Network monitoring
Gcore, the global edge AI, cloud, network, and security solutions provider, has announced the launch of a new DDoS protection point of presence (PoP) for its robust global edge network, in Dubai, UAE. The company has more than 30 protection PoPs across six continents, including Europe, Africa, the Americas, and the Middle East. The new Dubai filtering point allows customers to take advantage of advanced DDoS protection services without delay. Dubai PoP By opening the Dubai PoP and expanding i...
Sensera Systems, a provider of solutions for real-time jobsite intelligence, announced the launch of its complete site security solution. The full solution includes the compact solar-powered SiteWatch Pro3 camera, the newly released TalkDown deterrence kit, and professional monitoring services all enabled through Sensera’s SiteCloud software. Sensera Systems now offers comprehensive jobsite security coverage and meets risk compliance for projects of any size. Sensera's energy-efficient s...
Drata, the pioneering compliance automation platform, announced that it has acquired oak9, a cloud-native security platform, and released a new capability in beta to seamlessly bring continuous compliance into the software development lifecycle. The acquisition positions Drata as the only platform of its kind that monitors compliance both before and after code is deployed to production. This capability, called Compliance as Code, will be demonstrated at RSA, May 6-9 in San Francisco. Cloud-nat...
The National Cyber Security Centre (NCSC) has issued a warning of heightened cyber threat to UK critical national infrastructure due to the risk posed by Russia state-aligned actors. Pro-Russia ‘hacktivists’ have been targeting vulnerable small-scale industrial control systems in the UK, Europe, and North America with more attacks expected over the coming months to target critical national infrastructure. AI-enabled cyber threats The NCSC outlined that the threats have l...
RGB Spectrum®, a pioneer in mission-critical video for real-time decision support, reaffirms its dedication to product education and training, by launching comprehensive training courses tailored for end-users, integrators, manufacturer representatives, consultants, and partners. Training Curriculum RGB Spectrum's training curriculum encompasses various modules, including the popular 201 and 301 series. These modules offer detailed insights into key products, including the Galileo video wa...
Trident IoT, an RF technology and engineering company focused on decreasing time-to-market for connected device manufacturers, announced the release of the new Taurus Z-Wave Series of silicon solutions. The Trident IoT Taurus Z-Wave Series will encompass system-on-chip (SoC) solutions and modules that support the latest advancements in Z-Wave technology, including Z-Wave Long Range (ZWLR) for the U.S. and the implementation of the ZWLR European specification. The Taurus Z-Wave Series will ship w...
News
SimpliSafe®, the maker of award-winning smart home security systems, announced it will give select customers early access to its live guard outdoor protection service. SimpliSafe's new monitoring service introduces a revolutionary double-layer approach to home security, combining the power of artificial intelligence (AI) technology with a team of expert monitoring professionals to prevent crime before it happens. This new offering builds upon the company's recently launched 24/7 live guard protection, making SimpliSafe the first to offer this type of monitoring service both inside and outside the home that's staffed by its own team of security experts, keeping its customers safer than ever before. Another layer of security Nearly two million people in the US are victims of burglary and trespassing each year, often facing significant emotional and financial harm as a result. Home invasions typically last only 10 minutes, so every second counts when it comes to emergency response; however, once an intruder has entered the home, it's already too late to stop the resulting property and emotional damage. Home invasions typically last only 10 minutes, so every dual counts when it comes to crisis response Enter: SimpliSafe live guard outdoor monitoring. This groundbreaking service is designed to prevent crime by keeping watch over the perimeter of the home and deterring potential intruders from breaking in. If a trespasser or potential intruder is detected, SimpliSafe monitoring agents jump into action intervening before they can enter the home. If warranted, the monitoring agents can even dispatch police, providing another layer of security to the home. AI and advanced technology "For decades, the home security industry has remained reactive, jumping into action only when a break-in is already in progress. SimpliSafe has set out to challenge this standard and to offer our customers new, more proactive ways to feel and be safe," said Christian Cerda, Chief Executive Officer at SimpliSafe. "Live outdoor monitoring is our latest breakthrough, combining AI and advanced technology with expert monitoring professionals to stop crime before it even happens. This is a true game changer in customer safety." Customer's SimpliSafe system Customer's SimpliSafe system is armed, their outdoor camera keeps watch over their home When a customer's SimpliSafe system is armed, their outdoor camera keeps watch over their home's perimeter. With live outdoor monitoring, the service uses advanced AI to detect when someone is approaching the home and determines if the person matches any of the customer's saved profiles. If the person doesn't match any of the customer's saved profiles, an expert monitoring agent can use the camera's live video to confirm any imminent threat and deter potential intruders by speaking to them in real time using the camera's two-way audio and triggering sirens. SimpliSafe's steadfast commitment True to SimpliSafe's steadfast commitment to privacy across all products and services, live guard outdoor protection is designed to give customers complete control of their privacy. SimpliSafe gives customers total control over which cameras the agents monitor and when. SimpliSafe gives customers total control over which cameras the agents monitor and when With outdoor monitoring, customers also have the ability to easily create and delete profiles of friendly faces within the app, so they can be confident they are only receiving alerts for unidentified persons. Additionally, all live and recorded videos are securely encrypted and are not accessible by monitoring agents after an event has been reviewed and closed. SimpliSafe's latest innovations Live guard outdoor protection will be available to all customers later this year. This groundbreaking service is part of SimpliSafe's Fast Protect™ Technology which aims to provide the fastest detection, deterrence and prevention in the industry. SimpliSafe Early Access Programs, like this one, allow qualifying customers to test SimpliSafe's latest innovations before they become widely available to the public, as well as the opportunity to provide feedback that will shape products and services for full-launch readiness.
RGB Spectrum®, an industry pioneer in mission-critical video for real-time decision support, announced enhancements to its Zio® AV-over-IP platform with two new budget-conscious multiviewers, the QuadView® IPX and the SuperView®IPX. Multiviewers have become an indispensable tool for consolidating diverse data sources onto a single screen, variously used for enhancing situational awareness and improving workflow efficiency. The Zio AV-over-IP offers real-time, bandwidth-efficient, low latency distribution across packet-based networks, including local area networks (LANs), wide-area networks (WANs), virtual private networks (VPNs), and mobile phone networks. As an enterprise-level solution, based on industry-standard H.264/H.265 compression, the Zio platform is compatible with third-party IP equipment as well as RGB’s own full line of networked video appliances. IPX series multiviewers The Zio solution provides for integrated display on devices ranging from single-view monitors, to multiviewers, to video walls. Whether within a single room, throughout campus, or across the world, the platform features integrated signal distribution and display, incorporating everything from smartphones to multiviewers and video walls. The goal: Any video, over any network, to any device. New QuadView IPX allows users to display up to 4 HDMI or IP video signals in customizable layouts Previously available as a feature only in the larger and more expensive Zio 4000 video wall, the IPX series multiviewers are unique in their ability to display a combination of local baseband and remote IP video, with access over HDMI and LAN/WAN connections. The IPX multiviewers are fully compatible with other Zio components, including encoders and recorder/media servers and can be addressed with a common GUI. The new QuadView IPX allows users to display up to 4 HDMI or IP video signals in customizable layouts on a desk- or wall-mounted screen. The new SuperView IPX offers similar capabilities, with up to eight video signals. TAA and BAA-compliant Additional features include 4K 60Hz input and output resolutions, flexible image resizing and placement options, customizable display layouts and presets, 4 HDMI® 2.0 I/O ports, H.264 and H.265 decoding and display, an embedded architecture for heightened security, and multiple control options, including browser-based GUI, Telnet, and RS-232. Proudly made in the USA, the new multiviewers are TAA and BAA-compliant. Whether in command and control, security and surveillance, or any mission-critical operation, the QuadView IPX and SuperView IPX are poised to take data visualization to the next level.
