Store security
Quanergy Solutions, Inc. invites attendees of GSX Orlando 2024 to experience the “next big thing” in physical security with their Q-Track™ 3D LiDAR (Light Detection and Ranging) solution on show, designed for advanced security and business intelligence applications. “At Quanergy, we believe that 3D LiDAR technology is a game-changer for the physical security landscape,” said Enzo Signore, CEO of Quanergy. “GSX Orlando is the perfect stage to showcase how our...
Artificial Intelligence Technology Solutions, Inc., is proud to announce the launch of RADCam™, a groundbreaking residential security product from its subsidiary Robotic Assistance Devices Residential, Inc. (RAD-R). RADCam revolutionizes the concept of residential security by introducing what the Company sees as the world’s first AI-powered, purpose-built ’Talking Security Camera’. Latest advancements in AI RADCam offers all the features of traditional residentia...
A new digital technology that helps organizations monitor and manage a broad spectrum of new and existing security systems and peripherals from a smartphone through a complementary user-friendly app has been introduced by OPTEX, the global pioneer in security sensing technology. Olarm MAX Olarm MAX – is a discrete, Graded Dual-Path (DP) digital communicator that can be quickly and easily installed alongside a new and existing alarm panel to make them smart and effectively bring 21st-...
Huffmaster Management (Huffmaster), the provider of choice for Fortune 500 companies seeking strike services, industrial and healthcare staffing, security services, and more, announced the internal promotion of Margaret Sanders to Director of Operations within the company’s Protective Services Group, a division responsible for ensuring the safety and security of Huffmaster clients. In her new position, Sanders will work closely with the company’s Manned Guar...
Genetec Inc., a pioneering technology provider of unified security, public safety, operations, and business intelligence solutions, announced the introduction of a new I/O module to its portfolio of high-assurance access control system offerings. Developed by STid, a pioneering manufacturer of highly secure access control technologies, the new I/O module enables European customers to meet the most stringent cybersecurity compliance regulations. Cybersecurity capabilities From the creden...
LT Harper, a Cybersecurity recruitment consultancy, is pleased to announce it has taken a majority shareholding of APT, a highly regarded discovery recruitment consultancy. The acquisition is a testament to LT Harper's commitment to providing world-class recruitment services across the digital landscape, covering legal technology and cyber security. The acquisition allows LT Harper to extend its global coverage specifically in Asia Pacific markets with Amit Pandit, Director of APT relocating to...
News
Casino operators have long been among the keenest users of video surveillance technology, but there is strong demand for even more advanced solutions, reports IDIS, South Korea’s largest in-country video tech manufacturer. In a new report on surveillance in the casino sector, the company explains how a generation of major resort casinos is emerging—new developments comprising luxury hotels, state-of-the-art gaming, high-end retail, wellness, and leisure facilities—have a strong appetite for advanced camera systems. Major economic benefits Consumer demand is not the only factor driving growth in the casinos sector For systems integrators with the right tech offering, this is a potentially valuable growth market, says IDIS. Consumer demand is not the only factor driving growth in the casinos sector. Governments know that successful casino resorts can bring major economic benefits to local communities, generating employment opportunities, contributing to tax revenues, and stimulating related industries, including hospitality and tourism, which support a broader ecosystem of suppliers. IDIS’s overview report According to analysts, the European casino gambling market generated revenue of USD 115.39 billion last year and is expected to register a CAGR of over 5% by 2029. The prospect of wider economic benefits may also lead to opportunities in some traditionally conservative Middle Eastern markets. IDIS’s overview report, based on its experience working with partners and systems integrators to deliver end-to-end video solutions in the sector, explores how new solutions, thanks to the growing use of AI-powered video analytics, improve security and safety and provide new insights and business intelligence. latest technological improvements Integrators can also help reduce risks when it comes to using AI-powered analytics The free report explains how video surveillance reduces losses and deters criminal activity and how casino operators are taking advantage of the latest technological improvements, including more advanced cameras, more efficient video data handling, more feature-rich operating systems, and an expanding toolkit of more powerful video analytics. In an increasingly competitive market, systems integrators can offer casino operators an advantage with affordable camera solutions that will drive efficiency and reduce losses, IDIS says. Integrators can also help reduce risks when it comes to using AI-powered analytics. Latest international standards “When it comes to AI, like any business, casinos can be averse to the potential risks inherent in new tech adoption and concerned about investing in technology dead-ends,” says Koray Ozyildirim, IDIS Türkiye Country Manager. “This hesitancy can be addressed by offering cost-effective add-on AI solutions with easy upgrade routes. There is added reassurance where technology vendors have a proven record of compliance with the latest international standards and a commitment to continual R&D in innovative video.” Ozyildirim adds that this reassurance can help casino resorts stay ahead in an increasingly competitive global market.
Gunnebo Safe Storage solutions have been specified for Private Vaults for Safe Deposits in Dubai’s premier lifestyle destination, City Walk, partnering with AXON to support the complete installation process. Private Vaults for Safe Deposits, which has two facilities across UAE, sourced Gunnebo Safe Storage for City Walk to provide safe storage solutions for its customers. The specifications included the Safe Store Auto and Electronic Safe Deposit Locker System. Next-generation solutions Next-generation solutions allow customers to deposit or retrieve precious items at any time The next-generation solutions allow customers to deposit or retrieve precious items at any time, on any day of the week, offering total flexibility and peace of mind, with no compromise to security. Mr. Riyadh Al Ithawi, Managing Director/Partner of Private Vaults for Safe Deposits, commented: "At Private Vault, we understand the importance of security and discretion when it comes to storing valuable items. The installation of Gunnebo's Maxi Safe Store Auto and Electronic Safe Deposit Locker system, facilitated by Axon, ensures we continue to offer our clients the highest level of security and peace of mind." Gunnebo Safe Storage solutions Al Ithawi added: “The automated mechanisms enable a seamless self-service operation by customers, to access their valuables with ease and confidence, anytime they need. We have already received very positive feedback and look forward to extending our safe storage services to our facilities across the UAE.” Gunnebo Safe Storage solutions have been designed to store valuable items and documents in a secure location. The automated system enables Private Vault to save on resources with self-service operations and offers 24/7 accessibility. The systems were installed at City Walk, by Gunnebo Safe Storage Channel Partners AXON. Latest automated technology Private Vaults is looking to raise the specification of Gunnebo Safe Storage deposit box systems Mr. Ijaz Anwer, General Manager at Axon, added: "The partnership between Gunnebo Safe Storage, Axon, and Private Vaults for Safe Deposits highlights the importance of collaboration in delivering innovative security solutions tailored to the needs of high-end clients." “As the demand for secure storage continues to grow in the region, we remain committed to providing the latest automated technology that meets the evolving needs of our customers, available in central locations such as City Walk, to operate with 24/7 easy access with no compromise to design.” Private Vaults is now looking to increase the specification of Gunnebo Safe Storage deposit box systems across its portfolio. Innovation and customer satisfaction Gareth Hughes, Gunnebo Safe Storage Middle East Business Development Manager concluded: “We are proud to support Private Vaults with our secure storage solutions. The successful implementation of the Safe Store Auto and Electronic Safe Deposit Locker System not only highlights the importance of advanced security measures but also underscores our commitment to innovation and customer satisfaction." “We look forward to continuing our partnership with Private Vaults for Safe Deposits and expanding the reach of our technology across their facilities in the UAE, ensuring clients can benefit from the highest level of safe storage security and convenience.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the US Department of Homeland Security Safety Act Designation, announced the availability of ZeroEyes One (ZEO), a first-of-its-kind AI-powered, human-verified gun detection solution available for deployments ranging from 1-16 IP cameras. With this new offering, ZeroEyes’ pioneering proactive security software, which currently protects thousands of buildings for hundreds of customers in 42 states, is now available for organizations such as convenience stores, gas stations, retail stores, bars, restaurants, pharmacies, parks and splash pads, religious organizations, daycares, and banks as well as private residences to deploy on their existing digital IP cameras. ZeroEyes’ hardware According to the U.S. Bureau of Labor Statistics, 524 workers were killed in gun-related incidents in 2022. While the primary concern is protecting human lives, business pioneers must also consider broader implications, including loss of customers, property and reputation damage, increased insurance costs, and staff retention issues. The financial costs of gun-related violence are substantial and challenging to quantify, with estimates ranging from $229 billion to $557 billion per year. Organizations and individuals can purchase one-, three-, or five-year ZEO subscriptions for 1-16 digital IP cameras at the website. They will then receive ZeroEyes’ hardware by mail, along with detailed installation instructions and video materials to complete the setup. ZeroEyes Operations Center ZeroEyes will verify the deployment to confirm the setup is complete and functioning correctly ZeroEyes will verify the deployment to confirm the setup is complete and functioning correctly. If ZEO identifies a gun at any time, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry’s only U.S.-based, fully in-house operation center, which is staffed 24/7/365 by specially trained military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and a chosen customer contact as quickly as three to five seconds from detection. Powerful technology “Through the ZeroEyes Research Center, we have discovered that gun violence is often unpredictable and can strike anyone, anywhere, at any time,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “Leveraging the same powerful technology that protects K-12 schools, colleges, hospitals, military bases, and large businesses around the country, ZEO now empowers smaller organizations and even people in their own homes to significantly enhance their security and keep themselves or their patrons and employees safe from gun-related violence.”
