across the security industry. “This year, we were excited to continue to enhance the customer experience,” said Mary Beth Shaughnessy, ISC Event Vice President. ISC West Concert “From an additional 20,000 square feet on the show floor, approximately 100 more exhibiting brands, and events like the first-ever ISC West Concert featuring The Wallflowers, attendees had access to our most expansive lineup yet." "This year’s resounding success is the result of so many individuals – exhibitors, attendees, speakers, and partners. We’re already excited for 2025 and look forward to continuing to raise the level of engagement at future ISC Security events.” Innovations in safety and security Attendees had the opportunity to make impactful connections with their peers in the field ISC West welcomed a swarm of security professionals from around the world. Attendees and exhibitors alike were able to see, experience, and learn about the biggest innovations in safety and security. Just as importantly, attendees had the opportunity to make impactful connections with their peers in the field. The turnout continued to display year-over-year growth for general attendance, hosting over 19,000 attendees. SIA Education “ISC West 2024 was a resounding success, not just in the strong show attendance but also in the outstanding quality of SIA Education at ISC West programming, courses and offerings delivered,” said SIA CEO Don Erickson. “The strength of the security industry was richly evident in the innovations seen across the show floor and particularly visible in the SIA New Products + Solutions Awards entries." SIA meetings and special events "The many SIA meetings and special events that gathered the broader security industry together to connect on critical topics in artificial intelligence, cybersecurity, critical infrastructure protection, school security, technology standards, and more elevated the ISC and SIA member experience." "The 2024 show exemplified why our ISC West is the nation’s pioneering converged security event.” ISC West 2024 highlights All ISC West badge holders were granted complimentary admission where they could meet their peers First-ever ISC West Concert! - New in 2024, ISC West hosted its first-ever concert featuring the Grammy-winning rock band The Wallflowers as the headliner. It was an after-hours concert experience that took place on the Main Stage – just steps from the show floor. All ISC West badge holders were granted complimentary admission where they could meet their peers for a fun and memorable experience beyond exhibit hall hours. The ISC West Concert was presented by Headline Sponsor, Wavelynx. Showcasing latest advancements AI Discovery Zone - ISC West also debuted the AI Discovery Zone where attendees could experience the emerging power of AI firsthand. Those who stopped by the activation had the chance to engage with interactive displays and hands-on demonstrations showcasing the latest advancements in AI technology and how it is shaping the future of security. Keynote series - The dynamic trio of Keynote Speakers covered a range of the industry’s hottest topics. Attendees were able to walk away from these presentations with a greater understanding of how cutting-edge security innovations touch countless aspects of their lives from national security to professional sports leagues to workplace productivity and much more. Day 1 Keynote: Cybersecurity, the Big Picture for Industry Pioneers: Admiral Mike Rogers, Former Director, of the National Security Agency; Former Commander, of US Cyber Command; and Former Chief, of Central Security Service Day 2 Keynote: From the Front Lines to the Field: A Security Journey in Major League Soccer: Jeff Stonebreaker, Senior Vice President, Safety and Security for Major League Soccer Day 3 Keynote: Women in Security Forum Keynote Breakfast: Harness Generative AI Like ChatGPT for Enhanced Performance | Presented by SIA Women in Security Forum: Crystal Washington, Technology Trends Expert and one of Forbes’ 50 Pioneering Female Futurists Most innovative technologies SIA New Products + Solutions Awards - The SIA New Products + Solutions (NPS) Awards allowed attendees to discover the current most innovative technologies with winners from across the security field. Explore some of the top winners below and the full list of winners here. Best New Product Award: IronYun – IronYun Vaidio AI Vision Platform 8.0 Judges’ Choice Award: Swear – Swear Authenticity Engine SIA NPS Merit Award: Chris Grniet – Global Head of Global Security & Safety (GSS) Strategy at Visa Inc. ISC West 2025 With attendees eager to network, conduct business, and learn from experts, show organizers look forward to ISC East 2024 – the Northeast’s pioneering security and public safety trade event held November 19-21 at The Jacob K. Javits Convention Center in New York City, in collaboration with premier sponsor SIA and partnership with ASIS NYC. Already making plans for next year? Save the date for ISC West 2025, held from April 1-4 at The Venetian Convention and Expo Centre in Las Vegas where security professionals can continue to experience the largest and most dynamic industry trade event of the year.
Schneider Electric, the pioneer in digital transformation of energy management and automation, announced a new partnership with IPConfigure, a managed service provider of business security, to integrate cutting-edge video surveillance solutions into Schneider Electric's EcoStruxure™ Buildings platform. The combination of Schneider Electric's Access Expert and Security Expert products with IPConfigure's Orchid video management system (VMS) will provide an unparalleled security ecosystem, offering a comprehensive and integrated solution for protecting people, assets, and data. Orchid is the industry's simplest and most scalable video management platform, highly adaptive to both greenfield and existing security projects. The platform offers an intuitive user experience accessible from any device. Orchid will be integrated with EcoStruxure's two security technology platforms: Security Expert, which unifies physical access control and intrusion detection, and Access Expert, which offers mobile cloud security with video monitoring, alarms, visitor management, and building operations. The partnership empowers customers to streamline the adoption of a comprehensive building solution encompassing efficiency, security, and occupant needs, significantly simplifying the process through a new, scalable cloud management tool. Future-proof buildings "The partnership with IPConfigure reflects Schneider Electric's commitment to a digital future that offers our channels and customers long-term technology solutions that modernize and future-proof buildings," said James Mylett, Senior Vice President of U.S. Digital Buildings at Schneider Electric. "Matching the needs of the customer with both Schneider Electric and IPConfigure's standard of providing a single-source, simplified security management and building operations tool has always been top priority, in addition to excellent service, insight and leadership for our products." EcoStruxure EcoStruxure and Orchid's flexible, intuitive Security Solutions are currently being used by global and national enterprises, including some of the largest fast-food companies, retailers, and school districts in the U.S. Features of Orchid that will be integrated with EcoStruxure include: On-Premise and Cloud Options: Orchid supports single to multi-site configurations locally or via the cloud. It offers solutions for both private networks, hybrid cloud (local recording with cloud management), or pure cloud configurations. OS and Hardware Agnostic: Orchid can be installed on Windows or Linux devices to record thousands of different camera models using open standards such as Open Network Video Interface Forum (ONVIF). Scalable Recording Environments: Orchid enables the recording and management of any number of cameras, locations, and users through a single interface, accommodating from one to an unlimited scale seamlessly. Customizable Interfaces: Orchid utilizes open standards, providing a complete web browser interface and an open API for seamless third-party integrations. The accessible RESTful API enables effortless customisation and script development for both technology partners and customers. Seamless User Access: A refreshingly intuitive, browser-based interface has been shown to encourage swift adoption and increased usage of the camera system. Single Sign-On integrations automatically adjust users to allow secure access throughout changing roles in the organization. Easily grant permissions access to selected capabilities, cameras, and locations with specific users and user groups. Digital security needs "Our Orchid video management platform embodies simplicity at its core, offering users a seamless and straightforward solution," said Christopher Uiterwyk, CEO of IPConfigure. "Pairing it with EcoStruxure equips users with the precise technology needed to swiftly and decisively address their digital security needs with unparalleled efficiency and effectiveness." Orchid's integration with Schneider Electric's EcoStruxure Buildings platform will put pioneering video security technology into EcoStruxure's existing energy management tools that outfit new and existing buildings with smart technologies that enable measurement of energy usage. This integration extends both companies' global reach, delivering deployment for global architectures and substantial benefits to multinational customers seeking enhanced security and energy efficiency solutions