Interface Systems, a major managed service provider of business security, actionable insights, and purpose-built networks for multi-location businesses, announced that it is releasing an enhanced customer portal, One View Edge, that will offer its customers greater visibility and easier access to critical information on all Interface services. The launch of One View Edge reflects Interface's commitment to delivering exceptional and relentless customer support. Capabilities of One View Edge One View Edge is designed to eliminate information bottlenecks for customers Brian Garavuso, CTO at Interface, said, “The new One View Edge portal will provide immediate benefits to our customers with its intuitive user interface, comprehensive network analytics, security management, and streamlined self-management features.” One View Edge is designed to eliminate information bottlenecks for customers, by offering contextual data and insights needed for complex and large-scale managed services deployment. Key capabilities of One View Edge include: Best-in-Class User Interface: A modern, intuitive design that ensures effortless navigation and user engagement. Security Manager Features: A fortified platform with self-management of alarm panel codes and contact lists. Enhanced Network Statistics: Access to real-time network status and performance metrics. Direct Access to Partner Portals: A centralized gateway to all support portals of third-party solution providers. Upgraded User Management: Enhanced control and flexibility for administrators to assign roles and access to users. Service Request Submission and Tracking: A streamlined process to initiate and manage service requests. Enhancing One View Edge “At Interface, we believe in continuous improvement through active engagement with our customers. Interface is committed to further enhancing One View Edge. We are planning to launch advanced security events dashboards, enhanced video viewers, and more, all aimed at delivering an unparalleled customer experience,” adds Brian Garavuso. The One View Edge portal is currently available to all existing Interface customers and any new customers who sign up for Interface services.
Hikvision, a world-renowned manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, announces the upcoming launch of its new NVR 5.0 Series, the next generation in network video recording technology. Building upon the success of Hikvision NVR innovation, the new NVR 5.0 Series revolutionizes traditional security systems by seamlessly integrating artificial intelligence (AI) and the Internet of Things (AIoT) capabilities. Next generation NVR 5.0 Series Webinar attendees who play the Kahoot Poll after will win a chance at a FREE iPhone 15 or an M-Series NVR A webinar on Thursday, May 9, will cover all the ground-breaking features of the NVR 5.0 Series with special offers for registered attendees. Webinar attendees who play the Kahoot Poll after will win a chance at a FREE iPhone 15 or an M-Series NVR. Dealer webinar attendees will get 50% off select M-Series NVRs through May 31 (limit 10 units/per dealer). "Our new next generation NVR 5.0 Series sets new benchmarks in network video recording technology," said John Xiao, Vice President of Marketing, Hikvision USA, adding "With its intuitive operations, smart search capabilities, and centralized alarm management, the new Hikvision NVR 5.0 Series empowers users with unprecedented intelligence, efficiency, and control over their video systems." Benefits of the new NVR 5.0 Series The NVR 5.0 Series NVRs serve as a pivotal central hub, offering an intelligent platform and scenario-based applications, ushering in the AIoT era. These next-generation NVRs are designed to provide users with unparalleled efficiency, innovation, and ease of use. The five pivotal benefits of the new NVR 5.0 Series include: Intuitive Operations for Real-Time Insights: Gone are the days of complex management interfaces. The NVR 5.0 Series includes a user-friendly interface with tailored views and automated switching, providing real-time clarity and ease of understanding. Revolutionizing Video Searching with Smart Technologies: The NVR 5.0 Series introduces Smart Search and AcuSearch functions, significantly reducing search times to mere seconds. Features include frame-by-frame searches, event-based navigation, and target-specific filtering, enhancing operational efficiency. Centralized Alarm Management for Immediate Response: The integrated event center of the NVR 5.0 Series NVRs streamlines alarm management, search, and configuration, enabling rapid and effective responses to security incidents. Innovating with Intelligent Protection: The NVR 5.0 Series self-learning perimeter protection minimizes false alarms and manual input, ensuring smarter and more accurate surveillance with its embedded inference engine. Converged Functions for Comprehensive Control: Enjoy a unified solution for video, audio, alarm, and access control with the NVR 5.0 Series NVRs
The Security Executive Council, with Rice University and MD Anderson Cancer Center, will facilitate a day and a half of expert-led sessions on workplace violence risk management for corporate security practitioners, cross-functional partners, and police and emergency responders. According to the Bureau of Labor Statistics, in 2020 there were more than 37,000 nonfatal workplace injuries inflicted intentionally by another person and nearly 400 workplace homicides. Healthcare workers are five times more likely to suffer workplace violence than workers in other industries. These numbers underline the criticality of strong cross-functional workplace violence prevention, preparedness, and response efforts in every organization. Real-time for offsite participants The event will take place at Rice University in Houston and will also be streamed in real-time The Workplace Violence Management State of the Industry conference will include seven seminar sessions, networking opportunities, and a keynote by Shibu Varghese, Senior Vice President of People, Culture & Infrastructure for MD Anderson Cancer Center. Individual sessions will tackle a range of issues, including awareness, regulatory considerations, program strategy and planning, incident response, and proven practices. The event will take place at Rice University in Houston and will also be streamed in real-time for offsite participants. Discounts are available for students and active law enforcement. Takeaways and Industry Connections “In today's environment, workplace violence is an ever-present risk for every organization,” said Dean Correia, SEC Emeritus Faculty of Business Continuity. “Every function responsible for managing workplace violence will benefit from attending this event. The takeaways and industry connections will better enable pioneers to proactively train their people and increase their confidence in current and future people and asset protection programs.”
Security is in high demand. In times of growing uncertainty, the need for armored and civilian special protection vehicles is rising. More and more individuals, professionally, politically, or economically prominent, seek protection while on the move. Security Essen, the pioneering trade fair for security, will showcase the options and discreet nature of this protection from September 17th to 20th at Messe Essen/Germany, featuring its own exhibition area. The concept has garnered significant industry support. Stoof International is the first company to register its participation in the special protection vehicles category. Customized specialty models The manufacturer is among the German market pioneers in armored vehicles. For over 150 years, their experts have been building customized specialty models. Whether limousines, specially protected SUVs or trucks, cash and valuables transporters, or vehicles for specialized emergency forces - vehicles that meet global security standards are manufactured in the ultra-modern factory halls in Brandenburg, Germany. For over 150 years, their experts have been building customized specialty models "We are thrilled to now be able to convince the high-caliber audience of Security Essen of our individual, powerful, and uncompromisingly secure vehicles," says Stoof CEO Fred Stoof. The company will bring several exhibits to Essen, including two vehicles and various security components. Topic of networked security Special protection vehicles are positioned in the Galeria to attract attention During Security Essen, the new offer will be placed in the Galeria of Messe Essen to attract the public. This spacious, light-filled connection between the exhibition halls is highly frequented and invites people to talk. Additionally, it provides direct access to the new and thematically relevant exhibition area "Civil Protection and Civil Defense" in the adjacent exhibition hall 4. Thus, Security Essen expands its focus and shows authorities and organizations with security tasks (BOS) and municipalities how to prepare for increasing challenges such as unrest, extreme weather events, or major incidents. Individual protection will also play a major role in the supporting program accompanying the trade fair. In the Drone Zone, for example, exhibitors will demonstrate how drones can support the security industry as well as companies and institutions in need of protection. The Digital Networking Security Conference will focus on a high-level professional exchange on the topic of "networked security". An extensive lecture program also offers information on a wide range of security-related topics.
