Radio frequency Identification
A new £2 million recycling center is on target to open on Homefield Road in Haverhill in the summer of 2024. It will replace the recycling center at Chalkstone Way and is more than three times the size of the existing site. The construction works are being completed by FCC Environment and its contractor DXI Regeneration Ltd, on behalf of Suffolk County Council. The facility will be operated by FCC Environment, which manages all of Suffolk’s 11 recycling centers. New center features...
The ASIS Foundation announces its findings of a comprehensive research endeavor led by esteemed researchers Ishmael Bhila, Peter Lee, and Alison Wakefield, shedding light on the multifaceted landscape of autonomous vehicles (AVs) within security contexts. The report, titled "Autonomous Vehicles: Threats, Risks & Opportunities," serves as a beacon for security practitioners, offering invaluable insights into the challenges and opportunities presented by the rapid advancement of AV techn...
Berg Insight, the pioneering IoT market research provider, released a new market study covering the video telematics market. The integration of cameras to enable various video-based solutions in commercial vehicle environments is a massive trend in the fleet telematics sector. Berg Insight’s definition of video telematics includes a broad range of camera-based solutions deployed in commercial vehicle fleets either as standalone applications or as an added feature set to conventional...
HID, the pioneer in trusted identity solutions, announces it has been positioned by Gartner® as a Pioneer in its 2024 Magic Quadrant for Indoor Location Services. The evaluation was based on specific criteria that analyzed the company’s overall completeness of vision and ability to execute. HID’s recent acquisitions of GuardRFID and Connexient have bolstered its location services portfolio, offering a more robust and complete solution. Strategic approach "We are thri...
SharpEagle Technology, a pioneer in the field of industrial safety solutions, has been honored with the prestigious award for 'Most Innovative Industrial Safety Solutions Provider 2024' in the UK by Corporate Vision. This accolade highlights the company's unwavering commitment to advancing safety standards within industrial environments. Pioneering safety innovations At the forefront of industrial safety, SharpEagle Technology is dedicated to enhancing safety protocols across various sectors...
Improving sustainability performance is becoming a higher priority for building developers, owners, and users. One consequence is the fast-growing demand for green building certifications — and therefore specification. Specialist input can make the difference between hitting and missing a project target. As experts in industrial design and construction, GBPBP PROJPRZEM was engaged by multinational Phillips-Medisize to create and execute the concept for a major new facility outside Katowic...
News
Advantech proudly announced its strategic collaboration with Qualcomm Technologies, Inc. to revolutionize the edge computing landscape. This effort, combining AI expertise, high-performance computing, and pioneer connectivity, is set to propel innovation for industrial computing. This collaboration establishes an open and diverse edge AI ecosystem, paving the way for best-in-class solutions tailored to AIoT applications. Enabling seamless integration Miller Chang, President of EIoT at Advantech, elaborates: “In the vast and fragmented IoT landscape, deploying AI applications efficiently is a challenge. Advantech and Qualcomm Technologies are working together to meet market demands and surpass perceived limits. Advantech, in collaboration with Qualcomm Technologies, will look to provide edge AI platforms to navigate the industry's fragmentation, ensuring interoperability. Together, we aspire to redefine AI possibilities at the edge, shaping the future of edge intelligence." "Advantech and Qualcomm Technologies’ collaboration marks a significant milestone in the evolution of edge computing. By combining Advantech's expertise in industrial computing with our cutting-edge technology, we are poised to reshape the future of embedded systems. This collaboration will unlock new possibilities for AIoT applications, enabling seamless integration of AI-powered solutions at the edge. We are excited to be part of this journey and look forward to the transformative impact it will have on various industries," said Jeff Torrance, Senior Vice President and General Manager, Industrial and Embedded IoT, Qualcomm Technologies, Inc. Performance-intensive technology Qualcomm Technologies is pioneering the industry transformation at the edge Qualcomm Technologies is pioneering the industry transformation at the edge. Utilizing its Product Longevity Program for certain SoCs, advancing AI technology and connectivity systems, Qualcomm Technologies envisions benefits across industrial automation, transportation, medical, and rapidly evolving sectors like robotics and energy. The collaboration between Qualcomm and Advantech reinforces the technical expertise and dedication to innovation of both companies. Advantech’s goal is to develop an advanced lineup of Edge AI Platforms and a dedicated Edge AI SDK for edge AI applications. These standardized and diverse platforms will drive the tasks of the future that will rely increasingly on intelligent and performance-intensive technology. Driving continuous innovation Through this collaboration, Advantech is poised to integrate Qualcomm Technologies’ solutions across its entire platform spectrum, including AI-on-Modules, AI Function Boards, and AI Edge Systems. Both companies will help develop go-to-market strategies to accelerate the digital Transformation of the embedded industry. This collaboration aims to drive continuous innovation and expansion in Edge AI devices for IoT.
IDEMIA Secure Transactions (IST), a division of IDEMIA Group, is a provider of payment and connectivity solutions for financial institutions, mobile network operators and automotive manufacturers. IST proudly received the NFC Forum Certification according to the latest Certification Release 13 (CR13) for its NFC key card portfolio. The compliance with this certification includes automotive car access NFC use cases as specified by the Car Connectivity Consortium® (CCC), a cross-industry organization advancing technologies for smartphone-to-car connectivity solutions. First automotive stakeholder With the compatibility of its automotive-grade NFC Key Cards with CCC Digital Key™, IST creates the perfect conditions for automakers to deploy seamless NFC car access solutions to their vehicles. From now on, only one protocol is needed to integrate both physical and digital cards. This milestone not only demonstrates IST’s commitment to seamless interoperability between NFC-enabled vehicles and its NFC Key Cards but also complements IST’s digital keys offering, developed in accordance with the CCC specification and scheduled for commercialization in 2025. This achievement positions IST as the first automotive stakeholder worldwide to align with cutting-edge industry standards. Expressing strategic interest IST has created a dedicated portfolio designed to match automotive industry quality While digital keys offer unparalleled convenience, carmakers are expressing a strategic interest in providing their customers with physical NFC key cards. It is a necessary complimentary companion for car access and an essential brand identity asset for carmakers. To meet this need, IST has created a dedicated portfolio designed to match automotive industry quality and reliability requirements. “We’re incredibly proud to announce that IDEMIA Secure Transactions has become the pioneering force worldwide to achieve the CR13 NFC Forum certification for our automotive-grade NFC Key Cards. This milestone not only highlights our commitment to cutting-edge industry standards but also solidifies our leadership in the automotive sector. By attaining the highest certifications, we ensure the highest level of security, reliability, and convenience in our solutions. This achievement reflects the innovative spirit and expertise of our teams, reaffirming IDEMIA Secure Transactions as the industry frontrunner,” said Fabien JAUTARD, Executive Vice President for Connectivity Services at IDEMIA Secure Transactions IDEMIA is a trusted partner of the Automotive industry for next generation physical and digital keys as well as flexible connectivity management, having already connected 45 million cars in the world for 5 of the top 10 carmakers.
ZE Government Solutions (ZEGS) announces it has been selected by AFWERX for an SBIR Phase II contract in the amount of $1,247,962.00 focused on coastal security and awareness to address the most pressing challenges in the Department of the Air Force (DAF). The ZE Coastal Alert System (Z-CAS) solution will be digital, portable, and self-sustaining designed to protect valuable USAF assets on Joint Base Charleston including the $7.5 billion in base property and capital assets spread across three seaports, two civilian-military airfields, 39 miles of rail, and 22 miles of coastline. Deploying the ZeroEyes solution with lightweight, portable platforms equipped with state-of-the-art radars, artificial intelligence for threat identification, and an aggregation platform for critical C2 operations will leave forces stronger equipped for future challenges. Small business experience DAF began offering the Open Topic SBIR/STTR program in 2018 which grew the range of innovations The Air Force Research Laboratory and AFWERX have partnered to streamline the Small Business Innovation Research (SBIR) and Small Business Technology Transfer (STTR) process by accelerating the small business experience through faster proposal to award timelines, changing the pool of potential applicants by expanding opportunities to small business and eliminating bureaucratic overhead by continually implementing process improvement changes in contract execution. The DAF began offering the Open Topic SBIR/STTR program in 2018 which expanded the range of innovations the DAF funded and now in March 2024, ZEGS will start its journey to create and provide innovative capabilities that will strengthen the national defense of the United States of America. SBIR Phase II award “The ZE Coastal Alert System will proactively identify, track, and respond to imminent threats in real-time, providing warning and actionable intelligence where traditional coastal security may face challenges,” said Mike Lahiff, CEO and co-founder of ZeroEyes, parent company of ZEGS. “We are thrilled to receive this SBIR Phase II award, and remain committed to excellence in national security innovation.”
Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence to achieve proven crime prevention, announces that company Founder and CEO Aria Kozak has been inducted into the Security Industry Hall of Fame. Considered the electronic security industry’s highest recognition for lifetime achievement and excellence, Kozak was among the five Class of 2024 recipients officially enshrined during a presentation on the main expo stage of the International Security Conference (ISC) in Las Vegas. The Father of Remote Guarding Kozak is known as “The Father of Remote Guarding,” but was inducted for the totality of his impactful, nearly 50-year security career. Dedicating himself to the security industry after completing a distinguished tour of duty in the Israeli military, his success as a business maverick and technology innovator emanates from deep experience and a lifelong commitment to preventing crime. Kozak’s milestones 1976-1990: Founded and built Universal Alarm Systems (UAS) into one of the nation’s largest and most successful burglar alarm and armed guard response companies. At that time, the industry relied solely on tape dialers and was hesitant to embrace new technology. As soon as digital technology became available, he implemented it by using Radionics. UAS also began incorporating two-way audio. Early 1980s: UAS established a successful marketing program with telephone solicitation and direct mail to businesses. Kozak’s company charged $0 to install new, better-performing equipment than the competitors. UAS’ RMR average was a previously unheard-of $120+, with an amazing 4% attrition rate. Late 1980s: Recognizing the power of video monitoring, Kozak was the first early adopter when Radionics introduced OmegaVision. It marked the beginning of video verification for the industry. Throughout this time, he also oversaw the building of three UL-approved central monitoring stations. During that time, he also introduced groundbreaking financing for customer contracts by approaching TOPA Thrift and Loan, Imperial Thrift and Loan, and Inglewood Thrift and Loan. Previously, the industry had been unable to attract that type of monetary commitment from established financial institutions. 1990: Kozak sold UAS to ADT and remained as a consultant. At the time of the sale, the company included one of America’s most sophisticated UL-listed central stations. 1996: Kozak launched a high-end integration firm called IntelliSec that engineered, installed, monitored, and serviced a variety of highly complex projects. 1999: Kozak accepted a partnership investment by a New York-based venture capital group to lead its efforts to acquire and consolidate other integration companies, to grow IntelliSec into one of the U.S.’ largest Integrators. While retaining 33% of IntelliSec holdings, he left the company in 2002. 2007: Kozak founded Elite Interactive Solutions as a real-time crime-prevention provider incorporating leading-edge technologies, including custom-calibrated video analytics and AI, highly skilled command center agents, and trusted law-enforcement partnerships. It was the company he’d wanted to start since the beginning of his career, one focusing on crime and catastrophe prevention. Having prevented many thousands of crimes, Elite was the first to be UL-certified for remote guarding and the only monitoring center in the nation to report zero false alarms to law enforcement, while at the same time assisting police in thousands of arrests and detainments. Security Industry Hall of Fame honorees In addition to Kozak, the other four distinguished new Security Industry Hall of Fame honorees are (in alphabetical order): Kelly Bond, Partner, Davis Mergers & Acquisitions Group; Andrew Lanning, Co-Founder, Integrated Security Technologies; Kirk MacDowell, President and CEO, MacGuard Security Advisors; and Jeffrey Zwirn, President, IDS Research and Development. Full coverage of the Hall’s Class of 2024 can be found in the April issue of Security Sales & Integration or at securitysales.com.
Siren, the all-in-one investigation platform company on a mission to keep people, assets, and networks safe, and Chainalysis, the blockchain intelligence platform, announced details of a strategic partnership at the annual Chainalysis Links event in New York. As cryptocurrency becomes more mainstream and used by both good and bad actors, the partnership addresses the increasing need for more sophisticated intelligence technology to fight illicit cryptocurrency activity. Chainalysis’ mission Many believe cryptocurrency is the future, and it is expected that blockchains will soon be the world’s primary mechanism for the exchange of value. Chainalysis’ mission is to build trust in blockchains, setting the stage for the mass adoption of crypto in a way that gives participants safety and security. Its data powers investigation, compliance, and market intelligence software that has been used to solve some of the world’s most high-profile criminal cases and grow consumer access to cryptocurrency safely. AI-driven search functionality Using patented technology, Siren delivers a modern search venture at firm speed and scale Siren is an AI-driven investigative intelligence platform that is used by some of the world’s pioneering Law Enforcement, National Security and Cyber threat investigators. Siren connects and enriches local classified information with external vendor data as well as data available from public sources to identify patterns, actors, and events. Siren’s AI-driven search functionality dramatically reduces the complexity in searching for intelligence-like browsing the internet or shopping online anyone can search for intelligence links, regardless of technical abilities, across multiple data sources and get immediate results on both desktop and mobile devices. Using patented technology, Siren delivers a modern search experience at enterprise speed and scale, making advanced intelligence queries accessible to all across the organization. Chainalysis Investigations solution Studies API is a REST-based API that programmatically aids to prioritize and accelerate studies Through the collaboration, illicit activity is easier to identify in real-time across multiple data sources, including Chainalysis’ on-chain data, allowing investigators and analysts to map addresses to named services, detect illicit activity as it happens, and build cases. The Siren platform leverages the Chainalysis Investigations API (IAPI), part of the Chainalysis Investigations solution. The Investigations API is a REST-based API that programmatically helps to prioritize and accelerate investigations. This ensures investigation teams can focus on the most important cases with the highest likelihood of success. The IAPI enables data engineers and scientists to enrich existing datasets with Chainalysis insights to enhance large-scale investigations, surface new leads, and uncover previously unknown connections between different cases for deconfliction. New York at Links 2024 John Randles, CEO of Siren, said: "Linking to crypto across multiple data sources is pivotal for investigators. We're delighted to announce the partnership here in New York at Links 2024. We were lucky to attend a couple of Chainalysis events last year and experience first-hand the synergies in our offerings and missions." John Randles will speak on Day Two of Chainalysis Links 2024 on the Intersection of AI and Crypto panel. Shannon Hughes, Senior Director, Head of Business Development and Partnerships commented: "Cryptocurrency is no longer just a niche specialty for elite cyber law enforcement units – our customers find connections to crypto across national security, crime, fraud, and cyber threats. This partnership enables investigators to combine Chainalysis data with other data sources to identify intelligence signals and actionable leads across specialties. This is the future of harnessing the transparency of blockchains to build a safer economic system."
The Security Event (TSE), one of the most highly anticipated industry exhibitions, is set to take place at the NEC Birmingham from 30th April to 2nd May. Keynetics is excited to be a part of the event and showcase its latest key management solution, SentriGuard®, on stand 5/H127. Moreover, the company is involved in a variety of other activities, which expo visitors will find insightful and very relevant to their operations. From key safe and platform demos to on-stage discussions and live key safe attack tests, the Keynetics team is looking forward to joining the industry pioneers over the three days of the show. Key safe, platform, and app demos On Keynetics stand 5/H127, visitors are invited to test SentriGuard key safes, discover how both app and code access works, and learn more about the management platform, including its functionality for managing key safes and user access across multiple sites. Live key safe attack tests Expo visitors are invited to witness physical key safe intrusion attempts by professional SentriGuard® will be attack-tested at the Live Testing Lab run by LPCB. Expo visitors are invited to witness physical key safe intrusion attempts by professional forced entry specialists at 10:45 on Tuesday 30th April, 13:15 on Wednesday 1st May and 11:00 on Thursday 2nd May. These sessions are intended to highlight the importance of security product accreditations, and industry standards, as well as demonstrate the robustness of Keynetics’ SentriGuard system. Joining access control thought-pioneers at The Forum Scott Fisher, Founder and CEO of Keynetics and SentriLock, will discuss the latest developments in access control alongside other technology leaders at The Forum organized by the Access Control Executive Brief. Keynetics will participate in two vertical discussions on 30th April: Access Control for the Industrial Vertical at 11 am and Access Control for the Commercial Real Estate Vertical at 14:30. SSEAs Awards ceremony Keynetics is proud to have been nominated for the Security & Safety Entrepreneur Awards Keynetics is proud to have been nominated for the Security & Safety Entrepreneur Awards in the Market Disruptor of the Year category. Winners will be announced during a reception at The Security Event on 30th April at 1 pm. They are honored that the end-user benefits of the software solutions have been recognized by the jury and look forward to celebrating security sector achievements and excellence alongside other nominees and guests. Don’t miss out! TSE is a must-visit event that will unite exhibitors and visitors from around the globe. Register for a free pass on The Security Event website and enjoy three days of networking and learn more about the latest industry products and developments.
