Security policy
Wachter, Inc., a premier technology solutions integrator and innovator, proudly announces the appointment of James Stark as Business Development and Strategic Innovation Lead. With over 30 years of distinguished experience across various sectors, James is set to spearhead transformative initiatives that will enhance Wachter’s offerings for clients nationwide. A thought leader and respected speaker, Stark has graced national media platforms and industry conferences, sharing insights shaped...
Google Cloud announced a significant, multi-million-dollar contract with the NATO Communication and Information Agency (NCIA) to deliver highly secure, sovereign cloud capabilities. This strategic partnership is a major step in bolstering NATO's digital infrastructure, strengthening its data governance, and enabling it to securely leverage cutting-edge cloud and AI capabilities. NCIA selected Google Distributed Cloud (GDC) to support the Joint Analysis, Training and Education Centre (JATEC). JA...
FireMon, the pioneering network security and firewall policy management company, detailed expanded support for Zero Trust microsegmentation across hybrid environments, including a deeper integration with Illumio and continued coverage for VMware NSX and Zscaler. By normalizing, analyzing, and continuously validating segmentation intent across network, virtual, and host enforcement points, FireMon helps security teams operationalize Zero Trust at enterprise scale. Firewall governance...
The S12 Security Guarding Industry Leadership Group has announced the appointment of Paul Fullwood as its Chief of Staff, marking a significant step forward in the group’s mission to strengthen industry collaboration, shape policy, elevate standards and enhance public safety. The appointment follows the formation period for the S12, including the completion of an industry-wide consultation survey, the establishment of 15 distinct workstreams, and the opening of regist...
Commvault has introduced Data Rooms, a secure environment that enables enterprises to safely connect their trusted backup data to the AI platforms they rely on, or to their own AI initiatives, such as internal data lakes. By combining governed, self-service access with built-in classification and compliance controls, Data Rooms bridges the gap between data protection and data activation, helping organizations transform backup data into AI-ready assets without adding new risk or complexity. ...
Building on their highly popular series of integrated high-security solutions events, the CNI Security Group has announced their next event, ‘Protecting CNI Scotland – The importance of cyber-secure solutions in critical national infrastructure’. Designed for all end users, consultants and system designers in the CNI sector, the free-to-attend event will be held at Dakota Eurocentral, Motherwell, on Wednesday 19th November, between 9:30 am and 4 pm. The event will show in...
News
Following its inaugural meeting with the Security Minister, the Security Industry Authority (SIA), and the Home Office, the newly established S12 Security Guarding Leadership Group has opened an industry-wide consultation to identify the key priorities that will shape its agenda and future workstreams. The S12 is inviting security professionals, businesses, clients, and stakeholders from across the guarding sector to share their views on the most pressing challenges and opportunities facing the industry. Collective input This collective input will play a crucial role in determining which workstreams should be prioritized, ensuring that the group’s efforts are focused on delivering meaningful impact for the sector and wider public. The consultation survey will remain open until 3 pm on Wednesday 15th October. Once closed, the S12 will meet on 17th October to analyze the results, confirm the final workstreams, and appoint an S12 member to lead each one. These workstreams and their objectives will then be presented by the S12 Chair to the Security Minister on 21st October. Following this, the appointed leads will begin direct engagement with the industry to establish working groups that will support progress on each workstream’s objectives. The confirmed workstreams will be formally announced to the industry and stakeholders by 24th October.
Deepgram, the world’s most realistic and real-time Voice AI platform, has announced it has achieved the Amazon Web Services (AWS) Generative AI Competency. This specialization recognizes Deepgram as an AWS Partner that helps customers and the AWS Partner Network (APN) drive the advancement of services, tools, and infrastructure pivotal for implementing generative AI technologies. AWS Generative AI Competency The AWS Generative AI Competency requires a rigorous technical audit, proof of successful deployments, and direct customer validation. For Deepgram, it’s a milestone that highlights the company’s ability to deliver AI that is not only advanced but also secure, compliant, and trusted in production. “Generative AI is one of the most transformative technologies of our time — but in order for enterprises to adopt it with confidence, they need proof it works at scale and integrates seamlessly into their existing stack,” said Abe Pursell, Vice President, Business Development and Partnerships, Deepgram. Deepgram’s tested and proven voice AI solutions Customers benefit from faster innovation cycles, tighter integrations with key AWS services Abe Pursell continues, “This recognition from AWS gives our customers exactly that peace of mind. It shows Deepgram’s voice AI solutions have already been tested, vetted, and proven in the real world.” Customers benefit from faster innovation cycles, tighter integrations with key AWS services — including Amazon Bedrock, Amazon Connect, and Amazon SageMaker — and improved commercial alignment through AWS Marketplace, Private Pricing Agreements (PPAs), and AWS credits. “For customers, collaborating with an AWS Generative AI Competency provider like Deepgram translates into faster time-to-value, reduced total cost of ownership (TCO), and peace of mind that their investment is future-proofed within the AWS GenAI ecosystem,” added Abe Pursell. AWS Competency Program The AWS Competency Program aims to assist customers in connecting with AWS Partners who possess extensive knowledge and technical expertise in using AWS technologies and best practices to adopt generative AI. These AWS Partners facilitate the seamless integration and deployment of AWS-based solutions to meet the unique needs of all customers, from startups to global enterprises.
The newly formed Security Guarding Leadership Group (S12) met with Security Minister - Dan Jarvis MBE for the first time at the International Security Expo, Olympia London, and announced Paul Evans (CEO, Carlisle Security) and Peter Harrison (FGH Security) as Chair and Deputy Chair of the Group, which brings together a diverse team of elected leaders from across the security industry. The Group will regularly engage directly with the Minister, Homeland Security and the Security Industry Authority (SIA), offering a voice and insight from all areas of the industry. Its mission is to raise industry standards, help shape policy, accelerate the implementation of critical legislation and ensure that a diverse range of voices are heard to inform future decisions. Implementation of critical legislation Members range from the largest national providers to small and medium independent firms plus representation from industry trade associations. Each member is a senior security executive and will serve a minimum two-year term within the Group, meeting at least once a month. Each S12 member will lead on at least one industry initiative and seek to create enlarged sub-working groups from the widest possible reach into the industry. Transparent records of their objectives and actions will be found on the newly created website. Highest professional standards The S12 will meet with the Security Minister and engage with the SIA on a regular basis The S12 will meet with the Security Minister and engage with the SIA on a regular basis to drive the highest professional standards, drawing on industry wide data, and insights from trade associations, as well as supporting with the establishment of the Security Skills Academy. During his speech at the International Security Expo, Security Minister, Dan Jarvis, said: “I am very pleased to announce the formation of the S12, a new industry-led initiative to bring together various parts of the private security industry to be able to speak to Government with one voice.” He adds, “Earlier this morning we had a good and constructive meeting with the elected leaders who make up the S12. I was able to listen to what they had to say about how we can organize to improve standards within the security industry. I am keen for the government and for the SIA to work closely with them.” Enhancing public protection Paul Evans, Chair, Security Guarding Leadership Group (S12), said: “This Group has been built on the principles of inclusive representation, accountability and action. We recognize this is a critical time for our industry and the sense of collaboration has never felt stronger. However, we also face rising threat levels and there are still unfortunately reports of malpractice and shortcuts being taken which simply will not stand up against new legislation.” He adds, “A core part of our mission is to equip security professionals with tools and training that reflect the changing landscape and to improve standards that will further enhance public protection. With the support of the Security Minister, we look forward to making a lasting difference and making the country a safer place for all.”
The National Security Inspectorate (NSI), the UK and Eire’s most widely recognized certification body for fire and security providers, is delighted to announce the appointment of Jon Webster as its new Head of Marketing. Jon will be leading NSI’s marketing strategy and communications, helping to strengthen the organization’s brand and support its continued growth across the security and fire safety sectors. Global growth and launch of new services Jon brings extensive experience in marketing leadership, most recently as Marketing Director at Practicus Jon brings extensive experience in marketing leadership, most recently as Marketing Director at Practicus, a company specializing in business transformation and change. In that role, Jon developed strategies that boosted digital performance, enhanced brand positioning and supported international growth and the launch of new services. At NSI, Jon will shape the organization’s marketing direction, working closely with colleagues, certified companies and industry partners. His focus will be on amplifying NSI’s voice with both industry and public audiences, enhancing engagement and reinforcing awareness of the important role NSI plays in raising standards and protecting the public. Growth and engagement strategy Richard Fogelman, Chief Executive Officer at NSI, said: “We are delighted to welcome Jon to the team. His experience and expertise in building effective marketing functions will be invaluable as NSI continues to evolve and deliver assurance to businesses and peace of mind to the public. Marketing is a critical part of our growth and engagement strategy and Jon will play a key role in driving this forward.” Jon Webster added: “I’m excited to be joining NSI at such an important time. NSI has a strong culture, a clear mission and a vital role in the industry as a trusted partner. I look forward to helping further develop and share NSI’s story, working alongside colleagues, certified companies and industry partners to support the next stage of the organization’s journey.”
