Intrusion detection
News
In a world where worship places serve as the beating heart of communities, their significance cannot be overstated. Regardless of the religion, sacred spaces are the basics of spiritual worship and practice. The sacred spaces create unity, offer comfort, and also assert the customs of followers. Security in sacred spaces From mosques to churches, temples to synagogues, the security of these sources becomes the top priority; it is the fundamental necessity of religious freedoms for fostering communal tranquility. Hence, this makes it necessary to manage the complexities of those places of worship so that people could be able to worship or just express their spirituality freely without any fear or trepidation. Need for facial recognition The proper functioning of a complex setting is a potential answer to the problems of worship security From cases of vandalism, robbery, and religious hate crimes to terrorist attacks, religious institutions worldwide have seen a wide variety of security threats. Such hostilities not only introduce physical danger to the spiritual seekers but they also disrupt and render prayerful spaces devoid of the peace and harmony they are designed to maintain. Therefore, the proper functioning of a complex setting which is a potential answer to the problems of worship security, and solutions find their way through ‘Facial Recognition Technology’. Augmenting security measures By adopting the power of sophisticated algorithms and biometric analysis, the technology of facial recognition systems brings the possibility of augmenting security measures in a way that would not lead to interferences that might violate the sanctity of the worshiping environments. It has to be appreciated how technology can help to create a more peaceful environment within these holy places when it is applied skillfully and responsibly. Security landscape of places of worship Every religious institution of any denomination, ranging in size and followers, is being traumatized In the past few years, faith communities have been at the intersection of issues that pose a myriad of silting factors that undermine the security and sanctity of these holy places. From metropolises to the quaint countryside, every religious institution of any denomination, ranging in size and followers, is being traumatized by the simultaneous occurrence of security incidents that supersede geographical boundaries and, instead, transcend religious affiliations. Occurrences such as the destruction of symbols of religion, and property, and the desecration of sacred places, thus, leave worshippers feeling victimized and offended. Likewise, thefts, which target precious religious symbols, artistic pieces, or money that has been donated for charity, offer criminals not only material gains but also, importantly, they do affect the trust and goodwill within society. Trespassing is the main issue Globally, trespassing is the main issue that affects temples and gurudwaras. Hinduism also faces issues with burglary, theft, and robbery while Sikhism encounters a significant number of verbal attacks or harassment. However, burglary, theft, and robbery collectively account for crimes in churches, slightly higher than vandalism. In contrast, Islamic institutions face a higher incidence of burglary, theft, and robbery, constituting all incidents in mosques. Religious, racial, or ideological factors The attacks are purported by different religious, racial, or ideological factors regardless of the place of worship Besides these biased crimes that have been happening within or against religious institutions, the most horrifying are those with an anti-religion aim. These wicked incidents, the product of prejudice, exclusion, and radicalism, have cost lives and brought about widespread anxiety and a tangible feeling of uncertainty among the worshippers. These attacks are purported by different religious, racial, or ideological factors regardless of the place of worship. They are a great threat to religious tolerance and eventually strike at the peace and tranquility that worshippers seek within their sacred places. Need to protect religious freedoms In the Asia-Pacific region, 27 of 50 countries (54%) saw religion-related property attacks, while in the Americas, 15 of 35 countries (43%) experienced property damage incidents. In the Middle East and North Africa, properties were targeted in 12 of 20 countries (60%). These sobering statistics emphasize the urgent need for concerted efforts to uphold and protect religious freedoms worldwide. Overcrowding Overcrowding is the cause of the majority of accidents, such as stampedes or falling during pushing During times like religious holidays or special events that are periods of overcrowding, handling a considerable number of people within a limited space of the worship structure could be difficult. Overcrowding is the cause of the majority of accidents, such as stampedes or falling during pushing and shoving between the worshippers. Emotions may become heated, disagreements happen, people may argue over who is sitting where or who is standing where, and these arguments sometimes end up being hard feelings and disputes that tend to disturb the peaceful atmosphere of a place of worship. Political instability and conflicts Political instability and conflicts have both an added dimension of complexity which reflects even more so in regions where religious tensions intersect with political turmoil. Places of worship situated at such locations are more vulnerable to security constraints like targeted violence, forced shutdowns, and various restrictions from the government. In addition, the violence associated with civil disorder increases another dimension of the insecurity of places of worship. While protests and riots are somewhat expected, in most cases, their occurrence is unpredictable and can lead to a disturbance or, worse, chaotic situations. Enhancing worship place security The video management system becomes an indispensable tool in preserving the sanctity Where a sense of safety is lacking, there is a need for greater security to protect places of worship and worshippers, who overwhelmingly would like to see a range of physical solutions. This includes a strategic deployment of an advanced video management system, which serves a dual purpose. Firstly, it provides extensive surveillance of access points, enhancing situational awareness and threat detection. Secondly, with its capability to capture incidents discreetly, including physical attacks and verbal abuse, the video management system becomes an indispensable tool in preserving the sanctity of these sacred spaces while addressing security concerns. Inventive surveillance Nevertheless, the use of facial recognition systems ushers in inventive surveillance and, to some extent, invasiveness of privacy. The utilization of such advanced technologies not only enables existing video management systems to know what has been happening but also puts the identification of persons of interest in a place of prominence, developing the capacity to preempt and deal with any law and order issues. Consequently, the responsiveness of the authorities in this matter is very important in the matter of keeping and guaranteeing the sacredness of these sanctuaries and in improving the general emotional condition of the believers. Integrating facial recognition systems By integrating facial recognition systems, institutions can ensure that only authorized personnel have access In addition to numerous religious institutions, facial recognition technology is used to ensure the security and safety of worshippers. The reasons for implementing the technology may be different but generally involve the worries about increasing insecurity which could manifest as vandalism, theft, or even a terror act targeting sacred places. In Singapore, the alarming surge of 11 police reports regarding thefts at places of worship during the first half of 2023, doubling from the previous year, underscores a pressing need for enhanced security measures. Integrating such technology offers a potent solution for securing donation boxes at places of worship, providing an extra layer of protection for these sacred spaces. By integrating facial recognition systems, these institutions can ensure that only authorized personnel have access to the donation box area, thereby minimizing the risk of theft or tampering. Real-time monitoring Facial recognition systems tailored for use in places of worship boast specific features and capabilities, such as real-time monitoring of entry points, automated identification of suspicious individuals, and integration with existing security infrastructure. This way of implementing a security system in a religious community not only provides the means for enhancing security but also allows for preserving the holiness and openness of the worship places. Instantaneous crowd monitoring The authorities can identify the hot spots for crowds and predict the events that might lead to blockage Facial recognition systems can be applied as an important tool for resolving the crowd problem and processing the civil unrest in places of worship. The authorities can identify the hot spots for crowds and predict the events that might lead to blockage or congestion with the help of facial recognition systems which provide instantaneous monitoring of crowd flows and crowd densities. Furthermore, these systems have the potential to point out those people who could be the ones inciting violence or disseminating unrest. This creates an opportunity for targeted interventions, resulting