Biometric Security
MacGuard Security Advisors proudly announces its advisory role in the recently announced acquisition of Gallaher & Associates (Gallaher) by Zeus Fire and Security (Zeus), a portfolio company of Baltimore-based Access Holdings. This transaction positions Gallaher to accelerate growth, while preserving its 50+ year legacy of excellence in fire, security, and communication solutions. Services to electronic security MacGuard's specialised consulting expertise guided the Gallaher family and le...
Genetec Inc., the global pioneer in enterprise physical security software, announced new intelligent automation (IA)-powered investigation capabilities in Security Center SaaS to help operators quickly locate video evidence, understand the context surrounding an event, and close cases in minutes. The new solution will be showcased for the first time at GSX at booth #1561. For many organisations, investigations still involve hours of scrubbing through video and switching between systems. New...
Blackline Safety Corp., a global pioneer in connected safety technology, announced a new $1.8 million contract with a major North American water and wastewater utility provider based in California. The order includes more than 560 devices, comprised of G7c wearable gas detectors and Blackline Docks to streamline device calibration and charging. The agreement also includes four years of self-monitoring services, ensuring ongoing visibility and heightened protection for the company’...
inforcer, a pioneer in Microsoft-focused multi-tenant management for Managed Service Providers (MSPs), announced its selection as a Microsoft partner in enabling #IntuneforMSPs. The global initiative is designed to help MSPs consolidate tooling, reduce operational overhead, and accelerate the delivery of Microsoft 365 and Copilot services for their customers. As a Microsoft partner, inforcer enables MSPs to unlock the full value of Microsoft 365 through streamlined multi-tenant management, enh...
OPSWAT, a global pioneer in critical infrastructure protection (CIP), announced the opening of its international briefing centre and state-of-the-art cybersecurity lab in London, marking a significant expansion of its UK presence. The investment underscores OPSWAT’s commitment to protecting finance, defence, and operational technology in manufacturing and energy to strengthen the UK’s economic and national security. As Europe’s financial capital, London is both a centre...
DigiFlight and its subsidiary, Camelot Secure, a revolutionary cybersecurity company, announced that Loilette Loderick, Network Forensics Analyst, has been named a finalist for the prestigious TechWomen100’s Global Award for Achievement. This recognition celebrates her outstanding contributions to cybersecurity, including driving the successful remediation of thousands of vulnerabilities and her profound impact as a mentor and leader. The public can help Loilette secure the top honour f...
News
Hikvision has announced the integration of its AcuSeek AI-powered video analytics into two key platforms: HikCentral Professional and Hik-Connect 6. This breakthrough technology transforms the speed at which organisations and teams can search and retrieve video footage by enabling natural language queries, voice commands (voice input is available on Hik-Connect 6), image-based searches, and seamless integration across diverse security ecosystems. Advanced large-scale AI models AcuSeek features sophisticated machine learning algorithms trained on millions of real-world scenarios Built on Hikvision’s advanced large-scale AI models Guanlan, AcuSeek features sophisticated machine learning algorithms trained on millions of real-world scenarios. The technology’s mechanisms enable a superior understanding of context and relationships between different elements in video scenes, significantly improving search accuracy while reducing false results. The deployment of AcuSeek technology on both HikCentral Professional and Hik-Connect 6, means that intelligent search capabilities are now available across different operational scales. Comprehensive device integration HikCentral Professional targets medium and large-scale enterprise deployments with comprehensive device integration, while Hik-Connect 6 provides accessible, flexible search functionality for individuals and smaller teams. According to Fred Wu, Product Director at Hikvision, “AcuSeek represents the convergence of advanced AI with practical usability.” “By deploying this technology across both HikCentral Professional and Hik-Connect 6, we’re ensuring that organisations of every size can benefit from intelligent video search capabilities that truly understand natural language and deliver results in seconds, not hours.” Advanced search experience HikContent 6 features AcuSeek’s revolutionary ‘Voice or Text, Seek Fast’ capability HikContent 6 features AcuSeek’s revolutionary ‘Voice or Text, Seek Fast’ capability. With natural language processing, this multi-modal search experience is available in over 30 languages. Users can describe what they are searching for either by typing in everyday language or by using their voice. For example, they can input text-based descriptions such as “search for red vehicles that exited the East Gate during the last five days,” with the system intelligently understanding time and location parameters based on camera names. Alternatively, they can perform image-based searches that pinpoint objects with timeline precision, ranking results by similarity and providing relevant contextual details. In the Hik-Connect 6 platform, the AcuSeek functionality is available in both the portal and mobile app interfaces. Intelligent semantic search HikCentral Professional offers intelligent semantic search, feature-based description and picture search. This platform integrates with compatible hardware to provide comprehensive search capabilities tailored to various scenarios, including access control and vehicle management. By integrating person and vehicle data across devices, HikCentral Professional enables seamless global searches within a unified timeline workflow. Versatile application scenarios Both HikCentral Professional and Hik-Connect 6 address diverse real-world scenarios with specialised search capabilities. Applications range from retail environments with lost items and owner searches using handbag and clothing attributes, to community security with threat detection. Management scenarios include vehicle searches by type and brand, while safety applications enable searches for people working without appropriate helmets or clothing on construction sites.