Sustainability is a hot topic. Everyone knows about it. Governments have active Net Zero strategies and implementation plans, while organizations are establishing plans and activities to reduce their environmental impact. In many instances, it is evident that failing to act can also have an effect on a company’s reputation, culture, and brand perception. In most cases, businesses are not shy about promoting their achievements through different communication channels, understanding that being a pioneer of the Net Zero approach might offer a competitive advantage as well as ‘doing the right thing’. Government’s Net Zero Strategy As a result, some travel-heavy sectors are actively transitioning to electric fleets Even though the UK has been the first major economy to reduce its emissions by half, the Climate Change Committee highlights that the country is not on track to hit the 2030 target and urgent actions are required. According to the UK Government’s Net Zero Strategy, transport emissions are among the issues that must be tackled, and the delivery pathway of reducing them includes a widespread usage of zero-emission vehicles to decarbonize travel. As a result, some travel-heavy sectors are actively transitioning to electric fleets. Royal Mail, for example, has over 5,000 electric vehicles on the road, matched by Mitie with 66% of its fleet now switched to electric. However, this transformation presents considerable challenges for many other businesses. Applying sustainable practices to Security and FM travel Both Security and FM industries heavily revolve around travel, whether it is for patrolling or delivering services at customer premises. Managing security patrol fleets is particularly complex in terms of sustainability; in order to respond swiftly to alarm callouts, patrol vehicles must be equipped with heavy key lockers that hold a large number of keys. This also implies that vehicles must be reinforced to protect such valuable stock, making it exceptionally difficult to transition to lighter EV alternatives. FM service delivery may appear less polluting in this respect. However, travel and time are still required for key collection, especially when subcontractors are involved in the process. Excessive emissions may be passed on through the supply chain; in practical terms, the emissions are not actually reduced and the impact on the environment remains the same. Adopting low-carbon solutions Nearly a fifth of physical security experts worldwide may be concerned about initial cost The views on the topic seem to be quite polarized across the security industry. The “Sustainability and the Security Industry” survey by asmag.com-Hikvison reveals that 47% of respondents view green and low-carbon initiatives as very important while 30% believe they are fairly unimportant. According to the Statista report, nearly a fifth of physical security professionals worldwide may be concerned about the initial cost and return on investment when adopting low-carbon solutions. With such statistics, it is no surprise that carbon offsetting is becoming so popular as it does not require any operational change while ‘green claims’ can be made. This approach is questioned by both Greenpeace and the Institute of Applied Ecology, questioning the effectiveness of the method and calling it “lip service to action”. Net Zero targets Yet the tables appear to be turning in recent years, and a serious approach to sustainable actions is becoming a must. The end users are stepping up and becoming more demanding in terms of service provider sustainability. For example, Better Buildings Partnership (BBP), a collaboration of pioneering property owners focused on improving the sustainability of commercial buildings, has created guidance notes for property managers on embedding sustainability into security services procurement, focusing on both environmental and social issues. Therefore, it only makes sense that both security and FM firms take feasible actions towards ensuring a more sustainable business model in order to secure the contract at the tendering stage. While many corporate activities can contribute to carbon neutrality, one particular element associated with travel can have a positive impact on the journey to their Net Zero targets. Changes to the keyholding model, which is often overlooked as an insignificant element of the overall operational mix, can reduce travel by half and enable the implementation of an EV fleet. Tried and tested approach Demonstrating plans for reducing emissions would benefit them and create a chance for their suppliers The tried and tested approach: A case study of CO2 reduction through keyholding improvements in FM delivery. With the UK Government’s commitment to Net Zero, it was only logical for each department to set specific targets to ensure that this goal is met across all their services. When selecting an external company for FM service delivery, most of which required contractor after-hours access to public buildings, one Government department wanted to ensure that carbon emissions were taken into serious consideration when awarding the contract. They were aware that demonstrating strategies for reducing emissions would benefit them as well as create a chance for their suppliers to do the same. Keynetics key management solution As a solution, they opted to implement a new keyholding method by Keynetics, which allowed them to store keys at the point of entry in commercial-grade secure key safes at 280 locations. The Keynetics key management solution incorporates mobile access via an app and a platform for remote access management that also allows audits, which was a critical element for this tender. Gathering visit data and analyzing metrics, such as visit duration, vehicle utilization, and travel time between facilities and key storage areas, allowed this Government Department to quantify the improvements in service metrics and reductions in carbon emissions. The deployment of the Keynetics key management solution resulted in a 50% decrease in visit-related trips and a corresponding 50% reduction in carbon emissions, removing 784 tonnes of CO2 within the first year of the implementation. Further developments Demand for favor vehicles fell with staff adopting alternative modes of transportation Furthermore, the demand for service vehicles dropped with staff adopting alternative modes of transportation to required locations. Meanwhile, a globally recognized security company adopted Keynetics’ SentriGuard® solution at different customer sites to improve their response times. Not only did it provide improvements to their keyholding approach, but it also helped to achieve environmental benefits and reduce operational costs. In Germany, the Keynetics system is being used by a world-pioneering provider of integrated electronic security solutions to reduce the number of keyholding patrols by 40% over the next three years. The security factor: Conducting due diligence Despite all of the benefits, one of the major obstacles when discussing key storage at the point of entry is dispelling objections around the security of key safes. To address this understandable and genuine concern and demonstrate that Keynetics key safes exceed all industry requirements, the company has earned LPS 1175 C1 and C3 rating certificates from the Loss Prevention Certification Board (LPCB). The certification process includes audits of all product elements, from the initial design and manufacturing site inspections to rigorous attack tests conducted by BRE. This has led to the adoption of SentriGuard® across multiple sectors, including Retail, Banking, Vacant and Void Property Management and Commercial Real Estate, to name a few. Therefore, while selecting an access control system for a sustainability score, the procurement team must complete thorough product accreditation checks as well as examine the certifying body's reputation.
Milesight, a global pioneer in smart IoT solutions, and Morse Micro, a pioneering fabless semiconductor company specializing in Wi-Fi HaLow solutions, are thrilled to announce the arrival of Wi-Fi HaLow variants of the X1 Sensing Camera, VS135 Ultra ToF People Counter, and the HL31 Wi-Fi HaLow Gateway. Wi-Fi HaLow versions This new range can transmit pictures and other data at higher speeds with low power consumption thanks to Wi-Fi HaLow. This partnership marks a significant milestone in advancing IoT connectivity and delivering unparalleled performance to customers worldwide. The new Wi-Fi HaLow versions of the X1 Sensing Camera, VS135 Ultra ToF People Counter, and HL31 Wi-Fi HaLow Gateway have been designed to revolutionize the way IoT devices connect and communicate, offering unmatched range, power efficiency, and device capacity. Milesight’s Wi-Fi HaLow devices Milesight’s new Wi-Fi HaLow devices are designed to meet the growing needs of various industries and applications, including: Smart City Solutions: Enhancing urban living with smart lighting, parking, and waste management systems. Smart Building Solutions: Improving automation in buildings with accurate people counting and enhanced coverage. Smart Retail: Enhancing customer experience and engagement with valuable insights. Agricultural Applications: Revolutionising farming with remote monitoring and precision agriculture tools. Logistics and Asset Tracking: Ensuring efficient and secure tracking of assets and inventory. Healthcare Innovations: Improving patient care with remote monitoring and telemedicine solutions. New possibilities for IoT applications Leon Jiang, Vice President at Milesight, said, “Wi-Fi HaLow has quickly gained global recognition for its robust performance and reliability. We are excited to launch the Wi-Fi HaLow versions of the X1 Sensing Camera, VS135 Ultra ToF People Counter, and HL31 Wi-Fi HaLow Gateway today." "Milesight has always been at the forefront of adopting cutting-edge technologies to enhance our product offerings. Integrating Wi-Fi HaLow technology aligns with our commitment to providing innovative and reliable solutions to our customers. Wi-Fi HaLow’s extended range, low power consumption, and high device capacity make it the perfect fit for our diverse range of IoT applications.” Seamless integration Professor Neil Weste, Fellow at Morse Micro, added, “Using the Milesight camera and gateway has been a game-changer in demonstrating the potential of Wi-Fi HaLow." "The extended range and low power consumption are particularly impressive, opening up new possibilities for IoT applications that were previously out of reach. This collaboration exemplifies how advanced technology can seamlessly integrate into various industry scenarios, delivering tangible benefits.” Exceptional connectivity solutions Michael De Nil, CEO of Morse Micro, commented, “The collaboration between Milesight and Morse Micro represents a significant step forward for the IoT industry. By leveraging the strengths of Wi-Fi HaLow technology, we are set to deliver exceptional connectivity solutions that will empower businesses and communities worldwide." "This partnership underscores our shared vision of pushing the boundaries of IoT innovation. With Wi-Fi HaLow’s superior range and efficiency, combined with Milesight’s cutting-edge product offerings, we are confident in our ability to meet the evolving needs of our customers and drive the future of IoT connectivity. Together, we are not just enhancing products but also enabling smarter, more connected environments.” IEEE 802.11ah standard Wi-Fi HaLow is an innovative technology designed to provide long-range, low-power connectivity for IoT applications Wi-Fi HaLow, based on the IEEE 802.11ah standard, is an innovative technology designed to provide long-range, low-power connectivity ideal for IoT applications. Unlike traditional Wi-Fi, Wi-Fi HaLow operates in the sub-1 GHz frequency band, offering extended range and improved penetration through walls and obstructions. With its ability to connect thousands of devices, Wi-Fi HaLow is poised to transform various industries, from smart cities and agriculture to logistics and healthcare. Availability The Wi-Fi HaLow version of X1 Sensing Camera, VS135 Ultra ToF People Counter, and HL31 Wi-Fi HaLow Gateway are available now across most regions. Contact Milesight IoT to start a design evaluation.