in tension de-escalations and order-restoration. Perimeter intrusion detection Notably, facial recognition technology could also help officers track the path on which individuals in civil disobedience move, identifying and apprehending suspects who cannot stop themselves from breaking into public stores or other criminal acts, ensuring the safety and well-being of worshippers during times of overcrowding and civil unrest. At a time when all aspects of security seem too big a threat to be overlooked, the combination of facial recognition technology systems with perimeter intrusion detection starts shining with the appearance of a powerful solution. Especially considering such places over history have transformed into landmarks or propagating tourist sites, the conservation strategy offers a sturdy defense against such human activities as well. Alarm activation, threat identification The system calculates a matching score and does a global comparison against the database of registered faces Imagine this: as an individual approaches the perimeter, the cameras with facial recognition systems take a picture of the face in the blink of an eye. In a snap of the fingers, the system calculates a matching score and does a global comparison against the database of registered faces to see whether the individual is permitted to be inside. If the system detects an unauthorized presence doing so will send a signal, stating security personnel or whatever predetermined responses are deemed suitable such as alarm activation. Not only does this fusion of technologies make threat identification more exact, but also provides proper and available responses in a short time that guarantee the security and the sanctity of these sacred areas. Physical security solutions Physical security solutions are essential in enabling regular users of places of worship to feel safe, but the aesthetic considerations of those measures are equally important: while on-site security design must serve to keep trespassers out and help prevent crime, it should also be welcoming and instill a sense of safety. There is a fine balance to be struck between effective security and aesthetics. By fostering ongoing evaluation, community engagement, and ethical reflection, religious institutions can harness the potential of facial recognition technology to create safer and more welcoming spaces for worshippers. Smart decision-making The objective is to seek the balance between security requirements and the values of an open and inclusive system The objective in the end is to seek the balance between security requirements and the values of an open and inclusive system of the practice of the religion where individual rights are truly respected. Joint efforts and smart decision-making, however, guarantee the technology to be utilized as a tool of divine harmony and spiritual nurturing during worship. "In a world where peace is paramount, it's imperative we prioritize not just physical security, but the preservation of sanctity within places of worship. Facial recognition technology, when deployed thoughtfully, becomes a beacon of reassurance," said Sukrit Varma, Global Marketing Partner, APAC & MENA Region, RecFaces. Proactive approach "Facial recognition systems offer a proactive approach to securing places of worship, enabling real-time monitoring of entry points and automated identification of potential threats, while still respecting the sanctity of these sacred spaces," said Valerie Lapteva, Business Development Director, APAC Region, RecFaces. "Implementing facial recognition technology in places of worship presents an opportunity to address overcrowding and civil unrest effectively, allowing for targeted interventions to de-escalate tensions and restore order while ensuring the safety and well-being of worshippers," said Eugenia Marina, Business Development Director, MENA Region, RecFaces.
IDS expands its product line for intelligent image processing and launches a new IDS NXT Malibu camera. It enables AI-based image processing, video compression, and streaming in full 4K sensor resolution at 30 fps, directly in and out of the camera. The 8 MP sensor IMX678 is part of the Starvis 2 series from Sony. It ensures impressive image quality even in low light conditions and twilight. Industrial camera with live AI IDS NXT Malibu can independently perform AI-based image analyses and provide the results as live overlays in compressed video streams via RTSP (Real Time Streaming Protocol). Hidden inside is a special SoC (system-on-a-chip) from Ambarella, which is known for action cameras. An ISP with helpful automatic features such as brightness, noise, and color correction ensures that optimum image quality is attained at all times. The new 8 MP camera complements the recently introduced camera variant with the 5 MP Onsemi sensor AR0521. New software release To coincide with the market launch of the new model, IDS Imaging Development Systems has also published a new software release. Users now also have the option of displaying live images from the IDS NXT Malibu camera models via MJPEG-compressed HTTP stream. This enables visualization in any web browser without additional software or plug-ins. In addition, the AI vision studio IDS lighthouse can be used to train individual neural networks for the Ambarella SoC of the camera family. This simplifies the use of the camera for AI-based image analyses with classification, object recognition, and anomaly detection methods.
Essence Security, a part of Essence Group, a pioneering technology group developing and supplying wireless, cloud-based security solutions for homes and businesses, announced its collaboration with Point Fort Fichet, France’s pioneering locksmith network and a subsidiary of ASSA ABLOY AB. The partnership aims to distribute and implement Essence’s all-encompassing MyShield-connected smoke-generating intruder prevention solution across France. MyShield is available for private properties, retail establishments and small businesses-specifically those dealing with large volumes of tax revenue-to fortify these spaces against intensifying security threats. Enhancing safety protocols Point Fort Fichet will offer Essence’s MyShield system as a complement to its portfolio The rate of break-ins in France rose nationally by 3% in 2023, creating a demand for active intervention security solutions. As the first standalone security smoke device, MyShield is at the forefront of the battle against security threats with its ability to proactively detect and act to ensure swift intervention and minimal risk to property damage. Through this partnership, Point Fort Fichet will offer Essence’s MyShield system as a complement to its portfolio of preventative security solutions, which helps consumers gain control of their security from a smartphone or tablet. Together, Point Fort Fichet and Essence offer customers the ability to take direct action, enhancing safety protocols and providing peace of mind to business owners and residents alike. Direct intervention capabilities “As theft and burglary rates rise, we are excited to partner with Essence Security to provide our customers with direct intervention capabilities to stop intruders in their tracks,” said Frederic Colin, Managing Director of Fichet Division of ASSA ABLOY France. “MyShield complements our high-security offerings by providing property owners, especially those who own small businesses, with an added layer of protection that takes auto-surveillance up a level to auto-action. At Fichet, we aim to address the demand for comprehensive solutions that are redefining the meaning of security, and we’re proud to collaborate with a company like Essence to help us achieve this goal.” Point Fort Fichet customers MyShield feeds Point Fort Fichet clients full tools over their residential and retail properties’ safety MyShield stands out for its intrusion detection and intervention capabilities through security smoke generation. The award-winning, first-of-its-kind device deploys a veil of harmless yet disorienting smoke that fills a room in 30 seconds, forcing intruders off the premises before they can cause harm to people or property. MyShield acts as a ‘first responder,’ significantly narrowing the window of time in which intruders can operate and providing an enhanced level of security to residential and commercial users-particularly advantageous in high-risk environments with lone workers or unoccupied buildings where rapid response is crucial. MyShield provides Point Fort Fichet customers full agency over their residential and retail properties’ security. Comprehensive service "In today's dynamic security landscape where threats are constantly evolving, it's not enough to just passively watch; there must be action and intervention,” said Dr. Haim Amir, CEO and Founder of Essence Group. “Partnering with a security pioneer like Point Fort Fichet ensures home and business owners in the French market will have direct control in protecting their assets. Together we are building on our combined expertise to deliver a comprehensive service that makes properties all over the country safe and secure.” Standalone app-based solution Easy to install, MyShield’s battery-powered system includes an integrated motion detector, high-definition video camera to eliminate false alarms, voice announcement and rapid action remote smoke deployment. It utilizes cellular IoT networks and can be used as a standalone app-based solution or integrated into existing security systems. The low-maintenance device can be easily moved to ensure properties have 24/7 security on demand for reliable protection.