FireMon, the major network security and firewall policy management company, announced native support for NVIDIA Cumulus in FireMon Policy Manager. This provides unified policy visibility, change automation, and compliance assurance for data centers running Cumulus Linux–based switching. NVIDIA Cumulus is a key networking component for data centers that power AI and high-performance computing (HPC) environments. Following NVIDIA’s acquisition of Cumulus Networks, the networking software was integrated with NVIDIA’s accelerated computing hardware to create an end-to-end infrastructure solution optimized for AI and HPC workloads. Closing the gap FireMon closes a long-standing gap for teams who standardize on open networking With this new support, FireMon closes a long-standing gap for teams who standardize on open networking while maintaining a single source of truth for network security policy across firewalls, clouds, and modern data center fabrics. As enterprises scale AI and high-performance workloads, NVIDIA Cumulus has become a foundation for modern data center fabrics. Yet the security layer has lagged, leaving governance blind spots that adversaries can exploit. With the release, FireMon customers can discover, normalize, and analyze Cumulus policy data alongside existing estates, streamlining risk reviews and accelerating safe changes in mixed-vendor environments. Major milestone “Adding NVIDIA Cumulus support is a major milestone for FireMon and for our customers modernizing around open networking,” said Jody Brazil, CEO of FireMon. “Policy sprawl didn’t stop at the firewall; it followed workloads into the fabric, the cloud, and now AI interaction layers. By adding NVIDIA Cumulus support, we’re giving customers one place to govern policy from ground to cloud to data center. The result is continuous visibility, faster time-to-remediate, and audit-ready compliance proof, outcomes CISOs now demand as AI adoption accelerates.” Cumulus integration What the Cumulus integration delivers: Unified visibility. Bring Cumulus-managed networks into the same Policy Manager workspace used for firewalls and cloud controls, with normalized objects and topology for consistent analysis. Change automation. Apply FireMon’s proven workflows to Cumulus environments to design, simulate, and verify policy changes before implementation, reducing rework and audit risk. Continuous compliance. Run automated checks against policy baselines and frameworks, generate evidence, and track time-to-remediate for findings across all covered platforms. Device support FireMon has implemented Levels 1 to 4 device support for NVIDIA Cumulus FireMon has implemented Levels 1 to 4 device support for NVIDIA Cumulus, aligned to FireMon’s standard device-support model, enabling progressive capabilities from inventory/visibility through advanced and automated planning workflows. Data from FireMon Insights highlights the operational cost of weak policy governance. FireMon found 60% of enterprise firewalls fail high-severity control checks during their initial evaluation, and a further 34% failed at critical levels. These reflect governance and process issues beyond ordinary configuration glitches. Extending enterprise-grade policy management into open-networking fabrics helps close that gap. “Security teams don’t have the luxury of separate playbooks for each control plane. They need one governance model that spans firewalls, clouds, and fabrics, and they need evidence it’s working every day,” said Brazil. Built for modern networks The integration leverages NVIDIA Cumulus Linux management interfaces, including the NVUE model and REST API, to align with how operators deploy and manage policy on modern fabrics. It also preserves FireMon’s vendor-neutral approach. Teams standardizing on Cumulus can therefore maintain their operational model while still gaining enterprise-grade policy assurance. Policy Manager already centralizes security policy management across on-prem firewalls and major clouds (e.g. AWS, Azure, and Google Cloud) and integrates with adjacent platforms (e.g., Zscaler and Cisco ACI/NSX) so operations and audit teams can see and govern policy coherently, now including NVIDIA Cumulus environments. Govern policy across heterogeneous environments NVIDIA Cumulus support is available now in FireMon’s 2025.2.6 feature update. Existing customers can enable support through the standard upgrade process. FireMon is not just extending support; it is setting the standard for how enterprises can govern policy across heterogeneous environments, from traditional firewalls to open networking fabrics and AI-intensive workloads.
At a hearing on Sept. 16, 2025, Brett Feddersen, Chair of the Security Industry Association (SIA) Drone Security Subcommittee and vice president for strategy and government affairs at D-Fend Solutions, testified before members of Congress to discuss increasing risks from the misuse use of drones and give legislative recommendations for implementing a clear and comprehensive framework for the use of counterdrone technologies and operations across the United States. The hearing — “Unmanned and Unchecked: Confronting the Rising Threat of Malicious Drone Use in America” — focused on the growing threat posed by unauthorized and criminal use of uncrewed aircraft systems (UAS) in both domestic and international airspace. Rapid advancement of drone technology As drone technologies rapidly evolve and become ever more affordable and accessible, it is essential that policies limiting access around sensitive sites and events can be enforced and that drones used for legal and authorized purposes can be distinguished from those being used for criminal activity or potentially attacks. Along with the rapid advancement of drone technology, counter-UAS technologies have been evolving to meet these needs. Various detection technologies, such as radar, optical systems, radio communications, and acoustics, allow trained security personnel to detect, track, and identify drones in their airspace. Barriers to deploying counterdrone technology There are many proven ways of responding using technologies that federal agencies have fielded for many years Once a drone can be clearly identified as safe or a risk, there are many proven ways of responding using technologies federal agencies have fielded for many years; however, unnecessary barriers to deploying counterdrone technology more widely remain due to outdated laws on the books. “By taking decisive action now to modernize our laws, enhance our technological capabilities and strengthen the partnerships between all levels of government, we can ensure that our skies remain safe and that the promise of unmanned technology is never subverted by those who seek to do us harm,” said Feddersen in testimony submitted to the House Judiciary Subcommittee on Crime and Federal Government Surveillance. Awareness of drone activity Current authorities for federal agencies to detect and mitigate malicious drones are set to expire on Sept. 30, 2025, if Congress does not renew them; however, the current regime is fragmented across various federal agencies, creating confusion and potential gaps in response to incidents, especially for state and local law enforcement and trained security personnel protecting critical infrastructure. It is imperative that Congress not just renew but expand the current authorities for all federal agencies, state, local, tribal, and territorial law enforcement and trained security professionals in a clear and cohesive framework to ensure that American communities can have complete air domain awareness of drone activity across the United States.