Johnson Controls, the global pioneer for smart, healthy, and sustainable buildings, is showcasing the latest security innovations for small to mid-sized commercial facilities during ISC West. The expo is happening April 10-12 at the Venetian in Las Vegas. At booth 18033, Johnson Controls is displaying the latest solutions for scalable, user-friendly access control and video surveillance for small to mid-size commercial facilities like schools, churches, and retail stores. Hassle-free software and cameras “At the heart of the Johnson Controls strategy is our dedication to deliver straightforward, scalable security solutions,” said Faisal Pandit, vice president and general manager of Global Security Products at Johnson Controls. “For example, this year’s ISC West attendees can see how we're transforming the security industry with integrated, hassle-free software licensing and secure camera deployment solutions crafted to expedite and simplify the installation process, making it more intuitive than ever before.” Intuitive, scalable systems Dealers design scalable solutions that reduce cost, save time, and minimize system complexity for customers Against the rapidly changing security landscape, implementing a video surveillance system that is robust yet easy to use can be a challenge. As a result, many small to mid-size facilities remain unprotected or operate using outdated systems that make them vulnerable to threats. Highly intuitive systems with critical features built in, like cybersecurity and open standards interoperability, enable dealers to design scalable solutions that reduce cost, save time, and minimize system complexity for customers of any size. exacqVision video management software (VMS) The new release of exacqVision video management software (VMS) is performance-matched with network video recorders (NVRs) and the Illustra line of cameras to maximize value and simplify out-of-the-box installation and maintenance. All software is factory-installed on exacqVision recorders and provides free IP channel licenses for Illustra Pro & Flex cameras, with automatic cybersecurity hardening as part of the camera discovery and onboarding process. This helps ensure systems can be implemented and running within minutes. Empower access control User-friendly systems that harness the power of connectivity not only protect against potential threats and intrusions Access control is more important than ever before. User-friendly systems that harness the power of connectivity not only protect against potential threats and intrusions but also enhance the experience for authorized building occupants, creating a process that is convenient and positive. Digitally connected platforms such as Kantech streamline monitoring using cloud-based applications that are ready to use right out of the box. Safety and accessibility Access controls can be managed from a workstation or mobile device. Schedules, parameters, and connected devices can be adjusted quickly and easily to ensure safety and accessibility are always a priority. The result is a holistic, enterprise-level viewpoint without unnecessary complexity.
Allegion US, a pioneering provider of security solutions, technology, and services, will be exhibiting and demonstrating new interoperable electronic access control technologies and software at the ISC West 2024 (booth # 20055), the security industry's most comprehensive and converged trade show occurring from April 9-12, 2024, at the Venetian Expo in Las Vegas. "At Allegion, we're committed to innovation that links the world to seamless and secure access in the places we live, learn, work, and connect," says Mark Casey, Vice President of national electronic sales at Allegion. "We take pride in connecting our customers to top-tier partners in the industry, the most advanced hardware and mobile credentials, and the most interoperable technology platforms. Our goal is to provide the best access control solutions to make others' lives easier and safer, and we're excited to have the opportunity to showcase that at ISC West this year." CSA and FiRA consortium SwiftConnect feeds clients with the revved adoption of NFC access control and seamless access affairs Allegion's commitment to being the partner of choice is rooted in being able to serve customers holistically-from design and collaboration tools to hardware, software, and the technology relationships that ultimately give customers the freedom of choice. Through the Allegion Alliance Network, Allegion develops collaborative relationships with other companies to provide a broader range of products and services. In addition, participation with the Connectivity Standards Alliance (CSA) and the FiRA consortium provides cutting-edge, cross-industry collaboration with a focus on solving for end-user needs. And collaboration with pioneering companies like SwiftConnect provides customers with accelerated adoption of NFC access control and seamless access experiences. Latest products and solutions Allegion, with its four SIA Power 100 honorees, will be connecting with attendees and showcasing its latest products and solutions, including: Schlage® NDE and LE mobile-enabled wireless locks with Si option: Winner of Securityinfowatch's Reader's Choice Awards, these interoperable solutions are ideal for customers using HID iCLASS®, iCLASS SE®, Seos® smart or NFC mobile credentials, including those using HID iCLASS Standard or Elite Keys, who want to extend access control further into their buildings using Schlage intelligent wireless locks. This new option gives security directors and facility managers the power to leverage their existing credential investment and choose the solution that fits the needs of their sites, furthering Allegion's commitment to being open, interoperable, and flexible. Schlage XE360: Building on the innovation of Schlage electronic locks, the recently launched XE360™ Series is the next generation of wireless electronic lock from Schlage made to fit the needs of a wide range of common area openings. Its sleek design offers customers a solution that looks as good as it performs – at an affordable price point. The Schlage XE360™ series presents multifamily property owners and managers with a unique opportunity to increase operational efficiencies, drive revenue and enhance renter acquisition and retention. Student ID: With Schlage Mobile Student ID, students can add their student ID to Apple or Google Wallet to access their residence hall, purchase food and gain access to the big game, all with the tap of their phone or watch. Campuses enjoy other benefits such as increased security, a reduction in card fraud and operational efficiency. Issuing credentials is fast and easy; plus, they are distributed virtually, making student provisioning convenient and contactless. Employee Badge: With the wallet-based Schlage employee badge, users can seamlessly access office buildings and other workplace amenities with a tap of their phone or watch - no need to unlock their device or open an app. Issuing employee badge credentials is easy, secure, and virtual for contactless employee provisioning. Overtur: Overtur™ is a cloud-based solution from Allegion that enables project teams to work together on the design, construction, and management of door security and openings from any location. It offers a central hub to store, update, and verify door hardware specifications and choices, with seamless integration with pioneering industry tools. Overtur also has features like Installation Status, Punch List and Site Survey that make it easier to collect and organize onsite data in one place, reducing the reliance on paper and manual processes. Zentra: Zentra™ is redefining security with a seamless solution designed to solve the everyday problems of multifamily property access. Property owners and managers can run operations efficiently on one single access system, while providing their residents with a seamless security solution across the property. Patented Schlage Indication Trims: With some of the largest windows on the market and patented 180-degree views, Schlage's new indication trims provide enhanced lock status visibility, allowing for quick confirmation that doors are securely locked from various positions in the room. Nowhere else is there a greater need for this than in K-12 and higher education settings. The new line of Schlage Indication Solutions builds upon Allegion's indication product portfolio, including Von Duprin security indicators, that were designed for high-occupancy areas. Allegion experts Show attendees are also encouraged to join Allegion experts at the following events: Accelerated Learning Through Gaming: This education session will teach security professionals how to incorporate immersive gamification into their educational trainings to improve content retention and the student's learning experience. The event takes place in the Career Zone on Thursday, April 11, from 1-2 p.m. PT. Mission 500 Security 5K Run/2K Walk: Join Allegion team members in a race for a cause on Thursday, April 11, from 7:30-8:30 a.m. PT. Mission 500 is a nonprofit organization that works closely with the security industry to serve the needs of children and communities in crisis in the United States. Funds raised will be used to benefit children in need across the country. Implement PASS Guidelines Additionally, show attendees can stop by the Partner Alliance for Safer Schools (PASS) booth #10141 to learn more about Allegion's efforts alongside PASS to improve school safety and security. Attendees can speak with on-the-floor experts to learn about how to help schools implement PASS Guidelines and avoid critical security mistakes. Security professionals who will not be attending the show in person this year can utilize Allegion's online resources including the Changing Face of School Security Podcast and a wide array of Virtual Trainings.
