School security
ASSA ABLOY Opening Solutions returns to Global Security Exchange (GSX) for 2024's powerhouse get-together of security professionals from around the world. Digital access control Attendees can visit the ASSA ABLOY booth 1434 from September 23-25 at the Orange County Convention Center in Orlando, Florida. The company will showcase its latest innovations in comprehensive door security and digital access control, featuring products and solutions to protect lives, assets, data, and more. Fu...
911inform, a pioneer in comprehensive emergency response solutions, proudly announces that the U.S. Department of Homeland Security has officially designated its innovative emergency management platform as a Qualified Anti-Terrorism Technology (QATT) under the Support Anti-Terrorism by Fostering Effective Technologies (SAFETY) Act. This prestigious designation recognizes 911inform's critical role in enhancing public safety and its ability to prevent, detect, and deter acts of terrorism. SAFETY...
Artificial intelligence, public, school, and corporate security, and cyber- and tech-related crimes are growing concerns making headlines daily. Global Security Exchange (GSX) by ASIS International brings together thousands of security professionals from approximately 100 countries to address these issues and more. Members of the press are eligible to receive a free all-access pass. For security reasons, a press badge is required to enter the event, so if they are interested in attending,...
Acts of violence in schools have taken a heavy toll. The lives of students and staff have been lost. Public faith in the safety of their schools has been shaken and the ability of schools to educate has been adversely impacted. The review and analysis of these incidents indicate that many were preventable. Need for school security Currently, information and guidance for schools on effective prevention, mitigation, and response to potential acts of school violence is scattered and someti...
ThinCats, the alternative finance provider to mid-sized SMEs has supported Ranger Fire and Security with their latest acquisition of fire door business, Fire Door Specialists Ltd (FDS). First acquisition Ranger, which launched in February 2024, has already acquired four other businesses following Transitional Capital from ThinCats and private equity backing from Hyperion Capital – all in the active fire space – AFIL Ltd, Ignis Fire Protection Ltd, Syncro Group Ltd and IPH Fire Solu...
In the month that the world marks World Suicide Prevention Day, which is hosted on 10 September, one of the UK’s fastest-growing independent security groups, First Response Group (FRG), has joined the Security Consortium for the Prevention of Suicide (SCPS). Founded three years ago, SCPS is a network of security groups and people in both the public and private sectors working in collaboration to prevent suicide, with a particular focus on those working in the security profession which suf...
News
Award-winning manufacturer, Gallagher Security, is excited to announce the expansion of its training team with the addition of James Robinson as Senior Instructional Designer and Toni Fisher as Instructional Designer, based at the Global Headquarters. James and Toni join Gallagher with a mission to shape the future of Gallagher's training and enablement, delivering superior learning outcomes and empowering Channel Partners and End Users with the training tools they need to succeed. New possibilities for Channel Partners James brings a wealth of knowledge to the role with a background in pioneering instructional learning teams in the public sector. With more than 12 years' experience, he brings a unique blend of expertise with digital learning mediums as well as classroom facilitation, which he believes will add a level of authenticity to Gallagher’s training courses. On joining Gallagher, James says: "I am genuinely impressed by Gallagher's success in establishing a global brand right here in Hamilton. Since joining the company, I've witnessed some innovative initiatives to unlock new possibilities for Channel Partners and End Users and I look forward to bringing that same innovative mindset to the training space. My ultimate goal is to make our training programs more engaging, interactive, and relevant for all learners, regardless of their experience level, empowering them with the tools they need." James's skillset Toni complements James's skillset with her strong set in visual design and passion for conveying data Toni complements James's skillset with her strong background in visual design and passion for conveying complex information in an engaging way. She is excited to apply her skills in translating technical information into easily digestible content for learners. “Through scenario-based learning and the incorporation of contextual elements, I aim to bridge the gap between theory and practice, empowering our Channel Partners and End Users to better understand our hardware and software,” says Toni. Future of Gallagher's training platforms Scott Bell, Training Solutions Lead, is excited about the future of Gallagher's training platforms with the addition of James and Toni. "We have ambitious goals to deliver the best learning experiences," says Scott. “We’ve strengthened our training platforms with the recent releases of Virtual Classroom and Augmented Reality, providing immersive and interactive learning, and our training content is set to follow suit. James and Toni’s dedication to learner-centric design will be instrumental in helping us achieve those goals. It’s a really exciting time to be in the training space.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security Safety Act Designation, announced the availability of ZeroEyes One (ZEO), a first-of-its-kind AI-powered, human-verified gun detection solution available for deployments ranging from 1-16 IP cameras. With this new offering, ZeroEyes’ pioneering proactive security software, which currently protects thousands of buildings for hundreds of customers in 42 states, is now available for organizations such as convenience stores, gas stations, retail stores, bars, restaurants, pharmacies, parks and splash pads, religious organizations, daycares, and banks as well as private residences to deploy on their existing digital IP cameras. ZeroEyes’ hardware According to the U.S. Bureau of Labor Statistics, 524 workers were killed in gun-related incidents in 2022. While the primary concern is protecting human lives, business pioneers must also consider broader implications, including loss of customers, property and reputation damage, increased insurance costs, and staff retention issues. The financial costs of gun-related violence are substantial and challenging to quantify, with estimates ranging from $229 billion to $557 billion per year. Organizations and individuals can purchase one-, three-, or five-year ZEO subscriptions for 1-16 digital IP cameras at the website. They will then receive ZeroEyes’ hardware by mail, along with detailed installation instructions and video materials to complete the setup. ZeroEyes Operations Center ZeroEyes will verify the deployment to confirm the setup is complete and functioning correctly ZeroEyes will verify the deployment to confirm the setup is complete and functioning correctly. If ZEO identifies a gun at any time, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry’s only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and a chosen customer contact as quickly as three to five seconds from detection. Powerful technology “Through the ZeroEyes Research Center, we have discovered that gun violence is often unpredictable and can strike anyone, anywhere, at any time,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “Leveraging the same powerful technology that protects K-12 schools, colleges, hospitals, military bases, and large businesses around the country, ZEO now empowers smaller organizations and even people in their own homes to significantly enhance their security and keep themselves or their patrons and employees safe from gun-related violence.”
