Security software
Axis Communications, a industry pioneer in video surveillance, announces it has signed the U.S. Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge to transparently communicate about the cybersecurity posture of Axis products. The voluntary Secure by Design pledge of the U.S. government agency, CISA, calls on manufacturers to make the security of customers a core business requirement by addressing seven key aspects of security: ...
As 2026 approaches, cybersecurity threats are evolving at an unprecedented speed. Small and medium-sized enterprises (SMEs) face rising exposure as perpetrators adopt advanced AI, expand commercialised cybercrime platforms, and intensify nation-state activity. Recent intelligence, including the CrowdStrike 2025 European Threat Landscape Report, highlights how attackers are becoming faster, more capable, and more varied in their methods, raising the stakes across the UK’s interconnected su...
Artificial Intelligence Technology Solutions, Inc., a pioneer in AI-driven security and productivity solutions, along with its wholly owned subsidiary, Robotic Assistance Devices Group (RAD-G), announced a SARA™ contract covering more than 2000 video channels, marking a large agentic AI monitoring deployment. The agreement begins with SARA Verified replacing a competing solution and is expected to progress into SARA Lite and ultimately SARA Agent as the client expands its use of auto...
Genetec Inc., the pioneer in enterprise physical security software, announced the launch of Genetec Cloudrunner™ Mobile, a companion app for its vehicle-centric investigation system, Genetec Cloudrunner. Designed for law enforcement and security professionals, the app extends Cloudrunner’s investigative capabilities to the field, giving users faster access to critical vehicle data and alerts wherever they are. Enhanced data analysis Cloudrunner uses automatic license pla...
Suprema, a pioneer of AI-powered security solutions, announced that BioEntry W3 has been named the top product in the SecurityInfoWatch.com Readers’ Choice Product Awards for the Access Control Hardware category, while BioStar Air has been selected as the top product in the Access Control Software category. Suprema’s dual win in these categories demonstrates the company’s ability to deliver industry-leading innovation and reliability across both edge AI devices and advanced s...
Detego Global, the company behind the award-winning Unified Digital Forensics Platform, is proud to announce the launch of Detego Case Manager for DFIR, a powerful, purpose-built platform designed to meet the evolving demands of digital forensics and incident response (DFIR) teams worldwide. Developed in close collaboration with investigative professionals, Detego Case Manager for DFIR addresses the real-world challenges of managing high-volume, complex digital investigations across multiple lo...
News
Artificial Intelligence Technology Solutions, Inc., a global pioneer in AI-driven security and productivity solutions, along with its wholly owned subsidiary, Robotic Assistance Devices, Inc. (RAD), reported a series of new orders since its last sales update, reflecting continued momentum across its device and software portfolio. Recent orders include of SARA (Speaking Autonomous Responsive Agent), the Company’s multiple award-winning agentic AI platform, ROSA, RIO Mini, AVA, TOM and RADCam Enterprise solutions with both new and long-standing clients in logistics, manufacturing, security services and commercial property operations. Since the last sales update, the Company has booked new orders that include twenty-four RADCam Enterprise systems, three RIO Mini systems, three TOM units, two AVA units, six SARA licenses, and one ROSA unit. Strongest order intake quarter These orders strengthen what is shaping up to be the Company’s strongest order intake quarter of the fiscal year. “There is no doubt that the mediocre level of B-to-B activity throughout most of this year has accelerated to a much higher pace over the past few months with no signs of it leveling off,” said Steve Reinharz, CEO/CTO and founder of AITX and RAD. “Our team is focused on making up time for the soft first half as it relates to new sales and pulling in as much recurring monthly revenue as possible so that this fiscal year finishes strong and sets up next year for even greater heights. This is the kind of consistency we expect to build on as we move toward our longer-term goals.” Reinharz added, “As the holidays approach we remind you that RADCam makes a great gift and we suggest you stay tuned for an interesting and unique feature addition to be announced soon.”
Artificial Intelligence Technology Solutions, Inc., a pioneer in AI-driven security and productivity solutions, along with its wholly owned subsidiaries, Robotic Assistance Devices, Inc. (RAD), and Robotic Assistance Devices Group (RAD-G), announced that CEO/CTO and founder Steve Reinharz will present at ISC East in New York City Wednesday afternoon on the rise of agentic AI in real time security. His session will feature SARA™ (Speaking Autonomous Responsive Agent), the Company’s multiple award-winning agentic AI platform, as the real-time intelligence driving autonomous detection and response across RAD and RAD-G deployments as the Company strengthens its leadership position and sees accelerating demand for SARA-powered solutions across the security industry. Real-time autonomous security Titled Agentic AI: The Rise of Real Time Security, Reinharz’s presentation demonstrates the power of agentic while addressing traditional remote monitoring challenges. Attendees will see how agentic AI platforms perform human-like work more efficiently, allowing better performance and opening up new markets. The Company noted that Reinharz takes the stage at ISC East during an exceptional period of traction across RAD and RAD-G. RAD-G is riding strong momentum following its multi-million dollar SARA contract that is expected to reach approximately $2.5 million, a clear signal of the demand for real-time autonomous security at scale. Agentic AI white paper Reinharz’ SARA demonstrations continue to be a sought after component of major industry gatherings, including ISC West, GSX 2025, the TMA Annual Meeting and TMA OPSTech, where attendance and engagement remain consistently high. The Company also referenced its soon to be released Agentic AI white paper developed with Amazon Web Services (AWS), with additional AWS support to be announced soon. These milestones reflect the widening distance between the Company and others in the sector, as SARA drives the shift toward agentic AI throughout the security industry. Future of security and safety “We are entering a new era of security where real time intelligence will define every successful operation,” Reinharz said. “SARA shows what is possible when systems can perceive, decide and act the moment something happens. This is the future of security and safety, and it is arriving faster than most expect. Our role is to lead that shift and deliver the intelligence that modern environments demand.” Integrated security programs The Company noted that the concepts Reinharz will cover reflect real deployments already transforming monitoring centers, GSOCs and integrated security programs. SARA is filtering out false alarms, accelerating response, and delivering consistent performance without added staffing. These capabilities are driving adoption across logistics, healthcare, retail, campuses and critical infrastructure, where organizations are turning to agentic AI to expand coverage, control costs and strengthen incident outcomes. RAD and RAD-G continue to see growing demand for SARA-powered solutions as customers shift from passive observation to active, autonomous security operations. Direction for real-time security “It is an honor to speak at ISC East and at the many conferences, trade shows and industry forums that invite us to share our perspective,” Reinharz said. “Being asked to present without an exhibit presence says a great deal about how the market views our work. It reflects a growing recognition that the innovations we are delivering with SARA are setting the direction for real-time security.”
ELATEC, a pioneering manufacturer of access technologies, specializing in RFID readers and credentials, has released its latest software development toolkit, TWN4 DevPack 5.07. The new version delivers faster performance, stronger security and greater flexibility for configuring and managing RFID readers, enabling flexible and future-proof access solutions. Future-ready authentication solutions “With every DevPack release, our goal is to make life easier for developers, system integrators and end users,” said Tobias Rasche, Global Head of Product Management of ELATEC GmbH. “Version 5.07 takes another big step forward by combining deeper diagnostics, broader mobile credential support and open-standard interoperability, all in one powerful package. With this evolution, our DevPack is now more than a development toolkit—it’s a comprehensive framework for building secure, flexible, and future-ready authentication solutions.” Future-proof mobile and security capabilities DevPack 5.07 expands ELATEC’s support for modern mobile ecosystems, giving developers more ways to deliver seamless, secure, and flexible authentication experiences. Built-in integration for Orange PackID, Transact and AccessGrid eliminates extra setup steps, simplifying deployment of mobile ID solutions for campuses, workplaces and customer loyalty programs. New Bluetooth® capabilities enable developers to create fully customized mobile ID experiences and integrate ELATEC readers effortlessly into existing apps and ecosystems. The release also introduces support for PKOC (Public Key Open Credential): an open, vendor-neutral standard that aligns perfectly with ELATEC’s agnostic reader philosophy. PKOC gives customers maximum freedom of choice and stronger protection through asymmetric cryptography, creating a more resilient foundation for future-ready access systems. Additional enhancements Additional enhancements include a new API for MIFARE DESFire EV2/EV3 cards, giving developers greater flexibility in advanced security and feature integration. The PIN-after-card option enables two-factor authentication (2FA) with a well-defined authentication process in physical access (PAC) environments. It is designed for use with wall readers featuring keypads, such as the Secustos. Together, these updates simplify mobile credential deployment while raising the bar for security and interoperability across diverse applications. Smarter tools for development and configuration DevPack 5.07 gives developers and integrators faster insight into reader performance, greater control over configuration and dramatically shorter update cycles. The result: quicker rollouts, easier troubleshooting and lower maintenance costs across even the most complex deployments. Key advancements include: Enhanced Tracer diagnostics: Deeper transponder analysis and broader technology support—including HID DESFire EV3 and SEOS—enable faster, more accurate troubleshooting and performance validation. Compact OSDP configuration updates: The new configuration update cuts time for updates over OSDP by a factor of 10 or greater, minimizes bandwidth requirements and reduces downtime. Wiegand configuration via AppBlaster: Expanded options for Secustos and TWN4 Palon readers simplify migration from legacy Wiegand to secure OSDP systems. These improvements make DevPack 5.07 a more powerful, efficient toolkit for building and managing RFID systems from setup through long-term maintenance. ELATEC’s continued investment “The new DevPack gives our partners the freedom to innovate within a secure, open and future-ready framework,” said Gerhard Burits, CEO of ELATEC GmbH. “It’s a perfect example of our philosophy: simplify what’s complex, protect what matters and prepare for what’s next.” The TWN4 DevPack 5.07 release represents ELATEC’s continued investment in flexibility, interoperability and developer empowerment, making it easier than ever to design and maintain secure, scalable RFID and mobile access solutions across industries.