Shooter Detection Systems, an Alarm.com (NASDAQ: ALRM) company and the renowned gunshot detection provider of gunshot detection solutions has joined forces with the Partner Alliance for Safe Schools (PASS) to support their mission and advocate for critical school safety efforts. As part of its commitment to PASS, Shooter Detection Systems promotes the PASS guidelines for layered school safety and security among school administrators and public safety professionals. Shooter Detection Systems promotes PASS guidelines PASS guidelines provide school districts with vetted best practices for security technology, staff training, community involvement, and crisis preparation planning. SDS will also participate in the PASS School Security Town Hall, taking place at ISC West 2024, an event that commemorates PASS’ 10th anniversary. Groundbreaking SecureGrants program Shooter Detection Systems shares PASS’s deep commitment to securing K-12 learning environments As the gunshot detection provider to school districts across the country and creator of the groundbreaking SecureGrants program to help schools fund critical safety technology, Shooter Detection Systems shares PASS’s deep commitment to securing K-12 learning environments. By joining PASS, SDS expands its ability to inform administrators about technology-enabled safety options and provide guidance that helps school officials make the most effective safety decisions for their communities. PASS technical committee “We look forward to working with PASS and contributing our technology expertise to help expand their guidelines and recommendations over time,” said Rich Onofrio, Chief Technology Officer of Shooter Detection Systems. Rich Onofrio adds, “We have always believed that gunshot detection should be part of a comprehensive, layered security strategy. We are excited to work with the PASS technical committee to understand the proven benefits of gunshot detection and how the technology is a perfect fit for future additions of the PASS guidelines.”
At ISC West 2024, April 10-12, in booth 11053, Bosch will showcase solutions using visual and audio intelligence to enhance security, safety, and operations across industries, including energy and utilities, education, smart cities, and more. Intelligent Video Analytics Pro Edge-based application-specific analytics accurately detect, classify, and count objects, enabling the latest video cameras from Bosch to act as sensors, serving as the foundation for solutions that help secure perimetres, elevate safety for building occupants, and capture data for decision-making. With ongoing investments in AI resulting in an expanded suite of Intelligent Video Analytics Pro (IVA Pro) offerings, Bosch continues to increase the capabilities of its cameras to bring greater value for users. Gen2 motion detectors For securing buildings, Bosch is adding to its video systems portfolio with new intelligent cameras and will launch the Commercial Series (Gen2) motion detectors that provide even better catch performance and false alarm immunity. Enhance detection capabilities for improved critical site security and safety, Booth visitors will see solutions for detecting and deterring perimetre breaches at energy and utility sites. IVA Pro Perimetre Once detected, the analytics triggers a Bosch Mic moving camera to pan, tilt, and zoom to the object’s location Bosch cameras with Intelligent Video Analytics Pro (IVA Pro) Perimetre provide long-range, accurate detection of people or objects, including intruders who crawl or hide in tall grass. Once detected, the analytics triggers a Bosch Mic moving camera to pan, tilt, and zoom to the object’s location and track its movements with IVA Pro Intelligent Tracking. Simultaneously, the detection turns on the camera’s white light illuminator and triggers an IP horn loudspeaker to play a message, informing the intruder that they are under surveillance. This automated solution helps to deter damage or theft. Capture data to enhance safety and efficiency in smart cities Artificial intelligence (AI) is improving safety in cities, enabling cameras to extend beyond monitoring to serve as sensors that help keep vehicle and pedestrian traffic flowing efficiently with automated incident detection and alerts. By streaming metadata, these intelligent sensors equip planners and engineers with information to make data-driven decisions that enhance safety. IQsight Data Fusion cloud-based service The new IQsight Data Fusion cloud-based service transforms unstructured raw video metadata into organized data for users to generate visual insights that support decision-making. Empowering them to harness the power of video data, it offers interactive dashboards with actionable information, options for exporting data in common formats, and direct API access for easy integration with common visualization tools for more advanced analysis. A versatile solution for smart cities and other industries such as education energy and utilities, it eliminates the need for costly data architects or added hardware for analysis. IVA Pro Licence Plate and IVA Pro Make Model IVA Pro Licence Plate provides plate recognition in low-speed vehicle access control and toll booth applications For more data capture capabilities, Bosch will preview IVA Pro Licence Plate and IVA Pro Make Model, which adds Licence plate and vehicle make and model details to the metadata stream. IVA Pro Licence Plate provides plate recognition in low-speed vehicle access control and toll booth applications or medium-speed environments, such as city surveillance and free-flowing traffic monitoring. Pair video and audio AI for gun detection on school grounds The Gun Detection System from Bosch is the first to pair video and audio AI for a multi-layered approach designed to detect guns at schools. When a person brandishing a gun approaches a school entrance, two Flexidome 5100i cameras with IVA Pro Visual Gun Detection are designed to promptly alert personnel. If a gun is not visually detected, the second layer, a Flexidome panoramic 5100i camera with Intelligent Audio Analytics is designed to detect and classify gunshots while accurately estimating the direction from which they originate. The near-invisible camera-based system improves safety while offering a frictionless flow and welcoming atmosphere to promote learning. Manage video events with on-premise or cloud-based offerings BVMS offers the highest level of incident management capabilities and maximum resilience Bosch Video Management System (BVMS) - Customers have the flexibility to manage analytic alarms and view associated videos in the way that best fits their needs with on-premise and cloud-based solution options. The Bosch Video Management System (BVMS) offers the highest level of incident management capabilities and maximum resilience to deliver continuous live and playback of video for critical installations, such as for government sites and other high-security buildings. VideoView+ service - The new VideoView+ service provides instant event notifications to help users respond to alarms quickly. It is a lightweight and cost-effective cloud service for remote video surveillance that reduces hardware costs and infrastructure requirements for businesses with multiple sites. Bosch analytics also integrates seamlessly with solutions from industry partners, such as those from Milestone Systems and Genetec. Secure building interiors and exteriors AI-driven video systems and solutions can transform buildings into smart, efficient, and safe environments. The latest cameras from Bosch come with AI built-in and are suited for commercial to high-security buildings. Flexidome and Dinion camera series Each camera comes pre-installed with IVA Pro Buildings which provides advanced intrusion detection At ISC West, visitors will see the Flexidome micro 3100i dome camera with a discreet and compact design and the Dinion 3100i IR bullet camera, ideal for outdoor applications requiring a compact yet noticeable deterrent. The Dinion 5100i IR bullet camera ensures outdoor detection day and night with high image quality in low light and long-range infrared illumination. The Flexidome corner 7100i IR camera supports monitoring in enclosed spaces with a wide field of view without blind spots, excellent image quality in low light with invisible IR, and privacy masking for sensitive areas. Each camera comes pre-installed with IVA Pro Buildings which provides advanced intrusion detection in and around buildings. IVA Pro Buildings Bosch will highlight how its cameras provide complete building security in outdoor and indoor areas, including entrances and lobbies, hallways and staircases, elevators, and more. An interactive booth demonstration will showcase how combining access control with Bosch cameras featuring IVA Pro Buildings helps to detect tailgating at entrances to high-security buildings or areas. Making products smarter Commercial Series (Gen2) motion detectors incorporate MEMS sensors to deliver even better catch performance To further enhance building security, the new Commercial Series (Gen2) motion detectors incorporate MEMS (microelectromechanical systems) sensors to deliver even better catch performance and false-alarm immunity. With the MEMS sensors, the Commercial Series (Gen2) understands their orientation and will provide a visual indication to alert the installer if a detector has been mounted upside down. TriTech detectors The MEMS sensors also make it easier to identify tampering at the place of installation, such as if a person attempts to pull the detector off the wall or remove its brackets and swivel joints. These TriTech detectors offer a detection range of up to 15 metres and are suited for use inside commercial premises with a moderate to high-security risk, such as office and factory buildings, banks, and retail stores. Enhanced user interface Operating on commercial off-the-shelf Windows software, B6800-SR is simple to install, use, and maintain Fast, accurate, and reliable responses to emergency events are essential for building security. The CONETTIX B6800-SR Software Central Station Receiver is a software-based IP receiving platform that features Bosch CONETTIX IP communication technology to receive alarm messages, process the data quickly, and securely pass the information to the monitoring automation software. Operating on commercial off-the-shelf Windows software, B6800-SR is simple to install, use, and maintain. With an enhanced browser-based user interface, there is no special software to install on the operators’ workstations. Innovative intrusion technology Special for ISC West 2024, the Bosch booth will also feature a new exhibit displaying intrusion products and software throughout the years. It will show product highlights from the past, current technology advancements in control panels, keypads, and sensors, and innovations in software that will enhance the customer experience and bring new value to building security through intrusion technology. For more details on these products and solutions from Bosch, visit ISC West booth 11053.
