The SmartWater Group, an award-winning risk management company, is pleased to announce the acquisition of Tag Security Holdings (TSH), supported by its primary investment partner, Freshstream. The deal further cements The SmartWater Group’s position as a provider of technology-enabled, intelligence-led security and crime deterrent solutions to customers in construction, infrastructure, engineering, law enforcement, real estate, and retail. Access control products The acquisition is The...
How AI and humans can work together is a longstanding debate. As society progresses technologically, there’s always the worry of robots taking over jobs. Self-checkout tills, automated factory machines, and video analytics are all improving efficiency and productivity, but they can still work in tandem with humans, and in most cases, they need to. Video analytics in particular is one impressively intelligent piece of technology that security guards can utilize. How can video analytics he...
Four out of every ten (41%) of England-based medium and large-sized businesses which are running CCTV systems have already deployed facial recognition analytics in their systems to capture human faces and compare images to human face databases to identify matches for access control, event security, or for public safety purposes. One in six (16%) of CCTV system owners admitted to having access to this capability on their system but not yet going live with it. Over a third of CCTV system owners...
Four out of every ten (41%) of England-based medium and large-sized businesses, which are running CCTV systems, have already deployed facial recognition analytics in their systems, in order to capture human faces and compare images to human face databases, with a view to identifying matches for access control, event security or for public safety purposes. Facial recognition analytics One in six (16%) of CCTV system owners admitted to having access to this capability on their system, but not ye...
Synectics releases a new ‘tech note’ exploring the benefits of cloud storage for enhancing security and surveillance operations. The guide focuses on hybrid cloud surveillance solutions which deliver maximum flexibility, allowing users to record, process, manage and store video and operational data on site, carry out these actions directly to the cloud, or seamlessly use a mix of both. Adopting cloud storage David Aindow, Business Development Director at Synectics, said: “Ha...
The trend of video customers moving to the cloud has reached a tipping point. At the same time, artificial intelligence (AI) is being adopted on a massive scale. Combining the two trends adds a higher level of value than either component individually. Merging the power of AI and the cloud is a driving force behind cloud surveillance company Eagle Eye Networks’ acquisition of Uncanny Vision, an AI and video analytics company headquartered in Bangalore, India. Expensive AI resources Clou...
Hanwha Techwin, a global security solution provider, and Azena, an IoT platform provider, have announced a collaboration with KT Corp, Korea’s largest telecommunications provider, to provide AI video analytics solutions to the Korean market. AI video analytics apps from Azena’s marketplace that run on Hanwha Techwin cameras will enable Korean cities, businesses, and organizations to leverage the latest AI technology for security, safety, and beyond. Adopting AI analytics A new generation of smart cameras from Hanwha Techwin will run the operating system from Azena. Users of these devices can download and install apps in minutes from the nearly 100 apps in Azena’s Application Store, the world’s largest open platform for AI smart camera apps. By making these solutions available in Korea, Hanwha Techwin and Azena fast-track the adoption of edge AI analytics in that market. KT Corp will provide a 5G MEC platform to support both a 5G network for enhanced wireless connections and hybrid computing services for back-end AI processes that require high computing capacity. “Expanding our presence into Korea with our partners taps into a market already progressive and mature in their use of AI technology,” said Hartmut Schaper, chief executive officer, Azena. “We are looking forward to working with not only Hanwha Techwin and KT Corp but also the Korean community of edge AI application developers.” Seamless hardware-software integration Cameras from Hanwha Techwin are globally recognized for quality and are in use all around the world. Models will integrate seamlessly with the apps from the Azena Application Store. Cameras can operate in the same user customisable way due to the open architecture and ecosystem from Azena This makes the new models more valuable in a range of uses as customers can at any time add or change functionality — from traditional security and safety use cases to apps that enhance operational intelligence or drive automation and other process improvements — all while using the same hardware, much like a smartphone. Cameras can operate in the same user-customizable way due to the open architecture and ecosystem from Azena. Benefits of an open platform approach “We are cultivating a flexible landscape to benefit all. App developers can rely on best-in-class hardware, and system integrators can select best-in-class apps from Azena’s app market to provide a custom solution to end-users,” said KiChul Kim, Head of Sales & Marketing at Hanwha Techwin Headquarters and Open Security & Safety Alliance (OSSA®) Board Member. The open platform approach from Azena and Hanwha Techwin decouples software from hardware. KT Corp’s 5G MEC platform enables flexible deployment and provides highly scalable hybrid computing resources while reducing the TCO and lead time. This allows KT Corp’s customers to harness technological advancements in edge AI video analytics as they become available in the future. “I believe that Hanwha Techwin and the Azena AI application platform powered by KT Corp 5G MEC technology allow us to make state of the art AI technology with 5G MEC available to a wide range of businesses and organizations across Korea,” said Yoonsung Park, Leader of 5G MEC TF at KT Corp.
Gunnebo Group has completed the acquisition of the Italian entrance control company HC2, a producer of high security entrance solutions and customized gates for the retail industry. The acquisition enables an extended customer offering for Gunnebo Entrance Control, strengthening its footprint as a pioneer in entrance control solutions for the office and buildings, mass transit, high-security, and retail segments. “We are very happy to welcome the HC2 organization and their customers to the Gunnebo family. HC2 represents a valuable and complementary addition to the Gunnebo Entrance Control business. Our combined teams will support our customers with new solutions and opportunities going forward,” says Stefan Syrén, President and CEO. Entrance control company HC2 is an Italian innovative and fast-growing entrance control company based outside Milan offering revolving doors and interlocks for high security sites as well as gates and customized solutions for the retail industry. HC2 is an Italian innovative and fast-growing entrance control company based outside Milan “Thanks to our global sales channels and scale of operations, the acquisition of HC2 will create significant synergies and contribute to the Gunnebo Entrance Control growth journey in the coming years. Together we will grow from increased strengths and opportunities,” says Sacha de La Noë, President of Gunnebo Entrance Control. Market segment expansion “This is an important day for HC2 as well as for our customers. Becoming part of the Gunnebo Group as a niched specialist, we get the wings to accelerate our production, sales, and customer centric innovation. Together we will excel with the growing market needs for entrance control solutions,” says Valerio Bezzi, CEO of HC2. The Gunnebo Group is on a change journey that started in 2019 transforming the former regional Gunnebo sales structure into three business units operating globally; entrance control, safe storage, and cash management. Gunnebo Group empowers its business units to grow through customer centric innovation combined with product and market segment expansion. HC2 will play a key role in the Gunnebo entrance control growth journey going forward.
Cloud-based video surveillance specialist Cloudview has made three new appointments to strengthen its sales operation. Review of new recruits Andy Alexander joins as Sales Manager and was previously Regional Sales Manager at Security Dynamics. Before that, he held roles at Redvision CCTV, 360 Vision, and Siemens SBT. Since joining in June, he has brought new partners to the business, including security integrators, CCTV installers, and end-users. Hannah Edwards has been appointed Sales Administrator. She has wide experience in different sales and customer experience roles, including at Mercedes-Benz and the Home Retail Group. In her new role, Hannah will be researching potential new partners, clients, and end-users, in addition to supporting the Sales and Commercial teams. Martine Van De Steene joins Cloudview as Telesales Executive. She has experience in sales positions at software and hardware companies, working across Europe, and speaks English, German, French, and Dutch. Feedback “Andy, Hannah, and Martine have already fitted well into the team and each is a great asset for Cloudview,” said Keith Cornell, Cloudview’s CEO. “With cloud-based surveillance being taken up by an increasing number of organizations, they join Cloudview at a very exciting time for us.”
