Security management
Balancing operational efficiencies and customer satisfaction with costs, resources, and legislative obligations is a challenge faced by every security services provider offering keyholding and alarm response. While mobile security operations must adhere to strict compliance, with BS 7984 standard and SIA licensing for guards at the very core of the operations, security providers are increasingly contending with a wider range of regulations. Among the most pressing are sustainability requirement...
HiveWatch, the AI-driven physical security platform, announced it has appointed James Segil to its board of directors. Segil joins at a pivotal moment for the company following its recent $33 million Series B funding round, led by Anthos Capital with participation from Harmonic Growth Partners, Across Capital, and existing investors. Segil’s addition to the board brings invaluable strategic guidance from someone who disrupted a major physical security category – turn...
ASIS International, the world's largest association for security management professionals, is pleased to announce the opening of its Call for Proposals for the Global Security Exchange (GSX) 2026, inviting industry experts, thought leaders, and practitioners to submit cutting-edge presentations across critical security domains. Additionally, the association is seeking distinguished security professionals to serve as proposal reviewers, furthering the conference's...
Zimperium, the world's pioneer in mobile security, now announced that Alistaire Davidson has joined the company as Chief Financial Officer, reporting directly to CEO Shridhar Mittal. Alistaire brings more than 20 years of finance leadership experience across private equity–backed and public software companies. Alistaire most recently served as Regional CFO, Americas at The Access Group, where he led the post-acquisition integration of two strategic business units. Prior to The Access Grou...
Verkada, a pioneer in AI-powered physical security technology, announced CapitalG is pioneering an investment at a $5.8 billion valuation - an increase of $1.3 billion since the announcement of its Series E in February. The investment will accelerate Verkada's AI capabilities and may also enable liquidity for employees, and comes as the company surpasses $1 billion in annualized bookings. AI-powered transformation "AI is fundamentally transforming how organizations protect people and places,...
The Security Industry Authority is encouraging the public to stay vigilant and report issues to security this winter as part of its ‘Safe Season Together’ campaign. At the heart of the campaign is the recognition that public safety is a collaborative effort. As the festive period begins, the Security Industry Authority is reminding everyone of the important role they play in keeping themselves and others safe. Highlighting the need for those out and about in December and January to...
News
Magenta Security Services marked its 30th anniversary in style last night at the Security & Fire Excellence Awards, where the company was named Security & Fire Sustainability Champion for the third year running. The Security & Fire Awards for Excellence are recognized across the sector as a benchmark for outstanding performance, innovation and best practice in both security and fire. The Sustainability Champion category honors organizations that demonstrate leadership in environmental responsibility and long-term commitment to sustainable operations. Magenta first secured the title in 2023 and retained it in 2024 before completing the hat trick in 2025. Security and sustainability “Winning the Sustainability Champion title for the third year in a row, while celebrating 30 years in business, is an incredible milestone for everyone at Magenta,” said Abbey Petkar, Managing Director of Magenta Security Services. “From the very beginning we believed that security and sustainability must go hand in hand. This recognition shows that our approach is working for our clients, our people and the planet.” Magenta’s sustainability journey Magenta’s sustainability journey is woven through its three decades in business. The company was one of the first security providers to certify to ISO 14001, embedding environmental management into its core operations rather than treating it as an add-on. That discipline enabled Magenta to reach carbon zero status in 2022, three years ahead of its public 2025 target and without relying on offsetting. Key measures include a fully electric fleet supported by on-site solar charging at its headquarters, a switch to 100 per cent renewable electricity across its estate, deep energy-efficiency upgrades and a fully paperless office environment that saves more than 150 trees each year. Cyber Essentials certification Recognising that modern risk and sustainability span both physical and digital domains, Magenta has also invested in Threat Evolution, its dedicated cyber security training and consulting arm. Threat Evolution supports clients with Cyber Essentials certification, penetration testing, vulnerability scanning and tailored cyber awareness training, extending Magenta’s commitment to resilience, governance and data protection. Magenta’s approach Transparency is another cornerstone of Magenta’s approach. The company publishes its emissions data through the Carbon Database Initiative (CaDI), inviting scrutiny and sharing practical lessons on topics such as phasing electric vehicles, mapping energy use in older buildings and designing out paper from guarding processes. Magenta also supports Police Community Clubs locally and sponsors children internationally, aligning commercial success with long-term social value. Own environmental performance Abbey Petkar added, “Sustainability is not a project for us. It is how Magenta works, from the vehicles we drive and the energy we use to the way we support communities and help clients improve their own environmental performance." "To receive this award again, in our 30th year, is both a proud moment and a powerful motivation to keep raising the bar.”
SAGE Integration is excited to announce the newest office in Ripley, Tennessee, located at 567 Highway 51 South, Ripley, TN 38063. The latest expansion continues to enhance SAGE's ability to serve its expanding regional client base and address the rising demand for advanced electronic security solutions in the region. The new Ripley office will bolster local operations, enabling quicker response times, improved service, and deeper engagement with clients and the community while supporting our National Clients throughout the area. SAGE Integration's ongoing commitment "Our presence in Ripley, TN, marks a significant milestone for SAGE Integration," said John Nemerofsky, Chief Operating Officer. "This location allows us to deliver even greater value to our clients and strengthen our relationships within the region." The Ripley office demonstrates SAGE Integration's ongoing commitment to responsive service and reinforces its role as a trusted, innovative security integration partner nationwide.
As AI-generated phishing attacks flood inboxes with more realistic and personalized scams, DigiCert, a pioneer in intelligent trust, today released new research revealing that consumers are turning to verified brand identities in email for reassurance--especially during Cyber Week. The study, conducted by independent research firm Vitreous World, surveyed 5,000 consumers across the U.S., U.K., Australia, and New Zealand to understand how verified logos and sender authentication will impact trust, engagement, and safety during the height of online shopping season. Integrity as AI With 86% of consumers saying they feel safer when verified logos appear in their inbox, the findings underscore a growing need for organizations to strengthen their email authentication practices. Doing so not only helps protect shoppers from phishing during the busiest online shopping week of the year, but also preserve brand integrity as AI rapidly increases the volume, frequency, and sophistication of phishing emails. Key findings Email trust drives clicks and conversions. 64% said they are more likely to click or act on an email that displays a verified brand logo, a critical insight for marketers competing for attention during Cyber Monday and holiday campaigns. Shoppers reward trusted brands. Given four options, nearly half (49%) said that if two competing brands sent similar offers, they would choose the one with a verified logo, suggesting that verified brand identity is not just about safety — it’s about sales. The inbox is the new battleground for brand trust. With 87% of consumers receiving suspicious emails at least a few times a year and 41% believing email providers should do more to protect them, trust in the inbox has become both a security and customer experience issue. Implementing Verified Mark Certificates “Our marketing team has seen a noticeable lift in open and engagement rates since implementing Verified Mark Certificates,” said Ryan Burton, Email & Retention Manager at OddBalls, a UK-based online retailer. “Having our verified logo appear directly in the inbox gives recipients immediate confidence that the message is authentic. It’s not just a security investment, it’s a brand trust investment. During high-volume periods like Cyber Monday, that trust translates directly into more opens, more clicks, and ultimately, more conversions.” Restoring trust in digital communication “Cyber Monday is a high-stakes moment for both brands and consumers,” said Al Iverson, Industry Strategist at DigiCert. “Our research shows that visual verification isn’t just about protecting users, it’s about restoring trust in digital communication. A verified logo can be the difference between a customer clicking ‘buy now’ or deleting your message.” The role of VMCs, CMCs, and DMARC Verified Mark Certificates (VMCs) and Common Mark Certificates (CMCs), supported by strong DMARC authentication, form the foundation for displaying verified brand logos in email. Together, they ensure that a brand’s logo appears only when the sender’s identity has been cryptographically confirmed and their domain properly authenticated. This combination not only deters phishing and spoofing attacks but also provides consumers with instant, visual assurance that the message is genuine, transforming trust into a tangible element of the inbox experience.