Expert commentary
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town center stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behavior also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorized access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimize this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorized entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
The average business owner or investor has some kind of security precaution in place, especially in the after-hours when there are fewer deterrents to inhibit criminal activity. Security guards, video surveillance systems, motion sensor lights, or even just fake cameras placed around the property are some of the common options people choose. Future of overnight security Smart business owners are starting to realize, however, that some of these traditional security measures are becoming antiquated and no longer cutting. The now and future of overnight security is in remote guarding. Pioneered by companies like Los Angeles-based Elite Interactive Solutions, which was founded back in 2007, remote guarding is revolutionizing the overnight security business. Minimizing criminal activity Remote guarding is fast becoming the most popular choice among commercial end-user property owners Remote guarding utilizes a combination of cutting-edge technology, “digital guards,” highly trained security agents, and local law enforcement if and when necessary to minimize the potential of criminal activity. For those adequately enlightened to its overwhelmingly impressive crime prevention capabilities, remote guarding is fast becoming the most popular choice among commercial end-user property owners to secure and protect their investments. What Is Remote Guarding? Remote guarding is a revolutionary concept and increasing trend in security systems that utilize a combination of methods to effectively analyze potential threats to property. Cameras and/or other monitoring devices running highly advanced algorithmic software are installed in strategic areas or vulnerable places onsite and remotely located security agents are immediately notified of any activity within a designated perimeter of the property. A blend of AI, cybersecurity, and video analytics When properly deployed by an expert provider, the technology stack includes a proprietary blend of video analytics, artificial intelligence, cybersecurity, and more. Done right, “noise” is effectively filtered out, allowing agents to act on legitimate alerts and achieve zero false alarms communicated to first responders. Today, there are a lot of terms and descriptions tossed around about remote guarding, remote video, virtual guarding, etc., but those attributes must be present to represent the true definition of the offering and its many virtues. Realtime situational awareness Many systems have a two-way speaker that allows the security agent to give a verbal warning When specially trained security agents are alerted to trespassers, possible intruders, or other suspicious activity, they analyze the situation in real time and determine the necessary level of action. Many systems have a two-way speaker that allows the security agent to give a verbal warning, known as a voice-down, to the individual(s) that they are being watched. Most perpetrators, often believing the response is emanating directly from security personnel on the property itself rather than from a remote command center, flee immediately. However, if the threat persists, the security agent enlists local law enforcement to get on the scene. Customized remote guarding When properly deployed, remote guarding systems are also customized to specific properties. A team of consultants visits the client’s property to evaluate its vulnerabilities and where to best place cameras and/or other monitoring devices for system efficacy. Traditional Security Shortfalls According to Keith Bushey, a retired commander for the Los Angeles Police Department, there is much frustration between law enforcement officers and potential victims of crime due to the historically unreliable performance of traditional burglar alarm systems and central monitoring stations. He states about 90% of security-related calls are false alarms, a problem that has been well-documented through the years. Onsite challenges When a legitimate emergency does occur, the perpetrators have often already done their damage When a legitimate emergency does occur, the perpetrators have often already done their damage and/or escaped by the time law enforcement arrives. Onsite security guards are not the remedy either as they bring their own set of issues and challenges. Unexpected costs Traditional security systems can also have unexpected costs. The cost is not only in the security guards’ paycheck or the cost of the equipment itself. The cost comes when an actual incident occurs. In worst-case scenarios, the security guard(s) are injured, the business suffers inventory loss, and/or damage is sustained to the property. The medical and other costs for the security guard(s), the loss of inventory, property damage, deployment of law enforcement resources, and possible fallout of legal expenses all add up. Even in the best-case scenario, false alarm expenses incur if law enforcement is dispatched. These, among many others, are some of the primary issues that remote guarding resoundingly answers as a superior alternative. A Bounty of Benefits Remote guarding systems have been proven to cut costs and be more effective than traditional security systems. Even though the monthly monitoring costs of remote guarding are significantly higher than traditional intrusion detection system monitoring, the much higher effectiveness in crime reduction, elimination of false alarms, and augmenting or replacement of manned guards result in a substantially higher return on investment (ROI) to the end user. Easy tracking of threats The security cameras already have their image captured on record, making them easier to track down For example, case studies have demonstrated reduced security costs for clients by 60%, on average. These reductions have come from the costs of security staff, inventory, or property loss, plus saving money on insurance premiums and deductibles. The nature of remote guarding reduces the risk and costs of false alarms, with professional security agents able to determine an actual threat before law enforcement is called. In a rare instance when a perpetrator escapes before law enforcement arrives or can detain the individual(s), the security cameras already have their image captured on record, making them easier to track down and identify. Reduction of false alarms The significant reduction in false alarms is greatly appreciated by law enforcement, as it allows them to focus on real emergencies or crises. Better relationships are also developed between clients and law enforcement, as remote guarding systems are highly reliable in providing accurate and real-time information to officers as they approach the scene. In short, it assists law enforcement in doing their job more effectively, as well as more safely thanks to having eyewitness information before engaging in an active crime scene. Partnership When you combine the decreased cost with the increased efficiency and success rate, it is easy to see why many commercial end-user property owners across the country are making the shift to remote guarding. It’s also an outstanding opportunity for professional security dealers and integrators to partner with a remote guarding services provider to bring a superior solution to their end customers and pick up a recurring monthly revenue stream in the process.
It’s no secret that the data security sector is constantly changing. It has an annual CGR of about 12.3%. Future trends in data security Much of this has to do with the rise of cybercrime in recent years, with reports showing that cyberattacks happen as often as every 39 seconds. To combat the growing rate of cybercrime, data security has been on the rise. As we journey further into this era, it becomes evident that a spectrum of significant trends is molding the future of data security. This exploration delves into a selection of these trends, unraveling their importance and the potential implications they carry 1. AI security tools will increase Artificial Intelligence is also being used in the development of smart attacks and malware The introduction of Artificial Intelligence in the data security industry brought significant changes, especially in cybersecurity. AI has been the golden standard for face detection, natural language processing, automated threat detection, and automated security systems. Additionally, Artificial Intelligence is also being used in the development of smart attacks and malware, bypassing even the latest security protocols in data control. And as time progresses, AI security tools will flourish and dominate the scene. Let’s take a more in-depth look at three of the top AI security tools. Targeted attack analysis tool Manufacturers utilize targeted attack analysis tools to uncover targeted and stealthy attacks. Artificial Intelligence can be applied to the program’s capabilities, processes, and knowledge. For instance, Symantec launched this tool to combat the Dragon 2.0 attack in 2022. The phishing attack reprimanded multiple energy companies while trying to gain access to their operational networks. Targeted Attack Analysis Tools can analyze incidents and look for similarities from previous situations. They also help detect suspicious activities and collect all the necessary data to determine whether a specific action is malicious. Intercept X tool Results from the Intercept X Tool feature high accuracy and a low false positive rate Sophos, a British security hardware and software company, launched the Intercept X Tool. It engages a neural network that records and analyses data like a human brain. Sophos’ Intercept X Tool can extract features from a single file and perform a deep analysis. It detects malicious activities within 20 milliseconds. Plus, it’s also trained to work on bi-directional sharing and real-world feedback of threat intelligence. Results from the Intercept X Tool feature high accuracy and a low false positive rate. IBM Watson Technology IBM’s QRadar Advisor uses IBM Watson Technology, a unique AI tool for fighting cyber attacks. Artificial Intelligence can auto-investigate activities and indicators for potential exploitation or compromise. With cognitive reasoning, IBM Watson Technology can present critical insights to accelerate the response cycle. Security analysts can utilize this technology to search for threat incidents, reducing the risk of letting them fly under the radar. 