Network Video Recorders
A prominent figure in the Security and Telecom sector, Matrix concludes its successful participation at SAFE West Expo 2024 in Mumbai. With over three decades of industry expertise, Matrix seized the opportunity to engage with industry peers, gain valuable insights, and explore avenues for collaboration. Technology-centric solutions Matrix is steadfast in its dedication to delivering technology-centric solutions, with a paramount focus on ensuring customer contentment. This dedication i...
VIVOTEK (3454TW), the global security solution provider, expands its AI security business and announces its AI entry-tier 9383-Series network camera, which allows users to utilize AI video analytics services at affordable costs, easily recognize attributes of people and cars, and enhance operation and management efficiencies. Core+ AI NVR or VSS Moreover, the camera seamlessly integrates with Core+ AI Network Video Recorder (Core+ AI NVR), or the VAST Security Station (VSS) system. With the ad...
Hikvision, a world-pioneering manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, will proudly unveil its Solar Solutions lineup at a May 23 webinar, showcasing this unprecedented solution to security challenges in standalone sites and hard to reach remote locations. Attendees will receive a 50% discount on the 4 MP Kit DS-2XS2T47G1-LDH/4G/C18S40 when purchased within 30 days of the webinar. Solar Kits with Colo...
VITEC, a market-renowned provider of IPTV, video streaming, and digital signage solutions, and RFmondial, a specialist in wireless transmission technology, have announced a groundbreaking achievement: the world's first demonstration of ultra-low latency (below 100 ms) video streaming over DECT NR+, the new non-cellular 5G standard. Achieved as part of the Sennheiser-led Franco-German-backed project MERCI, the demonstration took place at a public workshop in Hannover, Germany on April 19, 2024....
Matrix Comsec, a well-known producer of Security and Telecom solutions, has officially announced its presence at the SAFE West Expo. The event will take place at the Bombay Exhibition Center, NESCO, Mumbai, from May 9th to May 11th, 2024. Matrix will be highlighting its IP Video Surveillance, Access Control, Time-Attendance, and Telecom solutions at Booth No. A-21. All-Color camera Matrix is excited to reveal its newest product lineup at the SAFE West Expo. One notable addit...
Pyronix is delighted to announce the launch of an exclusive prize draw to celebrate the release of its latest control panel, the EURO 76. Designed with the customer in mind, the EURO 76 offers a tailored solution to address the ever-changing needs of security. EURO 76 panel features Laurence Kenny, Marketing Director, commented on the promotion of the EURO 76, stating, "We're thrilled to showcase the EURO 76 with our largest competition prize to date." "Retaining all the innovative feat...
News
Honeywell security, fire, and life safety technologies will be on interactive display at The Security Event on April 30 – May 2 in Birmingham at Stand 5/F20. The showcased Honeywell technologies help building (or facility) decision-makers and operators manage threats while improving uptimes and driving operational efficiencies all delivered within an optimal occupant experience. Security technologies In line with Honeywell’s focus on delivering robust, digitalized automation solutions, Honeywell security technologies on display include: Next-generation technologies for enterprise building video security – The latest 60 & 70 Series IP cameras and NVR offerings provide an NIS2 and NDAA-compliant, cost-effective, and more operationally efficient security solution suitable for large indoor and outdoor applications. The latest updates include a 60S multi-sensor, 60S IR PTZ with Wiper, 70S Speed Dome, and a 70S Corner camera, along with the 35S PRO NVRs. Streamlined video, access, and intrusion management solutions – Honeywell MAXPRO® Access (MPA) offers simple, scalable, and secure access control that is integrated with MAXPRO Cloud for total video, access awareness, and intrusion management across multi-site locations with real-time alarm notifications and operational visibility. More connected and automated alarm systems – Honeywell Pro-Watch® 6.5 provides robust, global integrated access control, video, and intrusion detection in a single view to help protect staff and property, optimize productivity, and comply with strict industry regulations all while reducing operational costs. Enterprise users can now retain exacqVision video systems with the latest Pro-Watch ecosystem integration, which saves time and money by avoiding manual correlation of alarms. Increased control with a scalable video system – MAXPRO® VMS 750 allows users to control, collect, manage, and present multiple video sources via a highly scalable system that can support video networks that range from single instances in a small- to medium-sized building to thousands of devices across an enterprise. It integrates with Honeywell security management solutions to leverage access control, intrusion detection systems, and powerful AI analytics. Fire and life safety technologies Honeywell’s fire and life safety technologies on display include: New technology for testing and inspecting life safety systems – Honeywell Gent Self-Test is a new range of detectors that are revolutionizing the testing and inspection of life safety systems. This patented and approved self-test technology overcomes obstacles such as locked rooms, hard-to-access areas, high ceilings, and large sites, which often lead to detectors being un-tested and hidden risks potentially missed. Increased reliability and efficiency with all-in-one fire detection panel – NOTIFIER INSPIRE™, powered by Honeywell's Connected Life Safety Services (CLSS) platform is a fire control system with an all-in-one fire panel that delivers reliable protection, scalability, efficient monitoring as well as flexible and timely reporting. Cost-effective, intelligent fire control – Honeywell Morley-IAS Max, is a cost-effective, powerful, and intelligent fire alarm control panel that offers installers and end users a technically advanced range of functions that is simple to install, commission, and maintain.
Compatibility with a range of credential technologies can be a critical factor when selecting access control. As organizations across the world explore a move to mobile keys for access, it is more important than ever. Aperio’s open technology platform has been built on compatibility. Its range of battery-powered access hardware for integration with third-party access control systems can secure almost any opening. Wireless Aperio solutions Customers have a choice of wireless Aperio handles, escutcheons, cylinders, security locks, server rack locks, and new cabinet/cupboard locks. With Aperio, it is straightforward to control all access points digitally. And with the rapid growth of mobile adoption in security, Aperio is extending support for mobile credentials, to keep offering high convenience and security benefits to customers. Extending mobile access options The single most important factor when considering a switch to mobile, according to report data, is convenience Changes in end-user demand are reflected in a survey for the Wireless Access Control Report 2023, which suggests 29% of organizations already use mobile credentials, instead of or alongside RFID cards while another 40% of respondents anticipated deploying them within the next two years. The single most important factor when considering a switch to mobile, according to report data, is convenience. HID Seos® Aperio native mobile access is built on HID Seos®, a next-generation platform with class-leading cryptography, authentication, and privacy protection. Seos Mobile Access supports both NFC and BLE. Unlocking an Aperio device by phone is easy and intuitive: users present their phone to the reader, just like a smart card. They don’t even need to open an app. Aperio has also integrated cutting-edge mobile access credentials from Gallagher and STid in response to the growing demand for mobile solutions. With this, Aperio broadens the range of options available, facilitating seamless integration with mobile devices and enhanced flexibility. High convenience “The open nature of the Aperio development platform removes compatibility worries for OEMs, integrators, and other partners which translates to high convenience for their customers,” says Piet Van Den Bossche, Business Development Manager at ASSA ABLOY Opening Solutions EMEIA. “It is a natural progression for us now to add support for STid and Gallagher mobile credentials, to reflect their growth among our integration partners.” Aperio openness: “No lock-in, only choice” Security managers may gradually roll out mobile access while RFID cards already issued remain valid “Aperio’s approach supports an ecosystem where customers are not constrained by their initial choices,” adds Van Den Bossche. “Aperio users can effortlessly transition to the latest mobile credential technologies without being tied down, ensuring they are always equipped to meet evolving security demands and new challenges.” In addition, to increase flexibility, Aperio locks can handle multiple credential technologies at the same site: Security managers may gradually roll out mobile access while RFID cards already issued remain valid. Credential compatibility Aperio’s credential compatibility has grown in tandem with the platform. Aperio wireless devices now unlock via the widest range of RFID technologies, in both Online and Offline modes. “To continue to make these convenience and security advantages available to the widest possible market, Aperio will continue to be an open platform that supports the growth in mobile credentials,” confirms Van Den Bossche.