Global security manufacturer Gallagher Security is proud to announce a strategic partnership with Fortified Security, a pioneering perimeter systems integrator with over 30 years of specialized experience. This collaboration enables Gallagher’s Channel Partners across the Americas to offer enhanced perimeter security solutions to their customers, supported by Fortified’s expert design and installation services. Long-term client relationships This partnership empowers Gallagher Channel Partners to expand their service offerings, meet broader customer needs, and strengthen long-term client relationships. By engaging Fortified as a trusted subcontractor, Channel Partners who do not currently provide perimeter installation services can confidently deliver complete, integrated security solutions—reducing the risk of losing business to competing providers. Complete security infrastructure Natalie Bannon, Director of Strategic Alliances at Gallagher Security, says this partnership is a powerful way to help Gallagher’s Channel grow: “This partnership enables Channel Partners to expand their capabilities by offering Gallagher’s industry-pioneering perimeter security solution to both new and existing clients." "By partnering with Fortified, Channel Partners can better serve their customers through the design, installation, and integration of another critical component of a complete security infrastructure.” Install perimeter solutions Fortified President, Chase Cary, adds that the collaboration is built on a shared commitment to partnership and protection: “Gallagher, the Channel Partner, and the Fortified team each play a vital role in making this possible." "Our ultimate goal is to make end-users and their organizations safer — and stronger — because of it. We’re excited to come alongside Channel Partners, learn about their clients’ unique needs, and design and install perimeter solutions that directly address those challenges.” Fortified’s specialized integration capabilities Through this collaboration, Gallagher reinforces its commitment to supporting Channel Partners with the tools, resources, and expertise needed to drive mutual growth. By combining Gallagher’s world-class perimeter technology with Fortified’s specialized integration capabilities, Channel Partners are now better equipped than ever to deliver complete, end-to-end security solutions.
Google Cloud announced a significant, multi-million-dollar contract with the NATO Communication and Information Agency (NCIA) to deliver highly secure, sovereign cloud capabilities. This strategic partnership is a major step in bolstering NATO's digital infrastructure, strengthening its data governance, and enabling it to securely leverage cutting-edge cloud and AI capabilities. NCIA selected Google Distributed Cloud (GDC) to support the Joint Analysis, Training and Education Centre (JATEC). JATEC will leverage this infrastructure to modernize its operational capabilities and handle classified workloads. Cloud services and cutting-edge AI capabilities GDC air-gapped, a key component of Google's Sovereign Cloud solutions, brings Google's powerful cloud services and cutting-edge AI capabilities into completely disconnected, highly secure environments. This empowers organizations to run modern AI and analytics workloads on their most important data, unlocking valuable insights while maintaining absolute operational control and meeting the strictest digital sovereignty requirements. Leveraging this technology ensures that NATO maintains uncompromised data residency and operational controls, providing the highest degree of security and autonomy, regardless of scale or complexity. This contract underscores Google Cloud's dedication to supporting partners who protect and empower the most valuable data across NATO's allies. Robust and resilient infrastructure "Google Cloud is dedicated to supporting NATO's critical mission to develop a robust and resilient infrastructure and harness the latest technology innovations," said Tara Brady, President of Google Cloud EMEA, adding "This partnership will enable NATO to decisively accelerate its digital modernization efforts while maintaining the highest levels of security and digital sovereignty." "NCIA is committed to leveraging next-generation technology, including AI, to enhance NATO’s operational capabilities and safeguard the Alliance’s digital environment," said Antonio Calderon, Chief Technology Officer, NCIA, adding "Partnership with industry is a critical component of our digital transformation strategy. Through this collaboration, we will deliver a secure, resilient and scalable cloud environment for JATEC that meets the highest standards required to protect highly sensitive data.”
Hackuity, the risk-based vulnerability management provider, released new research revealing the mounting pressure on security teams as they struggle to keep pace with the rising number of CVEs (Common Vulnerabilities and Exposures). The Vulnerability Management Report explores the challenges of vulnerability management and includes insights from 200 IT security decision-makers across the UK and APAC. Additional strain As the number of CVEs continues to rise, nearly half (46%) of respondents say that the volume has placed additional strain on their security teams’ resources impacting not only organizational security but also staff wellbeing. One in four, 26%, admit this pressure has contributed to a data breach, while more than a third, 36%, report it resulted in a regulatory fine. Over a third (36%) also say it has delayed incident response, and 33% report missed security alerts as a result. In terms of the human impact, 38% report that it has led to burnout within the team. Knock-on effect Commenting on the findings, Sylvain Cortes VP Strategy at Hackuity said: “We know that teams are feeling the pressure right now - but what’s most concerning is the knock-on effect this is having on organizations and on the team’s well-being.” “From missed alerts to fines, there are real consequences at play when vulnerabilities aren’t managed in a way that’s making the best use of team’s time and expertise. The nonstop flood of alerts isn’t just stressful, it’s costly.” The ability to process and manage vulnerabilities has become ever more critical. Whilst most organizations, 77%, report that they have formalized vulnerability remediation processes in place for identifying vulnerabilities, only 36% have a risk-based approach as the primary method, where vulnerabilities are based on asset criticality‚ exploitability and business impact. Key findings It also seems that there is more work to do in moving vulnerability management (VM) higher up the agenda as 60% of respondents reported that it does not receive the same focus as other IT security projects. Additional key findings from the report include: Critical Vulnerabilities take on average four weeks to remediate: The mean time to remediation (MTTR) for critical vulnerabilities is four weeks, on average. However, one in five organizations (21%) report that it can take between one and three months to remediate critical vulnerabilities. The barriers to VM: operational and budget constraints: Although respondents recognize the strain of vulnerability management, they are hindered by operational (43%) and budget (41%) constraints. The issue of staff and skills shortages also play a part with 29% of respondents citing lack of skills within the team and a quarter reporting that high staff turnover prevents them from making improvement to VM practices. Sylvain Cortes continues: “Security leaders need to look at how they’re equipping their teams to make sure they can keep pace with the rising volume and complexity of vulnerabilities. Without context and intelligence around the alerts, they risk wasting valuable time and resources chasing down threats or missing alerts that could pose the greatest risk for their organization.”


Expert commentary
The terrorism threat in the UK is very real. In fact, since July 2019, the threat level has never dropped lower than “substantial” or “severe.” To ensure preparedness across public places and events, the UK government has introduced the new Terrorism (Protection of Premises) Act 2025, more commonly known as Martyn’s Law in memory of Martyn Hett, a victim of the 2017 Manchester Arena bombing. Overarching aim The new legislation requires operators of public spaces and events to immediately assess and improve their readiness to respond to a terrorist attack. The overarching aim: being better prepared, protected and ready to respond should an attack occur. Everything from busy shopping centers to large stadiums must comply with Martyn’s Law by April 2027, and the Security Industry Authority (SIA) is charged with enforcing the rules. Upgraded security systems The smaller venues and events are only required to enforce low-cost solutions with no physical measures There are different rules depending on the capacity of public premises or the event, ranging from a standard-duty premises (200 – 799 people, including staff) to an enhanced-duty premise (over 800). The smaller venues and events are only required to implement low-cost solutions with no physical measures. Enhanced environments, however, must provide monitoring in and around the facility and document public protection measures. Many organizations will likely invest in upgraded security systems. However, effective responses depend not only on hardware but also on situational awareness and training, helping staff identify potential threats and respond effectively under pressure. Physical security information management systems Terror-related attacks are rare and unpredictable, and the most experienced personnel are not always on shift when something does occur. Even if they are, the most seasoned security professionals can’t ensure every decision they make is the right one. One solution gaining attention is physical security information management (PSIM) systems, which integrate siloed security tools — such as CCTV, access control, and fire sensors — into a unified platform. PSIMs enable rapid information processing, automated workflows and coordinated responses to incidents, whether routine or critical. Use PSIMs to handle emergencies PSIM systems have been around for many years and have been embraced by large airports and mass transit organizations PSIM systems have been around for many years and have been embraced by large airports, mass transit organizations and critical infrastructure companies. However, these systems are ideally suited to any larger-scale environment, such as those classified as an enhanced-duty premise by Martyn’s Law. For example, airports use PSIMs to handle emergencies, locate missing persons or assess potential threats like unattended luggage. Similarly, PSIMs can improve situational awareness for stadiums, shopping centers and event venues, aiding crowd management, emergency evacuations and collaboration with police or emergency services. External stakeholder intervention Should an incident require external stakeholder intervention, the PSIM becomes a mission-critical collaboration tool, enabling real-time information (including video footage) to be shared with decision-makers, emergency control rooms and first responders en route to the scene. This ensures they arrive with the appropriate resources and can deploy faster to the right places. PSIM systems also facilitate post-incident analysis, helping organizations improve protocols, demonstrate compliance and fulfill their duty of care. Impacted by terror-related tragedies Martyn’s Law aims to eliminate the complacent mindset of “it won’t happen here” when assessing the risks associated with public gatherings. Communities impacted by terror-related tragedies serve as a stark reminder that such incidents can and do occur. Within the security sector, it is crucial to promote discussions on how new approaches, technologies, and training can enhance preparedness. Equally important is the responsibility to raise awareness about Martyn’s Law and its role in fostering safer public spaces.