2. Blockchain as a security solution It guarantees no points of failure or hackable entrances that can expose datasets inside the system Blockchain is a type of distributed ledger technology (DLT) that aims to establish trust within an untrusting ecosystem. Today it’s one of the most robust cybersecurity technologies in the industry. Blockchain utilizes a decentralized ledger system, but your team members can still gain access to transparent information in the cloud. Members can also record, pass along, and view necessary transactional data in the blockchain. The entire blockchain process maintains data integrity within the system while establishing trust among team members. It guarantees no points of failure or hackable entrances that can expose datasets inside the system. Cybersecurity, biometrics Cybersecurity primarily benefits from these features because blockchain can create a secure and robust wall between data and hackers. On top of that, blockchain ledgers can include biometrics like fingerprints and retina scans. These prevent hackers from accessing any private data. Because blockchain is decentralized, it also limits hackable data. Together with the technology’s record-keeping system, each node is provided insight into data manipulation exposing real-time cybercrime attempts. 3. Increased and widened access control Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data Access control is critical in data security. More than a valuable security tool, business leaders can use access control to regulate people accessing any given resource. A company with an IT security setting can control who has the liberty to edit certain files. One of the primary goals of access control is to minimize threats or attacks to organizations and businesses to keep people and data secure. Without access control, expect your company to be open to security issues, including theft, data loss, and breach of data protection laws. Benefits The benefits of increased and widened access control include: Identifying who can access and control your data at specific time intervals. Protecting data from overwriting, accidental deletion, and malicious intent. User permissions that can be readily changed. Compliance and regulation with data privacy laws. Central management of access to data through a reporting portal or a dashboard. Multi-factor authentication Access control comes in various types and systems, so it’s critical to know the features of what you’re looking for. The most common type is multi-factor authentication or MFA. It involves multiple steps before logging in, requiring the user to enter other relevant information besides the password. Some other examples of information include biometrics, answering a security question, or entering a code sent to the user’s email address. Two-factor authentication, role-based access control Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession Two-factor authentication further prevents unauthorized entries that can result in unnecessary data possession. Another type of access control is role-based access control. In this setup, only one individual can set up access guidelines and grant permissions to specific team members within an organization. 4. Greater use of the zero-trust security model The zero-trust security model is a framework that requires every user within and outside the organization to undergo authentication, authorization, and validation. These are all essential to ensure proper security configuration before access is granted to the company’s applications and data. A zero-trust model assumes that anyone can cause data breaches and that a traditional network edge is not taken into effect. Moreover, it addresses the following modern-day challenges: Hybrid cloud environments. Security of remote workers. Ransomware threats. This framework utilizes the combination of multiple advanced technologies, including: A risk-based multi-factor authentication. Endpoint security. Identity protection. Cloud workload technology. The zero-trust model uses all these innovative tools for system identification, user verification, access consideration, and system security maintenance. Constant validation and monitoring Enforcing strict policies and compliance with data privacy laws are also essential Additionally, it also considers data encryption, email security, and asset verification before establishing connections with applications. The architecture of a zero-trust framework requires constant validation and monitoring of the users and the devices they are using. Enforcing strict policies and compliance with data privacy laws are also essential. More importantly, the zero trust architecture requires all organizations to be aware of all their available services and accounts to gain complete control of data handling and manipulation. 5. Increased privacy regulations Privacy regulations and policies guide organizations in proper data control, handling, and security. These policies guide organizations in proper data control, handling, and security. As a responsible business owner, you must comply with these regulations to avoid legal issues. With cybersecurity attacks becoming common, expect increased and stricter privacy regulations to be released in the next few years. While current policies are still taken into effect, various modifications and adjustments will occur to compete with the rising numbers of data breaches, thefts, data loss, and more. California Privacy Rights Act (CPRA) Currently, the California Privacy Rights Act (CPRA) is the most comprehensive legislation on state data privacy. It only started to take effect on January 1, 2023. The CPRA introduces the following principles: Broad individual consumer rights. Significant duties of people who need to collect sensitive and personal information. Additional definitions of data privacy and security. An individual’s duties include releasing information about data collection to concerned data subjects and proper access, correction, and deletion of information. Final thoughts 2023 is a big year for data security. Trends such as increased adoption of zero-trust policies, a greater reliance on AI security tools, and the implementation of blockchain as a security solution are all things we expect to see shortly. Staying up-to-date with these trends is important for keeping your business current and ensuring that you’re adhering to new and changing regulations. Doing so can give you an edge over the competition and keep you out of legal hot water.
Security beat
Companies at GSX 2023 emphasized new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasizes ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the Mid-Market to the Cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for pure cloud, but there are benefits to be realized from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realize the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘Soft’ Features for Integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organization more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organization more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centers around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasizing performance, protection (cybersecurity), and price, their data centers are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring center where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
A pioneer in the access control sector since 1971, AMAG Technology is looking to the future and the next generation of products that will expand its services to customers. “In our vision, we have advanced approaches that will not only provide our partners with advanced technologies but also ones that are easier to install with tools to expand their services,” says David Sullivan, who was appointed President of the venerable access control company in September 2022. New challenges at AMAG Sullivan brings a new outlook to the AMAG business, a part of Allied Universal, and a new vision to lead the company into the future. We caught up with David Sullivan to discuss his new challenges at AMAG and the journey ahead as the company looks to the future. Q: How does your background inform your approach to leading AMAG? I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry David Sullivan: With the exception of only a few short years, my career has been in access control. I have experience with several systems and have had the privilege to manage several successful access control companies. As a result, I bring a great deal of experience into my role at AMAG. I believe that it helps me to define a vision for AMAG that will be unique and on the leading edge of our industry. Q: How would you describe AMAG’s journey over the last several years and how do you see the future? Sullivan: Prior presidents of AMAG always shared their leadership vision and direction with senior leaders located in the United Kingdom. This had an impact on the full direction of the business, sometimes limiting its ultimate success. Before I became a part of AMAG, these senior leaders that were located in the UK retired, placing for the first time the full management responsibilities of the president. This has allowed me to integrate the business into a single team, with single objectives, and a single vision. We expect to begin to reveal this new vision in the coming weeks. We are excited about the future of AMAG and believe we will surprise the industry with our new products and approach in the coming months and years. Q: How important is it that a manufacturer provides both hardware and software solutions? How does AMAG’s approach (in general) differentiate it in the market? We can design the complete solution, providing functionality that others may find more difficult to accomplish Sullivan: Regardless of the manufacturer, we all provide hardware and software. An access control solution is not complete without both. Some of us choose to make our panels, and others do not. Those who are dependent on third-party suppliers are restricted to the developments and direction of that company, and while it might