Gallagher Security continues to deliver on its promise of future-ready innovation with the release of Command Center v9.40, introducing powerful new capabilities for the Controller 7000 product range. This release marks a significant leap forward for Gallagher’s award-winning site management platform, with enhanced scalability, performance, and proactive system management, reinforcing Gallagher’s commitment to supporting complex, high-density access control environments. Gallagher’s Controller 7000 product range Mark Junge, Gallagher Security Chief Executive, says with Command Center v9.40, Gallagher’s Controller 7000 product range, including the Standard, Enhanced, and High Security variants, now supports the optional licensing expansion of up to 24 doors per controller, more than doubling the previous limit of 10. “This enhancement means larger installations can be managed with significant reductions in infrastructure costs and simplified system architecture,” says Mark. Channel Partner and End User’s Mark Junge added: “Importantly, even at full 24-door capacity, the Controller 7000 range maintains high performance and access responsiveness, even in the most demanding environments." He continues, “When we launched the C7000, we said it was the platform for the future. With v9.40, we’re delivering on that promise. This release is a direct response to our Channel Partner and End User’s need for greater flexibility and scalability – and it’s just the beginning." “As part of Command Center v9.40, we have boosted the number of HBUS readers supported, from 20 to 40, and increased OSDP readers from 16 to 32. V9.40 also increases the number of supported inter-controller communications from 60 to 100, allowing for larger and more complex controller networks without compromising performance or manageability,” says Mark Junge. Proactive maintenance strategies Command Center v9.40 also introduces Lock Cycle Counting, a new feature designed to support proactive maintenance strategies. Gallagher Security Senior Product Manager, Jim Rayner, says, “We know that when locks fail, they do it at the most inconvenient time - at the end of the day or after hours. This results in costly callouts and expensive repairs. Proactively managing the life of a lock prevents these occurrences from happening, and ensures upgrades are proactive.” Cloud-first identity strategy Also available with v9.40 is Entra ID single sign-on. The Command Center integration with Microsoft Entra ID for single sign-on, enables secure and seamless authentication using OpenID Connect. Mark Junge says, “This integration allows customers to align with their organization’s cloud-first identity strategy, reduce reliance on legacy AD infrastructure, and benefit from centralized access control, multi-factor authentication, and conditional access policies - all managed through Microsoft Entra. It simplifies user management, enhances security, and supports smoother migration to modern identity platforms.” Command Center v9.40 is available from 18 November 2025.
Omnisys introduces the BRO (Battle Resource Optimization) C-UAS system, a field-proven, real-time optimization platform built to help airport organizations mitigate the growing threat of unauthorized and hostile unmanned aerial systems (UAS). The system enables data-driven, proportionate responses to aerial threats, ensuring passenger safety while maintaining airport operations. In recent months, airports across Europe and the US have faced repeated shutdowns due to unauthorized drones. Munich Airport was halted twice within 24 hours; similar incidents in Copenhagen and Oslo led to partial closures, and the FAA now reports over 100 drone-related alerts per month. Each incident triggers significant financial losses, cascading delays, and reputational harm, forcing airport security teams to make rapid, high-stakes decisions under growing regulatory scrutiny. Smart deployment and confidence in decision-making To stay ahead of such challenges, airports require more than additional sensors. The real need lies in smart deployment and confidence in decision-making, knowing where detection blind spots exist, which assets to prioritize, and when it is safe to resume operations. This aligns with FAA and EASA guidance emphasizing proportionate, site-specific UAS response plans and real-time operational assessment. The BRO platform addresses these needs by optimizing how counter-UAS assets are acquired, deployed, and maintained. Using physics-aware modeling and live environmental data, it guides decision-makers in configuring systems for maximum protection while reducing unnecessary shutdowns. Its dynamic vulnerability mapping continuously adapts to terrain, infrastructure, spectrum conditions, and interference, ensuring readiness and resilience even as conditions change. Seamless integration BRO integrates seamlessly with existing airport command-and-control systems or operates independently as a real-time recommendation layer. High-fidelity simulations, analytics, and AI-driven recommendations allow operational teams to visualize real-time defensive coverage, identify degraded performance, and apply corrective actions instantly. This optimization-driven approach minimizes disruption, supports regulatory compliance, and accelerates a defensible return to normal operations. “The BRO system gives security decision-makers the ability to make informed choices about which systems to acquire, where to deploy them, and how to operate them—ensuring effective protection while minimizing disruption, which can sometimes result in millions in losses and long-term harm to an airport’s stability,” said Alfred (Fredi) Tzimet, Deputy CEO of Omnisys. “Its optimization-driven approach empowers authorities to maintain airport functionality and safety even under evolving aerial threats.”
Digital workplace solutions and managed services pioneer Espria returns in December with another Optimise IT exhibition, pioneering the discussion on how IT solutions can best work together to provide the ultimate support for businesses and end-user experience. Post-COVID, Espria hosted a series of Optimise IT webinar discussions, covering themes such as business peace of mind, business readiness and AI integrations for workplace teams. These discussions have featured key spokespeople from some of their pioneering IT solutions partners and provided industry pioneers with a platform to network directly with key decision-makers who are looking for increasingly efficient ways to deliver their IT strategy. Event feature representatives This year’s in-person event will feature representatives from premier vendor partners Gamma, Microsoft (hardware and software), Sophos and Omada by TP-Link, with more vendors to be confirmed. Marketing and Business Strategist, Bryony Thomas, will be giving a keynote speech during the lunch, sharing lessons in preparation, prioritization and attention to detail and how missing these can be catastrophic. The event will be held from 9 am to 2 pm on 3rd December at the Down Hall Hotel, Matching Lane, Hatfield Heath, Bishop’s Stortford. Attendance is free but subject to prior registration on the Espria website. Cybersecurity alliance partnerships Stephen Cook, Sales Director at Espria, commented, “Turning to 2026, cybersecurity has entered a transformative phase, with the cyberthreat landscape accelerating in complexity and scale. Businesses that adopt intelligent monitoring and integrated, adaptive defense strategies will be best positioned to navigate 2026 with confidence.” “Similarly, customer trust is entirely defined by uncompromising data security in today’s environment. Where AI has been rapidly adopted into operations, it has simultaneously amplified the quantity and quality of cyberattacks, creating this paradox for security." "Espria has always prioritized our cybersecurity alliance partnerships as a critical solution for today’s security landscape, especially with the proliferation of AI-boosted attacks, which is why bringing experts such as Micrsoft and Sophos to the table is a key part of building a lasting strategy for SMEs from our previous Optimise events.” Commitment to cyber hygiene and defense practices Cook added: “Peace of mind with data security has always been a part of this and requires a continuous commitment to cyber hygiene and defense practices from experts and clients alike. It’s not just about the most high-technology solutions, but the ones that work best within businesses and align with existing operations seamlessly." "Our mission is to lead the conversation for enterprises of all sizes to navigate their modern technology needs, and that ensures any technology introduced, particularly AI tools, provides a strategic boost without hindering operations or opening up wider attack surfaces." Comprehensive security strategies Cook concludes, “Educating our customer businesses who may be neglecting their endpoint security is an essential way to show security support. We’ve seen that customers, particularly smaller businesses with limited cyber skills or expert access, need that guidance when it comes to network security." "Thankfully, we can provide those skills and in this instance the forum for expert minds to collaborate, providing those all-comprehensive security strategies needed to tackle the cyber threats of today and tomorrow.”