Expert commentary
Physical security isn’t a one-time project or a static system. It’s a dynamic, ongoing process and program that requires constant attention and management to remain effective. While the initial implementation of a security system — what we often call Day 1 — is critical, the ongoing maintenance, service, and adjustments made after systems are operational, or Day 2, are equally essential. Security program long-term Organizations that fail to focus on post-occupancy security operations risk falling victim Organizations that fail to focus on post-occupancy security operations risk falling victim to a phenomenon known as "program drift," where systems and policies gradually deviate from their intended standards over time. To manage your security program long-term, you often need an outside perspective. By engaging a security partner to provide managed services, organizations can achieve a strategic solution for maintaining their security programs' integrity, effectiveness, and efficiency over the long term. Let’s look at the reasons why. Moving beyond Day 1 Day 1 is the milestone moment when a security system is launched — whether it’s a new system, an upgraded access control platform, or a transition to advanced surveillance technology. On this day, all components align with established policies and standards. Yet, Day 1 is only the beginning of a security program's lifecycle. What happens on Day 2 and beyond is often where the real work begins. Without a robust plan for ongoing service and maintenance, security systems can quickly fall out of compliance. Policies become outdated, configurations drift, and vulnerabilities emerge. This gradual degradation — program drift — occurs not due to neglect but as a natural result of decentralized management; competing operational priorities; and the lack of dedicated, knowledgeable resources to oversee the systems. Avoiding program drift Drift is particularly pronounced in physical security because, unlike other building systems Program drift occurs when a security program’s elements — such as access controls, camera placements, or intrusion detection settings — gradually become misaligned from their intended standards. Think of a straight line representing perfect compliance on Day 1. Over time, various factors push individual components off this line. Left unchecked, these deviations accumulate, leading to significant vulnerabilities and deferred remediation costs that would be much easier to manage and predict with a more proactive approach. Drift is particularly pronounced in physical security because, unlike other building systems such as lighting or HVAC, security measures are often viewed as inconveniences. Even when systems function as designed, features like turnstiles, visitor management, or additional access controls may face pushback for being "in the way" of daily operations. This resistance and the Day 2 problems that often result — along with the lack of centralized oversight — exacerbate the risk of misalignment and ongoing inefficiencies. Why centralized post-occupancy management matters Post-occupancy management is critical for maintaining the long-term health of a security program. Facility managers, who are often tasked with overseeing security systems, may lack the technical expertise or bandwidth to handle the complexity of modern security infrastructure. Partnering with dedicated professionals to help meet these responsibilities ensures systems are managed effectively and vulnerabilities are addressed proactively. It also helps improve system availability and uptime, accelerate break/fix response and resolution times, lower ownership costs by reducing unnecessary and repeat service dispatches, and achieve a more consistent end user experience. Moreover, centralized management provides a consistent framework for handling security systems across multiple sites. This consistency is vital in preventing Program Drift, ensuring that local variations or individual decisions do not undermine the organization’s overall security posture. The case for managed services Hiring outside consultants offers a proactive and professional approach to mitigating program drift Hiring outside consultants offers a proactive and professional approach to mitigating program drift. Specialized providers have the expertise, tools, and resources to manage complex security systems effectively and ensure those systems remain aligned with organizational policies and performance expectations. By acting as a dedicated external resource and interfacing regularly with your security team, your consultant can help you build, manage, and optimize a variety of services that help keep your program on track. These services range from system health and availability management (break fix); move, add change management; system configuration administration; and program/project management offices. Key benefits in the following areas Let’s look at how a managed services a partner can yield key benefits in the following areas: Standards compliance. Centralized management ensures that security systems and processes remain in compliance with established policies and standards, reducing vulnerabilities caused by ad hoc changes or decentralized management. Operational efficiency. Managed services streamline maintenance and support workflows, minimize downtime, and ensure quick issue resolution. Enhanced security resilience. Proactive monitoring and maintenance reduce the likelihood of system failures and improve overall system reliability. Standardized processes for move-add-change (MAC) activities ensure that security configurations remain consistent across locations. Cost savings. Outsourced providers help organizations optimize resources, avoid errors, and benefit from economies of scale in service delivery. Strategic focus. Outsourcing also allows internal teams to shift their focus from routine operational tasks to higher-value activities, such as strategic planning, threat analysis, and incident response. Long-term value of security investments While Day 1 success is the foundation of a comprehensive program, what happens on Day 2 determines your ability to realize the long-term value of your security investments. As the complexity of security challenges grows, leaders must prioritize sustained management and professionalized oversight to protect their organizations, making the conversation around post-occupancy security more critical than ever. By adopting innovative strategies, implementing mature toolsets and processes, and leveraging specialized expertise, organizations can ensure their programs remain robust, aligned, and prepared to meet the challenges of tomorrow.
March is Women in Security Month, a time dedicated to celebrating and promoting the contributions of women in the security field—particularly in cybersecurity. This observance aligns with Women’s History Month, providing an opportunity to reflect on the progress made and the work still needed to advance gender equity in security. evolving role of women in security The security industry has witnessed a steady increase in women's participation. According to ISC2 Research in its “Women’s Role in Filling the Workforce Gap” report, women make up an estimated 20 to 25 percent of the security industry. Promisingly, younger generations are entering the profession at higher rates, with 26 percent of working professionals under 30 identifying as women. The security industry has witnessed a steady increase in women's participation The research tells us that women are thriving in a variety of roles, from engineering and system administration to sales, marketing, and project leadership. Key factors driving this transformation include mentorship programs, male allies advocating for gender equality, and cultural shifts recognizing the unique perspectives and strengths women bring to security challenges. These efforts are fostering more inclusive environments and ultimately strengthening the industry. The value of diverse perspectives in security Security is not a one-size-fits-all industry—each organization and facility has unique needs that require varied perspectives. Greater representation of women has introduced fresh approaches to problem-solving, fostering collaboration and driving innovation. By integrating diverse viewpoints, security professionals can create more effective solutions that better address end-user needs. Industry support for women’s professional growth SIA's WISF offers subcommittees such as NavigateHER, SupportHER, and UpLiftHER Organizations like the Security Industry Association (SIA) and ASIS International have established networking platforms and initiatives to support women in security. Events such as the Security LeadHER Conference provide valuable professional development and networking opportunities. Companies are also investing in science, technology, engineering, and mathematics (STEM) initiatives, hands-on training, and recruitment programs to attract more women into the field. Additionally, SIA's Women in Security Forum (WISF) offers subcommittees such as NavigateHER, SupportHER, and UpLiftHER, which provide pathways for engagement and growth. Challenges women in security face Despite progress, challenges remain. Many women still feel it necessary to repeatedly prove their expertise, take on additional informal responsibilities, or carefully navigate workplace dynamics. Imposter syndrome can be another hurdle, even for accomplished professionals. However, women in security are addressing these challenges by setting boundaries, advocating for themselves, and supporting one another through mentorship. By excelling in leadership and technical roles, women are reshaping outdated perceptions and advocating for more inclusive workplace policies. Steps industry pioneers can take To further support women in security, industry pioneers could: Provide targeted professional development and career advancement opportunities. Foster strong, supportive communities that recognize and mentor women. Implement structured mentorship programs that connect experienced professionals with newcomers. Promote workplace flexibility to help employees balance personal and career commitments. Actively challenge biases and advocate for meaningful change within organizations. Advice for women entering the security field Here are key pieces of advice for women considering a career in security: Own Your Expertise – Have confidence in your knowledge and skills. Seek Out Mentors & Allies – Connect with supportive professionals who can guide your career. Build a Strong Network – Join organizations like ASIS Women in Security, SIA Women in Security Forum, or Women in CyberSecurity (WiCyS), and attend industry events to expand your connections. Speak Up & Take Space – Confidently share your ideas and challenge outdated norms. Develop Resilience & Advocate for Yourself – Push past biases, demand the respect you deserve, and negotiate for fair salaries and promotions. Keep Learning & Stay Ahead – Continually build your expertise to stay competitive in the evolving security industry. The future of women in security As the security industry evolves with technological advancements and global changes, opportunities for women will continue to expand. Women are not just participating in the industry’s growth—they are shaping its future. With growing mentorship programs, male allies advocating for gender equality, and ongoing cultural shifts, the focus is no longer just on breaking barriers but on building bridges to new opportunities.