Expert commentary
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realize, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionizing the overnight security business. Minimizing criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilizes a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimize the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is Remote Guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilize a combination of methods to effectively analyze potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyze the situation in real time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command center, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customized remote guarding When properly deployed, remote guarding systems are also customized to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional Security Shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A Bounty of Benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilize targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyze incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilize this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilizes a decentralized ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralized, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimize threats or attacks to organizations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organization. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organization to undergo authentication, authorization, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilizes the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organizations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organizations in proper data control, handling, and security. These policies guide organizations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security systems represent a significant investment, yet many organizations still only use a small percentage of their physical security systems’ capabilities. That’s before we even begin to consider the different ways that the likes of video, access control, and ANPR can add additional value beyond security by serving the needs of other business functions. Whether that be to obtain additional insight, streamline compliance, or drive operational efficiencies. Consumption gap When users aren’t tapping into the full power of the solution they bought, they aren’t realizing their full return on investment. This creates a consumption gap. It’s a situation that has the potential to go in one of two very different directions. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction Left unchecked a consumption gap can create frustration for system integrators, manufacturers, and end users alike. A misunderstanding of a system, its capabilities and functionality can quickly result in user dissatisfaction. Leading to a greater likelihood that they’ll look to change or focus investment into overlapping and likely competing solutions. Customers’ security goals Addressed appropriately it can help manufacturers, system integrators, and end users to build trusted partnerships in which everybody wins. Understandably, systems integrators are primarily focused on installation—delivering reliable solutions that meet customers’ security goals to ensure their long-term success. However, engagement can go beyond deployment. Closing the consumption gap can be a strategic way to differentiate yourself from competitors. The deeper you understand your customer’s business, the better advice you’re able to offer—and the stronger the partnership you form. Why do consumption gaps exist? For customers, finding the time to learn multiple capabilities of a security system can be time-consuming. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks. Often, taking advantage of new tools and solutions takes a backseat to the urgency of daily tasks There are many reasons why customers may not be taking full advantage of the features available to them in their security platform. They may feel overwhelmed by a steep learning curve after deployment and might delay diving into the additional system features. Sometimes, there might be a lack of awareness of the technology’s full capabilities, and despite a willingness to learn, there are few options for training. Often, it can simply be they are not aware of the benefits of their system or are too busy with day-to-day and urgent tasks to learn other features. Bridging the consumption gap Systems are built to deal with a wide variety of use cases and broaden market appeal, but the goal isn’t to get everyone to use all the features of every product. You want to guide your customers toward the features and functionality that best meet their needs. This could entail reducing the friction they experience in their day-to-day operations, solving unique issues related to their business, or addressing their most important challenges. Having these conversations with your customers deepens your relationship and can organically open up new revenue streams. Continuous engagement allows you to recommend other relevant products or services that they may find helpful. Customized training plan Customers can learn at their own pace and gradually expand their understanding of their system Furthermore, customers are often not able to implement all features at once. You can help by proposing a plan to gradually evolve systems and processes over time. This could include a customized training plan to get the most value from their investment. Some manufacturers are also now providing learning management tools that system integrators can pass on to their customers. Customers can learn at their own pace and gradually expand their understanding of their system in accordance with their bandwidth. This allows them to get more out of their system. Simplifying deployment With the right software partners, systems integrators can focus on solving customer problems, not reactively troubleshooting issues. Look for manufacturers who offer good support systems for integrators. This includes not only quality technical support but also configuration and training services you can build on. Look for partners that offer tools and consultation services you can use to complement your value-added services, either to spend less time on the basics or for specialized expertise on complex projects. Beyond support and services, one telling sign is the configuration interface and tools that you as an integrator will primarily interact with. Ask yourself whether the manufacturer invests in their back-end tools and their primary user interface. Is there a noticeable difference between these two interfaces in terms of look and feel? Does one feel more dated? Widening consumption gap The harder it is to implement upgrades, the more reticent customers are to make the changes If the end user interface is easy to use but changes on the back end are difficult, the resulting friction can contribute to the widening consumption gap. It can become too time-consuming or difficult to upgrade or make changes to the system. The harder it is to implement upgrades, the more reticent customers are to make the changes. Configuration should be painless. If the system has a solid graphical user interface, you’ll be able to interact with the software in a fluid and intuitive way. When the system is intuitive for both you and your customers, you spend less time on setup and training. You can invest more attention in value-added activities. Conclusion A consumption gap could be a sign that technological innovation is outpacing people's ability to implement them in their day-to-day lives. You can work with your customers to simplify the adoption of the innovations so they can more easily implement them and realize the full value of their investment. By reviewing opportunities to bridge the consumption gap for your customers, you increase the likelihood of growing and renewing your system and service contracts. You also build relationships as a trusted partner. Customers will turn to you when looking to expand their security system and proactively solve new and incipient problems.