Check Point® Software Technologies Ltd., a pioneering AI-powered, cloud-delivered cyber security platform provider, has published its Global Threat Index for July 2024. Despite a significant drop in June, LockBit re-emerged last month to become the second most prevalent ransomware group, while RansomHub retained the top spot. Meanwhile, researchers identified both a campaign distributing Remcos malware following a CrowdStrike update issue, and a series of new FakeUpdates tactics, which once again ranked first on the top malware list for July. An issue in the CrowdStrike Falcon sensor for Windows led to cybercriminals distributing a malicious ZIP file named crowdstrike-hotfix.zip. This file contained HijackLoader, which subsequently activated Remcos malware, which was ranked as the seventh most wanted malware in July. The campaign targeted businesses using Spanish-language instructions and involved the creation of fake domains for phishing attacks. Check Point’s index Researchers found a series of new tactics using FakeUpdates, ended malware ranking for month Meanwhile, researchers uncovered a series of new tactics employing FakeUpdates, which topped the malware ranking for another month. Users visiting compromised websites encountered fake browser update prompts, leading to the installation of Remote Access Trojans (RATs) like AsyncRAT, currently ranked ninth on Check Point’s index. Alarmingly, cybercriminals have now started exploiting BOINC, a platform meant for volunteer computing, to gain remote control over infected systems. Maya Horowitz, VP of Research at Check Point Software, said: “The continued persistence and resurgence of ransomware groups like Lockbit and RansomHub underscores cybercriminals’ continued focus on ransomware, a significant ongoing challenge for organizations with far-reaching implications for their operational continuity and data security." Security software update "The recent exploitation of a security software update to distribute Remcos malware further highlights the opportunistic nature of cybercriminals to deploy malware, thereby further compromising organizations’ defenses." "To counter these threats, organizations will need to adopt a multi-layered security strategy that includes robust endpoint protection, vigilant monitoring, and user education to reduce the onslaught of these growingly massive cyberattacks,” said Maya Horowitz, VP of Research at Check Point Software. Top malware families The arrows relate to the change in rank compared to the previous month. FakeUpdates was the most prevalent malware last month with an impact of 7% worldwide organizations, followed by Androxgh0st with a global impact of 5%, and AgentTesla with a global impact of 3%. ↔ FakeUpdates – FakeUpdates (AKA SocGholish) is a downloader written in JavaScript. It writes the payloads to disk prior to launching them. FakeUpdates led to further compromise via many additional malware, including GootLoader, Dridex, NetSupport, DoppelPaymer, and AZORult. ↔ Androxgh0st – Androxgh0st is a botnet that targets Windows, Mac, and Linux platforms. For initial infection, Androxgh0st exploits multiple vulnerabilities, specifically targeting-the PHPUnit, Laravel Framework, and Apache Web Server. The malware steals sensitive information such as Twilio account information, SMTP credentials, AWS key, etc. It uses Laravel files to collect the required information. It has different variants which scan for different information. ↔ AgentTesla – AgentTesla is an advanced RAT functioning as a keylogger and information stealer, which is capable of monitoring and collecting the victim’s keyboard input, system keyboard, taking screenshots, and exfiltrating credentials to a variety of software installed on a victim’s machine (including Google Chrome, Mozilla Firefox and the Microsoft Outlook email client). ↑ Formbook – Formbook is an Infostealer targeting the Windows OS and was first detected in 2016. It is marketed as Malware as a Service (MaaS) in underground hacking forums for its strong evasion techniques and relatively low price. FormBook harvests credentials from various web browsers, collects screenshots, monitors and logs keystrokes, and can download and execute files according to orders from its C&C. ↓ Qbot – Qbot AKA Qakbot is a multipurpose malware that first appeared in 2008. It was designed to steal a user’s credentials, record keystrokes, steal cookies from browsers, spy on banking activities, and deploy additional malware. Often distributed via spam email, Qbot employs several anti-VM, anti-debugging, and anti-sandbox techniques to hinder analysis and evade detection. Commencing in 2022, it emerged as one of the most prevalent Trojans. ↔ Remcos – Remcos is a RAT that first appeared in the wild in 2016. Remcos distributes itself through malicious Microsoft Office documents, which are attached to SPAM emails, and is designed to bypass Microsoft Windows UAC security and execute malware with high-level privileges. ↔ Phorpiex – Phorpiex is a botnet known for distributing other malware families via spam campaigns as well as fueling large-scale Sextortion campaigns. ↑ Vidar – Vidar is an infostealer malware operating as malware-as-a-service that was first discovered in the wild in late 2018. The malware runs on Windows and can collect a wide range of sensitive data from browsers and digital wallets. Additionally, malware is used as a downloader for ransomware. ↓ AsyncRat – Asyncrat is a Trojan that targets the Windows platform. This malware sends out system information about the targeted system to a remote server. It receives commands from the server to download and execute plugins, kill processes, uninstall/update itself, and capture screenshots of the infected system. ↓ NJRat – NJRat is a remote access Trojan, targeting mainly government agencies and organizations in the Middle East. The Trojan has first emerged on 2012 and has multiple capabilities: capturing keystrokes, accessing the victim's camera, stealing credentials stored in browsers, uploading and downloading files, performing process and file manipulations, and viewing the victim's desktop. NJRat infects victims via phishing attacks and drive-by downloads, and propagates through infected USB keys or networked drives, with the support of Command & Control server software. Top exploited vulnerabilities ↑ Command Injection Over HTTP (CVE-2021-43936, CVE-2022-24086) – A command Injection over HTTP vulnerability has been reported. A remote attacker can exploit this issue by sending a specially crafted request to the victim. Successful exploitation would allow an attacker to execute arbitrary code on the target machine. ↑ Zyxel ZyWALL Command Injection (CVE-2023-28771) – A command injection vulnerability exists in Zyxel ZyWALL. Successful exploitation of this vulnerability would allow remote attackers to execute arbitrary OS commands in the effected system. ↔ HTTP Headers Remote Code Execution (CVE-2020-10826, CVE-2020-10827, CVE-2020-10828, CVE-2020-1375) – HTTP headers let the client and the server pass additional information with an HTTP request. A remote attacker may use a vulnerable HTTP Header to run arbitrary code on the victim machine. ↔ Apache HTTP Server Directory Traversal (CVE-2021-41773) – A directory traversal vulnerability exists in the Apache HTTP Server. Successful exploitation of this vulnerability could allow an attacker to access arbitrary files on the affected system. ↓ Web Servers Malicious URL Directory Traversal (CVE-2010-4598, CVE-2011-2474, CVE-2014-0130, CVE-2014-0780, CVE-2015-0666, CVE-2015-4068, CVE-2015-7254, CVE-2016-4523, CVE-2016-8530, CVE-2017-11512, CVE-2018-3948, CVE-2018-3949, CVE-2019-18952, CVE-2020-5410, CVE-2020-8260) – There exists a directory traversal vulnerability on different web servers. The vulnerability is due to an input validation error in a web server that does not properly sanitize the URI for the directory traversal patterns. Successful exploitation allows unauthenticated remote attackers to disclose or access arbitrary files on the vulnerable server. ↓ TP-Link Archer AX21 Command Injection (CVE-2023-1389) – A command injection vulnerability exists in TP-Link Archer AX21. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary commands on the affected system. ↑ MVPower CCTV DVR Remote Code Execution (CVE-2016-20016) – A remote code execution vulnerability exists in MVPower CCTV DVR. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system. ↓ Dasan GPON Router Authentication Bypass (CVE-2024-3273) – A command injection vulnerability exists in PHPUnit. Successful exploitation of this vulnerability would allow remote attackers to execute arbitrary commands in the affected system. ↔ PHP Easter Egg Information Disclosure (CVE-2015-2051) – An information disclosure vulnerability has been reported in the PHP pages. The vulnerability is due to incorrect web server configuration. A remote attacker can exploit this vulnerability by sending a specially crafted URL to an affected PHP page. ↑ NETGEAR DGN Command Injection – A command injection vulnerability exists in NETGEAR DGN. Successful exploitation of this vulnerability could allow a remote attacker to execute arbitrary code on the affected system. Top mobile malware Last month Joker was in first place in the most prevalent mobile malware, followed by Anubis and AhMyth. ↔ Joker – An Android Spyware in Google Play, designed to steal SMS messages, contact lists, and device information. Furthermore, the malware signs the victim silently for premium services in advertisement websites. ↔ Anubis – Anubis is a banking Trojan malware designed for Android mobile phones. Since it was initially detected, it has gained additional functions including Remote Access Trojan (RAT) functionality, keylogger, audio recording capabilities, and various ransomware features. It has been detected on hundreds of different applications available in the Google Store. ↔ AhMyth – AhMyth is a Remote Access Trojan (RAT) discovered in 2017. It is distributed through Android apps that can be found on app stores and various websites. When a user installs one of these infected apps, the malware can collect sensitive information from the device and perform actions such as keylogging, taking screenshots, sending SMS messages, and activating the camera, which is usually used to steal sensitive information. Top-attacked industries Last month Education/Research remained in first place in the attacked industries globally, followed by Government/Military and Communications. Education/Research Government/Military Communications Top ransomware groups The data is based on insights from ransomware "shame sites" run by double-extortion ransomware groups that posted victim information. RansomHub is the most prevalent ransomware group this month, responsible for 11% of the published attacks, followed by Lockbit3 with 8% and Akira with 6%. RansomHub – RansomHub is a Ransomware-as-a-Service (RaaS) operation that emerged as a rebranded version of the previously known Knight ransomware. Surfacing prominently in early 2024 in underground cybercrime forums, RansomHub has quickly gained notoriety for its aggressive campaigns targeting various systems including Windows, macOS, Linux, and particularly VMware ESXi environments. This malware is known for employing sophisticated encryption methods. Lockbit3 – LockBit is a ransomware, operating in a RaaS model, first reported in September 2019. LockBit targets large enterprises and government entities from various countries and does not target individuals in Russia or the Commonwealth of Independent States. Akira – Akira Ransomware, first reported in the beginning of 2023, targets both Windows and Linux systems. It uses symmetric encryption with CryptGenRandom() and Chacha 2008 for file encryption and is similar to the leaked Conti v2 ransomware. Akira is distributed through various means, including infected email attachments and exploits in VPN endpoints. Upon infection, it encrypts data and appends a ".akira" extension to file names, then presents a ransom note demanding payment for decryption.