Expert commentary
The adoption of innovative and interconnected door hardware systems can help overcome the challenges associated with building security, explains Daniel May of Consort Architectural Hardware. The security of our built environment and the safety of its people is paramount throughout a building’s lifecycle. While these elements remain a primary focus at each touchpoint of a construction project, today’s design teams are sooner adopting modern access control systems to address this age-old challenge, but why? Modern access control Where systems were once rudimentary, modern access control has evolved into a revolutionary factor of building design, unlocking various benefits for its many users in the process. The Internet of Things (IoT) has enhanced building security as we know it, and as technology continues to advance, more options enter the market. Following more than a decade of innovation and integration, the access control market is projected to grow year on year, from £7.8 billion in 2023 to £11.8 billion by 2028. Modern user requirements have led to several operational and technological advancements Modern user requirements have led to several operational and technological advancements during this period, and decision makers and design teams alike can now choose from a versatile selection of options. Some door hardware products now utilize smart locks, cloud control and even biometrics for example, and most recently, there’s been a substantial change to the way access control systems operate, with focus moving towards end users and ease of use. Modern access control has evolved into a revolutionary factor of building design Smart door hardware From an operational perspective, interconnected access control systems gift users with an intuitive network that improves building security through the use of real-time status updates, while also providing them with the ability to grant instant access approval and denial at the touch of a button. Often, users can operate their building’s various access points through their mobile phone, which has led to improved flexibility and efficiency in most environments - whether at home or in a public access property. The security benefits also become clear when compared to the alternative of physical keys. If a traditional key is lost or stolen, the security of a building becomes at risk until it is found or replaced. Intuitive access control systems are designed to build upon the traditional lock and key methods. By seamlessly integrating smart door hardware into both new and retrofit projects, users can manage access points and improve security across the building - without stifling ease of access, stunting future scalability or unsettling the aesthetics. Users can operate their building’s various access points through their mobile phone Access control system The PSIA standard is one of the widely recognized and respected standards for access control products As many adopt Wi-Fi infrastructures, NFC technology and cloud services into their buildings, decision makers must also consider the need for better standards. While the introduction of IoT may advance security, performance and functionality, it can also introduce new risks which must be mitigated by adhering to both localised and international standards, such as ISO 27001 for example. The Physical Security Interoperability Alliance (PSIA) standard is one of the widely recognized and respected standards for access control products and provides comprehensive requirements for systems by focusing on interoperability, scalability, and functionality. While the introduction of IoT may advance security, it can also introduce new risks Providing comprehensive requirements This standard ensures that access control products from different manufacturers can seamlessly integrate and communicate with each other, allowing for greater flexibility and choice when designing a complete access control system. After all, a one size fits all access control solution simply doesn’t exist and decision makers would be remiss in not selecting a product that aligns with their building’s needs while meeting the required standards.
The importance of data is ever-growing. For every profession, we’re witnessing the increasing reliance on data and its ability to promote efficiency for corporate decision-makers. The security industry is no different. The growing reliance on data and technological tools has allowed for a new breed of professionals with specialized skill sets. This evolution reflects the changing nature of security challenges in the digital age. The new security environment We know one thing from nearly every post-event analysis of a major security incident. Perpetrators frequently leave significant clues regarding their intentions. But identifying these risks is harder than ever. Security teams must manage greater threat data volumes through a wider range of channels. Security teams must manage greater threat data volumes through a wider range of channels Take the manufacturing sector, for example. Before the influx of data and technology, security teams may have been on the lookout for thieves conducting pre-operational surveillance in person at a plant. In the digital age, bad actors use social media to cooperate. In some well-organized theft rings, authorities have indicated that alleged buyers of stolen goods use apps to communicate with prospective thieves to streamline their process. Social engineering attacks In July 2020, hackers infiltrated Twitter's internal systems in a brazen cyberattack. Perpetrators tricked Twitter employees into revealing their login credentials via a social engineering technique called "phone spear-phishing." They compromised over 130 high-profile accounts, including former U.S. President Barack Obama, tech mogul Elon Musk, and Microsoft co-founder Bill Gates. Once inside, they utilized the company's internal tools to gain control of the targeted accounts and posted a series of tweets promoting a Bitcoin scam. The hackers promised to double any Bitcoin sent to a specified address and ultimately stole over $120,000 from unsuspecting users. This incident highlighted the vulnerability of even the most secure platforms to social engineering attacks and underscored the importance of implementing robust cybersecurity measures. Vast digital territories Leaders overseeing security and risk functions must establish a diverse team The rise of hybrid threats and the need to safeguard physical assets and vast digital territories has only expanded the concept of the company's perimeter. Fortunately, this same digital environment that fosters an expanded threat landscape can also enable security professionals with additional tools for identifying and eliminating risks. Leaders overseeing security and risk functions must establish a diverse team with a range of backgrounds and expertise to effectively utilize security tools and uncover hidden threats. As publisher and entrepreneur Malcolm Forbes eloquently stated, "Diversity is the art of thinking independently together." Public sector employees Traditional threats continue to pose a significant challenge, emphasizing the ongoing value of experienced corporate security professionals, such as veterans and public sector employees. However, the emergence of contemporary asymmetric risks necessitates teams with a broader skill set. The emergence of contemporary asymmetric risks necessitates teams with a broader skill set The future of security demands a diverse collective of individuals drawing expertise from traditional backgrounds, such as three-letter government agencies, and non-traditional perspectives, such as data analysts. This fusion of diverse experiences and thought processes is crucial for devising holistic solutions to real-world risks. Traditional and contemporary threats In organizations I have been involved in, simply understanding our gaps and covering them with needed expertise was efficient in helping meld discussions about security with the language of business, which was a two-way street. Bringing on a program manager who understood the scrum framework made it far easier to align security's conversation and for security to understand the needs of its internal stakeholders. The security landscape demands individuals who excel in data visualization, metrics analysis, and the ability to communicate security concepts in the language of business effectively. This blend of technical prowess and business acumen is essential for navigating the complexities of the modern security landscape. By embracing diversity in their security teams, organizations can harness the collective power of independent thinkers working together to address traditional and contemporary threats. This approach will empower organizations to build resilient security teams to safeguard their valuable assets in an ever-evolving threat landscape. Opening the door to new security talent For years, technology and data have grown to play a significant role in how security operates and evolves For years, technology and data have grown to play a significant role in how security operates and evolves. However, there remains a gap between how to effectively incorporate modern technology into legacy security programs. (There’s been some interesting research on this topic, including research out of the University of South California that identifies a lack of knowledge as a big barrier to using data and metrics by security teams.) As we transition into 2024 and the following years, developing analytical capabilities will remain essential for implementing and executing a comprehensive security strategy. Incorporating the expertise of digital natives, individuals who have grown up amidst recent technological advancements, or those with specialized knowledge in data visualization and metrics analysis will ensure that this technology is utilized effectively, empowering teams to harness its full potential. Proactive risk mitigation Data analysts, for example, with their proficiency in handling large datasets, can play a pivotal role in identifying and mitigating potential security threats by analyzing network traffic patterns, user behavior, and other pertinent data points, enabling proactive risk mitigation through predictive measures. These professionals play a critical role in translating complex security data into actionable insights These professionals play a critical role in translating complex security data into actionable insights, measuring the effectiveness of security measures, and aligning security strategies with overarching business goals. Bringing them on board may even create a flywheel effect. When recruiting for new team members, branching out and searching for candidates with non-traditional career backgrounds will open the door for more applicants with diverse and technological skills that fit modern security needs. Creating a holistic security program Fusing modern skills with traditional security expertise forms a holistic approach to security. It is a strategy capable of countering threats and demonstrating the tangible value of security investments to stakeholders in our interconnected world. In the same way that many security programs have shifted toward a centralized view of threats and vulnerabilities, teams composed of leaders from diverse backgrounds with modern skills combined with legacy security leaders will allow for a more comprehensive approach to security. This new security group will break free from the constraints of traditional methodologies and expand its capabilities to encompass a broader spectrum of risks. By combining insights from both seasoned security veterans and innovative digital natives, this team will deliver tangible value to a wider range of departments across the organization. When security can proactively provide solutions and effectively address risks that arise in all corners of the organization, it becomes the cornerstone of overall organizational safety. Modern security approaches This collaborative environment will empower the organization to stay ahead of the curve Fostering a seamless interchange between traditional and modern security approaches will lay the foundation for a robust security program, where knowledge sharing among team members elevates the effectiveness of the entire program. This collaborative environment will empower the organization to stay ahead of the curve and address the ever-evolving challenges of corporate security in a rapidly changing world. As we witness the future of security teams unfold, we will see a growing number of leaders emerge from the digital realm, bringing with them a deep understanding of risk management, emerging technologies, and data analytics. This infusion of fresh perspectives, coupled with the expertise of legacy leaders, will equip security teams to navigate the complex and ever-evolving landscape of corporate security. In his book "Risk: A User's Guide," Stanley McChrystal observed, ‘Generals who flawlessly fought the last war typically lose the one they're actually in—because conditions have changed and they haven't.’ This is true for leaders within the risk space, too. The security leaders of tomorrow must embrace change, adapt to new realities, and harness the power of diverse perspectives to safeguard their organizations in an ever-shifting environment.