Award-winning global manufacturer of intelligent access control and security solutions, ICT (Integrated Control Technology), is delighted to announce the appointment of Gaurav Mahajan as sales director for the Middle East and India. With an extensive career in the security industry spanning more than two decades, including significant sales leadership roles at Bosch, Pelco, and Optex, Gaurav brings a wealth of experience and a deep understanding of the challenges faced by security integrators. Access control, CCTV, and intrusion Having worked with many conventional security systems, Gaurav has profound knowledge and expertise in Access Control, CCTV, and Intrusion system specification. Thomas Napora, VP and GM for ICT EMEA explains “Gaurav has developed a deep respect and trust in the market throughout his tenure in the Middle East. He has a proven track record of delivering high-end enterprise-level security projects for prestige customers, I look forward to supporting his growth ambitions.” Business development and sales experience Gaurav will play a pivotal role in driving channel growth, fostering strong relationships Expressing his enthusiasm for the new role, Gaurav said, "I am very excited to join the dynamic and growing ICT EMEA team and look forward to utilizing my business development and sales pioneers experience to accelerate the adoption of ICT’s pioneering products throughout the Middle East and India.” In his capacity as Regional Sales Director, Gaurav will play a pivotal role in driving channel growth, fostering strong relationships with integrators, and providing strategic leadership to further elevate his position. Dubai-based satellite office This commitment to local support is echoed by the opening of a new Dubai-based satellite office to act as the hub for daily operations, with technical support staff to be appointed as part of an ongoing growth strategy. Thomas continues “Dubai’s Silicon Oasis is a great place to be, It's the right hub for ICT. "The market wants high-end solutions to protect very large and complex projects, and I believe our offering and experience fit perfectly here.” ICT extends a warm welcome to Gaurav Mahajan as he takes on his new role.
Expert commentary
In the realm of physical security, the distinction between being perceived as a security vendor and a security partner holds great importance. While both may seem interchangeable at first glance, how an organization is viewed by its clients can have a huge impact on the success of its security programs. At the heart of this differentiation is the concept of relationships and how they shape the dynamics between providers and their clients. Time, care, and diligence For security vendors such as systems integrators, security dealers, monitored services providers or manufacturers that sell directly to the end user elevating from supplier to partner requires a greater investment of time, care, and diligence. However, the eventual payoff can be incalculably advantageous to the organization. Not only does this approach better serve the client but it also cultivates longer-term business and is more likely to generate referrals. Clients will change vendors often but stick with partners for the long haul. Simple installation and/or service Security end-users should look to their security products and service providers to partner with them Security end-users should look to their security products and service providers to partner with them, be vested in their success, and be part of the solution. They should seek out and expect more than a simple installation and/or service in the absence of any real, tangible, and value-added relationship with stakeholders. That means looking deeper than the similar cameras or equipment most vendors provide. Doing so brings benefits from the partnership in solving problems and creating strategies for mitigation. Vendors have short shelf lives A security vendor is typically seen as a transactional company that offers products or services to address specific security needs or challenges. When an organization engages with a vendor, the focus is primarily on the exchange of goods and/or services for a fee. The relationship tends to be more transactional, with limited interaction beyond the scope of the security solution being provided. Tools, technologies, or service offerings The relationship between a security vendor and a client is often short with a one-time purchase Security vendors often play a crucial role in the security industry by offering specialized tools, technologies, or services that can help organizations improve their defenses against threats. Examples would be video surveillance, access control, intrusion detection, or fire/life-safety systems, as well as the monitoring of any of them from a central monitoring station or security operations command center. The thing about it is, however, that the relationship between a security vendor and a client is often short with a one-time purchase and limited ongoing engagement or consultation. Partners prove their value On the other hand, a security partner is viewed as a member of the team that works closely with an organization to address its security challenges. Unlike a vendor, a security partner is invested in the long-term success of their clients and is committed to building a strong relationship based on expertise, trust, and transparency. Creating custom solutions Security partners go beyond offering products or services by engaging with companies and organizations Security partners go beyond offering products or services by engaging with companies and organizations to understand their unique security needs, goals, and challenges. They work concurrently with organizations to develop customized security solutions, provide support and guidance, and adapt to ever-changing threats and risks. When this kind of scenario is developed, the potentially distracting and detracting focus on monetary cost moves to the back burner because the value and return on investment (ROI) are so thoroughly compelling. Relationships bring real benefits The core of the difference between being perceived as a security vendor and a security partner hinges on the crucial role of relationships. While vendors focus on transactions and sales, partners prioritize collaboration and a sense of being in it together. Building strong relationships based on trust, communication, and shared goals is essential for forging a successful security partnership. Personalized approach Security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients. They can be reached easily when needed and emphasize a personalized approach with custom-tailored solutions. By building strong relationships based on respect and understanding, security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term. Operational opportunities Businesses and facilities often encounter or face very specific security needs that can only truly be solved in concert with a vendor that essentially acts like an extension of the end-user organization. Furthermore, when communicating and collaborating on that level, additional security/safety and sometimes even operational opportunities for improvement come to light. This amplifies the value for both the end customer and their security vendor. Talk about a win-win! Prosper with partner power While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment At the end of the day, the difference between being a security vendor and a security partner is not merely a matter of semantics. It is about the fundamental difference in approach and mindset toward physical (electronic and networked) security. While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment to reducing losses and crime. Quality of relationships Ultimately, it is the quality of relationships that separates providers in the security space and determines the success of security initiatives in the current rapidly changing security landscape. This unification of intent, practice, and purpose enables practitioners and the public alike to harness the full power of pioneering-edge technologies that support the security industry’s core mission of protecting people and property. Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients.
