SecurityInformed.com
  • Products
    Video Surveillance
    • Surveillance cameras
    • Video Surveillance software
    • IP cameras
    • Digital video recorders (DVRs)
    • Dome cameras
    • Network Video Recorders (NVRs)
    • IP Dome cameras
    • Security camera lenses
    Access Control
    • Access control readers
    • Access control software
    • Access control controllers
    • Access control systems & kits
    • Intercom Systems
    • Electronic lock systems
    • Access control cards/ tags/ fobs
    • Access control accessories
    Intruder Alarms
    • Intruder alarm system control panels & accessories
    • Intruder detectors
    • Intruder alarm warning devices
    • Intruder alarm communicators
    • Intruder alarm accessories
    • Intruder alarm lighting systems
    One System, One Card
    One System, One Card
    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    Hikvision AOV 4G Solar Camera Series for Off-Grid Video Security

    KentixONE – IoT Access And Monitoring For Data Centers

    KentixONE – IoT Access And Monitoring For Data Centers

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Climax Technology HSGW-Gen3 Modular Smart Security Gateway

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

    Delta Scientific DSC50 ‘S’ Barrier: Portable, Crash-Rated Vehicle Mitigation Solution

  • Companies
    Companies
    • Manufacturers
    • Distributors
    • Resellers / Dealers / Reps
    • Installers
    • Consultants
    • Systems integrators
    • Events / Training / Services
    • Manned guarding
    Companies by Product area
    • CCTV
    • Access control
    • Intruder alarm
    • IP networking products
    • Biometrics
    • Software
    • Digital video recording
    • Intercom systems
    One System, One Card
    One System, One Card
  • News
    News
    • Product news
    • Corporate news
    • Case studies
    • Events news
    Latest
    • EnGenius AI Cameras Drive Church Security Upgrade
    • Exploring PSIA's PKOC: A Security Game Changer
    • ICT Expands In CEE: Piotr Rek Joins As Sales Director
    • Zimperium Uncovers DroidLock Android Malware
    One System, One Card
    One System, One Card
  • Insights
    Insights
    • Expert commentary
    • Security beat
    • Round table discussions
    • Round Table Expert Panel
    • eMagazines
    • Year in Review 2023
    • Year in Review 2022
    Featured
    • Why Open Matters In The Age Of AI
    • What Are Emerging Applications For Physical Security In Transportation?
    • What Is the Most Overlooked Factor When Installing Security Systems?
    • Amid Rising Certificate Demands, Stricter Compliance And Quantum Threats, PKIaaS Is A Necessity
    One System, One Card
    One System, One Card
  • Markets
    Markets
    • Airports & Ports
    • Banking & Finance
    • Education
    • Hotels, Leisure & Entertainment
    • Government & Public Services
    • Healthcare
    • Remote Monitoring
    • Retail
    • Transportation
    • Industrial & Commercial
    One System, One Card
    One System, One Card
    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    Alamo Colleges Boosts Safety With Alcatel-Lucent OmniSwitch Platform

    HID Mobile Access Enhances University Of Dundee Campus

    HID Mobile Access Enhances University Of Dundee Campus

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    ASSA ABLOY Aperio Wireless Locks At The Camp: Secure & Sustainable

    SBB Secures Perimeters With Hanwha Vision Cameras

    SBB Secures Perimeters With Hanwha Vision Cameras

  • Events
    Events
    • International security
    • Regional security
    • Vertical market
    • Technology areas
    • Conferences / seminars
    • Company sponsored
    Virtual events
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Security Storage
    • Video Management Systems
    • Integrated Systems
    One System, One Card
    One System, One Card
    IFSEC India 2025

    IFSEC India 2025

    Intersec Dubai 2026

    Intersec Dubai 2026

    DIMDEX 2026

    DIMDEX 2026

    DISTRIBUTECH International 2026

    DISTRIBUTECH International 2026

  • White papers
    White papers
    • Video Surveillance
    • Access Control
    • Video Analytics
    • Video Compression
    • Security Storage
    White papers by company
    • HID
    • ASSA ABLOY Opening Solutions
    • Milestone Systems
    • Eagle Eye Networks
    • Software House
    Other Resources
    • eMagazines
    • Videos
    One System, One Card

    One System, One Card

    Aligning Physical And Cyber Defence For Total Protection

    Aligning Physical And Cyber Defence For Total Protection

    Understanding AI-Powered Video Analytics

    Understanding AI-Powered Video Analytics

    Modernizing Access Control

    Modernizing Access Control

About us Advertise
  • Wire-Free Locks
  • AI special report
  • Cybersecurity special report
  • Casino security & surveillance
  • 6

Video surveillance

  • Home
  • About
  • News
  • Expert commentary
  • Security beat
  • Case studies
  • Round table
  • Products
  • White papers
  • Videos
Videonetics AI Video Analytics At Partner Connect 2025

Videonetics AI Video Analytics At Partner Connect 2025

Corporate
Genetec's 2026 Physical Security Trends And Insights

Genetec's 2026 Physical Security Trends And Insights

Corporate
Hanwha Vision PTZ Cameras: AI-Powered Surveillance

Hanwha Vision PTZ Cameras: AI-Powered Surveillance

Product
Secure Logiq's APAC Expansion Via DAS Partnership

Secure Logiq's APAC Expansion Via DAS Partnership

Corporate
Axis Insights: Evolution of Security Ecosystems

Axis Insights: Evolution of Security Ecosystems

Corporate

News

AIoT-Powered Ecosystem Monitoring By Hikvision
AIoT-Powered Ecosystem Monitoring By Hikvision

Water ecosystems, ranging from high-altitude glacial lakes to expansive wetlands, are essential to the planet. These ecosystems regulate the climate, filter pollution, and support rich biodiversity. However, many are located in remote, hard-to-access areas, leaving them susceptible to gradual and often unnoticed degradation. The silent crisis in the blind spots The most significant challenge in protecting these vital waters is the growing gap between the rapid pace of environmental change and our capacity to monitor it effectively. These ecosystems are extremely fragile. According to the Ramsar Convention, wetlands are disappearing three times faster than forests, with 35% lost since 1970. UNESCO also warns that nearly one-third of World Heritage glaciers could disappear by 2050, increasing the risk of floods for downstream communities. At the same time, traditional monitoring methods are hitting physical limits. High-altitude lakes can be shrouded in freezing mist, while wetlands stretch across vast, complex terrain that patrols can only partially cover. Rivers, reservoirs, and coastal waters face their own unique challenges, including fast currents, low visibility, and long stretches with no on-site oversight. As a result, critical “blind spots” exist across many of the world’s vital water ecosystems, causing us to miss timely data needed to prevent poaching, pollution, and ecological hazards. Building an intelligent sensing system for the wild To bridge this gap, AIoT-powered monitoring systems are increasingly being deployed as continuous, low-impact guardians. However, monitoring the wild demands more than just standard equipment—it requires an intelligent sensing system capable of withstanding harsh and unpredictable environments. In remote regions far beyond the reach of power grids, these systems rely on compact, solar-powered setups that allow devices to operate independently for long periods. The hardware is built with industrial-grade resilience, featuring anti-corrosion protection for humid coastlines and marshlands, as well as heating components that keep lenses clear in freezing, high-altitude conditions. Beyond simply surviving the elements, this technology extends human perception. Thermal imaging helps rangers see through fog and darkness, detecting heat signatures without disturbing wildlife. Meanwhile, advanced low-light imaging captures clear detail even when visibility is near zero. Paired with built-in AI, these streams can be analyzed in real-time to identify species, track environmental changes, or flag unusual water conditions, turning raw visuals into actionable ecological insights. From the roof of the world to the Earth’s kidneys This approach to protection is now being applied across many types of vital water ecosystems. Each environment carries its own risks, and innovative technologies are helping reveal changes that were once impossible to detect in a timely manner. In the frozen heights of the Himalayas, the mission is to safeguard the "Asian Water Tower." Here, in a region where electricity is scarce and the wind bites, Hikvision’s solar-powered cameras are standing guard. Designed to withstand sub-zero snowstorms, these rugged devices have captured over 100 terabytes of continuous time-lapse footage. This visual data enables scientists to track glacial melt and water level changes, providing a vital early warning system for downstream communities that depend on these waters for survival. Intelligent video analytics Far below, along the middle reaches of the Yangtze River, the priority shifts to nurturing life. In a national wetland park known as the "Earth’s Kidneys," Hikvision thermal bi-spectrum cameras act as an invisible shield. By using heat sensors to detect illegal fishing and poaching at night, the system avoids the need for bright searchlights that would startle migratory birds. Supported by intelligent video analytics, rangers are instantly alerted to threats, ensuring that this sanctuary remains a quiet and safe haven for nature. By giving these critical ecosystems the ability to “sense” and “communicate,” AIoT technology narrows the distance between people and nature. It helps build the resilience needed to keep the planet’s blue pulse beating for generations to come. Discover more about how Hikvision’s Green Practices are driving a more sustainable future.