As the world’s security landscape grows ever more complex, the need for a dynamic, comprehensive, and globally minded gathering of thought pioneers and practitioners has never been more pronounced. Enter the Global Security Exchange (GSX) 2025, hosted by ASIS International, a signature event representing seven decades of commitment to advancing the security profession. This year marks a historic milestone, as GSX and ASIS International both celebrate 70 years of shaping the future of security, with New Orleans serving as the perfect host city for this anniversary celebration; making the 2025 conference not only a convergence of expertise but a tribute to the security profession’s evolution and resilience. Setting the stage: A global gathering with a rich legacy GSX has established itself as a premier international forum, bringing together security professionals Since its inception, GSX has established itself as a premier international forum, bringing together security professionals from nearly 100 countries across the globe. This diversity is both a testament to the universal importance of security and a reflection of GSX’s core objective—unifying security and business professionals under a shared mission: to elevate the industry through education, collaboration, and innovation. GSX’s member-driven approach GSX’s programming is carefully curated each year through a rigorous speaker proposal submission process by security professionals for security professionals. ASIS International consults extensively with its global membership and prior attendees to assess shifting educational needs and emerging industry priorities. This member-driven approach ensures that GSX continually evolves, remaining attuned to the rapidly changing security environment and the real-world concerns of professionals in every corner of the globe. Programming highlights: Education at the core The agenda features more than 200 sessions, giving a masterclass in the most pressing and transformative topics The heart of GSX 2025 lies in its robust educational offerings. This year, the agenda features more than 200 sessions, presenting a masterclass in the most pressing and transformative topics facing the security sector today. Three standout speakers Ian Bremmer, Sol Rashidi, and General Paul Nakasone - luminaries in geopolitics, artificial intelligence, and cybersecurity respectively—will headline the event, offering insights that bridge current realities with future opportunities. These keynote presentations promise to set the tone for an event dedicated to thought leadership and actionable intelligence. GSX 2025’s challenges and emerging trends GSX 2025’s educational framework is structured around nine distinct track themes. Each track addresses a critical area of security management, capturing both enduring challenges and emerging trends: Crime: Delving into the latest strategies for preventing, detecting, and responding to criminal activity in a world where threats are increasingly complex and transnational. Digital Transformation: Exploring the integration of cutting-edge technologies into traditional security operations, including automation, analytics, and the digitalization of security infrastructure. Information Security/Digital Risk: Addressing the ever-expanding need to protect data, intellectual property, and privacy against cyber threats and breaches. Law/Ethics: Focusing on the legal and ethical dilemmas that security professionals navigate, from compliance to responsible innovation. Managing Organizations: Providing strategies for effective leadership, organizational change, and operational excellence within security teams and entities. National Security: Examining the intersection of corporate, governmental, and civic security with a global lens on terrorism, conflict, and cross-border risks. Physical/Operational Security: Reinforcing the foundations of asset protection, site security, and crisis response through practical case studies and new methodologies. Professional Development: Empowering attendees to advance their careers through skills training, certifications, and leadership development. Risk Management: Mapping techniques to assess, mitigate, and manage risks in a broad array of operational contexts. Together, these tracks create a comprehensive curriculum spanning the complete landscape of contemporary security—from foundational principles to emerging innovations, from physical infrastructure to digital domains, all viewed through an authentically international lens. Innovation in action: Beyond the classroom One of the hallmarks of GSX 2025 is its commitment to making education not just informative, but immersive and accessible. Attendees will find a wealth of learning opportunities woven directly into the Exhibit Hall itself. No longer confined to traditional classrooms, education pulses throughout the venue, with exhibitors invited to showcase their latest insights and real-world solutions to the industry’s most urgent trends. With approximately 500 exhibitors represented, this expansion transforms the Exhibit Hall into a vibrant nexus of exchange, discovery, and hands-on engagement. GSX’s broader ethos No special gear needed, just bring your device and headphones to access live AI-powered captions To further enhance inclusivity and participation, GSX 2025 is pioneering the use of real-time translations through Wordly, for 35 select sessions over the course of this three-day event. This feature ensures that language barriers do not hinder the sharing of ideas, enabling attendees from around the world to fully engage with content and collaborate across borders. This digital transformation is emblematic of GSX’s broader ethos: embracing innovation and experimentation to create greater access to professional development tools within the security profession. No special gear needed, just bring your device and headphones to access live AI-powered captions and translations. Specialized zones and rapid learning GSX 2025's Exhibit Hall transforms into a vibrant ecosystem of discovery, where dedicated learning stages create immersive worlds of specialized knowledge. Journey through the School Security Zone to unlock cutting-edge solutions protecting our educational communities; experience the Organizational Resilience Zone where tomorrow's adaptive strategies come to life; and energize at the X Stage, where security pioneers and integrators accelerate their expertise through lightning-fast, game-changing insights that drive real-world impact. Signature events and unique experiences No GSX experience would be complete without opportunities to connect, celebrate, and unwind No GSX experience would be complete without opportunities to connect, celebrate, and unwind. This year, “ASIS Celebrates!” will take place at the historic National WWII Museum, providing a unique backdrop for networking, reflection, and community building. Beyond formal programming, GSX 2025 pays attention to the “little touches” that make a big difference—such as the Security SyncUP Lounge, where attendees can relax, recharge, and reconnect in a welcoming setting that fosters meaningful exchanges and new friendships. The future of security, united GSX 2025 stands as a testament to seventy years of progress, learning, and community in the global security profession. As participants converge from every corner of the world, the event offers not just a forum for knowledge-sharing, but a catalyst for innovation, collaboration, and progress. With an agenda shaped by its members, a program rich in content and diversity, and a spirit of experimentation and inclusion, GSX 2025 is poised to once again set the standard for what it means to protect, connect, and inspire in a rapidly changing world.