Misconceptions about AI and analytics in video security are common due to the rapid evolution of the technology and varying levels of understanding. Artificial Intelligence (AI) and analytics are increasingly used as interchangeable terms when discussing video security cameras. AI v/s analytics While there is some overlap, it is important to articulate the differences between them when speaking to stakeholders or customers. As the myriad types of AI gain more prominence in the global dialog and privacy concerns are increasingly raised, security professionals need to take extra care to educate executives and management in any organization so that they can, in turn, represent the company's use of AI tools accurately. AI and analytics in video security Security cameras use subsets of AI, namely machine learning and deep learning, to recognize and classify objects The intent of this article is not to do an academic deep-dive on either AI or analytics, but instead to position each discipline as it relates to modern AI-based video security. The goal is to educate operations and management about the use of AI in video surveillance to support informed decision-making across the organization. It’s worth mentioning that while AI is often used as a catch-all term, security cameras use subsets of AI, namely machine learning and deep learning, to recognize and classify objects. Misconceptions Here are four common misconceptions about AI and analytics: Misconception #1: AI and analytics are the same People often confuse AI with analytics, but they're distinct. AI is used in the video industry to enhance analytics and analysis capabilities. The technique involves the use of machine and deep learning algorithms to recognize or classify known objects like a person or vehicle. AI can further detect unique attributes of objects such as the color of clothing, or additional objects that are carried or worn such as backpacks or glasses. Object detection The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviors Analytics, on the other hand, refers to the process of analyzing what the detected object is doing. The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviors. Is a vehicle traveling left or right in the camera’s field of view, possibly going the wrong way down a one-way street? Did it enter a restricted zone? Should a car arrive in this area at 3 a.m.? These are basic binary (yes/no) analytic tasks. Ascertaining whether two people are fighting or if someone is shoplifting is a more nuanced analysis that requires a sophisticated AI algorithm capable of considering multiple data points before alerting staff to suspicious behavior. Addressing false positives with AI-assisted analytics Before AI-based object detection, analytics were prone to false positives any time the lighting changed (a passing cloud could change the pixels). Working together, AI and analytics have largely solved the issue of false positives for the objects they recognize. On a properly installed camera, AI-assisted analytics can issue proactive alerts or search through hours of footage for humans or vehicles with specific attributes incredibly quickly. AI adds classification and behavior information to raise the overall accuracy of analytics and analysis. AI can also be used to enhance image quality in cameras, so there are many other ways it can be utilized. Misconception #2: AI can operate autonomously and replace security personnel AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events While AI can enhance surveillance and response, the nuanced understanding and decision-making capabilities of humans are still crucial in most scenarios. AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events that may warrant attention, but the decision on how to act still firmly rests with the operator. This increasingly ‘intelligent’ assistant represented by AI helps security teams focus on what matters in an increasingly complex world, but it’s a team effort. And while AI’s capability to operate autonomously will surely improve, it’s hard to imagine a world in which it would be wise to let it make important decisions without human oversight. Misconception #3: AI-based security cameras are invading the privacy Safeguarding personally identifiable information (PII) is a critical responsibility of any organization. Because of the prevalence of data breaches, everyone is keenly aware of the risks of PII ending up in the wrong hands. For video security systems, it’s essential to realize that the descriptive metadata an AI-based camera captures is composed of anonymous data about the humans it detects. Attributes such as the color of clothing and whether a person is carrying a backpack or wearing a hat are certainly not sufficient to identify anyone personally. And while there may be grey areas with some AI systems that attempt to classify gender and age, they are still not identifying a specific person. Facial recognition Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques Most importantly, AI does not equal facial recognition. Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques, facial recognition has had its separate evolution distinct from AI. Facial recognition has privacy implications, while most AI implementations do not. AI-based detection Additionally, AI-based detection of humans and vehicles typically happens “on the edge”, processed within the camera itself, while facial recognition almost always requires a separate VMS/server application and database to function. So, AI-based cameras don’t, by themselves, do facial recognition. Misconception #4: AI can learn anything on its own AI-based algorithms are only as good as the training they’ve received While AI can significantly enhance video surveillance capabilities, the machine and deep learning algorithms are not infallible. They require human oversight to manage false positives and interpret complex situations. AI-based algorithms are only as good as the training they’ve received. For example, human and vehicle detection algorithms have been carefully trained by R&D departments in laboratory settings with hundreds of thousands, if not millions, of representative images. This is why they can be very accurate when installed correctly. AI ‘on-site learning’ cameras For AI-based systems to truly learn to recognize something, they must also be informed when they get something wrong. This type of training usually occurs under the supervision of experienced AI developers. Recently, new AI ‘on-site learning’ cameras have become available. These can be trained by operators to recognize unique, customizable objects such as forklifts, shopping carts, airplanes, logos on vehicles, or any object an organization might want to track or count. These systems must also be trained to be accurate. Intelligent training application AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives A typical on-site training challenge would be to capture an object in every lighting condition. To overcome this, forward-thinking vendors include an intelligent training application that automatically generates additional images across a range of luminance values, saving operators substantial time and effort while increasing accuracy. AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives. Conclusion Understanding these misconceptions is crucial for making informed decisions when implementing AI and analytics in video security systems and gaining consensus from stakeholders. As AI becomes ubiquitous across industries, it has the potential to lose its true meaning, particularly because we are only scratching the surface with machine and deep learning applications. AI’s current capabilities and limitations Most importantly, we have to help educate all of our constituents that AI and analytics are not the same It’s also important to recognize that general (or strong) ‘AI’ does not yet exist. This is the ability of a machine to do any intellectual task a human can do. However, the marketing ship has long since sailed, so the best we can do is stay informed about AI’s current capabilities and limitations. Most importantly, we have to help educate all of our constituents that AI and analytics are not the same. AI does not equal facial recognition. Nor does it replace the need for human oversight. AI-based technology AI is a long way from non-structured, comprehensive learning and decision-making in a way humans would describe as ‘intelligent.’ With those caveats in place, the current AI-based technology functions as a fantastic assistant for security teams helping them to better protect people and property.
With the rise of organized retail crime (ORC) making headlines, retailers are grappling with the dual challenge of safeguarding both their staff and store assets, while addressing the economic pressures that impact profitability and consumer demand. RFID technology The key lies in identifying effective solutions to counter the current surge in ORC, enabling retailers to secure their vulnerable staff and protect inventory for paying customers. Technology plays a crucial role in supporting brands on this mission, with RFID technology continuing to be a valuable solution. It aids retailers in gaining better control over retail crime, leveraging inventory data. The ongoing surge in retail crime Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector Seen as a global issue, the British Retail Consortium recently reported that incidents of theft have increased by 27% across 10 of the largest cities in the UK, with some cities reporting up to a 68% increase. In the US, retailer Target reported an inventory loss of $500 million for 2023, amounting to a 100-basis point hit to gross margins in 2023. The current surge in theft is not attributed to a singular cause. Inflation has elevated the challenges around affording items, prompting criminals to target the retail sector. Lack of preventive measures A significant contributing factor is the lack of sufficient preventive measures by law enforcement, which in some cases has led to a rise in more severe incidents. However, the implementation of technologies like RFID allows retailers to efficiently build cases against criminals, putting them in a stronger position when it comes to reporting thefts. Not all retail crimes are orchestrated by large entities or executed through sophisticated methods. Some stores have seen a reduction in staff numbers and, as a result, there are fewer people on the shop floor, making it easier for shoplifters to carry out their activities unnoticed. The true impact of retail crime Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey The impact of retail crime on businesses extends beyond financial and economic consequences; it has also led to a surge in violence against retail staff, an ongoing trend elevated by the pandemic. Over 70% of retailers believed the threat of ORC had increased over the past five years, according to a recent survey conducted by the National Retail Federation. This escalation in violence not only results in immediate repercussions but also contributes to long-term mental health issues for staff, fostering an atmosphere of insecurity that has compelled some retailers to close their physical stores. Policy implementation Given the challenge