Expert commentary
Choosing the appropriate fingerprint technology for a given application is dependent on factors including the required level of security and matching accuracy, the desired capabilities and features, and the usability to achieve adoption and productivity goals. A successful evaluation process will help ensure that this mature and proven user authentication method performs as expected. Fingerprint biometric advantages The speed, simplicity, accuracy, and cost-effectiveness of the fingerprint method have made it among the most widely used for biometric authentication across industry sectors ranging from banking and finance, retail, and healthcare, to government and law enforcement. It performs biometric technology’s “something you are” function while offering unique characteristics that make it particularly valuable for many applications. Unique identifier The fingerprint biometric has the permanency of being reasonably stable and consistent over time Among these characteristics is the pervasiveness and special nature of the fingerprint -- almost everyone has one, and each is a unique identifier. The fingerprint biometric has the permanency of being reasonably stable and consistent over time. It is also easy to acquire, measure, and process. High adoption rate Another key attribute of a fingerprint biometric is its ability to be protected against threats ranging from abuse and misuse to theft, imitation, and substitution. When it is used with recognition techniques the resulting solution performs with a combination of accuracy, speed, scalability, and ease of use. Fingerprint biometric solutions also have the highest adoption rate among biometric authentication solutions according to an industry report published by Payments Journal. Three interrelated components There are three basic components in any fingerprint biometric system as shown in Figure 1: capture (using a sensor that can capture even the most difficult finger types); liveness detection (using the Presentation Attack Detection – or PAD – technique); and matching (including preventing rejection of a legitimate user). Biometric algorithm The sensor captures and pre-processes the fingerprint data. It must be able to successfully capture fingerprint images for a range of skin types and print conditions under diverse temperatures, humidity, light, surface oil, dust, dirt, and other environmental conditions. A biometric algorithm then extracts minutiae data about the fingerprint ridges (endings, bifurcations, islands, etc.) and their orientation and position. PAD technique Implementing a presentation attack detection (PAD) technique at this stage activates the fingerprint biometric system’s second key element: liveness detection. This verifies the fingerprint’s authenticity and that it belongs to a living person. The system’s third element – matching – occurs after the PAD-verified fingerprint dataset has been securely stored as a record, known as a template, inside an enclave with cryptographic protection. Check for liveness The corresponding template of the legitimate user is then retrieved from secure storage When the fingerprint is presented for matching, it is rechecked for liveness. The corresponding template of the legitimate user is then retrieved from secure storage and the process of matching the fingerprint with this template is executed. This must be completed accurately and without rejecting a legitimate user. Types of fingerprint sensing technologies There are four prevailing categories of sensing technologies used with fingerprint readers: optical, capacitive, thin-film transistor (TFT), and multispectral imaging (MSI). Optical and capacitive method Optical is the most mature sensor technology and offers the benefits of a compact size, good capture Optical is the most mature sensor technology, and offers the benefits of a compact size, good capture and matching performance, a small enough size to fit in most desktop environments or shared workstations, and a high level of accuracy at a cost-effective price point across all use cases. The capacitive method, on the other hand, is less prone to fake finger attempts while also offering a thin and compact size for space-limited applications, the power efficiency to support battery-operated devices, and the ability to handle both indoor and outdoor lighting conditions. TFT technology The third technology goes a step further in capture accuracy. TFT technology can accurately recognize the smallest fingerprint features with ultra-high resolution and is used either as a larger-size matrix capacitive proximity detector (capacitive fingerprint sensor) or a larger-area matrix light detector (optical fingerprint sensor). It is ideal for in-the-field mobile identification applications that require a cost-effective, ultra-slim, and lightweight solution with low power consumption. MSI technology MSI technology differs from all three approaches, projecting multiple colors of light into the finger from different angles to collect both surface and subsurface biometrics data. It captures the most difficult fingerprints of diverse demographics, in a wide range of challenging environments. HID has used this patented technology in fingerprint readers that are compliant with ISO 30107-3 PAD Level 2 for advanced anti-spoofing against fraud. The technology also improves matching and offers sophisticated endpoint security that prohibits cyber criminals from gaining unauthorized access to networks by turning fingerprint readers into secure endpoints. Best practices for technology selection Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership Much is expected of the current fingerprint solutions, including delivering a low total cost of ownership. There are three top considerations: security, suitability, and usability. Each is important and the best approach is to strike a balance between all three. Following are the questions to ask during the selection process: Security: What is the regulatory environment? Financial and government services, healthcare, and law enforcement are some examples of highly regulated sectors with elevated security compliance requirements. Are there mandates in place for advanced capturing and biometric authentication specifications? How important is it to ensure anti-spoofing through liveness detection? Will endpoint security be required so that, if the fingerprint device is hacked, no network, system, or data behind the firewall will be impacted? Suitability: Where will the biometric technology be implemented? There will be additional considerations if it is to be embedded in portable, battery-operated devices that require low power consumption. Where will the technology be used? Will it need to fit into small spaces or be used in challenging indoor or outdoor conditions and environments? Will durability be important? Some deployments will face unpredictable weather and difficult lighting conditions for image capture. Will the technology be used for mission-critical border control or a more common – and less demanding -- commercial use? Usability Is it critical that the technology easily and consistently perform capture and matching? Will there be high volumes of fingerprint captures and matches? Is “friction frustration” a concern? If so, the solution must perform matching quickly and accurately to sustain high levels of user productivity. Will the fingerprint device be used by one person exclusively, or multiple people in a shared workstation setting? How diverse is the user population? Some readers are designed to handle all types of fingerprints and diversified demographics. Different applications Fingerprint biometrics is a proven solution to address real-world challenges, each with its requirements The answers to these questions will help determine the best choice of fingerprint technology. Different applications apply fingerprint biometrics to very different use cases but in all cases. It is a proven solution to address real-world challenges, each with its requirements. For instance, in a healthcare clinician’s terminal area or a similar shared environment with limited space, a durable, low-profile capacitive sensor may be the right answer. For an organization in a highly regulated, mission-critical environment like a bank or border control agency, advanced technologies such as MSI readers may be needed to avoid the serious repercussions of a spoofed identity or the rejection of a legitimate one. Requirements for a biometric solution These are just a few of the requirements to consider when choosing a fingerprint solution. In banking and finance, alone, fingerprint biometrics is used for applications ranging from transacting at the ATM to customer onboarding (eKYC), compliance (AML/KYC), and fraud prevention. The retail sector adds even more, including age verification, loss prevention, point of sale (POS) security, self-service checkout, and secure time and attendance. Law enforcement organizations have their unique requirements, using fingerprint biometrics for background checks, criminal booking, crime investigation, inmate management, mobile identification, and more. For government agencies, typical applications include benefits distribution, border security, citizen ID, employ authentication (SSO/MFA), and voter registration. Each application requires a thorough assessment of the best fingerprint technology for the job. The right touch The right solution will deliver the optimal balance of security, suitability, and usability Fingerprint biometric solutions empower a wide range of use cases with the simple touch of a finger. The right solution will deliver the optimal balance of security, suitability, and usability based on an analysis of criteria including specific application requirements, the characteristics and size of the user population, and challenges posed by environmental conditions. Accuracy, efficiency, and security The world faces increasingly dangerous fraud, account takeover, and impersonation threats. As industries and enterprises work to improve and evolve their identity and access strategies to combat these threats, fingerprint biometrics continue to prove their value through solutions that meet the key selection criteria while delivering the highest levels of accuracy, efficiency, and security.