Trident IoT, an RF technology and engineering company focused on decreasing time-to-market for connected device manufacturers, announced the release of the new Taurus Z-Wave Series of silicon solutions. The Trident IoT Taurus Z-Wave Series will encompass system-on-chip (SoC) solutions and modules that support the latest advancements in Z-Wave technology, including Z-Wave Long Range (ZWLR) for the U.S. and the implementation of the ZWLR European specification. The Taurus Z-Wave Series will ship with an SDK based on Open Z-Wave Specification Release 2024A. “The Taurus Series gives global manufacturers access to cutting-edge Z-Wave capabilities,” said Trident IoT co-founder Bill Scheffler. “This silicon series and SDK will be the first to implement the ZWLR European specification, accelerating IoT product development worldwide.” Taurus Series silicon specifications Using the ZWLR 12-bit managing space, the Taurus Series supports networks of up to 4000 nodes The Taurus Series is based on an ultra-low power, high-performance Z-Wave SoC. The Taurus SoC solution is designed to enable Z-Wave solutions with pioneer battery life, range, and memory. Taurus Series chips feature an ARM® Cortex®-M33 microprocessor, 1MB of flash program memory, and 288KB of SRAM data memory for exceptional processing and response time. The powerful sub-GHz radios transmit at +20 dBm and +14 dBm, enabling communication over distances up to 1+ miles. Taurus chips support Z-Wave Plus, Z-Wave Plus v2, and ZWLR, enabling the development of highly secure, reliable, scalable, and backward-compatible solutions for smart home, hospitality, multi-dwelling units and more. Using the ZWLR 12-bit addressing space, the Taurus Series supports networks of up to 4000 nodes; Taurus chips also leverage ZWLR dynamic power control, enabling end-point battery life of up to ten years from a single coin-cell battery. Utility of IoT applications “ZWLR is a revolutionary technology, with the power to expand the reach, scale and utility of IoT applications while preserving full backward compatibility with currently deployed Z-Wave devices,” said Avi Rosenthal, Z-Wave Alliance Chairman of the Board. “This new Z-Wave silicon offering, paired with the Trident IoT SDK and design services, will enable more Z-Wave Alliance members to take advantage of ZWLR capabilities, bringing exciting new products to market faster around the globe.” End-to-end product development support Trident IoT will offer end-to-end engineering talks for new yields integrating Taurus Series In line with the company’s mission to decrease time-to-market for IoT devices, Trident IoT will offer end-to-end engineering consultation for new products integrating Taurus Series silicon. In addition to the Taurus Series SDK, Trident IoT customers will also have access to an exclusive library of both Z-Wave and ZWLR device and sensor reference designs, created to accelerate the development of innovative new edge-of-property applications. Trident IoT also offers in-depth consulting from some of the industry’s foremost experts on wireless connectivity, including Z-Wave technology. “Trident IoT was launched in response to a gap in the availability of IoT product design services,” says Mariusz Malkowski, Trident IoT CTO and founder. “The demand for consultation has been extraordinary: in just six months we’ve had to double our engineering resources.” New Z-Wave products The Trident IoT lab is fully equipped and available for Z-Wave, Z-Wave Plus v2, and ZWLR end-product To support the development of market-ready products, the Trident IoT lab is fully equipped and available for Z-Wave, Z-Wave Plus v2, and ZWLR end-product compliance and testing. By providing silicon, design services, and in-house compliance testing, Trident IoT can help device manufacturers decrease the time-to-market for new Z-Wave products by more than 60%. According to Kevin Kraus, VP of Technology Alliances and IoT Business Development, Yale–Fortune Brands Innovation, “In-depth consulting services from the Trident IoT team will be an invaluable accelerator for Fortune Brands, helping us to bring new Z-Wave-certified products to market in the near future. With the launch of this new single-die silicon solution, we look forward to collaborating on new devices with next-generation capabilities, including long-range and potentially even multi-protocol devices.” Taurus Series silicon will begin shipping at scale in Q4 2024. In the meantime, Trident IoT will issue Taurus Series samples to select partners for initial testing and product development.
Hikvision, a world-renowned manufacturer and supplier of security products and solutions that deliver the ideal combination of high performance and extreme value, announces the upcoming launch of its new NVR 5.0 Series, the next generation in network video recording technology. Building upon the success of Hikvision NVR innovation, the new NVR 5.0 Series revolutionizes traditional security systems by seamlessly integrating artificial intelligence (AI) and the Internet of Things (AIoT) capabilities. Next generation NVR 5.0 Series Webinar attendees who play the Kahoot Poll after will win a chance at a FREE iPhone 15 or an M-Series NVR A webinar on Thursday, May 9, will cover all the ground-breaking features of the NVR 5.0 Series with special offers for registered attendees. Webinar attendees who play the Kahoot Poll after will win a chance at a FREE iPhone 15 or an M-Series NVR. Dealer webinar attendees will get 50% off select M-Series NVRs through May 31 (limit 10 units/per dealer). "Our new next generation NVR 5.0 Series sets new benchmarks in network video recording technology," said John Xiao, Vice President of Marketing, Hikvision USA, adding "With its intuitive operations, smart search capabilities, and centralized alarm management, the new Hikvision NVR 5.0 Series empowers users with unprecedented intelligence, efficiency, and control over their video systems." Benefits of the new NVR 5.0 Series The NVR 5.0 Series NVRs serve as a pivotal central hub, offering an intelligent platform and scenario-based applications, ushering in the AIoT era. These next-generation NVRs are designed to provide users with unparalleled efficiency, innovation, and ease of use. The five pivotal benefits of the new NVR 5.0 Series include: Intuitive Operations for Real-Time Insights: Gone are the days of complex management interfaces. The NVR 5.0 Series includes a user-friendly interface with tailored views and automated switching, providing real-time clarity and ease of understanding. Revolutionizing Video Searching with Smart Technologies: The NVR 5.0 Series introduces Smart Search and AcuSearch functions, significantly reducing search times to mere seconds. Features include frame-by-frame searches, event-based navigation, and target-specific filtering, enhancing operational efficiency. Centralized Alarm Management for Immediate Response: The integrated event center of the NVR 5.0 Series NVRs streamlines alarm management, search, and configuration, enabling rapid and effective responses to security incidents. Innovating with Intelligent Protection: The NVR 5.0 Series self-learning perimeter protection minimizes false alarms and manual input, ensuring smarter and more accurate surveillance with its embedded inference engine. Converged Functions for Comprehensive Control: Enjoy a unified solution for video, audio, alarm, and access control with the NVR 5.0 Series NVRs
Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven crime prevention, is proud to announce the company has been named winner of the TMA Monitoring Technology Marvel Award. Established by The Monitoring Association in 2018, the Marvel Award recognizes professional monitoring centers and solutions providers for the innovation and/or implementation of cutting-edge technology. Vying for the honor against two very prominent finalists, Elite Marketing Director Scott Goldfine accepted the award during a virtual presentation on April 18. Latest in AI and analytics Elite represents a paradigm shift in the provision of security, generating revolutionary levels of preventing crimes and losses. Elite’s Security Operations Command Center leverages video surveillance monitoring incorporating a sophisticated, fully integrated technology stack featuring custom-calibrated analytics and artificial intelligence along with forensically engineered site system designs to eliminate the “noise” and never miss an event. Elite represents a paradigm shift in the provision of security, generating revolutionary levels "Achieving true crime prevention has been my ambition for decades, but it has only truly become possible the past few years as the technology finally caught up to fully enable my vision,” says Elite CEO & Founder Aria Kozak, who on April 10 was inducted into the Security Industry Hall of Fame. “By strategically implementing and custom calibrating the latest in AI and analytics, the remote video guarding results Elite and its monitoring command center- in terms of direct daily crime preventions and police assistance in arrests and detainments-have been extraordinary and previously unattainable.” Elite’s remote-guarding By fully leveraging technology and expertise, Elite is the first monitoring provider to eliminate false alarms reported to police. Through Elite, police experience zero false alarm-driven dispatches. Furthermore, Elite’s remote guarding acts as a live eyewitness to the scene as police respond to help them be prepared and proceed much more safely. During 2023, 102 million hours of video and audio data streamed into Elite’s monitoring center. Due to its pioneering-edge technologies, monitoring agents only had to review 55,200 of those hours. From that, they handled 73,000 incidents without police dispatch. The approximately 1,700 times police were dispatched led to more than 1,000 arrests/detainments. All that was accomplished with no false alarms to the police. Monitoring Technology Marvel program Monitoring Technology Marvel program offers were secretly reviewed and assessed by a panel “While it’s true the technology has come of age, it’s important to remember it is merely a tool that is only as effective as the methodologies, personnel, and partnerships in place to deliver the total, interconnected solution. Often, less is more,” adds Kozak. “With how Elite has proven what is now possible for our great industry, I could not be more excited about its future and our ability to continue to innovate even more. Given that, having Elite additionally validated in being named the 2024 TMA Monitoring Technology Marvel Award winner could not be more gratifying. Our team is thoroughly honored!" Monitoring Technology Marvel program submissions were confidentially reviewed and evaluated by a panel of independent, tech-centric judges. Entrants’ materials were weighed and graded using the following criteria: innovation and originality (25%); effectiveness and efficiency (25%); client impact and market response (20%); evidence-based results (15%); and scalability and adaptability (15%). Crime and catastrophe prevention Elite CTO Jonathan Kozak adds, “This recognition lines up with our core directives for efficiency and effectiveness, so it hits right at our pride point. At Elite Interactive, we are passionate about achieving real solutions in crime and catastrophe prevention. The technologies are tools in the hands of users, and the real efficiency and effectiveness matures when those users have the right methods and the right mission.” According to TMA, “To be competitive today, professional monitoring centers are enhancing processes and expanding services in new, unique ways. The Marvel Award is one way to gain recognition for your company, your brand, and for your amazing, talented team.”
In a landmark achievement, Gulf Business Machines (GBM), an end-to-end pioneering digital solutions provider, has been awarded two new accreditations from CREST and DESC (Dubai Electronic Security Center) in Penetration Testing and Incident Response. Cybersecurity solutions GBM's achievement of these certifications showcases its leadership and expertise in providing state-of-the-art cybersecurity solutions, reflecting the company’s commitment to maintaining local roots while adhering to global standards. In an era marked by escalating sophisticated cyber threats, public and private sector institutions across the region are increasingly turning to accredited cybersecurity solutions providers who meet the stringent standards set by CREST and DESC. CREST and DSEC CREST is an international not-for-profit membership body dedicated to creating a secure digital world by establishing capability, capacity, consistency, and collaboration within the global cybersecurity industry. Formed in 2014, the Dubai Electronic Security Center (DESC) is a regulatory authority overseeing the cybersecurity framework and promoting electronic security initiatives in Dubai. Penetration testing and incident response services As a dual accredited member, GBM’s cybersecurity offering will be recognized and accepted in EMEA The accreditations assure customers that GBM's cybersecurity services are of the highest quality and delivered by experts with the right qualifications and skills. They highlight GBM's adherence to the highest standards in penetration testing and incident response services, ensuring clients receive the best-in-class cybersecurity solutions. As a dual accredited member, GBM’s cybersecurity offering will be recognized and accepted in EMEA. In Dubai, accreditation for these services is facilitated by Dubai Cyber Innovation Park through the Dubai Cyber Force Program, a collaborative effort between CREST and DESC. Commitment to cybersecurity excellence H.E Amer Sharaf, CEO of the Cyber Security Systems and Services Sector at DESC said, “As cyber threats evolve, organizations must work with accredited providers to safeguard their digital assets and operations." "The Dubai Cyber Force functions as an internationally recognized reference, delivering cyber services to the government, in line with the vision of His Highness Sheikh Mohammed bin Rashid Al Maktoum, Vice President and Prime Minister of the UAE, Ruler of Dubai, to make Dubai the safest city in the digital space. By achieving these certifications, GBM is further demonstrating its commitment to cybersecurity excellence.” Safeguarding digital assets Ossama El Samadoni, General Manager at GBM Dubai commented, “In today's rapidly evolving cyber landscape, our internationally recognized accreditations serve as more than just validations of our expertise. They stand as pillars reinforcing our customers' cybersecurity defenses, granting them unparalleled peace of mind." "By adhering to these rigorous standards, we assure our clients that their digital assets are safeguarded with the utmost care. Our dedication to providing top-notch cybersecurity solutions remains steadfast as we help our customers navigate the digital world confidently and securely.” Cyber threat assessment services Hasanian AlKassab, Director of Security BU at GBM said, "Cyber threat assessment services are essential in today’s digital landscape as they provide organizations with a comprehensive understanding of potential vulnerabilities and risks. Being recognized by CREST and DESC for our expertise in Penetration Testing and Incident Response further solidifies GBM’s position as a pioneer in cybersecurity." "Achieving these accreditations means we have met high industry standards and are well-equipped to deliver the much-needed technical expertise required for these domains with precision and efficiency." GBM Shield program GBM's penetration testing services, under its GBM Shield program, provide a comprehensive suite of cyber threat assessment services, including vulnerability assessment, penetration testing, configuration review, static and dynamic application security testing, wireless penetration testing, red teaming, and threat hunting. For incident response services, GBM's expert team delivers swift and effective cyber threat mitigation, digital evidence preservation, and regulatory compliance tailored to the unique challenges of the GCC region, leveraging cutting-edge Cor. by GBM capabilities.