of staff retention across various businesses, addressing retail crime becomes an even more urgent matter. Additionally, retailers are wary of their employees facing potential danger and the prospect of legal action. Consequently, many have implemented policies prohibiting employees from actively intervening when confronted with shoplifters. Privacy concerns with facial recognition Retail crime also affects customers, as businesses seek to offset losses by raising prices Retail crime also affects customers, as businesses seek to offset losses by raising prices, further burdening financially strained consumers. The presence of visible security systems not only makes stores more hostile but also diminishes the overall customer experience. While facial recognition technology is considered a potential solution, privacy concerns have emerged in its various applications. Today’s problems, yesterday’s solutions Retailers are resorting to historic measures such as steel cables, physical monitoring, or plastic screens to resolve customer issues. However, the reality is that these solutions are unfit for solving the problem, causing friction for both customers and staff. Digital solutions The newer approach involves equipping retail staff with body cams and providing new training The newer approach involves equipping retail staff with body cams and providing new training to deter shoplifters. Some stores are even offering the police discounted food and beverages to encourage their presence. The responsibility lies with management teams to seek effective solutions. In an era dominated by data and technology, retailers must shift their focus from traditional security methods to digital solutions that align with the challenges of today’s society and modern retail environments. Shrinkage When discussing theft or organized retail crime, retailers commonly use the term "shrinkage," referring to not only theft but the broader issue of lost inventory. Additional drivers of shrinkage include damage, fraud, and internal theft. A significant problem arises as losses are often based on guesswork and estimates rather than concrete numbers. Retailers may lack a comprehensive understanding of their inventories, further increasing the issue of shrinkage. Combating shrinkage Utilizing RFID technology notably helps in boosting inventory accuracy Some retailers still struggle with limited knowledge of the whereabouts of items, a challenge heightened by the issue of shrinkage. Utilizing RFID technology notably helps in boosting inventory accuracy. This enhancement enables retailers to obtain a clearer understanding of their inventory and the precise locations of items. Comprehensive strategy Changes in the in-store experience have highlighted the relevance of RFID, especially as self-service checkouts encounter double the shrinkage levels compared to traditional checkout stores. To combat retail theft effectively, a comprehensive strategy should involve the integration of labels, deactivation, electronic article surveillance, and data analytics. This combination works synergistically to reduce shrinkage and enhance product availability. Retail data analytics platforms RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors Linking hardware to an underlying data analytics platform empowers retailers to make more informed decisions. Retail data analytics platforms delve into alarms, deactivations, and visitor metrics, providing a deeper understanding of theft patterns. RFID technology drives efficiency by pinpointing frequently stolen items, allowing for the identification of theft patterns. In instances of flash mobs in major metropolitan areas, RFID data can swiftly alert nearby stores, providing an opportunity for staff to monitor shop floors and incoming customers. Real-time optimization The crucial question remains whether both shoppers and retailers are prepared to shoulder the responsibility for these additional precautions. Nevertheless, these changes leverage data more effectively, optimizing loss prevention strategies almost in real-time rather than relying on biannual inventory counts, therefore transitioning from static to dynamic loss prevention. Holistic approach Striking a balance between security measures and providing a seamless shopping experience is key In a retail environment, not all items require protection, and prioritizing the safeguarding of the most frequently stolen and valuable items can significantly impact shrinkage. A holistic approach to retail theft is imperative, considering the entire journey of an item through the retail environment. Striking a balance between security measures and providing a seamless shopping experience is key. Protection without hindrance As stores move towards being checkout-free, retail criminals (or ORC gangs) will be presented with lucrative opportunities to steal, so retailers need to be one step ahead by introducing unobtrusive and effective technology solutions. For example, case building can be improved with item-level data. RFID data offers a more precise means of assessing the value of stolen items compared to relying solely on CCTV. It provides detailed insights into the specific items removed from the store and the timing of these incidents. This proves beneficial in tracking repeat offenders. Increased visibility with a proactive approach The modern retail environment continues to evolve and criminals are never far behind. RFID technology plays a crucial role in minimizing shrinkage by enhancing inventory visibility. Moreover, it leverages the power of data to stay ahead, enabling better predictions of retail crime and the formulation of prevention strategies. This proactive approach allows for the implementation of more tailored solutions to alter outcomes positively.
Security beat
Already a strong player, particularly in New Zealand and Australia, Gallagher is still climbing in the U.S. market, which it sees as a big opportunity to invest in the company. Active in the United States for 10 years, Gallagher undertook a more aggressive growth strategy about five years ago. There are 52 employees in Gallagher’s U.S. security business, and about half the workforce has been hired in the last couple of years. They have grown from three sales territories to 16, operated by a full sales and engineering staff. Culture of innovation sets As it happens, Gallagher’s U.S. headquarters is located a short drive from my home office in the wider vicinity of Atlanta. I missed seeing them at GSX in Dallas, so we scheduled an in-person visit to catch up on their company. Gallagher’s strong culture of innovation sets them apart, as does their “people-first” commitment, says Scott Elliott, Gallagher’s Executive Vice-President, The Americas. “We have intentionally recruited for a diversity of thought that drives the business,” says Elliott. “We are a people business.” Melissa Vidakovic, Director of Marketing, Americas; and Scott Elliott, Executive VP, Americas, at Gallagher Security's office in Canton, GA. Unified approach An advantage Gallagher has in the market is total ownership of their supply chain; it manufactures each of the hundreds of products used across their solutions, from plastic components to readers to controllers to their own software systems. Among other advantages, the unified approach enables tighter control from a hardening and cybersecurity perspective, enabling them to minimize any threat vectors or vulnerabilities. The strategy also avoids dependence on third-party suppliers, which was a huge advantage during recent supply chain disruptions. While competitors struggled with availability issues related to third-party manufacturers, Gallagher’s supply was uninterrupted. Gallagher’s commitment Gallagher uses the same norms as the nation and subjects its effects to inner and outer penetration As a manufacturer serving a broad spectrum of markets, it’s Gallagher’s commitment to the high end of the market (e.g., high-security applications), where the company incorporates core tenets such as authentication and encryption. Gallagher uses some of the same standards as the government and subjects its products to internal and external penetration testing. These core strengths are also integral to Gallagher’s complete product line. “If it’s good enough for a high-level customer, it’s good enough for Mr. Business Owner,” says Elliott. The New Zealand company was founded in 1938 and was the first company to commercialize the electric fence, which it still uses for its agriculture business sector, separate from the security business. Gallagher entered the access control business 35 years ago in 1988 when a product used to restrict access to fuel pumps evolved into broader access control. Gallagher platform In the intervening years, the product has grown into a unified platform that incorporates access control, intrusion detection, and perimeter detection in a single ecosystem. “The platform is all-encompassing,” says Elliott. “No other platform does all three.” Augmenting access control, intrusion, and perimeter protection, there are other applications available in the Gallagher platform, such as workforce management, health and safety functions, and a spectrum of features useful to a wider stakeholder community. Fatigue management applications For example, Gallagher can implement routine randomized checks to proactively mitigate potential risks such as drug or alcohol abuse, thus ensuring workers are fit to work, to operate various machinery and that they do not pose a threat to fellow employees or the company. “Fatigue management” applications can monitor the use of equipment to avoid repetitive injuries or manage how long an employee works at a job site, requiring a worker to swipe or tap a card to a reader mounted on a machine to monitor and limit the time they operate that machine. Mobile mustering provides location and identification of evacuees in case of an emergency. Impact of digital transformation Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation Gallagher is also embracing the “digital transformation” of the industry. Security companies must adapt to a more agile workforce and shifting processes, says Elliott. Gallagher’s “Better Ways of Working” concept zeroes in on the impact of digital transformation on their workforce. They also seek to address the changing workforce, where Gen-Z’ers work side-by-side with tenured, experienced workers, and where creating trust is the best approach to closing the generational gap. Gallagher also seeks to educate the market on trends such as artificial intelligence (AI), machine learning, cloud adoption, various service delivery models, and other issues. Industry consolidation Gallagher has more than 1,200 employees; operates in 140 countries, from South America to Canada, Europe to the Asia-Pacific and Australia; and serves almost 16,000 customers. Gallagher is part of New Zealand’s growing technology export sector, which is growing 30% faster than the overall economy and is now the second-largest export sector in New Zealand. In an age of industry consolidation and a market dominated by corporate conglomerates, Gallagher is a privately held organization seeking to be agile and innovative, and to deliver customer value more quickly. Gallagher