Amidst the challenges of a prevailing economic downturn, the retail sector finds itself grappling with an unparalleled rise in incidents of shoplifting, theft, and burglaries. The disconcerting scenes witnessed on London’s Oxford Street in August 2023, where crowds gathered, looting as many stores as possible, sent shockwaves across the nation’s retailers. This alarming surge in retail crime has put retailers on high alert, as they contend with a rising tide of security concerns. Shoplifting concerns Recent data from the Union of Shop Distributive and Allied Workers (USDAW), has raised alarming concerns: shoplifting rates have surged by an unprecedented 24%. In the first half of 2023 alone, there were approximately 8 million reported shoplifting incidents. With the ongoing burden of the cost of living crisis and the approaching festive season, it is expected that these figures will keep surging. Implementing robust security measures Theft and prevention strategies cost retailers approximately £2 billion in 2021/2022 While more help from the Government to support retail workers and the businesses shoplifters target is certainly needed, the implementation of robust security measures will significantly contribute to deterring these crimes from occurring in the first place. British retailers spend millions on tools to deter and catch shoplifters inside stores, from CCTV and security guards to electronic tagging and alarms. The Grocer reported that theft and prevention strategies cost retailers approximately £2 billion in 2021/2022. Despite these initial costs, other threats are at play beyond the shop floor. Break-ins by criminal gangs For many large town center stores and supermarkets, and units in retail parks, the rear doors and delivery areas are commonly targeted by criminal gangs. It’s not uncommon for thefts to occur from pallets or cages that have been unloaded from lorries and sit waiting to be moved into the building. After-hours break-ins are a risk for all store owners too, particularly over the festive season when a lot of high-value stock has been delivered to shops and supermarkets. Addressing anti-social behaviour The additional fencing was deemed an essential measure to safeguard the community Anti-social behavior also poses a challenge for retailers. In 2022, an Aldi based in Derby invested in security fencing to protect staff and deter loitering groups. The additional fencing was deemed an essential measure to safeguard the community, as dangerous items were frequently found outside the store, including weapons and hypodermic needles. So how do physical security solutions such as fencing and gates help better protect retail establishments such as supermarkets and edge-of-town retail park shops? Fencing and gates: a critical component of retail security 1. Risk assessment and target hardening A thorough risk assessment will identify potential weak spots that require protection. ‘Target hardening’ involves implementing physical security measures that become more robust as they approach the target. This helps deter intruders while ensuring ease of access for customers and staff. 2. Effective perimeter security Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders Selecting fencing solutions according to the potential threats, site characteristics, and topography is crucial. It is important to specify fencing that strikes a balance and maintains a welcoming appearance while safeguarding external areas of the store or warehouse from potential harm and unauthorized access. Solid fencing which provides concealment can help to conceal expensive goods and remove them as a target for opportunistic theft. Opt for difficult-to-climb security fencing that provides a robust obstacle against thieves, vandals, and intruders. I recommend selecting a sufficiently tall and robust fence such as an acoustic barrier. Its noise-reducing properties are often beneficial for these types of sites too. 3. Controlling vehicular speeds and access To enhance security, consider controlling vehicular speeds and access. One effective approach is the installation of bollards at the ends of traditional high streets. This practice is already commonplace as a means of safeguarding against hostile vehicle attacks, but it can also play a pivotal role in preventing quick getaways of vehicles involved in potential heists. Additionally, employing road blockers and sliding gates at the rear entrances of delivery areas would serve to fortify security further. These measures can help in delaying vehicles, allowing for necessary checks to be conducted. 4. Balancing security with aesthetics The presence of high-security fencing can also make a site more of a target for vandals and burglars Another challenge is avoiding creating an imposing presence, especially important for areas situated near residential communities. The presence of high-security fencing can also make a site more of a target for vandals and burglars. To minimize this risk consider specifying timber fencing and traffic barriers to secure car parks, providing both security and a welcoming atmosphere for shoppers. Taking an integrated approach Combine secure perimeter fencing with effective lighting in places with shaded areas and at doors, gates, and shop windows, alongside Perimeter Intrusion Detection Systems (PIDS), and strategically placed CCTV. These measures will hinder unauthorized entry and escape, increasing the likelihood of detection and apprehension. Prioritising employee wellbeing Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment Installing robust security fencing, complemented by CCTV, good lighting, and guarding, creates a safe environment for employees. This not only safeguards their well-being but also provides peace of mind that they are protected effectively in the case of a burglary or crime. When selecting security products for retail sites, it is advisable to opt for items that have undergone rigorous testing and carry relevant certifications for their security level. Each component should meet industry-specific standards for its intended purpose and originate from manufacturers accredited under ISO 9001:2015. This ensures a high standard of quality and reliability in safeguarding the premises. High-quality security fencing As the cost-of-living crisis continues, crime rates increase, and the festive season approaches, the time to act and implement on-site security is now. By investing in comprehensive security measures, retailers can protect their assets, employees, and customers, ensuring a safer and more secure shopping environment for all. High-quality security fencing is also a sound investment, that requires little or no maintenance once installed. The best fencing solutions are extremely weather-resistant, and won’t suffer from rust or corrosion. With all sectors preparing to ride the rapids of recession in the coming year, improving on-site security while selecting cost-effective measures, is one surefire way to protect your people, your property, and your profits from harm.
Security beat
Security professionals are recognizing the intelligence value of leveraging publicly and commercially available information. This information can now be accessed more effectively from typically hard-to-reach regions. Also, the technological capabilities have matured in our age of artificial intelligence, machine learning, and data science. Intelligence has historically been based on classified data. However, today’s unclassified data, including open-source intelligence (OSINT), is increasingly being used to provide context and queuing for other types of intelligence. Advanced identity intelligence Babel Street is a technology company providing advanced identity intelligence and risk operations using an AI-enabled data-to-knowledge platform to unlock insights from a flood of data. The company provides advanced data analytics and intelligence for the world’s most trusted government and commercial organizations. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally The sheer volume of data is growing exponentially. Experts have predicted that by 2025 over 463 exabytes of data will be generated each day globally. Not only are we seeing exponential growth in the volume of data, but there is also disparity in the veracity and the variety of data. This is being compounded by the ‘app economy’ in which data is created in a new format for every app added around the globe. Human language technology “The problem is that the data ‘junk’ and the ‘crown jewels’ are in the same bucket, and government and commercial entities need better and faster ways to extract intelligence from these torrents of data,” says Farid Moussa, VP, Strategy & Public Sector, Babel Street. Prior to joining Babel Street, Farid retired from the National Security Agency (NSA). He has guided video, image, speech, and text analytics (VISTA) and developed an appreciation for human language technology. An elusive source of data is the Dark Web, where every user, by design, is attempting to obfuscate their identity, and bad actors are hiding much better. “This presents a cat and mouse game – the cat must be smarter than the mouse, but the mouse is continually getting smarter,” says Moussa. Intelligence tools for data analysis SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence There are several intelligence tools for analyzing data. One of them is signals intelligence (SIGINT), which refers to electronic transmissions collected by ships, planes, ground sites, or satellites. Another is human intelligence (HUMINT), which is collected in a human-to-human fashion. Open-source intelligence (OSINT) is obtained by searching on topics or entities of interest that are publicly available on the Internet at large. Today, these various categories are often done in ‘silos of excellence.’ However, the best practice is using all forms together in a holistic fashion. SIGINT and HUMINT – while both vital – are also the most expensive forms of intelligence, while OSINT, which is growing in importance, is most cost-effective. All are vital forms of intelligence; OSINT is complementary and crucial to holistic intelligence practices. Holistic intelligence practices When it comes to physical security of people and places, OSINT has become a critical source of actionable information. Security directors leverage Publicly Available Information (PAI) to safeguard against threats to individuals, property, travel routes, and event sites. By monitoring PAI, security teams can detect and respond to potential dangers, including during and after events where thorough preparation is vital. Online information can contain warning signs of impending threats. It informs security professionals in uncovering digital traces, confirming intentions, and addressing risks across language barriers, ensuring proactive risk management for the protection of people and property. Role of Natural Language Processing (NLP) The Internet and social media were mostly English language by default, but that has changed exponentially Natural Language Processing (NLP) is a crucial capability that has evolved to recognize the richness and variety of words and names in multiple languages and scripts, and their use across cultures. Using machine learning and linguistics algorithms, the technology simultaneously considers numerous types of name variations. At one time, the Internet and social media were mostly English language by default, but that has changed exponentially. Babel Street’s world-class entity matching technology measures over 100 features to calculate the similarity of entities across multiple languages. Despite advances in data management and the cloud, there are still multiple challenges and complexities with integration of these data elements. Challenges include spelling variances/phonetics, language translation issues, criminal evasion, human error upon input, typos, etc. Accessing data from a scattered landscape While there have been advancements in cloud technologies, agencies utilizing open-source data are typically working within a highly scattered data landscape and must use a wide array of tools to get at the relevant pieces. This fragmentation makes it difficult to run analytics and apply AI and machine learning at scale in order to derive actionable insights. Unstructured and relationship data are visualised through advanced link analysis As with many disciplines, artificial intelligence (AI) is changing the game when it comes to intelligence. NLP and AI algorithms are employed to enhance datasets for greater quality, usability, and completeness. Unstructured and relationship data are visualized through advanced link analysis, geographic heat maps, influential entity carousels, topic clouds, and patterns by time and day. Geographic heat maps The advanced algorithms accurately score and prioritize critical entities within the relationship network while providing the citations from which an AI/ML-based decision was made. “With the democratization of AI, the world is becoming flat,” says Moussa. “Just like the most prosperous countries, even the poorest countries have the most advanced capabilities to do damage. Third-world economies often present a scenario where the financial gain of nefarious schemes and low-to-no regulation combine to incentivize bad actors.” The Challenges of Name Matching Identity has been an ongoing challenge for intelligence analysis due to the vast complexity of linguistics, spelling and cultural variances, human error, as well as human evasion. Technology and data science approaches are