Physical security isn’t a one-time project or a static system. It’s a dynamic, ongoing process and program that requires constant attention and management to remain effective. While the initial implementation of a security system — what we often call Day 1 — is critical, the ongoing maintenance, service, and adjustments made after systems are operational, or Day 2, are equally essential. Security program long-term Organizations that fail to focus on post-occupancy security operations risk falling victim Organizations that fail to focus on post-occupancy security operations risk falling victim to a phenomenon known as "program drift," where systems and policies gradually deviate from their intended standards over time. To manage your security program long-term, you often need an outside perspective. By engaging a security partner to provide managed services, organizations can achieve a strategic solution for maintaining their security programs' integrity, effectiveness, and efficiency over the long term. Let’s look at the reasons why. Moving beyond Day 1 Day 1 is the milestone moment when a security system is launched — whether it’s a new system, an upgraded access control platform, or a transition to advanced surveillance technology. On this day, all components align with established policies and standards. Yet, Day 1 is only the beginning of a security program's lifecycle. What happens on Day 2 and beyond is often where the real work begins. Without a robust plan for ongoing service and maintenance, security systems can quickly fall out of compliance. Policies become outdated, configurations drift, and vulnerabilities emerge. This gradual degradation — program drift — occurs not due to neglect but as a natural result of decentralized management; competing operational priorities; and the lack of dedicated, knowledgeable resources to oversee the systems. Avoiding program drift Drift is particularly pronounced in physical security because, unlike other building systems Program drift occurs when a security program’s elements — such as access controls, camera placements, or intrusion detection settings — gradually become misaligned from their intended standards. Think of a straight line representing perfect compliance on Day 1. Over time, various factors push individual components off this line. Left unchecked, these deviations accumulate, leading to significant vulnerabilities and deferred remediation costs that would be much easier to manage and predict with a more proactive approach. Drift is particularly pronounced in physical security because, unlike other building systems such as lighting or HVAC, security measures are often viewed as inconveniences. Even when systems function as designed, features like turnstiles, visitor management, or additional access controls may face pushback for being "in the way" of daily operations. This resistance and the Day 2 problems that often result — along with the lack of centralized oversight — exacerbate the risk of misalignment and ongoing inefficiencies. Why centralized post-occupancy management matters Post-occupancy management is critical for maintaining the long-term health of a security program. Facility managers, who are often tasked with overseeing security systems, may lack the technical expertise or bandwidth to handle the complexity of modern security infrastructure. Partnering with dedicated professionals to help meet these responsibilities ensures systems are managed effectively and vulnerabilities are addressed proactively. It also helps improve system availability and uptime, accelerate break/fix response and resolution times, lower ownership costs by reducing unnecessary and repeat service dispatches, and achieve a more consistent end user experience. Moreover, centralized management provides a consistent framework for handling security systems across multiple sites. This consistency is vital in preventing Program Drift, ensuring that local variations or individual decisions do not undermine the organization’s overall security posture. The case for managed services Hiring outside consultants offers a proactive and professional approach to mitigating program drift Hiring outside consultants offers a proactive and professional approach to mitigating program drift. Specialized providers have the expertise, tools, and resources to manage complex security systems effectively and ensure those systems remain aligned with organizational policies and performance expectations. By acting as a dedicated external resource and interfacing regularly with your security team, your consultant can help you build, manage, and optimize a variety of services that help keep your program on track. These services range from system health and availability management (break fix); move, add change management; system configuration administration; and program/project management offices. Key benefits in the following areas Let’s look at how a managed services a partner can yield key benefits in the following areas: Standards compliance. Centralized management ensures that security systems and processes remain in compliance with established policies and standards, reducing vulnerabilities caused by ad hoc changes or decentralized management. Operational efficiency. Managed services streamline maintenance and support workflows, minimize downtime, and ensure quick issue resolution. Enhanced security resilience. Proactive monitoring and maintenance reduce the likelihood of system failures and improve overall system reliability. Standardized processes for move-add-change (MAC) activities ensure that security configurations remain consistent across locations. Cost savings. Outsourced providers help organizations optimize resources, avoid errors, and benefit from economies of scale in service delivery. Strategic focus. Outsourcing also allows internal teams to shift their focus from routine operational tasks to higher-value activities, such as strategic planning, threat analysis, and incident response. Long-term value of security investments While Day 1 success is the foundation of a comprehensive program, what happens on Day 2 determines your ability to realize the long-term value of your security investments. As the complexity of security challenges grows, leaders must prioritize sustained management and professionalized oversight to protect their organizations, making the conversation around post-occupancy security more critical than ever. By adopting innovative strategies, implementing mature toolsets and processes, and leveraging specialized expertise, organizations can ensure their programs remain robust, aligned, and prepared to meet the challenges of tomorrow.
Security beat
Drones are poised to fill long-standing gaps in physical security. Fixed cameras leave blind spots, and human guards cannot quickly cover large or complex properties during high-risk moments. Drones fill the gaps, providing a missing mobile layer, offering unmatched speed, broad aerial visibility, and proactive coverage that elevates security from reactive to truly responsive and deterrent. As an added element in security systems, drones complement fixed cameras, access control, and license plate recognition (LPR) systems by serving as dynamic, rapid-response assets that reach areas other technologies cannot. Integrated with existing alarms and sensors, drones can auto-launch on triggers to deliver near-instant, real-time aerial video for accurate threat verification, giving security teams critical information before taking action. Drones as first responders Drones as first responders (DFR) are a new tool in Flock’s suite of security technologies “Drones are a natural fit for physical security because they provide teams with fast, flexible visibility that fixed cameras and human patrols cannot always deliver, especially on large properties,” says Keith Kauffman, Senior Director of DFR Strategy at Flock Safety. Drones as first responders (DFR) are a new tool in Flock’s suite of security technologies, which includes LPR, video surveillance, and gunshot detection systems. “Drones act as a force multiplier, improving coverage without increasing head count,” says Kauffman. “Scaling is easy with the ability for one pilot to control multiple drones stationed at multiple locations.” Drones as a force multiplier Drones reduce manpower needs by offering wide-area coverage that would normally require several guards or patrol vehicles. Drones boost security team productivity and safety by automating the most dangerous and tedious tasks, such as alarm verification. Acting as a first responder, a drone can clear a significant portion of false alarms, allowing human guards to concentrate on high-priority roles, complex issues, or confirmed intrusions with real-time aerial intelligence. This improves personnel deployment and cuts down workload, risk, and costly overtime. Drones also significantly improve efficiency and safety for security personnel, says Kauffman. A drone system delivers real-time aerial intelligence in seconds, enabling guards to respond wisely and safely. Initial threat verification Some drone systems' yearly costs are similar to a single mid-level guard's salary Some drone systems' yearly costs are similar to a single mid-level guard's salary, but they can cover up to 38 square miles. This investment provides ROI by reducing large-scale losses and allowing human guards to focus on high-touch roles, while the drone handles initial threat verification. Flock Safety entered the drone space after acquiring Aerodome DFR in October 2024, with their private-sector drone as automated security (DAS) system rolling out in Q3 2025. And because the drones plug directly into FlockOS and work alongside other tools like license plate recognition (LPR) and gunshot detection, they can launch automatically on alerts, creating a smarter, faster response workflow. Immediate intelligence to combat false alarms Drones fundamentally change false alarm management by providing security teams with immediate, real-time aerial intelligence. When an alarm triggers, the drone can be dispatched to the exact location in seconds, allowing operators to verify instantly the threat's legitimacy via a live HD or thermal video feed. This capability enables staff to safely clear or ignore false alarms remotely, preventing guards from wasting time and resources on unnecessary, lengthy, or potentially dangerous physical checks. This process can significantly reduce alarm fatigue and allow personnel to reallocate their time to genuine security threats. Emerging drone use cases enhance security operations Emerging drone use cases enhance security operations by integrating with existing systems and enabling novel applications. One key area is Post-Storm Damage Assessment, where drones provide rapid, safe aerial visuals of expansive sites, documenting damage for insurance claims far faster than ground inspections. Another area is Ecosystem Integration via platforms such as FlockOS, where the drone automatically launches in response to alerts from other security sensors (LPR, gunshot detection). This creates a powerful, automated workflow that unifies responses, enabling quicker incident interruption, better evidence capture, and a proactive security posture without increasing the number of human patrol staff. Evolving regulations expanding drone usage Evolving FAA regulations and corporate airspace policies impact the usage of drones Evolving Federal Aviation Administration (FAA) regulations and corporate airspace policies impact the usage of drones. Today, operating drones beyond the visual line of sight (BVLOS), at night, and over-people/roadway operations requires special FAA waivers. However, the trend — Remote ID, expanded FAA Part 107 allowances, and growing BVLOS exemptions proven in drones as first responders (DFR) — reduces overhead and allows more automation. Combined with enterprise standard operating procedures (SOPs), geofencing, and data governance, drone adopters can standardize flights, minimize risk, and integrate with other technologies. “In practice, that means automated dock-based dispatch on verified alerts, scheduled perimeter sweeps, and incident-to-incident coverage without on-site pilots,” says Kauffman. “The results are faster detection-to-dispatch, stronger evidentiary chains, and lower costs per incident — unlocking 24/7 remote operations across campuses, logistics, and sites.” Winning Over Public Acceptance Public perception plays an important role in how communities embrace drone technology, which is why transparency and clear policy are essential. When employees and community members understand the drone’s purpose — responding to alarms, patrolling after hours, and deterring crime — they tend to view it much as they do security cameras or access control: a safety tool, not surveillance. Flock’s system is event-driven, privacy-minded, and used only by authorized personnel, and every flight is logged, documented, and fully audit-traceable for accountability. “With clear communication and responsible use, drones become a reassuring layer of protection rather than a cause for concern,” says Kauffman. Drones are extremely safe, actually reducing human risk by acting as a first responder to scout ahead of personnel. They come with layers of protection, such as geofencing, obstacle avoidance, precision landing, autonomous deconfliction with aircraft, and automated safety modes. Smartest approach For security teams considering adding drones, the smartest approach is to choose a system built specifically for 24/7 security operations. That usually means the drone provider handles FAA paperwork, writes clear procedures, develops sound policy, and trains customers’ staff so everything runs smoothly. “With the right partner, drones become a safe, compliant, and incredibly helpful part of your security toolkit,” says Kauffman. Flock ramps up drone production Flock Safety’s immediate focus is ramping production of its U.S.-designed and assembled Flock Alpha hardware, which is already NDAA-compliant and built to meet the growing demand for American-made drone solutions. At the same time, the next six to 12 months will center on releasing key software updates, such as automated scheduled patrols. Together, increased hardware production and these software advancements will move the DAS product line toward full capability and broader commercial availability. Flock DAS Flock DAS essentially provides a guard’s vantage point from above, with the ability to instantly fly to any corner of a property. “And it doesn’t sleep on duty or call in sick,” says Kauffman. “Picture your traditional security measures: cameras are your static sentries; guards are your roaming patrollers. Now add Flock DAS: it’s your mobile, flying camera that can respond anywhere, anytime.” Just as a dispatcher coordinates police calls, Flock DAS serves as an aerial dispatcher for the security team, triaging alerts and providing eyes on the scene before anyone sets foot into potential danger. It gives the security team immediate, property-wide awareness so they can make safer, more informed decisions during any incident.