re-invests about 15% of its profits into research and development. “Our customer service is the primary reason people buy from us,” says Elliott. Security integrators Security integrators quickly appreciate the breadth and strength of the product line Gallagher positions itself as an alternative in a market in the midst of disruption. Brand awareness continues to be a challenge in the United States, and the sales team often hears the question: “Who is Gallagher?” Once the introduction is made, security integrators quickly appreciate the breadth and strength of the product line, says Elliott. “We allow our customers to select among best-of-breed platforms, and [using open systems,] we are not limited by the technology we offer,” says Elliott. “Our value proposition to the integrator channel is our focus on the relationship,” says Elliott. Supporting end users through an authorized, certified channel, Gallagher also emphasizes value, cost-competitiveness, and cybersecurity. “Our partner relationships are built around cultural alignment,” says Elliott. Product innovation perspective What’s ahead for Gallagher and for the industry as a whole? Hard to say, notes Elliott, given the unfolding of unpredictable geopolitical and financial trends. However, from a product innovation perspective, Gallagher will continue to evolve, balancing a dependence on “cash cow” legacy product lines with investment in leapfrog innovations such as frictionless access control, cloud platforms, and mobile systems. In general, Elliott predicts AI will yield an opportunity to analyze a person’s pattern of behavior and intent, thus enabling a security system to adapt down the road. “With the ability to predict with some degree of certainty what might happen, these capabilities will evolve,” says Elliott.
Companies at GSX 2023 emphasized new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasizes ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the Mid-Market to the Cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for pure cloud, but there are benefits to be realized from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realize the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘Soft’ Features for Integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organization more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organization more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centers around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasizing performance, protection (cybersecurity), and price, their data centers are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring center where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
Acre is a company built on mergers and acquisitions (M&A). Since its founding in 2012, Acre acquired several familiar access control companies, from Vanderbilt to RS2 Technologies, Open Options to Feenics, and several others. Acre itself was acquired in 2021 by UK-based private equity firm Triton, thus launching a new chapter in the company's history. Don Joos was named the new CEO in 2022 and set about transforming Acre from a collection of acquired companies into a coherent whole (representing various brands). A year later, we recently caught up with Don Joos to discuss the "new Acre" and what's ahead. Q: How does your background inform your approach to leading Acre Security? In physical security, there is a shift to more of a software-centric versus hardware approach Joos: This is my fourth company as CEO. What I’ve found along the way is that no matter the size or type of business, there’s a common theme, the business is going through some form of evolution or transformation because the industry they're in is going through an evolution. And today, in physical security, there is a shift to more of a software-centric versus hardware approach, and there’s a shift occurring that’s pulling us to the cloud. I think a key thing here is that while the industry is evolving, we must keep a careful eye on the evolution of the customer because the customer is the one who will dictate the pace of change, and I think that is what a lot of people sometimes lose sight of. Q: It seems Acre is on the path from being a “collection of small companies” to “a collection of brands within a single company.” Joos: I think most people think of Acre as a federation of companies. Acre Security was seen more as a holding company. For me, I think the biggest misconception is just that: “This is just a federation of companies” versus “This is a business.” Acre Security is a business that has a range of portfolios to address key verticals and pivotal business problems for customers. Because of what’s happening now and the market dynamics that are occurring, it ties back to “Who is Acre Security?” We have a clear answer as to where we want to be from cloud access control versus on-premise access control. We have clear answers regarding market segments, visitor management, and intrusion. When you think about it, those are the core areas of our business. Q: What has surprised you the most in your first year or so at Acre? Joos: I think the thing that surprised me the most was how similar the problems are because I was coming into a new industry. It’s surprising how strong a correlation [security has] to other industry transformations that I’ve been a part of. Q: What are the points of differentiation among the various Acre Security brands? Joos: I think if you go back to the history of the company, it was designed to compete. That is, that's how it was set up under the logic of, “If we have three bids in a deal, it increases the odds that we're going to win one of them.” As we evolve, to have sustained scalable growth, it is not just about going shallow and casting a wide net. It’s about creating a concentrated focus. Some of the technology is just inherently older technology. And so for me, it’s about creating migration paths for the customers to move to more modern technology, such as the cloud. I love our installed base. When you think about the cost of acquisition to get a new cloud customer, it costs a lot less when you have an installed base that you can migrate to the more modern solution versus having to spend the money and the sales energy to hunt for that next opportunity. Q: Where has Acre positioned itself in the marketplace? We can take care of your current needs, but we also have a clear migration path to take care of your future needs Joos: If you're ready to go to the cloud, we have an answer for you. If you're not ready to go to the cloud, but you're ready to take more cloud-based applications to continue to evolve, we have an answer for you. If you're not quite ready yet and you're still looking for a market-leading premises solution, we have an answer for you, and we have a migration path when you're ready down the road. So, you have a safe bet with Acre because we can take care of your current needs, but we also have a clear migration path to take care of your future needs. Q: How are you building up your team? Joos: In 2023, we’re getting a lot of core building blocks in place and making investments in people who have experience in this space or aligned industries. It is a balance. I think we need a group that understands the industry and a group that's going to come into it and challenge why we do things the way we do. I think that makes us unique: we have fresh eyes looking at things from a different perspective. With that, you’re naturally going to end up with a better answer to problems because people are comfortable challenging the status quo. Q: How are you seeking to expand your dealer channel and/or transition it from the various dealers “inherited” in previous acquisitions? Joos: The channel invests in Acre Security. Our success is their success, and so what we're proposing to them is a range of solutions that supports their longevity and their financial success. But we also continue to build out our portfolio through organic technology innovation or M&A. We're continuing to make investments in our channel strategy and how our partners interact with us We're continuing to expand their addressable market if they want to make investments with us. We're continuing to make investments in our channel strategy and how our partners interact with us. The design of our upcoming technology right now is built with the channel in mind. We want to ensure that we are not creating any channel conflict or any perceived channel conflict. I think that's usually the worst kind: when it's perceived but not real. You need to be very upfront and clear with communications. Q: What is the biggest challenge in the industry right now? Joos: Companies and customers are looking to embed security into their workflows. What I mean is these are not just standalone solutions anymore. They’re integrating with enterprise resource planning (ERP) and human resource (HR) software systems. In property management, they want it integrated into the fitness center, they want it integrated into the cafeteria areas and the dry cleaners, and so forth. So, this is about an ecosystem, and there are times when we are going to be the core, and there is going to be a lot of technology that is adjacent to us. There are times when we are the adjacency to someone else's core in a smart city or a smart building. This gets to why having an open application programming interface (API) is going to be an important part of the technology evolution. It cannot be a closed environment anymore; that is part of the past. Q: What’s next for Acre? We're constantly evolving our cloud access control as well as our on-premise access control Joos: There is a lot of work going on with integrating the business into a single Acre Security company. This is an investment year for us, we are adding people to our team. We are making a lot of investments from a systems and technology perspective. We have a lot of work right now going into integrating the business from an IT infrastructure perspective and all the tools that we use from an employee perspective. We are making a lot of investment as it relates to the commercial side. You're going to see some next-gen technology coming out from an intrusion perspective. We're constantly evolving our cloud access control as well as our on-premise access control. We're also bringing software applications, too. Q: What is Acre’s “message” going forward? Joos: One of the takeaways for me is this is not the Acre of the past. We are making some bold changes. New things are happening here; you better pay attention because clearly, something is different. I think that's one. I think the second is that as they spend time within us, they're going to realize the wide range of solutions and use cases that we can address, whether you're in access control or cloud, whether you're in intrusion, whether you are in visitor management, or whether you're looking at some network connectivity solutions. The third thing that I think people are going to see is a whole lot of energy as they talk to our people and the passion that you see from the team. If I wrap those three points up in one kind of statement there, I think my goal is that people walk away saying “Something is going on at Acre Security. We better pay attention.”