IDIS Launches New AI PTZ Cameras With NIR Performance
IDIS Launches New AI PTZ Cameras With NIR Performance

IDIS has launched two new advanced PTZ cameras, providing powerful AI and NIR performance. The extended range offers a broader choice of PTZ cameras to more efficiently cover open areas, in applications including public and communal spaces, commercial offices, schools, logistics centers and warehouses, retail settings, and perimeters. The new NDAA-compliant cameras from South Korea’s largest in-country surveillance manufacturer now include the 4MP AI PTZ (LightMaster) DC-S6481HRA and the Mini 5MP AI PTZ (DC-S4561WRA), which sit alongside the company’s recently launched Edge AI Plus 8MP and 6MP cameras. PTZ model features  Each PTZ model features IDIS Deep Learning Analytics (IDLA), powered by IDIS’s in-house-developed IDIS Deep Learning Engine. Designed to support busy operators and control rooms with more accurate monitoring of activity and events, these functions include AI auto-tracking, which automatically detects and classifies objects in real time, distinguishing between humans, vehicles, and irrelevant background such as shadows, animals, or moving foliage. When a target is detected, the PTZ locks onto it and follows it across its field of view, dynamically adjusting the zoom and angle. Targets can be selected automatically by event triggers or chosen manually using client software. Auto-tracking can be coordinated across multiple cameras, allowing targets to be followed from scene to scene without a break in visibility.  IDIS’s Electronic Image Stabilisation  IDLA further enhances efficiency with automated surveillance functions, including object detection, intruder detection, and loitering detection. In addition, distinguishing between humans, vehicles, and other objects with a high degree of accuracy, the IDIS AI PTZs come with two-way audio and leverage metadata to reduce false alarms, improving the speed and efficiency of investigations and searches, and the export of forensic evidence, while supporting faster incident response and a more proactive approach to threat detection and deterrence.  Both PTZ cameras feature IDIS’s Electronic Image Stabilisation (EIS), reducing blur and maintaining exceptional image quality, even during pan-and-tilt movements and zoom transitions. At the same time, IDIS Smart Failover ensures recording continuity during network interruptions. IP66 environmental ratings The outdoor-ready 4MP AI PTZ (LightMaster) DC-S6481HRA has an NIR night vision range up to 400m and features IK10 vandal-proof construction and IP66 environmental ratings against water, corrosion, dust, and ice, making it an ideal choice for challenging environments across size commercial and industrial settings, perimeters, parking lots, and smaller public surveillance applications. The Mini 5MP AI PTZ (DC-S4561WRA) has an NIR range of up to 100 meters, and its compact, sleek design makes it easy to install in limited-space locations, making it ideal for high-end environments with challenging lighting conditions, enabling discreet yet high-performance AI-powered pan, tilt, and zoom functionality. Benefits of IDIS DirectIP® technology “Our expanded AI PTZ line-up makes it easier than ever to design video surveillance solutions that provide outstanding performance in the widest range of settings,” said Jun-Kyung Sung, Head of the Product Planning Team at IDIS. “And with advanced analytics including auto-tracking, targets can be kept under surveillance, and their movements automatically followed, even at the busiest moments.” The cameras come with all the benefits of IDIS DirectIP® technology, including automatic device configuration enabling hassle-free plug-and-play setup and one-click connection, simplifying cybersecurity during installation and maintenance.

Alarm.com & Everon: Unified Security Solutions
Alarm.com & Everon: Unified Security Solutions

Alarm.com and Everon, LLC, a pioneering security integrator and premier provider of commercial security, video, fire, and life safety solutions, today announced a strategic partnership to deliver a unified console for Everon customers to manage integrated intrusion protection, access control, remote video monitoring, and business management solutions. The partnership reflects the growing demand for integrated commercial security platforms that can easily connect with existing infrastructure while delivering remote management capabilities. The Alarm.com partnership with Everon will enable a scalable solution that meets the sophisticated requirements of commercial customers across diverse business environments, from small businesses to multi-location enterprises. Range of commercial customers “Working with Everon allows us to bring enterprise-grade mobile security capabilities to a broader range of commercial customers who need reliable, integrated solutions," said Dan Kerzner, President of Platforms Business at Alarm.com. "By combining our proven platform technology with Everon's operational expertise, we're creating a unified system that transforms how businesses manage their protection and monitoring needs." “This partnership underscores our dedication to delivering next-generation technology across every aspect of the commercial security experience,” said Don Young, Chief Executive Officer at Everon. “By collaborating with a global technology pioneer like Alarm.com, we’re ensuring that innovation remains at the heart of what we do—empowering enterprises with a transformative platform that redefines how they manage and engage with their security and life-safety systems.” Comprehensive mobile integration The Everon integration leverages Alarm.com for Business' platform to provide a complete mobile security experience, including panel arm/disarm functionality, real-time activity monitoring, user management, and push notification capabilities. The partnership continues to enhance customer value through intrusion management, employee administration, customer service integration, and advanced notification customizations. Advanced video and monitoring capabilities This integration extends across Alarm.com for Business' commercial offerings, including OpenEye for enterprise video surveillance and advanced analytics capabilities that seamlessly integrate with security events for comprehensive incident management. Future development will incorporate remote video monitoring integration and functionality. Enterprise-grade flexibility The partnership addresses the sophisticated needs of Everon's diverse customer base through a scalable platform that supports everything from basic intrusion monitoring to advanced multi-location management. Alarm.com for Business demonstrates its commitment to flexibility by integrating existing control panels with app-based management—modernizing systems without costly infrastructure replacements. For Everon enterprise customers, the platform unifies oversight and control across every level of the organization. Integrated inspection tools, reporting, and real-time technician tracking will drive operational efficiency, with planned future integrations to deliver complete visibility to the order lifecycle. Planned enhancements to the platform also include future integration with Everon’s monitoring and management software suite and order-to-cash tool, empowering customers with real-time visibility, streamlined operations, and faster revenue cycles for smarter service management and a more seamless billing experience.  

Axis Signs CISA Secure By Design For Cybersecurity
Axis Signs CISA Secure By Design For Cybersecurity

Axis Communications, a industry pioneer in video surveillance, announces it has signed the U.S. Cybersecurity & Infrastructure Security Agency’s (CISA) Secure by Design pledge to transparently communicate about the cybersecurity posture of Axis products.    The voluntary Secure by Design pledge of the U.S. government agency, CISA, calls on manufacturers to make the security of customers a core business requirement by addressing seven key aspects of security:   Use of multi-factor authentication  Reduce default passwords  Reduce classes of vulnerabilities  Enable customers to easily install security patches  Publish a vulnerability disclosure policy  Demonstrate transparency in vulnerability reporting  Demonstrate a measurable increase in the ability for customers to gather evidence of cybersecurity intrusions affecting the manufacturer’s products AXIS OS-based network products “CISA’s Secure by Design pledge aligns well with our goal of making cybersecurity a core part of what we offer,” says Johan Paulsson, Chief Technology Officer, Axis. “By making this pledge, we affirm our continuous commitment to helping customers follow cybersecurity best practices and drive greater accountability in the physical security industry.” Outlined below is how Axis addresses the Secure by Design pledge in its product portfolio, ranging from AXIS OS-based network products, video, and device management software, to service offerings like Axis Cloud Connect.  Implementing security in the Axis product portfolio   Reducing the risk of software vulnerabilities is an integral part of Axis software development. Axis developers follow the Axis Security Development Model (ASDM) in order to mitigate security risks throughout the product lifecycle. The security framework, involving processes and tools, also includes strengthening product security through external resources, namely through Axis’ bug bounty programs and enabling people to easily report bugs or vulnerabilities to the Axis Product Security Team. Axis patches and discloses vulnerabilities as a CVE Numbering Authority (CNA), and the company’s published vulnerability management policy outlines what, when and how it works with vulnerability disclosures. The Axis Trust Center serves to provide cybersecurity and compliance information for Axis as a company and for AXIS OS-based network products, and will eventually cover other Axis products and services as well.    AXIS OS-based network products   Axis’ wide-ranging IP-based network devices, from cameras, intercoms, loudspeakers and access control products, are powered by the operating system, AXIS OS. AXIS OS is designed with no default passwords. It supports multi-factor authentication when customers access the devices using centralized identity and access management (IAM).  AXIS OS enables zero-trust networking by default from factory for secure device verification and onboarding. It allows Axis network products to automatically authenticate through IEEE 802.1X with their IEEE 802.1AR-compliant secure device identities. AXIS OS also supports powerful encryption through IEEE 802.1AE MACsec, protecting, at the fundamental level, network protocols like NTP and DHCP that do not offer native security, and double-encrypting secure protocols, such as HTTPS and other TLS-based protocols.   Additionally, AXIS OS-based devices feature hardware-based secure key storage functionality that is certified to FIPS 140-3 Level 3, together with Common Criteria EAL6+.   AXIS Camera Station  Axis’ video management software, AXIS Camera Station Pro and AXIS Camera Station Edge, ensure secure external communications between smartphone, tablet, browser, or PC client, and Axis network cameras through 256-bit AES encryption using Axis Secure Remote Access v2. Communication between client-servers and Axis devices, meanwhile, is secured using 256-bit AES encryption and TLS 1.2 or higher. The software products support multiple user access levels and granular control of different functionalities. AXIS Camera Station Pro enables password protection of devices using local or Windows active directory domain users, while AXIS Camera Station Edge supports two-factor authentication. AXIS Camera Station Pro provides alarm, event, and audit logs, supporting real-time notifications and tracking of system activities, and ensuring accountability.  Axis device management software  Axis offers several dedicated, easy-to-use software for managing edge devices like cameras, audio products, and access control. The device management applications, AXIS Device Manager, AXIS Device Manager Edge, and AXIS Device Manager Extend, help customers cost-effectively perform device software updates and security hardening across thousands of Axis network devices. Other supported functions include automating the lifecycle of TLS certificate provisioning; providing simple device configuration backup and restore capabilities that minimize human configuration error; and managing password changes, HTTPS, IEEE 802.1X and other services on Axis devices.  Axis Cloud Connect   Axis Cloud Connect is an open hybrid cloud platform that enables end customers and integration partners to manage Axis devices. It supports such activities as automatically applying new software updates that would include security patches for Axis network products. Device-to-cloud connectivity is established only through secure communication channels such as HTTPS and WebRTC with TLS 1.2/1.3. It supports single sign-on (SSO) and multi-factor authentication for My Axis accounts, which are used to provide access to services hosted by Axis. Cloud Connect also supports evidence gathering and automatic detection of sensitive cybersecurity activity through automatic tooling and audit log monitoring.  As part of the CISA pledge, Axis is committed to regularly sharing insights and progress into the cybersecurity posture of its products. It enables customers to verify and hold the company accountable, and helps strengthen the trust that customers should have when using Axis products. 