Anyone who has been in a proverbial cave for the last couple of years faced a language barrier at this year’s ISC West 2025 trade show. The industry’s latest wave of innovation has brought with it a new bounty of jargon and buzzwords, some of which I heard at ISC West for the first time. As a public service, we are happy to provide the following partial glossary to promote better understanding of the newer terms. (Some are new to the security industry but have been around in the IT world for years.) Obviously, if we can’t understand the meaning of the industry’s lexicon (and agree on the meaning of terms!), we will struggle to embrace the full benefits of the latest industry innovation. Not to mention we will struggle to communicate. Generative AI Generative AI can identify an object in an image based on its understanding of previous objects This was perhaps the most common new(ish) term I heard bouncing around at ISC West. While the term artificial intelligence (AI) now rolls off everyone’s tongue, the generative “version” of the term is catching up. Generative AI uses what it has learned to create something new. The name comes from the core function of this type of artificial intelligence: it can generate (or create) new content. It doesn’t just copy and paste; it understands the underlying patterns and creates something original based on that understanding. In the case of video, for example, generative AI can identify an object in an image based on its understanding of previous objects it has seen. Video and security Generative AI can tell you something digitally about what is happening in an environment. There is no longer a need to write “rules;” the system can take in data, contextualize it, and understand it, even if it does not exactly match something it has seen before. In the case of video and security, generative AI offers more flexibility and better understanding. From 2014 to 2024, the emphasis was on detecting and classifying things; today AI is expanding to allow new ways to handle data, not so prescriptive and no more rules engines. Agentic AI Agentic AI refers to artificial intelligence systems that can operate autonomously to achieve specific goals Agentic AI refers to artificial intelligence systems that can operate autonomously to achieve specific goals, with minimal to no direct human intervention. In addition to the capabilities of generative AI, agentic AI can take action based on what it detects and understands. Use of agentic AI typically revolves around an if/then scenario. That is, if action A occurs, then the system should proceed with action B. For example, if an AI system “sees” a fire, then it will shut down that part of the building automatically without a human having to initiate the shutdown. There is a lot of discussion in the industry about the need to keep humans involved in the decision-making loop, so use of truly autonomous systems will likely be limited in the foreseeable future. However, the ability of agentic AI to act on critical information in a timely manner, in effect to serve as an “agent” in place of a human decision-maker, will find its place in physical security as we move forward. Inference Inference is another common term related to AI. It refers to the process by which an AI model uses the knowledge it gained during its training phase to make predictions, classifications, or generate outputs on new, unseen data. The direct relationship of this term to physical security and video is obvious. In the simplest terms, an AI system is “trained” by learning patterns, relationships, and features from a large dataset. During inference, the trained model is presented with new questions (data it hasn't seen before), and it applies what it learned during training to provide answers or make decisions. Simply put, inference is what makes AI systems intelligent. Containerization Dividing a massive security management system into several separate containers enables management of the various parts In IT, containerization is a form of operating system-level virtualization that allows you to package an application and all its dependencies (libraries, binaries, configuration files) into a single, portable image called a container. This container can then be run consistently across any infrastructure that supports containerization, such as a developer's laptop, a testing environment, or a server in the cloud. In the physical security industry, you hear “containerization” used in the context of separating out the various components of a larger system. Dividing a massive security management system into several independent containers enables the various parts to be managed, updated, and enhanced without impacting the larger whole. Genetec’s SecurityCenter cloud platform Think of it like shipping containers in the real world. Each container holds everything an application needs to run, isolated from other applications and from the underlying system. This ensures that the application will work the same way regardless of the environment it is deployed in. “It took us five years to containerize Genetec’s SecurityCenter cloud platform, but containerization now simplifies delivering updates to products whenever we want,” says Andrew Elvish, Genetec’s VP Marketing. Among other benefits, containerization enables Genetec to provide more frequent updates--every 12 days. Headless appliance Headless appliance is a device that is managed and controlled remotely through a network or web interface A headless appliance is a device that is managed and controlled remotely through a network or web interface. The device is like a “body without a head” in the traditional sense of computer interaction: It performs its intended function, but without any visual output or input device for local interaction. In physical security, such devices are increasingly part of cloud-based systems in which the centralized software manages and operates all the disparate “headless” devices. A headless appliance does not have a Windows management system. “The whole thing is managed through the as-a-service cloud system,” says Elvish. With a headless device, you just plug it into the network, and it is managed by your system. You manage the Linux-based device remotely, so configuring and deploying it is easy. Democratizing AI You hear the term democratizing AI used by camera manufacturers who are looking to expand AI capabilities throughout their camera lines, including value-priced models. For example, even i-PRO’s value-priced cameras (U series) now have AI – fulfilling their promise to democratize AI. Another approach is to connect non-AI-equipped cameras to the network by way of an AI-equipped camera, a process known as “AI-relay.” For instance, i-PRO can incorporate non-AI cameras into a system by routing/connecting them through an X-series camera to provide AI functionality. Bosch is also embracing AI throughout its video camera line and enabling customers to choose application-specific analytics for each use case, in effect, tailoring each camera to the application, and providing AI to everyone. Context Cloud system also enables users to ask open-ended queries that involve context, in addition to detection Context refers to an AI system that can understand the “why” of a situation. For example, if someone stops in an area and triggers a video “loitering” analytic, the event might trigger an alarm involving an operator. However, if an AI system can provide “context” (e.g., he stopped to tie his shoe), then the event can be easily dismissed by the automated system without involving an operator. Bosch’s IVA-Pro Context product is a service-based model that adds context to edge detection. The cloud system also enables users to ask open-ended questions that involve context in addition to detection. For example, rather than asking "do you see a gas can?" you can ask "do you see any safety hazards in this scene?" The pre-trained model understands most common objects, and understands correlations, such as "a gas can could be a safety hazard.” A scaled-down on-premise version of the IVA Context product will be available in 2026. Bosch showed a prototype at ISC West. Most video data is never viewed by an operator. Context allows a system to look at all the video with "almost human eyes." Cameras are essentially watching themselves, and understanding why something happened and what we can do. All that previously unwatched video is now being watched by the system itself, boosted by the ability to add “context” to the system. Any meaningful information based on context can trigger a response by an operator. Data lake A data lake is a centralized repository that allows one to store vast amounts of structured, semi-structured, and unstructured data in its native format. In the case of the physical security marketplace, a data lake includes data generated by systems outside the physical security infrastructure, from inventory and logistics systems, for example. A data lake is where an enterprise can accumulate all their data, from the weather to Point-of-Sale information to logistics, to whatever they can gather. Putting the data in one place (a “data lake”) enables them to mine that data and parse it in different ways using AI to provide information and insights into their business. Notably, a data lake contains all a company’s data, not just security or video data, which opens up new opportunities to leverage the value of data beyond security and safety applications. Crunching the various information in a data lake, therefore, security technology can be used to maximize business operations.