maturing, however machine translation can still struggle with meaning. The best-of-breed natural language processing capabilities run against the data while it still is in its native language. This minimizes the occurrence of analytic errors caused by inaccurate machine translations. This minimizes the occurrence of analytic errors caused by inaccurate machine translations It’s tempting to think that name matching is like doing a keyword search. The complexity of language makes it more challenging. New names are constantly created, with multiple spellings and no set of rules to encompass how names are formed. They are variable across languages, scripts, cultures, and ethnicities. Culturally specific nicknames and aliases add to the complexity. Replacing human involvement The investigation of the Boston Marathon Bombing in 2013 spotlighted an example of the significance of intelligence analysis. Even though the FBI had issued a detain alert for Tamerlan Tsarnaev back in 2011, Tsarnaev managed to travel to Russia in January 2012; and in July 2012, he returned to Boston. He was not detained on either occasion because there were too many names on the lists, and Tsarnaev’s last name had been spelled differently from the way it was on travel documents, thus enabling him to get through security. With the Internet, social media, and the dark web, there’s been an exponential increase in public communications in various languages, adding significantly to the amount of analysis required to keep societies safe. Name matching, using AI, analyses multiple contextual data points across languages to arrive at matches. Name matching, using AI, analyzes multiple contextual data points across languages to arrive at matches A common misconception is that this technology will replace human intelligence. “It’s more accurate to recognize its role as a force-multiplier, allowing humans to focus on the on the harder problems and/or vetting the results of AI,” says Moussa. “The technology can efficiently analyze massive volumes of data and distill it into actionable information in a timely manner. It augments human capabilities, enabling analysis at speed and scale beyond human capacity, without replacing human involvement.” Commercial Technology to the rescue “When it comes to threat and identity intelligence, we face a risk-confidence gap, underscored by the challenge of integrating traditional tactics with the modern digital landscape,” adds Moussa. “We cannot ‘hire’ our way out of this problem. Instead, it is imperative that we adopt technology to scale our efforts and free humans to solve the harder problems that machines cannot solve yet.” The public sector loves to build things, but there are time-to-value and return-on-investment considerations to the ‘build or buy’ decision. When commercial technology can be leveraged by government, it frees resources up to work on problems that the commercial world hasn’t yet figured out, says Moussa. “The public and private sectors need to come together – one team, one nation, working together with mutual trust and collaboration,” he says.
Companies at GSX 2023 emphasized new ways that technologies such as artificial intelligence (AI) and the cloud can address long-standing issues in the security market. Among the exhibitors at the event in Dallas were companies seeking creative ways to apply technology, lower costs, and make the world a safer place. Reflecting on the exhibition, here are some additional takeaways. Expanding AI at the edge i-PRO is a company reflecting the continued expansion of edge AI capability in the security market. Today, more than half of the company’s lineup supports AI at the edge so the customer has a wide choice of form factors when seeking to leverage the feature set. AI processing relay, extended warranty i-PRO is increasing their warranty period from 5 to 7 years, which could be a lifetime warranty in some cases I-PRO also has an “AI processing relay” device that accepts non-AI video streams and applies edge analytics. AI has progressed from a high-end technology to a feature available in a variety of cameras at different price points. i-PRO is also increasing its warranty period from 5 to 7 years, which could be a lifetime warranty in some cases depending on a customer’s refresh schedule and lifecycle management. Active Guard, MonitorCast The company’s video management system (Video Insight) is continuing to build new features including “Active Guard,” an integrated metadata sorter. Their access control platform, MonitorCast, is a Mercury-based solution that is tightly integrated with Video Insight. Their embedded recorders now have PoE built in. “We can move at a faster pace to fill out our product line since leaving Panasonic,” says Adam Lowenstein, Director of Product Management. “We can focus our business on adapting to the market.” Emphasis on retail and other verticals Shoplifting is a timely issue, and retail is a vertical market that got a lot of attention at GSX 2023. “We see a lot of retailers who are primarily interested in protecting employee safety, but also assets,” says Brandon Davito, Verkada’s SVP of Product and Operations. “Shrinkage is a CEO-level priority.” “Retailers are getting more engaged with security posture, instead of letting perpetrators walk,” Davito adds. Intrusion detection Verkada has an intrusion product that will notify a central station if there is an alarm On the alarm side, Verkada has an intrusion product that will notify a central station if there is an alarm, and operators can review videos to confirm the alarm. Other capabilities seeking to discourage trespassers include sirens, strobes, and “talkdown” capabilities. International expansion Verkada continues to expand internationally with 16 offices in all, including Sydney, Tokyo, and London. The core value proposition is to enable customers to manage their onsite infrastructure more simply, including new elements such as PTZ cameras, intercoms, and visitor management. Verkada emphasizes ease of use, including a mobile application to allow access to be managed across the user base. Forging partnerships “We are committed to the channel and industry, and we continue to build relationships and expand our reach,” says Davito. Among the industry relationships is a new partnership with Convergint, which was hinted at during the show and announced later the same day. They are also expanding their partnerships with Schlage, Allegion, and ASSA ABLOY. Working with other verticals They offer new features for K -12 schools, and a new alarm platform is easier to deploy and manage Verkada has also found success across multiple other verticals, notably healthcare, where they integrate with an electronic medical records system. They offer new features for K-12 schools, and a new alarm platform is easier to deploy and manage. They are integrating wireless locks to secure interior doors in schools, looking to secure the perimeter, and installing guest management systems. Transitioning the Mid-Market to the Cloud Salient is squarely focused on the “mid-market,” a large swath of systems somewhere between small businesses and enterprise-level systems. Pure cloud systems are not as attractive to this market, which has a built-out infrastructure of on-premise systems. Adding a camera to an existing system is easier and less expensive than tying it to the cloud. Benefits of cloud It’s a market that may not be ready for pure cloud, but there are benefits to be realized from adding a cloud element to existing systems. “We are continuing to augment our premise-based solutions with added cloud capabilities and flexibility,” says Sanjay Challa, Salient’s Chief Product Officer. The feedback Salient hears from their customers is “I want to own my data.” The hybrid cloud approach offers the right mix of control, flexibility, and unit economics. Cloud add-on capabilities We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive" Cloud add-on capabilities include bringing more intelligence about system operation to the user via the cloud. Over time, Salient expects to sell more cloud-centric offerings based on feedback from integrators and customers. “We want to provide the flexibility for customers to go full-cloud as it becomes more economically attractive over time,” says Challa. Vaidio AI technology Salient seeks to be a transition pioneer to help customers realize the path to the cloud. Their approach is “crawl, walk, run,” and helping customers make the transition at each stage. Salient has added AI to its product offering, incorporating Vaidio AI technology from IronYun into a powerful suite and broad array of on-premise analytics, which are gaining traction. The seamless approach makes it easy for customers to embrace AI analytics, although Salient remains broadly committed to open systems. Addressing ‘Soft’ Features for Integrators AMAG is in the process of enhancing its product line with the next generation of access control panels. However, “product” is just part of the new developments at AMAG. In addition to “hard” features (such as products), the company is looking to improve its “soft” features, too; that is, how they work with the integrator channel. Integrator channel Rebuilding a process to make your organization more efficient, is relatively easy; it just takes a lot of persistence" “We have the depth of our legacy customer base we can learn from, we just need to close the feedback loop quicker,” says Kyle Gordon, AMAG’s Executive Vice President of Global Sales, Marketing, and commercial Excellence, who acknowledges the value of reinstating face-to-face meetings after COVID. “We are laser-focused on nurturing our integrator channel,” he says. “Developing new features takes time, but rebuilding a process to make your organization more efficient, that’s relatively easy; it just takes a lot of persistence,” says Gordon. More cohesive internal communication is another useful tool, he says. Disrupting the cloud based on price Wasabi is working to make cloud applications less expensive by offering a “disruptive” price on cloud storage, $6.99 per terabyte per month (80% less than hyperscalers). Contending “hyperscalers” like AWS are charging too much for cloud storage, Wasabi is using its own intellectual property and server equipment co-located in data centers around the world. Wasabi sells “hot cloud storage,” which refers to the fact that they only have one tier of storage and data is always accessible. In contrast, a company such as AWS might charge an “egress fee” for access to data stored in a “colder” tier. Cloud storage “We saw that several video surveillance companies had not yet adopted cloud storage, and we saw an opportunity to make it easy to use,” said Drew Schlussel, Wasabi’s Senior Director of Product Marketing. “We just install a little bit of software that allows them to store data in the cloud and bring it back from the cloud.” Performance, protection (cybersecurity), and price Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies Wasabi works with integrators, resellers, and distributors and also integrates with VMS companies such as Genetec and Milestone. Emphasizing performance, protection (cybersecurity), and price, their data centers are certified to SOC 2 and ISO 27001 standards. Faster throughput for weapons detection Xtract One is a young company focusing on weapons detection in a time of accelerated concern about gun issues post-COVID. Founded in Canada and based on technology developed at McMaster University, Xtract One has found a niche in providing weapons detection at stadiums and arenas. These customers already have budgets, and it is easy to shift the money to a newer, faster technology. Madison Square Garden in New York City is among its customers. Cost savings solution Xtract One can increase throughput to 30 to 50 people per entrance per minute (compared to 5 to 6 people per minute when using metal detectors). The solution doesn’t require anyone to empty their pockets and the system alarms on items beyond guns and knives. Using Xtract One allows customers to reduce the number of screening lanes and security staff, providing additional cost savings, all while getting fans through the screening process in half the time. Purpose-built sensors The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties In addition to stadiums and arenas, Xtract One, formerly Patriot One, is also getting “inbound” interest from schools, hospitals, manufacturers, and other verticals that makeup 50% of their business. “We’re on a rocket ride, mainly because the weapons issues are not going away,” says Peter Evans, CEO and Director at Xtract One. The system uses purpose-built sensors looking for specific characteristics, such as reflective and density properties, all correlated by an AI engine. Providing early warning of violence ZeroEyes is another company focused on weapons detection. Their AI gun detection system works with video images to identify if someone is “brandishing” (carrying) a weapon. In other words, the system does not detect concealed weapons. Identifying someone carrying a weapon provides early warning of a possible violent act. Increased response with AI-enables images Images are identified by AI and sent to a monitoring center where a human confirms the image before contacting first responders. Knowing the location of a shooter enables staff to lock entry points, move people to safety, and direct first responders. The company was founded to leverage existing camera views to stop mass shootings and gun violence by reducing response times.