UK-based cyber security start-up, Robo Shadow, launches their initial product set as they attempt to take on the big guns in cyber security. The platform boasts a range of features including vulnerability scanning, hardware and software reporting for all the devices, reporting on Windows Defender centrally (removing the need for third-party anti-virus) and much more. Terry Lewis, CEO and Prolific Tech Investor, states that "We want to democratize cyber security, by removing the cost and the complexity." The Robo Shadow cyber platform effectively is an attack surface management platform aimed at helping organizations quickly understand their cyber-attack surface. Cutting-Edge software This is so people can ‘see what the hackers see’ when they are planning their attacks. The easy-to-use platform will also give all the helpful hints in closing the vulnerabilities that penetration tests and vulnerability assessments uncover. This cutting-edge software has a straightforward approach to how cyber information is displayed and digested by the users, supported by an extensive AI-driven cloud backend. This cutting-edge software has a straightforward approach to how cyber information is displayed When asked about the commercial model for Robo Shadow, the team states: "We want people to use our software for free and will only have to pay if they require advanced services like support, penetration testing and consultancy. That way, anyone can get the free tech they need, whether they are a School, Business or even a Government Institution. If need be, they can pay for a subscription to use our internal team to help support and advise on the cyber outputs generated by the Platform. Free users to the Platform will still have access to developer style support." Remotely scanning networks Currently, the initial offering has everything from vulnerability scanners, Windows Defender agents, and Office 365 integration. Future versions of the platform will include Google, Microsoft & Amazon Cloud Integration, Mac and Linux cyber agents, and an array of technology for businesses to manage their cyber-attack surface and deliver daily Sec Ops aspect to their business. The team has enjoyed a decent first run boosted and helped by their popular Android app available in the app store. The app allows people to remotely scan their networks both inside and out for vulnerabilities to understand their attack surface better. Originally the Android app was built as a proof of concept to demonstrate how simple the tech needs to be to make a significant effect in helping people understand their cyber-attack surface.
March Networks, a global video surveillance and video-based business intelligence solutions company, is pleased to announce several innovative enhancements to its retail solution that use AI and cloud technology, to help quick-service restaurants (QSRs) and other retailers cut losses from theft, improve customer service, and drive profitability. Mobile order pick-up solution With mobile and online ordering more popular than ever, due to the COVID-19 pandemic, streamlining curbside delivery is a top priority for retailers. With this in mind, March Networks has introduced a new mobile order pick-up solution for retailers and QSRs, which alerts operators in real-time, to customers arriving for curbside pick-up. The solution uses a highly accurate, AI-powered analytic, available in March Networks’ ME6 Series IP Cameras, to detect vehicles arriving for pick-up. Retailers can receive an email or text message alert about each vehicle’s arrival, and also capture recorded video of every curbside delivery, for future review and investigation. Integration with Searchlight for Retail software When paired with March Networks’ Searchlight for Retail software, the solution allows businesses to also capture data analytics on curbside deliveries. QSRs, for example, can track the number of mobile deliveries, at different times, throughout the day and on different days, to analyze trends and help improve speed of service. Big box retailers and grocers, meanwhile, can use Searchlight software to oversee all of their curbside deliveries, investigate any disputes and uncover trends, which can help improve customer service. Combining video surveillance with Business analytics Searchlight, available as a cloud service, combines video surveillance with POS transaction data and business analytics Searchlight, available as a cloud service, combines video surveillance with point-of-sale (POS) transaction data and business analytics, for exception-based reporting and faster loss prevention investigation times. It also offers valuable information on customer service, operations and business performance, with intelligent easy-to-read dashboards. Retailers can now easily and conveniently access Searchlight data on their smartphone or tablet, with the March Networks’ Command Mobile Plus app. By deploying the app, retailers can see POS transaction data paired with surveillance video, investigate security alerts and review thumbnail images from each of their cameras. Innovative cloud-based suite of tools “By offering this innovative cloud-based suite of tools, March Networks is using AI, to help solve the problems that retailers and QSRs face on a daily basis,” said Net Payne, March Networks Chief Sales & Marketing Officer. Net Payne adds, “This new curbside solution helps retailers adapt to changing consumer demands and use video to improve the customer experience, and gather new insights about a rapidly growing segment of their business.” Global Security Exchange (GSX) 2021 March Networks will showcase these new additions to its portfolio, at the Global Security Exchange (GSX) 2021 tradeshow, at booth 1708, taking place in Orlando, Florida, from September 27-29, 2021.
Allied Universal, a security and facility services company, will be showcased at the Global Security Exchange (GSX) conference (Booth #901) slated for September 27 – 29 at Orlando’s Convention Center. “With the acquisition of G4S finalized in April 2021, we are now the leading integrated security and facility services company in the world,” said Steve Jones, Global Chairman & CEO of Allied Universal. “We believe there is no greater purpose than serving and safeguarding customers, communities, and people in today’s world.” Advanced technology solutions Allied Universal continues to raise its profile as a pioneer in security services by going beyond manned guarding and offering risk advisory and consulting, executive protection and intelligence services, advanced technology solutions, and event services. Allied Universal continues to raise its profile by going beyond manned guarding “Allied Universal’s highly advanced smart technology solutions and substantial manned guarding business have created a global one-stop-shop for customers and a business that is capable of leading the industry shift toward integrated security services,” said Mark Mullison, CIO, Allied Universal. Presenting expert sessions Allied Universal is proud to present expert sessions at GSX 2021 which include: Monday, September 27 at 2 p.m. - 3 p.m. ET - Should You Be Afraid? Experts Discuss Experiences, Concerns and the Future of COVID-19 Vaccine Security - Lisa Terry, CPP, Vice President, Vertical Markets, Healthcare at Allied Universal, will join a panel of other experts to discuss security issues surrounding the COVID-19 vaccine and the impact on international travel, workplace safety, anti-vaccine activists, schools/teachers, healthcare and the public. Wednesday, September 29 at 11 a.m. – 11:20 a.m. ET - The Realities of an Effective Recruitment and Training Program for Intelligence Analysts - Sean Schuhriemen, Director of Intelligence at Allied Universal Executive Protection and Intelligence Services, will discuss the realities of what a mature intelligence program looks for in an analyst, and how newly hired analysts are trained to provide for a successful and scalable program.
Today, we live in a technology-obsessed age. Whichever way you look, it’s hard to avoid the increasing number applications, products and solutions that continue to redefine the boundaries of what we previously thought possible. From autonomous vehicles and edge computing to 5G and the Internet of Things, all facets of our lives are continuing to evolve, thanks to an endless stream of differentiated innovations. In this article, we’ll be focusing on the latter of these - the Internet of Things (IoT). Deployment of IoT technologies Smart homes, smart utilities, smart retail, smart farming, smart supply chains and many of the other ‘smart’ versions of sectors that we’re already familiar with, are all called as such because of the implications of IoT. Indeed, it is a technology that has manifested itself in billions of devices, which today underpin the truly transformational levels of connectivity that we see across industries of all shapes and sizes. The statistics speak for themselves. According to Statista, over US$ 1 trillion is expected to be spent on IoT technology worldwide, in 2022. Be it added convenience, efficiency, productivity or intelligence, many benefits are poised to emerge from this spike in IoT-related activities. Yet to say this digital transition is going to be entirely positive would be naïve. Threats faced by smart cities It is said that by 2040, 65 per cent of the world’s population will be living in cities Let’s consider smart cities. It is said that by 2040, 65 per cent of the world’s population will be living in cities. To accommodate such an influx, without facing significant logistical issues, with limited space and infrastructure, policy makers have begun to recognize that these urban environments need to become not only larger, but smarter as well. As a result, the global smart cities market is on the rise. Statista states that, globally, technology spending on smart city initiatives is expected to double from US$ 81 billion in 2018 to US$ 189.5 billion in 2023. Threat of attackers with expanding IoT landscape The challenge here is that such a stark uptick will drastically expand the IoT landscape, presenting more opportunities than ever to threat actors. As connectivity and computing power is distributed more widely across large-scale outdoor networks, hackers will scale-up their own operations in tandem. According to a Nokia report from October 2020 (based on data aggregated from monitoring network traffic on more than 150 million devices globally), IoT devices now account for roughly 33 per cent of all infected devices, up from the 16 per cent estimated in 2019. What’s more concerning is how these figures are translating into real world events. 2021 alone has already witnessed an attack on a water plant in Oldsmart, Florida, which was designed to poison residents’ drinking water. Furthermore, Colonial Pipeline, one of the largest fuel pipelines in the US was also hacked, earlier this year, resulting in major shortages across the country’s East Coast. Security through IoT authentication From weak password protection, a lack of regular patch updates and insecure interfaces, to insufficient data protection, poor IoT devices management and an IoT skills gap, there are plenty of weaknesses existing within the IoT ecosystem, which continue to provide open goals for attackers. To defend against such lethal threats, security-by-design and open standards should be the guiding principles of IoT, working to prioritize security, interoperability and robust, internet-based protocols to mitigate risks. Device authentication and encryption A sound place to start is to make device authentication and encryption the central pillars of your IoT security architecture A sound place to start, in this regard, is to make device authentication and encryption the central pillars of your IoT security architecture. The goal is to be able to prove that each and every device joining a network is not malicious, with tell-tale signs being rogue code, for example. By ensuring each device is uniquely identifiable with digital certificates and therefore, properly authenticated when joining a network, you can ensure no tampered devices are able to infiltrate your overarching network. Using technologies, such as Hardware Secure Element Critically, passwords should be avoided altogether, these vulnerable to being stolen and cracked. And, while a similar vulnerability lies in the fact that all secure devices contain a private key, you can leverage technologies, such as Hardware Secure Element (a chip designed specifically to protect against unauthorized access, even if the attacker has physical access to the device), as an extra layer of defense. Digital certificates are not the only option available in protecting those IoT devices that, if tampered with, could become the cause of physical threats. Physical Unclonable Function (PUF) can also be used to prevent tampering. Physical Unclonable Function (PUF) Through Physical Unclonable Function (PUF), a form of IoT device fingerprint is developed from the unique make up of a piece of silicon, which can be used to create a unique cryptographic key. Unlike digital certificates, a secure infrastructure can be achieved through PUF, without the need for any additional hardware, as the key is not only stored securely, but it also becomes invisible to hackers, when the device is not running. The importance of encryption Use of AES encryption within radio chips, to scramble messages on the move, is the method adopted at Wi-SUN Alliance Now, let’s turn attentions to encryption. The use of AES encryption within radio chips, to scramble messages on the move, is the method that we have adopted here at Wi-SUN Alliance. It’s a means of maximizing data security, but also reducing power consumption in the devices themselves. Beyond AES encryption, it’s also worth considering topography at the design stage. Indeed, mesh networks are advantageous for several reasons. They are more reliable, allowing data to be re-routed, should devices lose contact unexpectedly. Transmissions usually travel shorter distances, which improves power efficiency and performance, and frequency hopping functionality prevents attackers from jamming signals, which could deny the service altogether. Open standards and interoperability But where do open, interoperable standards fit in? As is defined by the European Committee for Interoperable Systems (ECIS), interoperability enables a computer program to communicate and exchange information with other computer programs, allowing all programs to use that information. Open standards then allow any vendor of communications equipment or services to implement all standards necessary, to interoperate with other vendors. This is incredibly useful from a security perspective. It means that all specs are stress-tested and verified by many users, and that any vulnerabilities are quickly detected, and remediated, enhancing security and reliability. Need for open standards Equally, open standards can accelerate time-to-market, reduce costs and ensure products are usable, with a variety of manufacturers’ processors and radios, with a steam of publicly available protocol stacks, design information and reference implementations available that can help build and future-proof secure products. Indeed, large-scale corporate IoT networks alongside smart cities, smart utilities, and other key smart infrastructure will only continue to evolve, in the coming years. With the immense threats of attackers in mind, these systems must prioritize security-by-design, both now and in the future.