Expert commentary
Educational institutions worldwide increasingly rely on robust wireless networks to enhance academic pursuits, safety measures, and operational efficiency. The campus environment, a complex network of interconnected buildings, and the humans navigating them require innovative technologies to meet these diverse needs. The solution lies in a new wireless protocol that provides an ideal fit for the long-range, low-power connectivity requirements of educational campuses: Wi-Fi-certified HaLow. Wi-Fi HaLow: Wi-Fi HaLow, a new Wi-Fi certification released by the Wi-Fi Alliance in November 2021 and incorporating the IEEE 802.11ah standard, is optimized for the unique requirements of Internet of Things (IoT) applications. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs Its combination of long-range connectivity, low power consumption, advanced Wi-Fi CERTIFIED WPA3 security features, and the ability to connect more than 8,000 devices from a single access point makes the protocol a game changer for campus environments. Wi-Fi HaLow provides a reliable and robust wireless solution that overcomes the trade-offs between range and speed that limit the effectiveness of conventional Wi-Fi in the 2.4, 5, and 6 GHz frequency bands for campus applications. Robust, secure connections for access control Operating at sub-GHz frequencies, the Wi-Fi HaLow protocol's unparalleled ability to penetrate physical barriers and its advanced security features make it an ideal wireless technology for supporting access control systems throughout campuses. Credential systems for students, badge scanners, cameras, and dormitory door locks can work efficiently and securely in hard-to-reach locations, providing an interconnected and safe environment for the campus community. Enhancing safety through improved connectivity Body-worn cameras used by public safety officers can remain connected to the wireless local-area network The low-power and long-range attributes of Wi-Fi HaLow can play a significant role in strengthening campus safety systems. Body-worn cameras used by public safety officers can remain connected to the wireless local-area network (WLAN) or mobile router in their patrol vehicles even at a long distance, reducing the need to consume cellular data. Wi-Fi HaLow enables the development of robust wireless networks that can reliably support campus-wide, two-way video intercoms, potentially enhancing response times and safety measures. Streamlining outdoor equipment automation Outdoor equipment automation, such as irrigation systems, smart lighting, and robotic lawnmowers, can leverage Wi-Fi HaLow's power efficiency, and long-range and expansive coverage. Automation of these systems with such efficient wireless connectivity can lead to significant energy savings, improved productivity, and reduced operational costs. Delivering superior speed and range 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second A Wi-Fi HaLow network shatters the traditional tradeoff of wireless communications between speed and range. A single-stream, 8 MHz capable device using 64 QAM modulation can transmit at speeds of up to 32 megabits per second at sub-GHz frequencies, enabling live streaming on large screens, connecting multiple real-time AI edge cameras, as well as thousands of low-power IoT devices, all connected without compromising on range. Wi-Fi HaLow signals can extend beyond 1 kilometer, up to 10 times farther than traditional forms of Wi-Fi in the 2.4, 5, and 6 GHz frequency bands, and are capable of connecting far-flung devices and systems across campus environments. Setting a new standard for campus connectivity By addressing the connectivity needs of modern campuses, Wi-Fi HaLow paves the way for future campus applications. As we navigate the digital era, Wi-Fi HaLow presents a compelling solution that significantly enhances connectivity, safety, and efficiency. This leap in wireless capabilities isn’t merely incremental; it represents a transformative stride toward a smarter, more connected future. Wide-reaching wireless network Educational institutions can leverage Wi-Fi HaLow to create safer, more efficient, and interconnected campus environments. By providing a robust, reliable, and wide-reaching wireless network, Wi-Fi HaLow enables campuses everywhere to fulfill their diverse connectivity needs without compromise.
In the realm of physical security, the distinction between being perceived as a security vendor and a security partner holds great importance. While both may seem interchangeable at first glance, how an organization is viewed by its clients can have a huge impact on the success of its security programs. At the heart of this differentiation is the concept of relationships and how they shape the dynamics between providers and their clients. Time, care, and diligence For security vendors such as systems integrators, security dealers, monitored services providers or manufacturers that sell directly to the end user elevating from supplier to partner requires a greater investment of time, care, and diligence. However, the eventual payoff can be incalculably advantageous to the organization. Not only does this approach better serve the client but it also cultivates longer-term business and is more likely to generate referrals. Clients will change vendors often but stick with partners for the long haul. Simple installation and/or service Security end-users should look to their security products and service providers to partner with them Security end-users should look to their security products and service providers to partner with them, be vested in their success, and be part of the solution. They should seek out and expect more than a simple installation and/or service in the absence of any real, tangible, and value-added relationship with stakeholders. That means looking deeper than the similar cameras or equipment most vendors provide. Doing so brings benefits from the partnership in solving problems and creating strategies for mitigation. Vendors have short shelf lives A security vendor is typically seen as a transactional company that offers products or services to address specific security needs or challenges. When an organization engages with a vendor, the focus is primarily on the exchange of goods and/or services for a fee. The relationship tends to be more transactional, with limited interaction beyond the scope of the security solution being provided. Tools, technologies, or service offerings The relationship between a security vendor and a client is often short with a one-time purchase Security vendors often play a crucial role in the security industry by offering specialized tools, technologies, or services that can help organizations improve their defenses against threats. Examples would be video surveillance, access control, intrusion detection, or fire/life-safety systems, as well as the monitoring of any of them from a central monitoring station or security operations command center. The thing about it is, however, that the relationship between a security vendor and a client is often short with a one-time purchase and limited ongoing engagement or consultation. Partners prove their value On the other hand, a security partner is viewed as a member of the team that works closely with an organization to address its security challenges. Unlike a vendor, a security partner is invested in the long-term success of their clients and is committed to building a strong relationship based on expertise, trust, and transparency. Creating custom solutions Security partners go beyond offering products or services by engaging with companies and organizations Security partners go beyond offering products or services by engaging with companies and organizations to understand their unique security needs, goals, and challenges. They work concurrently with organizations to develop customized security solutions, provide support and guidance, and adapt to ever-changing threats and risks. When this kind of scenario is developed, the potentially distracting and detracting focus on monetary cost moves to the back burner because the value and return on investment (ROI) are so thoroughly compelling. Relationships bring real benefits The core of the difference between being perceived as a security vendor and a security partner hinges on the crucial role of relationships. While vendors focus on transactions and sales, partners prioritize collaboration and a sense of being in it together. Building strong relationships based on trust, communication, and shared goals is essential for forging a successful security partnership. Personalized approach Security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients. They can be reached easily when needed and emphasize a personalized approach with custom-tailored solutions. By building strong relationships based on respect and understanding, security partners navigate complex security challenges, drive innovation, and deliver incredible value over the long term. Operational opportunities Businesses and facilities often encounter or face very specific security needs that can only truly be solved in concert with a vendor that essentially acts like an extension of the end-user organization. Furthermore, when communicating and collaborating on that level, additional security/safety and sometimes even operational opportunities for improvement come to light. This amplifies the value for both the end customer and their security vendor. Talk about a win-win! Prosper with partner power While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment At the end of the day, the difference between being a security vendor and a security partner is not merely a matter of semantics. It is about the fundamental difference in approach and mindset toward physical (electronic and networked) security. While vendors offer products or services, partners offer teamwork, expertise, and a shared commitment to reducing losses and crime. Quality of relationships Ultimately, it is the quality of relationships that separates providers in the security space and determines the success of security initiatives in the current rapidly changing security landscape. This unification of intent, practice, and purpose enables practitioners and the public alike to harness the full power of pioneering-edge technologies that support the security industry’s core mission of protecting people and property. Security partners are not just providers of security solutions; they are trusted advisors who are invested in the success and well-being of their clients.