GSX 2023 has its share of new product announcements, although many of the new products are enhancements to technologies shown at last spring’s ISC West show in Las Vegas. Booth traffic on the first day seemed busy at the Kay Bailey Hutchison Convention Center in Dallas, although one exhibitor complained that it takes some time for the traffic to make its way to the farthest areas of the show floor. Apparent throughout the GSX show is an expanding idea of what constitutes security. Increasingly, ‘security’ technologies offer benefits throughout other parts of a company or institution. Security is also being broadened to encompass ‘safety,’ including emergency response and wider issues of keeping a company safe. Managing multiple systems People look at the systems they have, and they are looking for more information" Manufacturers at GSX are talking about more than new products. Rather, they are offering new approaches to turn products into ‘solutions’ for customers. Among the benefits of new systems is the availability of more data. “People look at the systems they have, and they are looking for more information and data and insights from their systems,” says Kyle Hurt, Genetec’s Area Vice-President of Sales for the US and Canada. “In the past, if I’m managing multiple systems and spending time and resources, I am making sure systems are operational. Today, it’s more like: How do I make my enterprise more efficient? I spend less time on making sure systems are working together but more time on how we can use the information.” Manufacturers at GSX are talking about more than new products Security control room Genetec is enhancing its Security Center 5.11 version with a newly redesigned web client that provides new capabilities related to system audio, including the ability to trigger a public address from a mobile device in an emergency, two-way audio to and from the security operations center, and the ability to record an incident. The new web client offers new levels of “Security on the go,” says Hurt. A mobile device becomes an extension of the security control room. “Customers want to have more remote capabilities and have their security personnel out and about, not tied to a desk,” says Hurt. The new web client works to unify the four pillars of the Security Center— video, access control, license plate recognition, and now audio. Single source manufacturer Audio can now be used to broadcast a message, respond to an incident, and notify people" “Audio has taken time to develop legs in our ecosystem,” says Hurt. “We have been developing partnerships and use cases beyond an intercom at the door. Audio can now be used to broadcast a message, respond to an incident, and notify people en mass of what’s going on.” Manufacturers are also fine-tuning how they work to meet customers’ needs. “Customers want one point of contact, a single source manufacturer, and a solution that reflects the manufacturer is listening to the voice of the customer,” says Jerry Burhans, Managing Director of ASSA ABLOY Global Solutions - Critical Infrastructure, which seeks to be a global partner to critical infrastructure industries. The Critical Infrastructure business works across the various product groups of the notoriously siloed company to bring together solutions aimed at meeting each customer’s need. Manufacturers are also fine-tuning how they work to meet customers’ needs Best-in-class technology “We try to have best-in-class technology and collaborate within ourselves to make sure we have what customers need,” says Burhans. Critical infrastructure industries such as water, power and energy, oil and gas are developing standards to help support preparedness of the nation’s infrastructure, and ASSA ABLOY Global Solutions is helping operators secure access and provide audit trails on locking hardware and keys within their security perimeters. Managing customer assets Johnson Controls’ new OpenBlue Service for the security device market seeks to proactively manage customer assets (equipment) as a service. The company’s software platform of connected solutions monitors and manages security devices across vendors and provides remote support services including skilled engineers who can work to ensure that a company’s assets, including cameras and access control readers, operate dependably. Working remotely, OpenBlue analyzes the performance of each system component Johnson Controls estimates that, unfortunately, up to 25% of a company’s security assets may not be working as intended, whether they lack the latest firmware update or are not connected. Working remotely, OpenBlue analyzes the performance of each system component and responds to ensure equipment operates as intended. “We believe we can close that gap with our solutions,” says Greg Parker, Vice President, Innovation & Portfolio Management for Johnson Controls. Physical security equipment A big advantage of OpenBlue for security customers is the ability to manage cybersecurity and threats at the edge, which may not currently be addressed by the IT department. The OpenBlue offering includes an embedded ‘air wall,’ which is a zero-trust architecture for physical security equipment. OpenBlue also helps customers manage the ever-changing lifecycles of various assets. Another concept prompting discussion at GSX 2023 is the gap between what a customer expects from a product and what the product can realistically deliver. With endless promotion in the last several years centering on concepts such as artificial intelligence (AI), is it any wonder that customers may sometimes have unrealistic expectations about what a technology can accomplish? The good news at GSX is that, as progress marches on, newer technologies are getting closer and closer to delivering on customers’ most ambitious expectations. The forward momentum of technology development is evident throughout the GSX 2023 show floor, reflecting the promise of even greater product capabilities in months and years to come.
Case studies
Biometrics company, Fingerprint Cards AB (Fingerprints™), has upgraded the physical access security of its Gothenburg HQ. S-Key biometric access cards from Freevolt Technologies Limited, which embed Fingerprints’ own T2 sensors, have been implemented across the entire Gothenburg site. The updated authentication system further strengthens Fingerprints’ workplace security and enables role-based access control, while ensuring a convenient and easy-to-use experience. Role-based access control Fingerprints’ Gothenburg HQ has security gates to enter and exit the building, and restricted areas for hardware and software R&D. By replacing access keyfobs with biometrics access cards, site-wide security has been enhanced and role-based access control has been enabled to better control access to sensitive areas of the site. By replacing traditional security methods based on something they know/have with something they are, multi-factor authentication has been enabled while maintaining convenience for employees. Fingerprints’ latest ‘T2’ sensors Solution eliminates the security risk of lost or stolen cards, without adding infrastructure costs Caroline Krüger, CHRO of Fingerprints comments: “The workplace has evolved significantly in recent years. At Fingerprints, we offer hybrid working while still ensuring our workforce has 24/7 access to HQ. Amidst this dynamic working environment, it is essential our team feels the workplace is accessible and safe. This requires a flexible, secure, and convenient access control solution.” Fingerprints has implemented Freevolt’s flagship biometric access card solution, S-Key. The solution eliminates the security risk of lost or stolen cards, without adding infrastructure costs. The card incorporates Fingerprints’ latest ‘T2’ sensors which deliver optimized image quality, processing speed, and power efficiency. Traditional security methods Adam Philpott, CEO of Fingerprints comments: “To meet today’s security challenges we must move away from traditional security methods. And, as a biometrics company, it is important that we lead the way in ensuring robust, frictionless security in our own operations." "There is an opportunity here too; what can we learn, what innovations will we identify by using these systems day to day? I look forward to continuing our strong and innovative collaboration with Freevolt technologies.” Energy harvesting technology Gonzalo de Gisbert, Head of Product & Business Development at Freevolt Technologies, adds: “Fingerprints are pioneers in biometrics, with sensors in billions of products, so they know what makes a good biometric solution. We’re therefore thrilled that Fingerprints has chosen S-Key to strengthen security at their global headquarters, in Gothenburg." "Our pioneering radio frequency energy harvesting technology combined with Fingerprints’ ‘T2’ sensors, known as FPC 1323, enables S-Key to be completely battery-less, lasting for many years. Roll-out was seamless, with everyone set up in less than 1 hour. That’s simple, safe, and secure biometrics, powered by Freevolt.”