Expert commentary
In the ever-evolving struggle between cyber offense and defense, attackers have almost always moved first. In the emerging domain of artificial intelligence, this pattern appears to be repeating itself. Yet, global cybersecurity pioneers appear disconcertingly disengaged. Just over half even agree that AI-driven attacks are set to become dramatically more complex and widespread. Equally concerning is the widespread apathy regarding AI’s role in expanding an already sprawling corporate attack surface. This is no small oversight. A recent global Trend Micro study showed that 73 percent of organizations have already suffered cybersecurity incidents due to unknown or unmanaged assets. In an era where digital blind spots are both common and consequential, hesitation is a risk few can afford. Security has to shift from reactive protection to proactive risk exposure management. The opportunity and the risk of AI Threat actors are now using jailbroken versions of legitimate generative AI tools such as ChatGPT The potential for AI to transform enterprise operations is enormous, but so is the risk. The warnings have been loud and clear. As early as the first quarter of 2024, the UK’s National Cyber Security Center (NCSC) stated that AI would “almost certainly increase the volume and heighten the impact of cyber-attacks over the next two years.” Their prediction is proving accurate. Threat actors are now using jailbroken versions of legitimate generative AI tools such as ChatGPT, freely traded as services on the dark web, as well as malicious models like FraudGPT, built on open-source large language models (LLMs). These tools are no longer just about automating tasks; they are turbocharging the entire attack lifecycle. From more convincing phishing emails and precise target selection, to sophisticated malware creation and lateral movement within breached systems, AI is driving a step-change in threat actor capability. Integrating open-source models However, this is only one side of the coin. The other, often overlooked, is AI’s impact on the corporate attack surface. Even well-meaning employees can unintentionally expand organizational risk. The widespread use of AI-as-a-service tools like ChatGPT introduces significant shadow IT concerns, especially when sensitive business information is input without proper oversight. Data processing and storage practices for many of these services remain opaque, raising additional compliance concerns under regulations like the UK GDPR and the EU’s AI Act. For those organizations that choose to build or customize their own LLMs, the risks multiply. Integrating open-source models may expose businesses to vulnerabilities, misconfigurations and flawed dependencies. Each new tool and environment adds to the complexity of an attack surface already strained by remote work setups, sprawling cloud deployments, IoT ecosystems, and accelerating digital transformation programmes. Managing the expanding risk landscape Many have already shared security incidents where a lack of asset visibility was the root cause Many security pioneers do understand what is at stake. Nine in ten agree that effective attack surface management is tied directly to business risk. They cite a long list of potential consequences, disruptions to operations, reputational damage, declining competitiveness, strained supplier relationships, financial losses and reduced staff productivity. Many have already experienced security incidents where a lack of asset visibility was the root cause. Despite this recognition, however, the response remains largely inadequate. Fewer than half of global organizations use dedicated tools to monitor their attack surface proactively. On average, only a quarter of cybersecurity budgets are allocated to managing cyber risk exposure. Third-party risk management is similarly neglected: fewer than half of firms actively monitor their vendors for vulnerabilities. This inertia creates an obvious contradiction. Security pioneers understand the business implications of unmanaged risk, but they are not equipping themselves with the tools or processes to respond. That needs to change—and fast. How AI can help defenders take the lead There is good news: AI is not only a weapon for cybercriminals. It can also be a powerful ally for defenders, particularly in the field of Cyber Risk Exposure Management (CREM). The best tools in this category use AI to continuously scan an organization’s entire digital footprint. They can automatically detect vulnerabilities, spot misconfigurations, identify rogue or shadow assets, and provide prioritized remediation recommendations. CREM platforms apply contextual filtering to reduce false positives and elevate the most urgent threats Intelligent algorithms can also analyze network behavior to identify anomalies that could signal a breach in progress. Unlike traditional tools, which often drown analysts in noise, CREM platforms apply contextual filtering to reduce false positives and elevate the most urgent threats. For overburdened security teams, this enables a far more focused and effective response. However, the keyword here is “continuous.” The nature of today’s IT environments, especially in the cloud, is dynamic and fast-moving. Assets appear and disappear within minutes. Static, point-in-time assessments are no longer sufficient. Yet more than half of organizations still lack continuous scanning processes. This leaves them exposed to risks that might persist undetected for weeks or months. Overcoming barriers to adoption So what is holding organizations back? In many cases, it’s not the technology itself but the internal politics of investment. Security pioneers interested in CREM tools often prioritize real-time alerting, clear dashboards, and seamless integration with their existing environments. All of this is now achievable. The challenge lies in securing board-level support. Many security teams still work in silos, disconnected from the broader business Boards are often cautious when it comes to cybersecurity investment, particularly when immediate ROI is not clear. To gain their trust, security pioneers must learn to speak the language of business risk, not technical threat. They must frame cyber exposure in terms of reputational impact, regulatory liability, operational continuity, and investor confidence. There is also a cultural component. Many security teams still work in silos, disconnected from the broader business. This limits their influence and makes it harder to embed security as a strategic enabler. In the AI era, this divide must be bridged. Cybersecurity must become a board-level concern, and risk exposure must be treated as a fundamental operational issue. Time to act We are at a critical inflection point. The AI revolution is not on the horizon, it is already here. Threat actors are moving rapidly to exploit it, leveraging tools and techniques that were unthinkable just a few years ago. Meanwhile, organizations remain slow to respond. Too few are investing in the tools, processes, and people needed to manage their risk exposure effectively. AI can be used not only to attack but to defend. CREM tools powered by AI offer a powerful way to regain visibility, restore control, and build lasting resilience. They enable proactive rather than reactive security. And they help organizations align their cybersecurity strategy with their broader business objectives. Security teams have to elevate the conversation. They must advocate not just for new tools, but for a new mindset, one that treats cyber risk as an enterprise risk, and one that prioritizes continuous visibility as a prerequisite for resilience.
In the past, security and IT teams operated independently, but today collaboration is critical. Modern security systems rely on various devices and systems that are linked to internal and external networks. Without IT involvement, physical security can become a weak point for cybersecurity. Although these groups have made headway in partnering up to ensure the successful implementation of new solutions, often there’s still a disconnect. Differing skills, priorities, and unique ways of thinking have contributed to siloed ways of working. Unified security technologies Thankfully, solutions do exist to help improve coordination between teams and departments Other factors can also make collaboration more difficult. Budget limitations and staff turnover may result in a lack of specialized security training among operators, who don’t know which stakeholders to engage or when. Staff may be willing to collaborate, but do they know who should be alerted when there’s an event? If everyone is alerted to everything, those who don’t need that information will eventually start to tune out. Thankfully, solutions do exist to help improve coordination between teams and departments. Unified security technologies can enhance collaboration, streamline communication, and improve response times. This enables cross-functional teams to respond faster, make better decisions, and work together to enhance overall security. IT and physical security teams Physical security teams are experts at identifying and mitigating physical threats to the organization. IT teams know the ins and outs of keeping systems and networks secure. Both roles and skill sets are critical to securing the enterprise, but siloed operations create barriers to effective collaboration. Because IT and physical security teams have different mandates, meeting the needs of both can be tricky. In some organizations, different departments or specialties also have their own reporting structure and may have different ways of working. Silos may even exist within departments. Overcoming challenges to collaboration Addressing these challenges is the first step toward improving collaboration For example, floor security, dispatchers, investigators, and loss prevention specialists may be used to operating independently in their day-to-day routines. They may not always share data or involve each other in decision-making. Pioneers of these departments are used to being in charge of their domains and may resist initiatives that appear to threaten this independence. Addressing these challenges is the first step toward improving collaboration. Organizations need effective tools to filter out the noise and ensure that the right people get the information that’s relevant to them every time. There are tools available to help teams collaborate effectively, stay accountable for completing tasks, and keep track of what’s been done while maintaining departmental goals and objectives. The right technology can help break down silos The first step to improve collaboration is to break down silos between your security systems. Choosing a unified security platform creates a solid foundation for cross-functional collaboration. It ensures that your physical security and IT teams are reading from the same database. Everyone can see potential risks across both digital systems and physical sites. Unified security solutions centralize monitoring, alarm management, and reporting in a single interface. This helps security teams manage incidents, run investigations, and oversee all security policies. Risks of real-time cybersecurity Data from security systems can be useful to analyze and improve operations and customer experience Within the same platform, IT experts can have a comprehensive view of real-time cybersecurity risks. They can also implement a single data protection and privacy strategy across all locations. Built-in cybersecurity tools help to standardize encryptions, multi-factor authentications, user privileges, and more across the enterprise. In many organizations, colleagues from other departments also find great value in having access to this information. Data from security systems can be useful to analyze and improve operations, customer experience, facilities management, and more. There are many ways to collaborate using a unified security system. Depending on your goals and operating procedures, you have different ways to go about it. The starting point is always to simply get everyone on the same page. Leveraging technology for more effective collaboration A unified security software platform can not only manage your video surveillance, access control, automatic license plate recognition (ALPR), and other physical security systems, but also data from many other kinds of IoT devices and databases. The volume of data is immense, but thankfully these systems can offer ways to filter out the noise and keep operators focused on the most relevant data for their work. Being able to quickly gather, analyze, and share data with other team members can make or break an emergency response. In one case, an attack at a convention center was thwarted after a team member monitoring social media mentions of an event noticed threats published online. When security operators were alerted, they were able to use video analytics to identify the suspect at the event. Using a unified security platform, the operators were able to send the camera view to other team members near the suspect. In the end, they were able to stop the attack through multi-departmental collaboration. Right security platform The right security platform can also help you drive more effective and proactive operational decision-making The right security platform can also help you drive more effective and proactive operational decision-making. When bringing datasets from disparate systems together, it's easier to discover relationships and make changes to business operations. For example, in a retail environment, combining access control, heat maps, and point of sale (POS) data can provide insights into customer activity. This kind of data may be used for things like loss prevention, but it can also be helpful to improve customer experience by improving traffic flow or directing staff toward the busiest areas of the store. The importance of automation One of the most important ways a unified security platform can optimize operations and encourage collaboration is to leverage automation to prioritize and triage alerts. This reduces false alarms and streamlines emergency responses. The reality today is that security operators aren’t always specialists. In K-12 school campuses, for example, the person monitoring the system is