Case studies
360 Vision Technology, the UK-based manufacturer of ruggedized HD, radar, and thermal PTZ surveillance cameras, has been selected to supply its radar surveillance camera technology to a solar farm site in Ross-on-Wye, Herefordshire. Predator Radar camera Capable of generating 1-Megawatt of electrical power, the solar farm site was constructed by VARTEC EPC Limited for Lowther Renewables Ltd, to help offset the carbon footprint of its parent company, AJ Lowther & Son Ltd, which provides a range of steelwork, cladding, and refurbishment services, including steelwork structures catering for manufacturing, industrial, agricultural, commercial and equestrian buildings. In collaboration with VARTEC, a technical specification for the solar farm was jointly devised by Craig Carton, 360 Vision Technology’s Technical & Customer Support Manager, resulting in the specification of a 360 Vision Predator Radar camera unit specified to secure the entire site. Cost-effective perimeter solution With up to 200m radius/400m diameter constant surveillance capability, this provides a highly effective solution The 360 Vision Predator Radar camera unit deployed integrates radar technology with a Predator 1080p HD camera, to offer a cost-effective perimeter and wide area surveillance solution. With up to 200m radius/400m diameter constant surveillance capability, this provides a highly effective solution with which to secure the solar farm site, while minimizing costs compared to traditional CCTV camera solutions, with only one radar/camera unit being required. Surveillance cameras installation “The site’s remote countryside location, coupled with its significant slope and numerous access points along its perimeter, presented many challenges,” says Craig Vardy, Managing Director of VARTEC. “Lowther Renewables required coverage of the entire solar farm and it would normally have required several traditional security cameras to provide adequate surveillance coverage which would have been prohibitively expensive. However, we were able to negate the need to install several surveillance cameras by specifying just one 360 Vision Predator Radar camera unit to cover the same area.” Object detection Predator Radar works in all-weather scenarios (rain, fog, snow, mist) providing uninterrupted protection Designed for applications where wide area detection and tracking of moving objects is required, Predator Radar works in all-weather scenarios (rain, fog, snow, mist) providing uninterrupted protection by scanning 360° twice every second, to detect and automatically track up to 40 simultaneous objects. “At the site, on detection of an object by the Predator Radar camera, an alarm activation is sent to the NX Witness VMS via an I/O module." Live and recorded video and audio "NX Witness sends this alarm onwards to the Sentinel alarm management platform at the Doncaster Security Operations Centre (DSOC), where alarms are prioritized and evidence for the events is retrieved. This provides the operators with live and recorded video and audio, allowing them to make a quick and accurate decision as to the cause of the alarm." "Operators are guided through pre-defined manual and automated actions, based on the cause, to ensure a rapid response to the situation. The whole alarm handling process is fully audited allowing further analysis and reporting post alarm handling.” Real-time activation At DSOC, any Predator Radar camera alarm activations are overlaid on the screen to notify the operator DSOC detects, responds, and reports any threat activation in real time, meaning the solar farm is protected and immediately aware of any security issues. At DSOC, any Predator Radar camera alarm activations are overlaid on screen to notify the operator that an intruder has been detected, and tracking images are automatically sent to the operator’s screen for visual confirmation, all while the object is continuously and automatically tracked, whatever its path onsite. Dispersing threats On verification of an alarm threat, DSOC operators analyse the video data to make an informed decision; to either contact the police, a keyholder, or OCTAGA, Hereford (a key-holder/physical patrol guarding service who responds in the event of an incident needing attendance). Providing an additional deterrent and avoiding the requirement for a physical attendance to the site for every activation, the Predator Radar camera carries integrated LED white light capability, to help confirm and disperse threats in the hours of darkness. Cloud-based NX Witness VMS In addition to DSOC, monitoring of the site and events can also be performed via a cloud-based NX Witness VMS “Since its installation, the VARTEC installed radar-based camera system has run trouble-free and there have been no false alarms, thanks to visual verification from DSOC,” says Anthony Lowther, of Lowther Renewables. In addition to DSOC, monitoring of the site and events can also be performed via a cloud-based NX Witness VMS, where the transmitted video and data can be accessed remotely and a live insight viewed via a graphically rich desktop interface. Error-free security surveillance solution Craig Vardy adds, “Using the unique capabilities of the 360 Vision Technology Predator Radar camera, we were able to provide an error-free security surveillance solution while also saving the customer money on capital outlay by using just one radar unit, versus the several traditional video cameras that would have been otherwise required to secure this large solar farm site.” “We are very happy to have been able to support VARTEC and Lowther Renewables to secure an effective solution for their challenging wide area surveillance challenge at the solar farm site,” says Craig Carton of 360 Vision Technology. Radar camera solutions “Across the globe, our innovative radar camera solutions are supporting high-security, safety, and site management applications, from the protection of national borders to protecting utility and commercial sites." "This 5-acre solar farm project underlines the highly effective surveillance capability of the Predator Radar camera range.”