Security beat
Active shooter situations grab the most attention, but there is a long list of other threats facing schools, including bullying, vandalism and emergency medical situations. Broadly speaking, a comprehensive approach to school security should prioritize prevention, preparedness and response to all threats. Holistic security approach “Fostering a culture of safety within a school, which involves strong relationships, trust, and communication, is highly effective and does not require significant costs,” says Christin Kinman, End User Sales Consultant with Allegion, a security manufacturer. “It is crucial to educate stakeholders about the unintended consequences of quick fixes, like barricade devices, to ensure informed decision-making and a holistic security approach. The goal should be to promote safety and security for all, every day, in every situation.” Integrated and successful security plans While this might solve a particular challenge, it can also create unintentional conflicts" "Creating an integrated security plan requires a multi-faceted approach," says Kinman. "Too often, security measures are implemented as a reaction to either an event or a specific vulnerability. While this might solve a particular challenge, it can also create unintentional conflicts," adds Kinman. “Creating a successful security plan involves a comprehensive approach,” she says. “An effective, systematic approach begins with assessing, identifying, and valuing assets, identifying threats and vulnerabilities, quantifying the impact of a loss, analysis, and prioritization, and finally, development of mitigation measures.” Safety and Security An effective resource is the Partner Alliance for Safer Schools (PASS), which provides a framework to help with school assessments, including identifying and valuing assets, identifying external threats and internal vulnerabilities, assessing the impact of loss, and analyzing and prioritizing mitigation measures. Safety and security are words used seemingly interchangeably when it comes to schools, but they mean different things. “How we define these terms influences planning and addressing challenges,” says Kinman. “It is easiest to think of these terms as being either external or internal to the individual.” Coordinated security Safety is internal to the individual and relates to the individual’s perception of being free from harm Security is external to the individual and encompasses the protective physical, emotional, and environmental measures implemented in conjunction with policies, procedures, and training, as well as mental health measures and social and emotional learning. Safety is internal to the individual and relates to the individual’s perception of being free from harm or danger. Coordinated security measures create an environment of safety. Four main elements of physical security Kinman lists four main elements of physical security, often referred to as the 4D’s. These elements are deter, detect, delay, and deny: Deter refers to measures implemented to prevent an attack or threat from happening. These are usually visual deterrents that communicate legitimate use. Detect refers to measures that can detect the presence of a threat, such as video surveillance and monitoring. Delay refers to measures that slow down an attack or increase the level of effort needed for an incident to occur. Finally, deny refers to measures that prevent or restrict access to valued assets. Four layers of ground perimeter A layered approach to school security creates “layers” that must be defeated for an event to occur, says Kinman. Typically, the four layers are the ground perimeter, the private grounds around the building, the building perimeter, and the building interior. The ground perimeter layer demarcates public vs private space, and deterrence is the primary objective. The grounds layer allows for identification of legitimate vs illegitimate users and detection is the primary objective. The building perimeter layer prevents illicit users’ intent on harm from gaining access. The primary objectives at this layer are delay/deny. The building interior protects the most valuable assets, and the denial of an unauthorized individual is the primary objective. Report on Indicators of School Crime and Safety The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic “Quantifying loss and assessing risk is one of the most important steps in creating an integrated security plan,” says Kinman, who explains that the two elements that guide this step are probability and impact. Probability is the likelihood that an event will occur, typically rated on a scale of 1-5 ranging from rare to almost certain. The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic. “Probability multiplied by impact equals risk, which has a score ranging from 1-25,” says Kinman. “The higher the score, the higher the risk.” An analysis of vulnerabilities and threats using a matrix yields a systematic approach to prioritize improvements and identify mitigation measures. For statistics on crime and safety in schools, visit the Report on Indicators of School Crime and Safety: 2022. Security improvements “The costs of school security encompass various aspects, including physical measures, personnel, training and policy enforcement,” says Kinman. “While there is no fixed amount, it often involves investments in technology, such as access control and emergency response systems. Many security improvements do not require additional funding, like training staff and students on security protocols and implementing policies to create a culture of safety.” Generally, funding for public school security is a shared responsibility among federal, state, and local governments; communities also contribute. “Striking a balance between shared responsibility and ensuring adequate resources is crucial for effective school security,” says Kinman. K-12 school security Community members and parents can donate by being vigilant and noting any suspect activities Various stakeholders play crucial roles in enhancing K-12 school security in addition to schools and communities. Stakeholders include community members, parents, local government, local law enforcement, first responders, and non-profit organizations. “Engaging these stakeholders fosters a comprehensive approach to school security,” says Kinman. Community members and parents can contribute by being vigilant and reporting any suspicious activities. Local government can support schools with funding and resources, while local law enforcement and first responders can provide expertise, conduct drills, and establish emergency response protocols. Safe and secure learning environment In addition, non-profit organizations can offer valuable resources, training, and support programs to address specific security concerns. “By involving all these stakeholders, schools can tap into a diverse range of expertise, resources and perspectives, pioneering to a more effective and comprehensive approach to school security,” says Kinman. “Collaboration and communication among these entities are vital to ensure a safe and secure learning environment for students and staff.”
Companies at GSX 2023 emphasized new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasizes ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the Mid-Market to the Cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for pure cloud, but there are benefits to be realized from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realize the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘Soft’ Features for Integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organization more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organization more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centers around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasizing performance, protection (cybersecurity), and price, their data centers are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring center where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
GSX 2022 this week in Atlanta highlights the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Risk-Based decisions “I really just do physical security.” That used to be a common phrase in the industry, but no more. In addition to ‘upskilling,’ security practitioners also need to speak the language of business and to insert the concepts of security into that language. Fast changes in security are challenging today’s professionals to keep up. The GSX education sessions seek to meet the need. Embracing ESRM includes a complete change in the thinking and approach to security Among the topics at the GSX conference is ESRM (Enterprise Security Risk Management), a security approach that focuses on risk-based decisions and partnerships with asset owners. It’s an approach that requires a holistic view of security risk. Embracing ESRM includes a complete change in the thinking and approach to security. Rather than seeking ‘approval’ for security decisions, security professionals identify risks and possible mitigation strategies and present them to management. Shaping access control Activity in the exhibit hall was brisk on the first day, which was heartening to those who attended a vastly downsized show last year in Orlando. At this show, there is even carpeting. Trends lead the lively discussions at GSX. In a presentation on the show floor Monday, manufacturer Brivo shared top trends that are shaping access control. The trends include: Hybrid work is here to stay. Some 60% of respondents to a Brivo survey said access control is extremely or very important to the hybrid work model. Providing immense value to an organization, access data helps to manage occupancy and is part of the larger discussion of facility utilization. Data analytics is ‘mission critical.’ Combining data from multiple sources, including access control, becomes powerful when leveraged using artificial intelligence (AI) and machine learning tools. Applications such as anomaly detection help companies improve operations. Some 65% of respondents to the Brivo survey say integrating access control with other technologies is an important trend. Keeping people healthy Other trends identified by Brivo include mobile credentialing and security centralization (cloud) Other trends identified by Brivo include mobile credentialing and security centralization (cloud). Among other exhibitors, Johnson Controls is focusing in their booth on solutions, not products, including the convergence of physical security into the digital space. The OpenBlue system is a digital platform that incorporates security, HVAC, fire/life safety, and building operations in a single platform that is the ‘nerve center’ of an organization. Increasingly, the areas ‘security’ is responsible for are expanding. During the COVID pandemic, for example, security had to embrace a role in keeping people healthy (as well as safe). The challenges of the pandemic accelerated the OpenBlue portfolio as more security professionals expanded their role. Security operations center “Moving into the digital space, and digitizing what used to be a security operations center, enables us to increase automation and enable security operations to respond more quickly,” said Kenneth Poole, Johnson Controls’ Vice President, National Accounts, North America Building Solutions. Security directors are responsible for things they have never been responsible for before" “Surprisingly a lot of customers are being forced into new areas,” Poole added. “Security directors are responsible for things they have never been responsible for before.” Poole says he is encouraged by the willingness of ‘old school’ security directors to embrace the new reality. Azena’s approach to supplying edge-based camera applications on an ‘app store’ is gaining momentum. Several new applications are being announced at GSX, among the 110 apps on the Azena app store. Apps can be loaded onto Azena-enabled cameras manufactured by Bosch, Hanwha, Vivotek, BST, TopView, and Ability. Video management system Azena has simplified the integration of its app solutions, enabling developers to make only slight changes to an app and ensure it is compatible with the largest video management system (VMS) platforms, including Milestone, Genetec, and NX Witness. A wizard on the camera enables simplified mapping of data analytics to events in a VMS system. New applications in the Azena app store include video sensors to prevent ‘bed fall’ accidents in hospitals and healthcare facilities, incidents that can cost $35,000 on average and account for $34 billion in the United States in a year. The app identifies video signs of an imminent bed fall, such as excessive movement in bed. The analytics run inside the camera and the video feed doesn’t leave the device, so there are no privacy concerns. An Azena app is installed in a camera mounted on ‘Yellow,’ the ‘robot dog’ manufactured by Boston Dynamics Effectiveness of metal detectors Another new application is gun detection that can augment the effectiveness of metal detectors. Also, an Azena app is installed in a camera mounted on ‘Yellow,’ the ‘robot dog’ manufactured by Boston Dynamics and configured for security applications by Prosegur. An Azena app is installed in a Vivotek AI box on the back of the dog; it can detect fire, smoke, and moved luggage. Azena apps for flare and leak detection are becoming more popular in the oil and gas industries, and there are camera apps that can monitor tank levels. Cisco Meraki is introducing two new camera models at GSX, with 4K and 4MP options, a terabyte of storage for 4K, and 256Gb of storage for 4MP. Air quality sensors The cameras will allow most customers to record 30 to 90 days of video in the camera at the edge The cameras will allow most customers to record 30 to 90 days of video in the camera at the edge. Also at the show, they introduced a push button and air quality sensors that are easy to incorporate into a Cisco Meraki application. Cisco Meraki also offers a dashboard that is integrated with the rest of the product portfolio to enable users to view devices on the same interface and in the same ‘pane of glass.’ For physical security users, there is the Meraki Vision Portal, which enables physical security users to run a more effective investigation. Features include a floor plan view and the ability to switch among multiple cameras. Users can instantly search videos using ‘motion search’ to easily find an event in a video.
Case studies
The Transportation Services and Mobility department for the city of Grand Prairie, Texas recently completed a substantial project to replace the locks on their Intelligent Traffic Cabinets with a better and more secure choice. Turns out what they needed was only a few miles away with ALCEA’s Traffic Cabinet Locking Solution powered by ABLOY technology. ALCEA is the brand formerly known as ASSA ABLOY Global Solutions - Critical Infrastructure. The ALCEA Traffic Cabinet Locking Solution has gained traction with transportation infrastructure departments in major cities across the United States. It was developed by Jerry Burhans, managing director for North America, and Michael Woody, manager of the ALCEA Competence Center in Irving, which shares a border with Grand Prairie. Now this access management solution is beginning to impact medium-sized communities like them. Proactive cybersecurity measures Perez said this skill project will save all city signal cabinets from tampering and unauthorized key Raul Perez, a 13-year transportation industry veteran who has served as Grand Prairie’s ITS Specialist for 2-1/2 years, said this installation project will protect all city signal cabinets from tampering and unauthorized access. Involving 240 smart locks, 210 high-security mechanical locks, and padlocks on all city traffic cabinets plus 10 message boards, 191 mechanical locks for all school flashing sign cabinets, and 20 Bluetooth keys is in step with the city’s policy of adopting proactive cybersecurity measures. “Having control over who has access and when to our traffic cabinets was a major driver for this project,” he acknowledged. “We have not had people trying to force their entry into our cabinets, but we did have several occasions where contractors were gaining access to them without permission or notice. ALCEA was the clear choice for our smart lock needs, offering a solution that aligns with our requirements.” Substantial growth and the need to safeguard assets Grand Prairie has a long history associated with technology. Located in the Dallas-Fort Worth metroplex, it is the sixteenth largest city in Texas with a population of more than 207,000 people. During World War I and since, it began an association with the defense and aviation industries and served as an aircraft production site. The city sits 12 miles west of downtown Dallas and is only 10 minutes south of the Dallas-Fort Worth International Airport. With rail lines and major interstates 20 and 30 running through it, Grand Prairie has become a well-established distribution center. The majority of the Great Southwest Industrial District’s approximately 80 million square feet of space is in the city. State’s transportation infrastructure Grand Prairie’s growth resembles the rest of Texas, the largest of the 48 continuous states Combine major attractions like the Lone Star Park horse racetrack and Epic Waters, one of the largest indoor waterparks in Texas, and the city’s 81 square miles of road experience heavy traffic activity all day long. Grand Prairie’s growth resembles the rest of Texas, the largest of the 48 continuous states. After an unprecedented boom, the U.S. Census Bureau declared it is now home to more than 30 million residents following a 43% increase from 2020 to 2022. That development in part led to the Texas Department of Transportation announcing a $142 billion investment in the state’s transportation infrastructure last August as part of a 10-year state roadways plan. About the same time the announcement was made is when the city of Grand Prairie began researching options for a separately funded project to increase cybersecurity preparedness. Flexibility of a Hybrid Locking Solution “I started looking for smart locks and found ALCEA’s mechanical lock with a high-security key during an online search. I was intrigued so I contacted them, inquired about their product and arranged a visit to their office for a presentation,” said Perez, who also evaluated the offerings of three other vendors. “It was then I learned about the capability of unlocking both the electronic and mechanical locks – including padlocks – and the versatility of their keys. I was very impressed by the user-friendly design of their Bluetooth smart key,” he said in reference to the ABLOY PROTEC2 CLIQÔ system. Mechanical and electromechanical locks Remote access control system mixes the parts of robotic and electromechanical locks The remote access management system combines the best characteristics of mechanical and electromechanical locks. After the initial meeting with ALCEA, Perez said he was convinced of the value of this hybrid solution but had to secure buy-in from his supervisor and department director. “Working with the ALCEA team, we tailored a price quote aimed at convincing our department director to allocate funds for this investment. The initiative was successfully integrated into our budget by the end of 2023, and the purchase order was placed in mid-January.” Demonstrated by the ALCEA team The city of Grand Prairie chose ALCEA for several key reasons. “Their product offered the advantage of securing all our enclosures with a single key, with efficiency and convenience,” said Perez. “The versatility of giving us the capability to integrate both mechanical and electronic locks, as well as padlocks, contributed to a more cost-effective final solution. The user-friendly key system, coupled with the security features, ensures ease of use without compromising safety." “The expertise, customer service, and professionalism demonstrated by the ALCEA team added confidence in our decision-making process,” added Perez. “Being a local company, they are able to provide localized support.” Common problems with #2 keys protecting roadside equipment The mechanical lock series that was installed contains ABLOY’s unique high-security cylinder The mechanical lock series that was installed contains ABLOY’s unique high-security cylinder. The electromechanical locks support electronic access control, key tracking, and audit trails with CLIQ Web Manager software. Perez says it instantly solves a problem that existed with their old system. “The challenges we encountered before are widespread in the transportation industry. Many traffic enclosures are accessible with a #2 key, which is impossible to track and makes unauthorized access a potential risk,” he explained. “Anyone can buy that type of key for a couple of dollars. This lack of accountability is a significant security concern, particularly with the increasing prevalence of cyber threats targeting government agencies.” Open cabinet locks and padlocks Perez says the ALCEA solution gives Grand Prairie continuity for its program. “Given the critical nature of our infrastructure and the investment in our high-tech signal control devices, protecting our assets is a top priority,” he acknowledged. “We now have versatility where the same key will open cabinet locks and padlocks, and it can be updated by using the CLIQ app, which is convenient for everyone on our team. Technicians and supervisors wiil be using most of the keys, and the others are for the contractors who need access to the traffic cabinets on an occasional basis.”