often an administrator or teacher. A non-specialist operator may be comfortable using the system in their day-to-day routine, but what about when the unexpected happens? If they don’t know what to do in an emergency, precious time may be wasted while they look up written instructions or call a colleague to help. Instead of keeping your SOPs in a paper binder, you can digitize them so that your security platform guides operators. They immediately have the steps to follow in an emergency. The system can even automatically alert internal or external stakeholders if certain conditions are met. Pros of automation Automation may also reduce false alarms. Nuisance alerts are a real problem for many organizations because they pull resources away from important tasks. When there are many false alarms, operators can also become desensitized to them, which slows response in a real emergency. Nuisance alerts are a real issue for many corps because they pull help away from vital tasks There are several ways that a unified security platform reduces false alarms. When data from multiple systems is brought into the same platform, a door-forced-open event can be cross-referenced with footage from nearby cameras or motion sensors. The system is programmed to do this automatically and issue a priority alert if there’s both a door forced open and motion detected in a restricted zone. Or, when a door open alert happens, the system can direct operators to first check nearby cameras and then decide whether or not to send a security guard to investigate. Every organization is unique and automations will reflect that. Stadiums or public transit may want to automate notifications to stakeholders’ phones, change the message on a digital marquee, or broadcast a public announcement when there’s something to communicate. In a school context, perhaps there is a panic button under the front desk, which triggers a threat alert. When the button is pressed, all classroom doors are locked from the outside. Teachers can get a text message notification warning them about the threat, and local police are alerted instantly. Practical steps for building a collaborative security environment As exciting as it can be to explore the possibilities of new technologies, it’s important to have realistic expectations. Start with small steps and simplify as much as possible. Operators require time and training to adapt to new systems, and teams that have been working independently may need time to develop rapport and trust with each other. When adopting new technologies, a phased approach is often best to avoid overwhelming staff. If staff are resistant to change, focus on understanding their perspective: what are they trying to accomplish? What motivates them? What are they afraid of? Once you understand what’s driving their objections, you can come up with solutions to work through concerns. In today's rapidly evolving security landscape, fostering collaboration between physical security and IT teams is no longer a luxury—it's a necessity. By breaking down silos, leveraging integrated security technologies, and embracing data-driven decision-making, organizations can significantly enhance their operational efficiency and response capabilities.
In today’s world, almost any electronic security system holds the potential to become a gateway for cybercriminals. With physical security and cybersecurity increasingly entwined, security professionals aren’t doing their job unless they take all possible precautions to lock down unauthorized access to camera systems, access control platforms, intercoms, and other network-based security devices and solutions. Let’s explore the many steps companies should take throughout their security technologies’ lifecycle – from choosing a vendor all the way through device decommissioning – to avoid making the common mistakes that leave systems, and the networks they reside on, vulnerable to attack and sabotage. Prepurchase Phase: Laying the Groundwork for Cybersecurity 1. Conduct a Vendor Risk Assessment IT departments often rely on the same Vendor Risk Assessment criteria they use for evaluating IT equipment manufacturers when considering the suitability of physical security vendors. While commonalities exist between how to assess these disparate solutions, there are also differences that require distinct scrutiny. For example, device endpoints within physical security systems run on custom Linux Kernels and therefore do not utilize standard Linux distributions like Red Hat, Ubuntu, or Debian. IT divisions often rely on the same Vendor Risk Assessment criteria they use for evaluating IT kit A comprehensive evaluation should examine how each security solutions manufacturer handles its software development life cycles. Ideally, vendors should adhere to a recognized framework when developing both their platform management and device-specific software. In 2021, Executive Order 14028 made it a bit easier for companies to evaluate vendors by providing guidelines for evaluating software security, the practices of the software developer, and methods to demonstrate conformance with secure practices, specifically referencing the NIST SP 800-218 Secure Software Development Framework. In short, a good vendor should have documentation that explains everything it’s doing to address cybersecurity from development, through releases and ongoing maintenance. 2. Obtain Software Update Schedules The frequency with which manufacturers update their software varies. Each company is different. If you’re their customer, it shouldn't matter whether the vendor schedules updates every six months, three months, or more often than that. What does matter is that you know what to expect and have a plan for how to deal with that reality. For example, if updates only occur every six months, under what conditions are patches released to address vulnerabilities that emerge between updates? Customers must understand how often they'll be updating the software on their devices and ensure they have the resources to make it happen. Make sure stakeholders agree, upfront, who will be performing the software updates. Will it be the integrator who installed the system, the physical security system staff, the IT team, or the end user? Keeping an entire system current is a huge challenge, but a non-negotiable responsibility. Manufacturers who don't issue frequent releases and patches put the onus on customers to handle mitigation efforts on their own. In these instances, IT departments must be prepared to employ network segmentation, firewalls, security whitelists/blacklists, and other methods to protect their systems until a patch is released. If a company's security team has typically updated firmware only when something breaks, these additional responsibilities most likely require greater collaboration with IT departments and a shift in how security systems are managed. 3. Know the Warranty Terms and Duration of Software Support Organizations should understand the warranty policies for the devices they purchase Organizations should understand the warranty policies for the devices they purchase. Even more important is knowing when a device's software support will expire. Software support should extend well beyond hardware coverage. For example, if a camera has a five-year hardware warranty, customers should reasonably expect an additional five years of software support. When that period ends, companies must plan on replacing the device – even if it still works well. Without software updates, the device lacks vulnerability support and becomes too risky to remain on the network. Manufacturers should be transparent about their warranty and software support policies, helping organizations plan for device replacements that align with cybersecurity needs. 4. Request a Software Bill of Materials (SBOM) During the pre-discovery process, customers should request a Software Bill of Materials (SBOM) that provides a detailed inventory of the software running on each device, including open-source components. By revealing what software is "under the hood," the SBOM allows IT departments to be vigilant in protecting the company's systems from exposed vulnerabilities. For example, a customer should understand how Transport Layer Security (TLS) is being handled to secure a security solution's web server if it’s an open-source component like OpenSSL. 5. Assess Vulnerability Disclosure Practices CNA manufacturers represent the gold standard in cybersecurity practices Understanding how a manufacturer handles vulnerabilities is essential. Ideally, they should be a Certified Naming Authority (CAN) and report common vulnerabilities and exposures (CVEs) to national vulnerability databases such as NIST and MITRE. Doing so automatically includes any disclosed vulnerabilities associated with their devices in vulnerability scanners' databases. CNA manufacturers represent the gold standard in cybersecurity practices, but most security manufacturers do not reach this level. At a minimum, the vendors you choose to work with should have an email notification system in place to alert customers to new vulnerabilities. Remember – email notifications are only as reliable as the employees managing them, so investigate whether the manufacturer has a strong track record of keeping up with such communications. Ask to speak with customer references who have been using the solution for an extended period to ensure the vendor is diligent in its communications. Configuration Phase: Ensuring a Secure Setup 1. Use Hardening Guides Once a device is purchased, configuring it securely is the next critical step. Manufacturers should publish hardening guides that detail the security controls available for their products and recommended practices for implementation. Between the features offered by the vendor and your company's own cybersecurity policies, make sure all possible encryption options are activated. Using HTTPS is vital for ensuring secure communication with devices. Many physical security devices default to HTTP to accommodate customer-specific network topologies and certificate management. Failing to implement HTTPS can leave sensitive metadata unencrypted and vulnerable to interception. 2. Consider Advanced Encryption Protocols Protocols are necessary to protect video data in transit from cameras to the VMS Some solutions offer built-in encryption protocols, like MACsec, which makes it impossible for data to be compromised as it is transmitted over the network. HTTPS is still necessary to secure the connection to the devices’ webservice, but while customers set up and configure their devices, MACsec will keep network data safe. Additionally, if you want to encrypt video streams, consider protocols such as Secure Real-Time Transport Protocol (SRTP), which secures the transmission of audio and video data over the Internet, or tunneling methods like Secure Socket Tunneling Protocol (SSTP), which encapsulate data packets for safe transmission between two points, even if the network is insecure. Such protocols are necessary to protect video data in transit from cameras to the Video Management System (VMS). Encryption should also extend to the VMS hard drive where video is stored. There are different methodologies to do that, but ultimately the goal is to encrypt data in transit and in storage. 3. Implement Remote Syslog In the case of a breach, each device maintains a set of logs that are useful for forensic investigations. However, if a device gets hacked, its log may not be accessible. Best practices dictate that companies should set up a remote Syslog server that maintains a copy of all device logs within a central repository. In addition to providing redundant data for investigations, a Syslog offers IT systems an efficient way to look for anomalies. Cybersecurity teams will receive immediate notification for events like unsuccessful login attempts so they can quickly figure out what's happening. Who is trying to log in? Why on that particular device? 4. Practice Healthy Password Hygiene Ideally, organizations should move towards using Active Directory or Single Sign-On (SSO) solutions One of the most basic and yet overlooked aspects of cybersecurity is the failure to manage user accounts meticulously. Many organizations use the same username and password for all security devices because it's simply too cumbersome to manage a network of devices in which each requires a separate, unique login. It's assumed that the system's primary administrators are the only ones who know the universal password. However, the system becomes vulnerable if anyone within this select group leaves the company and the password isn't changed or deleted right away. Ideally, organizations should move towards using Active Directory or Single Sign-On (SSO) solutions. This approach ensures that employees throughout a company are each assigned a unique login credential that they use for any systems they use throughout the organization. When they leave, their passwords and access are universally terminated along with their accounts. If SSO is not an option, regular password changes and prompt account deactivation are critical. Decommissioning Phase: Securely Retiring Devices At some point, physical security devices will reach the end of their useful life. When that time comes, companies must take care in how they dispose of their devices. A good vendor will provide guidance on how to clear memory chipsets and restore factory defaults. Improper decommissioning can lead to severe risks. For example, if an improperly decommissioned device is sold on the secondary market or retrieved from a dumpster, an attacker could gain access to sensitive network configurations and use this information for malicious purposes. Conclusion Deploying physical security solutions involves more than just securing buildings and assets; it also requires robust measures to protect against cybersecurity threats. From assessing vendors and understanding update policies to configuring devices securely and managing decommissioning processes, each step presents potential pitfalls that, if overlooked, could expose organizations to significant risks. By incorporating the techniques discussed into their deployment protocols, organizations can ensure their physical security solutions provide comprehensive physical and digital protection.