The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelengths. Irradiating the human palm with near-infrared light waves yields an image of the vascular pattern. A venous distribution map can be processed and compared to pre-registered data to match and confirm identity. Palm vein biometrics The idea of palm vein biometrics goes back to the 1980s when palm vein scanners emerged as commercial products in the 1990s. The devices gained some traction in military-grade and high-security applications, although the technology was too expensive to become popular among mainstream applications such as physical access control. Anviz Global is expanding palm vein technology into mainstream applications, featuring a lower price point that will open new market opportunities. Palm vein technology “Palm vein technology has been viewed as a boutique product because it is costly and has not developed as a mainstream product,” says Mark Vena, Senior Director of Business Strategy and Development for Anviz Global. “With a more compelling price point, the market can see the technology more broadly. We can change the game in terms of how people think about palm vein technology.” FAR and FRR Palm vein technology is more accurate than either fingerprint (0.0001% FAR) or facial recognition (0.001% FAR) Iris recognition is considered the gold standard in biometric identification, but palm vein technology can almost achieve the accuracy of iris. The false accept rate (FAR) for palm vein technology is 0.00008%, compared to 0.00005% for iris recognition systems. The false reject rate (FRR) is comparable at 0.01% for either technology. Palm vein technology is more accurate than either fingerprint (0.0001% FAR) or facial recognition (0.001% FAR). Palm vein identification occurs in less than half a second. M7 Palm “Anviz is seeking to bring a high level of capability to more mainstream commercial applications,” says Vena, specifically providing a lower-cost palm vein unit. The M7 Palm by Anviz can achieve next-generation biometric access control for greater security and intelligence. The door-mounted unit combines palm vein recognition with an RFID card reader and PIN code (using a 17-button keypad), all configurable for multi-factor authentication. Outdoor applications The robust unit, including a narrow metal exterior design, provides strong vandal resistance (IK10) and stability for outdoor applications. To ensure a weatherproof design, the IP66 rating indicates the product is completely protected against dust and can withstand strong jets of water from any direction. Power-over-ethernet (PoE) enables centralized power management and the ability to remotely reboot devices. Wiegand-out interface The unit communicates using RS-485 or TCP/IP and can connect locks, exit buttons, door contacts, doorbells, etc The unit communicates using RS-485 or TCP/IP and can connect locks, exit buttons, door contacts, doorbells, etc. The Wiegand-out interface can connect to standard third-party controllers, or a built-in relay can trigger a lock directly. Capacity is 500 users. Because palm vein recognition originates from the physiological characteristics of the human body, it represents a “credential” that cannot be forged, lost, or left at home. It is not easily counterfeited or worn out. Multi-factor authentication Applications include industries requiring high security such as government, judicial, and banking. Multi-factor authentication eliminates fraud and ensures safety at banks, data centers, airports, prisons, and government. An end user might opt for higher levels of access control for a laboratory or server room. For dealers and integrators, palm vein technology, including multi-factor authentication, provides an additional option for customers seeking to protect high-security areas on a large campus. Card readers Card readers may suffice for most of the doors, but an important laboratory or cash-handling area requires more protection. Palm vein technology can secure a casino cash cage or a room containing corporate secrets. Time of Flight ToF laser-ranging uses a laser to measure the distance to an object by calculating the time Time of Flight (ToF) laser-ranging achieves accurate measurement to ensure the right distance for operation. ToF laser-ranging uses a laser to measure the distance to an object by calculating the time it takes for the laser light to travel to the object and back. Palm vein technology operates in the range of 10 to 30cm (4 to 12 inches). The proprietary BioNANO palm vein recognition algorithm enables accurate and fast scanning speed. Non-contact biometric The non-contact biometric performs in touchless environments and does not contribute to lingering health concerns in the post-COVID world. The technology is accurate across all hand types and skin tones. Users may feel more comfortable scanning their hands than their eyes. Optimal human-machine interaction M7 Palm’s optimal human-machine interaction and user experience include a low-power-consumption OLED screen to deliver clear text notifications to the user. Advantages of M7 Palm include accuracy, stability, security, and privacy. Features include easy installation with standard processes and no special tools, centralized power management, simplified cabling, and less maintenance. Managing the system is expedited by integration with the Anviz CrossChex Standard access control and time management dashboard, used by more than 30,000 enterprises, and the system can be integrated with any access control system. Security for SMBs Anviz Global is a converged intelligent security provider for SMBs and enterprise organizations Anviz Global is a converged intelligent security provider for small- and medium-sized businesses (SMBs) and enterprise organizations. The company’s product line includes biometrics, video surveillance, and security management solutions based on the cloud, Internet of Things (IoT) and artificial intelligence (AI) technologies. Privacy concerns Anviz is part of the Xthings family of companies, which includes Ultraloq (smart locks), Utec (smart home), Bright (smart lighting), Secu365 (SaaS Platform), and Ulticam (smart cameras). Privacy concerns are minimized because palm vein recognition does not directly store the original image but rather extracts feature information through algorithmic models. Personal data is protected through obfuscation and encryption.
Case studies
In recent years, campus safety and student mental health have drawn growing attention. Government data in Taiwan show a rise in emotional and stress-related issues among students aged 15–24. Unauthorized attempts to enter campuses still occur, unsettling students and staff. Strengthening security management and proactive alerting has therefore become a priority for schools. To address risks such as expansive campuses, multiple entry points, blind spots, and potential intrusions, VIVOTEK (3454-TW), the leading global security solution provider, has been promoting its AI-driven education security solutions, designed to proactively detect risks and safeguard school environments. Era of real-time detection and proactive response According to a report by research firm GII, the global education security market is projected to reach USD 910 million in 2025 and grow to USD 1.6 billion by 2030, representing a compound annual growth rate (CAGR) of 11.96%. As AI video analytics, edge computing, and cloud management platforms mature, security systems are evolving beyond passive video playback into an era of real-time detection and proactive response. In education settings, AI can automatically detect intrusions into restricted zones and trigger instant alerts, enabling security personnel to make swift and informed decisions. VSS Pro platform Recently, VIVOTEK deployed a comprehensive education security solutions at a renowned national university in Taiwan, installing hundreds of AI Bullet and Fixed Dome cameras across entrances, rooftops, classrooms, corridors, walls, elevators, and parking areas. Integrated with the VAST Security Station (VSS) Pro platform, the system delivers: Proactive prevention: AI virtual fence defines restricted zones, detects loitering, notifies the security center, triggers on-site audio alerts, and coordinates real-time response. Efficient investigations: Broad coverage flags abandoned objects, while AI deep search traces intruders or vehicles in the shortest time using attributes (e.g., clothing color, backpack, vehicle type) to quickly assemble event timelines. VIVOTEK’s education security solutions With comprehensive, AI-enabled coverage, schools can monitor in real time and avert risks, fostering safe, welcoming, and sustainable learning environment. Beyond Taiwan, VIVOTEK’s education security solutions are also used in the United States, Belgium, and Indonesia, tailored to local needs to build a global network of smart, sustainable campuses.