The ‘new normal’ was all we heard about when it came to the working model shift after the pandemic hit. Businesses worldwide adopted working from home, and then the hybrid model: a balance of remote work and office work. And according to a recent survey by 451 Research, nearly 80% of organizations surveyed said they have implemented or expanded universal work-from-home policies as a result of COVID-19, whilst 67% expect these policies to remain in place either permanently or for the long-term. With more vacant office spaces, the question is: is hybrid working a red flag for business security? Empty-Office days When buildings and office spaces are still active with advanced technology, equipment and assets on show, yet footfall is not as busy as it once was, opportunistic criminals are closely watching and taking note. But what are they learning? Security systems provider, Expert Security UK, investigates our new normal. Offices are nests for expensive, valuable equipment, with maybe the latest technology Instead of a packed, busy office five or six days a week, hybrid working means more empty-office days, which is music to the ears of burglars. Offices are nests for expensive, valuable equipment, with maybe the latest technology and safes sitting there, or potential stacks of cash or company cards. You may be thinking, well, who leaves company cards or cash out? You’d be surprised, especially when business owners think they’ll never be a victim, or sometimes, staff make mistakes. Hybrid working model And don’t forget, burglars don’t always know what’s been left and will take their chances. And when a hybrid working model is the ‘new normal’, that means a lapse in security - at least in a thief’s mind. So how worried should business owners be? Well, the latest figures are pretty worrying, but also, not massively shocking. Reiterating the temptation and lure the working model shift has on robbers, Statista recorded a 12-year high for robbery offenses in the UK in 2019/2020. When more businesses either shut up shop or sent staff away to home offices, it’s not hard to make a connection. These figures reflect how, when given the opportunity, thieves will strike and take advantage. Handing vital information Whether you’ve decided to go fully remote, it’s crucial to review and rethink your business security However, it’s worth noting that the lockdowns and empty streets would also have played a part in this spike, and now that we’re out of lockdowns with a world back to flipping its sign to ‘open’, many businesses will be carrying on working from home, but towns, shops, and streets are busy again. Whether you’ve decided to go fully remote, or have adopted the hybrid model, it’s crucial to review and rethink your business security, starting with your social media presence. It’s a good idea to review your social media channels. We forget how open we can be on social media, and how our digital presence can actually work as a perfect guide and insight for criminals. All they have to do is follow your channels to pick up on clues. And if you’re not giving it a minute’s thought about what you're putting out there, you may even be just handing them vital information and helping their plans. Remote working shift Of course, there is information readily available such as your opening times, location etc. But, do you really want/need to show off the new, state-of-the-art tablets you’ve just kitted your office out with? It can be hard as a business, or even as a social person, to not want to share positive news on social media, but we really do have to stop and think, especially if people know a lot about the company and its remote working shift. It’s also a good idea to have a meeting with your staff about a social media policy Maybe share a post about that new, intelligent security system you've installed instead. It’s also a good idea to have a meeting with your staff about a social media policy or maybe just a casual chat about best practices, e.g. not to tag the business in a post about their new office gadget etc. Improving business security With fewer office days, you probably won’t need to take up as much work space anymore. Maybe some equipment has become more ornamental. Anything you don’t use or need, you could sell or donate. If you do have expensive equipment lying around that’s not being used, try and make money back from it or store it elsewhere. If you are keeping a lot of expensive equipment in vacant premises, especially fixed equipment and technology, then consider installing bars and shutters over the windows. Whatever your budget, you can improve your business security tenfold with key security measures. One of them being access control. Security gates with access control are incredibly effective at stopping unauthorized people from gaining entry. There are also car park barriers and bollards that are highly effective at keeping any potential getaway vehicles out. easily portable technology High-quality CCTV is a best friend to any business, but you need to be reviewing it frequently High-quality CCTV is a best friend to any business, but you need to be reviewing it frequently, especially if you’ve done a perimeter check and noticed any signs of forced entry or damage. Don’t forget those signs either, let visitors or trespassers know they’re on camera. To fit in with the hybrid working model, static fixtures are becoming redundant. For instance, companies are switching to laptops instead of computers, so that workers can transport them easily to and from the office. This is not only more efficient and convenient, but it means assets are more guarded. It’s the same for any other gadgets. Having easily portable technology is good for business, hybrid working, and security. Don’t forget about your deterrents. Simple signs to warn people of alarms, CCTV, and even the fact that you don’t leave equipment inside overnight can go a long way. Best security technology Thieves are famous for taking their chances. Some will meticulously plan, and many strike at a convenient, opportune time. So having signs in place that show you have high-quality, intelligent security in place can work wonders, making them think twice. It’s also worth noting that you may not have the best security technology in place at the moment, but those on the outside don’t need to know that; they can be fooled. However, having the best physical security in place is vital, as criminals lurk and will take chances. Keep reviewing your security, especially as your business adapts and reshapes - whether you return back to full office days or carry on the hybrid working model. This guest post was contributed by Danny Scholfield, Managing Director of Expert Security UK.