Security technology has witnessed huge advancements in recent years, particularly for those protecting critical assets or information. Facial and fingerprint recognition, ANPR and even 'mac addresses' or a person of interest's gait, now all make up the technology toolbox of forward-thinking organizations' security policy. However, humans remain the weakest link in any security chain, and the only way to correct this is to eliminate the human burden, argues Richard Hilson, head of sales for security access management specialist, Parking Facilities. Here, he examines the pitfalls in relying upon human intervention in critical national infrastructure (CNI) settings, and the future of biometrics to keep assets, information and personnel safe. Recent Verizon report 74 percent of corps are saying that insider threats are becoming more of a concern for them As with any workplace initiative, be it a simple recycling policy or a corporate password protection directive, technology is only as good as those who implement or operate it. While technology can be fallible and gremlins do arise, it’s never as flawed as us mere humans with our unreliable ‘on/off’ switch. Likewise, we carry the ability to reason, to override procedures, or ignore policy, should we wish. Or as it happens, just make mistakes. In fact, according to a recent Verizon report, two out of three insider attacks happen as a result of negligence, and 74 percent of organizations are saying that insider threats are becoming more of a concern for them. Fundamental security practices Security breaches aren’t limited to external threats either, whether intentionally or not, they can come from within. Humans can, and do, ‘go rogue’, whether that’s pre-meditated criminal or malicious intent, or just by taking shortcuts. While data breaches court most news headlines in this digital era, some of the most significant security risks are those posed when employees neglect fundamental security practices such as sharing passwords or access cards. Employee negligence and insider threats Insider negligence remains one of the pioneering causes of security breaches Insider negligence remains one of the pioneering causes of security breaches. Employees who share passwords or access cards may do so out of convenience, ignorance, or a misplaced sense of trust. Unfortunately, this creates vulnerabilities that are left open to exploitation. When multiple employees share credentials, it becomes difficult to trace actions to a single individual. This lack of accountability can complicate incident investigations and allows malicious activities to go undetected. Emergency services resources Furthermore, the sharing of passwords or access cards means inaccurate accounting of personnel, and in the event of an evacuation or major incident, central IT systems will hold misleading information of employees’ locations which could have a huge impact upon safety and potentially emergency services resources. Employees with malicious intent can exploit shared credentials to carry out unauthorized activities while shifting blame to others, increasing the risk of deliberate sabotage or theft of sensitive data. Even when there is no malicious intent, employees who share access credentials risk unintentionally exposing them to unauthorized individuals, such as contractors, visitors, or external attackers. What happens when employees compromise security? Access cards are designed to limit entry to restricted physical locations. When shared, unauthorized personnel could enter secure areas such as control rooms, rail lines, large construction sites, data centers, power plants or indeed any site meant to be kept secure. This creates opportunities for sabotage, theft, or corporate espionage. Sensitive data held within critical sites, such as blueprints, system controls, and customer records Likewise, shared passwords can lead to unauthorized entry into IT systems, allowing hackers to install malware, ransomware, or spyware. For example, a cybercriminal gaining access to an energy grid system could shut down power to entire regions, causing chaos to millions of people, and disrupting essential services. And not all data breaches are caused by online hackers gaining entry through unsecure firewalls. Sensitive information held within critical sites, such as blueprints, system controls, and customer records, becomes vulnerable when access credentials are shared too, and the disclosure of such information can have a serious impact upon a company’s bottom line, operations, and ultimately its reputation. Eliminating the human burden One way to prevent human error, or to thwart malpractice is to reduce the burden upon employees to be compliant, and eliminate our flaws by using technology that requires no intervention, decision-making or reason. Facial recognition is widely used in the civil world now, despite the concerns of various lobbyists. Used correctly it is not a ‘catch all’, but an instant recognition of persons of interest cross referenced against a database of known suspects. Our car parks are governed by automatic number plate recognition (ANPR) to gain access in and out, while border controls are using advanced biometrics for everything from facial and fingerprint recognition, through to recognition of human characteristics and gait, for both entry and to apprehend. The UK Home Office is even accelerating its transition to digital border management, using biometric technology to improve efficiencies, safety, and to track and capture known or illegal persons. What of the CNI sites? But what of the corporate world? What of the CNI sites, our airports, our national construction developments such as HS2 or our high-rise office spaces? We always ask this very question, and also ‘can you afford a security breach’ in whatever environment you’re in? Because the smart, cloud-based technology being used by governments, law enforcement authorities and Border Force have cascaded down through the civil and corporate worlds. Immediate safety and security Security-conscious corps are diligently removing human error, by eliminating the human burden Security-conscious organizations are now diligently removing human error, by eliminating the human burden. With cloud-managed software not only are access points managed through biometric integration, but it also overcomes the issues mentioned earlier around accountability - in that the cloud will always register who has passed through an access point, or out of it. This is critical for both immediate safety and security but also for matters arising from a crisis, or emergency situation. It’s also less admin-heavy, more cost-effective and can manage and store employee records, including background checks. Employee or contractor data is encrypted, their information is safe, their interactions are secure, and businesses are protected. Implement robust access management systems Simple acts of negligence, such as sharing passwords or access cards, can open the door to catastrophic consequences, operational disruption, financial loss, and even, in the case of CNI, national security risks. To mitigate this, organizations can do worse than to implement robust access management systems, and in doing so, release employees from having to be accountable for ensuring the security of the sites in which they work. As artificial intelligence evolves, I see even more robust biometrics coming to the fore, until such time we work and live in environments that are controlled without us even knowing security checkpoints are all around us, and access management happening at every step. It will become as ‘every day’ as an automatic door allowing entry into our local supermarket - but we’re not quite there yet.
Security beat
AI has the potential to enhance the usability of traditionally complex access control and physical security systems. The application of AI (artificial intelligence) within access control is still relatively new, but rapid advancements in generative AI are already transforming how security systems operate. acre security is driving the deployment of generative AI in access control through its acquisition of REKS earlier this year. REKS is a purpose-built generative AI solution designed specifically for acre’s access control platform. Unlike generic AI tools, REKS understands both system and security-specific terminology, allowing users to ask natural-language questions like, “Show me all access denied events at a specific location,” and receive instant results. AI workflows and AI agents “We're starting to see how AI workflows and AI agents, that leverage language models, can potentially be used in conjunction with access control to create new, automated processes around false alarm reduction, system configuration, report generation, data analysis, threat detection, and in-system customer support,” says Adam Groom, Director of Business Development, AI Development Team, acre security. “We expect AI-driven capabilities to evolve rapidly, but the full range of benefits will depend on continued development and real-world application,” he adds. Integrate AI-driven capabilities acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions The best way to think of REKS is as an acre access control expert you can talk to, says Groom. “As AI adoption grows in security, REKS will expand its capabilities, making access control more usable and more efficient.” Groom says acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions the company as a pioneer in next-generation physical security. “These features will add long-term value by enhancing usability and operational insights across various segments,” says Groom. “Work is already under way to incorporate REKS into acre access control, and we’ll evaluate other integration opportunities in the future.” REKS' AI capabilities According to acre, REKS simplifies daily operations, automating routine tasks, and delivering real-time, actionable intelligence. With REKS' AI capabilities, users can interact with the system to retrieve more detailed insights and actionable information from their acre access control system. “This eliminates the need for complex reports, navigating drop-down menus, or manually reviewing logs,” says Groom. “It significantly enhances efficiency and usability for security professionals.” Enhancing productivity and customer satisfaction Key concern is ensuring that system configuration, enactment, and servicing remain within their scope For integrators, the key concern is ensuring that system configuration, implementation, and servicing remain within their scope of expertise. With REKS, that doesn’t change — but the process becomes significantly faster and more efficient. Instead of manually configuring every panel, input, and output — a traditionally time-consuming task — REKS enables integrators to use natural language commands to streamline setup and adjustments, says Groom. This eliminates tedious steps and dramatically improves operational efficiency, allowing integrators to deploy and fine-tune systems with greater speed and accuracy, ultimately enhancing both productivity and customer satisfaction, he adds. Cloud-enabled ecosystems “We are committed to helping organizations modernize their security infrastructure by transitioning from legacy systems to cloud-enabled ecosystems at their own pace — ensuring minimal disruption while maximizing value,” says Groom. “By integrating AI-driven capabilities, we enhance usability and deliver deeper operational insights across all segments.” “Security’s future isn’t about forcing change — it’s about empowering choice,” adds Groom. “Whether staying on-prem, migrating to the cloud, or adopting a hybrid model, we plan to provide a seamless, zero-disruption transition, prioritizing interoperability, automation, and security at every stage.” Generic AI tools AI must be purpose-built for security applications because security demands precision, reliability, and context-aware decision-making, which only focused AI offerings like REKS bring to the table, says Groom. In contrast, generic AI tools, like ChatGPT, are designed to perform a wide variety of tasks, like how humans can learn and do many different things. Instead, purpose-built AI is built to do just one specific function. “REKS adds specially designed artificial intelligence to our access control solutions to enhance both intelligence gathering and the user experience,” says Groom. New applications in access control The integration of generative AI into acre's access control platforms and their broader portfolio A new AI development team will lead AI initiatives at acre, driving the integration of generative AI into acre's access control platforms and their broader portfolio. This team will seek to push boundaries in applying AI to new applications in access control, intrusion detection, and beyond, empowering security professionals to interact with their systems in a smarter, more intuitive way. But don’t worry, AI will not take the human element out of security entirely. AI human capabilities “The reality is that AI will improve upon human capabilities because it is a versatile tool that supports and strengthens security operations, not a replacement for human decision-making,” comments Groom. “It helps operators process large amounts of data quickly and detect patterns that might be missed otherwise.” Rather than removing the human element, AI allows security teams to work more efficiently by automating repetitive tasks and providing actionable data, enabling professionals to focus on critical responsibilities.