Stratas is a UK-based specialist in document automation, finance automation, and intelligent document processing (IDP). Its solutions help organizations automate processes underpinned by documents and improve control across finance and operations. Stratas needed a new, secure, and scalable data storage solution after notification that its remote storage provider planned to discontinue services. Richard Webb, the company’s Professional Services Technical Consultant, explains: “We weren’t confident that the physical servers were being properly maintained. Our provider was using older machines and running Windows Server 2012, which presented us with reliability and security challenges. If we had continued with our arrangement, things would have had to change.” Solution After considering several options, Richard and his team selected Node4’s Virtual Data Center (VDC) offering – the company’s managed, hosted Infrastructure as a Service platform. As the first step in deployment, Node4 set up a bespoke landing zone to assist Richard with data migration from his organization’s legacy servers. Node4 also configured VDC access via a secure, high-speed VPN. Public cloud solution “We told Node4 from the outset that we wanted a managed, hosted environment. We’re a lean business with no physical premises and didn’t want the overheads and complications of managing physical servers,” Richard comments. “On paper, a public cloud solution might have seemed logical. But we run several niche applications with specialized workflow and process requirements. Node4’s VDC was a better fit – we got the scalability and flexibility of public cloud without the complexity and administration headaches. But we also benefit from Node4’s support and expertise. It’s the best of both worlds.” Node4’s data center “We also wanted our data to remain in the UK on servers owned by a UK company,” he acknowledges. “That’s important for GDPR compliance and data sovereignty." "It was also a bonus that Node4’s data center is just down the road from us, so we’re hyperlocal, I guess. It all adds to the feeling that we’re not dealing with some faceless conglomerate – that there are real people on hand with a genuine interest in helping our business to thrive.” Results Stress-free migration With the landing zone operational and VPN connectivity established, Richard and his team began migrating applications and clients to their new Virtual Data Center. “Clients using our invoicing and accounting service can’t be offline for a long time – especially around month-end. So, although it was slower for us, we migrated one customer at a time at a rate of about five per week,” he explains. “Node4’s landing zone also allowed us to test migrations to ensure everything worked as expected before going live. This kept downtime to an absolute minimum and reduced many of the risks associated with migration to hosted environments.” Enhanced backup, recovery, and resiliency Richard and his team immediately benefited from switching to Node4’s virtual data center. “Our previous provider offered only basic backups, and their infrastructure lacked resiliency,” he recalls. “We could start work on a Monday and, without any prior warning, find half our servers were down. Switching to Node4’s virtual data center with modern, resilient servers – alongside built-in comprehensive backup and disaster recovery – improved our day-to-day operations and customer experience right from the outset.” Richard admits that the connectivity and reliability improvements far exceeded anything he’d hoped for. “It’s amazing! Even basics like logging in are easier. On our old system, it would take several attempts, and there was always a chance you’d get kicked out after a couple of hours. Getting online first time probably saves each of us around ten minutes a day. That may not sound much, but it quickly adds up as the weeks and months go by.” Advanced, integrated security Richard also notes that the VDC offers a range of security benefits, including firewall defences, DDoS protection and secured instances. “We’re planning to introduce multi-factor authentication to access our VPN. It’s a vital identity management tool for all businesses,” he comments. “But especially ones like ours with a 100% remote workforce.” Consumption-based model: Pay for used compute, network, and storage Richard is also keen to highlight the advantages of a consumption-based model. “The VDC is fully self-service. We can adjust compute, network, storage, and services on demand with just a few clicks – giving us complete control over our environment and costs." "This is important right now and also helps us plan ahead; for example, we can now see a pathway to rolling out AI and advanced automation in the coming years.” Transparent pricing “I like the fact that VDC pricing is transparent,” Richard admits. “We did our due diligence and looked at a few other companies. Their project and operational costs seemed lower. But there were lots of gotchas – like fixed data charges and data limits – hidden in the small print. So, when we weighed it all up, Node4, with its consumption-based pricing, was far better value and a much better organizational fit.” He concludes: “What does that mean on a day-to-day basis? Currently, we’ve scaled requirements as we’re carrying out some server consolidation work. But all that extra capacity is still there for us. And while we’re waiting, we’re not being charged for it. That’s a huge benefit. It helps us remain competitive and responsive to changing market and economic conditions.”
With a capacity of 66,500 spectators, the MERKUR SPIEL-ARENA is the largest multi-purpose venue in Düsseldorf and home to the city’s main football team, Fortuna. Regular and constantly changing major events, both matches and concerts, present an ever-evolving security and access challenge. Stadium managers D.LIVE sought a secure, reliable replacement for their mechanical master key system; comprehensive, flexible security which would no longer create the problems and inconvenience of mechanical keys. Digital locking system Due to frequently changing event formats and service providers, keys were often lost, causing considerable administrative work and financial expense. Due to the large number and size of the areas to be secured, it became clear that only a digital locking system would combine the required performance features in a convenient solution. Another critical requirement was for robust devices which did not protrude from doors: football and music events can sometimes be a little rough. The technology installed needed to be tough and reliable enough to withstand the odd kick. Key requirements for the new system Finally, the solution would also need to simplify the management and rental of multiple private spaces inside the building, including the Promenade, Merkur Business Club, and boxes in the east wing. These offer additional space for a total of almost 7,000 people for meetings, press conferences or product presentations. One of the key requirements for the new system was, therefore, the ability to grant and revoke access authorizations individually, especially for external event organizers and operators. Innovative key-based digital access Based on these requirements and their experience with other local venues, D.LIVE chose the eCLIQ programmable-key locking solution, part of a suite of Digital Access Solutions from ASSA ABLOY, which scores highly on security, reliability and convenience. Their new eCLIQ key-operated digital access solution has approximately 2,500 wireless cylinders; around 1,150 programmable eCLIQ Connect keys have been issued. With this solution, every authorized keyholder carries their own eCLIQ key which can be programmed with tailored access authorizations. For added security, access rights can be individually revoked at any time and lost keys can be blocked. Convenient management of contractor access “One of the reasons we chose eCLIQ Connect keys was to enable us to grant or revoke authorizations to external organizers and operators via Bluetooth in a rapid and user-friendly way,” says Lukas Angenendt, VEFK & Project Manager Electrical Engineering, D.LIVE. Powerful, intuitive software makes it easy for stadium managers to issue temporary authorizations for contractors, cleaning staff, and external event service providers, which streamlines site maintenance and management. As an additional layer of security, their eCLIQ Connect keys have to be validated on site by entering a PIN code in the smartphone app. Digital security enhancements In addition to the digital security enhancements, eCLIQ’s high degree of flexibility was another big plus: eCLIQ is convenient to handle and program as, for example, the power supply and communication with each cylinder take place via the battery-powered key. There’s no need to visit every door or device to replace its battery. No wiring is required for the very low-maintenance cylinder, which is fitted flush to the door and thus offers no attack surface for vandalism. Cable-free installation was also simpler and quicker: only two weeks, when no events were taking place in the stadium, were available for the conversion of all doors.
In an emergency, first responders, School Resource Officers (SROs), and responsible parties need to gain access to campus buildings to assess alerts and potential threats. With Connect ONE®’s new Emergency Response Platform (ERP), included with any service level at no additional charge, first responders and SROs can view cameras, unlock doors and outputs, activate task functions, initiate lockdown and see recent activity. Connect ONE ERP Connect ONE ERP unifies multiple school systems into one interface without separate site log-ins The Connect ONE ERP unifies multiple school systems into one interface without separate site log-ins. Integrators can offer 911 and dispatch centers viewing and access control of schools to assist responders during critical threats. The cloud platform ERP provides a separate agency login with specific designated permissions for first responders, who can only see customer site locations shared by the security dealer. Emergency Response Platform “The Emergency Response Platform allows Connect ONE dealers to partner with local law enforcement by providing the tools they need to diffuse an emergency quickly and effectively with powerful information to view and control facility security,” said Dan Simon, Technical Director, Connected Technologies. He adds, “It’s a great solution to heighten safety and create safer experiences for the public, while ensuring you keep a customer long-term with a valuable service.” ERP: Use-case in action Nightwatch Security & Telephone LLC has executed the ERP at several of the area’s school districts Nightwatch Security & Telephone LLC, Sedalia, Mo., has implemented the ERP at several of the area’s largest school districts serving more than 5,000 students. Nightwatch Owner, Jeff Kesterson said it’s simple to update proximity key fobs and input agency officer’s access codes to stay current with staffing changes or modifications to permissions. “First responders and SROs maintain access to schools with proximity access control key fobs, but staying current with staffing changes was unwieldy before the ERP,” said Jeff Kesterson. Key fob credentials The Sedalia Police Department, which has access to schools in the city, said the ERP is a huge timesaver for administering key fob credentials. “Ease of administering credentials was important and adding or removing personnel from the system was clunky before the ERP. Instead of logging into all the school systems separately, we can look at everything in one place,” said Commander Joshua Howell, Operation’s Support Bureau, Sedalia Police Department. Connect One’s GeoView System Mapping Viewing and controlling options are also available via Connect One’s GeoView System Mapping Viewing and controlling options are also available via Connect One’s GeoView System Mapping – a real-time Google mapping feature, which adds the capability of seeing floor plans of the building along with point and click control of doors and cameras. Dispatch can easily respond to officers on-site and unlock doors for quick entry by clicking on GeoView’s map and door icon. Other features of the ERP A single application screen to add or remove agency personnel system codes/access credentials from shared customer systems. System codes are included in profile templates, so permissions come pre-defined for simple additions by the agency. Permissions may only be modified by the dealer to prevent misconfiguration; customers will maintain the ability to view the permissions without making changes. Activity by agency personnel is reviewable by the customer in reporting and notifications. Integrates with leading intrusion, access control, video, fire, temperature, humidity, MNS, environmental and weather systems. Connect ONE and the ERP is the unified, cloud management platform for schools that’s making a difference with easier access while increasing situational awareness.