Helsinki Airport is a busy transport hub, with a network of flights connecting Finland with cities across Europe, Asia, and beyond. Managing access in such a dynamic environment is a challenge. This challenge extends to the control of access to cupboards, drawers, and cabinets where travel documents are stored — in the spotlight after new EU guidance on logging access to these documents. Previously, security for cabinets in Helsinki’s check-in area required airport managers to issue and track around 100 mechanical keys per airline. It took time and was a distraction from other important tasks. Airport operator Finavia sought a more convenient way to manage and monitor cabinet access, replacing mechanical locking with a streamlined electronic solution. Lenel access control solution Finavia sought a neat solution that did not require them to fit a bulky locking device Cabinets are often small, hard to wire, and easily damaged. Thus, Finavia sought a neat solution that did not require them to fit a bulky locking device or a separate RFID reader. And because the airport already had a Lenel access control solution in place, seamless integration — without extra software or database installation — was another essential requirement. “Safety, functionality, durability, security of supply, and usability were the reasons we chose the ASSA ABLOY solution,” explains Kari Mäkinen, Senior Access Control Specialist at Helsinki Airport. A major upgrade to security for almost any cabinet Now, the automated log shows exactly which airline opened any cabinet, and when Helsinki’s airline check-in desks are now equipped with Aperio® KL100 electronic cabinet locks. The KL100 is small and has a minimal footprint. Wireless, battery-powered, and with an inbuilt RFID reader, it is easy to fix to almost any cabinet, locker, or drawer without cabling or causing damage. Different sizes and cam-lengths make the lock adaptable to securing sensitive spaces in almost any workplace. “Before KL100 cabinets were managed with mechanical keys, with no specific control over who has the key and who had opened the cabinet,” adds Kari Mäkinen. Now, the automated log shows exactly which airline opened any cabinet, and when. It’s efficient and hassle-free. KL100 Wireless Cabinet Lock The KL100 Wireless Cabinet Lock integrates seamlessly with the airport’s Lenel system For high convenience, a KL100 has an integrated reader, which may be unlocked with mobile keys (via NFC or BLE), as well as smartcards or fobs using all major RFID technologies. And because the Aperio platform is built from the ground up for compatibility, the KL100 Wireless Cabinet Lock integrates seamlessly with the airport’s Lenel system. Finavia was able to choose a best-in-class solution without having to compromise. Operations at the airport are more streamlined. No one needs to handle or track thousands of mechanical keys, saving time and costs spent on logistics. Every employee’s individual access may be revoked at any time from the Lenel control panel and it’s simple to audit all cabinet access if an incident occurs. A full suite of ASSA ABLOY access control devices After 18 months of operation, the solution for check-in desks has been a success. Airport managers have ordered additional Aperio KL100 devices for airport departure gates. Multiple connectable ASSA ABLOY solutions are already deployed alongside the digital cabinet locks, including wireless Aperio door handles; Protec2 CLIQ® electromechanical locking devices; and keyless, mobile-operated ABLOY padlocks to secure fencing and cargo. “The availability of all these solutions from a single manufacturer — easily used with their existing access control solution — has helped Finavia to tailor a unified, integrated system at Helsinki Airport,” says Lars Angelin, Business Development Manager at ASSA ABLOY Opening Solutions EMEIA.
The university stands out as a highly esteemed institution, particularly renowned among enthusiasts of science and technology. With its effective educational approaches, the institution experienced a surge in enrollment, necessitating an upgrade from outdated communication technology within its premises. Furthermore, with plans for expansion in the upcoming academic year, there's a growing need for modern communication technology to streamline communication across various buildings and offices. To delve into their challenges: Limited Capacity System: The existing system proved to be obsolete and lacked sufficient capacity to handle the communication demands across offices within the same institution and across multiple locations. Communication Among Multi-Located Offices: As the University embarked on an expansion project, including the establishment of a new building at a distant location, there arose a need for seamless connectivity between this new site and the main building in the form of a multi-location communication solution. Need for Upgradation: The absence of modern features such as multi-party Conferencing and Unified Services for Mobility highlighted the necessity to upgrade their outdated communication system. Scalability and Redundancy: They sought a solution capable of effortlessly adapting to future requirements, ensuring smooth scalability for forthcoming applications. Furthermore, incorporating redundancy measures was deemed essential to guarantee uninterrupted operations. Solution Devised a tailored Multi-Location contact solution aimed at enhancing and raising Matrix Comsec, in collaboration with Rutvi System, meticulously examined the challenges faced by the university administration. Through collaborative efforts, they devised a tailored multi-location communication solution aimed at enhancing and expanding the existing infrastructure by leveraging Matrix Telecom Solutions. This involved the implementation of a Hybrid IP PBX and integration of a Media Gateway to streamline communication processes and ensure readiness for future demands. The Matrix solution comprises: At location 1 within the university complex, the Hybrid PBX, ETERNITY LENX, was installed. Alongside digital key phones, multiple analog phones were also connected at this site. An IP connection was established between location 1 and location 2. Utilizing the ETERNITY LENX with SARVAM Gateway ENT, a PRI Gateway arrangement from location 1 facilitated an IP connection to the ETERNITY MENX at location 2. Digital key phones and multiple analog phones were integrated into location 2. The Matrix Multi-Location communication solution seamlessly interconnected both locations while incorporating a range of modern communication features. This fosters enhanced adaptability and versatility within the organization, offering optimal advantages for contemporary communication needs. Results The implemented solution not only provided them with access to modern communication features but also facilitated smooth communication across their expanded infrastructure. The Hybrid PBX Systems, including ETERNITY MENX16SAC and ETERNITY LENX27SDC, offered scalability for up to 2000 IP Users, ensuring future readiness. Moreover, the Hot Swappable Card feature ensured uninterrupted operation and simplified maintenance, while the redundancy feature ensured high availability and continuous communication. With the SARVAM Gateway ENT License, they were able to utilize SARVAM as both a Unified Communication Server and Gateway simultaneously, eliminating the need for additional investments. The EON510 - Premium Digital Key phone offered advanced call amenities such as Global Directory Integration and Advanced Call Routing, enhancing employee productivity and efficiency. The multi-location communication solution provided by Matrix seamlessly connected multiple buildings for the University, while the incorporation of modern communication features made them more efficient and prepared for the future.
The Body Shop has installed bespoke Traka RFID locker solutions at its main distribution center to ensure intelligent management and accountability of assets, enhance security, and streamline operations. As a global pioneer in ethical and sustainable beauty products, The Body Shop recognizes the importance of responsible resource management, business practices, and asset security. Traka intelligent locker systems At its main distribution center in Littlehampton, three large-scale Traka intelligent locker systems have been installed to manage different devices. The first uses Traka’s multi-bay cradle locker solution to manage 30 VoCollect voice-picking devices and Bluetooth headsets, all charged and ready to operate. Three large-scale Traka intelligent locker systems have been installed to manage different devices The second houses 40 Falcon handheld scanners, managed by Traka’s specialist Asset Master Locker range with charging and battery points located. The final system presents secure storage for a kit of equipment, specifically designed for the forklift truck drivers, with each locker compartment containing a Falcon scanner, Radio and Printer. Each intelligent locker solution is offered with RFID asset detection and specialist TrakaWEB software, to provide managers with instant audit control capability to establish exact times when physical devices are removed and returned to lockers. New standards in design Says The Shift Manager, responsible for the project: “To keep up with high demands, our distribution center operates 24/7. It is constantly evolving, driving new standards in design and use of technology to ensure our products reach our stores to meet our loyal customer demands." “To operate at maximum capacity, we need to make it as simple and as quick as possible for authorized colleagues to not only gain access to the devices they need but also ensure they are operational and in good working order. With the introduction of Traka, we have eliminated manual control, plus we have a complete audit on all devices that we can access from anywhere. We have already noted increased accountability, traceability and fault logging, all coming together to reduce lost time and enhance operational efficiency.” Net 2 access control cards Access to other assets and tools can only be granted to authorized personnel for their job specification The three locker solutions have been installed in two separate locations around the distribution center, to ensure staff can easily access equipment in their work area. Eliminating the need to travel to a central location and queue to access or organize equipment has led to improved productivity at the start and end of shift periods. Traka has also ensured all systems operate using existing Paxton Net 2 access control cards to minimize facility disruption during or after installation. Access to different assets and equipment can only be granted to authorized personnel for their identified job specification, with staff only able to take one device or kit at a time. Author's quote Lee Payne, Traka Business Development Manager added: “The introduction of Traka systems to a global distribution center such as The Body Shop demonstrates how simple process enhancements can make a significant difference. From the initial brief through to implementation, we worked closely with the team to identify the exact requirements for each site and the accessibility needs for staff." “We understood the need for curfew notifications, fault logging and careful authorized access control. We planned with the team to separate out the systems into specific work areas and use the Traka orange to help the locker systems stand out, all to ensure vital time could be saved for staff and management. The result is a smoother, more efficient operation throughout the supply chain, helping The Body Shop continue its mission of delivering its best-loved ethical beauty products."