View all

Expert commentary

What’s Behind (Perimeter) Door #1?
What’s Behind (Perimeter) Door #1?

A lot has been said about door security — from reinforced door frames to locking mechanisms to the door construction — all of which is crucial. But what security measures are in place beyond the perimeter door in case the worst happens and it’s somehow breached? Hopefully, many more levels of access control are in place to prevent, or at least slow down, a perpetrator’s ability to compromise protected assets. Additional interior layers Interior security measures must operate as an integrated, multilayered system that eliminates single points of failure. These inner protections safeguard not only the physical infrastructure but also the operational integrity, confidentiality, and availability of the systems housed within. Beyond simply preventing unauthorized individuals from getting inside, the goal is to create a controlled, monitored, and resilient environment in which every movement, action, and access attempt is verified, logged, and, when necessary, challenged. As modern buildings, data centers, and infrastructure sites host critical functions and potentially sensitive intellectual property, these additional interior layers become essential to protecting both organizations and their proprietary assets. Interior security controls One of the most important interior security controls is granular access segmentation One of the most important interior security controls is granular access segmentation. While a perimeter door may verify an individual’s right to enter the building, the interior should treat every room, cage, and corridor as its own security zone. Role-based access control and strict least-privilege principles should limit personnel to only the areas they absolutely require. For example, a network engineer may need access to routing equipment but not storage racks; a janitorial contractor might be allowed into shared hallways but not any equipment rooms at all. These access restrictions should be enforced using intelligent keys, biometric scanners, mantraps, and, at particularly sensitive locations, two-factor authentication. Segmenting access in this way limits the potential damage from a single compromised badge or insider threat and ensures that a single breach does not cascade into a total facility compromise. Low-light and infrared capabilities Biometric authentication within a building adds a layer of confidence beyond perimeter controls. Technologies such as facial identification help prevent the use of stolen, cloned, or borrowed credentials. These systems complement anti-tailgating measures, such as sally ports or mantraps, which ensure that only one authenticated person passes through at a time. Interior surveillance is another essential measure. High-resolution cameras equipped with low-light and infrared capabilities should cover every hallway, door, rack row, and logistical pathway. Camera feeds must be continuously recorded, and retention policies must align with regulatory requirements. Intelligent video analytics, such as motion pattern recognition and heat mapping, enable the detection of atypical behaviors — such as someone lingering near a cage they are not authorized to access or movement at odd hours. Physical tamper-detection mechanisms Cabinet security provides a vital layer of granularity in the access hierarchy, ensuring that even within secure facilities Integrating surveillance with access control systems creates a strong correlation; when someone successfully passes through a secured door and enters a room, the system can track whether the number of people seen on camera matches the number authenticated, and alert security if a discrepancy occurs. However, it is increasingly important that access control not stop at the room level, because the most sensitive assets are often housed in cabinets, racks, or storage units within already-secured spaces. Cabinet security provides a vital layer of granularity in the access hierarchy, ensuring that even within secure facilities, assets remain protected. Physical tamper-detection mechanisms on racks, cable trays, and server chassis add another dimension: they can detect if a panel is opened, a cable is unplugged, or a device is removed without authorization. Secure destruction protocols Another internal measure is the use of secure storage and chain-of-custody procedures for any components that contain intellectual property or personally identifiable information. Hard drives, backup media, and even printouts should be stored in locked cabinets accessible only to people with proper clearance. When decommissioning hardware, secure destruction protocols such as shredding or degaussing should be performed in controlled areas and thoroughly logged. Every movement of sensitive equipment should be traceable, from installation through end-of-life disposal. Such processes reduce the risk of data leakage from improperly discarded or undocumented devices. Consequences of improper behavior Staff should be trained to recognize social engineering attempts, unusual behaviors, and procedural deviations Operational security procedures also contribute significantly to interior protection. Background checks, ongoing employee vetting, and mandatory training ensure that individuals with access to sensitive areas understand their responsibilities and the consequences of improper behavior. Staff should be trained to recognize social engineering attempts, unusual behaviors, and procedural deviations. Maintaining a strict visitor escort policy prevents non-employees from wandering unobserved. All visitors should wear highly visible identification badges and be monitored continuously by authorized personnel. The building's interior should be treated as a controlled environment at all times, not merely a workspace. Continuous auditing and logging form Continuous auditing and logging form another pillar of interior security. Access logs from intelligent keys, biometrics, video, and environmental systems must be stored securely and evaluated regularly for anomalies. Automated systems can flag irregular patterns, such as repeated attempts to access unauthorized areas or entering rooms at odd hours. Manual audits validate that the access control list remains accurate, that no inactive or former employees retain credentials, and that documentation matches reality on the floor. These logs are indispensable during investigations, compliance assessments, and incident response efforts. Interior security controls Security networks should be isolated from the main IT networks to prevent a cyber incident Finally, redundancy and resiliency must be built into interior security controls. Electrical power for access control, intelligent keys, biometrics, and video systems should be backed by secondary sources, generators, or uninterruptible power supplies. Security networks should be isolated from the main IT networks to prevent a cyber incident from disabling physical protections. The goal is to ensure that interior security remains functional even during outages, disasters, or cyber disruptions. Multilayered approach Together, these additional interior measures create a layered defense that makes a secure building, data center, or infrastructure site extremely difficult to compromise. Rather than relying on a single barrier at the entrance, the environment becomes an ecosystem of mutually reinforcing controls — physical, operational, digital, and procedural. This multilayered approach allows structures to maintain high levels of protection even as threats evolve, ensuring that the systems inside remain secure, resilient, and trustworthy.

Scalable Security Storage: From SD Cards To Hybrid Cloud Solutions
Scalable Security Storage: From SD Cards To Hybrid Cloud Solutions

Where and how to store security camera footage usually depends on the scale of the video surveillance project, the way you are using to record the video and how long you want to keep the recordings. If there are only few IP cameras, say 2~3 IP cameras for example, and you don’t need to keep the recordings for the month, usually using SD card which is installed in the camera is enough. Video management software A VMS provides a unified platform to manage all cameras and record footage onto centralized local storage servers If there are more than four cameras, even up to 128 cameras, NVR or CVR become the practical choice for managing and storing recordings reliably. However, if there are hundreds or thousands cameras, which need to managed and recorded, in this way video management software with centralized recording storage becomes essential. A VMS provides a unified platform to manage all cameras and record footage onto centralized local storage servers. S3-compatible cloud platforms Critically, if the VMS supports the S3 object storage protocol, users gain the flexibility to store recordings on S3-compatible cloud platforms (public or private), offering significant hardware cost savings and enhanced scalability. For such demanding environments, selecting a VMS built on an open platform architecture is strongly advised, ensuring the system can expand infinitely to meet future project growth. Video surveillance management system Users can seamlessly add subordinate servers (or disk groups like IPSAN/NAS), disk arrays, and network bandwidth Take the video surveillance management system SVMS Pro as an example. Its foundation is an open 1+N stackable architecture, enabling unlimited expansion of recording storage servers. Users can seamlessly add subordinate servers (or disk groups like IPSAN/NAS), disk arrays, and network bandwidth.  This achieves extended recording durations and boosted storage performance while maintaining system stability during sustained operation (assuming environmental requirements are met). Key architectural advantages Each centralized storage module based on a Linux OS, supports up to 200 front-end video channels per server. Its N+1 stackable expansion capability utilizes a distributed architecture, forming clusters of storage servers. Scaling the project involves simply adding subordinate storage modules – no modifications to existing deployments are required. Seamless S3 object storage integration Furthermore, SVMS Pro features deep integration of the S3 object storage protocol Furthermore, SVMS Pro features deep integration of the S3 object storage protocol. This allows seamless connection to major public cloud services like Alibaba Cloud OSS, Tencent Cloud COS, and Amazon S3 cloud, as well as private S3-compatible object storage solutions. This integration delivers truly limitless capacity expansion, leveraging the inherent elasticity of the cloud to effortlessly accommodate petabyte-scale video growth. Dual insurance: Multi-layered data protection The critical value of security data comes with inherent risks; losing video footage can lead to immeasurable losses. To mitigate these risks comprehensively, SVMS Pro innovates with its "Local + Cloud" Dual-Backup mechanism, leveraging S3 features to build multiple security layers: Real-Time Dual-Writing: Recordings are first written to the local disk (acting as a cache buffer). Upon local persistence, data is simultaneously replicated to cloud-based S3 storage, guaranteeing instant failover if either node fails. Smart Hot/Cold Tiering: Frequently accessed ("hot") data remains on high-performance local storage, while historical footage is automatically archived to low-cost cloud tiers, optimizing storage expenses. Cross-Regional Disaster Recovery: Utilizing the multi-replica and cross-region replication features of carrier-grade S3 storage inherently protects against physical disasters like earthquakes or fires. Additionally, the platform ensures comprehensive data protection through integrity verification and encrypted transmission, safeguarding data integrity and confidentiality across its entire lifecycle – from storage and transmission to access. Conclusion In essence, selecting the optimal storage solution for security footage hinges on a fundamental understanding of scalability requirements, retention needs, and data protection imperatives. As surveillance deployments grow from a few cameras to enterprise-scale systems, the underlying architecture must evolve: Localized storage (SD cards/NVRs) suffices for limited scope and short retention. Centralized VMS platforms become essential for unified management at scale, with open, modular architectures providing critical future-proofing for expansion. S3 object storage integration represents a paradigm shift, decoupling storage capacity from physical hardware and enabling truly elastic, cost-efficient scaling – both on-premises and in the cloud. Ultimately, successful large-scale video surveillance storage relies on architecting for flexibility, embedding data protection intrinsically, and strategically leveraging object storage protocols to balance performance, cost, and resilience – principles essential for safeguarding critical security data now and in the future.