Viking Electronics proudly announces its commitment to enhancing school safety through the support of Alyssa's Law, which mandates panic buttons in schools to expedite law enforcement response time during emergencies. Alyssa's Law, named in honor of Alyssa Alhadeff, a victim of the tragic Parkland school shooting, requires schools to install panic buttons for quick law enforcement notification. Viking panic buttons are ideal tools in fulfilling this mandate. The PB-3 and PB-3-IP provide versatile solutions for school environments, offering quick and reliable emergency communication. SIP-based communication systems The PB-3 analog panic button connects to any standard analog phone line, PABX station, or FXS port and is easily programmed via a touch-tone phone. The IP version, PB-3-IP, integrates with existing SIP-based communication systems, allowing for easy connectivity and remote management. Both models are designed with user-friendly features, including a large, easy-to-activate button, and bright, attention-grabbing LED indicators. “Our priority is the safety and security of students and staff,” said Mike Busby, Marketing and Sales Manager at Viking Electronics. “By providing reliable and effective panic button options, we support schools in creating a safer learning environment.”
Intrado Life & Safety, a global pioneer in public safety solutions announced a partnership with GeoComm, a provider of Geographical Information Systems (GIS) data. This partnership aims to enhance data available via Intrado’s Spatial Insight product by integrating interior GIS data from critical buildings, including schools, airports, courts, and hospitals, thereby improving emergency response capabilities. Spatial Insight offering "The call centers that support our first responders may have the address of a building such as a school or hospital that is experiencing an emergency, but just the address alone is not enough to locate someone in need inside the building," said Jaz Lin, Head of Product at Intrado. Jaz Lin adds, "Our partnership with GeoComm and the extensions it enables to our Spatial Insight offering help provide public safety call takers the detailed information they need to get help to the right people in the right places at the right time. Room-specific location significantly reduces response times, ensuring first responders reach the right room and improve outcomes." Public and school safety solutions "It is critical to enable interoperability within public safety and school safety solutions to increase access to critical information. In this case, the indoor GIS maps provide increased situational awareness for 911 emergency response," said Jeff Liebl, GeoComm President & CEO. Jeff Liebl adds, "This partnership represents our commitment to supporting community safety to save lives and protect property when seconds matter." Public Safety Answering Points GeoComm’s indoor maps and other useful sources of supplemental emergency information, including automotive telematics and supplementary data supplied from mobile devices including mobile phones are available to Public Safety Answering Points (PSAPs) for free with Intrado’s Spatial Insight. With Intrado and third-party integrations as well as stand-alone modes, Spatial Insight enables field teams with the best possible detailed information about the emergency at hand. Intrado Spatial Insight will be on display at the 2024 APCO International’s Annual Conference & Expo on August 5 & 6 in Orlando, Florida.
An overwhelming majority (96%) of parents in the United States support a mandate requiring schools to share security cameras with 911 Communications Centers during emergencies, according to a survey of K-12 parents. A federal mandate was preferred by 56% of parents, 29% wanted a community-level requirement, and 11% favored a school district mandate. Camera Sharing is a new technology that gives Emergency Communication Center telecommunicators (911 professionals) instant access to security cameras during an emergency, empowering them to deliver critical incident information to first responders. As the election draws near, both Democrats (93%) and Republicans (91%) agree tax dollars should be allocated to fund the activation of camera-sharing technology in K-12 schools. Key findings 96% of parents support a mandate requiring K-12 schools to share security camera feeds with Emergency Communications Centers during active shooter scenarios or similar emergencies Of the 96% of parents who favor a camera-sharing mandate in schools, 56% prefer a federal mandate, 29% want a community-level requirement, and 11% favor a school district mandate 90% of those surveyed support allocating existing tax dollars to enable public K-12 schools to activate technology for 911 telecommunicators to access real-time security camera feeds in emergencies Allocating tax dollars to support a camera-sharing mandate is supported by 91% of Republicans surveyed and 93% of Democrats surveyed 86% of parents feel safer with a security system enabled for live video communication with a 911 telecommunicator Almost 80% of respondents feel live-feed visibility into schools via security cameras will save lives during active shooter events Eagle Eye Networks 911 Camera Sharing solution School pioneers and public safety officials say camera sharing can help deliver critical information School pioneers and public safety officials say camera sharing can help quickly deliver critical information when time is of the essence. Damon Grant, Co-principal of Oakland Unity Middle School, Oakland, Calif., said “The Eagle Eye Networks 911 Camera Sharing solution we’ve implemented gives first responders critical information in real-time to guide their response to an emergency in our school. The presence of this technology serves as a silent guardian, ready to act if needed, but a resource we hope we will never need.” Bill Maverick, a security consultant and retired NY State Police Special Operations Supervisor with expertise in active shooter response training, said, “First responders often approach the scene of an emergency with very little information about the whereabouts of suspects, innocent bystanders, and the physical layout of the scene. In addition, emergency situations are not static, they’re dynamic, changing from minute to minute. Having telecommunicators feed ongoing real-time information to first responders during an active shooter incident is a game changer, with the potential to dramatically improve outcomes, and save lives.” Emergency response and increased safety Eagle Eye Networks CEO Dean Drako said, “The public safety experts, school officials, and parents have spoken: There’s resounding support for getting schools across the country to utilize camera-sharing technology that will speed up emergency response and increase safety for children, educators, and first responders.” Commissioned by Eagle Eye Networks, the survey was conducted by Propeller Insights, a Los Angeles-based market research firm. A total of 1,034 parents of K-12 students in the U.S. were surveyed between May 26 and June 5, 2024.
Critical Response Group (CRG), the nation’s pioneer in critical incident mapping data, has become an Industry Partner in the ZeroNow alliance of educators, security specialists, technology experts and students working to bring violent incidents in schools to zero. CRG combines military-inspired techniques and rigorous on-site verification processes to deliver detailed, accurate, and human-verified critical incident maps that enhance emergency response coordination and save lives. Public safety software The company’s maps are compatible with security platforms in use across the safety ecosystem, from mobile apps and 911 centre/PSAP systems to public safety software used by first responders, allowing all stakeholders to work from the same map when responding to an incident. CRG is already implemented in 15,000 schools across the U.S. The company’s maps are compatible with security platforms in use across the safety ecosystem “When it comes to threatening incidents in schools, we all know that seconds count,” said Ara Bagdasarian, Co-Founder of ZeroNow. “The common operating picture CRG provides saves critical moments in an emergency, which can save lives. And the passion the people at CRG bring to their work protecting schools matches that of ZeroNow’s other industry and nonprofit partners. CRG is a great fit for our alliance.” Incident mapping solutions “We look forward to collaborating with other stakeholders in the fight against school violence,” said CRG CEO Mike Rodgers. “Our critical incident mapping solutions are validated by thousands of real-world incidents under the most stressful conditions and are deployed across the United States to protect schools, businesses, hospitals, and other critical infrastructure. As a ZeroNow Partner, we’ll be able to share knowledge with others in the field who are working toward the same goals.” ZeroNow was founded by technology partners Additional, Axis Communications, Axon, Omnilert, and Status Solutions, along with campus safety nonprofit partners the International Association of Campus Law Enforcement Administrators (IACLEA), NASPA (the Association of Student Affairs Administrators in Higher Education), Campus Safety Magazine, and VTV Family Outreach Foundation.