Security beat
AI has the potential to enhance the usability of traditionally complex access control and physical security systems. The application of AI (artificial intelligence) within access control is still relatively new, but rapid advancements in generative AI are already transforming how security systems operate. acre security is driving the deployment of generative AI in access control through its acquisition of REKS earlier this year. REKS is a purpose-built generative AI solution designed specifically for acre’s access control platform. Unlike generic AI tools, REKS understands both system and security-specific terminology, allowing users to ask natural-language questions like, “Show me all access denied events at a specific location,” and receive instant results. AI workflows and AI agents “We're starting to see how AI workflows and AI agents, that leverage language models, can potentially be used in conjunction with access control to create new, automated processes around false alarm reduction, system configuration, report generation, data analysis, threat detection, and in-system customer support,” says Adam Groom, Director of Business Development, AI Development Team, acre security. “We expect AI-driven capabilities to evolve rapidly, but the full range of benefits will depend on continued development and real-world application,” he adds. Integrate AI-driven capabilities acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions The best way to think of REKS is as an acre access control expert you can talk to, says Groom. “As AI adoption grows in security, REKS will expand its capabilities, making access control more usable and more efficient.” Groom says acre’s ability to integrate AI-driven capabilities across the company’s product portfolio positions the company as a pioneer in next-generation physical security. “These features will add long-term value by enhancing usability and operational insights across various segments,” says Groom. “Work is already under way to incorporate REKS into acre access control, and we’ll evaluate other integration opportunities in the future.” REKS' AI capabilities According to acre, REKS simplifies daily operations, automating routine tasks, and delivering real-time, actionable intelligence. With REKS' AI capabilities, users can interact with the system to retrieve more detailed insights and actionable information from their acre access control system. “This eliminates the need for complex reports, navigating drop-down menus, or manually reviewing logs,” says Groom. “It significantly enhances efficiency and usability for security professionals.” Enhancing productivity and customer satisfaction Key concern is ensuring that system configuration, enactment, and servicing remain within their scope For integrators, the key concern is ensuring that system configuration, implementation, and servicing remain within their scope of expertise. With REKS, that doesn’t change — but the process becomes significantly faster and more efficient. Instead of manually configuring every panel, input, and output — a traditionally time-consuming task — REKS enables integrators to use natural language commands to streamline setup and adjustments, says Groom. This eliminates tedious steps and dramatically improves operational efficiency, allowing integrators to deploy and fine-tune systems with greater speed and accuracy, ultimately enhancing both productivity and customer satisfaction, he adds. Cloud-enabled ecosystems “We are committed to helping organizations modernize their security infrastructure by transitioning from legacy systems to cloud-enabled ecosystems at their own pace — ensuring minimal disruption while maximizing value,” says Groom. “By integrating AI-driven capabilities, we enhance usability and deliver deeper operational insights across all segments.” “Security’s future isn’t about forcing change — it’s about empowering choice,” adds Groom. “Whether staying on-prem, migrating to the cloud, or adopting a hybrid model, we plan to provide a seamless, zero-disruption transition, prioritizing interoperability, automation, and security at every stage.” Generic AI tools AI must be purpose-built for security applications because security demands precision, reliability, and context-aware decision-making, which only focused AI offerings like REKS bring to the table, says Groom. In contrast, generic AI tools, like ChatGPT, are designed to perform a wide variety of tasks, like how humans can learn and do many different things. Instead, purpose-built AI is built to do just one specific function. “REKS adds specially designed artificial intelligence to our access control solutions to enhance both intelligence gathering and the user experience,” says Groom. New applications in access control The integration of generative AI into acre's access control platforms and their broader portfolio A new AI development team will lead AI initiatives at acre, driving the integration of generative AI into acre's access control platforms and their broader portfolio. This team will seek to push boundaries in applying AI to new applications in access control, intrusion detection, and beyond, empowering security professionals to interact with their systems in a smarter, more intuitive way. But don’t worry, AI will not take the human element out of security entirely. AI human capabilities “The reality is that AI will improve upon human capabilities because it is a versatile tool that supports and strengthens security operations, not a replacement for human decision-making,” comments Groom. “It helps operators process large amounts of data quickly and detect patterns that might be missed otherwise.” Rather than removing the human element, AI allows security teams to work more efficiently by automating repetitive tasks and providing actionable data, enabling professionals to focus on critical responsibilities.