SVMS Pro & AI Edge Boxes: A Unified Intelligent Solution For Cost-Effective, Intelligent Video Management
SVMS Pro & AI Edge Boxes: A Unified Intelligent Solution For Cost-Effective, Intelligent Video Management

Currently, in security surveillance, the application of intelligent analysis technology has two approaches: front-end intelligence and back-end intelligence. Front-end intelligence Front-end intelligence is typically implemented within the video surveillance camera itself, integrating AI edge algorithms into the camera. Its advantages include: acquiring video in real-time and performing video analysis and feedback results immediately. Benefits No consumption of network resources like bandwidth; Offers real-time and highly efficient analysis; Obtains results immediately; relatively low cost; Highly flexible deployment. Disadvantages Due to the small physical size of cameras, hardware expansion space is limited. AI edge algorithms are often confined to a fixed few types, such as perimeter intrusion detection, tripwire, abandoned object detection, etc. It cannot flexibly load customized intelligent functions. The other approach is back-end intelligence, which usually requires installing an intelligent analysis server in the monitoring center, integrating AI edge algorithms into this back-end server.  Advantages: Hardware components can be flexibly expanded based on project requirements, thereby enhancing the server's overall analytical capability. It can also flexibly customize and load various intelligent algorithms according to project needs, capable of loading dozens or even hundreds of algorithms.  Disadvantages: Because back-end intelligence requires first collecting the video stream from the front-end cameras in real-time before analysis, it consumes significant resources like bandwidth. It cannot provide immediate feedback of intelligent analysis results like front-end intelligence, lacks flexible deployment options, and the cost is very high. Development of intelligent analysis technology AI edge analytics boxes have emerged in the security surveillance market, defining another front-end With the development of intelligent analysis technology, AI edge analytics boxes have emerged in the security surveillance market, representing another front-end intelligence product. These boxes themselves can integrate dozens of AI edge algorithms, enriching the variety of AI algorithms available for front-end intelligent cameras while maintaining flexible deployment.  Users can freely choose to deploy the box at the front-end (near the camera) or at the monitoring center end to function as a small intelligent analysis server. Front-end (camera side) When deployed at the front-end (camera side): There is no need to dismantle existing video surveillance equipment. The real-time video stream from the original camera can be analyzed directly within the AI box, and results are fed back. Since the camera and AI box are usually on the same network, this consumes minimal bandwidth resources, offering excellent real-time performance, timeliness, and efficiency. After the AI edge analytics box analyzes the video, the results can be transmitted to the monitoring center video management platform server via the internet, VPN dedicated line, 4G, 5G, etc., for storage, real-time display, and retrieval. Monitoring center end When deployed at the monitoring center end: The AI edge analytics box can function as a small video analysis server. Individual AI analytics boxes can be stacked to aggregate their analytical power, enabling the analysis of large volumes of video streams transmitted from the front-end. Since the cost of the AI edge analytics box itself is significantly lower than that of a full intelligent analysis server, using AI analytics boxes to implement intelligent solutions is often more economical and practical for small to medium-sized intelligent security surveillance projects. AI box application. AI box deployment application Edge AI Box does not require changes to existing video surveillance kit deployments Since the Edge AI Box does not require changes to existing video surveillance equipment deployments and only upgrades the original system to enable intelligent applications for existing monitoring devices, it can save significant labor costs associated with on-site deployment personnel. After the Edge AI Box and AI-powered cameras transmit intelligent analysis results to the platform, what can the platform do? Taking the video surveillance management platform SVMS Pro as an example. SVMS Pro video surveillance management software First SVMS Pro provides centralized management for multiple AI Boxes across diverse networks (LAN, WAN, VPN, 4G/5G). This flexibility enables users to deploy AI Boxes anywhere project requirements demand. With the AI Box and cameras connected to the SVMS Pro video surveillance management software, users can select video channels for analysis. The AI Box automatically analyzes the chosen channels, transmits the results, and triggers alarms back to SVMS Pro. This seamless integration provides a unified platform for users to: Configure event settings Define alarm-triggering actions (such as alarm recording and alarm video pop-up). Alerts originating from the AI Box can trigger video recording via the SVMS Pro platform. These recordings are then stored long-term within the SVMS Pro platform. This capability resolves the limitation of the AI Box itself, which cannot store recordings for extended periods due to constraints imposed by its physical size. Search historical alarm events Manage active alarms View alarm statistics Additionally, SVMS Pro facilitates pushing the analyzed results to third-party platforms via the network. SVMS Pro provide various AI intelligent solutions for different scenarios. AI intelligent solutions for different scenarios AI box + video surveillance management software SVMS Pro provides various AI intelligent solutions for different scenarios. For example: In smart construction site applications, AI box can provide not wearing safety helmet and reflective vest detection, fight detection, area intrusion detection, wandering detection, fire detection, etc., and display real-time results in real-time on SVMS Pro. Users can watch real-time video from different places, store the recordings, playback, get the real-time AI alarms, put the video on the video wall, etc., all in one platform. SVMS Pro and AI Edge Boxes Combined force of SVMS Pro and AI Edge Boxes presents a truly unified and intelligent solution In essence, the combined force of SVMS Pro and AI Edge Boxes presents a truly unified and intelligent solution, effectively overcoming the inherent limitations of both traditional front-end and back-end surveillance intelligence. The AI Edge Boxes deliver powerful, real-time analytics at the edge or as scalable micro-servers, offering unprecedented flexibility and cost-effectiveness – particularly vital for small to medium-sized projects.  SVMS Pro elevates this capability by providing centralized command and control, seamlessly integrating diverse AI Boxes across any network to offer comprehensive video management. Advanced AI surveillance This synergy enables robust features like intelligent event configuration, alarm-triggered recording with long-term SVMS Pro storage, historical event search, and cross-platform integration, all within a single, cost-optimized platform.  From construction sites to broader security networks, this unified solution transforms raw video into actionable intelligence, democratizing advanced AI surveillance by making it accessible, practical, and economically viable. SVMS Pro and AI Edge Boxes together redefine intelligent video management for the modern era.

View all

Security beat

Flock Safety's Drones Revolutionize Security Measures
Flock Safety's Drones Revolutionize Security Measures