As the number of connected devices increases worldwide, the ways that they are being used, designed, and tested have also expanded. The rise of connected devices is demanding engineers to harness the power of the internet of things, which is expected to hit 28 billion by 2025. A comprehensive approach to device design is needed more than ever to address the challenges that this rapid growth will bring. Why engineers should be using IoT technology in product design The demand for devices designed to use the Internet of Things (IoT) technology is increasing as more industries are finding expanded ways to put them into use. Industries such as healthcare, automobiles, and agriculture are becoming more dependent on cloud capabilities and are therefore in need of new devices able to connect to it. Due to this rise in demand, an increasing amount of devices are delivering a multitude of benefits both to consumers and companies. However, this new wave of products has led to a growing list of challenges for engineers as they are forced to address IoT tech in regards to connectivity, regulations, longevity, and security. Ways to use IoT in the development process Engineers are facing these new challenges along with the normal pressure of deadlines and test considerations. By approaching all of these issues from a comprehensive point-of-view, the solutions become clearer and new device capabilities can be born. Let’s look at the challenges individually as well as possible solutions for them. Improving connectivity IoT enables data to be transferred between infrastructure, the cloud, and devices, making the process smooth Because IoT is based around connection, it’s no surprise that the primary challenge for engineers to overcome is the improvement of connectivity between devices. IoT enables data to be transferred between infrastructure, the cloud, and devices, so making this process as smooth as possible is crucial. The main challenges involved with connectivity have to do with development and product testing while meeting industry standards and best practices. Additionally, many companies lack the necessary equipment and technology to develop new IoT devices, which makes it difficult to create scalable prototypes and test new products. Suggested solutions To address the issue of not having the expertise and necessary tools for testing, we suggest outsourcing the prototyping and evaluation process instead of attempting to tackle this in-house. By doing this, you’re able to free up resources that would otherwise be needed for expensive equipment and qualified staff. Helping comply with regulations When working with devices that are connected across the world, there is a complex web of regulations and conformance standards that can lead to challenges for engineers. The necessity of complying with these regulations while also pushing to meet deadlines can be burdensome and lead to an increase in production time and expenses. Failure to comply with global and regional laws, as well as system and carrier requirements, can lead to fines and costly setbacks. This type of failure can destroy a company’s reputation on top of causing financial losses, often leading to the loss of business. Suggested solutions By testing the IoT device design and components early, engineers can address any pre-compliance issues that may arise. During the early stages of development, we suggest using scalable and automated test systems readily available in the marketplace. Improved communication with other devices New challenges arise as new devices hit the market and existing technologies are redesigned to offer a better experience In the rapidly growing number of connected devices, new challenges will arise as new devices hit the market and existing technologies are redesigned to offer a better user experience. This rapid growth in devices will lead to congested networks leading to the necessity of devices being able to function in the midst of increased traffic and interference. Failure to do this will lead to delayed responses which could prove to be fatal. Suggested solutions The best solution for this issue is found in the evaluation process and supporting test methods that the Institute of Electrical and Electronics Engineers (IEEE) published in the American National Standard for Evaluation of Wireless Coexistence (ANSI). This process addresses the interconnectivity issues present in radio frequency environments. The outlined process involves defining the environment and evaluating the wireless performance of the equipment through thorough testing. An in-depth version can be found in its entirety online. Increasing the longevity of devices IoT devices are being used in vital industries such as healthcare and automotive so battery life and power consumption are two challenges that engineers must take seriously. A failure in this area could potentially lead to loss of life or safety concerns on the road. As new firmware and software are being designed to address these factors, engineers must be implementing them into IoT devices with the ability to be continually updated. Suggested solutions Longevity should be addressed in all aspects of the design process and tested thoroughly using a wide range of currents. By doing this, an engineer can simulate consumer applications to best predict performance. Security Security and privacy are concerns with any technology, but with the use of IoT in medical devices, it’s paramount Security has been a controversial issue for IoT since its inception. Security and privacy are concerns with any technology, but with the widespread use of IoT in medical devices, smart home appliances, and access control and surveillance, it’s paramount. For example, medical devices may store information about health parameters, medications, and prescriber information. In some cases, these devices may be controlled by an app, such as a smart pacemaker, to prevent heart arrhythmias. Naturally, a security issue in these devices could be devastating. Another example of dangerous security concern is with surveillance cameras and access control, such as for home or business security systems. These intelligent door locking systems contain locks, lock access controllers, and associated devices that communicate with each other. Suspicious activities are flagged with alerts and notifications, but if a hacker gains access, it can lead to real-world, physical danger. Security design points Here are some key points for security design: Physical security: IoT devices may be in external, isolated locations that are vulnerable to attack from not only hackers but by human contact. Embedding security protection on every IoT device is expensive, but it’s important for general security and data safety. Security of data exchange: Data protection is also important because data gets transmitted from IoT devices to the gateway, then onto the cloud. With surveillance and access control information or sensitive medical information, and encryption is vital to protecting data from a breach. Cloud storage security: Similar to data exchange, the information stored in medical devices, surveillance and access control systems, and some smart appliances with payment features, must be protected. This includes encryption and device authentication through access control, which can police what resources can be accessed and used. Update: Security vulnerabilities will always occur, so the key to addressing them is having a plan to address errors and release patches. Customers should also have options to secure devices quickly and effectively. Suggested solutions Engineers can include security and protection into IoT devices with early and perpetual testing throughout the design process. Most security breaches occur at endpoints or during updates, giving engineers a starting point for how to address them. Creating more secure devices Ensuring the security of connected devices should be of supreme importance for engineers as these devices are vulnerable to security breaches. The ultimate security of devices goes beyond the scope of engineering as the network and enterprise levels must also be secure to protect against potential threats. However, engineers play a role in this protection as well and should consider device security in the design process. Suggested solutions On a device level, engineers can help protect IoT devices from vulnerabilities by implementing early testing and continuing it throughout the design process. Most security transgressions occur at endpoints so this continual testing can, and should, create barriers to breaches. Regulations and compliance For IoT engineers, the complex web of regulations and compliance standards present new challenges Regulations and compliance surrounding data and technology are nothing new, but for IoT engineers, the complex web of regulations and compliance standards present new challenges. Engineers are already addressing obstacles in security and connectivity, all while meeting deadlines, and working around regulations adds time and expense to the process. Unfortunately, a failure to comply with global, regional, or local laws can lead to setbacks and fines. In addition to time lost in production and possible fines, the damage to a company’s reputation can lead to even more losses. Suggested solutions Compliance should be considered early and often in the design process. In the early stages of development, the IoT device or components can be tested to address and compliance issues. If possible, use a scalable and automated test system. The comprehensive solution As we stare at an uncertain future full of possibilities, it’s clear to see that new challenges will continue to be presented as technology evolves and new innovative devices are designed by engineers. By addressing these issues early and often, solutions can be implemented and problems prevented before they even have a chance to occur thanks to sound engineering and solid design.
Video is an enormous wellspring of unstructured data in the enterprise environment. Finding new ways to use video data requires easy access for analysis. Gone are the days when video was recorded just to be played back later. New computer capabilities can analyze video to provide business intelligence and trends, all of which requires that a lot of unstructured data be captured, stored and kept immediately accessible. It's a driving force for companies specializing in video storage such as Quantum, which is focused on storing and managing unstructured data, including video, photos, music and sound. Managing various analytics “Unstructured data is driving the massive growth in storage today, and video surveillance fits right in there,” says Jamie Lerner, CEO and President, Quantum. As data multiplies in business, matters of storing and accessing the data take on a larger profile. Especially challenging is meeting the need to store and access expanding amounts of unstructured data, such as video. Video is also part of a changing end-to-end architecture in the enterpriseWhereas 10 years ago, video surveillance was all about recording and playback, now the emphasis is much more on an end-to-end approach. In addition to capturing and playing back video, systems have to manage various analytics, archival and data retention aspects as well as recording. Video is also part of a changing end-to-end architecture in the enterprise, including hybrid, cloud and on-premise storage. Video surveillance industry Historically, structured data, such as financial information, was stored to allow future analytics. The same trend extends to unstructured data, such as video analytics. Quantum has expanded its video storage capabilities with acquisition this year of the video surveillance business of Pivot3, provider of a hyperconverged system that provides recording, analysis and seamlessly archives data on a converged platform that is less expensive and easier to manage. In acquiring Pivot3, Quantum is refocusing the smaller company on the video surveillance industry. “We are now focused 100% on surveillance and having the highest quality while being very cost-effective,” says Lerner. “The industry is ready for an IT-forward solution that is totally focused on surveillance. You can’t make a platform all things to all people.” Traditional security customers There is overlap in large stadiums and theme parks, where Lerner sees even more opportunity to expand Pivot3 will also help to expand Quantum’s customer base. The larger company has a history of serving customers in entertainment, movies, television and sports production. The addition of Pivot3’s 500 new customers in large surveillance, transportation and critical infrastructure markets will expand the mix. There is overlap in large stadiums and theme parks, where Lerner sees even more opportunity to expand. Pivot3 also helps to bridge the gap between traditional security customers and the information technology (IT) department. “Pivot3 has a reputation as simple to use,” says Lerner. “My belief is that physical security can run separately [from IT] until you reach a certain size, then IT has to be involved. Pivot3 gives IT people in the security space a product that is well formed and fits into an IT strategy. They are not undertaking a piece of equipment that will be a burden.” Physical security presence Customers expect their infrastructure vendors to provide systems that allow them to “Set it and forget it,” says Lerner. It’s one of the big advantages of cloud computing and also central to Quantum’s approach with their traditional products. “At the end of the day, you want to run a hospital, for example, so you want your systems to be easy to use,” says Lerner. The Pivot3 acquisition will also allow Quantum to expand their physical security presence more broadly and globally. Previously, the geographic reach of Pivot3 was limited by the high cost of placing personnel in diverse locations. Under Quantum, which has been serving global companies for 40 years, the problem disappears. “Quantum has global support on all continents and in more countries,” says Lerner. “It’s a higher level of support, given size and legacy of our organization.”