With the rise of organized retail crime (ORC) making headlines, retailers are grappling with the dual challenge of safeguarding both their staff and store assets, while addressing the economic pressures that impact profitability and consumer demand. RFID technology The key lies in identifying effective solutions to counter the current surge in ORC, enabling retailers to secure their vulnerable staff and protect inventory for paying customers. Technology plays a crucial role in supporting brands on this mission, with RFID technology continuing to be a valuable solution. It aids retailers in gaining better control over retail crime, leveraging inventory data. The ongoing surge in retail crime Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector Seen as a global issue, the British Retail Consortium recently reported that incidents of theft have increased by 27% across 10 of the largest cities in the UK, with some cities reporting up to a 68% increase. In the US, retailer Target reported an inventory loss of $500 million for 2023, amounting to a 100-basis point hit to gross margins in 2023. The current surge in theft is not attributed to a singular cause. Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector. Lack of preventive measures A significant contributing factor is the lack of sufficient preventive measures by law enforcement, which in some cases has led to a rise in more severe incidents. However, the implementation of technologies like RFID allows retailers to efficiently build cases against criminals, putting them in a stronger position when it comes to reporting thefts. Not all retail crimes are orchestrated by large entities or executed through sophisticated methods. Some stores have seen a reduction in staff numbers and, as a result, there are fewer people on the shop floor, making it easier for shoplifters to carry out their activities unnoticed. The true impact of retail crime Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey The impact of retail crime on businesses extends beyond financial and economic consequences; it has also led to a surge in violence against retail staff, an ongoing trend elevated by the pandemic. Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey conducted by the National Retail Federation. This escalation in violence not only results in immediate repercussions but also contributes to long-term mental health issues for staff, fostering an atmosphere of insecurity that has compelled some retailers to close their physical stores. Policy implementation Given the challenge of staff retention across various businesses, addressing retail crime becomes an even more urgent matter. Additionally, retailers are wary of their employees facing potential danger and the prospect of legal action. Consequently, many have implemented policies prohibiting employees from actively intervening when confronted with shoplifters. Privacy concerns with facial recognition Retail crime also affects customers, as businesses seek to offset losses by raising prices Retail crime also affects customers, as businesses seek to offset losses by raising prices, further burdening financially strained consumers. The presence of visible security systems not only makes stores more hostile but also diminishes the overall customer experience. While facial recognition technology is considered a potential solution, privacy concerns have emerged in its various applications. Today’s problems, yesterday’s solutions Retailers are resorting to historic measures such as steel cables, physical monitoring, or plastic screens to resolve customer issues. However, the reality is that these solutions are unfit for solving the problem, causing friction for both customers and staff. Digital solutions The newer approach involves equipping retail staff with body cams and providing new training The newer approach involves equipping retail staff with body cams and providing new training to deter shoplifters. Some stores are even offering the police discounted food and beverages to encourage their presence. The responsibility lies with management teams to seek effective solutions. In an era dominated by data and technology, retailers must shift their focus from traditional security methods to digital solutions that align with the challenges of today’s society and modern retail environments. Shrinkage When discussing theft or organized retail crime, retailers commonly use the term "shrinkage," referring to not only theft but the broader issue of lost inventory. Additional drivers of shrinkage include damage, fraud, and internal theft. A significant problem arises as losses are often based on guesswork and estimates rather than concrete numbers. Retailers may lack a comprehensive understanding of their inventories, further increasing the issue of shrinkage. Combating shrinkage Utilizing RFID technology notably helps in boosting inventory accuracy Some retailers still struggle with limited knowledge of the whereabouts of items, a challenge heightened by the issue of shrinkage. Utilizing RFID technology notably helps in boosting inventory accuracy. This enhancement enables retailers to obtain a clearer understanding of their inventory and the precise locations of items. Comprehensive strategy Changes in the in-store experience have highlighted the relevance of RFID, especially as self-service checkouts encounter double the shrinkage levels compared to traditional checkout stores. To combat retail theft effectively, a comprehensive strategy should involve the integration of labels, deactivation, electronic article surveillance, and data analytics. This combination works synergistically to reduce shrinkage and enhance product availability. Retail data analytics platforms RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors Linking hardware to an underlying data analytics platform empowers retailers to make more informed decisions. Retail data analytics platforms delve into alarms, deactivations, and visitor metrics, providing a deeper understanding of theft patterns. RFID technology drives efficiency by pinpointing frequently stolen items, allowing for the identification of theft patterns. In instances of flash mobs in major metropolitan areas, RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors and incoming customers. Real-time optimization The crucial question remains whether both shoppers and retailers are prepared to shoulder the responsibility for these additional precautions. Nevertheless, these changes leverage data more effectively, optimizing loss prevention strategies almost in real-time rather than relying on biannual inventory counts, therefore transitioning from static to dynamic loss prevention. Holistic approach Striking a balance between security measures and providing a seamless shopping experience is key In a retail environment, not all items require protection, and prioritizing the safeguarding of the most frequently stolen and valuable items can significantly impact shrinkage. A holistic approach to retail theft is imperative, considering the entire journey of an item through the retail environment. Striking a balance between security measures and providing a seamless shopping experience is key. Protection without hindrance As stores move towards being checkout-free, retail criminals (or ORC gangs) will be presented with lucrative opportunities to steal, so retailers need to be one step ahead by introducing unobtrusive and effective technology solutions. For example, case building can be improved with item-level data. RFID data offers a more precise means of assessing the value of stolen items compared to relying solely on CCTV. It provides detailed insights into the specific items removed from the store and the timing of these incidents. This proves beneficial in tracking repeat offenders. Increased visibility with a proactive approach The modern retail environment continues to evolve and criminals are never far behind. RFID technology plays a crucial role in minimizing shrinkage by enhancing inventory visibility. Moreover, it leverages the power of data to stay ahead, enabling better predictions of retail crime and the formulation of prevention strategies. This proactive approach allows for the implementation of more tailored solutions to alter outcomes positively.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town center stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behavior also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorized access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimize this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorized entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
Security beat
Companies at GSX 2023 emphasized new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasizes ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the Mid-Market to the Cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for pure cloud, but there are benefits to be realized from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realize the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘Soft’ Features for Integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organization more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organization more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centers around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasizing performance, protection (cybersecurity), and price, their data centers are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring center where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
New buzzwords were abundant in the articles that generated the most clicks on our website in 2022. From the metaverse to the Internet of Things, from frictionless access control to artificial intelligence (AI), the topics most popular among our site’s visitors were at the cutting edge of change and innovation in the physical security marketplace. Here is a review of the Top 10 Articles of 2022, based on reader clicks, including links to the original content: Metaverse will promote collaboration and enable more efficiencies for security Metaverse is a familiar buzzword currently, but few people grasp what it means. In the simplest terms, the metaverse is an online “place” where physical, virtual, and augmented realities are shared. The term, Metaverse, suggests a more immersive online environment that combines elements of augmented reality (AR) and virtual reality (VR). For the physical security industry, the looming creation of a complex online environment offers possibilities and challenges. Establishing identity will be a central principle of the metaverse, and various biometrics are at the core of ensuring the identity of someone interacting in the virtual world. Cybersecurity elements are also key. On the benefits side, the security market is already taking advantage of technologies related to the eventual evolution of the metaverse. For example, the industry has deployed AR to provide information about a door lock’s status on a screen, headset, or smart glasses as a patrolling guard walks by. What are the security challenges of the transportation industry? Because transit agencies rely on several IoT devices, they get exposed to higher cybersecurity risks Rapid technological advancement, increasing urbanization, and the growing expectations of commuters and governments are pressuring transit industry players to modernize. Commuters, urban planners, first responders, and other stakeholders want to use transit data to support their decision-making. Transit agencies’ security and operations teams need closer collaboration to stay ahead. However, for many years, most transit agencies have relied on siloed, proprietary systems. Because transit agencies rely on an ever-growing number of Internet of Things (IoT) devices, they also get exposed to higher cybersecurity risks as there are more network access points to manage. The future is here: ADT’s innovation lab evaluating robots and indoor drones New robots and indoor drones for security applications are on the horizon, based on the work of ADT Commercials’ Innovation Lab, which is evaluating the latest technologies’ value to customers and some typical use cases. The ideal use of humanoid robots is to perform jobs that are considered repetitive, dirty, dangerous, and/or mundane. In security, that describes most security guard positions. As the name implies, autonomous indoor drones are focused on flying indoors versus the outdoor environment, which is heavily regulated by the U.S. Federal Aviation Administration (FAA). Flying autonomously indoors not only eliminates FAA oversight but also will enable ADT Commercial to offer another choice to customers to further reduce their dependencies on and costs of human guards. Innovative security: the key to business efficiency, cost savings, and more Organizations have shifted business focus countless times since the onset of the pandemic. While many leaders have been primarily concerned with the immediate health and safety of their customers and employees, 2022 has given rise to a new trend. More than ever, business leaders are seeking security solutions that increase operational efficiency and cost savings as well as improve logistics and business insight. As working environments become more complex, organizations looking to drive higher productivity and profitability margins should consider security upgrades that prioritize integrated analytics and automation. Shoplifting today is more sophisticated, and so are the tools to fight it One tool to fight shoplifting is analytics, which can be used to determine where shrink is occurring Shoplifting is often viewed as petty theft by individuals, but that is not always the case. Overall, shoplifting is becoming more sophisticated and coordinated. Traditional “shoplifting” has two major differences when compared to organized retail crime (ORC). The differences are numbers and motivation. ORC consists of groups working together to monetize theft, very different than an individual taking an item they need. One tool to fight to shoplift is analytics, which can be used to determine where shrink is occurring. Understanding where crimes take place helps retailers make strategic decisions about where to place their loss prevention efforts. Oosto offers 10 reasons to switch to frictionless access control in commercial buildings Access control for buildings is nothing new. It’s only in recent years that the urgency to implement smarter, more efficient, and more convenient forms of access control has increased, in the context of public and private sector digital transformation. Upheavals from the COVID-19 pandemic have forced organizations to re-think, pivot, and invest in new technology solutions that will incorporate Artificial Intelligence (AI) and Machine Learning, to gain speed in their operations, glean actionable insights from their video analytics, and enhance productivity with their teams. Which security trend is here to stay? Technologies and trends in the security marketplace come and go with some regularity. But how can you tell which trends are gaining traction and which amount to “the flavor of the month.” For example, while many physical security departments were hesitant to consider cloud-connected solutions in the past, they now better understand the benefits these solutions bring and how they can help them utilize their resources to achieve business goals while minimizing overall operational complexity. Other technologies mentioned in the article include mobile credentials, AI-based analytics, video management systems, cybersecurity, and a new emphasis on data. What do these technology trends have in common? They are opening new possibilities for greater system efficiency and functionality. In short, they are playing a role in transforming our industry. GSX 2022 reflects changing technologies and evolving role of security The role of the security director increasingly will encompass facets of cybersecurity and physical security GSX 2022 in Atlanta highlighted the changing role of security in the enterprise. The role of the security director increasingly will encompass facets of cybersecurity as well as physical security. Transitioning to an operation that incorporates both disciplines requires a workforce that embraces education and building new skills. Education and the opportunity to build new skills are evident everywhere at GSX, including in the hundreds of education sessions and also in the knowledge shared on the show floor in the exhibit hall. Consolidation changing the face of the security market Consolidation is a dominant trend in the security marketplace. Large companies typically swallow up smaller companies as a means of expanding both their technology portfolios and their geographic reach. Sometimes a big fish is swallowed up by an even bigger fish. Despite the pandemic and resulting economic challenges, the security market has continued to be a desirable environment for both big players and startups, which then provide abundant acquisition targets for larger companies. This article highlighted recent mergers and acquisition news. Six trends at the intersection of video and AI Video has evolved beyond the capabilities of advanced imaging and performance to include another level: Artificial Intelligence. Video imaging technology combines with AI, delivers a wealth of new data, not just for traditional physical security applications, but for a much deeper analysis of past, present, and even future events across the enterprise. This is more than a big development for the physical security industry; it is a monumental paradigm shift that is changing how security system models are envisioned, designed, and deployed. Much of the heightened demand for advanced video analytics is being driven by six prevalent industry trends.