Siemens Smart Infrastructure has partnered with San Juan de Dios Hospital in Seville, Spain, to transform it into a smart and sustainable asset. With buildings accounting for around 40 percent of global carbon emissions, and healthcare facilities increasingly facing financial and sustainability pressures, improving operational efficiency is crucial. At San Juan de Dios Hospital, Siemens has turned this challenge into an opportunity with its AI-based digital building technology. By deploying its innovative solutions, Siemens enabled the hospital to cut operating costs of the analyzed assets by 35 percent, setting another benchmark for hospitals across the globe. Siemens’ AI-powered building platform The solution integrates energy and security control, as well as HVAC automation into a single system San Juan de Dios Hospital, which enjoys a history spanning more than 450 years, has undergone an impressive transformation using Siemens’ fully digital, AI-powered building platform Building X and digital services. The solution integrates energy and security management, as well as Heating, Ventilation, and Air Conditioning (HVAC) automation into a single system. This leads to significant operational, as well as energy efficiency gains for building managers. Siemens’ technology and services are expected to enable a further reduction of 10 percent in operating costs, thanks to early fault detection and optimized equipment use. Harnessing AI and interoperable platforms “With Siemens’ technology, we have gone beyond simple automation. We now have an intelligent system that coordinates, optimizes, and anticipates the functioning of our facilities, improving care quality and the well-being of those around us,” said María Jesús Pareja, Managing Director at San Juan de Dios Hospital. “This project sets another benchmark for hospital digitalization globally. By harnessing AI and interoperable platforms, healthcare facilities can transform operational complexity into simplicity and resilience – ultimately improving care outcomes while cutting costs,” said Delphine Clément, Global Head of Verticals at Siemens Smart Infrastructure Buildings. Integrates remote digital services Siemens deployed a digital layer that merges remote digital features for fault detection and diagnostics At San Juan de Dios Hospital in Seville, Siemens has deployed a digital layer that integrates remote digital services for fault detection and diagnostics, intrusion detection via Siemens Siveillance Suite, and the Desigo CC building management system. As part of the Building X platform, Operations Manager and Energy Manager provide real-time visibility into building performance and energy consumption, enabling smarter decision-making, improved operational efficiency, and measurable sustainability gains. Digital building platform Building X is a digital building platform that supports customers to digitalize, manage, and optimize their building operations. It is part of Siemens Xcelerator, an open digital business platform that enables customers to accelerate their digital transformation easier, faster and at scale.
DFNBG Gastro GmbH & Co. KG, operator of 48 Dunkin' branches and other catering establishments in Germany, has migrated to the MOBOTIX CLOUD for the central management of its video surveillance. DFNBG partnered with MOBOTIX Diamond Partner VALEO IT Neteye GmbH for more than ten years, who have implemented and continuously optimized secure and efficient MOBOTIX video solutions in the 48 Dunkin' branches. Data protection regulations The operation of local storage systems was proving particularly difficult in shopping centers Due to the strong growth of DFNBG, the demands on the existing video management system increased. The local storage of video data became increasingly complex - both in terms of data protection regulations and the management of access rights. The operation of local storage systems was proving particularly difficult in shopping centers. The solution: a gradual migration from local NAS storage to the data protection-compliant MOBOTIX CLOUD. Access management and GDPR: the MOBOTIX CLOUD as a solution The MOBOTIX CLOUD video surveillance-as-a-service (VSaaS) offering allows users to conveniently control their cameras via a free app. The recorded videos are stored in highly available and cyber-secure data centers located close to the user. This ensures data protection-compliant storage in accordance with the GDPR. Intelligent camera technology A key advantage of the MOBOTIX CLOUD is the combination of intelligent camera technology A key advantage of the MOBOTIX CLOUD is the combination of intelligent camera technology and a powerful cloud platform. The cameras analyze events on site and only transfer relevant data to the cloud. This minimizes bandwidth requirements while maintaining the highest security standards. MOBOTIX Bridge Communication between the cameras and the cloud takes place via the MOBOTIX Bridge, a highly secure connection unit that ensures protected data transmission. The cloud solution also eliminates the need to operate separate server rooms with high security standards on site - a clear advantage for branches in shopping centers or high-traffic locations. DFNBG can control access rights Around half of the Dunkin' branches have already been converted to the MOBOTIX CLOUD Cloud data is managed directly by the users themselves. This means that companies such as DFNBG can control their access rights centrally without having to create individual solutions for each branch. “It was clear to us that the system is secure - including cyber-secure - and exceeds our requirements. But the central management of all access rights really saves us time and money,” says Harry Taubert, Construction & Development Manager at DFNBG. Around half of the Dunkin' branches have already been converted to the MOBOTIX CLOUD, and the remaining locations will follow successively. VALEO IT Neteye: MOBOTIX Partner for innovative video solutions As a long-standing MOBOTIX Diamond Partner and one of the largest integrators of MOBOTIX systems in Germany, VALEO IT Neteye has been instrumental in delivering customized, future-ready surveillance solutions to DFNBG. VALEO IT Neteye also offers full-service training to DFNBG to ensure everyone stays up to date with industry changes. “We only offer our customers MOBOTIX solutions because we are absolutely convinced of the quality and durability of the products manufactured in Germany,” explains Norbert von Breidbach-Bürresheim, Managing Director of VALEO IT Neteye.


Round table discussion
Data overload is real. Sometimes it seems we are bombarded by the sheer volume, velocity, and variety of data available in our personal lives, and in our work lives. The solution is to figure out how to make sense of the data and transform it into real information we can use. In the case of physical security systems, new opportunities are emerging every day to utilize data to make our businesses safer and better managed. We asked our Expert Panel Roundtable: What is the expanding role of data in physical security systems? Why does it matter?
A system's lifecycle is the journey it takes from planning and design through to decommissioning. Considering the entire lifecycle of a system can encourage integrators and end users to embrace higher-quality technologies with an eye toward maximizing their value over time rather than focusing on lower-priced equipment. For additional insights, we asked our Expert Panel Roundtable: How does consideration of system lifecycles impact the choice of physical security technologies?
Access control, video surveillance, and intrusion detection systems evolved largely independently in the physical security industry. Integrating those systems to the benefit of an enterprise's overall security has traditionally fallen on security integrators working in cooperation with manufacturers. However, today's market has also evolved to include companies that provide "unified platforms,” bringing together various disparate security systems and functions under a single, centralized management interface. We asked our Expert Panel Roundtable: What are the advantages of installing physical security systems as a unified platform?
Products


White papers
The Ultimate Guide To Mastering Key Control
Download
Cybersecurity For Enterprise: The Essential Guide To Protecting Your Business
Download
How To Create A Successful Physical Security Roadmap
Download
A Guide To Moving Physical Security Into The Cloud
Download
Safeguard Students With New Techniques And Technology
Download
Intelligent Video Security Solutions
Download
How To Implement A Physical Security Strategy With Privacy In Mind
Download
Access and Security In The Age of Hybrid Working
DownloadCybersecurity in Keyless Access Management
Download
Understanding Key Control Systems And Best Practices
Download
IoT Connectivity
Download
Smart Surveillance In The Workplace
Download
5 Ways To Strengthen Physical Security With An Integrated System
Download
11 Advantages Of A Combined System For Access Control And Intrusion
Download
Wireless Access Control eBook
Download

Videos
Security management: Manufacturers & Suppliers
- Dahua Technology Security management
- Vicon Security management
- Seagate Security management
- Bosch Security management
- CEM Security management
- IFS Security management
- VIVOTEK Security management
- Hikvision Security management
- Vanderbilt Security management
- Parabit Security management
- BCDVideo Security management
- Pelco Security management
- ComNet Security management
- AV Costar Security management
- TESA Security management
- Hanwha Vision Security management
- OPTEX Security management
- DSC Security management
- Messoa Security management
- FLIR Systems Security management