Misconceptions about AI and analytics in video security are common due to the rapid evolution of the technology and varying levels of understanding. Artificial Intelligence (AI) and analytics are increasingly used as interchangeable terms when discussing video security cameras. AI v/s analytics While there is some overlap, it is important to articulate the differences between them when speaking to stakeholders or customers. As the myriad types of AI gain more prominence in the global dialog and privacy concerns are increasingly raised, security professionals need to take extra care to educate executives and management in any organization so that they can, in turn, represent the company's use of AI tools accurately. AI and analytics in video security Security cameras use subsets of AI, namely machine learning and deep learning, to recognize and classify objects The intent of this article is not to do an academic deep-dive on either AI or analytics, but instead to position each discipline as it relates to modern AI-based video security. The goal is to educate operations and management about the use of AI in video surveillance to support informed decision-making across the organization. It’s worth mentioning that while AI is often used as a catch-all term, security cameras use subsets of AI, namely machine learning and deep learning, to recognize and classify objects. Misconceptions Here are four common misconceptions about AI and analytics: Misconception #1: AI and analytics are the same People often confuse AI with analytics, but they're distinct. AI is used in the video industry to enhance analytics and analysis capabilities. The technique involves the use of machine and deep learning algorithms to recognize or classify known objects like a person or vehicle. AI can further detect unique attributes of objects such as the color of clothing, or additional objects that are carried or worn such as backpacks or glasses. Object detection The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviors Analytics, on the other hand, refers to the process of analyzing what the detected object is doing. The processes overlap somewhat when AI is also used to enhance the analysis of complex behaviors. Is a vehicle traveling left or right in the camera’s field of view, possibly going the wrong way down a one-way street? Did it enter a restricted zone? Should a car arrive in this area at 3 a.m.? These are basic binary (yes/no) analytic tasks. Ascertaining whether two people are fighting or if someone is shoplifting is a more nuanced analysis that requires a sophisticated AI algorithm capable of considering multiple data points before alerting staff to suspicious behavior. Addressing false positives with AI-assisted analytics Before AI-based object detection, analytics were prone to false positives any time the lighting changed (a passing cloud could change the pixels). Working together, AI and analytics have largely solved the issue of false positives for the objects they recognize. On a properly installed camera, AI-assisted analytics can issue proactive alerts or search through hours of footage for humans or vehicles with specific attributes incredibly quickly. AI adds classification and behavior information to raise the overall accuracy of analytics and analysis. AI can also be used to enhance image quality in cameras, so there are many other ways it can be utilized. Misconception #2: AI can operate autonomously and replace security personnel AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events While AI can enhance surveillance and response, the nuanced understanding and decision-making capabilities of humans are still crucial in most scenarios. AI coupled with analytics can help operators monitor an increasingly larger number of cameras for anomalies and events that may warrant attention, but the decision on how to act still firmly rests with the operator. This increasingly ‘intelligent’ assistant represented by AI helps security teams focus on what matters in an increasingly complex world, but it’s a team effort. And while AI’s capability to operate autonomously will surely improve, it’s hard to imagine a world in which it would be wise to let it make important decisions without human oversight. Misconception #3: AI-based security cameras are invading the privacy Safeguarding personally identifiable information (PII) is a critical responsibility of any organization. Because of the prevalence of data breaches, everyone is keenly aware of the risks of PII ending up in the wrong hands. For video security systems, it’s essential to realize that the descriptive metadata an AI-based camera captures is composed of anonymous data about the humans it detects. Attributes such as the color of clothing and whether a person is carrying a backpack or wearing a hat are certainly not sufficient to identify anyone personally. And while there may be grey areas with some AI systems that attempt to classify gender and age, they are still not identifying a specific person. Facial recognition Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques Most importantly, AI does not equal facial recognition. Facial recognition is a specific, focused function, and while it might be improved with some AI-based techniques, facial recognition has had its separate evolution distinct from AI. Facial recognition has privacy implications, while most AI implementations do not. AI-based detection Additionally, AI-based detection of humans and vehicles typically happens “on the edge”, processed within the camera itself, while facial recognition almost always requires a separate VMS/server application and database to function. So, AI-based cameras don’t, by themselves, do facial recognition. Misconception #4: AI can learn anything on its own AI-based algorithms are only as good as the training they’ve received While AI can significantly enhance video surveillance capabilities, the machine and deep learning algorithms are not infallible. They require human oversight to manage false positives and interpret complex situations. AI-based algorithms are only as good as the training they’ve received. For example, human and vehicle detection algorithms have been carefully trained by R&D departments in laboratory settings with hundreds of thousands, if not millions, of representative images. This is why they can be very accurate when installed correctly. AI ‘on-site learning’ cameras For AI-based systems to truly learn to recognize something, they must also be informed when they get something wrong. This type of training usually occurs under the supervision of experienced AI developers. Recently, new AI ‘on-site learning’ cameras have become available. These can be trained by operators to recognize unique, customizable objects such as forklifts, shopping carts, airplanes, logos on vehicles, or any object an organization might want to track or count. These systems must also be trained to be accurate. Intelligent training application AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives A typical on-site training challenge would be to capture an object in every lighting condition. To overcome this, forward-thinking vendors include an intelligent training application that automatically generates additional images across a range of luminance values, saving operators substantial time and effort while increasing accuracy. AI on-site learning is also a great way to increase overall accuracy in any setting prone to false positives. Conclusion Understanding these misconceptions is crucial for making informed decisions when implementing AI and analytics in video security systems and gaining consensus from stakeholders. As AI becomes ubiquitous across industries, it has the potential to lose its true meaning, particularly because we are only scratching the surface with machine and deep learning applications. AI’s current capabilities and limitations Most importantly, we have to help educate all of our constituents that AI and analytics are not the same It’s also important to recognize that general (or strong) ‘AI’ does not yet exist. This is the ability of a machine to do any intellectual task a human can do. However, the marketing ship has long since sailed, so the best we can do is stay informed about AI’s current capabilities and limitations. Most importantly, we have to help educate all of our constituents that AI and analytics are not the same. AI does not equal facial recognition. Nor does it replace the need for human oversight. AI-based technology AI is a long way from non-structured, comprehensive learning and decision-making in a way humans would describe as ‘intelligent.’ With those caveats in place, the current AI-based technology functions as a fantastic assistant for security teams helping them to better protect people and property.
Security beat
Fueled by mounting concerns about the cybersecurity vulnerability of U.S. ports, President Joe Biden has signed an Executive Order aimed at shoring up defenses against cyberattacks. Cybersecurity initiative The cybersecurity initiative marks a significant shift in policy, empowering key agencies and outlining concrete actions to bolster defenses. By empowering agencies, establishing clear standards, and fostering collaboration, the initiative aims to strengthen U.S. ports against the evolving threat of cyberattacks, safeguarding the nation's maritime economy and national security. Expanded authority for DHS The proactive approach aims to prevent incidents before they occur The Executive Order grants expanded authority to the Department of Homeland Security (DHS) and the Coast Guard to address maritime cyber threats. DHS gains the power to directly tackle these challenges, while the Coast Guard receives specific tools. The Coast Guard can compel vessels and waterfront facilities to address cyber vulnerabilities that endanger safety. The proactive approach aims to prevent incidents before they occur. Real-time information sharing Reporting any cyber threats or incidents targeting ports and harbors becomes mandatory. This real-time information sharing allows for swifter response and mitigation efforts. The Coast Guard also gains the authority to restrict the movement of vessels suspected of posing cyber threats. Inspections can be conducted on vessels and facilities deemed risky. Mandatory cybersecurity standards The standardization aims to eliminate weak links in the chain and prevent attackers from exploiting Beyond these broad powers, the Executive Order establishes foundational elements for improved cybersecurity. Mandatory cybersecurity standards will be implemented for U.S. ports' networks and systems, ensuring a baseline level of protection across the board. This standardization aims to eliminate weak links in the chain and prevent attackers from exploiting individual vulnerabilities. Importance of collaboration and transparency Furthermore, the initiative emphasizes the importance of collaboration and information sharing. Mandatory reporting of cyber incidents fosters transparency and allows government agencies and private sector partners to work together in mitigating threats. Additionally, the Executive Order encourages increased information sharing among all stakeholders, facilitating a unified response to potential attacks. Maritime Security Directive The Executive Order encourages investment in research and development for innovative cybersecurity solutions To address specific concerns, the Coast Guard will issue a Maritime Security Directive targeting operators of Chinese-manufactured ship-to-shore cranes. This directive outlines risk management strategies to address identified vulnerabilities in these critical pieces of port infrastructure. The long-term success of this initiative hinges on effective implementation. The Executive Order encourages investment in research and development for innovative cybersecurity solutions, recognizing the need for continuous improvement and adaptation to evolving threats. Recognizing the urgency of cyber threats The initiative has been met with widespread support from port authorities, industry stakeholders, and cybersecurity experts who recognize the urgency of addressing cyber threats. However, some concerns exist regarding the potential burden of complying with new regulations for smaller port operators. Effective communication, resource allocation, and collaboration among all stakeholders will be crucial to ensure the successful implementation of this comprehensive plan. Enhancing cybersecurity The more impactful and noteworthy piece is the associated NPRM from the U.S. Coast Guard (USCG) “This Executive Order is a positive move that will give the U.S. Coast Guard (USCG) additional authority to enhance cybersecurity within the marine transportation system and respond to cyber incidents,” comments Josh Kolleda, practice director, transport at NCC Group, a cybersecurity consulting firm. The more impactful and noteworthy piece is the associated Notice of Proposed Rulemaking (NPRM) from the U.S. Coast Guard (USCG) on “Cybersecurity in the Marine Transportation System,” adds Kolleda. Portions of the notice of proposed rulemaking (NPRM) look similar to the Transportation Security Administration (TSA) Security Directive for the rail industry and the Emergency Amendment for the aviation industry. Coordinating with TSA on lessons learned The USCG should be coordinating with TSA on lessons learned and incorporating them into additional guidance to stakeholders and processes to review plans and overall compliance, says Kolleda. “At first glance, the NPRM provides a great roadmap to increase cybersecurity posture across the various stakeholders, but it underestimates the cost to private companies in meeting the requirements, particularly in areas such as penetration testing,” says Kolleda. Cyber espionage and threats The focus is on PRC because nearly 80% of cranes operated at U.S. ports are manufactured there “It is unclear if or how the federal government will provide support for compliance efforts. As this seems to be an unfunded mandate, many private companies will opt for the bare minimum in compliance.” “Cyber espionage and threats have been reported by the Director of National Intelligence from multiple nation-states including China, Russia, and Iran,” adds Paul Kingsbury, principal security consultant & North America Maritime Lead at NCC Group. The focus here is on the People’s Republic of China (PRC) because nearly 80% of cranes operated at U.S. ports are manufactured there, he says. Destructive malware “The state-sponsored cyber actors’ goal is to disrupt critical functions by deploying destructive malware resulting in disruption to the U.S. supply chain,” says Kingsbury. “These threat actors do not only originate in China or other nation-states but also include advanced persistent threats (APTs) operated by criminal syndicates seeking financial gain from such disruptions." "The threat actors don’t care where the crane was manufactured but rather seek targets with limited protections and defenses. The minimum cyber security requirements outlined within the NPRM should be adopted by all crane operators and all cranes, regardless of where they are manufactured.” PRC-manufactured cranes Kingsbury adds, “The pioneering risk outlined in the briefing is that these cranes (PRC manufactured) are controlled, serviced, and programmed from remote locations in China." "While this is a valid concern and should be assessed, there are certainly instances where PRC-manufactured cranes do not have control systems manufactured in PRC. For example, there are situations in maritime transportation system facilities where older cranes have been retrofitted with control systems of European Union or Japanese origin.” Monitoring wireless threats “The Biden Administration’s recent Executive Order is a critical step forward in protecting U.S. ports from cyberattacks and securing America’s supply chains,” says Dr. Brett Walkenhorst, CTO at Bastille, a wireless threat intelligence technology company. “To ensure proper defense against malicious actors accessing port-side networks, attention must also be paid to common wireless vulnerabilities." "Attacks leveraging Wi-Fi, Bluetooth, and IoT protocols may be used to access authorized infrastructure including IT and OT systems. Monitoring such wireless threats is an important element in a comprehensive approach to upgrading the defenses of our nation’s critical infrastructure.”