The University of New Haven offers a range of National Security and Public Service programs, some of which were the first of their kind when launched decades ago. Having such a sturdy academic background, the university searched for the proper equipment to let the students practice and polish their knowledge. After thorough market research, the choice was made in favor of Regula 4308S, which is already being used in educational forensic research. Features of Regula 4308S Regula 4308S enables truly advanced examination of any crime evidence, from all kinds of documents, to fingerprints, blood stains, and more. The highest optical magnification (320x) and camera resolution (14 MP), over 40 light sources, and more than 20 light filters, as well as 3D visualization capabilities and the ability to examine large objects, make Regula 4308S a powerful tool for forensic research. Device has modules for reading MRZs, RFID chips, hidden images (IPI), and 1D and 2D barcodes For the purpose of identity document examination, the device has modules for reading MRZs, RFID chips, hidden images (IPI), and 1D and 2D barcodes. Plus, Regula 4308S has a unique motorized oblique lighting system, which makes it possible to change the light source's angle of incidence, and thus gives a wide range of opportunities for examining the microrelief of a document in the visible and infrared spectrum range. Author's quote “Regula’s device provides us with wide capabilities for forensic research, so our students can be easily trained on the basics they need to use. We also liked the good balance between the device’s functionality and its price. So far, I must say that our experience of using Regula 4308S is very positive,” says Dr. Josep De Alcaraz-Fossoul, Assistant Professor of Forensic Science at the University of New Haven. “With fraud being so sophisticated these days, it’s really crucial to equip forensic experts with not only powerful tools, but what is probably more important, fundamental knowledge. We are honored that the University of New Haven decided to rely on the capabilities of our device in their educational programs,” comments Arif A. Mamedov, President and CEO at Regula Forensics, Inc.
Alarming increases in vehicle thefts, unsolved traffic collisions, and stolen cargo in the Mexican State of Tlaxcala, motivated the Executive Commission of the State Public Security System (CESESP) to expand and upgrade its video security system. To counter the rise in crime, the CESESP sought a flexible, scalable, open-platform video management system (VMS) that could seamlessly incorporate existing cameras as well as over 800 new cameras and edge devices from a range of hardware and software providers. Tlaxcala Located in East-Central Mexico, Tlaxcala is one of 32 states within the Federal Entities of Mexico. With a population of approximately 1,343,000, based on the 2020 census, Tlaxcala is the smallest yet one of the most densely populated states in Mexico. The CESESP of Tlaxcala is tasked with safeguarding residents across the state's 60 municipalities. C4 center C4 center has multiple teams of six security professionals who monitor the system around the clock At the core of all security operations, including the 911 emergency response and 089 confidential tip line, is the CESESP's Control, Command, Communications, and Computing Center (C4). The state’s C4 center has multiple teams of six security professionals who monitor the system around the clock on a large, 24-screen video wall. The C4 also houses the system’s HP and Lenovo servers. Flexibility, scalability, and budget “Flexibility, scalability, and strictly adhering to the budget were top requirements for this critical, state-wide project,” said Maximino Hernández Pulido, Executive Commissioner of the State Public Security System. “We considered a variety of proposals and providers, but we ultimately followed the advice of our integrator, Digital Information Systems, and selected XProtect Corporate from Milestone Systems.” XProtect Corporate The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco The new system includes cameras from Hanwha Vision, Bosch Security and Safety Systems, Hikvision, and Pelco, all integrated within the system and managed by XProtect Corporate VMS from Milestone Systems. The system is also fully integrated with the BriefCam Video Analytics Platform, delivering video intelligence for system managers to identify, monitor, investigate, and visualize incidents plus video data to make smarter decisions. Efficient and cost-effective integration “Because state officials rely on their video system 24/7, the update needed to be gradual with no downtime. As new cameras were integrated into the Milestone platform, the previous system slowly disappeared,” said Isaac Sánchez Morales, an engineer at Digital Information Systems (SDI), an integrating company. “The XProtect Corporate open platform VMS allowed us to leverage our existing cameras and servers, integrate new equipment and devices, making the process very efficient and cost-effective, and we never had a gap in service.” Data-driven video for fast response times BriefCam video analytics technology The solution detects, identifies, and classifies video metadata to drive more efficient investigations The BriefCam video analytics technology seamlessly integrates into Milestone’s XProtect Smart Client. The solution detects, identifies, and classifies video metadata to drive more efficient investigations and business decisions, such as finding missing persons, investigating vandalism, theft, assaults, accidents, injuries, or acts of violence, as well as extracting and analyzing through heatmaps, dashboards, and visualizations. The analytics have proven beneficial in accelerating investigations, attaining situational awareness, and optimizing operational intelligence for enhanced video search, alerting, and data visualization. Real-time alerts, situational awareness “We installed the BriefCam Insights and Investigator products, and regularly use the platform’s RESPOND and RESEARCH capabilities. One of the advantages of all these XProtect-integrated analytics is that operators do not have to open additional windows or enter new credentials to access them,” said Sánchez. “With this integration of technologies, operators can trigger real-time alerts based on complex object classifications and filter combinations to increase situational awareness meaning authorities can react to events as they unfold.” Proactive policing with LPR With the BriefCam RESPOND solution, object characteristics and license plate recognition tools can be used" Sánchez added, "With the BriefCam RESPOND solution, object characteristics such as vehicle, person, or animal, and license plate recognition tools can be used to trigger rule-based alerts." "These tools can help overcome the challenges of urban video surveillance and drive proactive policing in Tlaxcala." Video technologies reduce state crime rates Following the comprehensive expansion of the security infrastructure, statistics from the Executive Secretariat of the National Public Security Systems revealed Tlaxcala boasted the lowest crime rate nationwide. With the modernized system in place, officials documented a 93% reduction in pilfered freight from transport companies. Similarly, vehicle theft declined by 22.5%. A cost-efficient and flexible way Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance According to Sánchez and the SDI team, it is expected that each municipality within the territory will soon have its own locally focused VMS. With the use of Milestone Interconnect, all the municipality subsystems will integrate directly with the state-wide platform. Milestone Interconnect provides a cost-efficient and flexible way to gain central surveillance of multiple sites spread across a region. C4 video surveillance operation “The integrated solution delivered through Milestone is a robust, efficient, and secure system that provides all the necessary tools for the C4 video surveillance operation,” added Executive Commissioner Hernández-Pulido. “In addition, the excellent technical and post-sales support from Milestone and SDI has led us to meet the system and performance goals we set for ourselves.”
Products
Round table discussion
Technological leaps in the last several decades have revolutionised biometrics. The technologies are constantly evolving, spanning facial recognition to iris scanning to fingerprints, to provide new levels of security and convenience. Biometrics are everywhere, from smartphones to border control, constantly evolving to meet the needs of our increasingly digital world. They are also more accurate and easier to use than ever. We asked this week's Expert Panel Roundtable: What’s new with biometrics?
Video storage has come a long way since rooms full of VCRs stored video from an entire system of cameras. Video storage equates to data storage, and there are multiple options ranging from hard disk storage to the cloud to storage on each individual camera using SD cards. Increasingly, cloud-based storage is an attractive option to store video footage conveniently and safely. We asked this week’s Expert Panel Roundtable: How is expansion of video storage capabilities impacting the security industry?
Headlines of violence in our schools are a reminder of the need to keep educational institutions safe. In fact, if there is a positive aspect to the constant bombardment of headlines, it is that it keeps our attention perpetually focused on how to improve school security. But what is the role of physical security systems? As the new school year begins, we asked this week’s Expert Panel Roundtable: Are schools safer because of physical security systems? Why or why not?
White papers
A Guide to Specifying RFID Readers
DownloadAttention OEMs: 5 Ways RFID Readers Can Secure Your Markets
Download5 Reasons To Integrate Mobile Technology Into Your Security Solution
DownloadAutomatic Vehicle Identification: State Of The Industry 2020
Download11 Considerations For Embedded System RFID Readers
DownloadRFID and Smartphone Readers in Physical Access Control
DownloadIs Your Access Control As Effective As You Think?
DownloadWhat Are The Security Technology Needs Of The Hotel Sector?
Download9 Opportunities To Upgrade Your Access Control Technology
DownloadVideos
Radio frequency Identification: Manufacturers & Suppliers
- Anviz Radio frequency Identification
- ASSA ABLOY - Aperio® Radio frequency Identification
- HID Radio frequency Identification
- MOBOTIX Radio frequency Identification
- ASSA ABLOY Radio frequency Identification
- Suprema Radio frequency Identification
- SALTO Radio frequency Identification
- ELATEC Radio frequency Identification
- Climax Technology Radio frequency Identification
- Codelocks Radio frequency Identification
- Brivo Systems Radio frequency Identification
- Dahua Technology Radio frequency Identification
- Paxton Access Radio frequency Identification
- Bosch Radio frequency Identification
Multi-Residential Access Management And Security
DownloadGuide For HAAS: New Choice Of SMB Security System
DownloadPrecision And Intelligence: LiDAR's Role In Modern Security Ecosystems
DownloadHikvision: Solar Powered Product Introduction + HCP
DownloadBank Security
Download