Security applications for drones have evolved to provide benefits such as bird's-eye views of large areas, easy access to remote locations, and rapid deployment. However, to date, most drone applications have been outdoors. Not for long. Today, indoor drones are also finding unique opportunities for enhanced surveillance, security, and operational efficiency in indoor environments such as offices, warehouses, self-storage facilities, and malls. Indoor drones can navigate complex indoor spaces, providing real-time data and monitoring without the limitations of fixed cameras. New era of autonomous robotics A significant advantage of using drones indoors, as opposed to outdoors, is their ability to operate fully autonomously, circumventing U.S. Federal Aviation Administration (FAA) regulations that restrict such autonomy in outdoor environments. A new era of autonomous robotics enables drones to work seamlessly for users without the need for specialized flight training. A single security manager can oversee multiple indoor drones simultaneously with simple map clicks or prompts. A new era of autonomous robotics enables drones to work seamlessly for users Indoor monitoring and inspection Indoor Robotics is a company seeking to revolutionize indoor monitoring and inspection through its Control Bridge platform guiding indoor drones. Since its founding in 2018, Indoor Robotics has evolved through years of market engagement and product development. After initially recognizing a demand for autonomous indoor monitoring, the company found that existing hardware fell short. “However, we understood the challenges of full autonomy and knew we would solve it using drones,” says Bar Biton, Marketing Manager of Indoor Robotics. Indoor Robotics has evolved through years of market engagement and product development Hardware challenges Seven years later, with the hardware challenges addressed, the company is shifting focus to continually increasing value for security managers, especially with generative AI (artificial intelligence). In 2018, the problem was charging methods, which has been solved with ceiling docking stations and five patents. “Today it’s about making indoor environments safer and even saving lives by identifying blocked emergency exits, missing safety gear, leaks, fire hazards, and more,” says Biton. While indoor navigation presents challenges—such as the unreliability of GPS and the need for precision — Indoor Robotics has dedicated significant resources to achieve centimeter-level accuracy and ensure the utmost safety, maintaining a record of zero safety incidents to date, says Biton. Indoor navigation presents challenges—such as the unreliability of GPS and the need for precision Advanced AI-driven navigation systems Navigation challenges for indoor drones include maneuvering through confined spaces, avoiding obstacles, and maintaining stable flight in varied lighting conditions. To address these, Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle avoidance technologies. These solutions enable drones to adapt to dynamic environments, ensuring precise and safe navigation. Additionally, the Control Bridge platform provides real-time data and monitoring, allowing drones to adjust their routes and respond to changing conditions effectively, thus enhancing their operational reliability. Highly versatile indoor drones find applications across numerous vertical markets such as retail, logistics, healthcare, and corporate settings. Key use cases encompass security surveillance, where drones monitor premises continuously; maintenance checks, especially in hard-to-reach areas; safety inspections to comply with regulations and company policies; and emergency response to provide real-time data during incidents. In warehouses, drones efficiently inspect high shelves. Healthcare facilities and data centers use them to oversee restricted zones. Additionally, corporate offices employ drones to automate after-hours security, safety, and maintenance routines. Indoor Robotics employs advanced AI-driven navigation systems, real-time 3D mapping, and robust obstacle-avoidance technologies Alerts to the remote management team One Indoor Robotics client, a global tech company, deploys drones to enhance site surveillance and operational efficiency across six offices in three countries. The drones conduct regular security patrols after-hours, monitor facility activities, and ensure compliance with safety standards. This deployment has significantly improved the overall safety and security of their offices. The drones provide real-time alerts to the remote management team, enabling prompt responses to any anomalies, such as maintenance issues or unauthorized access. “The key advantage is the unified security standard provided by our Control Bridge operating system, allowing them to oversee all their sites from one centralized platform, ensuring consistent security management across all locations,” says Biton. When indoor drones co-exist with human workers, primary challenges include ensuring safety and preventing disruptions. Drones are equipped with advanced sensors and AI-driven obstacle avoidance systems to detect and navigate effectively around people. Strict operational protocols and designated flight paths are implemented to minimize interactions. Additionally, many drone operations are scheduled for after-hours to further reduce potential disruptions. “Safety is our top priority, and we invest significant resources to ensure it,” says Biton. “We are proud to report zero safety issues to date, reflecting our commitment to maintaining a secure environment for both drones and human workers.” Deploys drones to enhance site surveillance and operational efficiency across six offices in three countries Implementation of indoor drones Indoor drones are significantly more cost-effective and affordable when compared to traditional security methods like additional cameras, sensors, manpower, and even ground robots, says Biton. They cover larger areas and provide dynamic surveillance in less time, offering real-time data collection and enhanced flexibility. Unlike cameras or ground robots, drones eliminate blind spots and adapt to environmental changes autonomously. They also offer substantial indirect savings by optimizing maintenance routines, according to Indoor Robotics. For instance, a drone can instantly identify issues in hard-to-reach areas, allowing for immediate, targeted responses, instead of requiring an inspector first and then a technician, thus streamlining maintenance processes. “The biggest obstacle to greater implementation of indoor drones is education and awareness,” says Biton. “Many people are not yet exposed to the concept of autonomous indoor drones and may find it hard to believe they really work.” To overcome this, Indoor Robotics focuses on creating awareness and educating customers about the reliability and benefits of the technology. Demonstrations, case studies, and clear communication about the capabilities and safety of drones are key. By showcasing successful implementations and providing hands-on experiences, Indoor Robotics seeks to build trust and drive wider adoption of indoor drone technology in security applications. Control Bridge operating system Drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms A common misconception is that indoor drones are intrusive and pose significant privacy risks. However, drones are designed with strict privacy controls and advanced AI to ensure they respect privacy norms. They operate primarily during off-hours and are programmed to avoid sensitive areas, focusing solely on enhancing security and operational efficiency. The solution also includes rigorous data protection measures to safeguard any collected information, ensuring compliance with privacy regulations and addressing concerns effectively. Soon, automation will become integral to tasks across all facility types, from manufacturing and logistics to retail and office spaces. Using Indoor Robotics’ Control Bridge operating system, facility managers will deploy fleets of robots to identify issues, collect data, and gain insights to enhance operations, maintenance, and safety. Facilities will benefit from 24/7 AI-driven monitoring, eliminating the need for occasional surveys. Managers will receive immediate alerts for any anomalies, with preventive maintenance tasks seamlessly integrated into building management platforms, ensuring optimal performance and safety. New standards in the industry The Indoor Robotics platform-agnostic approach provides flexibility and scalability. “As we continue to evolve, we support more and more platforms, enabling our clients to tailor their indoor monitoring solutions to their specific needs,” says Biton. “We believe that the future of security lies in intelligent, automated systems that can adapt to dynamic environments and provide real-time insights,” says Biton. Indoor Robotics seeks to be at the forefront of this transformation, setting new standards in the industry and paving the way for a safer, more efficient future.
Companies at GSX 2023 emphasized new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasizes ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the Mid-Market to the Cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for pure cloud, but there are benefits to be realized from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realize the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘Soft’ Features for Integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organization more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organization more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centers around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasizing performance, protection (cybersecurity), and price, their data centers are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring center where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Case studies
With a capacity of 66,500 spectators, the MERKUR SPIEL-ARENA is the largest multi-purpose venue in Düsseldorf and home to the city’s main football team, Fortuna. Regular and constantly changing major events, both matches and concerts, present an ever-evolving security and access challenge. Stadium managers D.LIVE sought a secure, reliable replacement for their mechanical master key system; comprehensive, flexible security which would no longer create the problems and inconvenience of mechanical keys. Digital locking system Due to frequently changing event formats and service providers, keys were often lost, causing considerable administrative work and financial expense. Due to the large number and size of the areas to be secured, it became clear that only a digital locking system would combine the required performance features in a convenient solution. Another critical requirement was for robust devices which did not protrude from doors: football and music events can sometimes be a little rough. The technology installed needed to be tough and reliable enough to withstand the odd kick. Key requirements for the new system Finally, the solution would also need to simplify the management and rental of multiple private spaces inside the building, including the Promenade, Merkur Business Club, and boxes in the east wing. These offer additional space for a total of almost 7,000 people for meetings, press conferences or product presentations. One of the key requirements for the new system was, therefore, the ability to grant and revoke access authorizations individually, especially for external event organizers and operators. Innovative key-based digital access Based on these requirements and their experience with other local venues, D.LIVE chose the eCLIQ programmable-key locking solution, part of a suite of Digital Access Solutions from ASSA ABLOY, which scores highly on security, reliability and convenience. Their new eCLIQ key-operated digital access solution has approximately 2,500 wireless cylinders; around 1,150 programmable eCLIQ Connect keys have been issued. With this solution, every authorized keyholder carries their own eCLIQ key which can be programmed with tailored access authorizations. For added security, access rights can be individually revoked at any time and lost keys can be blocked. Convenient management of contractor access “One of the reasons we chose eCLIQ Connect keys was to enable us to grant or revoke authorizations to external organizers and operators via Bluetooth in a rapid and user-friendly way,” says Lukas Angenendt, VEFK & Project Manager Electrical Engineering, D.LIVE. Powerful, intuitive software makes it easy for stadium managers to issue temporary authorizations for contractors, cleaning staff, and external event service providers, which streamlines site maintenance and management. As an additional layer of security, their eCLIQ Connect keys have to be validated on site by entering a PIN code in the smartphone app. Digital security enhancements In addition to the digital security enhancements, eCLIQ’s high degree of flexibility was another big plus: eCLIQ is convenient to handle and program as, for example, the power supply and communication with each cylinder take place via the battery-powered key. There’s no need to visit every door or device to replace its battery. No wiring is required for the very low-maintenance cylinder, which is fitted flush to the door and thus offers no attack surface for vandalism. Cable-free installation was also simpler and quicker: only two weeks, when no events were taking place in the stadium, were available for the conversion of all doors.