Creating a calm learning environment where all children feel safe is a challenge for secondary schools, and for new students, in particular, they can be an intimidating place. Badly behaved pupils can disrupt others and sometimes will damage school property. Advanced detection devices, can tackle anti-social behavior and problems associated with increasing numbers of students that are vaping. By installing a smart sensor schools can ensure that staff time is not consumed by a minority of troublemakers. These can be placed discreetly in private areas, such as school toilets and changing rooms, that would be unsuitable for video camera surveillance. Aggression detection feature Schools have found that the increasing number of students vaping within its toilets becomes a difficult issue to manage and is often associated with anti-social behavior but monitoring can help. An aggression detection feature allows for the monitoring of anti-social behavior. By applying machine learning a smart device can learn what the normal sound levels are and alerts when a threshold above normal is detected for a specified length of time. An aggression detection feature allows for the monitoring of anti-social behavior The device can then pick up when a number of children have gathered together, students shouting, signs of fighting or pupils potentially being bullied by others. An alert will be sent by email to designated staff when abnormal noise levels are detected and action can be taken quickly. This means that perpetrators of aggression against other students or those vandalizing school property within toilets can be stopped and dealt with as soon as an incident occurs. Being able to do this should act as a deterrent but also mean that repeat offenders can be dealt with more effectively by the school. Most advanced monitoring devices Security and monitoring firm has been aiding schools in Worcestershire and elsewhere Security and monitoring company, Ecl-ips, has been helping schools in Worcestershire and elsewhere, by supplying one of the most advanced monitoring devices, the HALO Smart Sensor. John Speller, Facilities Manager at Hanley Castle High School, near Malvern, reported that after installing the monitoring devices, “We have really cracked down on antisocial behavior in our toilet blocks.” Matthew Carpenter, principal at Baxter College in Kidderminster, said: “It has transformed the amount of antisocial behavior in toilets, children are more confident in going to the toilets. It has also reduced the number of students asking to go to the toilet during lessons.” Vapes laced with THC Meanwhile, there have also been concerns by schools about vapes laced with THC, with some Burnley school children reportedly hospitalized last year. The HALO is the only vape detector on the market that can alert and differentiate between vaping, vaping with THC and intentionally masking vaping behavior, for example, by using aerosols to cover up vaping. Charlotte Slattery, Deputy Head Teacher at St Joseph’s College in Stoke-on-Trent, said she would recommend the HALO Smart Sensor to: “Any schools who are struggling to get on top of vaping in schools, or indeed aggression, in the toilets.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced that Georgetown-Ridge Farm Community Unit School District (CUSD) has adopted ZeroEyes' proactive AI-based gun detection and intelligent situational awareness solution to protect students, faculty, and staff against gun-related threats. Georgetown-Ridge Farm CUSD is a rural, public school district in Georgetown, Illinois that is committed to providing a positive learning environment and shaping productive members of society who are successful, self-sufficient, and well-rounded individuals. 880 pre-K and K-12 students are enrolled in its three schools. Multi-layered security plan ZeroEyes has been added to its multi-layered security plan to detect illegally brandished guns on campus The district prioritizes school safety by forming close relationships with local law enforcement and implementing a range of high-tech security measures across its campuses. ZeroEyes has been added to its multi-layered security plan to detect illegally brandished guns on campus and reduce response time in the case of a gun-related incident. “ZeroEyes provides a proactive layer of security that further enhances our comprehensive safety plan,” said Dr. Jean Neal, Superintendent, Georgetown-Ridge Farm CUSD. “Integrating ZeroEyes will allow us to improve security in more vulnerable areas like athletic events and parking lots. We are grateful to have their protection 24/7 to help our community feel safer during these times of uncertainty.” CUSD’s existing digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto Georgetown-Ridge Farm CUSD’s existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school staff as quickly as 3 to 5 seconds from detection. “We are happy that Georgetown-Ridge Farm CUSD is taking proactive steps to protect its rural community from potential gun-related threats,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “In today's climate, safety concerns are on the rise and schools must take every precaution possible.”
Pears Jewish Campus is a seven-story education and culture complex that covers over 80,000 square feet, in Westfälische Strasse, Berlin, Germany. The building was designed by renowned architectural firm Tchoban Voss and constructed over a five-year period. It is the largest Jewish campus in Europe, encompassing a kindergarten, primary, and secondary school, a cinema, sports and events halls, art and music studios, co-working office spaces, as well as a kosher restaurant. Paxton’s latest system Paxton10 has been installed to secure the building with sophisticated access control, remote-site management, and flexible access permissions. Requirements Security is of the utmost importance for the safety and protection of young students, teachers, and professionals working within the campus, given the anti-Semitic incidents. This prompted the development of a comprehensive security concept with enhanced capabilities, including the need for full-lockdown functionality and checkpoints with weapon detection. Due to the increased level of security needed, Peter Gräf, Managing Director of GRAEF Systemtechnik GmbH, was contracted to oversee the installation and technical aspects of the new security system. Systemtechnik is a group of companies with an arm that specializes in securing high-footfall public sector buildings. Systemtechnik is a level of firms with an arm that specializes in tying high-footfall public sector buildings Peter established that this was a project far beyond the normal requirements. He explains: “Every security measure on the campus had to be designed to recognize and ward off potential threats at an early stage and create a safe yet welcoming environment. The system also needs the ability to convert into manual operation and shut down all electronic keypads from sunset on Fridays to sunset on Saturdays for Shabbat, the Jewish day of rest.” For ease of use, the campus managers need web-based remote site management software and a straightforward way to connect across multiple buildings in various locations. Peter continues: “It is a large site and running cables across it would be a challenge. Having a system that links wirelessly is the simplest and most cost-effective solution. Additionally, there are many people requiring varying levels of access permissions throughout the week. Therefore, it is especially important to be able to implement simple measures to allow access to certain areas at certain times by using electronic tokens that can be issued remotely.” All these requirements coincide with the fact that the system needs long-term scalability, and the design of the hardware used had to meet the expectations of award-winning German architect and artist Sergei Tchoban, who designed the building. Solution To achieve the enhanced security needs of the campus, Peter recommended Paxton10, access control and video management on one simple platform. This was due to multi-site functionality and flexible software configuration, and no requirement for a VPN. It works utilizing cloud technology and a Paxton10 server. He explains: “Paxton 10 is easy to specify and install. The modern software is extremely customizable with easily programmable rules and can manage multiple sites remotely with the web software or the Paxton Connect app. Also, the mix of storing data on premises and in the cloud made it ideal for this high-security project.” Peter recommended Paxton10, access control and video management on one simple platform Paxton10 has been installed on 20 main doors across the campus and on turnstiles that form weapon-detecting checkpoints. The system has also been integrated with anti-terror software that locks down the site, meaning no one can enter or leave once initiated. The current setup leaves the building managers with plenty of room to scale the system up, as Paxton10 can manage 1,000 doors, and 50,000 users from a single Paxton10 server. PaxLock wireless door handles have been installed on office doors and employee wellbeing areas. Authorized users can gain access with traditional fobs or more modern smart credentials which are sent through the Paxton10 software to an end-user's smart device, and work within the free Paxton Key app. Peter continues: “Smart credentials are ideal for the vast number of students on campus. They like using their smartphones, and it means they are not losing tokens that are expensive to replace. However, having the choice to still gain access with traditional fobs has been useful as there are a substantial number of people with varying technological preferences.” Results The installation has met the advanced security requirements mapped out in the original concept, and the system can turn into manual operation at the touch of a button for ease of use when Shabbat is being recognized. Overall, the building managers are pleased with the system’s functionality and have been working with Paxton’s Support team configuring Paxton10 to suit the bespoke needs of the campus. Furthermore, the hardware installed has met architectural expectations and compliments the building's heterogenous design, particularly on the main entrances where Paxton's vandal-resistant panels and readers have been installed. Peter concludes: “The system has been configured so the campus managers can make changes at the touch of a button, and the Paxton10 hardware is excellent quality and extremely esthetically pleasing. I believe Paxton10 is the future of access control.”