The sale of Carrier’s Global Access Solutions to Honeywell in December amounted to a dramatic finish to a big year in 2023 for mergers and acquisitions (M&A) in the physical security market. In the transaction between two industry giants, Honeywell sought to enhance and strengthen its building automation capabilities with the acquisition of Carrier’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. Honeywell acquires Carrier Access business The acquisition, which includes both hardware and software solutions, will mean a new corporate owner for the LenelS2 brand, a pioneering business for over 25 years in commercial and enterprise access solutions, including well-known offerings Onguard and Netbox. In addition, the acquisition covers the Onity brand of electronic locks, including hospitality access, mobile credentials, and self-storage access; and the Supra brand of cloud-based electronic real estate lockboxes. ADT sells commercial business, which rebrands as Everon ADT Inc. announced the sale of its commercial security, fire, and life safety business unit to GTCR ADT Inc., another industry giant and a trusted brand in smart home and small business security, announced the sale of its commercial security, fire, and life safety business unit to GTCR, a private equity firm, for a purchase price of $1.6 billion. ADT Commercial, a security integrator and premier provider of commercial security, fire, and life safety in the United States, announced that it will move forward as a standalone organization and rebrand as Everon. Bosch to sell building technologies products Bosch Building Technologies announced in 2023 that it is realigning its Building Technologies division to focus solely on its regional integrator business, with solutions and services for building security, energy efficiency, and building automation. Therefore, Bosch plans to sell most of the Building Technologies division’s product business. At year-end, Bosch was seeking a buyer who would take on all three business units with their associates and locations. This includes the Video, Access and Intrusion, and Communication business units, and affects some 4,300 associates at more than 90 locations worldwide. Building its integrator business earlier in 2023, Bosch announced the acquisition of Paladin Technologies, Inc., headquartered in Vancouver, Canada, a provider of security and life safety solutions and system integration services in North America. Motorola acquires IPVideo, creator of HALO Sensor In another deal emerging late in 2023, Motorola Solutions acquired IPVideo Corp., Bay Shore, N.Y., the creator of the HALO Smart Sensor, an all-in-one intelligent sensor that detects real-time health and safety threats. The powerful capabilities of the HALO sensor extend Motorola’s end-to-end physical security offering by integrating a non-video threat detection product into the safety and security ecosystem. IDIS acquires Costar Technologies Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. Korean video manufacturer IDIS and U.S. company Costar Video Systems had enjoyed a long-term existing ODM (original design manufacturer) relationship, and approximately 60% of Costar Video products were already made by IDIS. Therefore, it made sense when IDIS Co., Ltd. and Costar Technologies Inc. announced an agreement and plan to merge, with IDIS acquiring Costar. Leveraging Costar's established distribution networks and sales channels in the U.S. gives a significant boost to IDIS' growth strategy, which is founded on building long-term relationships with systems integrators. Costar has a sales channel of over 100 distributors and 1,000 systems integrators across the U.S. that will benefit from IDIS’ NDAA-compliant and 100% Korean-made technology. SECOM invests in Brivo and Eagle Eye Eagle Eye Networks, a cloud video surveillance company, and Brivo, a provider of cloud-based access control and smart space technologies, announced one of the largest investments to date in cloud physical security in 2023. SECOM CO., LTD, based in Japan and one of the largest security integration companies in the world, has made a primary equity investment of $192 million in the two companies, $100 million in Eagle Eye Networks, and $92 million in Brivo. $100M primary equity investment Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific Eagle Eye Networks, a global pioneer in cloud video surveillance, announced it will use the $100M primary equity investment to expand its suite of AI-powered products, fund geographic expansion, and enhance its enterprise features. Brivo will use the investment to grow sales and marketing, accelerate product development scale support and operational functions, and evaluate strategic acquisitions. Brivo will also use the additional investment to continue expanding in Europe, Latin America, and Asia Pacific, and enhance the smart spaces and AI functionality in the Brivo Access Platform. ACRE buys PremiSys Portfolio ACRE, a security company built on acquisitions, is continuing to broaden its portfolio and serve the expanding needs of its customer base. In 2023, ACRE acquired the PremiSys software and hardware portfolio and assets from IDenticard. PremiSys’ technologies enable organizations to self-manage door access and view integrated video and lockdown facilities. The acquisition extends opportunities for ACRE in healthcare, education, data centers, and senior living facilities. Qognify is a part of Hexagon Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond Qognify, a provider of video (VMS) and enterprise incident management (EIM) solutions announced that it has become a part of Hexagon. Qognify joins the Safety, Infrastructure & Geospatial division of Hexagon, following the completion of its acquisition originally announced on Dec. 19, 2022. Qognify extends Hexagon’s real-time monitoring and security reach to detect, assess, and respond to incidents, providing a more robust offering. ASSA ABLOY continues its acquisition trend ASSA ABLOY continued to acquire companies in 2023 to strengthen its position in mature markets by adding complementary products and solutions to the core business. Among the companies acquired in 2023 were Ghost Controls, a U.S. supplier of automated residential gate openers, and Securitech Group, a manufacturer of high-security mechanical and electronic door hardware products in the U.S. Door and fencing ASSA ABLOY also acquired Leone Fence, a Canadian manufacturer, distributor, and installer of fencing products for commercial and residential applications, and Lawrence Hardware and Gallery Specialty, providers of commercial hinges, locksets, exit devices, and door hardware accessories in Canada. Another new acquisition is Inovadoor Portas Industriais Ltda, a Brazilian manufacturer of sectional and high-speed doors. Earlier in 2023, ASSA ABLOY completed the acquisition of Spectrum Brands’ Hardware and Home Improvement division and the divestment of Emtek and the Smart Residential business in the U.S. and Canada to Fortune Brands.