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex. Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’. CV5S and CV52S AI-powered SoCs The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond. The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing. Faster and ubiquitous AI capabilities Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions" “Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm. John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.” Edge AI vision processors Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive. By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing. 4K multi-imager cameras “However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot. In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation. The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022. Reference boards for camera manufacturers The software on these new SoCs is an evolution of our unified Linux SDK" As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families. “The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot. Better crime detection Detecting criminals in a crowd, using face recognition and/or license plate recognition, has been a daunting challenge for security, and one the new chips will help to address. “Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot. Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution. 4K AI processing on-camera The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analyzed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras. This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and license plates that are hundreds of meters away,” said Jerome Gigot. The advent of on-camera AI at 4K changes the paradigm Enhanced video analytics and wider coverage “Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot. He adds, “So, next-generation cameras will now be able to identify more criminals, faces and license plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.” Deployment in retail applications Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement. The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out. This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics. Use in cashier-less stores Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item. In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking. Updating on-camera AI networks Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames. So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, color, license plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle. If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene. Efficient traffic management With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyze, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.). With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control center. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server. Superior privacy Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video. On Ambarella’s CV5S and CV52S SoCs, the video can be analyzed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy. In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualization. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level. Privacy Masking Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas. “With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.” Physical security in parking lots With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred. With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the license plates of all the cars going in and out, to automatically bill the owners. If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go. Advantages of using edge AI vision SoCs Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.” He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.” He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
Imagine a world where video cameras are not just watching and reporting for security, but have an even wider positive impact on our lives. Imagine that cameras control street and building lights, as people come and go, that traffic jams are predicted and vehicles are automatically rerouted, and more tills are opened, just before a queue starts to form. Cameras with AI capabilities Cameras in stores can show us how we might look in the latest outfit as we browse. That’s the vision from Panasonic about current and future uses for their cameras that provide artificial intelligence (AI) capabilities at the edge. Panasonic feels that these types of intelligent camera applications are also the basis for automation and introduction of Industry 4.0, in which processes are automated, monitored and controlled by AI-driven systems. 4K network security cameras The company’s i-PRO AI-capable camera line can install and run up to three AI-driven video analytic applications Panasonic’s 4K network security cameras have built-in AI capabilities suitable for this next generation of intelligent applications in business and society. The company’s i-PRO AI-capable camera line can install and run up to three AI-driven video analytic applications. The AI engine is directly embedded into the camera, thus reducing costs and Panasonic’s image quality ensures the accuracy of the analytics outcome. FacePRO facial recognition technology Panasonic began advancing AI technology on the server side with FacePRO, the in-house facial recognition application, which uses AI deep learning capabilities. Moving ahead, they transitioned their knowledge of AI from the server side to the edge, introducing i-PRO security cameras with built-in AI capabilities last summer, alongside their own in-house analytics. Moreover, in line with the Panasonic approach to focus more on collaboration with specialist AI software developers, a partnership with Italian software company, A.I. Tech followed in September, with a range of intelligent applications, partially based on deep learning. Additional collaborations are already in place with more than 10 other developers, across the European Union, working on more future applications. i-PRO AI-capable security cameras Open systems are an important part of Panasonic’s current approach. The company’s i-PRO AI-capable cameras are an open platform and designed for third-party application development, therefore, applications can be built or tailored to the needs of an individual customer. Panasonic use to be a company that developed everything in-house, including all the analytics and applications. “However, now we have turned around our strategy by making our i-PRO security cameras open to integrate applications and analytics from third-party companies,” says Gerard Figols, Head of Security Solutions at Panasonic Business Europe. Flexible and adapting to specific customer needs This new approach allows the company to be more flexible and adaptable to customers’ needs. “At the same time, we can be quicker and much more tailored to the market trend,” said Gerard Figols. He adds, “For example, in the retail space, enabling retailers to enhance the customer experience, in smart cities for traffic monitoring and smart parking, and by event organizers and transport hubs to monitor and ensure safety.” Edge-based analytics offer multiple benefits over server-based systems Edge-based analytics Edge-based analytics offer multiple benefits over server-based systems. On one hand, there are monetary benefits - a cost reduction results from the decreased amount of more powerful hardware required on the server side to process the data, on top of reduction in the infrastructure costs, as not all the full video stream needs to be sent for analysis, we can work solely with the metadata. On the other hand, there are also advantages of flexibility, as well as reliability. Each camera can have its own individual analytic setup and in case of any issue on the communication or server side, the camera can keep running the analysis at the edge, thereby making sure the CCTV system is still fully operational. Most importantly, systems can keep the same high level of accuracy. Explosion of AI camera applications We can compare the explosion of AI camera applications to the way we experienced it for smartphone applications" “We can compare the explosion of AI camera applications to the way we experienced it for smartphone applications,” said Gerard Figols, adding “However, it doesn’t mean the hardware is not important anymore, as I believe it’s more important than ever. Working with poor picture quality or if the hardware is not reliable, and works 24/7, software cannot run or deliver the outcome it has been designed for.” As hardware specialists, Figols believes that Panasonic seeks to focus on what they do best - Building long-lasting, open network cameras, which are capable of capturing the highest quality images that are required for the latest AI applications, while software developers can concentrate on bringing specialist applications to the market. Same as for smartphones, AI applications will proliferate based on market demand and succeed or fail, based on the value that they deliver. Facial recognition, privacy protection and cross line technologies Panasonic has been in the forefront in developing essential AI applications for CCTV, such as facial recognition, privacy protection and cross line. However, with the market developing so rapidly and the potential applications of AI-driven camera systems being so varied and widespread, Panasonic quickly realized that the future of their network cameras was going to be in open systems, which allow specialist developers and their customers to use their sector expertise to develop their own applications for specific vertical market applications, while using i-PRO hardware. Metadata for detection and recognition Regarding privacy, consider that the use of AI in cameras is about generating metadata for the detection and recognition of patterns, rather than identifying individual identities. “However, there are legitimate privacy concerns, but I firmly believe that attitudes will change quickly when people see the incredible benefits that this technology can deliver,” said Gerard Figols, adding “I hope that we will be able to redefine our view of cameras and AI, not just as insurance, but as life advancing and enhancing.” i-PRO AI Privacy Guard One of the AI applications that Panasonic developed was i-PRO AI Privacy Guard Seeking to understand and appreciate privacy concerns, one of the AI applications that Panasonic developed was i-PRO AI Privacy Guard that generates data without capturing individual identities, following European privacy regulations that are among the strictest in the world. Gerard Fogils said, “The combination of artificial intelligence and the latest generation open camera technology will change the world’s perceptions from Big Brother to Big Benefits. New applications will emerge as the existing generation of cameras is updated to the new open and intelligent next generation devices, and the existing role of the security camera will also continue.” Future scope of AI and cameras He adds, “Not just relying on the security cameras for evidence when things have gone wrong, end users will increasingly be able to use AI and the cameras with much higher accuracy to prevent false alarms and in a proactive way to prevent incidents." Gerard Figols concludes, “That could be monitoring and alerting when health and safety guidelines are being breached or spotting and flagging patterns of suspicious behavior before incidents occur.”