Absolute Security, a pioneer in enterprise cyber resilience, announced it is the only provider named as both a Leader and Outperformer in the 2025 GigaOm Radar for Patch Management Solutions. In the report, Cybersecurity Analyst Stan Wisseman recognized Absolute Security with both Superior and Exceptional ratings for its platform that delivers a unified, automated, and resilient solution used by enterprises, Managed Services Providers (MSPs), and Managed Security Services Providers (MSSPs) to address critical patch management use cases. Secure Endpoint integrated product suite In the Radar, GigaOm highlights that “Absolute Security delivers a differentiated approach to patch management with Absolute Resilience for Automation, its most advanced edition of the Secure Endpoint integrated product suite." "It combines automated remediation, patch orchestration, and endpoint visibility with firmware-embedded persistence, a patented capability that maintains a tamper-proof connection to devices even after OS corruption, reimaging, or factory reset. This persistent architecture is especially valuable in distributed, hybrid, and high-security environments, where continuous control is paramount.” Software security and risk exposures According to the Absolute Security Resilience Risk Index 2025, organizations run behind on patching an average of 56 days. Although organizations set their own patching schedules, this is well beyond the accepted 30-day standard set by organizations such as the Cybersecurity and Infrastructure Security Agency (CISA) and dangerously outside of the one-to-seven days it takes threat actors in many cases to exploit vulnerabilities, as noted in the Index. With Absolute Security, customers can quickly and easily automate patching and vulnerability remediation across their distributed endpoint fleets to quickly close software security and risk exposures that lead to productivity losses and lead to extended downtime. Advantage of vulnerable software “Threat actors know the fastest and easiest way to breach systems, steal data, and disrupt business operations is by taking advantage of vulnerable software,” said Ashley Leonard, SVP, Product Management, Absolute Security. “The best way to stop downtime is to avoid exposure in the first place—a key element of any resilience strategy. With this validation from GigaOm, customers are further assured that Absolute Security’s resilient and automated patching and remediation solution is helping them to proactively stay ahead of threats, incidents, our outages.” Absolute Security patch management solution According to the Radar, the Absolute Security patch management solution earned leadership status based on several key differentiators: Staged Patch Testing and Deployment: GigaOm recognized Absolute Security’s capabilities that offer staged patch rollouts with rollback logic and dynamic health checks to reduce risk prior to full deployment. In addition, real-time telemetry helps validate patch status and trigger fallback actions when required. Policy Automation and Customization: GigaOm highlighted Absolute Security’s patching logic that uses attributes such as device role, compliance posture, or geographic location. Policies can suppress reboots, enforce blackout windows, and handle exceptions. In addition, custom risk scoring enables IT to align patch management with their organization’s business priorities. Workflow Integrations: GigaOm emphasized Absolute Security’s granular integrations with platforms such as ServiceNow, ConnectWise, and CMDBs through a bidirectional public API to streamline patch operations. Integrations support SLA tracking, approval chains, and incident response handoffs—bridging IT and SecOps workflows to reduce mean time to remediation (MTTR).
Genetec Inc., the pioneer in enterprise physical security software, announced that the Port of Barcelona has successfully implemented Genetec™ Security Center, significantly improving the port’s safety, efficiency, and operational capabilities. As one of the Mediterranean’s major logistics hubs, the Port of Barcelona has experienced continuous growth in recent years, leading to new operational and security challenges. In response, the Port Authority launched a modernization initiative focused on transforming the port into a safer, smarter, and more sustainable environment. A unified approach to evolving security needs Port Authority selected Genetec Security Center for its open, unified platform that seamlessly integrates video surveillance While the port’s previous security system was effective, it lacked the flexibility and interoperability between devices made by different manufacturers required for current demands, hindering real-time decision-making – a critical factor when managing infrastructure of this scale. To overcome these limitations, the Port Authority selected Genetec Security Center for its open, unified platform that seamlessly integrates video surveillance, access control, intrusion detection, and other security technologies into a single interface. Port integrated advanced technologies Following a successful pilot using virtual servers, the port migrated its CCTV infrastructure – growing from 180 cameras to over 530, with plans to surpass 800 in the coming years. Alongside this expansion, the port integrated advanced technologies, including access control, intercom systems, video analytics, forensic tools, fire detection, and real-time occupancy analysis. Tangible results from day one Port operators can now manage all security systems through a single tool, streamlining workflows The deployment of Genetec Security Center has produced immediate results. Port operators can now manage all security systems through a single tool, streamlining workflows and significantly reducing response times to incidents. Additionally, maintenance and operational efficiency have improved across the board, contributing to significant cost savings. The system has proven especially valuable during high-traffic events like the America’s Cup and Nadal al Port, where it enhances crowd and vehicle management to ensure smooth and safe operations. How unified physical security can enhance not just safety? “The flexibility and scalability of Security Center have allowed us to centralize all our systems, reduce response times, and improve operations,” said Dídac Höflich, ICT Infrastructure Project Manager at the Port of Barcelona, adding “Genetec has provided us with a long-term solution that evolves with our needs, while also giving us peace of mind, knowing we are prepared for any challenge.” “Working with the Port of Barcelona demonstrates how unified physical security can enhance not just safety, but also efficiency and scalability for critical infrastructure,” said Jordi Charles Rodriguez, Account Executive at Genetec Inc., adding “We’re proud to support the Port Authority’s long-term vision and help lay the technological foundation for the port’s continued growth and innovation.”
Artisan Apartment Homes, a luxury apartment complex in Dunedin, Florida, recently transitioned from mechanical keys to electronic locks and centralized system software with support from Allegion US, a pioneering provider of security solutions, technology and services, and Florida-based Comfort Technologies, which specializes in deploying multifamily access control, IoT devices and software management solutions. Multifamily access control challenges The upscale 65-unit apartment property previously issued all residents a fob for perimeter access and a key to access the mechanical lock at their apartment door. Property manager was experiencing significant challenges with its perimeter access control system Between legacy fobs and keys, patchwork infrastructure, and a steady flow of traffic throughout the complex – the property manager was experiencing significant challenges with its perimeter access control system. “By running disparate systems, it became a complicated and time-consuming process for me to create new fobs for residents when they moved in and then deactivate them when they moved out,” says Sally Caron, Residential Property Manager at the Artisan Apartment Homes. “Plus, it was costly to replace lost fobs and mechanical keys." Seamless solutions After a careful review process with its integrator Comfort, the Artisan moved forward with an ecosystem of solutions from Allegion. In 2022, the mechanical locks on all 65 apartment unit doors were upgraded to Schlage Control® smart locks with ENGAGE™ access control to give residents keyless entry. The following year, the Artisan upgraded to the Zentra cloud-based software platform from Allegion, which manages perimeter, amenity and unit access all in one centralized system. Enrollment and move-out process “I absolutely love having everything on one platform as it has made my job easier in so many ways,” says Caron. “Anything state-of-the-art is always more convenient and easier to manage. I’m now able to give temporary access to people for grocery or online deliveries, UPS, Fed-Ex, or housekeeping. Residents now have an overall better experience not only during the enrollment and move-out process, but every day." Residents to access the building Mobile resident key in Apple Wallet was introduced as a way for residents to access the building Most recently, the mobile resident key in Apple Wallet was introduced as a way for residents to access the building and their individual apartment units by using their iPhone or Apple Watch. The Artisan is also on track to be the first multifamily property to deploy resident keys in Google Wallet in mid-2025. Adoption of mobile credentials “Our residents love the security and convenience of resident key in Apple Wallet and are adapting to the change quickly,” says Caron. “Residents have expressed that they feel safer, and that the adoption of mobile credentials has given them the freedom to go for a jog or a walk without worrying about carrying anything with them but their iPhone or Apple Watch for reentry.”
Smart Hospital Bacău, a major medical institution in Romania, has taken a huge step forward in improving patient care and operational efficiency. The hospital has introduced auxiliary care and fall detection radars, along with thermal presence detectors from Hikvision. It’s a great example of how smart devices can transform healthcare, leading to better outcomes for both patients and medical staff. Enhancing palliative care Smart Hospital Bacău offers palliative care as an essential part of its services Smart Hospital Bacău offers palliative care as an essential part of its services. Because of their fragile health conditions, palliative care patients often need round-the-clock monitoring. The hospital recognized this need and was eager to enhance its capabilities in this area. Traditional nurse call systems have limitations, as they depend on patients being conscious and able to press a button, which is not always possible for severely ill or less mobile patients. However, the hospital was aware of these constraints and was determined to find better solutions. Real-time monitoring tools Previously, the hospital relied on manual patient checks, paper records, and verbal shift-to-shift communication. While these methods have been part of the healthcare routine, they put a heavy workload on staff. Without real-time monitoring tools, the hospital's care approach was more reactive. But the hospital saw this as an opportunity for growth and was committed to safeguarding patients and staff from preventable incidents. Hikvision's comprehensive healthcare solution To address these challenges, Smart Hospital Bacău partnered with Next M, a major technology solution provider, to implement a smart healthcare solution using Hikvision products. The solution included auxiliary care radars, fall detection radars, thermal presence detectors, touchscreens and a centralized LCD display, all integrated into the hospital’s nurse call platform. In the palliative care rooms, each of the 30 beds were equipped with Auxiliary Care Radars (DS-TDSB00-EKH/POE/2m) and Bedside Touchscreens (DS-KHH9530-H(O-STD)/M). The radars can monitor heart rate and respiration without the need for patients to wear any devices. Info World Mobile module These radars also detect bed presence, sleep patterns, and abnormal movements, sending real-time alerts These radars also detect bed presence, sleep patterns, and abnormal movements, sending real-time alerts to nurses when there are issues. The touchscreens had the Info World (IW) Mobile module deployed by the healthcare software expert Info World. They ensured full software integration with hospital databases, interoperability with the hospital info and pharmacy systems. Through secure Android integration, the touchscreens serve as point-of-care digital assistants that enable medical staff to access patient records at the bedside. Fall Detection Radars In high-risk areas like bathrooms, Fall Detection Radars (DS-TDSB00-EKT/POE/4m) were deployed. They can spot sudden posture changes or long stays, enabling staff to respond quickly to emergencies while protecting patient privacy. The hospital also installed 15 Thermal Presence Detectors (HM-TD1018-1/QR). These devices combine thermal imaging and radar technology to provide non-intrusive monitoring of patient movement, including out-of-bed detection, exit alerts, and audio alarms for events like calling for help. Finally, a 55-inch LCD display (DS-2055HE-G) was placed in the nurse room. It serves as a centralized hub, providing real-time alerts and monitoring details through the HikCentral platform. Multi-layered approach The integration of these technologies into a unified system enabled faster and more informed responses This multi-layered approach ensures comprehensive coverage, with each device tailored to specific monitoring needs. The integration of these technologies into a unified system enabled faster and more informed responses to patient incidents, significantly enhancing both safety and efficiency. Improving medical workflows The Hikvision smart healthcare solution has brought great benefits to the staff and patients at Smart Hospital Bacău. The system has automated routine checks, greatly improving medical workflows. Nurses no longer need to do frequent manual rounds. Instead, they now receive real-time alerts for abnormal events and can focus on patients who really need help. This reduces human error, improves time management, and eases staff burnout. The centralized display in the nurse room gives instant access to monitoring data, making coordination easier and enabling better decision-making through trend analysis. Patient safety and well-being Hospital Manager, Ciprian Cojocaru, praised the solution, stating: “Before this system, we constantly did rounds to check on patients. Now we know exactly when and where to step in. It has greatly improved our confidence and response times.” Patient safety and well-being have also been significant improved. The system continuously and non-intrusively monitors patients. It can immediately detect emergencies like falls or breathing problems, even for patients who are unable to call for help. Faster responses reduce the risk of incidents getting worse. Privacy-friendly technology The privacy-friendly technology, which operates without video, makes patients more comfortable. Additionally, information from the devices helps create more personalized care plans. Medical teams can spot early signs of health decline and proactively adjust treatments. Beyond these immediate benefits, the implementation of the Hikvision solution has also enhanced the hospital's reputation as a modern, forward-thinking institution. Its adoption of smart healthcare sets a new standard for palliative care, earning the trust of both patients and medical professionals.