In today's complex security landscape, ensuring the safety of building occupants and assets requires more than just cutting-edge technology. Holistic approach The SHIELD certification, introduced by the Secure Buildings Council, is designed to help building owners, tenants, and security professionals navigate this challenge effectively. SHIELD offers a holistic approach to physical security that emphasizes not just the systems in place, but the collaboration among all stakeholders. With practical, actionable guidance, SHIELD certification seeks to become a benchmark for secure building environments. What is SHIELD? Its primary goal is that buildings are equipped with security systems and protocols that protect against threats SHIELD is a comprehensive certification program developed by the Secure Buildings Council to establish and maintain a standard of excellence in building security. Its primary goal is to ensure that buildings are equipped with security systems and protocols that not only protect against threats but also enhance the overall safety and operational efficiency of the facility. Forward-thinking design It encourages a multi-disciplinary approach, bringing together building owners, managers, security professionals, architects, and engineers to foster an integrated security strategy. By adhering to SHIELD's standards, facilities can assure tenants, visitors, and investors that the building is designed to be a secure and resilient environment. The intent is to create safer spaces through collaboration, forward-thinking design, and stringent security measures. Enhancing security and building resilience SHIELD certification helps to ensure that buildings are not only secure from external threats but are also resilient in the face of internal vulnerabilities. This includes everything from access control systems and surveillance infrastructure to cybersecurity measures and emergency response protocols. Detailed framework SHIELD acts as a roadmap to assess and improve the effectiveness of a building's security architecture The certification process provides a detailed framework for identifying potential risks, implementing best practices, and continuously monitoring security measures. For security professionals, SHIELD acts as a roadmap to assess and improve the effectiveness of a building's security architecture. The program emphasizes the importance of both physical and digital security, recognizing that modern threats often cross over from one realm to the other. Benefits for tenants, investors, and facility managers One of the standout benefits of SHIELD certification is the assurance it provides to tenants and investors. Certified buildings demonstrate a commitment to security that can attract higher-quality tenants and increase the building’s market value. For investors, a SHIELD-certified building represents a lower-risk investment, as the facility is better protected against both physical threats and operational disruptions. Standardized procedures Additionally, facility managers benefit from SHIELD's emphasis on clear, standardized procedures for maintaining and upgrading security measures. The certification helps streamline operations by ensuring that all security protocols are applied consistently and reviewed regularly. This results in a safer, more efficient building environment for everyone involved. Promoting collaboration and industry integration Architects, engineers, and security professionals are encouraged to work together from the earliest stages SHIELD certification is not just about the implementation of security technologies—it is also about fostering collaboration among various stakeholders. Building owners, architects, engineers, and security professionals are encouraged to work together from the earliest stages of design and planning. This collaborative approach helps ensure that security measures are integrated into the fabric of the building, rather than being tacked on as an afterthought. Multi-disciplinary synergy Furthermore, SHIELD works in alignment with other industry standards, such as LEED for environmental sustainability and WELL for health and well-being. This multi-disciplinary synergy allows building owners to pursue multiple certifications concurrently, enhancing the building's overall value and appeal. Achieving SHIELD certification: The process The process to become SHIELD certified involves a comprehensive assessment of a building’s security features and protocols. This begins with a gap analysis, where security professionals evaluate the building's current state against SHIELD's stringent standards. From there, a detailed action plan is developed to address any deficiencies. Once the necessary upgrades and protocols are in place, the building undergoes a final audit before the certification is awarded. Incorporating multiple elements SHIELD takes a holistic approach that encompasses not just physical security but also digital and procedural elements A common misconception about SHIELD is that it is solely focused on physical security systems. In reality, SHIELD takes a holistic approach that encompasses not just physical security but also digital and procedural elements. Another misconception is that SHIELD is only applicable to large-scale commercial properties, when in fact it can be adapted for buildings of various sizes and functions. Global adoption of SHIELD certification SHIELD certification is seeing increased adoption across North America, Europe, and parts of Asia. Its focus on a comprehensive, collaborative approach to security has made it particularly attractive in high-risk industries such as finance, healthcare, and data centers. While it is still gaining traction in some regions, SHIELD is poised to become a global standard for building security in the coming years. SHIELD certification represents a significant step forward for building security. By fostering collaboration and emphasizing a holistic approach, SHIELD helps create safer, more resilient buildings that protect both the physical structure and the people and assets inside.
ISC West 2024 mirrored a vibrant industry on the precipice of accelerated change. Factors such as the cloud, artificial intelligence (AI), edge computing, and biometrics are shaping the future of the security marketplace, and they were front-and-center at the industry’s biggest U.S. show in Las Vegas. Foot traffic was steady and impressive, including more than 29,000 security industry professionals viewing 750 exhibitors. A torrent of eager attendees crowded the lobby on the first day and could not wait for the doors to open. When they were admitted, the wealth of technological innovation and business opportunity did not disappoint. Focus on cloud systems Cloud systems were high-profile at ISC West. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference. Meanwhile, Genetec officially launched their Security Center SaaS platform, which aims at eliminating points of friction to enable integrators to easily embrace cloud systems from quoting and ordering to provisioning and installing. Camera manufacturer Axis, for example, introduced their Axis Cloud Connect at a press conference Cloud provider Eagle Eye Networks promoted their new “Eagle Eye 911 Camera Sharing” technology under which both non-Eagle Eye Cloud VMS customers (via Eagle Eye 911 Public Safety Camera Sharing) and Eagle Eye customers can opt to share their video feeds for use by 911 operators in case of emergency. If users opt-in, 911 operators can have access to live video as an emergency unfolds. Eagle Eye Networks provides the feature by integrating with RapidSOS call center software. Camera locations are based on geolocation coordinates, and customers can choose if they want to participate and which cameras they want to share. Biometrics in the mainstream Biometrics were well represented at ISC West, including Alcatraz AI, which introduced an outdoor version of their biometric face recognition product. The Rock X works well despite harsh lighting. Alcatraz’s products do not have to be integrated, they communicate just like a card reader using OSDP or Wiegand protocol. “At the show, customers are excited about moving to a frictionless environment and getting rid of existing credentialing,” said Tina D’Agostin, CEO and co-founder of Alcatraz. “We are making access control frictionless, secure and private. The experience can be as passive as possible – people can just walk in.” Multiple types of authentication, and the ability to detect tailgating and stream video SAFR from Real Networks also featured biometric face recognition, emphasizing feature sets, convenience, and price/performance. They offer multiple types of authentication, and the ability to detect tailgating and stream video. A new device is a small mullion mount that is “approaching the price of a card reader, factoring in the need to purchase cards,” said Brad Donaldson, Vice President and General Manager. SAFR focuses on convenience: You don’t have to take out your phone to pass through a door. Enrollment is easy by incorporating existing databases, and costs are lower than competitors, said Donaldson. The system analyses multiple points on the face, turns it into data and then encrypts it, providing a “unique signature for each person.” Credentials in Apple Wallet and Google Wallet AMAG Technology announced the compatibility of credentials with the Apple Wallet and Google Wallet. The company is also embracing a new strategic direction under President David Sullivan. They launched a new website in January, are developing dynamic resources and a partner page, and they now integrate with 120 tech partners. AMAG Technology Financial Services now enables their channel partners to offer leasing and financing options to customers. The big new booth at ISC West reflected an effort to “market different and look different,” according to the company. The big new booth at ISC West reflected an effort to “market different and look different" The new Symmetry Control Room, a command-and-control system, is a relaunch of an earlier AMAG product with enhanced features. Suitable for large enterprise customers, the software enables a big video wall to display all the various systems and incorporates all the data into a single “pane of glass.” Operators can “draw a lasso” around cameras they want to display on the video wall and can follow action across multiple camera feeds. Navigating megatrends A breakfast meeting for integrators, sponsored by Assa Abloy Opening Solutions, was built around the theme “Navigating Megatrends for Sustainable Growth." The megatrends are artificial intelligence, sustainability and cybersecurity. Related to cybersecurity, there are 350 common vulnerabilities and exposures (CVE) published per week, reflecting the continuing threat to cybersecurity. Physical security has a “data lake” of information from various physical security systems that can be an attractive target for cybersecurity breaches. Data sets can be exploited and/or poisoned. The security industry needs to apply “defense in depth” to the challenges of protecting data. “The threat landscape is always changing, and security technology is an iterative process,” said Antoinette King, i-PRO’s head of cyber convergence, one of the panelists. Natural language systems Natural language systems are a newer approach making an early appearance at ISC West Natural language systems are a newer approach making an early appearance at ISC West. Brivo, for example, has an early prototype of its “natural language search capabilities” that can answer questions such as “Who is in the office?” or “Where is Bob and what has he done?” Brivo also promoted its all-in-one door station device that combines a card reader and a camera (for facial authentication) and serves as a video intercom, thus eliminating the need for multiple devices at the door. Brivo is also emphasizing tailgate prevention, facial authentication, and people counting using AI at the edge. Also promoting natural language systems was Verkada, which unveiled a beta version of its AI Search feature that embraces national language capabilities. With AI Search, users will soon be able to use natural language to search for people or items. For example, a search could be “person climbing over a fence” or “person making phone call” or “person wearing football jersey.” Verkada wants to be thoughtful with the rollout and make sure effective guardrails are implemented to prevent abuse and bias. The release should happen in the coming months. Multi-family applications Allegion is promoting the XE360 hardware lock platform in various formats, including cylindrical lock, mortise lock, deadbolt, and exit trim. At the show, Allegion noted an enthusiasm for multi-family applications. “We have been surprised by the people who want to add electronics and to retrofit existing multi-family facilities to compete with newer facilities,” said Henry “Butch” Holland, Allegion’s Regional Director, Channel Sales East Region. Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec Allegion also offers an “indicator” display on its locks, showing at a glance whether a door is locked or unlocked. The “indicator” might also display “occupied” or “vacant.” Allegion works with 60 different physical access control software providers, including familiar players such as LenelS2 and Genetec. Integrator M&A trends Everon looks for acquisitions in areas where they do not currently have support for national accounts A conversation with Everon at ISC West provided insights into the accelerating trend of mergers and acquisitions among the integrator community. Everon, formerly ADT Commercial, has done six acquisitions of local integrators since they changed their name last year. In targeting companies to acquire, they look for a good company with a good reputation, and they consider how the new company’s competencies complement their own. Some M&A strategy is geographic, as Everon looks for acquisitions in areas where they do not currently have support for national accounts. They also consider density, seeking to add new acquisitions in larger markets where they don’t currently have a big market share. “A lot of investment is coming into security because it is seen by investors as recession-proof,” said Michael Kennedy, VP, Mergers and Acquisitions, for Everon. Kennedy met with 95 businesses last year for possible acquisition, and the company only finalized a handful – reflecting that Everon is selective and careful that corporate cultures are aligned. “With an acquisition, the goal is to keep every customer and every employee,” said Kennedy. Voice of the customer ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. “We have every kind of problem come to the booth,” commented Heather Torrey, Honeywell’s General Manager, Commercial Security, Americas. “People are passionate, interested and very specific with their questions and comments,” she said. “We are driving a complete system, but we are flexible, helping our customers to meet their needs and not try to fit every foot into the same shoe. Sometimes meeting customer needs involves working with competitors," Torrey commented. “It truly comes back to listening to the customer, not just ‘this is what we have to offer,’” she adds. ISC West provides an opportunity for manufacturers to listen to the “voice of the customer;” in person, no less. Edge applications are everywhere at ISC West, and one company is promoting a new approach to expand functionality at the edge. Camera company i-PRO advocates the use of the “Docker” platform for app development, an option they offer on their cameras. Docker “containers” package deep-learning algorithms to make it easier to embed software into edge devices. Anyone can run Docker apps on i-PRO cameras that use the powerful Ambarella chip. A Docker “swarm” can combine multiple edge devices to work together and share resources. For example, the approach can increase computing power at the edge to increase the capabilities of instant analytics. It’s faster and provides better redundancies. A “distributed computing platform” ensures less latency than communicating analytics to a central server. Unification of capabilities Johnson Controls (JCI) also promotes the trend of combining multiple systems into a single pane of glass. Their “Open Blue” platform, with a security version unveiled at the show, integrates various security systems into one, combining data and monitoring device health. Basically, the system manages all resources holistically. JCI also notes a trend toward “unification of capabilities,” e.g., combining access control and video. “The scope of security is evolving from a focus on protection to a broader focus on operations,” commented Julie M. Brandt, JCI’s President, Building Solutions North America.
Case studies
Amthal Group Companies has supported Tradestars’ new Hackney Wick site with a comprehensive, ground-up technology stack, incorporating integrated smart security and fire safety for the benefit of the thriving entrepreneurial community. Tradestars offers flexible co-warehousing facilities for entrepreneurs looking for collaborative workspaces and shared resources to foster innovation and growth. Its newest location presents spaces in Hackney Wick to suit individual business needs. Integrated security solution Amthal to design a fully integrated security solution that was installed, monitored and maintained With the site spread out across multiple blocks and topped with residential accommodation, Tradestars worked directly with Amthal to design a fully integrated security solution that was installed, monitored and maintained for the benefit of the growing community. The result is a secure, technology-led site with members able to book facilities, and open doors to access offices, meeting rooms and amenities via their phone, whilst giving community managers centralized control over the building. Security and fire safety measures Says Jonathan Marriott, Construction Director at Tradestars: “Our work with Amthal has been instrumental in elevating our Hackney Wick site into a secure, cowarehousing business environment." “With their expertise, we’ve seamlessly integrated comprehensive security and fire safety measures, ensuring the safety and peace of mind of our thriving entrepreneurial community. The ability for our members to effortlessly book facilities and access various amenities via their phones, all while providing our community managers centralized control, truly enhances the Tradestars experience.” Advanced technology features of Amthal Amthal designed and installed a fully integrated, ground-up technology stack – from fiber connectivity Following a detailed risk assessment across the site facilities, in cooperation with main contractors, Amthal designed and installed a fully integrated, ground-up technology stack – from fiber connectivity, Wi-Fi, audiovisual and space management solutions, to fire, security and access control. Paul Rosenthal, Amthal Group Business Development Director added: “Being involved right from the initial design stages of the building site, enabled us to create a system to encourage connectivity, collaboration and innovation. One where members enjoy streamlined access, advanced technology features, and a safe working environment." Integrating fire safety and security systems Rosenthal added: “The focus on integrating fire safety and security systems means the growing community can focus on building their business vision, safe in the knowledge that they are powered and protected wherever they are on site, fitting today’s mobile-connected lifestyle." "This is complemented by fully managed services and support to ensure the continuous operation and maintenance of the complete ecosystem.”
Encore Atlantic Shores is a residential complex of 240 luxurious townhomes for ages 55 and over in Eastport, New York. Completed in 2011, the site boasts an 11,800 square foot clubhouse, with amenities such as a fitness center, heated indoor pool, whirlpool spa, multi-purpose ballroom, cardroom, and clubroom with billiards, tennis courts, and an outdoor putting green. The complex required an update to their legacy security system, so they reached out to CWC Security to specify a new and modern solution for their site. Paxton’s Net2 access control system Paxton’s Net2 access control system due to its flexibility to integrate with multiple other systems CWC Security, based in Melville, New York, specializes in designing, installing, and monitoring state-of-the-art security systems that offer comprehensive protection for residential and commercial spaces. They chose Paxton’s Net2 access control system due to its flexibility to integrate with multiple other systems that were already on Encore’s network. Paxton, the security technology manufacturer, designs and develops access control systems, video intercom products, IP cameras, and wireless door handles that are installed and used globally. Requirement Encore Atlantic Shores needed to update all internal and external entry and exit points on the premises, including their access-controlled gates to allow flexible access permissions. Additionally, multiple areas of the site were on different internet networks, which needed to be managed from one central location. There is a clubhouse that also required permission-based access for summer residents who are not members of the clubhouse but need access to the pool. The property manager utilizes Net2 software to provide temporary access rights during these times for different members. The site’s pool management personnel also require separate access to the basement for equipment storage. Solution Net2 is Paxton’s networked access control system that can be administered using one or more PCs Michael Pittakas, owner of CWC Security, presented Encore Atlantic Shores with Net2 as a solution. Net2 is Paxton’s networked access control system that can be administered using one or more PCs and can be monitored and managed from a central location. The software is designed to easily integrate with other security systems. This made it straightforward to run alongside the sites existing systems and further streamline security for their staff and residents alike. Net2 now secures all primary entry points to the complex, with keyfobs provided to residents to access the front gate. For deliveries and garbage collection, the rear gate is also controlled via the Net2 software. This enables Erin Stewart, the Property Manager, to open the gate for these vehicles when needed. Video intercom system Michael said: “The front and rear gates are relay controlled, so we utilized triggers and actions within Net2 to provide access.” “We also integrated Net2 with the existing video intercom system at the front gate so that non-residents call the security booth before they can enter the premises. This is then recorded as an event in the Net2 software.” Result Erin at Encore Atlantic Shores has been very pleased with the Net2 system and CWC’s service Since the installation took place, Erin at Encore Atlantic Shores has been very pleased with the Net2 system and CWC’s assistance and support. Michael explained: “I showed Erin how to create schedules, control the property via the Net2 software, and setup the correct access permissions.” Erin said: “We find Net2 to be the perfect fit for our needs at Encore Atlantic Shores. The software is user-friendly, reliable, and customizable. Having the ability to program keyfobs with different access levels has been a tremendous help with vendors who may need access during hours with limited staff. The reporting ability gives you a record of who and when someone uses a keyfob to enter the Clubhouse.” Setup of a Net2 system CWC, a Silver Paxton Partner, commissioned the site via the Paxton Installer app’s commissioning feature. This makes the setup of a Net2 system simpler and faster than ever before, as it saves installers from having to write down the products’ serial numbers to add them into the Net2 software afterwards.