be perceived to be an open technology, it still is proprietary to the hardware manufacturer. AMAG has controlled its manufacturing of panels from day one. The result means that we can design the complete solution, providing functionality that others may find more difficult to accomplish. Q: How does the breadth of AMAG’s product suite provide advantages to customers and/or integrators? Sullivan: AMAG’s product portfolio is unique and provides the end user with an end-to-end identity management solution from one company. Our Control Room PSIM, Symmetry CONNECT Identity Management Solution, Symmetry Access Control, and Symmetry GUEST solutions all integrate to provide the user with a broad set of features and capabilities from a single provider. There is no finger-pointing when we come to support your system. We hold full responsibility for making it work and can quickly provide a resolution to any application difficulties the user may be experiencing. Q: How does AMAG address the divide between on-prem and cloud systems? How do you help customers make the transition and/or plan for the future? We are in the early stages of developing our next generation of access control in which we intend to provide on-prem Sullivan: In our current product portfolio, we have three products that are cloud-based. Our mobile credential platform (Symmetry Mobile), our visitor management solution (Symmetry GUEST), and our physical identity and access management solution (Symmetry CONNECT) are all offerings that operate in the cloud. We are in the early stages of developing our next generation of access control in which we intend to provide on-prem, web client, and cloud-based offerings. One of the primary objectives is to ensure that the large installed base of systems that are out there today will be able to migrate not only to our next generation but as well to the cloud if the client so desires. Q: What is AMAG’s approach to mobile credentialing? Sullivan: As an access control provider, adding Symmetry Mobile credentialing to our portfolio just made sense. We want our customers to have a forward-thinking solution with the opportunity to save money not only on the physical badges but the cost of printing and distributing badges. Mobile credentials can be easily issued and revoked remotely, reducing administrative overhead, and eliminating the need for physical inventory management. Organizations can centrally configure what devices are used and the read range for each type of device and operating system, thus providing flexibility. Symmetry Mobile offers a customized questionnaire that controls access and reduces liabilities. Q: What has surprised you the most in your first year or so leading AMAG? Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company Sullivan: I wouldn’t say I was surprised by this as much as happy to see, but I would say that the quality of our people was a pleasant surprise. As well, the AMAG product offering is broad and has some unique elements. When coupled with the depth of the resources that we have in AMAG, I know that we are second to none. Not many companies are blessed with such a broad portfolio that is supported by a resource-rich company that has so many talented people. Q: Please describe your dealer channel, and how you are seeking to expand it. Sullivan: The AMAG products are sophisticated and typically are installed for higher-end applications. With this sophistication comes a need to be well able to install such a solution. We have a strong group of certified and loyal partners who help us to deliver these enterprise solutions. We desire to provide our existing partners with updated and competitive systems to offer to their end users. Q: What is the security industry’s (and/or AMAG’s) biggest challenge in the next five years? We need to find ways to provide both our channel partners and the customers with solutions that are easily integrated Sullivan: I believe that the advancements that we are seeing in technology provide our industry with the opportunity to truly change how security is provided to our collective customers. As we advance these solutions, we will need to do so responsibly and in a way that helps the channel’s abilities. We need to find ways to train our partners to both install and support these more complex solutions. At the same time, we need to find ways to provide both our channel partners and the customers with solutions that are easily integrated, moving away from proprietary closed systems to open and cohesive solutions. This will ensure that the users get the best, and most complete solutions. Q: What does the industry as a whole misunderstand about AMAG -- time to set the record straight! Sullivan: Well, I am not ready to openly share where we are heading. We are in the process of putting together some advanced approaches to how we will do business with our partners. We are focused on providing tools that will enhance their services to their customers, and with products that are leading edge. I can only state that all should keep their eyes on AMAG, because over the next few years, we are going to surprise some people, and more importantly make our loyal partners quite powerful.
Matter is a new open-source interoperability standard that will simplify the connectivity of smart home systems, including security. The growing popularity of the Matter 1.0 standard was evident at the large Consumer Electronics Show (CES) in January in Las Vegas, where the standard was heavily promoted by companies including Google, Amazon, and Samsung. A flood of Matter-connected products is on the horizon for ship dates in the second half of 2023. Evolve, and manage IoT standards Creating the standard is the Connectivity Standards Alliance (CSA), formerly the Zigbee Alliance, which changed its name in May 2021. With 300 companies as members, CSA seeks to create, evolve, and manage Internet of Things (IoT) technology standards through a well-established, collaborative process. CSA promotes the benefits of global, open standards, and the value of the IoT to customers and consumers, and seeks to break down the barriers to broad access and adoption of IoT technologies and solutions. Matter The new brand name Matter was launched in May 2021 to designate the standard formerly known as Project CHIP (Connected Home over IP), developed by CSA member companies including Apple, Google, Samsung, and Amazon. There are currently 800 devices and apps certified to the new smart home standard, including various smart home equipment (except video cameras, which will be included in a major release in the fall of 2023). Matter version 1.0 was initial launch in October 2022. Matter 1.0 release Twice a year moving forward, Matter plans a minor release each spring and a major release each fall As part of the Matter 1.0 release, authorized test labs are open for product certification, the test harnesses and tools are available, and the open-source reference design software development kit (SDK) is complete, thus enabling new products to be brought to market. Twice a year moving forward, Matter plans updated releases, a minor release each spring and a major release each fall. Smart home interoperability Currently, a variety of CSA working groups are addressing various aspects of interoperability in the smart home, including issues such as data privacy, security, energy management, and health and wellness, says Christopher LaPré, CSA’s Head of Technology. “Implementing elements requires that the standards alliance be able to multitask on several tracks,” says LaPré. Some development is centering around connectivity and the need for a “hub” to which multiple systems can communicate and incorporate an “identity” to regulate the availability of information to various systems. The standards will enable both do-it-yourself (DIY) systems and devices deployed by professional installers. Addressing privacy requirements The new development will be guided by what installers need to succeed in the home automation" Ecosystems depend on the availability of some type of “identity” to meet privacy requirements. Rules must be implemented across the ecosystem that deploys a “trust system” to ensure privacy. Solving the challenge involves getting all the major players to the table at the technical level to meet the bar from the business and technology perspective. “Integrators and retailers will play a role as Matter continues to evolve,” says LaPré. “New development will be guided by what installers need to succeed in the home automation market.” Matter-certified devices There is still work to be done to expand the 800 certified devices to function throughout the Matter ecosystem and to add new devices over time. One goal is to simplify an integrator’s solution using fewer hubs (and possibly a single hub) to provide a wide variety of services. The timeline of adding new Matter-certified devices may be delayed by the availability of equipment in the global supply chain, says LaPré. Flexibility Multi-admin provides for the simultaneous operation of devices in multiple smart home systems A multi-admin feature of Matter enables more flexibility for multiple ecosystems. A core feature of Matter, multi-admin provides for the simultaneous operation of devices in multiple smart home systems. Accordingly, family or household members could operate the device with the digital assistant or smartphone app of their choice. A bridging protocol helps to tie existing systems together. Amazon, Apple, Comcast, Google, SmartThings, and the Connectivity Standards Alliance came together in 2019 to develop and promote this new standard, joined by fellow Alliance board member companies IKEA, Legrand, NXP Semiconductors, Resideo, Schneider Electric, Signify, Silicon Labs, Somfy and Wulian. Smart device communication Currently, member organizations span all sizes, across a range of business categories. More than 1,700 Member individuals participate in bringing the Matter specification, reference implementations, testing tools, and certification programs to life. Matter's underlying network technologies are Wi-Fi and Thread. Wi-Fi enables Matter devices to interact over a high-bandwidth local network and allows smart home devices to communicate with the cloud. Thread provides a mesh network within the home. Both the Wi-Fi Alliance and Thread Group partnered with the Connectivity Standards Alliance to help realize the vision of Matter.