Expert commentary
For K12 education pioneers, embarking on a journey to upgrade security controls can present a myriad of questions about finding the best-fit solutions and overcoming funding hurdles. A majority of public-school districts today are faced with outdated infrastructure and security controls, requiring necessary upgrades. By addressing these concerns head on, schools will ensure a safer environment for both students and staff, mitigating risks posed by unforeseen physical and digital threats. Common K12 security pain points There’s no one-size-fits-all solution in school district security. School districts may have big plans to implement upgraded security systems but to set out on the right foot, pioneers must have a clear vision of their long-term strategy. When embarking on their security journey, education pioneers often wonder where to start and what exact steps are they need to be taking to identify and address weaknesses. Local K12 and government pioneers are promoting and mandating security assessments to uncover safety gaps on campuses and mitigate these risks with advanced technology solutions. Not only do assessments provide detailed, customizable roadmaps for district pioneers, but they also recommend technologies and funding opportunities to help close threat gaps. K12 school districts are mainly vulnerable to cyber-attacks due to the sensitive nature of student records In today’s climate, schools face a growing number of physical and digital security threats. From a cybersecurity standpoint, K12 school districts are particularly vulnerable to cyber-attacks due to the sensitive nature of student records. However, only one-third of these districts have adequate staffing to address threats effectively. In addition, according to a recent survey from Johnson Controls and Forrester Consulting, security decision-makers are having trouble receiving actionable insights. Nearly two-thirds of respondents said that they struggle to receive information from all necessary systems regarding their security threats. To gain more clarity into what school districts need in terms of security tools and threat mitigation, implementing system-wide monitoring and optimization can be invaluable. This approach enhances equipment and operational efficiency, while providing necessary resources and expertise for critical patch updates across all systems, strengthening their overall security posture. Achieving a well-rounded security program In the past few years, AI technology has emerged as a trending solution and is generating considerable attention. While the allure of implementing cutting-edge technologies is undeniable, it’s important to recognize that a robust security program hinges on solid access control. Access control technology provides administrators with the means to oversee and regulate entry into facilities, serving as the foundation for basic physical security. The technology helps administrators and staff control access to multiple areas from web-enabled devices, even during lockdowns which is crucial in emergency situations. School district pioneers should utilize available digital risk assessment tools to uncover threat areas Once basic security controls are in place, school districts must address their next set of security pain points and identify which solutions meet their specific needs. This involves identifying and prioritizing the highest need and most cost-effective investments that will have the greatest impact on enhancing security measures. To accurately determine which security solutions are needed for a specific environment, school district pioneers should utilize available digital risk assessment tools to uncover threat areas and determine levels of priority. By focusing on these priority areas, districts can allocate their resources and efforts where they are needed most, ensuring maximum effectiveness in mitigating risks and vulnerabilities. Securing funding before approaching deadlines A major challenge for school districts surrounding campus security is identifying and securing the necessary funding to implement solutions aligned with their goals. Leveraging available funding sources is critical, especially considering certain programs are approaching their deadline, like the Elementary and Secondary School Emergency Relief (ESSER) fund. Announced during the pandemic, ESSER is a funding program that has allocated nearly $190 billion in aid to U.S. public school districts to fund projects benefitting the well-being of occupants. Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024 Notable ESSER funding deadlines to keep in mind as the clock winds down include September 30, 2024, when schools must attribute all of their funds to assigned contracts. Following this date, pioneers will need to complete all ESSER spending by January 2025 unless approved for an extension into March 2025. As ESSER wanes, school districts are acutely aware of the fiscal cliff in budgets through 2025. However, many states are ramping up grant funding to close the deficit gap. Administrators should become familiar with these grant opportunities at a local and state level. Get started on security plans The time for school district pioneers to act is now. While the safety and well-being of students and staff are always top priorities, it’s crucial to acknowledge that a lack of insight into necessary security upgrades and available funding options will leave districts behind the curve. Seizing the final months of ESSER funding presents an ideal window to address security pain points and build a safer future for K12 facilities. Looking beyond ESSER, pioneers must proactively seek out and leverage other funding avenues to help ensure the continuity of their security efforts and maintain a proactive stance in safeguarding healthy and safe educational environments.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realize, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionizing the overnight security business. Minimizing criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilizes a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimize the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is Remote Guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilize a combination of methods to effectively analyze potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyze the situation in real time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command center, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customized remote guarding When properly deployed, remote guarding systems are also customized to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional Security Shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A Bounty of Benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilize targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyze incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilize this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilizes a decentralized ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralized, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimize threats or attacks to organizations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organization. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organization to undergo authentication, authorization, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilizes the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organizations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organizations in proper data control, handling, and security. These policies guide organizations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
Active shooter situations grab the most attention, but there is a long list of other threats facing schools, including bullying, vandalism and emergency medical situations. Broadly speaking, a comprehensive approach to school security should prioritize prevention, preparedness and response to all threats. Holistic security approach “Fostering a culture of safety within a school, which involves strong relationships, trust, and communication, is highly effective and does not require significant costs,” says Christin Kinman, End User Sales Consultant with Allegion, a security manufacturer. “It is crucial to educate stakeholders about the unintended consequences of quick fixes, like barricade devices, to ensure informed decision-making and a holistic security approach. The goal should be to promote safety and security for all, every day, in every situation.” Integrated and successful security plans While this might solve a particular challenge, it can also create unintentional conflicts" "Creating an integrated security plan requires a multi-faceted approach," says Kinman. "Too often, security measures are implemented as a reaction to either an event or a specific vulnerability. While this might solve a particular challenge, it can also create unintentional conflicts," adds Kinman. “Creating a successful security plan involves a comprehensive approach,” she says. “An effective, systematic approach begins with assessing, identifying, and valuing assets, identifying threats and vulnerabilities, quantifying the impact of a loss, analysis, and prioritization, and finally, development of mitigation measures.” Safety and Security An effective resource is the Partner Alliance for Safer Schools (PASS), which provides a framework to help with school assessments, including identifying