Security at healthcare premises has never been higher on the agenda. Patients expect safety and privacy. Yet many medical locations must be open and accessible around the clock. The protection of drugs, vaccines, equipment, and data makes it critical to know who accesses where, and when. Mechanical lock-and-key security was not designed to meet these challenges. Wireless locking devices provide the easiest upgrade or replacement for any access system based on mechanical or magnetic locks. Smartcards, programmable keys, or secure mobile keys stored on a smartphone can replace cumbersome physical keys. Online locking systems When access control extends throughout a hospital, healthcare professionals waste less of their valuable time searching for the right key. A personalized credential is pre-programmed to open every door, lock, or store they need to access. A personalized credential is pre-programmed to open every door, lock, or store they need to access For building managers and healthcare agencies, wireless devices make it cost-effective to add electronic control to many more areas of a building. With online locking systems, facility managers monitor and manage premises in real-time, viewing the status of doors, medicine cupboards, and server racks from one software interface. Physical key management Example #1: Upgrading to intelligent physical keys - Physical key management can hinder patient care, as pharmacy nurses at the UK’s Queen Elizabeth Hospital, Birmingham discovered. An older, mechanical system made it difficult to find who held the right keys for medicine stores. Nurses were wasting valuable time searching. Managers identified a better solution: CLIQ® electromechanical locks. With CLIQ, power to each access control lock is supplied by a standard battery inside every key. No wires are required, so this is an easy retrofit solution for doors, cabinets, and drug trolleys. Each employee carries one programmable key to open all authorized locks. “The message from nursing staff is that patients are getting medicines much easier and in a more timely fashion,” says Inderjit Singh, Chief Pharmacist at QE Birmingham. “For us, the key return on investment is the quality of service we’re providing.” Swapping mechanical lock The hospital added secure doors without excessive installation or operating costs Example #2: Integrating hardware to extend access control - Swapping a mechanical lock for a battery-powered device can link another door to an existing access control system. It instantly upgrades security for sensitive offices and drug stores. At the Haute Savoie region’s new hospital, managers selected Aperio locking integrated online with an ARD security system. Because Aperio locks are wireless and integrate easily with any access system, the hospital added secure doors without excessive installation or operating costs. Staff no longer waste time hunting down keys. “Having just a single badge — and not having to carry around heavy keys — has been a major advantage,” says Béatrice Dequidt, Health Executive at CHMS. “We have implemented internal HR management procedures, creating badges that are automatically integrated into ARD's operating software,” adds Alain Gestin, CHMS’s IT Systems Architect. Access control system Example #3: Mobile keys to reducing shared touchpoints - Multiple key systems; varied openings including fire doors, glass doors, offices, pharmacies, car parks, and lifts; hundreds of workers and contractors whose access permissions constantly change. Faced with these challenges, Hospital MAZ, in Zaragoza, upgraded their mechanical locking to a new SMARTair Wireless Online electronic access control system. Because SMARTair Wireless Online updates in real-time via communications hubs, security managers handle everything from the central system. Staff and contractors carry a single smartcard ID, programmed with individual permissions Staff and contractors carry a single smartcard ID, programmed with individual permissions. At any time, hospital managers can upgrade to SMARTair Openow mobile access without changing lock hardware. This option offers contactless entry for employees, who keep mobile keys updated on their own smartphones. "We have achieved all our objectives with the installation of the system,” says Miguel Angel Hernández Jerez at Hospital MAZ. Electronic PIN lock Example #4: Door security without software - In any busy medical facility, it is easy to leave a door unlocked. With expensive equipment or controlled drugs on the other side, any opening invites opportunists. Installing a Code Handle® electronic PIN lock takes the worry away — without the need for any complex installation or software activation. In Spain’s Basque Country, Fylab chose this simple solution for three consulting-room doors. “I am no artist or handyman, but I managed to fit the handles within 10 minutes,” says Fylab founder, Borja Saldias Retegui. Their Code Handle devices secure both wooden and glass doors, keeping equipment and personal belongings safe.
A host of industry-pioneering fire protection solutions from UK manufacturer, Advanced, have been installed to protect approximately 140,000 sq ft of Grade A office space at Westferry House, Canary Wharf. As a cornerstone office building situated at the western gateway to Europe’s largest and most successful business district, Westferry House consists of 11 storeys, complete with its retail promenade on the ground floor. At the core of the active fire protection for the building are six Advanced MxPro 5 fire alarm control panels installed alongside Apollo Soteria multi-sensors. Installing custom-made fire panel Responsible for all aspects of the installation, as well as the future maintenance of the system, are Advanced partners, Pacific Security Systems Ltd. The Kent-based fire and security specialists installed the MxPro 5 fire panels alongside Advanced’s remote-control terminal and repeater panel, TouchControl, to provide a discreet and aesthetically pleasing means of viewing the fire system in the building’s recently refurbished reception area. Advanced’s team was commissioned by Pacific Security Systems to design and manufacture a custom-built annunciator panel Advanced’s AdSpecials team was also commissioned by Pacific Security Systems to design and manufacture a custom-built annunciator panel to control the pressurization and extraction fans and dampers on all floors of the building. The annunciator also integrates with the building’s VA/PA system to provide manual control of messages on all floors. Reliable and user-friendly solutions Kirk Short, Director at Pacific Security Systems, said, “As long-time installers of Advanced with many successful projects, large and small, under our belts, we know its solutions are both reliable and user friendly. The bespoke equipment we required for the fire system upgrade at Westferry House is of an excellent standard, and we found the AdSpecials team very easy to work with throughout the entire design process.” Advanced’s AdSpecials team works with customers requiring bespoke fire panels to design and manufacture unique fire system solutions, whatever the installation challenge. Versatile TouchControl solution Amanda Hope, UK Fire Business Development Manager at Advanced, said, “Canary Wharf attracts some of the World’s most respected and successful companies, and it was fantastic to learn that our solutions have been installed in such a prestigious commercial office space.” “Westferry House is just a stone’s throw from the Landmark Pinnacle – the UK’s tallest residential building – another iconic site protected by Advanced’s MxPro 5 panels. Westferry House is also a fantastic example of where our TouchControl solution comes into its own, providing additional monitoring and control in a sleek and versatile format that complements the building’s stylish reception space.” Touchscreen repeater TouchControl is a high-resolution touchscreen repeater that makes it easy to check fire system status via interactive mapsTouchControl is the low-profile, high-resolution touchscreen repeater that makes it easy to check fire system status via interactive maps and zone plans while harmonizing with a wide range of interiors. When in standby, it can be used to display branding, advertisements, and information, but will instantly revert to fire operation when a fire condition occurs. Advanced, owned by FTSE 100 Company Halma PLC, protects a wide range of prestigious and high-profile sites across the globe – from London’s Shard to Abu Dhabi International Airport and the Hong Kong – Zhuhai – Macau Bridge Fire protection solutions Advanced is a world pioneer in the development and manufacture of fire protection solutions. Advanced’s reputation for performance, quality, and ease of use see its products specified in locations around the world, from single-panel installations to large, multi-site networks. Advanced’s products include complete fire detection systems, multi-protocol fire panels, extinguishing control, fire paging, false alarm management, and reduction systems as well as emergency lighting. Halma is a global group of life-saving technology companies with a clear purpose to grow a safer, cleaner, healthier future for everyone, every day.
Here East is an innovation and technology campus located at the heart of Queen Elizabeth Olympic Park in London, UK. Once the Press and Broadcast Center for the 2012 Olympic Games, it is home to a thriving community of over 4,500 creative, academics, and innovators. Designed as a mini-city, the campus is a mixed-use development that houses offices, retail units, university facilities, cultural exhibitions, and public spaces. Notable tenants include BT Sport, the V&A Museum, Sports Interactive, and the studios of noted choreographer Wayne McGregor. In total, the site offers 1.2 million square feet of flexible space and caters to a wide range of visitors. Modernizing data The previous video management system was still functioning. Yet, Here East’s Head of Security, Leighton Jones, was familiar with the Genetec unified platform and was confident it could deliver more. The advanced capabilities of the Genetec system would enable his team to gain a deeper understanding of the environment, resolve incidents in real-time and ensure a positive user experience. “Here East is a truly iconic location with a diverse list of high caliber visitors and tenants,” explains Jones. “I wanted to be able to say we use the best technology available and in my experience that is Genetec.” Here East has begun a multi-year phased adoption of Genetec solutions, starting with the deployment of Genetec Clearance to modernize data handling and the secure sharing of digital evidence. GDPR compliance Implementation of the EU GDPR has led Here East to revisit its processes for the sharing of video surveillance footage Like many organizations, the implementation of the EU General Data Protection Regulation (GDPR) has led Here East to revisit its processes for the sharing of video surveillance footage. Each time Here East received a validated evidence request, operators burned footage onto physical storage media such as a CD or a USB stick. The process was time-consuming and also created chain-of-custody issues. Here East had no control over how that footage was stored and shared by others. “It wasn’t a situation I was comfortable with,” explains Jones. “We find ourselves needing to share footage internally and externally. We need to retain controls on our data.” Clearance simplifies evidence sharing All digital evidence is now collected, shared, and distributed through Genetec Clearance. The team at Here East can put appropriate safeguards in place to minimize the risk of footage being inappropriately shared or lost. For example, it can specify viewing rights for specific users, set time limits, and revoke access to previously shared footage. The automatic redaction features available within Genetec Clearance have also streamlined the processing of requests for video evidence. Under the terms of the EU GDPR, any citizen can submit a subject access request, with Article 15 of the legislation presenting specific challenges concerning video surveillance. Article 15 states “the right to obtain a copy… shall not adversely affect the rights and freedoms of others.” Video surveillance operators must redact the identities of multiple other third parties in relevant frames of video before footage can be shared. On a busy night, the canalside restaurants and bars on the Here East site can contain 1,000 people in a single camera’s field of view. Before the user had to spend significant time manually redacting the identifies of innocent parties in the footage. With Genetec Clearance, that task is instant and automated. Improved incident reporting capabilities Genetec Clearance has bolstered Here East’s incident analysis capabilities, simplifying the process of reporting back Genetec Clearance has bolstered Here East’s incident analysis capabilities, simplifying the process of reporting back to the senior management. Each month the Here East team runs an automated report breaking down incidents by time, date, and location. It then uses this data to make recommendations surrounding security operations and the deployment of resources. Where it’s applicable they run educational workshops for tenants. For example, phone snatching and bike theft are two of the most common crimes in their London borough. By closely monitoring the data, Here East can take proactive steps to detect, deter, and discourage perpetrators from operating on the Here East site. “It’s all well and good having the data but the most important thing is being able to visualize it, spot the meaningful patterns, and take the right preventative actions,” explains Jones. “Genetec Clearance makes this seamless”. The foundations for future growth Here East is still in the early phases of a long-term rollout with Genetec but is already benefitting from a unified approach to security, digital evidence-sharing, and operations. Further deployments will see the innovative site continue to work closely with Genetec to maximize value, push the boundaries of the technology and exceed the expectations of its tenants. “We’re continuing the legacy of the 2012 Olympics and have ambitious plans for the day-to-day management of this iconic site,” concludes Jones. “Our tenants expect a gold medal standard service and we have no intentions to disappoint”.