Case studies
As the UAE's economy progressed, its territory became the world's experimental zone for pioneering construction technologies. The continuous rise of the construction industry has introduced a large number of laborers to stations on construction sites. How to systematically manage workers under regulations, while ensuring the rights and interests of both workers and enterprises is the main problem currently faced by NGC on its way forward. The customer Nael General Contracting (NGC), founded in 1998, is one of the UAE's premier construction companies. Its core areas of expertise include the Design and Execution of Turnkey Construction Projects, Steel Structures, Aluminum & Glassworks, Interior Fit-out, Hard & Soft landscapes, MEP infrastructure, and Facilities Management. Based on 25 years of safe working life, NGC currently has more than 9,000 employees and has successfully contracted not limited to 250 projects. “NGC is seeking the best intelligent attendance solution for one of its construction sites with nearly a thousand workers.” To this end, NGC consulted Anviz's long-term partner Xedos. The challenge Workers' attendance management on and off work is bitterly chaotic without intelligent attendance Workers' attendance management on and off work is bitterly chaotic without intelligent attendance equipment. Workers' shifts are unreasonable and shift coordination is formidable. There are even abundant irregularities such as punching in on behalf of others and tampering with attendance data without permission. So laborers take the fairness of wage calculations with a grain of salt. Need for an intelligent and complete attendance solution “At the same time, the human resources department spends at least 10 hours per month sorting out the clock data of nearly a thousand employees to output monthly results reports." "The financial department also demands to settle workers' compensation based on attendance reports. It leads to continuous delays in salary payments. It is urgent to seek an intelligent and complete attendance solution." The solution Simplify attendance while outputting cloud reports FaceDeep 3 & CrossChex Cloud can cover the above needs and submit a satisfactory solution to NGC Based on ensuring the attendance management of nearly a thousand laborers, while also meeting the output of centralized visual reports and reducing labor costs, FaceDeep 3 & CrossChex Cloud can cover the above needs and submit a satisfactory solution to NGC. NGC's site manager said, "Attendance at the construction site is not transparent, and most workers are often worried about whether their salary for the next month will be recorded in their accounts. There has even been chaos in paid attendance, which has brought a lot of trouble to the normal operation of construction." FaceDeep 3, CrossChex Cloud Based on high-precision liveness face detection and dual-camera lenses, FaceDeep 3 can accurately identify workers and complete personal attendance verification under any environmental conditions, preventing the use of fake faces such as videos and pictures to check in. The CrossChex Cloud implements hierarchical management and designs administrator operation logs to record their action lines, effectively eliminating the unhealthy trend of tampering with records for personal gain. Attendance visualization reports Integrate through CrosssChex Cloud and SQL DATABASE to synchronize each employee's attendance records NGC's Finance Minister said, "Every month some workers appeal against errors in attendance records, but there is nothing we can do about the large amount of confusing data records." Integrate through CrosssChex Cloud and SQL DATABASE to synchronize each employee's attendance records, and automatically generate attendance visualization reports. Real-time updates Administrators and employees can make attendance management transparent by viewing reports at any time. The cloud system is equipped with shift and schedule management functions that administrators can adjust in real time according to the construction progress. Workers can apply for make-up attendance to achieve flexible management. Key benefits Convenient and worry-free attendance experience The efficient attendance system ensures a quick clock-in experience and simplifies the attendance process. Cloud visual reports make it easy to calculate workers' salaries. Reduced human resource costs Cloud visual reports make it easy to calculate workers' salaries. For the HR department, there's no longer a need to manually sort out large amounts of attendance data. Client's quote “The person in charge of NGC said, "The attendance plan tailored by Anviz for us has received unanimous praise from all employees." "It reduced more than 85% of the labor costs spent on worker attendance management and saved the company nearly 60,000 dirhams per month."
HID, the worldwide pioneer in trusted identity solutions, announces that Royal Jersey Laundry has introduced a new tracking feature of HID’s linen management platform at each of its 5-star hotel customer sites to guarantee that drivers drop off and collect precise linen stock and that costly errors are avoided. Linen tracking This new feature replaces a paper-based system used by drivers for the management of cages filled with clean/soiled linen delivered/collected at customer sites. It provides detailed end-to-end tracking of linen cages across multiple customer locations throughout the whole cycle of washing, packing, delivery, and collection, a complex process given that 550,000 pieces are laundered each week for numerous clients. Royal Jersey Laundry Royal Jersey Laundry works with most five-star hotels in London including The Dorchester, The Carlton Tower Jumerah Founded in 1915, Royal Jersey Laundry is one of the few cleaners servicing the luxury hotel sector. Based in a 25,000 square-foot purpose-built facility in Dagenham, rebuilt in 2021 for £15 million after a fire, it works with most five-star hotels in London including The Dorchester, The Carlton Tower Jumerah, The Peninsula London, and The Ritz. Need for constant communication Supporting the five-star segment is demanding given the constant communication required between the hotel and laundry, exacting standards, and the quantity and range of items to be laundered. This includes duvets, sheets, towels, and bath robes along with smaller items such as foot mats, drink coasters, shaving towels, and dry cleaning for guests themselves. Royal Jersey Laundry operates 24/7, employs 150 staff members, and washes 40 tons of linen per day. Maintaining laundering schedule Five-star hotels prefer to use linen they own with five sets kept of everything, allowing them to maintain a schedule In contrast with budget and mid-level hotels, five-star hotels prefer to use linen they own with five sets kept of everything, allowing them to maintain a rigorous laundering schedule and ensure guests always receive fresh, cleaned linens. “An average 300-bed hotel will have around 30,000 items of linen which will cost around £250,000,” says James Lincoln, Royal Jersey Laundry’s managing director. “The volume of linen is so high and it’s always moving such that accurate inventory control was a major challenge verging on the impossible.” HID cloud-based RFID linen management system Before the HID cloud-based RFID linen management system, everything was done manually. Laundry staff would check items off ironing/folding machines, a wholly error-prone process, and log the quantities on pieces of paper. The operational overhead for the laundry was exacerbated as the various linen items from the different hotels had to be kept separate, too. “Linen is everywhere: on beds, in cupboards, in transit, and at the laundry, yet no one had full insight into stock levels and, when things went missing which often happened, typically we’d get blamed,” says Lincoln. Real-time linen inventory management LinTRAK tags are sewn into linen items by laundry staff or linen manufacturers during the production process To address these problems, Royal Jersey Laundry installed a real-time linen inventory management system from HID combining LinTRAK® RFID tags, a full set of RFID equipment including table-top and conveyor-belt scanners, one RFID portal and one cabin scanning unit, and cloud-based Acuity software. The discrete LinTRAK tags are sewn into linen items by laundry staff or linen manufacturers during the production process. Some hotels also use LinTRAK tags to manage staff uniforms and restaurant linens such as napkins and tablecloths. HID LinTRAK textile tags Around 40% of Royal Jersey Laundry hotel customers have transitioned to the HID linen management solution and connect via Acuity’s web portal. Once cleaned, the linen is packed into cages, and scanned in seconds through HID’s RFID cabin station. Items are automatically counted, with delivery notes generated including billing information. HID’s Acuity software integrates with the laundry’s Sage accounting software to generate invoices. Benefits of textile tags The implementation of HID LinTRAK textile tags, RFID stations, and the Acuity software platform has radically changed how Royal Jersey Laundry operates, delivering a range of benefits: Fast Return on Investment: Since the installation of the HID equipment in 2019, the system has already paid for itself given the efficiency and productivity gains. Better use of people resources: Laundry and housekeeping staff no longer waste time on dull and resource-intensive activities like manually counting linen. They have been redeployed to more productive work, generating 10-20% savings in labor costs. Better visibility of stock levels: As hotels know exactly the location and quantity of linen, they are better able to cater to peak demand, reducing linen expenditures by up to 30%. Improved responsiveness and customer satisfaction: Access to in-depth data generated by the Acuity platform means the laundry can quickly answer customer queries. “We give hotels complete transparency about where their linen is in the cleaning and delivery cycle. There are just no grey areas anymore,” says Lincoln. Increased security of expensive linen assets: While theft of linen at five-star hotels is rare, it does happen. RFID tagging enables better monitoring of expensive bedding and towel investments. Enhanced reliability and productivity: Operations are more efficient as RFID-enabled items can never be lost or misplaced. Furthermore, digital scanning results in faster processing of items. “We’re effectively two businesses: the laundry itself and a logistics operation. We run a mixed fleet of lorries and electric vans which nip in and out of London three times a day picking up and delivering garments for hotel customers using us for guest work,” adds Lincoln.