and valuing assets, identifying external threats and internal vulnerabilities, assessing the impact of loss, and analyzing and prioritizing mitigation measures. Safety and security are words used seemingly interchangeably when it comes to schools, but they mean different things. “How we define these terms influences planning and addressing challenges,” says Kinman. “It is easiest to think of these terms as being either external or internal to the individual.” Coordinated security Safety is internal to the individual and relates to the individual’s perception of being free from harm Security is external to the individual and encompasses the protective physical, emotional, and environmental measures implemented in conjunction with policies, procedures, and training, as well as mental health measures and social and emotional learning. Safety is internal to the individual and relates to the individual’s perception of being free from harm or danger. Coordinated security measures create an environment of safety. Four main elements of physical security Kinman lists four main elements of physical security, often referred to as the 4D’s. These elements are deter, detect, delay, and deny: Deter refers to measures implemented to prevent an attack or threat from happening. These are usually visual deterrents that communicate legitimate use. Detect refers to measures that can detect the presence of a threat, such as video surveillance and monitoring. Delay refers to measures that slow down an attack or increase the level of effort needed for an incident to occur. Finally, deny refers to measures that prevent or restrict access to valued assets. Four layers of ground perimeter A layered approach to school security creates “layers” that must be defeated for an event to occur, says Kinman. Typically, the four layers are the ground perimeter, the private grounds around the building, the building perimeter, and the building interior. The ground perimeter layer demarcates public vs private space, and deterrence is the primary objective. The grounds layer allows for identification of legitimate vs illegitimate users and detection is the primary objective. The building perimeter layer prevents illicit users’ intent on harm from gaining access. The primary objectives at this layer are delay/deny. The building interior protects the most valuable assets, and the denial of an unauthorized individual is the primary objective. Report on Indicators of School Crime and Safety The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic “Quantifying loss and assessing risk is one of the most important steps in creating an integrated security plan,” says Kinman, who explains that the two elements that guide this step are probability and impact. Probability is the likelihood that an event will occur, typically rated on a scale of 1-5 ranging from rare to almost certain. The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic. “Probability multiplied by impact equals risk, which has a score ranging from 1-25,” says Kinman. “The higher the score, the higher the risk.” An analysis of vulnerabilities and threats using a matrix yields a systematic approach to prioritize improvements and identify mitigation measures. For statistics on crime and safety in schools, visit the Report on Indicators of School Crime and Safety: 2022. Security improvements “The costs of school security encompass various aspects, including physical measures, personnel, training and policy enforcement,” says Kinman. “While there is no fixed amount, it often involves investments in technology, such as access control and emergency response systems. Many security improvements do not require additional funding, like training staff and students on security protocols and implementing policies to create a culture of safety.” Generally, funding for public school security is a shared responsibility among federal, state, and local governments; communities also contribute. “Striking a balance between shared responsibility and ensuring adequate resources is crucial for effective school security,” says Kinman. K-12 school security Community members and parents can donate by being vigilant and noting any suspect activities Various stakeholders play crucial roles in enhancing K-12 school security in addition to schools and communities. Stakeholders include community members, parents, local government, local law enforcement, first responders, and non-profit organizations. “Engaging these stakeholders fosters a comprehensive approach to school security,” says Kinman. Community members and parents can contribute by being vigilant and reporting any suspicious activities. Local government can support schools with funding and resources, while local law enforcement and first responders can provide expertise, conduct drills, and establish emergency response protocols. Safe and secure learning environment In addition, non-profit organizations can offer valuable resources, training, and support programs to address specific security concerns. “By involving all these stakeholders, schools can tap into a diverse range of expertise, resources and perspectives, pioneering to a more effective and comprehensive approach to school security,” says Kinman. “Collaboration and communication among these entities are vital to ensure a safe and secure learning environment for students and staff.”
Companies at GSX 2023 emphasized new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasizes ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the Mid-Market to the Cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for pure cloud, but there are benefits to be realized from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realize the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘Soft’ Features for Integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organization more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organization more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centers around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasizing performance, protection (cybersecurity), and price, their data centers are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring center where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
GSX 2022 this week in Atlanta highlights the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Risk-Based decisions “I really just do physical security.” That used to be a common phrase in the industry, but no more. In addition to ‘upskilling,’ security practitioners also need to speak the language of business and to insert the concepts of security into that language. Fast changes in security are challenging today’s professionals to keep up. The GSX education sessions seek to meet the need. Embracing ESRM includes a complete change in the thinking and approach to security Among the topics at the GSX conference is ESRM (Enterprise Security Risk Management), a security approach that focuses on risk-based decisions and partnerships with asset owners. It’s an approach that requires a holistic view of security risk. Embracing ESRM includes a complete change in the thinking and approach to security. Rather than seeking ‘approval’ for security decisions, security professionals identify risks and possible mitigation strategies and present them to management. Shaping access control Activity in the exhibit hall was brisk on the first day, which was heartening to those who attended a vastly downsized show last year in Orlando. At this show, there is even carpeting. Trends lead the lively discussions at GSX. In a presentation on the show floor Monday, manufacturer Brivo shared top trends that are shaping access control. The trends include: Hybrid work is here to stay. Some 60% of respondents to a Brivo survey said access control is extremely or very important to the hybrid work model. Providing immense value to an organization, access data helps to manage occupancy and is part of the larger discussion of facility utilization. Data analytics is ‘mission critical.’ Combining data from multiple sources, including access control, becomes powerful when leveraged using artificial intelligence (AI) and machine learning tools. Applications such as anomaly detection help companies improve operations. Some 65% of respondents to the Brivo survey say integrating access control with other technologies is an important trend. Keeping people healthy Other trends identified by Brivo include mobile credentialing and security centralization (cloud) Other trends identified by Brivo include mobile credentialing and security centralization (cloud). Among other exhibitors, Johnson Controls is focusing in their booth on solutions, not products, including the convergence of physical security into the digital space. The OpenBlue system is a digital platform that incorporates security, HVAC, fire/life safety, and building operations in a single platform that is the ‘nerve center’ of an organization. Increasingly, the areas ‘security’ is responsible for are expanding. During the COVID pandemic, for example, security had to embrace a role in keeping people healthy (as well as safe). The challenges of the pandemic accelerated the OpenBlue portfolio as more security professionals expanded their role. Security operations center “Moving into the digital space, and digitizing what used to be a security operations center, enables us to increase automation and enable security operations to respond more