i-PRO Co., Ltd. (formerly Panasonic Security), a global pioneer in professional security solutions for surveillance and public safety announced that the Murietta Valley Unified School District (MVUSD) in Riverside County, CA, has undertaken a project to modernize its first-generation surveillance system to new high-resolution i-PRO network cameras, and the i-PRO Video Insight video management system (VMS). MVUSD serves 23,000 students and has nearly 4,000 employees. It comprises 11 elementary schools, four middle schools, three comprehensive high schools, two alternative high schools, one virtual, independent, and homeschool academy, and one adult transition school. Surveillance camera system Following the establishment of a stakeholder team and the development of a Prime Directive identifying the needs and expectations for a surveillance camera system, the District conducted extensive research and chose to standardize its security cameras system on i-PRO high-resolution network cameras and Video Insight VMS. The MVUSD video security system is centralized, with a network operations center (NOC) at the district office and local monitoring at each school. Five servers move footage between the schools and the NOC. Additionally, MVUSD has established a collaboration with local police departments, which can connect to their camera system. Importance of high-resolution Pratt and the team placed critical importance on high resolution to help them address key challenges In choosing their next-generation cameras, Pratt and the team placed critical importance on high resolution to help them address key challenges such as fights, altercations, and vandalism. MVUSD Chief Technology Officer Jon Pratt explained, “Graffiti is a common example." "It happens when no one is around, and usually, the camera is the only witness. If the footage is poor quality you can’t rely on it to stand by itself as evidence. Starting with high-resolution cameras like i-PROs is one of the best decisions you can make.” Real-time searches and deep forensic analysis He added, “Having more resolution, more information to use, is a universal utility, whether it’s humans interacting with footage, for analytics, or any future technology.” While the district hasn’t yet deployed analytics in its camera system, Pratt notes that they’re investigating the Smart Search capability included in i-PRO’s Active Guard analytics plug-in to their Video Insight VMS, which enables real-time searches and deep forensic analysis of their surveillance video, and other use cases where analytics can provide insight into anomalies and alerts.
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation announced that Park City School District (PCSD) of Summit County, Utah has deployed its proactive gun detection and intelligent situational awareness solution to mitigate gun-related violence. Park City School District (PCSD) Nestled within the mountains of the year-round resort town, PCSD encompasses four elementary schools, a middle school, a junior high, a high school, and a learning center. The district educates nearly 5,000 students annually and boasts a graduation rate in the top 1 percent of the nation. Intelligent situational awareness software AI gun detection and intelligent situational awareness software is layered on existing digital security cameras PCSD is highly focused on student safety, collaborating with the Summit County Sheriff's Department and the Park City Police Department to deploy advanced electronic, physical, and procedural security measures. ZeroEyes' AI gun detection and intelligent situational awareness software is layered on existing digital security cameras at all eight student-occupied PCSD buildings. ZeroEyes Operations Center If a gun is identified, images will instantly be shared with the ZeroEyes Operations Center (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they will dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to local staff and first responders in as fast as 3 to 5 seconds from detection. AI algorithms The platform does not store personal or biometric data or conduct any kind of facial recognition The company's AI algorithms only search for guns, not faces or bodies. Until a gun is identified, the monitoring screens in the ZOC stay blank; the ZeroEyes Operations team does not see a live feed from any cameras. Further, the platform does not store personal or biometric data or conduct any kind of facial recognition. Gun-related violence “We hold a deep commitment to safeguarding our students and staff, and ZeroEyes is a compassionate ally in our mission,” said Michael Tanner, COO of Park City School District. He adds, “By addressing the concerns of gun-related violence while also respecting the need for privacy, this solution allows us to provide a secure yet welcoming campus environment.” Proactive safety measures “Between its collaboration with local law enforcement and the deployment of proactive safety measures throughout its schools, Park City School District has shown that it is on the cutting edge of security,” said Mike Lahiff, CEO, and Co-Founder of ZeroEyes, adding “We are proud to work alongside this dedicated leadership team to protect students and staff against gun-related threats.” Park City School District was introduced to ZeroEyes through the company’s exclusive Utah reselling partner Aegix, a provider of industry-pioneering resources, technology, equipment, and training for first responders.
Round table discussion
Physical security is a large market overall, encompassing a range of diverse vertical markets, each with its own set of challenges and opportunities. The success of the security industry overall depends on the ability of companies and technologies to meet the specific needs of each vertical market. Some markets offer more lucrative opportunities than others. We asked this week’s Expert Panel Roundtable: Which vertical markets have the greatest potential for growth for physical security systems?
In the United States, they are called license plate recognition (LPR) systems. In Europe, the more common term is automated license number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle color, type, make, and model. We asked this week’s Expert Panel Roundtable: What's new with license plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
Products
White papers
Access management in higher education
DownloadSchool Security Checklist
DownloadWhy SAAS Security Platform Is More Popular In American SMEs
DownloadSafeguard Students With New Techniques And Technology
DownloadAssessing Safety Readiness For Education Campuses
DownloadThe Critical Role of Access Control in K-12 School Security
DownloadProtecting Dormitory Residents and Assets
DownloadSchool Security Moves to the Cloud
DownloadPhysical Access Control In Higher Education
Download6 Questions To Ask When Choosing A Security System
DownloadHow End-to-End Video Security Solutions Can Help Your Organization With Social Distancing
DownloadBuilding A Safe Ecosystem For Visitors Post COVID-19
DownloadSchooling the Market on Education Security
DownloadHow To Keep Students Safe On Campus
DownloadVideo Surveillance: Lessons From The Education Market
DownloadVideos
School security: Manufacturers & Suppliers
Multi-Residential Access Management And Security
DownloadGuide For HAAS: New Choice Of SMB Security System
DownloadPrecision And Intelligence: LiDAR's Role In Modern Security Ecosystems
DownloadHikvision: Solar Powered Product Introduction + HCP
DownloadGunshot Detection
Download