The client functions as a prominent producer of phosphate fertilizers in Sub-Saharan Africa. They began mining phosphate rock in the early 1960s and started producing phosphoric acid in the late 1980s. Their extensive industrial facility, located in Senegal, includes various sites such as Mining, an Acid Plant, a Fertilizer site, and a power plant. They mainly export their phosphoric acid to India and distribute their fertilizer products within West Africa and globally. Client's requirements The client had a pressing requirement to connect multiple sites and consolidate them using a single communication platform. Additionally, they were in search of a hybrid communication solution that could support both modern and traditional networks. Their needs can be outlined as follows: Hybrid Communication Solution: Deploy a blend of Voice over Internet Protocol (VoIP) and conventional networks to enhance communication efficiency. Multilocation Solution: Create connectivity among various locations and merge them onto a unified platform to streamline communication effectively. Additional Features: Specifically desired functionalities like Call Accounting and Billing to streamline daily administrative duties and operations across multiple sites. Moreover, the integration of a public address system through the CO line at the power plant was crucial to guarantee the prompt communication of vital instructions to workers, whether in routine activities or emergencies. Hybrid communication solution The solution had to address the challenge of linking remote locations while also leveraging the existing traditional networks Matrix, collaborating with Bintech, developed a Hybrid Communication solution tailored for this industrial leader. The solution had to address the challenge of linking remote locations while also leveraging the existing traditional networks preferred by the industry. While there was an opportunity to modernize through VoIP connectivity, analog terminals were also essential components of the solution. The Matrix solution includes: Two SETU VTEPs and a PRI Gateway extended an IP Connection to the ANANT, a server-based PBX, located at both the MINE and ACID sites. At the MINE, there were five ETERNITY GENX platforms, and at the ACID site, there were two, all connected over LAN to the ANANT. Various analog phones were linked to these GENX platforms, and each GENX platform at the ACID site featured a GSM trunk extension. At the Fertilizer site, the primary ANANT was linked to the WAN. A single GENX platform, connected via LAN, facilitated connections to numerous analog phones on-site. Furthermore, this GENX Platform supported a GSM trunk. At the power plant, an ETERNITY PENX was linked to the WAN, supporting a public address system over CO. Furthermore, 28 analog phones were incorporated into the network at the power plant. At Senchim, a SETU VFXTH, a VoIP-FXS gateway, was linked to the WAN. This gateway provided connectivity to several analog phones as well. Results The Hybrid Communication solution effectively integrated disparate sites onto a common communication platform, utilizing both contemporary and conventional networks. Moreover, it enhanced communication through a range of features. The solution delivered: Smooth Multi-site Connectivity: With the support of SETU VTEP, capable of handling up to 2100 IP users, and ANANT, accommodating up to 5000 IP users, seamless connectivity across numerous sites was accomplished. Hybrid Communication Solution: A tailored Matrix solution integrated products capable of harnessing both contemporary and conventional networks. VoIP, GSM, and analog networks were effectively amalgamated to ensure efficient communication among various sites. Contemporary Features: The solution facilitated public address capabilities over CO via ETERNITY PENX at the power plant, allowing for vital information dissemination during emergencies. Integration of Call Accounting software, as requested by the client, was seamlessly integrated into Matrix PBXs. By combining contemporary and conventional networks, the Matrix solution distinguishes itself for its effectiveness, efficiency, distinctiveness, and readiness for the future.
Installers JTI Brandbeveiliging was contracted to help make safety a number-one priority at a pioneering food manufacturer in The Netherlands. They achieved this by choosing Hochiki Europe’s marketing pioneering fire detection system, Latitude, alongside waterproof devices from the ESP range. This comprehensive solution ensures the highest level of fire protection throughout the facility, giving the food manufacturer peace of mind and allowing them to focus on what they do best: producing delicious food. Kervo Kervo is a specialist in the high-quality cultivation and processing of fruit in the Netherlands. Since 1980 morello cherries have been grown in the Vossen family’s orchards in Roggel, The Netherlands. The family was one of the first growers in the region to use mechanical harvesting in the ’80s, fast forward 43 years later and Kervo currently runs operations across Europe and the UK and is proud of its reputation for offering the finest quality fruit to bakeries and fresh food processors. Fire protection systems Complexities of this project were that during food production significant amounts of steam were generated JTI Brandbeveiliging was founded in 2009 and is trusted by its customers for advice, installations, repairs, and maintenance of fire protection systems across the region. The team, led by Luciën van Eldijk was commissioned in 2022 to design and fit the fire safety system that would be integrated into Kervo's new manufacturing plant in Neer. One of the complexities of this project was that during food production, and particularly during the cleaning processes, significant amounts of steam are generated, thus causing false alarms. Latitude fire safety system Lucien explains how he and the team navigated this issue, “In food production sites like this, the machinery needs to remain clean throughout the entire process. This means there is a lot of steam and water present, which, unfortunately, can trigger false alarms." "We needed to install devices that could negate this issue, Hochiki’s waterproof call points, sounders, and sensors were the perfect solution. They worked seamlessly with the Latitude fire safety system from Hochiki.” Fire detection devices and systems Latitude, which is BOSEC-approved, a requirement for fire detection devices and systems in The Netherlands, has a powerful network-wide cause-and-effect capability. The system can support 5000 entries, with up to 20,000 inputs and 20,000 outputs across the network. Benefits of Latitude The new building at Kervo is a huge facility making the Latitude system the best solution The new building at Kervo is a huge facility, at over 40 meters in height it required over 2.5km of cabling and hundreds of fire detection devices to help make the building secure, making the Latitude system the best solution. “Due to the nature of this project, there have been some technical aspects where we have needed to seek advice, but the team at Hochiki has been very helpful in working with us to create the best solution for our customer." Easy to install with high standards "We choose Hochiki products and systems because they are reliable, they are easy to install and, most importantly, meet the high standards and regulations required by the laws of The Netherlands, we would recommend Hochiki products for this reason.” Hochiki’s analog addressable range (ESP intelligent) together with the Latitude system are EN54 Part 13 certified and with the BOSEC certification also in place, they provide the best complete and compliant fire detection system for businesses across the Belgium region as well as bordering countries such as Luxemburg, the Netherlands, and Germany.