Active shooter situations grab the most attention, but there is a long list of other threats facing schools, including bullying, vandalism and emergency medical situations. Broadly speaking, a comprehensive approach to school security should prioritize prevention, preparedness and response to all threats. Holistic security approach “Fostering a culture of safety within a school, which involves strong relationships, trust, and communication, is highly effective and does not require significant costs,” says Christin Kinman, End User Sales Consultant with Allegion, a security manufacturer. “It is crucial to educate stakeholders about the unintended consequences of quick fixes, like barricade devices, to ensure informed decision-making and a holistic security approach. The goal should be to promote safety and security for all, every day, in every situation.” Integrated and successful security plans While this might solve a particular challenge, it can also create unintentional conflicts" "Creating an integrated security plan requires a multi-faceted approach," says Kinman. "Too often, security measures are implemented as a reaction to either an event or a specific vulnerability. While this might solve a particular challenge, it can also create unintentional conflicts," adds Kinman. “Creating a successful security plan involves a comprehensive approach,” she says. “An effective, systematic approach begins with assessing, identifying, and valuing assets, identifying threats and vulnerabilities, quantifying the impact of a loss, analysis, and prioritization, and finally, development of mitigation measures.” Safety and Security An effective resource is the Partner Alliance for Safer Schools (PASS), which provides a framework to help with school assessments, including identifying and valuing assets, identifying external threats and internal vulnerabilities, assessing the impact of loss, and analyzing and prioritizing mitigation measures. Safety and security are words used seemingly interchangeably when it comes to schools, but they mean different things. “How we define these terms influences planning and addressing challenges,” says Kinman. “It is easiest to think of these terms as being either external or internal to the individual.” Coordinated security Safety is internal to the individual and relates to the individual’s perception of being free from harm Security is external to the individual and encompasses the protective physical, emotional, and environmental measures implemented in conjunction with policies, procedures, and training, as well as mental health measures and social and emotional learning. Safety is internal to the individual and relates to the individual’s perception of being free from harm or danger. Coordinated security measures create an environment of safety. Four main elements of physical security Kinman lists four main elements of physical security, often referred to as the 4D’s. These elements are deter, detect, delay, and deny: Deter refers to measures implemented to prevent an attack or threat from happening. These are usually visual deterrents that communicate legitimate use. Detect refers to measures that can detect the presence of a threat, such as video surveillance and monitoring. Delay refers to measures that slow down an attack or increase the level of effort needed for an incident to occur. Finally, deny refers to measures that prevent or restrict access to valued assets. Four layers of ground perimeter A layered approach to school security creates “layers” that must be defeated for an event to occur, says Kinman. Typically, the four layers are the ground perimeter, the private grounds around the building, the building perimeter, and the building interior. The ground perimeter layer demarcates public vs private space, and deterrence is the primary objective. The grounds layer allows for identification of legitimate vs illegitimate users and detection is the primary objective. The building perimeter layer prevents illicit users’ intent on harm from gaining access. The primary objectives at this layer are delay/deny. The building interior protects the most valuable assets, and the denial of an unauthorized individual is the primary objective. Report on Indicators of School Crime and Safety The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic “Quantifying loss and assessing risk is one of the most important steps in creating an integrated security plan,” says Kinman, who explains that the two elements that guide this step are probability and impact. Probability is the likelihood that an event will occur, typically rated on a scale of 1-5 ranging from rare to almost certain. The second element is impact, also rated on a scale of 1-5 and ranging from negligible to catastrophic. “Probability multiplied by impact equals risk, which has a score ranging from 1-25,” says Kinman. “The higher the score, the higher the risk.” An analysis of vulnerabilities and threats using a matrix yields a systematic approach to prioritize improvements and identify mitigation measures. For statistics on crime and safety in schools, visit the Report on Indicators of School Crime and Safety: 2022. Security improvements “The costs of school security encompass various aspects, including physical measures, personnel, training and policy enforcement,” says Kinman. “While there is no fixed amount, it often involves investments in technology, such as access control and emergency response systems. Many security improvements do not require additional funding, like training staff and students on security protocols and implementing policies to create a culture of safety.” Generally, funding for public school security is a shared responsibility among federal, state, and local governments; communities also contribute. “Striking a balance between shared responsibility and ensuring adequate resources is crucial for effective school security,” says Kinman. K-12 school security Community members and parents can donate by being vigilant and noting any suspect activities Various stakeholders play crucial roles in enhancing K-12 school security in addition to schools and communities. Stakeholders include community members, parents, local government, local law enforcement, first responders, and non-profit organizations. “Engaging these stakeholders fosters a comprehensive approach to school security,” says Kinman. Community members and parents can contribute by being vigilant and reporting any suspicious activities. Local government can support schools with funding and resources, while local law enforcement and first responders can provide expertise, conduct drills, and establish emergency response protocols. Safe and secure learning environment In addition, non-profit organizations can offer valuable resources, training, and support programs to address specific security concerns. “By involving all these stakeholders, schools can tap into a diverse range of expertise, resources and perspectives, pioneering to a more effective and comprehensive approach to school security,” says Kinman. “Collaboration and communication among these entities are vital to ensure a safe and secure learning environment for students and staff.”
Case studies
Comcast Smart Solutions, a division of Comcast Corporation that specializes in smart technology solutions for businesses and communities, announced that it will provide the Town of Braselton, Georgia, with smart video camera technology with AI capabilities to improve public safety and emergency response. The deployment of smart video camera technology at the Town Green and Braselton Park will provide the town with real-time visibility into its community spaces, and insights into traffic patterns during events, and will increase peace of mind for residents. New technology nonprofit The town saw it as a natural progression to continue upgrading the area with technology “These advanced cameras will play a vital role in bolstering safety efforts within our town and surrounding municipalities,” said Jennifer Scott, Braselton Town Manager and Clerk. “With real-time monitoring and intelligent analytics, this technology presents an efficient and cost-effective approach to creating safer public spaces and fostering a stronger sense of security for our community members." The Town of Braselton has a history of embracing smart technology, evidenced by its support of a new technology nonprofit that provides startup incubator space in partnership with local community members and a technology-focused university. Given this background, the town saw it as a natural progression to continue upgrading the area with technology. AI video analytics solution These cameras are planned to minimize false alarms and provide quick and valid forensic hunts Now, at the Town Green, multiple smart video cameras will oversee the parking lot and areas behind the concession stands. Additionally, smart video cameras at Braselton Park will monitor the playground and parking lot near the park’s tennis courts. Equipped with multi-sensor and multi-directional capabilities and AI video analytics, these cameras are designed to minimize false alarms and provide quick and accurate forensic searches. The video information captured, along with the AI video analytics solution will integrate seamlessly into a cloud-based application, providing the town with actionable data insights, including alerts for suspicious activity and recommendations based on traffic patterns. Smart video camera solution In collaboration with Comcast Smart Solutions, Braselton will receive comprehensive project management and continuous support. This includes a dedicated Comcast Smart Solutions project manager overseeing installations, conducting analyses, providing product training, and maintaining an ongoing support team to assist Braselton. “Delivering a seamless and reliable solution was essential to assist the Town of Braselton in enhancing safety and revitalizing communal areas,” said Mike McArdle, Senior Regional Vice President, Comcast. “We’re excited to not only provide a comprehensive smart video camera solution but also offer continuous support, ensuring that Braselton residents can enjoy their parks with confidence and peace of mind.”
Crystal Mountain Resort is Washington's largest winter and summer getaway. For over 60 years, the picturesque resort near Mount Rainier has drawn millions of sports enthusiasts around the world. An early adopter of new technology, the resort was also the first in Washington to install a high-speed, detachable quad chairlift, Rainier Express. Technology solution needed As the resort's Director of IT, Perry Turner is in charge of protecting over 400,000 guests and 2,600 acres of land all year long. The resort is open for skiing and snowboarding from November to April, and summer activities with scenic gondola rides from May to September. This meant that any technology solution had to withstand snow and low temperatures during the winter and high humidity levels during the warmer months. "The elevation tops out at a little over 7,000 feet, so the weather conditions can get extreme. The technology we use needs to be able to withstand everything from snowstorms to 100 MPH winds." The challenges Low-quality legacy cameras and limited connectivity led to gaps in coverage with lens fogging and weather-sealing issues "The combination of moisture and cold temperatures was wrecking our older cameras, which couldn't survive the harsh conditions.” Remote areas with limited infrastructure are difficult to wire and get power to. Low-quality legacy cameras and limited connectivity led to gaps in coverage, while lens fogging and weather-sealing issues led to malfunctioning cameras and poor visibility. Loss of time in retrieving images If footage was available, retrieving and sharing even a minute from two different network video recorder (NVR) systems was an excruciating process. "If I had to pull 10 minutes of footage, it would take three to four hours to get the right clip and to download it. It would crash all the time, and I'd have to start the process all over again." Why Verkada? "The interface is excellent, the app is easy to use and the cameras are rock solid. The hybrid cloud infrastructure also helps with reliability. I don't need an on-premise device to handle all the recording since the camera does that. It's a lot less to maintain from my end." Seamless operation From a single pane of glass, Perry simplifies management and ensures the seamless operation of the resort. He was an early adopter and beta tester for the Verkada Cellular Gateway, a new product that allows him to deploy cameras in any location. With more coverage and connectivity solutions, he leaves no room for oversight – no matter how minute the detail is. "We have Verkada coverage in remote areas with access to power but no internet. Across our 2,600 acres, the possibilities are endless: up on the mountains, out in parking lots, over shuttle stops, and even gondola stations." The results Cellular deployments in remote and hard-to-wire areas Cameras built to handle 100 MPH winds and -40°F Livestream ski conditions in high-image resolution A platform that saves time and reduces work Risk and liability prevention 1. Cellular deployments in remote and hard-to-wire areas Until recently, Perry's camera deployments were limited to places where he could run ethernet cable. While cellular data was available, it would require him to piece together different components - an LTE router, a PoE switch, a NEMA enclosure, and a data plan - all sourced from disparate vendors. His GC31 Cellular Gateway combines all the above into a single device that provides both power and data to any Verkada device. The result is a simple, seamless operating experience with minimal setup needed. LTE coverage “It took only a few minutes to install the cellular gateway and connect it to our PTZ, which monitors our moving snow stake." "The snow stake has to be in a remote corner so it’s not wind-affected, but we can now use the cellular gateway to take advantage of LTE coverage in the area.” 24/7 technical support Perry has Verkada’s unlimited data plan on the cellular gateway, which comes with the 24/7 technical support he’s used to from Verkada. The cellular gateway bridges gaps in coverage and opens a new world of use cases for Perry, "The GC31 allows us to install cameras along the road coming into the resort and at our parking lots. On busy weekends, we can easily monitor traffic and parking lot capacity.” 2. Cameras built to handle 100 MPH winds and -40°F The lack of issues with their hardware surprised Perry and his team. All the Verkada cameras onsite are enterprise-graded and are IP67 and IK10-rated. Additionally, they come with an integrated temperature gauge and built-in heaters that automatically turn on once the temperature hits -20°C (-4°F). Verkada outdoor cameras are fully functional at sub-zero and high heat temperatures and can withstand temperatures ranging from -40°C to 50°C (-40°F to 122°F). 10-year warranty Backed with an industry-pioneering 10-year warranty, Perry can install cameras anywhere at the resort – from the retail shops to the top of Mt. Rainier – and not have to touch them again. "We mounted a camera on top of a building that gets hit by 100 MPH winds and beyond freezing conditions, and it's had zero problems. We just set it and forget it." 3. Livestream ski conditions in high-image resolution Low-quality images and footage are no longer an issue with Verkada. The cameras come with advanced image sensor technology, which allows them to produce crystal-clear footage. Even in low-light conditions, like the resort's "Night Skiing" events, the built-in infrared LEDs make capturing footage in darker environments possible. Live video feeds No matter the conditions or location, Perry and his team have a clear view of the people and property at the resort No matter the conditions or location, Perry and his team have a clear view of the people and property at the resort. The Marketing department shares current skiing and snowboarding conditions on the website, and they have multiple cameras placed throughout the resort that share live video feeds. "Our website has live video feeds of the slopes, and as soon as we switched to our first Verkada camera, the jump in image quality was evident. The guests love it. The Marketing team now wants to add more for the public-facing side of things." 4. A platform that saves time and reduces work Verkada cameras come with built-in video storage capabilities of up to 365 days, removing the need for on-premise servers and all the associated work and time required to maintain them. Plug-and-play cameras are pre-configured and fully operational within minutes. When it comes to pulling footage, the process is night and day. Footage on Command Before, there were a lot of requests for footage pulls from the Security and Lift Operations teams. These teams can securely access footage themselves on Command through their mobile phones, eliminating most of these requests. If Perry does have to pull and share a snippet of footage, it takes a fraction of the time it did beforehand. With Verkada, that process is straightforward and seamless. "Pulling and sharing video footage now takes minutes, not hours. And when other teams need to pull footage, they can access it directly from their phones. This has removed multiple steps in our workflow and saves everyone a ton of time." 5. Risk and liability prevention Placing Verkada cameras at vulnerable and high-risk areas at the resorts (including retail shops and chairlifts) has helped thwart thefts of thousands of dollars worth of ski equipment and dispute false claims. If an incident arises, Perry can corroborate the witness accounts with easily accessible footage to see how the facts line up. Within Command, Perry can choose the camera he wants to view the history of, jump to a specific date and time, and review other data and analytics. Once he finds what he's looking for, he can share the footage with anyone through text, email, or a link. Guest safety Safety issues can arise if someone falls in the chairlift area so additional visibility is crucial Guest safety is another key priority for the resort, especially on the slopes. The cameras positioned at and near the chairlifts help monitor that guests are seated correctly. Safety issues can arise if someone falls in the chairlift area so additional visibility is crucial to protect both the guests and the resort. "Verkada provides peace of mind and liability protection. We can quickly verify what happened with a past incident and address any security or safety issue as it's happening. If someone is in trouble at the chairlifts or on the slopes, we can respond immediately." Looking Ahead Crystal Mountain Resort's success in deploying Verkada cameras has led to rave reviews from various internal teams. They are exploring how they can leverage the platform to improve the customer experience at the resort. "We recently learned about the Occupancy Trends feature, and there are so many potential applications. Foot traffic is just one thing that we want to keep track of in our rental shops and restaurants." Lower cost of ownership Most critically, leadership loved the enthusiasm surrounding the platform and has performed further financial analysis. What they found were more possible benefits, including a lower cost of ownership. "The more teams interact with the platform, the more buy-in we've received from leadership. They realized that Verkada is more cost-effective in the long run.”