Drones are poised to fill long-standing gaps in physical security. Fixed cameras leave blind spots, and human guards cannot quickly cover large or complex properties during high-risk moments. Drones fill the gaps, providing a missing mobile layer, offering unmatched speed, broad aerial visibility, and proactive coverage that elevates security from reactive to truly responsive and deterrent. As an added element in security systems, drones complement fixed cameras, access control, and license plate recognition (LPR) systems by serving as dynamic, rapid-response assets that reach areas other technologies cannot. Integrated with existing alarms and sensors, drones can auto-launch on triggers to deliver near-instant, real-time aerial video for accurate threat verification, giving security teams critical information before taking action. Drones as first responders Drones as first responders (DFR) are a new tool in Flock’s suite of security technologies “Drones are a natural fit for physical security because they provide teams with fast, flexible visibility that fixed cameras and human patrols cannot always deliver, especially on large properties,” says Keith Kauffman, Senior Director of DFR Strategy at Flock Safety. Drones as first responders (DFR) are a new tool in Flock’s suite of security technologies, which includes LPR, video surveillance, and gunshot detection systems. “Drones act as a force multiplier, improving coverage without increasing head count,” says Kauffman. “Scaling is easy with the ability for one pilot to control multiple drones stationed at multiple locations.” Drones as a force multiplier Drones reduce manpower needs by offering wide-area coverage that would normally require several guards or patrol vehicles. Drones boost security team productivity and safety by automating the most dangerous and tedious tasks, such as alarm verification. Acting as a first responder, a drone can clear a significant portion of false alarms, allowing human guards to concentrate on high-priority roles, complex issues, or confirmed intrusions with real-time aerial intelligence. This improves personnel deployment and cuts down workload, risk, and costly overtime. Drones also significantly improve efficiency and safety for security personnel, says Kauffman. A drone system delivers real-time aerial intelligence in seconds, enabling guards to respond wisely and safely. Initial threat verification Some drone systems' yearly costs are similar to a single mid-level guard's salary Some drone systems' yearly costs are similar to a single mid-level guard's salary, but they can cover up to 38 square miles. This investment provides ROI by reducing large-scale losses and allowing human guards to focus on high-touch roles, while the drone handles initial threat verification. Flock Safety entered the drone space after acquiring Aerodome DFR in October 2024, with their private-sector drone as automated security (DAS) system rolling out in Q3 2025. And because the drones plug directly into FlockOS and work alongside other tools like license plate recognition (LPR) and gunshot detection, they can launch automatically on alerts, creating a smarter, faster response workflow. Immediate intelligence to combat false alarms Drones fundamentally change false alarm management by providing security teams with immediate, real-time aerial intelligence. When an alarm triggers, the drone can be dispatched to the exact location in seconds, allowing operators to verify instantly the threat's legitimacy via a live HD or thermal video feed. This capability enables staff to safely clear or ignore false alarms remotely, preventing guards from wasting time and resources on unnecessary, lengthy, or potentially dangerous physical checks. This process can significantly reduce alarm fatigue and allow personnel to reallocate their time to genuine security threats. Emerging drone use cases enhance security operations Emerging drone use cases enhance security operations by integrating with existing systems and enabling novel applications. One key area is Post-Storm Damage Assessment, where drones provide rapid, safe aerial visuals of expansive sites, documenting damage for insurance claims far faster than ground inspections. Another area is Ecosystem Integration via platforms such as FlockOS, where the drone automatically launches in response to alerts from other security sensors (LPR, gunshot detection). This creates a powerful, automated workflow that unifies responses, enabling quicker incident interruption, better evidence capture, and a proactive security posture without increasing the number of human patrol staff. Evolving regulations expanding drone usage Evolving FAA regulations and corporate airspace policies impact the usage of drones Evolving Federal Aviation Administration (FAA) regulations and corporate airspace policies impact the usage of drones. Today, operating drones beyond the visual line of sight (BVLOS), at night, and over-people/roadway operations requires special FAA waivers. However, the trend — Remote ID, expanded FAA Part 107 allowances, and growing BVLOS exemptions proven in drones as first responders (DFR) — reduces overhead and allows more automation. Combined with enterprise standard operating procedures (SOPs), geofencing, and data governance, drone adopters can standardize flights, minimize risk, and integrate with other technologies. “In practice, that means automated dock-based dispatch on verified alerts, scheduled perimeter sweeps, and incident-to-incident coverage without on-site pilots,” says Kauffman. “The results are faster detection-to-dispatch, stronger evidentiary chains, and lower costs per incident — unlocking 24/7 remote operations across campuses, logistics, and sites.” Winning Over Public Acceptance Public perception plays an important role in how communities embrace drone technology, which is why transparency and clear policy are essential. When employees and community members understand the drone’s purpose — responding to alarms, patrolling after hours, and deterring crime — they tend to view it much as they do security cameras or access control: a safety tool, not surveillance. Flock’s system is event-driven, privacy-minded, and used only by authorized personnel, and every flight is logged, documented, and fully audit-traceable for accountability. “With clear communication and responsible use, drones become a reassuring layer of protection rather than a cause for concern,” says Kauffman. Drones are extremely safe, actually reducing human risk by acting as a first responder to scout ahead of personnel. They come with layers of protection, such as geofencing, obstacle avoidance, precision landing, autonomous deconfliction with aircraft, and automated safety modes. Smartest approach For security teams considering adding drones, the smartest approach is to choose a system built specifically for 24/7 security operations. That usually means the drone provider handles FAA paperwork, writes clear procedures, develops sound policy, and trains customers’ staff so everything runs smoothly. “With the right partner, drones become a safe, compliant, and incredibly helpful part of your security toolkit,” says Kauffman. Flock ramps up drone production Flock Safety’s immediate focus is ramping production of its U.S.-designed and assembled Flock Alpha hardware, which is already NDAA-compliant and built to meet the growing demand for American-made drone solutions. At the same time, the next six to 12 months will center on releasing key software updates, such as automated scheduled patrols. Together, increased hardware production and these software advancements will move the DAS product line toward full capability and broader commercial availability. Flock DAS Flock DAS essentially provides a guard’s vantage point from above, with the ability to instantly fly to any corner of a property. “And it doesn’t sleep on duty or call in sick,” says Kauffman. “Picture your traditional security measures: cameras are your static sentries; guards are your roaming patrollers. Now add Flock DAS: it’s your mobile, flying camera that can respond anywhere, anytime.” Just as a dispatcher coordinates police calls, Flock DAS serves as an aerial dispatcher for the security team, triaging alerts and providing eyes on the scene before anyone sets foot into potential danger. It gives the security team immediate, property-wide awareness so they can make safer, more informed decisions during any incident.

GSX 2025 Highlights Security's Rapid Shift To Smart Solutions
GSX 2025 Highlights Security's Rapid Shift To Smart Solutions

There was high-level energy at GSX 2025, befitting an industry undergoing massive change. Artificial intelligence (AI) was everywhere, but not so much in the booth signage. Rather, AI has made its way beyond marketing claims and solidly into the core of the products themselves. There were hundreds of examples of how AI is changing how security systems operate, all for the better. Clearly on display at GSX 2025 was an industry in the midst of metamorphosis.  Deep integration of AI My conversations with companies across the security ecosystem revealed an industry heavily focused on leveraging advanced technologies like AI and the cloud to address increasingly complex global and localized threats. Several key themes emerged at the Global Security Exchange (GSX), sponsored by ASIS International, held Sept. 29–Oct. 1 at the Ernest N. Morial Convention Center in New Orleans, La. Themes I heard repeated throughout the show floor included deep integration of AI, the ongoing shift toward cloud-based and hybrid architectures, and a sharp focus on modernizing security systems to meet current challenges. AI and intelligent automation transform security The use of GenAI is moving beyond simple search functions into real-time decision support Companies are integrating AI and intelligent technologies to enhance analytics, streamline incident response, and improve internal efficiency. The use of Generative AI (GenAI) is moving beyond simple search functions into real-time decision support. For example, Bosch Video Systems introduced a "second tier" to its video analytics capabilities by combining highly sensitive edge detection with GenAI models in the cloud. For example, in visual gun detection, edge analytics might flag a potential gun (yellow), but the cloud-based GenAI then quickly reviews and confirms the threat (red), helping to filter out false alarms. Bosch is also using GenAI for more open-ended searches, such as a "Where's Waldo" application demonstrated at their booth. GenAI-powered system  Eagle Eye Networks says they are focused on helping integrators "organize the AI chaos” through their cloud-based video platform. Their precision person and vehicle detection capabilities work across multiple cameras. Motorola Solutions introduced Inform, an AI-assisted incident response solution designed to bring clarity to the "noise" and help security teams respond to complex threats. They also offer Avigilon Visual Alerts, an on-prem GenAI-powered system that expands the natural language interface. AI internally to improve processes The Body Workforce Mini protects frontline workers and businesses "amid rising violence and theft." The Axon Body Workforce Mini, a small “computer with a lens” for non-police applications, is AI-capable and can perform real-time translations, automated report writing, and summarization, and can even act as a personal assistant by incorporating company policies. All those functions are built into a lightweight body-worn camera designed to safeguard frontline workers in retail and healthcare verticals. The Body Workforce Mini protects frontline workers and businesses "amid rising violence and theft." Beyond products, integration company Everon is using AI internally to improve processes, such as handling commoditized tasks, which they expect will result in better customer satisfaction. Everon wants to be known as a premier service provider and will be introducing new services in the video realm. AI-powered search and continuous system upgrades Genetec prefers the term Intelligent Automation (IA), instead of AI, to describe its empathetic interface, which can "know" what additional information a security professional needs when they click on an image, for example. Genetec says the advantages of the cloud include AI-powered search and continuous system upgrades. Their Security Center SaaS has had a fast and successful launch. It enables cloud-based systems with local storage.  Genetec also highlighted the Cloudlink 210, a cloud-managed appliance designed to unify physical security operations that can be simply plugged in without involving IT staff. They call it a “headless appliance.” Cloud migration and the push for hybrid systems Hanwha debuted OnCAFE (Cloud Access for Everyone), a new cloud-based access control product The industry continues its strategic march toward the cloud, often through hybrid applications that blend on-prem strength with cloud flexibility. Acre's access control is described as "cloud-first technology," and they continue to focus on cloud solutions, incorporating AI. To help customers transition, they offer the "Bridge," a migration tool that allows systems to communicate throughout the move. At the same time, they are continuing to develop and enhance their core on-prem products – DNA Fusion and AccessIt!. Adding access control to supplement their video product line, Hanwha debuted OnCAFE (Cloud Access for Everyone), a new cloud-based access control product. The goal is to provide “access control that is easy;” It works alongside their OnCloud direct-to-cloud VMS as a Service platform. Future of video management The future of video management is increasingly hybrid. Milestone recently completed a three-year process of updating XProtect and building for the future of hybrid applications. At GSX, they showcased how their XProtect Evidence Manager seeks to "democratize evidence management" by collecting video, cell phone data, notes, and other metadata related to a case for easy sharing and prosecution. Also, Milestone’s “app center” enables additional features to enhance XProtect without involving integration.  Milestone is also focusing on "Metadata Ingest," which collects and aggregates data from various manufacturers (including Genetec, Motorola, and Exacq) for use by AI. Strategic modernization and open integration Convergint and Genetec collaborated on a "2026 Technology Modernization Outlook" white paper A key theme for the future is the shift toward open systems and strategic modernization, enabling security professionals to better utilize new technology. Convergint and Genetec collaborated on a "2026 Technology Modernization Outlook" white paper, arguing that dealers and end-users need to think more strategically when buying technology. They predict that "2026 will be the year of modernization," with tangible results including unified intelligence, flexible deployment, and lower total cost of ownership. The call for open standards and architecture was also strong. What AI needs from open systems Johnson Controls noted that cloud, AI, and open standards are its three big focus areas. Their C-CURE IQ 3.10 is gaining adoption as it unifies access and video. OpenEye is seeking to address the "AI disruption anxiety" in the industry, focusing on what AI needs from open systems. The emphasis is on the value of a Model Context Protocol (MCP), an open standard and framework to enable AI systems to integrate and share data with external tools and sources. Addressing shifting global and local threats Allied Universal's "World Security Report 2025" highlights a risen focus on executive protection Companies unveiled solutions targeted at new security concerns, particularly the rising threat of violence, theft, and misinformation. Allied Universal's "World Security Report 2025" highlights an increased focus on executive protection and cites the rise of misinformation and disinformation as the number two threat. They noted that macro trends around instability and the political and social environment are driving security threats globally. To combat physical threats, Shooter Detection Systems introduced a new outdoor sensor, which is now generally available after a favorable feedback period that included an apprehension in one municipality. The company notes the unique challenge of developing technology for a "non-cooperative" threat like a person with a gun, in contrast to most security technologies that are "cooperative" and depend on user compliance. Implementation of integrated security Flock Safety is expanding its focus beyond license plate readers into solutions for retail, with a new initiative to automate and streamline investigative processes, which are often manual. The company also showcased "drones as automated security guards," which can be deployed within 90 seconds to provide "eyes" on a site and enhance safety. The system works on its own network and is firewalled away from the city system A tour of the City of New Orleans' Real Time Crime Center (RTCC), hosted by Axis Communications, demonstrated a mature implementation of integrated security. The RTCC uses Axis cameras, Genetec VMS, and is tied to a Motorola Solutions Command Center to enhance efficiency and effectiveness, operating independently of the police department. They measure success in terms of valuable hours saved in an investigation or even when an event is happening. The system works on its own network and is firewalled away from the city system. Rapidly changing industry on display The GSX 2025 highlights an industry that is moving toward more intelligent and integrated solutions. The investment in AI is shifting security from reactive monitoring to proactive, automated assistance. Throughout the show floor, the continued embrace of hybrid cloud architectures, coupled with an emphasis on open standards and modernization roadmaps, suggests a security ecosystem built for agility and future growth.  These trends, and the GSX show itself, collectively underscore the industry's commitment to delivering scalable, next-generation solutions for a changing threat landscape.