Four out of every five (82%) of existing CCTV and video monitoring systems are set to be extended to help keep schools and colleges ‘COVID Safe’, found a new education sector study of 91 education organizations based in the UK, US, Sweden, and Norway, carried out by video security as a service (VSaaS) provider AVA Security in March 2021. Many schools and colleges have already adapted their video monitoring systems to support COVID safety measures. For example, half (50%) of all those in charge of these systems had already adapted their existing video systems to help manage social distancing. A further 34% planned to use their systems for this purpose within the next 6 months. Adopting video monitoring/CCTV technologies The AVA Security Education Sector Trends Report 2021 just out, provides a wealth of data and insight linked to how Operations, Security, and IT directors and managers within educational establishments in the US, Norway, Sweden, and the UK, are adapting their video monitoring or CCTV systems in the wake of the pandemic. Nearly four of every 10 (38%) educational institutions were already using their video monitoring systems to trace all student, staff, and visitor movements in, out, and around their premises and grounds to protect everyone from infection. A further 46% planned to configure these systems for this same purpose within the next 6 months. New COVID Safe-specific video analytics 29% were using their existing video systems to help provide temperature level health checks at some building entrances Nearly a third (29%) was already using their existing video systems to help provide temperature level health checks at some building entrances. A further 43% planned to enable temperature checking via their CCTV systems within the 6 months. Interestingly, 41% had already deployed their video systems for reporting on class or lecture hall occupancy levels and people density levels inside retail areas, dining facilities, and other leisure areas where students congregate. A further 41% said they were planning to add this capability via their video systems over the next 6 months. Mask and face recognition systems Mask detection analytics is also being widely deployed in US and Northern Europe’s schools and colleges: 35% had already deployed video analytics software now available for alerting security staff when teachers or students are inside a building but not wearing a mask. A further 31% planned to deploy mask detection analytics within the next 6 months. However, the Education sector is a more cautious deployer of facial recognition analytics in existing cameras to enable visual identification and contactless access control in the interests of reducing COVID infection via card touch-in gates. Only 22% of schools and colleges have deployed facial recognition to date, although this is set to more than double to 29% over the next 6 months. The biggest challenge of supporting all these changes appears to be paying for them: 31% of those in charge of video monitoring systems had already seen a significant reduction in budgets available for upgrading and improving video monitoring capabilities in the last year. A further 29% had seen a small reduction in budgets over the same timeframe. A further 8% thought fresh budget cuts were likely before the end of 2021. Cybersecurity becomes a key IT priority There has been an increased focus on cybersecurity to protect access to vital data and online learning resources As IT, operations, and security staff have had to run systems as well as teaching remotely during the pandemic, there has been an increased focus on cybersecurity to protect access to vital data and online learning resources. Just in the last few months, the University of Hertfordshire experienced a major cyberattack that led to the shutting down of key online learning apps including Zoom for students enrolled there. Over a third (35%) of educational institutions’ decision-makers questioned thought it ‘very likely that they would need to place a ‘larger focus on cybersecurity for all devices and applications that are networked’ as one impact of the pandemic. A further 48% thought an increased cybersecurity focus was ‘likely’. Linked to this, 27% of directors and managers running video security systems in schools and colleges saw an improvement to the video ‘system’s resilience and back-up systems/procedures’ as a ‘High Priority’ improvement that they needed to implement to protect video data this year, while a further 44% saw it as ‘Somewhat a Priority’. VSaaS selection criteria For the 82% of all education respondents actively considering Video Security as a Service (VSaaS) options right now, there were many criteria determining provider selection. Nearly nine out of 10 net (87%) considering VSaaS in 2021, agreed with the statement ‘It must have very strong cybersecurity, including end-to-end encryption from the camera to the cloud.’ Reduced costs and ease of use The VSaaS selected must also offer a reduction in the ‘Total Cost of Ownership of our video monitoring system’, according to 48% of educational institutions considering migration to VSaaS. Further, 45% of decision-makers questioned insisted on greater ease of use, supporting the statement ‘It must be configurable and operable by non-IT people. While 24% of education sector decision-makers considering VSaaS, said the provider needed not to be headquartered in mainland China. Integration with existing camera systems A net 80% of video monitoring system decision-makers in the education sector also considered it important A net 80% of video monitoring system decision-makers in the education sector also considered it important that the VSaaS selected ‘must allow us to continue using our existing third party cameras which we have already installed, we don’t want to rip & replace any equipment. A net 80% considering VSaaS also confirmed ‘It must allow us to view their directly attached cloud cameras alongside our third-party cameras on the same interface’. Further, the same number of respondents (net 80%) considered it net important (either ‘very’ or ‘quite important’) that the VSaaS ‘must allow us to use our existing Video Management Software (VMS) or provide the same functionality as we get from our VMS’. Video analytics An even higher number, net 84%, regarded it as important that the VSaaS selected ‘must enable us to run the latest video analytics capabilities such as occupancy levels for social distance management (in a room), noise analytics (e.g., breaking glass, screaming, yelling, etc), people and vehicle search, object searching and color searching’. Workspace management technologies Ava Security also found evidence that the education sector is an early adopter of other workspace technologies designed to make it easier for students to manage the use of school and college facilities while minimizing the risk of COVID infection. For example, 52% of educational institutions captured in the Ava study expressed interest in offering staff and students the capability of remote pre-booking of working areas in libraries, classrooms, and lecture halls and pre-registering students via cellphone-ready apps. Nearly four out of every 10 people responsible for managing video monitoring in their school or college (38%) felt remote booking of extra cleaning of surfaces before or after classes would be a useful innovation. Cybersecurity is critical to VSaaS selection Education sector video monitoring system decision-makers are considering VSaaS and weighing up criteria for selection" Vegard Aas, Head of Online Business at Ava Security, commented, “The fact that four out of five education sector video monitoring system decision-makers are already actively considering VSaaS and weighing up criteria for selection is very encouraging." “There is also clearly a strong determination to adapt existing school video surveillance systems to new COVID-safe requirements. And the fact that a third (32%) confirmed that a new budget had already been allocated for moving more services into the cloud this year provides significant scope for optimism as we enhance our VSaaS offering with Ava Cloud Connector for example, which enables those running systems to plug existing third party cameras into Ava’s open Aware Cloud platform.” Video security solutions Ava Security recently launched its Cloud Connector offering to enable video security system owners easy and cost-effective transition of video security solutions to the cloud. This brings Ava’s advanced real-time video analytics and proactive security to existing surveillance cameras by integrating them with Ava’s open Aware Cloud platform. Ava’s Cloud Connector eliminates the need to rip and replace existing video security devices to directly reap the cost and operational efficiencies of a true cloud service.