The new GoldenEye Hotel and Resort on the Bulgarian and Turkish border, Europe’s largest casino development, opened in 2024 by BC Industries is providing enhanced security with more efficient guest services thanks to a 600-camera video surveillance solution from IDIS. The advanced camera system combines 24/7 visibility over gaming tables and public areas, fault-free image capture and recording of UHD video footage, a more efficient real-time monitoring platform for multiple users, and options for rapid targeting of AI analytics. End-to-end visibility As well as meeting the higher security requirements typical of casino operations, the system from South Korea’s largest in-country video tech manufacturer supports the GoldenEye resort in providing a more impressive welcome for hotel guests with full visibility over corridors, communal areas, and back-of-house operations ensuring the ultimate guest experience. The end-to-end solution has been installed by Volga Elektronik to cover the casino, hotel, and car parks. High-definition image capture IDIS 12MP Super Fisheyes, 8MP IR, and 5MP IR dome cameras allow broad scene surveillance A combination of IDIS 12MP Super Fisheyes, 8MP IR, and 5MP IR dome cameras allows broad scene surveillance of all internal areas, without blind spots, plus targeted coverage of priority locations such as cashier cages and slot machines. High-definition image capture allows gaming tables to be monitored in fine detail with operators able to identify card suits, and chip denominations and quickly detect any suspicious player activity, regardless of low light or cigarette smoke. Instant and smooth dewarping Instant and smooth dewarping of the fisheye images supports efficient real-time viewing and playback, allowing incidents to be resolved rapidly and preventing game stoppages. This ensures positive experiences, and confidence, for both customers and staff. External areas, including parking bays and entrances, are covered using IDIS 5MP IR bullet cameras and 2MP IR PTZs. IDIS Solution Suite VMS, NVRs IDIS Solution Suite VMS allows 24/7 monitoring by six operators and two supervisors, using a control room video The system also comprises seven 64-ch NVR recorders; and IDIS Solution Suite enterprise-class VMS and Critical Failover to protect continuous access to video and provide full redundancy in the event of a range of fault conditions. IDIS Solution Suite VMS allows 24/7 monitoring by six operators and two supervisors, using a control room video wall, with live viewing and simultaneous playback. The solution is NDAA compliant, with inherent cybersecurity protection; and it meets GDPR requirements, with IDIS’s dynamic video privacy masking allowing footage to be easily exported without privacy infringement. Advanced surveillance capabilities “IDIS video technology is perfectly designed for casino security,” said Mert Çalışkan, BC Industries’ Casino Operations Director. “Our new system gives us all the advanced surveillance capabilities we need to protect our guests and our facilities. And we’ll be able to easily adapt and extend it in the future and take advantage of exciting new capabilities.” ERP software The resort would be taking advantage of this future-proofing capability that comes with all IDIS technology In the next project phase analytics data integration with the casino’s ERP software is being introduced, along with transaction data overlaid on recorded video for efficient incident investigation. Koray Ozyildirim, IDIS Türkiye Country Manager confirmed that the resort would be taking advantage of this future-proofing capability that comes with all IDIS technology. IDIS AI video solutions and integration “Across the casino sector there is huge potential for adopting IDIS AI video solutions and integration capabilities,” he said. “IDIS’s industry-pioneering analytics are flexible and powerful and can be targeted at specific locations to enable highly accurate people counting, heat maps, and occupancy monitoring. Along with seamless systems integration, this will increasingly deliver a host of competitive advantages including enhanced security, better customer service, and, ultimately, greater profitability.”
Riga Sports Arena is a municipal facility maintained by the city of Riga, Latvia. Covering a total area of 21,821 square meters, the arena accommodates 2,500 spectator seats. It houses several training halls, including a large athletics arena, a training and warm-up hall, a weightlifting hall, and a sports field. Challenge Enhance security by replacing inefficient guards with technical equipment Riga sports arena faced a significant security challenge, relying on two guards who worked only night shifts. Depending on just one person was insufficient to ensure the safety of the complex, given its substantial size. The guards struggled to effectively cover all areas, leaving the arena vulnerable to security risks. Moreover, the financial burden of employing guards strained the city’s budget. There was a need to enhance security while eliminating the human factor and optimizing associated costs. Moreover, the financial burden of employing guards strained the city’s budget The client required a professional security system that could be implemented without extensive construction work or the need to lay a substantial number of cables throughout the building. They sought an effective and easily installable system that would enhance security without compromising the integrity of the facility. Solution Cost-effective wireless solution reinforcing security for a large municipal facility Considering the building’s size and recent reconstruction work, the installation of a traditional wired security solution was deemed impractical. This option would have required several months to complete and additional renovation work after installation. Moreover, the presence of many oversized windows, each requiring protection with detectors, made cable-based solutions even more impractical. GRIFS AG proposed an Ajax wireless solution that can be quickly installed without damaging the walls, allowing for complete control and management of the system through a mobile app. To streamline control without the need for multiple hubs, Hub 2 Plus Jeweler was selected In total, 115 devices were installed throughout the building to ensure comprehensive security coverage. To streamline control without the need for multiple hubs, Hub 2 Plus Jeweler was selected. This hub can control up to 200 devices, managing 25 security groups with a total of 200 users. This feature aligns with the client’s requirements, given the installation of many devices and the need to manage security modes for separate premises, all in the Ajax app. For example, it allows keeping employees’ offices in armed mode while conducting training sessions in the main hall. GRIFS AG installed DoorProtect Jeweler Given that the sports complex spans three floors and considering the need for the hub signal to pass through two reinforced concrete floors, the decision was made to enhance its communication range. To ensure stable communication between all 115 detectors and the hub, the ReX 2 Jeweler radio signal range extender was installed. This guarantees a reliable connection between all system components, ensuring seamless communication even in areas with challenging signal transmission conditions. For comprehensive security, GRIFS AG installed DoorProtect Jeweler opening detectors to oversee For comprehensive security coverage, GRIFS AG installed DoorProtect Jeweler opening detectors to oversee all doors. Additionally, MotionProtect Curtain Jeweler, with a narrow viewing angle and a maximum detection range of up to 15 meters, protects the large windows in corridors and sports halls. The challenge with large windows was that glass break detectors may be positioned far away from the hit spot, making it difficult to detect glass breakage. However, MotionProtect Curtain Jeweler, equipped with PIR sensors, instantly reacts to movement within its detection zone along the whole length of a window. Notably, the detector catches movement only if a person enters its field of view, allowing for protection even when a cleaner is working nearby, or a staff member is walking around. In addition, MotionProtect Jeweler detectors were installed throughout all entrance groups, major corridors, and stairwells to promptly notify the owner and the security company in case of any detected motion. Multiple HomeSiren Jeweler devices To facilitate arming and disarming of the security system for numerous employees in the sports complex, a wireless touch KeyPad Jeweler was installed. By entering a code, the device can activate the full security mode and automatically blocks itself if an incorrect code is entered multiple times. KeyPad Jeweler supports up to 99 codes, each corresponding to a separate user, making it suitable for enterprises with many employees. HomeSiren Jeweler devices were installed indoors throughout the skill to provide loud signs For rapid security response, the wireless alarm Button Jeweler was installed, enabling quick notification of the security company in case of intrusion. Furthermore, multiple HomeSiren Jeweler devices were installed indoors throughout the building to provide audible warnings in case of danger or deter potential intruders. These sirens emit loud sounds up to 105 dB to prominently signal a breach, effectively preventing unauthorized individuals and enhancing overall security. The arena management plans to automate evacuation doors using the Relay Jeweler system soon, enhancing safety and security by allowing remote door opening during emergencies. Why Ajax Cost-saving security solution. Customers can experience significant savings by opting for Ajax. The costs of the Ajax system installation were approximately equal to the expenses for security guards’ salaries per year. However, starting from the second year, the Municipality of Riga can achieve significant savings by paying only a low monthly fee for monitoring. Easily scalable future-proof system. With Ajax, the security system is easily scalable, allowing for future expansion and the implementation of additional functionality as needed. For instance, Hub 2 Plus Jeweler, already installed, supports the addition of up to 200 detectors, including MotionCam Jeweler detectors for photo verification of alarms, without requiring any system reorganization. This enables seamless integration for enhanced security measures, ensuring the system can adapt and grow with changing security requirements and evolving customer needs. Effortless wireless installation. Ajax offers a wireless solution, eliminating the need to lay cables in walls or undergo extensive repairs. This allows for quick and efficient installation without the limitations of wired infrastructure. After implementing the Ajax security system at the sports arena, the center’s management noted its convenience and decided to install Ajax in their homes.