quickly,” said Kenneth Poole, Johnson Controls’ Vice President, National Accounts, North America Building Solutions. Security directors are responsible for things they have never been responsible for before" “Surprisingly a lot of customers are being forced into new areas,” Poole added. “Security directors are responsible for things they have never been responsible for before.” Poole says he is encouraged by the willingness of ‘old school’ security directors to embrace the new reality. Azena’s approach to supplying edge-based camera applications on an ‘app store’ is gaining momentum. Several new applications are being announced at GSX, among the 110 apps on the Azena app store. Apps can be loaded onto Azena-enabled cameras manufactured by Bosch, Hanwha, Vivotek, BST, TopView, and Ability. Video management system Azena has simplified the integration of its app solutions, enabling developers to make only slight changes to an app and ensure it is compatible with the largest video management system (VMS) platforms, including Milestone, Genetec, and NX Witness. A wizard on the camera enables simplified mapping of data analytics to events in a VMS system. New applications in the Azena app store include video sensors to prevent ‘bed fall’ accidents in hospitals and healthcare facilities, incidents that can cost $35,000 on average and account for $34 billion in the United States in a year. The app identifies video signs of an imminent bed fall, such as excessive movement in bed. The analytics run inside the camera and the video feed doesn’t leave the device, so there are no privacy concerns. An Azena app is installed in a camera mounted on ‘Yellow,’ the ‘robot dog’ manufactured by Boston Dynamics Effectiveness of metal detectors Another new application is gun detection that can augment the effectiveness of metal detectors. Also, an Azena app is installed in a camera mounted on ‘Yellow,’ the ‘robot dog’ manufactured by Boston Dynamics and configured for security applications by Prosegur. An Azena app is installed in a Vivotek AI box on the back of the dog; it can detect fire, smoke, and moved luggage. Azena apps for flare and leak detection are becoming more popular in the oil and gas industries, and there are camera apps that can monitor tank levels. Cisco Meraki is introducing two new camera models at GSX, with 4K and 4MP options, a terabyte of storage for 4K, and 256Gb of storage for 4MP. Air quality sensors The cameras will allow most customers to record 30 to 90 days of video in the camera at the edge The cameras will allow most customers to record 30 to 90 days of video in the camera at the edge. Also at the show, they introduced a push button and air quality sensors that are easy to incorporate into a Cisco Meraki application. Cisco Meraki also offers a dashboard that is integrated with the rest of the product portfolio to enable users to view devices on the same interface and in the same ‘pane of glass.’ For physical security users, there is the Meraki Vision Portal, which enables physical security users to run a more effective investigation. Features include a floor plan view and the ability to switch among multiple cameras. Users can instantly search videos using ‘motion search’ to easily find an event in a video.
Case studies
The university in rural Maharashtra is committed to providing a holistic and inclusive education that focuses on character building, intellectual growth, and community service. Its mission is to develop knowledgeable, compassionate citizens. With an emphasis on interdisciplinary studies, experiential learning, and cultural heritage preservation, the institution aims to foster creativity, innovation, leadership, and responsible global citizenship. Featuring one of the largest campuses in Mumbai, the university offers a diverse range of programs across nine different disciplines. Challenge/Requirements The client faced considerable difficulties with their current communication system. The wired configuration demanded frequent maintenance and ongoing problems with voice communication quality persisted. The primary challenges they encountered included: Problems with wired communication: The wired system experienced issues like corrosion, causing a decline in communication quality. Call Quality: The communication system faced problems like dropped calls and interruptions during active conversations. Multi-location and Unified Communication Solution: Upgrading the infrastructure was essential to connect and unify various sites across the campus. Integration with Existing Infrastructure: The new solution had to be compatible with their current setup to bring modernization. Redundancy: To guarantee minimal or no downtime, especially in emergencies, incorporating redundancy was essential. Matrix solution Matrix, in partnership with Shreeji Comsec, designed a solution that greatly improved the university's communication capabilities. The key aspects of this solution are summarised below: The current infrastructure relied on copper PRI lines, which needed to be upgraded to IP. To support this transition, two Matrix VoIP-PRI gateways, the SETU VTEP2P and SETU VTEP4P, were utilized. The VoIP-PRI gateways are now compatible with two Matrix IP Phones: the SPARSH VP510 and SPARSH VP210. The IP connection can now be routed through SIP (TATA) trunks via the Matrix server-based PBX, ANANT. The server-based PBX, ANANT, provided seamless communication with integrated redundancy, effectively eliminating downtime. Results observed The solution enabled the university to consolidate multiple sites into a single communication network. Legacy systems were smoothly integrated with modern VoIP technology, optimizing existing investments and enhancing the overall communication infrastructure. This upgrade notably increased operational efficiency. Here is a detailed overview of the solution: Multi-location Solution: Multiple sites were integrated into a unified, comprehensive communication system. Unified Communication Solution: Integrating with the server-based PBX, ANANT, facilitated seamless collaboration and ensured uninterrupted information transfer and reception. Investment Optimization: The integration of SIP with the Matrix Solution, seamlessly incorporated into the existing network infrastructure. This approach maximized the use of existing resources and avoided the need for additional investments. Operational Efficiency: The redundancy built into ANANT ensured minimal or no downtime, facilitating a continuous flow of information and significantly enhancing workflow efficiency. This feature was crucial for maintaining critical communications and handling emergencies effectively. Modern Features: The office benefits from advanced functionalities provided by Matrix Standard SIP desk phones, including the SPARSH VP510. These features, such as call-back and auto-answer over secure SIP communication, greatly enhance the university’s communication capabilities. The Matrix communication solution allowed the university to both enhance and modernize its communication capabilities, equipping them with advanced, state-of-the-art call features. Products Offered Matrix ANANT: PBX Server for Unified Communications Matrix SETU VTEP4P: VoIP - PRI Gateway Matrix SETU VTEP2P: VoIP - PRI Gateway Matrix SETU VFXTH: VoIP - FXO - FXS Gateway Matrix SPARSH VP510E: Standard SIP Phone
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security Safety Act Designation, announced the expansion of its proactive AI-based gun detection and intelligent situational awareness solution across all middle and elementary schools in Florida’s Leon County School District. This decision follows the successful initial implementation of the technology on five Leon County high school campuses. Reliability and accuracy "After a successful ZeroEyes deployment in our high schools, we are very confident in the technology's reliability and accuracy," said Jimmy Williams, Chief of Safety and Security Staff for Leon County Schools. “ZeroEyes has consistently delivered on its promises, proving effective in distinguishing real threats from non-threatening situations. Expanding this technology to our middle and elementary schools is an essential step in our ongoing commitment to student safety.” ZeroEyes Operations Center Leon County Schools is headquartered in Tallahassee, FL, and is the sole school district of the county Leon County Schools is headquartered in Tallahassee, Florida and is the sole school district of the county. Its mission is to support an engaging, safe and respectful learning environment that embraces change and produces successful learners who value diversity and are conscientious contributors to society. ZeroEyes' AI gun detection and intelligent situational awareness software layers onto Leon County Schools’ existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry’s only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school administrators as quickly as three to five seconds from detection. School security innovation "Leon County Schools has been at the forefront of school security innovation, and we are honored to support their efforts," said Mike Lahiff, CEO and co-founder of ZeroEyes. "Their satisfaction with our system's performance and accuracy confirms the value of our technology in protecting communities. We look forward to continuing our collaboration and helping to ensure the safety of all students and staff across the district."