Newport, a popular vacation destination, has partnered with Sorama to tackle growing noise pollution. By integrating AI technology and products from Axis Communications, Sorama, and FF Group, the city aims to reduce traffic noise and enhance road safety. FF Group’s CAMMRA AI software and DataFactory platform help generate accurate vehicle data in real-time, day or night, to support noise reduction efforts. The challenge How can they address the challenge of traffic noise? What actions can local municipalities take to effectively monitor noise pollution and improve road safety? The solution Newport, hosting 4 million annual visitors, faces traffic noise due to congestion. To address this, the city implemented an AI-based noise camera solution with the Axis Radar-Video Fusion Camera, powered by CAMMRA AI, Sorama Acoustic Monitors, and the DataFactory platform. This system helps adjust noise ordinances and improve traffic safety as part of Newport's smart city initiative. Solution architecture 1. Axis Radar Video Fusion Camera Monitors vehicle speeds up to 125 mph, integrates with CAMMRA AI for license plate recognition and speed tracking. 2. CAMMRA AI Application Recognize vehicle details (make, model, plate) and merge data with speed from the Axis Radar. 3. Sorama L642 Acoustic Monitors Capture sound levels with 64 microphones and integrate with Axis cameras for detailed vehicle data. Offers integrations with Axis camera, Axis Camera Station and FF DataFactory. 4. DataFactory platform Collects data on all vehicles, including sound level, license plate, make, model, color, speed, vehicle type, GPS coordinates, and time, for analysis to help city officials identify emerging patterns. Aggregates real-time data for enforcement, identifying vehicles that exceed sound limits. 5. Axis Camera Station Connected to the City Monitoring Center, providing ready-to-use data from DataFactory for efficient monitoring and response. Offers a single platform to access all data from loud vehicle events, including bookmarked entries for further analysis. AI-powered technologies FF Group is tackling traffic noise pollution and improving urban safety via AI-powered technologies The partnership between the City of Newport, Sorama, Axis Communications, and FF Group is tackling traffic noise pollution and enhancing urban safety through AI-powered technologies. By integrating tools like the Axis Radar-Video Fusion Camera, CAMMRA AI, and Sorama's acoustic monitoring systems, Newport is proactively managing noise in real-time. Traffic management and noise regulation This solution improves quality of life, supports smart city goals, and enables better traffic management and noise regulation enforcement. With real-time data on vehicle speed, license plates, and sound levels, Newport can quickly address violations and detect emerging issues, creating a safer and more sustainable urban environment.
In 1899, the Texas Legislature authorized the formation of the Southwest Texas State Normal School, which opened in San Marcos four years later. At the time, the school’s mission was to prepare Texas public school teachers. Still, over the years, it has undergone several expansions and name changes to reflect its evolution into the major multi-purpose university Texas State has become. San Marcos campus From its humble beginnings located in a single building, Texas State’s original San Marcos campus has grown to cover a 485-acre campus home to 267 buildings and an additional 5,038 acres of recreational, instructional, farm, and ranch land. The university added a second campus in Round Rock, which has grown from 15 temporary buildings to a 101-acre campus with state-of-the-art facilities. Need for electronic key control Texas reviewed its policies and determined the necessity of implementing electronic key control Texas State’s student population has kept pace with its physical expansion, growing from 303 in 1903 to more than 35,546 in 2013. This marks the university's 16th consecutive year of enrollment growth. Anticipating continued physical and population growth, Texas reviewed its policies and determined the necessity of implementing electronic key control systems in sensitive areas. Given its size, as many as 85 of these systems could potentially be needed as part of this initiative. Challenges faced Texas State was faced with a particularly challenging growth-related issue in September 2013, as its freshman enrollment surged to more than 5,000. Like many universities, Texas State requires its freshmen to live on campus, which it sees as a tool for retention. That policy seems to be working, with approximately 80 percent of freshmen living on campus technically returning for the following semester. Student accommodation The university has pursued an aggressive construction campaign to accommodate the growing number of on-campus residents. Every two years, a new residence hall complex is built to house approximately 600 additional students, and a third new housing complex will be built this fall. In all, Texas State spent more than $190 million on new or renovated buildings, and more construction is planned for the foreseeable future. Key management policies The decision was made to update key management policies and practices to make them more efficient and effective With a large number of individuals requiring access to so many facilities, the university recognized that key management had the potential to become a high-risk issue and determined to become proactive in reducing that risk. Maintenance staff members would often reach for the key to a particular building they needed to access, only to find it was already checked out. They would then be forced to go through the time-consuming – and frustrating – process of determining who had the key last and tracking that person down to retrieve it. The decision was made to update key management policies and practices to make them more efficient and effective. Solution: KeyWatcher Touch To combat these problems and increase the security and effectiveness of its key management, Texas State charged its University Police Department and other stakeholders with undertaking an extensive review of the available options for key management systems on the market. This exhaustive process involved gathering research from printed materials and online research, having discussions with current customers of the various vendors, and listening to on-site presentations from the companies under consideration. After it reviewed key control cabinets and systems, Texas State chose KeyWatcher Touch from Morse Watchmans. Key features The main factors that led Texas State to choose KeyWatcher Touch systems were its robust feature set and competitive pricing. The school was also impressed by Morse Watchmans’ receptiveness to its specific needs – a six-digit user ID, for example – and ability to implement changes quickly. Access to support was also a main consideration, so Texas State appreciated that the system was produced domestically by a company with a 130-year history. Implemented at housing and services The department also operates a facilities service group consisting of 110 full-time employees and a staff Of the KeyWatcher systems to be implemented, the largest number were to be deployed for Texas State’s Department of Housing and Residential Life, which provides housing and services to approximately 7,000 residents in 25 facilities. The department also operates a facilities service group consisting of 110 full-time employees and a staff of 170 building paraprofessionals. Enterprise management "Because of the personnel changes the department experiences on an annual basis, the system’s enterprise management capability has been a valuable feature, as have its robust reporting capabilities," says Kyle Estes, Texas State’s Associate Director of Housing Facilities Services. "Having keys available in each residence hall for use by maintenance staff has made the department more efficient and reduced their liability; staff no longer need to carry multiple master keys across campus for different buildings." Employee accountability “Because the system automatically generates a log of who has each key, we’ve been able to establish much better employee accountability for key usage,” Estes says. “The ability to set a maximum duration that each key can be checked out and to receive alarms when that limit is exceeded has eliminated the problem of having keys unnecessarily checked out and as a result inaccessible when someone needs them.” Ease of use and centralized management The ease of use and centralized management features provided by the system’s network All KeyWatcher Touch systems deployed at Texas State are connected to the university’s network and interface with its card access and email systems. The ease of use and centralized management features provided by the system’s network capabilities have streamlined the once cumbersome process of generating reports and reviewing incidents. "One particular feature, the ability to access the system from anywhere, has made the system even more effective," Estes says. A test case As one of the earliest adopters of KeyWatcher Touch, the Housing and Facilities Department served as a test case of sorts for the system. Based on the success the department has had, combined with its continued rapid growth and expansion, Texas State University’s 85-system implementation is ongoing. As more systems are added, expansion will be a consideration moving forward, but Estes doesn’t anticipate that being a problem. Reliable system “We’ve found that expanding these systems is fairly easy and doesn’t involve time-consuming processes that could delay implementation of key management for particularly sensitive areas,” Estes says. “Overall, the system has been very reliable, and the support staff has been very responsive and regularly available to help resolve the very few minor issues we’ve encountered promptly.” The University of Texas expanded its KeyWatcher Touch systems in 2015, 2017, 2018, 2020, and 2021. Key watcher touch features Vibrant 7” touchscreen. Modular, customizable design. Easy-to-use interface. KeyFind – locate the key you need. Key reservations. KeyAnywhere – return keys to any system. Patented SmartKey system. Full scalability. True touch software New access control-style interface. Extensive and detailed reporting options. Flexible, email/SMS-capable notifications. Easy-to-read color reports (including PDFs). Schedule reports to email automatically. Automatically sync changes. Profiles – easily assign user access. “We’ve been especially happy with the KeyWatcher’s access and reporting capabilities, and the system’s reporting tools make reviewing events and issues incredibly simple,” said Kyle EstesAssociate Director of Housing for Facilities Services Texas State.