The Abu Dhabi Global Market Square (ADGMS), located on Al Maryah Island, in the United Arab Emirate’s capital, Abu Dhabi, is a high-profile, architecturally compelling business and hospitality hub. Many of the most globally prestigious companies inhabit the buildings, in the award-winning financial center. Abu Dhabi Global Market Square ADGMS also hosts frequent international dignitaries and large-scale public events, including the Abu Dhabi national New Year’s fireworks display. Abu Dhabi Global Market Square was the first project in the UAE, to achieve LEED Core and Shell (LEED-CS) Gold pre-certification, by the US Green Building Council (USGBC). The Abu Dhabi Global Market Square (ADGMS) consists of: 450,000 sq. m of office space, a lavish retail section and luxury business hotel offerings, 4 Grade-A commercial office towers with 30 floors each, 4 km waterfront promenade, Over 2,000 cameras, and Over 1,000 doors. Unconnected security systems and situational awareness gaps Because of its iconic status, the Abu Dhabi Global Market Square faces many unique challenges to security, including: Political pressure - Because of ADGMS’s status and frequent high-profile international visitors, any disruption to operations - be it natural disaster, activism, terror or other critical events, could cause issues on a national scale. Protection for VIPs - Regular visits from prestigious VIPs, such as sheikhs, the royal family, and global business leaders, elevates security risks and the need for executive protection. Unobtrusive security - ADGMS is a public space with tenanted offices, meaning that security must be robust, but unobtrusive and follow all global data, and privacy regulations. Physical location - Being situated on an island is an extra security risk, complicating the ability to enter and exit the space, during planned and unplanned critical events or emergencies. Architecture - The buildings in ADGMS are mostly glass, with many levels, making it difficult to secure. Previously, a number of systems were deployed to help with security and life safety, such as CCTV, access control, fire detection, and building management. However, these were not connected and left gaps in situational awareness, which ADGMS found unacceptable. In light of the above challenges, ADGMS building managers felt it essential to harden security, across the market square, within these buildings and in connecting areas. Risk intelligence & integrated control of physical assets Martin Grigg, Principal Consultant and Project Lead for PTS Middle East was selected to design and oversee the project Abu Dhabi Global Market Square approached PTS Middle East (PTS Consulting Group Ltd.), a multi-national security and digital transformation consultancy, which carried out the threat, risk and vulnerability assessment, designed the mitigation measures, and provided oversight of the installation and commissioning of the entire system. They were also tasked with ensuring that the system met the operational requirements and was fit for purpose, and proportional to the risks, faced by ADGMS. Martin Grigg, Principal Consultant and Project Lead for PTS Middle East was selected to design and oversee the project, right from concept to completion. Everbridge Control Center deployed Following the assessment, G4S, a British multi-national risk consultancy company, headquartered in the United Kingdom, was selected to deliver the project, based on its experience in helping secure many of the region’s most prestigious locations. G4S is also a global partner with Everbridge, and together, they have secured people, assets and infrastructure for numerous organizations. G4S selected Everbridge Control Center to integrate and manage all the technology, which is coming into their Security Command Centre (SCC). Everbridge Risk Center was also deployed to provide real-time threat intelligence to ADGMS. Critical issues solved by Everbridge technology: Consolidation of four control rooms into one, reducing the office space needed for security - This premium space is now free and able to be re-purposed as rentable office space, Reduction of man guarding costs, as fewer resources are needed to secure the facility, Real-time situational awareness allows for reduced risk, accelerated response times and keeps stakeholders informed, Everbridge Control Center provides event driven, unified interface and automated SOP presentation, Everbridge technology provides flexibility to adapt, as requirements change, Reduction in time taken to identify a security incident and resolve it, Intelligence from the facial recognition systems is proactively used to welcome friends and identify known criminals, Risk intelligence to identify events, such as sandstorms, allows ADGMS to act faster, enabling them to reduce the risk to people and operations, and Automated reporting capabilities save huge amounts of time and resources - A report that took 20 minutes can now be automated in seconds.
Shepherd Communication & Security, a provider of advanced technology solutions for electronic and specialty security systems, and CSI Protect, the exclusive U.S. distributor of SelectaDNA forensic marking technology, announces the first successful use of synthetic forensic technology as a crime-fighting tool in the Northeastern United States. Deploying innovative SelectaDNA technology, synthetic DNA evidence was captured following a larceny at Truman Jewelers in Albany. In that incident, a suspect made off with approximately $4,000 in merchandise. Unbeknownst to him, he was ‘misted’ by a forensic criminal tagging system, which had been installed at the store by Shepherd Communication & Security as part of a pilot crime suppression initiative. Cutting-Edge technology The forensic marking, or synthetic DNA, is applied covertly using a water-based, non-toxic solution that is invisible and remains on a suspect’s skin or clothing for months after being misted, enabling authorities to scientifically and irrefutably identify them long after a crime is committed. In this case, after the alleged perpetrator was apprehended by Albany Police, forensic mist was detected on his person using a special frequency UV light. That evidence is now available to prosecutors as the case proceeds through the legal system. The forensic marking, or synthetic DNA, is applied covertly using a water-based, non-toxic solution “This pilot project was designed to demonstrate the value of forensic marking technology in combatting and deterring crime, and assisting with the apprehension of criminals. Today, we can say definitively that it works,” said Patrick Phelan, Executive Director, New York State Association of Chiefs of Police. “This case is testament to the power of cutting-edge technology, such as SelectaDNA, and the important role it is playing in preventing and fighting crime.” Forensic marking technology “As a downtown business owner for over three decades, I’m committed to creating a safe and secure environment in which my customers can shop and my staff can work with peace of mind,” said Paul Crabbe, Owner of Truman Jewelers. “This technology provides an added layer of protection, and combined with our proactive policies and the professional work of our law enforcement agencies, ensures we can focus on doing business and contributing to our community.” SelectaDNA forensic marking technology has been used in more than 30 countries over the past decade, but has only recently made its way to the United States. The system at Truman Jewelers is the first in the Northeast, but is expected to be joined in short order by entities ranging from retailers to financial institutions seeking to elevate their safety and security protocols. Particular crime scene Each unit of SelectaDNA contains a unique forensic code associated with a specific location Each unit of SelectaDNA contains a unique forensic code associated with a specific location, which can scientifically connect a criminal to a particular crime scene. The criminal tagging system can be activated in numerous ways, including a panic button, money clip, remote video monitoring, intrusion and access control systems and sensors. “Forensic marking technology is poised to revolutionize the way business owners protect their employees, customers, workplaces and assets,” said Richard Ruzzo, Managing Partner of Shepherd Communication and Security of Albany, the exclusive Certified Dealer for SelectaDNA technology in the Northeast. “We’re proud to be on the forefront of delivering this innovative technology to our clients, and to help them create robust security systems that address their number one priority: ensuring safety and security around the clock.” Irrefutably identify criminals “The crime at Truman Jewelers helps demonstrate the capabilities and effectiveness of SelectaDNA technology as we continue introducing this proven crime-fighting tool to the United States,” said Joe Maltese, Executive Vice President of CSI Protect, which is the exclusive distributor of SelectaDNA technology in North America. “We are excited to provide businesses and law enforcement with enhanced abilities to prevent and reduce crime, as well as identify, apprehend and prosecute offenders when a crime is committed.” The primary focus of the technology is crime prevention, with a documented reduction in robbery, burglary and theft by an average of 40 to 86% where it’s deployed. When a crime is committed, the forensic marker enhances law enforcement’s ability to irrefutably identify criminals and items, and link them to a specific crime scene, and date and time.
Round table discussion
We are several weeks into 2021, and it is already shaping up to be an eventful year. The happenings and trends from 2020 will likely carry over into the new year, but in a fast-moving industry such as ours, there will also be additional trends to watch. Looking toward the year ahead, we asked this week’s Expert Panel Roundtable: What will be the biggest security trends in 2021?
What a year 2020 was for the security industry! There were vast challenges that could not have been foreseen at the beginning of the year. It is safe to say that the events of 2020 defied all industry prognosticators. However, is that any reason not to hope our expectations looking ahead to 2021 will be much closer to reality? Can we possibly benefit from looking ahead and trying to plan for the challenges of the year ahead? We asked this week’s Expert Panel Roundtable: What will be the security industry’s biggest challenge in 2021?
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
Protecting Dormitory Residents and AssetsDownload
Protecting Critical Infrastructure Through Facial RecognitionDownload
12 Questions To Ask Your Access Control ProviderDownload
Providing Frictionless Cloud Video Storage as a Service (VSaaS)Download