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution will be deployed at Canyon Hills Community Church to protect its congregation against gun-related threats. Canyon Hills Community Church Located in the suburbs thirty minutes north of Seattle, Canyon Hills Community Church is a non-denominational, elder-led, bible-teaching church founded in 1995. Since then, it has grown to host over 4,000 people each weekend and several hundred during the week for bible study and youth groups. Gun violence incidents Canyon Hills Community Church has expanded its security strategy to include ZeroEyes’ proactive solution According to the United States Justice Department, 17.3% of all hate crimes were motivated by bias against religion. Furthermore, data from The ZeroEyes Gun Violence Research Center indicates that of analyzed incidents involving religious organizations, 38% of shooters had no affiliation with the place of worship. As it continues to grow, Canyon Hills Community Church has expanded its security strategy to include ZeroEyes’ proactive solution. This decision reflects the church's philosophy that while the building serves as a place of worship, the true priority is the safety and well-being of its people. Prioritizing safety “Our commitment to creating a secure environment for worship and fellowship has never been stronger,” said Jon Huff, Operations Director at Canyon Hills Community Church. Jon Huff adds, “As protectors of our flock, we’ve always prioritized the safety of our community. With ZeroEyes, we are equipped to not only react to potential threats but to prevent them, helping to ensure peace of mind for everyone who walks through our doors.” AI gun detection If a gun is identified, images are instantly shared with the ZeroEyes Operations Center, staffed 24/7/365 ZeroEyes’ AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement and church staff as quickly as 3 to 5 seconds from detection. Proactive security technology "At a time when places of worship are experiencing increased hostility and threats, Canyon Hills Community Church is setting a standard for others to follow," said Mike Lahiff, CEO of ZeroEyes. Mike Lahiff adds, "We're honored to be the first proactive security technology they've adopted, and we commend them for their efforts to ensure a safe environment for their members."
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution will be deployed at Appomattox County Public Schools (ACPS), Virginia to protect students and faculty against gun-related threats. ACPS Comprising four schools - a primary, elementary, middle, and high school - ACPS educates approximately 2,500 students annually. With a commitment to fostering a safe and nurturing learning environment for all students, the school has implemented several security measures in recent years. These include assigning individual School Resource Officers (SROs) to each school, facilitating comprehensive walkthroughs of all facilities by local and state law enforcement, installing exterior door alarms and student computer monitor software, and enhancing its after-hours surveillance system. ZeroEyes will be the latest addition to this multilayered security approach. School safety “School safety is of the highest priority right now, and to have a technology that could potentially save a life or stop a threat before anything happens made ZeroEyes a no-brainer for us,” said Philip Amos, Supervisor of Security and Technology, Appomattox County Public Schools. ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. ZeroEyes Operations Center If a gun is identified, images are instantly shared with ZOC staffed 24/7/365 by specially trained U.S. military If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement, SROs, and ACPS staff as quickly as 3 to 5 seconds from detection. Swift and accurate security communications "In the instance of a gun-related threat, first responders and school leadership must receive swift and accurate security communications to help them navigate the potentially deadly situation,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “We are proud that ZeroEyes has been chosen to provide this type of situational awareness to Appomattox County Public Schools. Their proactive stance against gun violence is truly commendable."
ZeroEyes, the creators of the only AI-based gun detection video analytics platform that holds the U.S. Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution has been deployed by Michigan’s Pontiac School District (PSD) to protect students and faculty against gun-related threats. Pontiac School District (PSD) PSD includes nine schools and takes pride in offering its students work-based learning opportunities in industries such as Health Sciences, Business/Finance, and Hospitality/Tourism. The district is also at the forefront of security innovation, adding ZeroEyes to a multi-layered approach that includes a visitor check-in system, smart sensors, and video management software, among others, to provide a safe and secure educational environment. Enhance security and safety “At Pontiac, we've dedicated significant resources to fostering opportunities for students, and we've witnessed the positive impact rippling throughout our community,” said Dr. Kimberly Leverette, Interim Superintendent of Pontiac School District. Dr. Kimberly Leverette adds, “Our mission is to cultivate our schools as safe havens, and with ZeroEyes, we can enhance security and safety both during and after school hours.” AI gun detection and intelligent situational awareness software If a gun is identified, images are instantly shared with the ZOC, staffed 24/7/365 by specially trained U.S. military ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence including visual description, gun type, and last known location to local law enforcement and PSD staff as quickly as 3 to 5 seconds from detection. Gun-related violence “In the past few years, the state of Michigan has experienced great hardship when it comes to gun-related violence,” said Mike Lahiff, CEO of ZeroEyes. He adds, “Pontiac School District continues to show its dedication to safety and eye for innovation with its deployment of ZeroEyes.”
Round table discussion
Technology can be a powerful tool, but it can also be misused. Ethical principles help ensure that technology is used in a way that minimizes risks and avoids causing harm to people or society. Issues could include factors such as data privacy and algorithmic bias of certain technologies. As the security industry embraces advanced and evolving technologies, we asked this week’s Expert Panel Roundtable: What are the biggest ethical considerations of using emerging technologies in physical security?
Protecting access control data is a core concept when it comes to safeguarding information assets, maintaining trust, and ensuring smooth operations. Guarding access to data also ensures compliance with regulations, prevents accidental misuse, and streamlines workflows. We asked this week’s Expert Panel Roundtable: What safeguards are in place to avoid unauthorized retrieval of access control data?
As physical security technologies become more complex, it is incumbent on the dealer/integrator to have the skills and expertise needed to ensure that a system operates smoothly. The value of integrators increasingly rests on the skill sets they bring to bear when installing a system. If the skills are missing, there is a problem. We asked this week’s Expert Panel Roundtable: What missing skills among security integrators can cause problems for customers?
Products
White papers
Precision And Intelligence: LiDAR's Role In Modern Security Ecosystems
DownloadThe Top 4 Reasons To Upgrade Physical Security With The Cloud
Download11 Advantages Of A Combined System For Access Control And Intrusion
DownloadOptimize Your Business with Analytics and AI
DownloadHow End-to-End Video Security Solutions Can Help Your Organization With Social Distancing
DownloadSchooling the Market on Education Security
DownloadHow To Catch Shoplifters With Thermal Imaging
DownloadWhat Do I Need To Know To Successfully Deploy Mobile Access?
DownloadIntrusion detection: Manufacturers & Suppliers
- Bosch Intrusion detection
- OPTEX Intrusion detection
- Hikvision Intrusion detection
- DSC Intrusion detection
- Dahua Technology Intrusion detection
- Climax Technology Intrusion detection
- Visonic Intrusion detection
- Honeywell Security Intrusion detection
- Vanderbilt Intrusion detection
- Senstar Intrusion detection
- Pyronix Intrusion detection
- NetworX Intrusion detection
- Verkada Intrusion detection
- RISCO Group Intrusion detection
- Texecom Intrusion detection
- Software House Intrusion detection
- Axis Communications Intrusion detection
- Ajax Intrusion detection
- Gallagher Intrusion detection
- Enforcer Intrusion detection