At a hearing on Sept. 16, 2025, Brett Feddersen, Chair of the Security Industry Association (SIA) Drone Security Subcommittee and vice president for strategy and government affairs at D-Fend Solutions, testified before members of Congress to discuss increasing risks from the misuse use of drones and give legislative recommendations for implementing a clear and comprehensive framework for the use of counterdrone technologies and operations across the United States. The hearing — “Unmanned and Unchecked: Confronting the Rising Threat of Malicious Drone Use in America” — focused on the growing threat posed by unauthorised and criminal use of uncrewed aircraft systems (UAS) in both domestic and international airspace. Rapid advancement of drone technology As drone technologies rapidly evolve and become ever more affordable and accessible, it is essential that policies limiting access around sensitive sites and events can be enforced and that drones used for legal and authorised purposes can be distinguished from those being used for criminal activity or potentially attacks. Along with the rapid advancement of drone technology, counter-UAS technologies have been evolving to meet these needs. Various detection technologies, such as radar, optical systems, radio communications and acoustics, allow trained security personnel to detect, track and identify drones in their airspace. Barriers to deploying counterdrone technology There are many proven ways of responding using technologies that federal agencies have fielded for many years Once a drone can be clearly identified as safe or a risk, there are many proven ways of responding using technologies federal agencies have fielded for many years; however, unnecessary barriers to deploying counterdrone technology more widely remain due to outdated laws on the books. “By taking decisive action now to modernise our laws, enhance our technological capabilities and strengthen the partnerships between all levels of government, we can ensure that our skies remain safe and that the promise of unmanned technology is never subverted by those who seek to do us harm,” said Feddersen in testimony submitted to the House Judiciary Subcommittee on Crime and Federal Government Surveillance. Awareness of drone activity Current authorities for federal agencies to detect and mitigate malicious drones are set to expire on Sept. 30, 2025, if Congress does not renew them; however, the current regime is fragmented across various federal agencies, creating confusion and potential gaps in response to incidents, especially for state and local law enforcement and trained security personnel protecting critical infrastructure. It is imperative that Congress not just renew but expand the current authorities for all federal agencies, state, local, tribal and territorial law enforcement and trained security professionals in a clear and cohesive framework to ensure that American communities can have complete air domain awareness of drone activity across the United States.
Ping Identity, a pioneer in securing digital identities for the world’s largest enterprises, announced a new AI framework designed to close the trust gap created by the rise of AI agents, along with AI-powered assistants that boost administrator productivity. This framework makes verifiable trust a foundation of every digital interaction – helping enterprises unlock frictionless convenience, strengthen governance, and open new channels for growth. Humans and AI agents "We can no longer implicitly trust what we see, hear, or receive digitally," said Peter Barker, Chief Product Officer at Ping Identity, adding "As AI becomes more embedded in the enterprise, humans and AI agents must work together seamlessly — with security and verification at the forefront." He continues, "Our AI solutions accelerate time to value by making interactions more convenient, ensuring continuous trust for a more resilient future." Identity for AI: Reducing risk, unlocking value Ping’s AI framework will ensure those agents can be trusted, managed, and scaled with confidence As businesses begin to rely on agents to serve consumers, Ping’s AI framework will ensure those agents can be trusted, managed, and scaled with confidence. The vision is to help enterprises reduce risk, maintain oversight, and unlock new opportunities by establishing the foundations of agent trust – including verifying identity, managing access, and governing agent lifecycles. Revenue potential of AI agents The framework will also support issuing unique credentials, distinguishing legitimate from malicious activity, and keeping humans in control with approval workflows. With these safeguards, enterprises can confidently capture the efficiency and revenue potential of AI agents – while preserving trust that digital interactions demand. AI for identity: Driving efficiencies for administrators AI-assistants are transforming industries by streamlining workflows and accelerating decision-making. Ping is bringing that same power to the Ping Identity Platform to help administrators navigate complex identity environments and make smarter, faster decisions. From contextual help and workflow troubleshooting to journey orchestration guidance, these assistants reduce friction and unlock new levels of efficiency. Where trust meets AI: The future of enterprise security As AI rapidly transforms the enterprise, identity is becoming the foundation of trust between humans and machines. By securing AI agents, simplifying access control, and streamlining workflows, Ping Identity is establishing identity as the foundation of enterprise trust in the AI era – ensuring innovation can scale without sacrificing security or experience.