Omnilert, a pioneer in active shooter solutions, announced that Sarasota County Schools in Florida is deploying its Omnilert Gun Detect system to monitor over 4,800 security cameras throughout the entire school district, representing the largest deployment of its kind in Florida aimed at thwarting the presence of weapons on school campuses. Omnilert Gun Detect is the most effective and complete AI visual gun detection system available–providing 24/7 monitoring with a near-instant response at the first sight of a gun with rich automation capabilities that can lock doors, notify police and trigger alarms to ensure the best possible outcomes in the event of an active shooter incident. Additional layers of technology Sarasota Schools educates and covers over 45,000 pupils across 56 schools and employs more than 5,200 teachers Sarasota County Schools already completed a successful deployment in one of its high schools the past year, which received overwhelmingly positive results and response from parents and staff. It is now in the process of deploying the system with the entire district’s camera network. Sarasota County Schools educates and protects over 45,000 students across 56 schools and employs more than 5,200 teachers and staff including its own police department and school resource officers. “Maintaining a safe learning environment is paramount for our school district,” said Terry Connor, Superintendent of Schools for Sarasota County. “Our district is fortunate to have a safety conscious School Board and community who understands this need and invests in solutions that will make for safer schools. It is critical to have additional layers of technology such as Omnilert Gun Detect working behind the scenes to ensure the safety our students and staff every day of the school year.” Infrastructure of safety systems “Omnilert Gun Detect clearly fit our requirements for flexible detection verification and response escalation with the ability to activate our existing infrastructure of safety systems,” said Sean O’Keefe, Director of Security at Sarasota County Schools. “Accurate gun detections and fast verifications are only the beginning of a response. It is critical for us to share the intelligence from Omnilert with our safety systems immediately to ensure we maximize as many seconds or minutes as possible for our police and security teams to respond to a potential situation and to protect lives.” Largest deployments of AI gun detection Security cameras can be altered into 24/7 monitors of weapons that never get tired and distracted Omnilert Gun Detect is protecting several hundred schools and other organizations across the country, with many deployments being the largest ever recorded. Sarasota sets the record in Florida and is the second largest in the nation next to Baltimore County Public Schools, the largest deployment of AI visual gun detection in the United States with their 7,500 cameras. These large installations highlight the ease of use and flexibility that customers experience when integrating Omnilert technology with their existing cameras and security infrastructure. Security cameras can be transformed into 24/7 monitors of weapons that never get tired and distracted and can automatically initiate a pre-planned response to save lives in the event a weapon ever came on campus. Activation of safety systems “Sarasota’s comprehensive safety program to enhance school security is a model for school districts across the nation as it combines early detection with an activation of safety systems that speeds response and removes the potential for human error,” commented Dave Fraser, CEO of Omnilert. “We make it a priority to ensure our technology integrates with other safety systems so security teams can capitalize on their existing investments and utilize a full range of capabilities to protect their people.” How Omnilert Gun Detect works Omnilert Gun Detect is an advanced AI system that detects handguns and long guns throughout a campus Omnilert Gun Detect is an advanced AI system that detects handguns and long guns throughout campus, both indoors and outdoors. Once a gun is detected, it sends an alert to a designated person at either Omnilert Monitoring centers or the customer’s security operations center to verify detections. When a threat is confirmed, Omnilert Gun Detect triggers a series of alerts that sets security systems into motion and police into action to protect those in harm’s way. This solution gives emergency response teams advance warning before shots are fired and delivers precise information on the location and a photo and video of the potential shooter for a much more effective response. Omnilert’s software Unlike other solutions that merely provide weapon identification and verification, Omnilert Gun Detect integrates with video management systems, access control systems, emergency mass notification solutions, audio and video communication platforms, and more. Omnilert’s software can easily be deployed with any existing IP-based camera and can monitor spaces that other safety technologies miss such as exterior grounds and parking lots. The software was designed with privacy concerns in mind so there is no use of biometrics like facial recognition and the live video feeds never leave the school premises.