The Global Security Exchange (GSX 2022) in Atlanta in September 2022 is the latest example of the energetic post-COVID resurgence of security trade shows. On the vibrant show flow, discussions centered on topics such as the security industry’s need for more employees and the lingering impact of a months-long supply chain crisis. Against a backdrop of continuing industry challenges, exhibitors and attendees were diverted by a wealth of new opportunities as the industry rebounded. Several major players had big product announcements at GSX 2022 in Atlanta. Manufacturers unveil the latest technology The big news at Genetec was “5.11.” That’s the newest version of Security Center, which is “all in,” i.e., providing everything Genetec offers in a single “unified” platform. The unified approach streamlines the process for systems integrators, makes quotes easier, and adds value for customers. Standard, Pro, and Enterprise versions provide video, access, and LPR “right out of the box.” Genetec is also launching a new web and mobile client for the “next generation operator.” Paid intern program Kyle Hurt says the security industry’s biggest challenge is attracting personnel Kyle Hurt, Genetec’s Senior Sales Director, North America, says the security industry’s biggest challenge is attracting personnel (even more challenging that the supply chain.) Genetec’s response is a robust paid intern program, welcoming 120 interns into various departments for a full semester. The program helps to feed Genetec’s need for new talent. “You can’t coach passion,” said Hurt. WiseNet Edge Hanwha Techwin introduced a “serverless camera” at GSX 2022, named the WiseNet Edge. It is a video camera with a built-in solid-state hard drive for storage. The camera can store its own video and take in other camera feeds. In effect, it operates like an NVR but is less expensive and with an internal solid-state drive. Video can be viewed through a cloud browser, and Hanwha’s WAVE software, loaded on the camera, enables the management of several cameras at a site. High-res video is stored inside the camera, and any information can be shared with the cloud according to the needs of the application. i-PRO Mini i-PRO launches its own Video Insight video management system and MonitorCast access control i-PRO has fully transitioned away from Panasonic and is charting its own ambitious future path. Seeking to be “bold, trusted, and flexible,” the company is releasing a raft of new products, filling in previous gaps in the line, and bringing forward new innovations, including a full complement of AI. In addition to hardware, they have their own Video Insight video management system and MonitorCast access control, which was part of the Video Insight acquisition in 2015. An i-PRO Mini is a tiny camera, smaller than a smartphone. All cameras are NDAA compliant. People are coming together “The show has been phenomenal,” said Josh Letourneau, Chief Commercial Officer, Prosegur USA. “It’s very nice to see that people are coming back. After the pandemic, we are finally in a position of coming together. Lots of organizations are coming to see us.” Intelligence-led risk management Prosegur is a global company looking to expand aggressively in the United States, creating multiple “metropolitan service areas,” where the company’s fully integrated offerings are available. What makes the company unique is its “intelligence-led risk management,” says Josh Letourneau, adding “It’s more than AI, it’s about human intelligence, too." Prosegur sees evolution and growth opportunities in the U.S. market. “We are one of the largest companies no one has heard of,” adds Letourneau. “The show seems as back to normal as possible,” said Keith Bobrosky, President of Delta Scientific, who attended the show although his company did not exhibit, adding “There seems to be a generally positive spirit about the show this year.” Physical security protocols Bobrosky sees data centers as the next big market for his company’s vehicle barriers Bobrosky’s company has worked aggressively to avoid the impact of supply chain issues, ordering plenty of extra inventory to avoid the possibility of a part running out of stock. “We got ahead of it and are past the worst of it,” he said. Bobrosky sees data centers as the next big market for his company’s vehicle barriers. “The government will mandate physical security protocols for cybersecurity locations because they house data that affects national security,” he says. Robots and indoor drones ADT Commercial highlighted robots and indoor drones for security apps at their booth. The newest versions of the humanlike robots offer extra padding, more fluid movement, and 360-degree viewing for a better virtual reality (VR) experience, including better peripheral vision. Robots can operate for four hours without a charge and “know” when to return to the charger (to “top off” every hour). Fully autonomous indoor drones can also replace guards, flying near the ceiling and generally after business hours. The use of either robots or drones can lower costs when compared to hiring human guards. Varied uses for canines in security Glen Kucera, Chief Executive Officer, MSA Security, highlighted the capabilities of canines for explosives and firearms detection. “People don’t realize the flexibility of what they can do,” he said. Kucera says canines provide a sophisticated solution to address the escalating active shooter and criminal threat. MSA Security was acquired last year by Allied Universal, adding to the company’s varied offerings for threat detection and management. Rather than individual products, Allied Universal’s emphasis at the show was on bringing solutions together. Their message: Risk is multi-dimensional and different from one client to the next. Access control Access control needs to develop more modern interfaces to compete with new technology companies AMAG’s news at the show included a new president, David Sullivan, who highlighted AMAG’s role as one of the “last independent access control companies.” He said, “The beauty of AMAG is its installed base and loyal integrator channel.” Sullivan sees changing trends in how office space is managed in the wake of the pandemic. More workplace management applications will emerge, with one of the elements being access control. Access control also needs to develop more modern interfaces to compete with new technology companies entering the market. An encouraging sign is that AMAG had its best year ever in 2021. Orion Entrance Control Orion Entrance Control showed off one of its modern new turnstiles at the RealNetworks/SAFR booth at GSX 2022. The turnstile incorporates an access control module from Elatec to update and expand card reader functionality. Using the module streamlines Orion’s processes and avoids having to update a customer’s readers individually. The turnstile at GSX also incorporated a facial recognition system from SAFR, which could be used instead of, or in addition to, the access control reader. Balancing the cloud and on-premise systems Salient Systems is looking to balance the use of on-premise and cloud systems and emphasize data instead of video. Rather than a single market, Salient sees security as a variety of smaller markets, each focused on different needs. Salient’s customers are typically larger and have multi-site deployments with thousands of cameras. On-premise systems appeal here because they offer an element of control. Open-platform APIs Internal teams at customer sites are seeking out and finding new ways to leverage the data from video systems “People have a keen interest in control and ownership of their data,” says Sanjay Challa, Chief Product Officer, Salient Systems. Internal teams at customer sites are seeking out and finding new ways to leverage the data from video systems, and some of the uses fall outside the traditional “security” market. Open-platform application programming interfaces (APIs) enable more integration with various systems, and broader applications enable customers to leverage budgets from other stakeholders in an organization. Add-on services “They’re unwilling to shift the entire solution to the cloud, but they want to leverage cloud technologies,” says Challa. For Salient, a cloud system provides remote access to monitor and service video installation remotely. “We enable the integrator to reach into your system to provide a higher level of service,” says Sanjay Challa. He concludes, “Our add-on services bring the best of the cloud to on-premise systems, and integrators don’t have to roll a truck to solve a problem with the system. We are focused on helping integrators succeed.”
Case studies
Take a walk to the local high street. Compared to a few years ago, they may notice many more “To Let” signs in empty shop windows. It comes as no surprise given the number of shocks to the economic system over the last five years, ranging from COVID-19 to international conflicts, all of which have led to various consequences, such as energy price hikes, interest rate increases, and a general shift in many people's work patterns and consumer behavior. Vacant retail space The total number of void private sector commercial properties stands at approximately 165,000 According to Savills Research, the overall footfall of vacant retail space in the UK is around 14.5%, while the total number of void private sector commercial properties stands at approximately 165,000. Additionally, an estimate of 7,000 commercial and business properties owned by Local Governments in Great Britain have been unoccupied for over 12 months. Net Zero ambitions Furthermore, a recent BBC article points out that business tenants are more inclined to search for smaller, newer and more energy-efficient office spaces to rent, are willing to downsize owing to hybrid working, and seek buildings that complement their Net Zero ambitions. This might be interpreted as an indication that a number of long-standing commercial premises would become vacant in the near future, forcing owners to update and repurpose empty spaces to meet the demands of a changing market. A costly asset that requires extra protection Insurance companies charge higher premiums for void property and require regular security While the property market and customer demands are shifting, some truths remain unchanged: commercial property should generate money, not drain it. However, void sites imply outgoing costs and no profit, so it only makes sense that any vacant space should be flipped as soon as possible. Unoccupied premises can become an alluring target for squatters, vandals, thieves, and trespassers, which is one of the main reasons why insurance companies charge higher premiums for void property and require regular security and fire safety checks too. Enhanced security measures Such properties must be protected by enhanced security measures. This often involves the installation of steel doors and screens, perimeter protection, vigilant surveillance, and prompt alarm response. After all, any break-in can cause far greater financial damage than the costs of protection; and the owner is legally liable for any injuries sustained by trespassers. Meanwhile, legit access is very much required by contractors to upgrade and renovate the site in preparation for the next business occupier. Any delays or missed visits result in further charges on an asset that is essentially nothing but another bill while vacant. Access issues: Fetch the keys For every contractor visit, property check or viewing, a key must be obtained offsite and then returned A minor but, consequently, very important issue might arise when accessing a site that is unmanned 24/7. For every contractor visit, property inspection or viewing, a key must be obtained offsite and then returned. This takes time, implies unnecessary travel and, potentially, may result in additional missed visit fees and rebooking arrangements in instances when a contractor is unable to gain entry. As a result, it may slow down the void property turnaround time. Keyholding arrangements Furthermore, complex keyholding arrangements can also slow down the security alarm response time. More and more security companies are moving away from the traditional keyholding model, in which keys are stored at the central location or in heavy key lockers in vans during patrols. While reaction time is critical, time is frequently wasted collecting keys or waiting for a keyholding patrol (rather than the nearest one) to arrive on site. Lock up and leave the keys. Securely. Keyholding solution must be more robust than doors or other means of entry to stop opportunistic intruders What about storing keys at the point of entry? This may be controversial, but it is a solution that has gained popularity in void property management with the implementation of secure range key safes and lock boxes. The primary concern in such an approach is security. Even though the property is void, the keyholding solution must be more robust than doors or other means of entry to prevent opportunistic intruders from taking advantage of the new keyholding arrangement. Smart key management solutions Stuart Wheeler, Managing Director of Keynetics, a company that offers smart key management solutions with security-certified key safes, comments, “Over the years, we have developed strong relationships with the top void property management companies in the UK and Europe. These clients require a keyholding solution that enables efficient FM service provision for vacant properties while also providing a high level of security.” “Storing keys at the point of need enables quicker alarm response times and allows approved contractors to enter the premises without any delays, but security must not be compromised; in that respect, our SentriGuard key safes are suitable for commercial properties and certified to LPS 1175 (Loss Prevention Standard) C1 and C3 security ratings, which is unrivaled by any other supplier.” SentriGuard key management system Stuart confirmed that in addition to security, the SentriGuard key management system is highly praised for its innovative technology. First, it incorporates a bespoke cloud-based platform that allows customers to manage access to multiple properties remotely and generate various audit reports that can also serve as proof of service delivery. Second, assigned individuals may gain access to premises either using the mobile app or a time-restricted code. He added, “The ability for clients to access real-time data of site visits with a solution that does not break the bank and is secure has been the key to the success here in the U.K. and now across mainland Europe.”