Everon’s New CTO Directs Focus On Video Monitoring And Evolving Technology
Everon’s New CTO Directs Focus On Video Monitoring And Evolving Technology

Ibrahim Kassem, Everon’s new Chief Technology Officer (CTO), has been in the security industry since 1998 in various IT leadership roles. Most recently, he was Chief Information Officer for a video monitoring company. With most of his professional experience rooted in commercial security, Kassem has come to understand how customer needs and demands change with the evolving technology landscape. That understanding is a foundation for his new role at Everon, the national provider of commercial security, fire, and life safety solutions formerly known as ADT Commercial. Integrate AI to security operations “In this role, I am responsible for any customer-facing technology at Everon,” says Kassem. “Our primary focus is to provide a platform that will make it easy to do business with us. That platform will involve most of our solutions, including video monitoring which is the near-future focus for us.” As an integrator, Everon’s objective is to identify the best solutions. “We have partners that we leverage to help develop solutions for our customers that directly respond to their needs,” says Kassem. “For example, we partner with video camera providers to integrate AI to take security operations to the next level.” Demand for video monitoring Everon is looking to shift from reacting to events after they take place toward proactive monitoring Like most security operations, Everon is looking to shift from reacting to events after they take place toward proactive monitoring and preventing crimes as they are happening or deterring them from taking place.  The ability to detect objects and behaviors is possible through AI. “Through this detection, we can respond accordingly – that’s why it’s at the forefront of our video monitoring efforts,” says Kassem. Every pursuit at Everon is in response to customer demand, and there is tremendous demand for video monitoring, says Kassem. Customer needs are the main philosophy behind the development and acquisition of technology, which also ensures that Everon is at the forefront of evolving with the security industry. Video-based security solutions “Right now, we’re noticing a trend towards video-based security solutions versus solely intrusion and guarding,” says Kassem. Everon seeks to strike a balance between “build versus buy.” The integrator prefers to buy when there is a proven product that will bring the most value. “We’re an integrator before we are a developer of technology,” says Kassem. “However, we are not shy about complementing a technology that we purchase with technology that we build if we don’t find the proper platform.” Video monitoring solutions and services Everon continues to evolve in step with ongoing trends, including smarter AI and analytics, smarter cameras Everon continues to evolve in step with ongoing trends, including smarter AI and analytics, smarter cameras, faster internet connectivity, and availability of wireless through 4G, LTE, and 5G connections. All of these are critical pieces of the video monitoring roadmap, says Kassem. “We aim to develop our video monitoring solutions and services to provide the best value to enterprises, reduce false alarms, and focus on relevant activities to save time and money,” he adds. “That’s what we’re looking forward to in the next couple of years.” Dependence on physical security Everon provides video monitoring services on a monthly basis, so the approach plays well with their recurring monthly revenue (RMR) model. Video monitoring is in great demand, and Everon is working towards being pioneers in that space, pushing to make it a major part of their future offerings. Everon is working towards being pioneer in that space, pushing to make it a major part of their future offerings “The dependence on physical security has gotten expensive, and many responding agencies no longer dispatch without video verification, which is the biggest technology challenge currently in the commercial security space,” says Kassem. “Video monitoring is the most direct, effective answer to that challenge, replacing costly, around-the-clock guarding services while also providing video verification for first responders and law enforcement agencies.” Portfolio of security solution offerings Everon roots all its pursuits in responding to the customer. Making the difference in Everon’s approach is an eagerness to listen, an awareness of industry trends and changes, and a full portfolio of security solution offerings.  “Our technological roadmap is ambitious, innovative, and looks to the future through our thoughtful investments in this space, including through acquisitions of technology and top talent,” says Kassem. “All our efforts are supported by our teams of experts with decades of experience.”

View all

Case studies

EnGenius AI Cameras Drive Church Security Upgrade
EnGenius AI Cameras Drive Church Security Upgrade

EnGenius Technologies Inc., a pioneer in advanced connectivity and cloud-managed networking solutions, today announced that Crossroads Church in Rowlett, Texas, has completed a comprehensive security and network modernization project using EnGenius AI cameras, multigigabit switches, and Wi-Fi 7 access points.  The upgrade delivers complete visibility across the church’s 30,000-square-foot facility and 15-acre campus, providing staff, volunteers, and families with unprecedented peace of mind. Rapid Growth Drives Need for Enhanced Safety Serving more than 1,200 members and hosting daily activities including worship services, youth programs, daycare, and community outreach, Crossroads Church faced increasing challenges with its aging surveillance system. The church’s legacy NVR-based surveillance system left numerous blind spots and lacked the clarity, storage, and analytics needed to support a large, active campus. “With ministry happening every day and families trusting us with their children, we needed to be sure we could clearly monitor every part of our campus,” said the church’s Executive Pastor. “Our previous system simply couldn’t keep up.” A Unified EnGenius Solution Crossroads Church partnered with Smart Technology Solutions to implement a full-scale modernization built on EnGenius cloud-managed technology. The deployment includes: 57 EnGenius ECC100 AI surveillance cameras for complete indoor, outdoor, and parking-lot coverage Multi-gig EnGenius ECS2552FP and ECS2528FP switches supporting high-capacity video, livestreaming, and campus-wide traffic 12 EnGenius ECW536 Wi-Fi 7 access points providing fast and reliable wireless connectivity for staff, classrooms, and production teams A single-pane-of-glass cloud dashboard delivering centralized management, real-time monitoring, and instant event review “For the first time, we have total visibility,” said the Lead Pastor. “If something happens anywhere on our property, we can see it, isolate it, and respond immediately. That level of clarity is invaluable.” AI features unlock the future of campus security The church has begun using contextual AI analytics, including event detection, vehicle tracking, and customizable alerts. Over time, leadership plans to expand their use of EnGenius AI capabilities to detect human activity, interpret complex scenarios, analyze movement trends, and enhance after-hours oversight — further improving campus safety. Meet the AI that turns video into insight Ever spent hours scrubbing through video just to find one five-second moment? With EnGenius Cloud AI, those days are over. It eliminates the biggest headaches of traditional surveillance—false alerts, slow investigations, and endless manual review—by delivering real-time intelligence and natural language search. Instead of generic motion notifications, the system interprets what it sees, recognizing behaviors with context so the team receives fewer false alarms and earlier warnings when something seems off. And when it’s time to find footage, there’s no need to dig through timelines—simply enter a description like “person in a red hoodie with a black backpack,” and the system instantly retrieves the precise clips from any camera or location. This smarter, context-aware approach helps staff work faster, respond with confidence, and stay focused on what matters most. More than a camera system, it’s a smart security assistant that makes investigations faster, simpler, and far more effective. Key camera features 5MP HDR Clarity: Sony Starvis sensor ensures clear day-and-night visuals.  Ultra-Wide Coverage: 132° view and 20m IR distance for versatile environments.  8GB eMMC Flash Storage + 4GB DDR4 Memory: Delivers reliable onboard flash storage and efficient multitasking for smooth, stable performance. Built-in Storage, No NVR Needed: ECC100 includes 256GB of reliable onboard storage, supporting continuous and event recording 24/7 for immediate footage access. Durable Build: IP67 weatherproof and IK10 vandal-resistant design.  Cloud Access & Mobile Monitoring: Manage cameras anytime, anywhere.  The next era of intelligent surveillance With the launch of its AI Cloud Surveillance Solution and ECC100 AI Camera, EnGenius once again sets a new benchmark for intelligent security—empowering businesses to stay one step ahead with smarter, faster, and more reliable protection. “What truly sets our system apart is its ability to analyze contextual sequences rather than just single-frame images, enabling preventive alerts before incidents occur,” said Roger Liu, Executive Vice President at EnGenius Technologies. “Whether it’s spotting loitering before theft, flagging escalating conflicts, or identifying fatigued workers on a factory floor, our system helps businesses act before incidents escalate.” Availability The ECC100 is available from EnGenius authorized resellers and distribution partners.