Amthal has worked with Hertfordshire Garden Centre to install additional IP CCTV across its retail site and upgrade existing systems, including its intruder alarm solution, for the safety and security of staff and visitors. Based in Redbourn on the outskirts of St Albans, Hertfordshire Garden Centre is a small, independent retail premises, serving as a cherished hub for home and gardening enthusiasts. IP CCTV, intruder alarm system Amthal has worked closely with the team to ensure a secure operation, most recently adding IP CCTV and an updated intruder alarm system. Enabling staff to work in a safe environment and visitors to explore, learn, and purchase with complete peace of mind. Graham Armstrong, Owner of Hertfordshire Garden Centre, said “Faced with the cost of living crisis and a corresponding surge in shoplifting, security of our site is a top priority. But it’s not solely the Police’s job to look after us, we have to take proactive responsibility for our staff and our visitors, without compromising our friendly and welcoming environment." Real-time management and security Amthal has recently added over 20 IP cameras and upgraded the existing visual verification systems Graham Armstrong adds, “We have worked in partnership with Amthal, a local company that fully understands the brief. The team has consistently delivered great service and has shown to be knowledgeable and helpful at all times. Installations and upgrade work programs have occurred with minimal disruption to the daily operations of our retail site. It all comes together for our staff and visitors to know they are in a secure garden center world.” Amthal has recently added over 20 IP cameras and upgraded the existing visual verification systems, allowing management and security to review activity throughout the premises in real time and empowering personnel to respond promptly to any potential incidents. A monitored intruder alarm solution The addition of a new monitored intruder alarm solution is geared to quickly detect any breach and provide advanced security against unauthorized access attempts. Jacki Adams, Installation Supervisor at Amthal Fire & Security, said “In the current climate, retail crime has hit record levels, increasing by more than a third over the past year alone. What Hertfordshire Garden Centre demonstrates is by taking a proactive approach to enhancing the security infrastructure on-site, they are doing all they can to protect teams and visitors." Comprehensive surveillance and monitoring Jacki Adams adds, “What it also shows is the importance of reviewing security regularly with the help of a trusted partner such as Amthal. We can identify the opportunities for extended CCTV coverage and upgrade systems in place to ensure comprehensive surveillance and monitoring capability. Here, the move reflects a commitment to creating a safe and secure haven for all home and gardening enthusiasts.”
Helsinki Airport is a busy transport hub, with a network of flights connecting Finland with cities across Europe, Asia, and beyond. Managing access in such a dynamic environment is a challenge. This challenge extends to the control of access to cupboards, drawers, and cabinets where travel documents are stored — in the spotlight after new EU guidance on logging access to these documents. Previously, security for cabinets in Helsinki’s check-in area required airport managers to issue and track around 100 mechanical keys per airline. It took time and was a distraction from other important tasks. Airport operator Finavia sought a more convenient way to manage and monitor cabinet access, replacing mechanical locking with a streamlined electronic solution. Lenel access control solution Finavia sought a neat solution that did not require them to fit a bulky locking device Cabinets are often small, hard to wire, and easily damaged. Thus, Finavia sought a neat solution that did not require them to fit a bulky locking device or a separate RFID reader. And because the airport already had a Lenel access control solution in place, seamless integration — without extra software or database installation — was another essential requirement. “Safety, functionality, durability, security of supply, and usability were the reasons we chose the ASSA ABLOY solution,” explains Kari Mäkinen, Senior Access Control Specialist at Helsinki Airport. A major upgrade to security for almost any cabinet Now, the automated log shows exactly which airline opened any cabinet, and when Helsinki’s airline check-in desks are now equipped with Aperio® KL100 electronic cabinet locks. The KL100 is small and has a minimal footprint. Wireless, battery-powered, and with an inbuilt RFID reader, it is easy to fix to almost any cabinet, locker, or drawer without cabling or causing damage. Different sizes and cam-lengths make the lock adaptable to securing sensitive spaces in almost any workplace. “Before KL100 cabinets were managed with mechanical keys, with no specific control over who has the key and who had opened the cabinet,” adds Kari Mäkinen. Now, the automated log shows exactly which airline opened any cabinet, and when. It’s efficient and hassle-free. KL100 Wireless Cabinet Lock The KL100 Wireless Cabinet Lock integrates seamlessly with the airport’s Lenel system For high convenience, a KL100 has an integrated reader, which may be unlocked with mobile keys (via NFC or BLE), as well as smartcards or fobs using all major RFID technologies. And because the Aperio platform is built from the ground up for compatibility, the KL100 Wireless Cabinet Lock integrates seamlessly with the airport’s Lenel system. Finavia was able to choose a best-in-class solution without having to compromise. Operations at the airport are more streamlined. No one needs to handle or track thousands of mechanical keys, saving time and costs spent on logistics. Every employee’s individual access may be revoked at any time from the Lenel control panel and it’s simple to audit all cabinet access if an incident occurs. A full suite of ASSA ABLOY access control devices After 18 months of operation, the solution for check-in desks has been a success. Airport managers have ordered additional Aperio KL100 devices for airport departure gates. Multiple connectable ASSA ABLOY solutions are already deployed alongside the digital cabinet locks, including wireless Aperio door handles; Protec2 CLIQ® electromechanical locking devices; and keyless, mobile-operated ABLOY padlocks to secure fencing and cargo. “The availability of all these solutions from a single manufacturer — easily used with their existing access control solution — has helped Finavia to tailor a unified, integrated system at Helsinki Airport,” says Lars Angelin, Business Development Manager at ASSA ABLOY Opening Solutions EMEIA.
Round table discussion
There is a bright outlook for trade shows in 2024. In particular, ISC West has recently become the must-see event in the security marketplace. ISC West will take place April 9-12 at the Venetian Expo in Las Vegas. In addition to providing access to a wide range of technological innovations, the show also serves as a platform to introduce new products and services. As the industry counts down to the big exhibition, we asked this week’s Expert Panel Roundtable: What will be the big news at ISC West 2024?
Video surveillance has been a dominant factor in the casino market since the 1950s when video replaced the use of elevated walkways that allowed casino security personnel to monitor the gaming floor from above. As technology continues to evolve, we can expect to see more innovative uses of video in the casino market. Beyond video, other technologies are also transforming the casino experience. We asked this week’s Expert Panel Roundtable: How are new technologies impacting the casino surveillance and security market?
Cloud implementations enable organizations to slash IT costs, boost performance, increase efficiency, and provide flexibility in a variety of applications. Cloud computing is a great way to store and access data from anywhere in the world, as long as you have an internet connection. In the case of video management, Video Surveillance as a Service (VSaaS) systems are becoming more popular, both as a means of managing costs and to deliver expectations of accessing video from any device anywhere in the world. But on-premise video management systems (VMSs) still have a role to play, don’t they? We asked this week’s Expert Panel Roundtable: What is the continuing role of video management systems (VMS), given the growth in Video Surveillance as a Service (VSaaS)?
Products
White papers
Improving City Mobility Using Connected Video Technology
DownloadVideo Technology: Making Cities Safer & Improving Lives
DownloadProtecting Dormitory Residents and Assets
DownloadChoosing the Right Storage Technology for Video Surveillance
DownloadVideo Surveillance As A Service: Why Are Video Management Systems Migrating to the Cloud?
Download11 Reasons Video Surveillance Is Moving To The Cloud
DownloadThe Borderless Control Room
DownloadWireless Access Control eBook
DownloadSix Things To Look For When Adding AI Cameras To Your Operation
DownloadThe Inevitability of The Cloud
DownloadSecurity Investments Retailers Should Consider For Their 2021 Budget
DownloadEnhanced Ethernet Technology (ePoE)
DownloadIP In A Box: The Advantages Of Embedded Network Video Recorders
DownloadVideos
Network Video Recorders: Manufacturers & Suppliers
- Hikvision Network Video Recorders
- exacqVision Network Video Recorders
- Dahua Technology Network Video Recorders
- ADPRO Network Video Recorders
- Vicon Network Video Recorders
- Hanwha Vision Network Video Recorders
- Axis Communications Network Video Recorders
- Avigilon Network Video Recorders
- LILIN Network Video Recorders
- MOBOTIX Network Video Recorders
- Illustra Network Video Recorders
- Bosch Network Video Recorders
- AV Costar Network Video Recorders
- Milestone Network Video Recorders
- IDIS Network Video Recorders
- BCDVideo Network Video Recorders
- March Networks Network Video Recorders
- Speco Technologies Network Video Recorders
- Surveon Network Video Recorders
- Video Storage Solutions Network Video Recorders
Multi-Residential Access Management And Security
DownloadGuide For HAAS: New Choice Of SMB Security System
DownloadPrecision And Intelligence: LiDAR's Role In Modern Security Ecosystems
DownloadHikvision: Solar Powered Product Introduction + HCP
DownloadFacial Recognition
Download