Up-to-date and accurate maps of the waterways are a prerequisite for safe and efficient shipping in Germany. Authorities such as the Federal Maritime and Hydrographic Agency, but also private harbor operators, are obliged to provide these in an up-to-date form at all times. The main reason for this is to avoid accidents caused by an incorrect or outdated card. This includes the classification of federal waterways, their kilometers, existing locks, lifting and barrages, other surrounding waters, places, and borders. Currently, mapping is carried out by conventional ships with trained personnel, which is time-consuming and expensive. This can result in long intervals between measurements at a particular location. 3D map of the surroundings Bank areas and surface forms are monitored by an optical system with two integrated cameras (Semi-)automated monitoring of waterways by autonomous platforms with obstacle avoidance and traffic detection could optimize this process and provide maps in less time. To this end, the Fraunhofer Institute of Optronics, System Technologies and Image Exploitation IOSB has developed an autonomous surface vehicle capable of autonomously surveying bodies of water as part of a three-year in-house research project. For this purpose, the river bed is recorded using sonar. Furthermore, the bank areas and surface structures are monitored by an optical system with two integrated industrial cameras from IDS Imaging Development Systems GmbH. The information obtained in this way is then merged and transferred to a 3D map of the surroundings. Application The precise surveying of water bodies is a demanding task. TAPS, the Fraunhofer IOSB's semi-automatic direction-finding system for rivers and lakes is able to perform this task both under and above water. The vehicle, which measures approximately 2 x 1.5 x 1 meters, travels along the relevant waterway and automatically avoids obstacles, whether stationary or moving. At a speed of two knots - which corresponds to around 3.7 kilometers per hour - such a mission can last up to 20 hours. For visual mapping of the shore areas, TAPS has two cameras attached to a mast, each pointing to a starboard or port and whose fields of view do not overlap. Due to their high resolution, they allow a visual inspection of relevant infrastructure, such as quay walls, as well as 3D modeling of the shore area based on the recorded image data. Orientation of the TAPS platform GNSS and IMU data serve as the basis for picking the position and exposure of the TAPS platform "We use an automated system for intelligent image capture. As soon as one or both cameras are focused on a predefined area of interest, image recording is started. The vehicle's own movement is also used to store only image data that is recorded from different angles and therefore offers added value in terms of content," explains Boitumelo Ruf, expert in photogrammetry in the Autonomous Robot Systems research group at Fraunhofer IOSB. GNSS (Global Navigation Satellite Systems, such as GPS) and IMU (Inertial Measurement Unit for position determination) data serve as the basis for determining the position and orientation of the TAPS platform. "When the images are captured, they are enriched with the current GNSS position data. The latter are required later for the assignment of precise coordinates," Ruf continues. COLMAP photogrammetric toolbox After data acquisition, the recorded images are transmitted together with the GNSS data to a ground control station, where a photogrammetric reconstruction is carried out. Boitumelo Ruf describes the procedure in more detail: "Among other things, we use the COLMAP photogrammetric toolbox. It uses outstanding image features to first compare the input images, calculate their relative positions and create a true-to-life 3D model of the environment." "We then use the tool to match the images pixel by pixel, i.e. we search for corresponding pixels and merge them exactly. The result is a dense 3D point cloud that is georeferenced using the GNSS positions, i.e. provided with the corresponding current coordinates." The 3D model can then be used for other tasks, such as visual inspections or bank monitoring. Robust industrial cameras defy wind and weather On the camera side, the Fraunhofer Institute relies on two uEye FA industrial cameras from IDS. The robust and resilient models with PoE are ideal for demanding environments. Camera housings, lens tubes, and screwable connectors meet the requirements of IP code IP65/67 and are thus optimally protected against dirt, dust, and splash water. The robust and resilient models with PoE are ideal for demanding environments The model used has the large-format 1.1" CMOS sensor IMX304 from Sony and delivers very clear, noise-free images with a resolution of 4096 x 3000 pixels. Thanks to its remarkable dynamic range and very high sensitivity, the global shutter sensor of the second-pixel generation of the Pregius series is particularly suitable for metrology applications, among others. It was precisely these characteristics that were decisive for the Fraunhofer IOSB's choice of camera. In addition to robustness and weather protection, important requirements for the cameras included a compact form factor and high image resolution to enable detailed visual inspections. The sensor should also offer a high dynamic range in order to capture images with a high level of detail in both sunny and shady areas. Integration via the standard GigE Vision interface enables the development and use of one driver for several systems with different cameras. Outlook The shortage of skilled labor is also a major issue in the surveying of waterways. Automated mapping of the waterways could not only reduce costs but also the time and, above all, the labor required. The aim of the TAPS project was to develop a prototype for this task and to demonstrate its potential in relevant scenarios. As a research organization, Fraunhofer typically develops technologies up to a level at which the functionality and suitability of the system have been proven. The next step is now cooperation with industrial partners. Dr. Janko Petereit, head of the Autonomous Robot Systems research group at Fraunhofer IOSB, explains: "We are actively looking for partners to take this final step towards commercialization together. In view of the positive results of our initial tests and the increasing demand for accurate, up-to-date waterway maps, we expect strong demand for our technology in the coming years. The knowledge gained can be used in a variety of ways. Autonomous watercraft can be used to transport people and goods by sea or inland waterways. The excavation of waterways and the autonomous surveying of fairways are also conceivable. “ The project demonstrates the high potential of the interaction between robot systems and digital image processing. The cards could be reshuffled in the future, particularly with regard to visual environment detection and scene interpretation.
IDEMIA Public Security North America, the premium provider of convenient and trusted biometric-based solutions, has announced the launch of the Iowa mobile ID to Samsung Wallet, in collaboration with the Iowa Department of Transportation (Iowa DOT) and Samsung. Iowa residents can now securely store their mobile ID in their Samsung Wallet and start using it to easily assert their identity from their mobile phone at TSA checkpoints at the Des Moines and Eastern Iowa airports, as well as 25 other participating airports in the country and other participating businesses. Free Iowa Mobile ID app Iowans can easily access their mobile ID in the Samsung Wallet by simply tapping their phone The launch of Iowa mobile ID in the Samsung Wallet brings elevated convenience and security for Iowans with Samsung smartphones for airport security screening, age-restricted products, and other identity checks. Iowans can easily access their mobile ID in the Samsung Wallet by simply tapping their phone near the mobile ID reader or having the mobile ID reader scan the QR code. Iowans can also continue to access their mobile ID through the free Iowa Mobile ID app, which IDEMIA built and rolled out for Iowa in October 2023. "We are pleased to add the Iowa mobile ID in the Samsung Wallet to the list of acceptable IDs at our security checkpoints. Travelers who want to take advantage of this new capability will find that their Iowa mobile ID is a convenient option when going through the security process. TSA will continue to embrace technology that improves security effectiveness while streamlining the passenger experience at airports," John Bright, TSA Iowa Federal Security Director. Partnership with Samsung "We are proud to expand our partnership with Samsung and the Iowa Department of Transportation (Iowa DOT) to bring mobile driver’s licenses and state IDs to Samsung Wallet in Iowa and help accelerate the adoption of mobile ID in the state." Mobile IDs are authenticated and issued by state DMVs or MVDs" "As a convenient and highly secure way to store state-issued IDs and drivers licenses, mobile IDs are authenticated and issued by state DMVs or MVDs and ensure personal information is securely stored on the user’s device, with only the user having control over what personal information is shared," Donnie Scott, CEO of IDEMIA Public Security North America. Long-standing partnership As a pioneer in identity solutions and credentials issuance with a long-standing partnership with government agencies and a commitment to privacy by design, end-to-end security and interoperability, the Iowa DOT partnered with IDEMIA to launch mobile ID in Iowa in October 2023. Later that year, in December 2023, Samsung collaborated with IDEMIA, alongside the Arizona Department of Transportation Motor Vehicle Division (AZ MVD), to roll out mobile ID to the Samsung Wallet in Arizona.
With an impressive 259 charging points and locally generated solar power to charge vehicles, Merklingen train station is the world’s largest e-car charging park. Situated between the cities of Stuttgart and Ulm, Merklingen was inaugurated in December 2022. The new train station serves approximately 1000 to 1300 passengers daily. It has benefited local hospitality, retail, and tourism since it opened with the state Ministry of Transport calculating that it will eventually generate an annual economic benefit of 4.8 million euros for the region. GDPR perspective As a transport hub for the local municipality of Merklingen, it is important that visitors feel safe and operations run smoothly. Because of this, the management team of the Zweckverband Schwäbische Alb contacted Reif GmbH looking for a new, intuitive video system that was futureproofed and could support the management of the station’s innovative e-car charging park. The customer also wanted an easy-to-use VMS to help with daily operations Existing systems on the market did not meet the customer’s requirements, specifically National Defense Authorization Act (NDAA) compliance which was important from a GDPR perspective. The customer also wanted an easy-to-use video management system (VMS) to help with daily operations and with event investigations. A new intuitive video system Hanwha Vision was chosen thanks to its intuitive WAVE VMS, NDAA compliance, open platform, and camera features. As a Diamond Partner, Reif GmbH was also able to offer a five-year warranty on the Hanwha Vision cameras. In total, 37 cameras are installed around the station’s car park along with WAVE VMS enabling continuous monitoring of the building and surrounding locations. The cameras include the QNO-8080R, a 5MP Network IR Bullet Camera, a TID-600R Intercom and the XNO-9082R, a 4K IR Bullet Camera with the Wisenet7 chipset and powerful video analytics including directional detection, audio detection, shock detection, and face/upper body detection. The benefits of an open system The open platform also supports future expansion of the station video surveillance if needed Hanwha Vision’s open platform offered the flexibility and futureproofing needed by the operator team, notably in supporting integration with a custom in-house AI parking control system that was developed in partnership with a regional software company. This system automates parking management removing the need for personnel to issue access, exit, and parking fees for the station car park. The open platform also supports future expansion of the station video surveillance if needed, or additional features and uses. Crucial evidence and insights The cameras work with the in-house parking management system to prevent unauthorized vehicles from entering the premises. They have also captured footage that was later used to investigate damage to property, helping operators to resolve such cases clearly and effectively with the video evidence. The XNO-9082R shows excellent performance in different lighting conditions thanks to Wisenet7 The XNO-9082R shows excellent performance in different lighting conditions thanks to Wisenet7, delivering clear images back to operators to help with situational awareness day and night. IK10 water and vandal protection was another selling point for the station team, as the cameras are all situated outdoors. Meeting GDPR requirements Hanwha Vision cameras are NDAA compliant, meeting the GDPR requirements for the station. No productive data is passed on to external third parties and the system can be operated completely on-premise to meet data protection regulations. Data can only be viewed by explicitly authorized individuals. Due to the WAVE VMS, maintenance staff can access the on-premise server in an emergency or malfunction with remote access through WAVE Mobile. “The performance and quality of Hanwha Vision cameras along with the open WAVE VMS that could work with the in-house AI parking management system made it the logical choice for the Merklingen station project,” explained Andreas Baumann, Managing Director at Reif GmbH.