Riga Sports Arena is a municipal facility maintained by the city of Riga, Latvia. Covering a total area of 21,821 square meters, the arena accommodates 2,500 spectator seats. It houses several training halls, including a large athletics arena, a training and warm-up hall, a weightlifting hall, and a sports field. Challenge Enhance security by replacing inefficient guards with technical equipment Riga sports arena faced a significant security challenge, relying on two guards who worked only night shifts. Depending on just one person was insufficient to ensure the safety of the complex, given its substantial size. The guards struggled to effectively cover all areas, leaving the arena vulnerable to security risks. Moreover, the financial burden of employing guards strained the city’s budget. There was a need to enhance security while eliminating the human factor and optimizing associated costs. Moreover, the financial burden of employing guards strained the city’s budget The client required a professional security system that could be implemented without extensive construction work or the need to lay a substantial number of cables throughout the building. They sought an effective and easily installable system that would enhance security without compromising the integrity of the facility. Solution Cost-effective wireless solution reinforcing security for a large municipal facility Considering the building’s size and recent reconstruction work, the installation of a traditional wired security solution was deemed impractical. This option would have required several months to complete and additional renovation work after installation. Moreover, the presence of many oversized windows, each requiring protection with detectors, made cable-based solutions even more impractical. GRIFS AG proposed an Ajax wireless solution that can be quickly installed without damaging the walls, allowing for complete control and management of the system through a mobile app. To streamline control without the need for multiple hubs, Hub 2 Plus Jeweler was selected In total, 115 devices were installed throughout the building to ensure comprehensive security coverage. To streamline control without the need for multiple hubs, Hub 2 Plus Jeweler was selected. This hub can control up to 200 devices, managing 25 security groups with a total of 200 users. This feature aligns with the client’s requirements, given the installation of many devices and the need to manage security modes for separate premises, all in the Ajax app. For example, it allows keeping employees’ offices in armed mode while conducting training sessions in the main hall. GRIFS AG installed DoorProtect Jeweler Given that the sports complex spans three floors and considering the need for the hub signal to pass through two reinforced concrete floors, the decision was made to enhance its communication range. To ensure stable communication between all 115 detectors and the hub, the ReX 2 Jeweler radio signal range extender was installed. This guarantees a reliable connection between all system components, ensuring seamless communication even in areas with challenging signal transmission conditions. For comprehensive security, GRIFS AG installed DoorProtect Jeweler opening detectors to oversee For comprehensive security coverage, GRIFS AG installed DoorProtect Jeweler opening detectors to oversee all doors. Additionally, MotionProtect Curtain Jeweler, with a narrow viewing angle and a maximum detection range of up to 15 meters, protects the large windows in corridors and sports halls. The challenge with large windows was that glass break detectors may be positioned far away from the hit spot, making it difficult to detect glass breakage. However, MotionProtect Curtain Jeweler, equipped with PIR sensors, instantly reacts to movement within its detection zone along the whole length of a window. Notably, the detector catches movement only if a person enters its field of view, allowing for protection even when a cleaner is working nearby, or a staff member is walking around. In addition, MotionProtect Jeweler detectors were installed throughout all entrance groups, major corridors, and stairwells to promptly notify the owner and the security company in case of any detected motion. Multiple HomeSiren Jeweler devices To facilitate arming and disarming of the security system for numerous employees in the sports complex, a wireless touch KeyPad Jeweler was installed. By entering a code, the device can activate the full security mode and automatically blocks itself if an incorrect code is entered multiple times. KeyPad Jeweler supports up to 99 codes, each corresponding to a separate user, making it suitable for enterprises with many employees. HomeSiren Jeweler devices were installed indoors throughout the skill to provide loud signs For rapid security response, the wireless alarm Button Jeweler was installed, enabling quick notification of the security company in case of intrusion. Furthermore, multiple HomeSiren Jeweler devices were installed indoors throughout the building to provide audible warnings in case of danger or deter potential intruders. These sirens emit loud sounds up to 105 dB to prominently signal a breach, effectively preventing unauthorized individuals and enhancing overall security. The arena management plans to automate evacuation doors using the Relay Jeweler system soon, enhancing safety and security by allowing remote door opening during emergencies. Why Ajax Cost-saving security solution. Customers can experience significant savings by opting for Ajax. The costs of the Ajax system installation were approximately equal to the expenses for security guards’ salaries per year. However, starting from the second year, the Municipality of Riga can achieve significant savings by paying only a low monthly fee for monitoring. Easily scalable future-proof system. With Ajax, the security system is easily scalable, allowing for future expansion and the implementation of additional functionality as needed. For instance, Hub 2 Plus Jeweler, already installed, supports the addition of up to 200 detectors, including MotionCam Jeweler detectors for photo verification of alarms, without requiring any system reorganization. This enables seamless integration for enhanced security measures, ensuring the system can adapt and grow with changing security requirements and evolving customer needs. Effortless wireless installation. Ajax offers a wireless solution, eliminating the need to lay cables in walls or undergo extensive repairs. This allows for quick and efficient installation without the limitations of wired infrastructure. After implementing the Ajax security system at the sports arena, the center’s management noted its convenience and decided to install Ajax in their homes.
RecFaces, an international facial recognition software developer played an indispensable role in promoting and maintaining safety during the Brazilian Carnival 2024. The company's one of the best and highly accurate products, Id-Guard, was applied to secure an open-air carnival and turned out to be a great solution to the security challenges faced. Facial recognition software The cameras equipped with facial recognition software were placed at mobile control checkpoints, which enabled people to move around and take part in live processions happening at the venue. Because of its fast identification ability, smart surveillance, and immediate notification of unwarranted persons present in the audience, facial recognition technology proved to be a good alternative for securing big events and carnivals. Accurate threat detection alerts FRS minimizes human error and removes proximity challenges of mobile authentication FRS minimizes human error and removes proximity challenges of mobile authentication. In the present-day security landscape, FRS becomes prominent as it contributes to the overall security of big public places, by producing quick but accurate threat detection alerts. Id-Guard's performance Maria Kazhuro, Business Development Director of RecFaces in the LATAM region, expressed pride in Id-Guard's performance, stating, "We are proud to say that our solution has once again performed exceptionally well in supporting security services during a mass outdoor event even under complex conditions of low light, high traffic, masked visitors and crowd." Maria Kazhuro adds, "Confidence in the quality of our facial recognition solutions allows us to look forward to the future with optimism and meet the demands of the most discerning customers. As expected, Id-Guard was vastly praised for being the best solution that elevated the security of the event." Public safety RecFaces will remain in the lead of technological innovation, and thus, it will support and ensure the enhancement of public safety and the well-being of citizens. While Brazilian Carnival 2024 progressed, RecFaces gained a reputation as an indispensable partner ensuring visitors’ safety with its novel facial recognition technology.
Round table discussion
There is safety in numbers, or so the expression goes. Generally speaking, several employees working together tend to be safer than a single employee working alone. Even so, some environments require that workers complete their jobs alone, thus presenting a unique combination of security vulnerabilities. The U.S. Occupational Safety and Health Administration (OSHA) defines a lone worker as “an employee working alone, such as in a confined space or isolated location.” We asked this week’s Expert Panel Roundtable: How can security technologies help to protect "lone workers?"
In the United States, they are called license plate recognition (LPR) systems. In Europe, the more common term is automated license number-plate recognition (ANPR). In either case, the systems provide capabilities that can benefit a range of applications from schools to municipalities to parking lots. Newer technologies can even identify vehicle color, type, make, and model. We asked this week’s Expert Panel Roundtable: What's new with license plate recognition (LPR) and/or automated number-plate recognition (ANPR) systems?
Video storage has come a long way since rooms full of VCRs stored video from an entire system of cameras. Video storage equates to data storage, and there are multiple options ranging from hard disk storage to the cloud to storage on each individual camera using SD cards. Increasingly, cloud-based storage is an attractive option to store video footage conveniently and safely. We asked this week’s Expert Panel Roundtable: How is expansion of video storage capabilities impacting the security industry?
Products
White papers
Connected Video Technology for Safe Cities
DownloadThe Borderless Control Room
DownloadSecurity Investments Retailers Should Consider For Their 2021 Budget
DownloadMaking Your Surveillance Cyber Secure
DownloadHikvision DarkFighter Technology For High-quality Images At Night
DownloadEnhanced Ethernet Technology (ePoE)
DownloadVideos
Network monitoring: Manufacturers & Suppliers
- exacqVision Network monitoring
- Bosch Network monitoring
- Dahua Technology Network monitoring
- Honeywell Security Network monitoring
- Axis Communications Network monitoring
- Hikvision Network monitoring
- Vicon Network monitoring
- AMAG Network monitoring
- Video Storage Solutions Network monitoring
- Sony Network monitoring
- IDIS Network monitoring
- BCDVideo Network monitoring
- Eagle Eye Networks Network monitoring
- March Networks Network monitoring
- Messoa Network monitoring
- LILIN Network monitoring
- Hanwha Vision Network monitoring
- Surveon Network monitoring
- Vanderbilt Network monitoring
- eneo Network monitoring
Multi-Residential Access Management And Security
DownloadGuide For HAAS: New Choice Of SMB Security System
DownloadPrecision And Intelligence: LiDAR's Role In Modern Security Ecosystems
DownloadHikvision: Solar Powered Product Introduction + HCP
DownloadFacial Recognition
Download