Ecuador’s border control authorities have significantly enhanced their identity verification capabilities by deploying a suite of advanced document examination devices from Regula. The nationwide upgrade, supported by the International Organization for Migration (IOM) and local partner INSETK, brings automation, precision, and speed to the country’s border checkpoints, which collectively process nearly 1.5 million travelers annually. Regula’s advanced forensic devices The project is a major step in Ecuador’s mission to modernize all land, air, and maritime entry points The project is a major step in Ecuador’s mission to modernize all land, air, and maritime entry points, including key international airports in Quito and Guayaquil, as well as northern and southern border crossings. These strategic locations now benefit from Regula’s advanced forensic devices, which enable fast and reliable detection of fraudulent documents—critical in the fight against identity-related crime. Closing the gap with a set of forensic devices Previously, document checks at Ecuador border crossings were largely manual and supported by outdated equipment, often handled by just two officers per site. This made the process slow, error-prone, and vulnerable to sophisticated fraud. To address this, Ecuador’s border checkpoints were equipped with the following Regula solutions: Regula 4308 at Quito International Airport: Ideal for high-traffic airports, this dual-video spectral comparator supports the full spectrum of light sources and optical filters. It also offers high-quality image capture capabilities thanks to its up to 320x optical zoom and up to 140,000 ppi resolution. As a result, border officers can thoroughly inspect all of the ID security features, including printing techniques, holograms, optically variable inks, and more. Regula 4306 at Guayaquil International Airport and major land borders: A space-saving device with an 8 MP high-resolution camera and over 40 LED light sources for analyzing document authenticity, just like its counterpart, the Regula 4308. Regula 4205D at frontline checkpoints: A multi-functional device tailored for primary control zones. It includes 12 light sources, automated cross-checks, and up to 30x on-screen magnification for thorough document authentication. Regula 8333M at mobile checkpoints: Designed for remote or non-standard border control situations, such as processing charter flights or cruise ship passengers, this compact mobile document reader ensures that ID checks remain reliable and consistent outside traditional migration offices. Regula’s Information Reference System Regula’s video spectral comparators are controlled via Regula Forensic Studio (RFS), a cross-platform software solution for advanced document checks. It enables precise measurements, image comparison, report generation, and scripted workflows for faster, consistent inspections. With RFS, officers can also verify MRZs, RFID chips, barcodes, and IPI—all without extra tools. For deeper document examination, border control officers have real-time access to Regula’s Information Reference System (IRS), which provides synchronized reference images and lighting presets for fast, precise comparison of travel documents. Data cross-verification and robust authenticity checks RFS also integrates with Regula Document Reader SDK to automate travel document verification RFS also integrates with Regula Document Reader SDK to automate travel document verification and prevent fraud through data cross-verification and robust authenticity checks. Importantly, Regula’s software is backed by its proprietary identity document template database—the world’s largest—featuring over 15,000 templates from 252 countries and territories, ensuring reliable validation at border checkpoints. Trusted results, faster than ever Since implementing Regula’s solutions, Ecuadorian border control authorities have noticed notable improvements: Document authentication now takes minutes instead of hours. Detection of forged documents has significantly increased. Automation reduces human error and increases operational efficiency. Officers have more time to focus on complex cases and decision-making. Technology upgrade and fraud detection “Apart from the technology upgrade and fraud detection improvement at the border crossings, our collaboration with Regula demonstrated another success." "The project was fulfilled very smoothly. From the beginning, we’ve received full support from Regula’s team—they were always ready to help with any issue, even those caused by users on the ground. It’s definitely a level of service that makes a real difference,” says Diego Calderon, Chief Executive Officer at INSETK. How technology can turn critical inspection tasks “Border security is where precision, speed, and trust must converge. We're proud to support Ecuador in modernizing its checkpoints with tools that meet forensic standards while being easy to use in the field." "This project shows how technology can turn critical inspection tasks from time-consuming to streamlined, without compromising security,” comments Arif Mamedov, CEO at Regula Forensics, Inc.


Round table discussion
The cloud fundamentally changes how organizations acquire and use technology, offering a powerful mix of financial, operational, and strategic advantages that traditional on-premises infrastructure cannot match. Specific to physical security systems, there are additional advantages transforming how technologies and systems are delivered to customers. We asked our Expert Panel Roundtable: Which factors are driving the deployment of cloud-based systems in physical security?
Future-proofing your skillset is about embracing continuous learning and developing a versatile set of competencies that remain valuable regardless of technological shifts or industry changes. In the security marketplace, it is not about predicting the exact jobs of the future, but rather equipping yourself to adapt and thrive in the uncertain security landscape. But where to begin? The emerging technology shifts in the security industry provide clues, such as the growing importance of cybersecurity and artificial intelligence (AI). We asked our Expert Panel Roundtable: How can physical security professionals “future-proof” their skillsets to prepare for emerging technologies?
Access control, video surveillance, and intrusion detection systems evolved largely independently in the physical security industry. Integrating those systems to the benefit of an enterprise's overall security has traditionally fallen on security integrators working in cooperation with manufacturers. However, today's market has also evolved to include companies that provide "unified platforms,” bringing together various disparate security systems and functions under a single, centralized management interface. We asked our Expert Panel Roundtable: What are the advantages of installing physical security systems as a unified platform?
Products


White papers
Maximizing Enterprise Security Systems In The Cloud
Download
Using Artificial Intelligence (AI) To Automate Physical Security Systems
Download
VSS - Top 4 Questions To Get You Started
Download
Access and Security In The Age of Hybrid Working
Download
5 Ways To Strengthen Physical Security With An Integrated System
Download
The Benefits of Edge AI + Cloud For Security Systems
Download
Unified Physical Security
Download
The Borderless Control Room
Download
Getting the Most Value From Software Subscription Agreements
Download
Preparing Your Organization With Quality Situational Awareness
Download
Is Access Control In The Cloud More Cost Effective?
Download
Effective Access Control For Museums And Public Spaces
Download
Is Your Access Control System as Secure as You Think?
Download
Network Security Redefined: IP-Enabled Access Control
Download
Enhanced Ethernet Technology (ePoE)
Download

Videos
Security software: Manufacturers & Suppliers
- ACT Security software
- Vicon Security software
- Honeywell Security Security software
- Bosch Security software
- DSX Security software
- Hanwha Vision Security software
- HID Security software
- Gallagher Security software
- TDSi Security software
- Nedap AEOS Security software
- CEM Security software
- Software House Security software
- PAC Security software
- Dallmeier Security software
- FLIR Systems Security software
- Panasonic Security software
- IDTECK Security software
- Geutebruck Security software
- Verint Security software
- AxxonSoft Security software