VIVOTEK's Role In Ecological Restoration & Safety
VIVOTEK's Role In Ecological Restoration & Safety

VIVOTEK, the pioneering security solution provider, actively integrates corporate social responsibility into its operations. This year marks the fifth “Safety Map” corporate sustainability event. For the first time, the team extended its efforts beyond urban communities to the natural environment of Zhonggua River in Guoxing Township, Nantou, Taiwan.  Collaborating with the National Chung Hsing University’s (NCHU) University Social Responsibility (USR) team on “Environmental Resilience and Sustainability” and the precision AI agriculture partner DATAYOO, the team launched the “Zhonggua River Ecological Restoration Safety Map” project. VIVOTEK deployed its security solutions to monitor the ecosystem, successfully capturing rare footage of the endangered crab-eating mongoose in its natural habitat. Employees also helped remove invasive species, restore native plants, and construct ecological ponds, embedding sustainability into the company’s core security expertise – extending protection from human safety to habitats and biodiversity. “Returning land to the river:” Reviving the ecosystem After a typhoon in 2004, Zhonggua River’s banks were fortified with high walls and riverbed structures for flood control, which disrupted the ecosystem. Over time, cracks formed, foundations eroded, and exposed steel reinforced the risk. In 2018, Professors Chiou-Rong Sheue and Peter Chesson from NCHU’s Department of Life Sciences began living by the river and advocated a subtraction approach: dismantling walls to “return the land to the river,” balancing flood control with conservation. This effort culminated in 2023 with Taiwan’s first community-initiated river restoration project. Today, the USR team led by Professor Hsu continues ecological monitoring and habitat maintenance, while VIVOTEK contributes technology and manpower through the “Safety Map” initiative, jointly safeguarding the reborn river. Security technology supports restoration through action and care “VIVOTEK uses ‘Concern for Others’ Cares’ as a brand catalyst. During the 2010 Chile mining disaster, our cameras were deployed deep inside the mine to monitor the vital signs of trapped miners, transmitting real-time footage to rescue teams and contributing to the miraculous rescue efforts. In Parks Victoria, Australia, we applied AI solutions to observe seal habitats in Port Phillip Bay, monitoring potential threats such as fishing lines and ropes." "VIVOTEK partnered with the NCHU’s USR team to transform our original commitment to care and social safety into active conservation of the river ecosystem and wildlife, turning technology into a bridge for harmonious coexistence between humans and nature,” said Alex Liao, President of VIVOTEK. Building safe habitats, restoring nature’s vitality Under the guidance of the NCHU’s USR team, VIVOTEK employees observed aquatic insects, native plants, and changes in the river ecosystem, gaining insight into the impact of removing cement embankments on local wildlife. To accelerate ecological restoration, they split into teams to construct ecological ponds and build new homes for the Ayers’ tree frogs using bamboo tubes. At the same time, invasive plant species such as Mimosa pudica, fragrant orchids, and elephant grass were removed, while native species including reed orchids, wild peonies, honeysuckles, purple bead trees, Taiwan mountain laurels, and orange osmanthus were replanted to stabilize the soil and restore riparian vegetation. “Being able to personally contribute to ecological restoration and give back to nature is a source of pride as a VIVOTEKer,” shared Ben, an engineer who has participated in the Safety Map event for five consecutive years. Leveraging big data monitoring to deepen corporate impact “The Safety Map event has extended from neighborhoods, care facilities, schools, and historic settlements to Zhonggua River, engaging hundreds of employees in inspecting sites and proposing safety solutions. Through these efforts, we have expanded the definition of ‘safety’ from simply protecting people to also safeguarding wildlife and habitats, revealing the multidimensional nature of security." "Moving forward, we will continue to promote cross-industry collaboration, using our security expertise as a foundation to amplify social impact and create more inclusive safety values and practices,” said Allen Hsieh, VIVOTEK’s Spokesperson and Director of the CorpComm & Sustainability Office. This year, VIVOTEK further leveraged the expertise of DATAYOO, using its FarmiSpace PRO monitoring service and AI crop monitoring system to analyze various crop indices derived from satellite spectral data. These insights provide the NCHU’s USR team with a scientific basis for their ecological research at Zhonggua River, enabling a data-driven approach to natural habitat restoration and making technology a powerful tool for conservation. Industry and academia join forces to set a benchmark “VIVOTEK Proactively proposed initiatives and involving company employees in hands-on participation are the most powerful ways to implement ecological restoration. Through VIVOTEK’s security expertise, volunteer engagement, and AI-driven long-term ecological monitoring, we have accelerated the restoration of Zhonggua River’s ecosystem, allowing more people to witness the harmony between humans and nature,” said Chiou-Rong Sheue. The habitat restoration efforts have already shown tangible results, with the ecological ponds built by VIVOTEK employees quickly attracting creatures such as pond frogs, dragonflies, water striders, and damselflies. VIVOTEK has emerged as a key driver of environmental restoration through its security technology, demonstrating that safety is not only about protection but also stewardship and shared responsibility, and continues to foster a Safety Map where humans and nature coexist.

Comelit-PAC Video Door Entry At Bridgwater Arts Center
Comelit-PAC Video Door Entry At Bridgwater Arts Center

Comelit-PAC has partnered with Kings Group SW to deliver a bespoke video door entry solution at the historic Bridgwater Arts Center, a Grade I listed building renowned for its architectural and cultural significance. Situated in the heart of Bridgwater, now owned and operated by the Town Council, the Arts Center construction was in 1723 and established on its existing site since 1946 to run a theater program of performance, music and film. Enhancing video security and access To complete a renovation program, the Arts Center worked with Kings Group SW to upgrade its door entry system to incorporate a modular video design. “The Grade I listing of Bridgwater Arts Center means that any changes, however minor, must be carefully planned to protect the building’s historic character,” said Scott Mason, Director of Amenities at Bridgwater Town Council. “We involved our teams in the initial design and specification process to ensure the solution could be installed to seamlessly blend with its surroundings while enhancing video security and access.” Latest security standards Kings Group SW specified Comelit-PAC’s Ultra Door Entry system, a high-definition video intercom solution designed to allow staff to monitor all entry points via high-definition video intercoms, providing real-time visibility and secure access control.  Adam Pitman, Security and Life Safety Systems Supervisor at Kings Group SW, added: “Every aspect of the door entry upgrade had to be approached sensitively. This included routing cables discreetly, installation and ensuring the system met the latest security standards. By choosing Comelit-PAC’s modular system, this could be achieved with minimal disruption to the building’s historic fabric while providing a flexible solution that can be adapted as the Center’s security needs evolve.” Configuration of the door entry solution The Ultra system was selected because its modular design enabled a simple configuration of the door entry solution to meet the specific requirements of the Arts Center. Its 2-Wire and ViP door stations allow a combination of audio, video, and button modules in a compact layout, giving the team flexibility to adapt the system to access points. Tony Berry, Business Development Manager at Comelit-PAC, concluded: “Working closely with Kings Group SW and Bridgwater Arts Center early on allowed us to tailor the solution specifically for this site. By understanding the needs of the team and how the building operates, we were able to deliver a system that functions seamlessly for staff, visitors and performers while integrating thoughtfully into the historic environment.”

ROSA & SARA Enhance Arena Security With AI Technology
ROSA & SARA Enhance Arena Security With AI Technology

Artificial Intelligence Technology Solutions, Inc., a pioneer in AI-driven security and productivity solutions, along with its wholly owned subsidiary, Robotic Assistance Devices, Inc. (RAD), announced that it has received an order for ten ROSA™ units bundled with ten SARA™ (Speaking Autonomous Responsive Agent) licenses for deployment inside a major sports venue in the United States. The new installations will support the arena’s security team with enhanced monitoring, rapid event detection and autonomous voice-driven response throughout interior zones. Evaluating modern security technologies The arena had been evaluating modern security technologies to address persistent trespassing, vandalism and other unauthorized activity across its interior spaces. This order follows a series of assessments in which RAD solutions demonstrated clear advantages in autonomous detection, operator support and rapid on-site response.  The venue is also reviewing additional RAD offerings for broader facility coverage, including ROAMEO™ and RIO™ units for expanded indoor and outdoor protection. How venues can strengthen security “This is an ideal application for ROSA paired with SARA,” said Mark Folmer, CPP, PSP, President of RAD. “These deployments show how venues can strengthen security, improve response times and reduce operating costs with a solution that works around the clock without added staffing.” SARA’s real-time detections ROSA units equipped with SARA, the Company’s multiple award-winning agentic AI platform, will provide continuous event detection, verification and automated voice response, giving on-site staff and remote operators clearer insight into activity across the arena. SARA’s real-time detections and notifications help reduce operator workload, improve situational awareness and ensure that critical events receive immediate attention. This combination allows security teams to focus on higher-value tasks while maintaining consistent coverage. ROSA’s AI-driven security analytics ROSA is a multiple award-winning, compact, self-contained, portable, security and communication solution that can be installed and activated in about 15 minutes. ROSA’s AI-driven security analytics include human, firearm, vehicle detection, license plate recognition, responsive digital signage and audio messaging, and complete integration with RAD’s software suite notification and autonomous response library.  Two-way communication is optimized for cellular, including live video from ROSA’s high-resolution, full-color, always-on cameras. RAD has published seven Case Studies detailing how ROSA has helped eliminate instances of theft, trespassing and loitering at mobile home parks, retail centers, hospital campuses, multi-family communities, car rental locations and construction sites across the country. 