With the common goal of improving security and emergency response in the event of a critical incident, community members in Livingston County have deployed technology that turns their standard security cameras into a powerful resource for 911 Emergency Communications Center telecommunicators (911 professionals). Response time “It’s all about response time: The key to saving lives, curtailing damage, and rapidly resolving an emergency of any kind–whether it’s a natural disaster, fire, mass shooting, or other criminal activity–is getting accurate information to first responders so they can take quick, decisive action,” said Mike Murphy, Livingston County Sheriff. While security cameras are ubiquitous at schools and businesses, 911 telecommunicators typically cannot access them in an emergency. Eagle Eye 911 Camera Sharing With Camera Sharing, the telecommunicator can also have “eyes on the scene” and, within seconds, gather information Eagle Eye 911 Camera Sharing changes that by giving telecommunicators instant access to live video from one or multiple security cameras when a 911-triggered emergency occurs, empowering them to quickly deliver critical incident information to first responders through a partnership with RapidSOS. Telecommunicators generally rely on verbal information from 911 callers. With Camera Sharing, the telecommunicator can also have “eyes on the scene” and, within seconds, gather an immense amount of information. Real-time situational awareness “Camera Sharing gives us a real-time view of the situation at hand as it’s unfolding,” said Kecia Williams, 911 Director, Livingston County 911 Central Dispatch. “Lots of times it takes a while to attain pertinent information from a 911 caller because they’re distraught or not clear. With Camera Sharing, we can instantly see for ourselves what’s going on, and we can get this information to the fire department, EMS, or law enforcement much quicker.” Camera Sharing technology This organization works with local school districts to provide educational services Livingston County is the first county in Michigan to demo the new technology at the Livingston Educational Service Agency in Howell. This organization works with local school districts to provide educational services and support to 26,000 students throughout the county. “I am impressed with the Camera Sharing technology and can see the potential for improving response times by first responders to critical events in our community,” said Michael Hubert, Superintendent of Livingston Educational Service Agency. Cybersecurity and privacy protection Joe Bommarito of Elite Fire Safety, a division of Sciens Building Solutions, a security integrator based in Novi, Michigan, said, “Most businesses and schools already have security cameras that can easily be connected to Eagle Eye 911 Camera Sharing, which is a first-of-its-kind technology that has cybersecurity and privacy protections built in." "As a former law enforcement officer, I believe camera sharing can significantly improve the outcome of emergencies and improve safety and security for first responders.” Dean Drako, CEO of Eagle Eye Networks said, “Livingston County is a prime example of a growing trend we’re seeing in the U.S. where entire communities - schools, businesses, public safety officials, and community pioneers are working together to ensure they are prepared as possible for emergencies.”
About 20 miles northeast of Battle Creek, Michigan, and 30 miles southwest of the state capital of Lansing lies the bucolic city of Olivet, population 1600. Olivet may be small as far as municipalities go, but it knows how to think big when it comes to protecting the safety of the 1250 students enrolled in its three Olivet Community Schools. Schools of Choice program That may sound like a large student body for a town its size until they realize that the district serves a geographic area of over 100 square miles and communities that rely on an economy based primarily on farming, light industry, and the area’s two largest employers – the University of Olivet and the schools themselves. As a participant in the state’s Schools of Choice program, the district can accept pupils from neighboring areas, which make up roughly 33% of the Olivet Community Schools population in addition to the city’s resident students. John Mertz Mertz's career has progressed from teaching to roles such as Director of Instructional Services Guiding school operations is Superintendent John Mertz. With 33 years of public education experience in Michigan, his career has progressed from teaching to roles such as Director of Instructional Services, Assistant Superintendent, and now Superintendent. This is his fifth year in Olivet. “The interesting thing about being a school superintendent is that there are several things I didn’t know were going to come with the job and never received training on,” says Mertz. “And one of the biggest ones is school safety and security.” Video monitors He recalls a Saturday night when he was doing some work in his office while his daughter was attending a school event that evening. When he happened to look up at the large video monitors behind him displaying the schools’ camera feeds, he was surprised to see a lot of people coming and going during that hour. “I thought, who are all these people? Where are they going?” Mertz says when he looked a bit closer, he saw there were kids with backpacks and baseball bats who were all heading to the middle school gym, where they held practice. “I didn’t have any idea how they got in,” he says. “It turns out the coaches had a key that they used to unlock doors whenever they needed to after regular hours.” Unfortunate events He adds that it’s an unfortunate but common fact that many school districts have far more keys in circulation than have been officially issued. “It can be difficult to figure out where the keys are coming from." "Are they being shared, or copied? For me, that was a huge aha moment. I found myself saying we’ve got to do something about this; we’ve got to make sure we’re controlling who is getting into our buildings, for what purpose, and when.” Communication and transparency Mertz and the district to push for major improvements in the school’s safety and security system That’s what compelled Mertz and the district to push for major improvements in the school’s safety and security system. But Mertz says that before the district could even consider who to work with and what to purchase and install, his team had to make its case to the schools’ stakeholders – the staff members, the board of education, and parents. “The community needed to understand the rationale that warranted the upgrades. It’s all about communication and transparency.” Updating the access control systems “The biggest changes we identified meant replacing our outdated and often grainy security cameras with sharper, more advanced units and stepping up the capacity and capabilities of our access control system so we could better schedule and manage access at perimeter doors and for activity spaces." "But what was especially crucial was adding digital access control to our classrooms, which was a priority for further enhancing student and teacher safety.” Fiber connections and wireless networks Mertz adds that before deploying advanced cameras and access control, upgrades to fiber connections and wireless networks also had to be made. “So, we started reaching out to security system integrators and experts in access control like ASSA ABLOY to start figuring out what technology was out there that would be the most advantageous for our district. It was quite a journey.” Relationship, reliability, and response time Ultimately, Mertz says the district issued an RFP. “Along with assessing what we needed and increasing our knowledge of the solutions available, we were also concerned about the kind of partnerships we were going to form with the companies that would be awarded the upgrade project." "We talked about the importance of the relationship, reliability, and response time. We wanted companies that could continue to provide support and be accountable if issues arose after the project was done.” Three key solutions Olivet Community Schools ended up choosing PDT of Byron Center, Michigan to be their systems integrator Upon completing their thorough vetting process, Olivet Community Schools ended up choosing People Driven Technology (PDT) of Byron Center, Michigan to be their systems integrator. PDT Account Executive Charlie Booth explains that gaining a full understanding of Olivet Community Schools’ requirements helped narrow the decision to three key solutions and organizations. Integrating cameras, access control, and analytics “We brought Genetec™ in and did a demo of their Unified Security Solutions platform that integrates cameras, access control, and analytics to make everything work seamlessly together,” says Booth. At the same time, he started talking with ASSA ABLOY Integrated Solutions Specialist David Hood who then facilitated a demo of the SARGENT IN100 Aperio® Wireless Lock. SARGENT IN100 Aperio® Wireless Lock “We chose the Aperio line because the Olivet classroom doors always needed to be online and communicating with Genetec in case global actions were needed to secure doors, like in a lockdown,” explains Booth. “Having IN100 electronic access control locks at each door means the facilities department now just issues keycards to staff instead of brass keys, making it much easier to manage credentials. For the video surveillance upgrade, we specified state-of-the-art i-PRO cameras.” 