Allied Universal®, the security and facility services company announced its collaboration with Clery Center to support programs and initiatives that help create safer higher education campuses across the U.S. “Our continued collaboration with Clery Center enables Allied Universal to expand its position as a security provider for higher education campuses,” said Mahsa Karimi, director of higher education for Allied Universal. Campus safety awareness and training “The Clery Center partnership provides our security professionals with the training and resources they need to better understand compliance requirements." "As we continue to grow our campus partnerships, campus safety awareness and training for our campus partners and safety professionals is essential. We make campus safety a priority.” Improve campus safety Providing security professionals with the training and resources needed to better understand compliance Allied Universal will work with the Clery Center’s board of directors and members to help ensure that college and university officials meet the standards of the Jeanne Clery Act. The Jeanne Cleary Act requires colleges and universities to report campus crime data, support victims of violence, and publicly outline the policies and procedures they have in place to improve campus safety. Providing security professionals with training and resources needed to better understand compliance requirements, supports efforts to enhance overall campus safety. Safe environment for students, faculty, and staff “We are pleased to continue our long-standing collaboration with Allied Universal in 2025,” said Jessica Mertz, executive director of Clery Center. “With over 30 years of experience in campus safety, Clery Center is dedicated to fostering safer environments for students, faculty, and staff. Joining forces with organizations like Allied Universal allows us to build on shared expertise and advance this important mission.”
The office of the Additional Director General of Police (ADG) and Inspector General (IG) of Prisons oversees the management and security of all prisons in the Indian state. This includes ensuring the safety of prison facilities, implementing rehabilitation programs for inmates, and managing prison staff. Creating a fair environment The ADG and IG focus on improving prison conditions and ensuring legal standards are met. Their goal is to create a secure and fair environment, balancing safety with efforts to reform and rehabilitate prisoners for their eventual return to society. Scenario The need for a robust solution became clear after issues like hidden illegal items and unmonitored inmate movements The absence of a security video surveillance system created critical security blind spots, making it difficult to monitor key areas effectively. The need for a robust solution became clear after issues like hidden illegal items and unmonitored inmate movements posed significant risks to prison security. New security video surveillance system To comply with government regulations, the new security video surveillance system had to adhere to stringent standards established by the Bureau of Indian Standards (BIS). This included specific sections detailing the specifications for camera performance and image quality and covering safety guidelines for IT equipment. The system required STQC certification to meet high security and data privacy standards, crucial for government installations. OWASP ASVS 4.0 L2 standards Additionally, it needed to comply with OWASP ASVS 4.0 L2 standards to ensure robust cybersecurity, safeguarding against common vulnerabilities. High-resolution cameras were essential for clear image capture, and tamper-proof storage was required to securely retain footage for 30 to 90 days. The system also had to align with the National Cyber Security Policy to protect sensitive data from cyber threats. Compliance with these standards was vital for maintaining security and operational integrity within the prison. Challenges Due to the absence of a security video surveillance system, the Prison Department faced numerous challenges such as: Struggled to monitor blind spots in the prison yard where fights and disputes frequently occurred. Detecting the smuggling of drugs and mobile phones during visitations was nearly impossible with manual checks alone. Staff couldn’t always be present to monitor isolated areas like back rooms, corridors, and staircases, leading to security gaps. Identifying the individuals involved in riots or brawls was difficult due to the lack of visual evidence. Inmate escape attempts often went unnoticed until too late, especially during night shifts. Ensuring round-the-clock monitoring of high-risk zones like solitary confinement was a constant challenge. Coordinating emergency responses, such as medical help during violent outbreaks, was delayed without instant visual updates. Matrix solution Matrix security video surveillance systems comprising Matrix Network Cameras and NVRs were installed across four prisons statewide, providing robust security for over 10,000 inmates. Matrix PTZ Cameras were deployed in larger spaces like the prison yard, where they could pan, tilt, and zoom to follow suspicious activities or fights, providing dynamic coverage and ensuring swift responses to incidents. Mini Dome Cameras were placed inside cells and common areas to provide constant, wide-angle surveillance, keeping tabs on inmate behavior and reducing the chances of fights or smuggling illegal items. These cameras were also installed in cafeterias and recreation areas to monitor inmate interactions. Mini Bullet Cameras were installed in corridors and cellblock hallways to keep a close eye on inmate movement, ensuring no blind spots in these high-traffic zones. They were also installed in less-visited areas like storage rooms and staff offices to prevent unauthorized access and maintain control. Project Bullet Cameras were mounted along the prison yard and perimeter walls, providing long-range surveillance to prevent escape attempts and monitor outdoor activity. They were also installed at entry and exit points to keep tabs on everyone going in and out, securing access to the facility. 24x7 real-time monitoring All Matrix Network Cameras were centrally monitored with Matrix 64 Channel NVRs All Matrix Network Cameras were centrally monitored with Matrix 64 Channel NVRs. This setup enabled 24x7 real-time monitoring, recording, and playback of video from different areas of the prison, ensuring complete coverage and prompt incident response. Similarly, the prison departments in three other cities of the state were also secured with Matrix Network Cameras and NVRs. Products offered Matrix MIDR20FL36CWS P2 (800+): 2MP IR Mini Dome Camera with 3.6 mm Fixed Lens Matrix MIBR20FL36CWS P2 (600+): 2MP IR Mini Bullet Camera with 3.6 mm Fixed Lens Matrix CIBR20FL36CWS P2 (800+): 2MP IR Project Bullet Camera with 3.6 mm Fixed Lens Matrix PZCR20ML25CWP P2 (70+): 2MP IR PTZ Camera with 25x Optical Zoom Matrix NVR6408X P2 (40+): 64 Channel NVR with 8 SATA Ports Solution diagram Benefits They ensured round-the-clock surveillance of high-risk zones, such as solitary confinement and cell blocks The installation of the Matrix security video surveillance system effectively eliminated critical security blind spots in the prison yard, reducing the risk of fights and disturbances. They ensured round-the-clock surveillance of high-risk zones, such as solitary confinement and cell blocks, preventing inmate escapes and unauthorized movements. Centralized monitoring Matrix security video surveillance systems enabled accurate monitoring during visitations, significantly enhancing the detection of smuggling attempts for drugs and mobile phones. Centralized monitoring via the 64-Channel NVR allowed for quick identification and response to disturbances, ensuring timely intervention during riots or medical emergencies. Regulation safety and data privacy High-resolution camera footage provided reliable documentation of inmate interactions and incidents, supporting investigations and enhancing overall prison security management. Matrix security video surveillance system meets BIS and STQC standards, ensuring compliance with government regulations for safety and data privacy. It also complies with OWASP ASVS 4.0 L2 standards, enhancing data security and protecting against cyber threats.


Round table discussion
In many cases, architectural design and layout dictate optimal placement of security devices like cameras, access control readers, and sensors. Poor design can lead to blind spots, reduced coverage, and ineffective surveillance. However, planning that involves all the various stakeholders can maximize both security and design elements. We asked this week’s Expert Panel Roundtable: When are building design and physical security systems complementary? When are they at odds?
There is no shortage of threats facing security professionals, including some that are new and emerging. Understanding various new threats allows individuals and organizations to take proactive steps to protect themselves, but the first step is to identify what those threats are. Early detection of threats can minimize the impact of a successful attack, whatever the vulnerability at issue. We asked this week’s Expert Panel Roundtable: What new and emerging threats will physical security professionals need to be prepared for in the future?
Manufacturers make things. That hasn’t changed. Manufacturers today still produce finished goods from raw materials using various tools, equipment, and processes. What is evolving is a greater emphasis among manufacturers on understanding and meeting customer needs. In the security industry and elsewhere, the role of a manufacturer is expanding from a purely production-focused function to one that embraces technology, prioritizes adaptability, expands service offerings, and caters to a more demanding customer base. We asked this week’s Expert Panel Roundtable: How is the role of the manufacturer changing in the security market? Is “manufacturer” still the best term to reflect the changing role?
Products


White papers
Safeguard Students With New Techniques And Technology
Download
How To Implement A Physical Security Strategy With Privacy In Mind
DownloadCybersecurity in Keyless Access Management
Download
Cybersecurity In The Physical Security World
Download
Preparing Your Organization With Quality Situational Awareness
Download
The Role Of IT In Physical Access Control
Download
Expanding Video Surveillance In The Enterprise Market
Download
9 Opportunities To Upgrade Your Access Control Technology
Download