View all

Round table discussion

What Is the Most Overlooked Factor When Installing Security Systems?
What Is the Most Overlooked Factor When Installing Security Systems?

Installing physical security systems requires integrating diverse technologies (e.g., cameras, access control, alarms) that often use different protocols and must be adapted to a building's unique physical layout and legacy infrastructure.  Specialized technical expertise is required for seamless networking and proper configuration. Hopefully, no important factors are overlooked in the installation process. We asked our Expert Panel Roundtable: What is the most overlooked factor when installing physical security systems?

What Are The Advantages Of Installing Security As A Unified Platform?
What Are The Advantages Of Installing Security As A Unified Platform?

Access control, video surveillance, and intrusion detection systems evolved largely independently in the physical security industry. Integrating those systems to the benefit of an enterprise's overall security has traditionally fallen on security integrators working in cooperation with manufacturers. However, today's market has also evolved to include companies that provide "unified platforms,” bringing together various disparate security systems and functions under a single, centralized management interface. We asked our Expert Panel Roundtable: What are the advantages of installing physical security systems as a unified platform?

Is Audio Underused In Physical Security? What Are The Obstacles?
Is Audio Underused In Physical Security? What Are The Obstacles?

The role of audio in physical security is multifaceted and increasingly vital, offering a layer of intelligence and interaction that access control and/or video surveillance alone cannot provide. Sounds provide crucial context to visual events. For instance, someone running might appear suspicious on video, but audio could reveal they are shouting for help, changing the interpretation entirely. Even so, historically speaking, audio has been an underused component in physical security. How is the situation changing? We asked our Expert Panel Roundtable: Is audio an underused component in today’s physical security systems? What obstacles are keeping audio from expanding?

View all

Products

Illustra ADCi610LT-D111 Indoor HD Vandal Resistant IP Mini-dome Camera

Illustra ADCi610LT-D111 Indoor HD Vandal Resistant IP Mini-dome Camera

Hikvision DS-7216HVI-SV 16-channel 960H Digital Video Recorder

Hikvision DS-7216HVI-SV 16-channel 960H Digital Video Recorder

exacqVision IP04-24T-R2A IP 2U Recorder

exacqVision IP04-24T-R2A IP 2U Recorder

exacqVision IP04-12T-Q IP Desktop Recorder

exacqVision IP04-12T-Q IP Desktop Recorder

exacqVision C-Series Standard Live Video Monitoring Station

exacqVision C-Series Standard Live Video Monitoring Station

exacqVision C-Series Pro Live Video Monitoring Station

exacqVision C-Series Pro Live Video Monitoring Station

Illustra ADCi610-D011 Indoor HD Vandal Resistant Mini-dome IP Camera

Illustra ADCi610-D011 Indoor HD Vandal Resistant Mini-dome IP Camera

Illustra ADCi625-P132 IP PTZ HD Indoor Camera

Illustra ADCi625-P132 IP PTZ HD Indoor Camera

exacqVision IP04-18T-R2A IP 2U Recorder

exacqVision IP04-18T-R2A IP 2U Recorder

Illustra ADCi825-F311 5 Megapixel Vandal Proof Fisheye Camera

Illustra ADCi825-F311 5 Megapixel Vandal Proof Fisheye Camera

exacqVision IP04-64T-R4A IP 4U Recorder

exacqVision IP04-64T-R4A IP 4U Recorder

exacqVision IP08-12T-2AW IP 2U Rackmount Network Video Recorder

exacqVision IP08-12T-2AW IP 2U Rackmount Network Video Recorder

exacqVision LC-Series UNA 8/16 PoE+ Port Network Video Recorder

exacqVision LC-Series UNA 8/16 PoE+ Port Network Video Recorder

exacqVision IP04-12T-R2A IP 2U Recorder

exacqVision IP04-12T-R2A IP 2U Recorder

exacqVision IP04-30T-R2A IP 2U Recorder

exacqVision IP04-30T-R2A IP 2U Recorder

View all

White papers

Aligning Physical And Cyber Defence For Total Protection

Aligning Physical And Cyber Defence For Total Protection

Download
Understanding AI-Powered Video Analytics

Understanding AI-Powered Video Analytics

Download
Combining Security And Networking Technologies For A Unified Solution

Combining Security And Networking Technologies For A Unified Solution

Download
Milestone Cloud Deployment Guide

Milestone Cloud Deployment Guide

Download
Maximizing Enterprise Security Systems In The Cloud

Maximizing Enterprise Security Systems In The Cloud

Download
The Power Of Integration In Physical Security Systems

The Power Of Integration In Physical Security Systems

Download
Using Artificial Intelligence (AI) To Automate Physical Security Systems

Using Artificial Intelligence (AI) To Automate Physical Security Systems

Download
2025 Trends In Video Surveillance

2025 Trends In Video Surveillance

Download
Maximizing Security And Performance

Maximizing Security And Performance

Download
Palm Vein Recognition

Palm Vein Recognition

Download
The Key To Unlocking K12 School Safety Grants

The Key To Unlocking K12 School Safety Grants

Download
Selecting The Right Network Video Recorder (NVR) For Any Vertical Market

Selecting The Right Network Video Recorder (NVR) For Any Vertical Market

Download
The Security Challenges Of Data Centers

The Security Challenges Of Data Centers

Download
The Role Of Artificial Intelligence To Transform Video Imaging

The Role Of Artificial Intelligence To Transform Video Imaging

Download
How To Lower Labor Costs When Installing Video Surveillance

How To Lower Labor Costs When Installing Video Surveillance

Download
View all

Videos

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems

Unlock the Future with Abloy Pulse: Keyless, Energy-Efficient Security Systems

Hanwha Customer Stories: Buffalo And Erie County Naval And Military Park

Hanwha Customer Stories: Buffalo And Erie County Naval And Military Park

Top-Of-The-Line Intercom Systems By DNAKE

Top-Of-The-Line Intercom Systems By DNAKE

Dahua Technology's Iftar Initiative 2023: Breaking Bread, Building Bridges

Dahua Technology's Iftar Initiative 2023: Breaking Bread, Building Bridges

View more

Video surveillance: Manufacturers & Suppliers

  • Hikvision Video surveillance
  • exacqVision Video surveillance
  • Seagate Video surveillance
  • Bosch Video surveillance
  • Hanwha Vision Video surveillance
  • Pelco Video surveillance
  • Dahua Technology Video surveillance
  • Honeywell Security Video surveillance
  • Visionhitech Video surveillance
  • LILIN Video surveillance
  • Vicon Video surveillance
  • Panasonic Video surveillance
  • Messoa Video surveillance
  • eneo Video surveillance
  • Axis Communications Video surveillance
  • Vanderbilt Video surveillance
  • VIVOTEK Video surveillance
  • Dedicated Micros Video surveillance
  • AV Costar Video surveillance
  • FLIR Systems Video surveillance

Follow us

Sections Products Video Surveillance Access Control Intruder Alarms Companies News Insights Case studies Markets Events White papers Videos AI special report Cybersecurity special report Casino security & surveillance
Topics Artificial intelligence (AI) Mobile access Healthcare security Cyber security Counter terror Robotics Thermal imaging Intrusion detection Body worn video cameras
About us Advertise About us 10 guiding principles of editorial content FAQs eNewsletters Sitemap Terms & conditions Privacy policy and cookie policy Californian Residents (CCPA)
  1. Home
  2. Topics
  3. Video surveillance
About this page

In-depth coverage of Video surveillance, featuring latest news and company announcements, products and solutions and case studies. Read insightful analysis of product, technology and business trends related to Video surveillance from security industry experts and thought leaders.

Subscribe to our Newsletter

Stay updated with the latest trends and technologies in the security industry
Sign Up

DMA

SecurityInformed.com - Making The World A Safer Place
Copyright © Notting Hill Media Inc. 2000 - 2025, all rights reserved

Our other sites:
SourceSecurity.com | TheBigRedGuide.com | HVACinformed.com | MaritimeInformed.com | ElectricalsInformed.com

Subscribe to our Newsletter


You might also like
One System, One Card
One System, One Card
Understanding AI-Powered Video Analytics
Understanding AI-Powered Video Analytics
Security And Surveillance Technologies For The Casino Market
Security And Surveillance Technologies For The Casino Market
Modernizing Access Control
Modernizing Access Control
Sign up now for full access to SecurityInformed.com content
Download Datasheet
Download PDF Version
Download SecurityInformed.com product tech spec