Geekplus, the global pioneer in mobile robot and smart logistics solutions, has deployed the first Shelf-to-Person PopPick project in the Nordics for one of the biggest online pharmacy wholesalers in the region, Med24.dk. System Teknik partnered on the Denmark project, which includes three PopPick stations and 30 Shelf-to-Person robots, bringing a flexible solution to a region where fixed automation still dominates. "With the rise of e-commerce, Med24.dk had been struggling with huge sales growth coupled with fast delivery demands from customers in Denmark, Norway, Sweden searching for pharmacy, health and beauty products. Peak season events had also caused considerable strain to their operations," said Blond Shkodrani, channel partner manager for the Nordics at Geekplus. "Due to their overwhelming success, Med24.dk needed a modular, automated order fulfillment solution for fast, efficient order fulfillment." Order fulfillment challenges Shelf-to-Person takes goods of all sizes while removing the need for infrastructure investment The Geekplus modular Shelf-to-Person solution optimizes warehouse operations using mobile robots to transport shelves. In a region where fixed and cubic solutions have been the trend during recent years, Shelf-to-Person handles goods of all sizes while removing the need for infrastructure investment, making it the most flexible response to order fulfillment challenges. PopPick workstations use two retrieval arms and four presentation locations to present pickers with multiple, moveable 78-tote racks at one time, resulting in an industry-pioneering throughput of 450 totes per hour. PopPick can store goods of all types and sizes; the solution is not limited to small pieces and improves ergonomics for workers while picking. It also takes up less space than traditional systems, so customers can use more stations without adding facility space. Mobile order fulfillment solutions "We are very pleased to invest in flooring robots from Geekplus," said Med24.dk CEO Nils Træholt. "We believe that this new and innovative technology can help us realize our growth ambitions, while maintaining good delivery times for the benefit of our customers." Morten Kirch, System Teknik's CSO, added: "Due to Med24.dk's growth, we are thrilled to be able to deliver a tailor-made, automated solution that matches their needs." Geekplus offers a suite of Goods-to-Person mobile order fulfillment solutions-the only comprehensive robotic offering controlled by a single software platform. "Through trusted partners like System Teknik, we're showing customers all over Europe that Geekplus truly is a one-stop shop for modular warehouse automation," Shkodrani said.
360 Vision Technology, the UK manufacturer of ruggedized HD, radar, and thermal PTZ imaging cameras, has been chosen to supply the camera surveillance technology for a historically important English Heritage site, at the Transit Shed, Exeter Quayside. Installed by Select Electrics and specified by Derek Maltby of Global MSC Security, the inclusion of additional CCTV was required to monitor the Exeter Quayside area, covering the canal side, shops, restaurants, bars, and attractions. Security and safety Kevin Tyrrell, CCTV Technical Manager for Select Electrics explains the requirement for an expansion to the current CCTV system, “With accessible funding granted from a successful Safer Streets 2 application, Exeter City Council looked to expand the surveillance coverage of the Quayside area and integrate it into the existing town center CCTV network, for monitoring at the Exeter City Council control room." “Coverage was required to provide safety and security surveillance in an area that is popular with both locals and visitors. Additionally, as the Quayside includes a canal side, should coverage of the canal be required in an emergency, high-definition footage of any incident here would be advantageous.” High-definition images We required a camera that would provide reliable HD images but also one that would withstand high winds" With all these requirements considered and the tender bid successfully accepted by the council, Select Electrics was selected to implement the expansion of surveillance coverage. “To cope with the harsh conditions to be found at Exeter Quayside, we required a camera that would not only provide reliable high-definition images but also one that would withstand high winds and rain, that can combine to make a difficult operational environment for electronic equipment, such as a CCTV camera,” continues Kevin. Camera applications “We’ve enjoyed a long-term technical relationship with 360 Vision Technology for several years, having employed their camera technology in many varied applications, and based on this experience, we were confident in their ability to provide a camera that could satisfy our demanding requirements.” “Additionally, and further complicating matters regarding the installation of cameras, many parts of the Quayside area are historically important, such as the cobbled areas and streets, as well as the English Heritage-protected Transit Shed, which occupies a large part of the area.” Need for an alternative solution The logistical effects of installing traditional CCTV infrastructure were considered too disruptive and expensive" The centerpiece for many music, dance, and street theatre events held in the area, the Transit Shed is an open-plan building set on cast iron uprights, historically, used to store cargo unloaded from ships. “The historically important parts of the area could not be disturbed,” adds Derek Maltby. “The logistical effects of installing traditional CCTV infrastructure, such as fiber cabling under streets and a network of CCTV cameras on poles was considered too disruptive and prohibitively expensive so an alternative solution needed to be found.” Perfect line-of-sight “We have always had a great relationship with the research and development team at 360 Vision and this project was no different." "We had identified the Transit Shed as a possible location for the siting of a single PTZ camera, where it would have a perfect line-of-sight to all of the areas that required coverage on this project, but we knew that any camera mounted on, or near the Transit Shed would have to meet strict English Heritage requirements, including a specific body color, to match the exact heritage hue of the Transit Shed, to blend within the historic architecture." Invictus TX wireless camera Very quickly, we determined a solution using the 360 Vision Invictus TX wireless camera" “We outlined the technical requirements and restrictions of the project to the team at 360 Vision and were delighted with their enthusiasm and technical understanding of the demanding requirements of this installation." "Very quickly, we determined a solution using the 360 Vision Invictus TX wireless camera but in a one-off specific color, specifically matched to blend with the painted roof of the Transit Shed.” Key features of the camera With a continuous rotation pan, unobstructed 360-degree view, and 160-degree tilt, the 360 Vision Invictus camera can deliver unhindered views to the control room and for night-time vision, is equipped with on-board LED white light technology. Considering camera performance, unlike many other camera products that utilize ‘belt-drive’ PTZ systems, Invictus incorporates ultra-reliable and extremely quiet Direct Drive mechanisms, resulting in consistent pre-set accuracy and long-term reliability for its installation at the Quayside. HD and ultra-low-light camera imaging The camera is designed to provide trouble-free service in harsh Quayside conditions The Invictus TX’s high-performance, ruggedized PTZ camera with full 1080P HD and ultra-low-light camera imaging technology, made it the perfect choice for deployment in this application. Supplied in a specific green Pantone reference, the camera is designed to provide years of trouble-free service in harsh Quayside conditions and provides comprehensive coverage of the area, at a fraction of the cost of multiple traditional units and associated traditional hard-wired transmission infrastructure. Day and night surveillance “In operation, system operators can instantly switch on the LED white light mounted onboard the Invictus camera, to illuminate the scene and inform people at the Quayside that they are being monitored, both for security and safety purposes, for example, if anyone falls into the water at the Quayside at night,” adds Dennis Cavanagh, Control room Operations Manager, Exeter City Council. “Since the 360 Vision Invictus TX camera has been added into the system, we have had many positive comments from residents and local businesses, complementing the non-invasive nature of the color-matched camera in the historical surroundings and confirming the feelings of security the camera coverage now provides to the area both during the day and night.” Increase surveillance coverage The combined Invictus TX camera and integrated LED white light technology make it the perfect choice" The Invictus camera on the Transit Shed is part of a wider project to increase surveillance coverage and improve image quality across the Exeter CCTV network, with over 40 cameras already installed to either replace existing cameras or extend coverage to new areas, as part of a rolling program of improvement made possible by funding from Safer Streets Fund. Jason Wyatt, National Account Manager at 360 Vision Technology says, “The combined Invictus TX camera and integrated LED white light technology makes it the perfect choice for the technically demanding environment at the Exeter Quayside." Surveillance upgrade "Invictus’ ultra-low light technology from 1/1.9’’ ULL sensors also delivers brighter, crisper, and more defined color images at night, for the ultimate performance at the Quayside." "We are proud to have delivered a bespoke Invictus camera version in a one-off colour, to enable use on the English Heritage protected Transit Shed, as part of an overall upgrade to the Exeter City Council city-wide CCTV network and its ongoing surveillance upgrade using 360 Vision’s Invictus cameras.”
Round table discussion
Video storage has come a long way since rooms full of VCRs stored video from an entire system of cameras. Video storage equates to data storage, and there are multiple options ranging from hard disk storage to the cloud to storage on each individual camera using SD cards. Increasingly, cloud-based storage is an attractive option to store video footage conveniently and safely. We asked this week’s Expert Panel Roundtable: How is expansion of video storage capabilities impacting the security industry?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?