24/7 door monitoring Superintendent Mertz says, “The integration of the new cameras and access control solution with the Genetec platform and AI analytics allows us to monitor door activity 24/7." "It gives us a keen understanding of who is in the building and when.” He says that along with ensuring only those with card credentials have access, the system also alerts staff if a door has an issue such as a card reader/lock battery that needs replacing. ZeroEyes AI gun detection Mertz adds, “We also incorporated weapons detection software. We received a grant from the state for ZeroEyes AI Gun Detection." "And in a partnership with the City of Olivet, we obtained a grant for our first school resource officer. None of this would have been possible without upgrading our infrastructure, cameras, access control technology, and analytics nor without the support of our school and community stakeholders.” Complement security features Technology features i-PRO cameras district-wide, over a hundred SARGENT IN100 Aperio wireless access control locks Olivet Community Schools’ complement of security technology features i-PRO cameras district-wide, over a hundred SARGENT IN100 Aperio wireless access control locks for classrooms, and the Genetec Security Center unified platform. Christopher Dunn, Public Sector Account Executive for Genetec, further explains the value of his company’s solution, “One of the largest challenges Olivet faced was moving away from the fragmented system of the past where there was one platform for video and a separate one for the limited access control system they had." Human, vehicle, and threat detection "They needed to be able to harness the power of the technology at the edge that the new cameras offer and utilize it with applications that can detect things like the differences between human beings, vehicles, and potential threats.” He adds, “Because of how Genetec is structured and integrates so perfectly with other products, we’re able to bring everything into a ‘single pane of glass’, including analytics. That single pane of glass provides a dashboard that combines video and data feeds from multiple sources into a unified view.” Curb-to-core approach Dunn says that bringing everything together in one platform also eliminates the need for training on multiple systems, which was another highly important priority for Olivet Community Schools. According to David Hood, “ASSA ABLOY takes a curb-to-core approach when working with school districts, starting with the perimeter and then working inwards. Olivet Community Schools has followed that same approach. They have the perimeter protected with access control on every door along with video surveillance, and working inward to offices and classrooms, they now have integrated solutions throughout.” People Driven Technology Hood adds that collaborating with People Driven Technology and Genetec has been outstanding. “People Driven Technology understands our solutions and hardware, and they’re certified on our products." "That’s made installation and integration with i-PRO, Genetec, and analytics applications a seamless process for Olivet Community Schools.” An automatic classroom lockdown “It's all about student safety, staff safety, and community safety,” emphasizes Mertz. “When you have people in your facilities, putting in these extra measures buys extra time." "So, heaven forbid, if there ever is an incident, you're prepared for it, ready to react, ready to swing into action with the systems in place that are going to help you do that, including activating an automatic classroom lockdown if necessary. Safe and secure building “When you look at success, it all comes back to the district and the kids. Now I determine success on whether our kids are safe. Are they happy? Are they healthy? Are they in an environment where they feel comfortable? That's really what it's all about now, especially coming out of COVID." "You need to have kids feel like they're in a place where there are trustworthy adults around them, where the building is safe and secure, and where they feel comfortable to learn.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security SAFETY Act Designation, announced that its AI gun detection solution has been selected by West Feliciana Parish Schools (WFPS) to help mitigate gun-related violence. WFPS, based in St. Francisville, Louisiana, is renowned as one of the state’s highest-ranked educational systems. The district educates approximately 2,300 students from early childhood through 12th grade and is the school system of choice for the overwhelming majority of local students. WFPS boasts a robust early childhood program and a state-of-the-art career tech center, providing national certifications to prepare students for college and career success. ZeroEyes Operations Center "The safety and well-being of our students and staff members is our top priority,” said Hollis Milton, Superintendent of WFPS. “We are constantly considering how we can provide additional safety assurances, and ZeroEyes is one of the most proactive safety measures we could find.” ZeroEyes' AI gun detection and intelligent situational awareness software is layered on digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software is layered on existing digital security cameras. If a gun is identified, images will instantly be shared with the ZeroEyes Operations Center (ZOC), the industry's only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they will dispatch alerts and actionable intelligence, including visual description, gun type, and last known location, to local law enforcement and the school security team as quickly as three to five seconds from detection. Enhancing school safety WFPS maintains a comprehensive security program, collaborating closely with the local sheriff's department and employing full-time School Resource Officers (SROs). The district is further enhancing its school safety by deploying ZeroEyes across its Bains Lower Elementary, Bains Elementary, West Feliciana Middle School and West Feliciana High School campuses. "We commend WFPS for their proactive approach in safeguarding their community," said Mike Lahiff, CEO and co-founder of ZeroEyes. "The ability to swiftly identify and locate gun-related threats is a game-changer in securing school campuses. By deploying ZeroEyes, WFPS demonstrates a commitment to leveraging advanced technology to better protect their students and faculty.”
Round table discussion
College campuses are meant to be places of learning, growth, and community. Fostering such an environment requires the deployment of policies and technologies that ensure safety and security. Considering the growing role of security technology in the higher education market, we asked this week’s Expert Panel Roundtable: What are the new applications for security technology in the college and university markets?
Physical security is a large market overall, encompassing a range of diverse vertical markets, each with its own set of challenges and opportunities. The success of the security industry overall depends on the ability of companies and technologies to meet the specific needs of each vertical market. Some markets offer more lucrative opportunities than others. We asked this week’s Expert Panel Roundtable: Which vertical markets have the greatest potential for growth for physical security systems?
In the United States, they are called license plate recognition (LPR) systems. In Europe, the more common term is automated license number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle color, type, make, and model. We asked this week’s Expert Panel Roundtable: What's new with license plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?
Products
White papers
Access management in higher education
DownloadSchool Security Checklist
DownloadWhy SAAS Security Platform Is More Popular In American SMEs
DownloadSafeguard Students With New Techniques And Technology
DownloadAssessing Safety Readiness For Education Campuses
DownloadThe Critical Role of Access Control in K-12 School Security
DownloadProtecting Dormitory Residents and Assets
DownloadSchool Security Moves to the Cloud
DownloadPhysical Access Control In Higher Education
Download6 Questions To Ask When Choosing A Security System
DownloadHow End-to-End Video Security Solutions Can Help Your Organization With Social Distancing
DownloadBuilding A Safe Ecosystem For Visitors Post COVID-19
DownloadSchooling the Market on Education Security
DownloadHow To Keep Students Safe On Campus
DownloadVideo Surveillance: Lessons From The Education Market
Download