Axis Communications, a pioneer in network video, has announced the 2025 schedule for its highly successful OPEN event series. OPEN provides a unique and intimate occasion for systems integrators, distributors, and consultants, as well as end-customers, to meet for an inspiring and educational day that focuses on the challenges and opportunities arising from the key trends in the security industry. This follows the successful debut of the OPEN series of events that reached from London in autumn 2023 and continued to key locations across Europe from Madrid to Helsinki concluding in Malmo, Sweden in September 2024. OPEN London OPEN London attracted circa 500 attendees and offered invaluable opportunities to participate in plenary sessions, debates and workshops, as well as networking with like-minded individuals. Save the dates: Axis OPEN Events for 2025 OPEN London - Tuesday 7th October 2025 - Allianz Stadium, Twickenham OPEN Helsinki - Tuesday 11th November 2025 - Hilton Helsinki Kalastajatorppa Axis OPEN 2025 Axis has maintained an open approach to its technology since introducing the first networked surveillance camera to the market in 1996. OPEN hosted speakers discussing the key issues in the security industry – and revealed how an open approach can help to solve the problems of today and generate new solutions. “OPEN is energy, communication, and innovation,” says Axis Regional Director for Northern & Eastern Europe, Linn Storäng. Moving forward as an industry The ambitious schedule for 2025 in Europe will again provide opportunities for visitors “By sharing ideas we move forward as an industry. OPEN is a great opportunity not only for Axis to tell people where we are today and where we’re heading in the future, but also for representatives of the entire industry to put their heads together and form the important relationships which will lead to the great open innovations of tomorrow,” concluded Linn Storäng. Hosted in partnership with Genetec in London and Milestone in London and Helsinki, the ambitious schedule for 2025 in Europe will again provide opportunities for visitors, facilitate connection with wider industry pioneers in networking events and help delegates discover more about how technology is driving innovation in security, safety, business intelligence and operational efficiency. Shared innovation "Axis OPEN is an important forum to showcase how openness drives real value for customers and the industry. For Milestone, it’s also a chance to show how collaboration and shared innovation make a difference where it matters most.” “Together we deliver reliable, high-value solutions, while also helping partners and customers benefit from the ongoing advances in AI, cloud, and responsible technology," comments Jonas Nilsson, Executive Technology Partner Manager, Milestone Systems. External experts Axis (TIPs) will deliver insightful presentations and product demonstrations With speakers from Axis, its partners, and external experts, issues around evolving technologies such as AI and cloud will be discussed; while the broader topics of cybersecurity, sustainability, and digital transformation will feature. At the heart of the events will again be the OPEN Zone, where Axis Technology Integration Partners (TIPs) will deliver insightful presentations and product demonstrations that highlight opportunities for innovation and growth. Ideal platform for partnership “The Axis OPEN events provide the ideal platform for partnership, where industry leaders can exchange ideas and have meaningful conversations around openness, innovation and collaboration. OPEN provides a space to explore how Axis technology combined with Genetec unified hybrid cloud-based solutions can drive smarter, safer environments for everyone,” concludes Nick Smith, Regional Sales Director, UK & Ireland, Genetec. Axis, Genetec and Milestone will be joined at OPEN by event partners and sponsors, combining to deliver a unique and insightful experience to OPEN’s event attendees including: Secure Logiq; Morphean; Canon; 2N; Wesco Anixter; Mayflex; Araani; EET Group; Eagle Eye Networks; CSL Group; Telefire; Delta Cygni Labs; Norbain; ADI; Altowav; Veracity; Commscope; QNAP; Bugcrowd; ASIS; TinyG; FixedIT; and Traxmate.io.
Amid growing warnings from cybersecurity analysts about the looming threat of quantum decryption, ImmuniWeb has released a free online tool that checks whether websites are protected by post-quantum cryptography (PQC). The tool analyzes SSL/TLS configurations and verifies their compliance with the latest quantum-resilient encryption standards from NIST. It also checks for adherence to PCI DSS, HIPAA, and other NIST cryptographic requirements. Available via both web interface and API, the tool is aimed at organisations looking to assess their preparedness for quantum-era threats. The tool is designed to simplify PQC readiness checks for organisations of all sizes, integrating into CI/CD pipelines via API for automated scanning. SSL Security Test In Q2 2025, only 10.63% of tested systems were compliant with NIST standards ImmuniWeb’s SSL Security Test has performed over 173 million scans, with more than 56,000 tests conducted in the last 24 hours alone. In Q2 2025, only 10.63% of tested systems were compliant with NIST standards — highlighting a widespread gap in cryptographic readiness for post-quantum security. While 72.32% of systems received an “A” grade for SSL/TLS security, strong grades do not always translate into compliance: just 60.81% met PCI DSS requirements. Quantum threats Gartner named Post-Quantum Cryptography (PQC) a top strategic technology trend for 2025 and urged organisations to start transitioning to PQC without further delay, citing lack of vendors’ preparedness and lack of organisational knowledge in dealing with PQC as the key obstacles on the way to PQC migration. These “Harvest Now, Decrypt Later” attacks represent a comparatively novel threat, where cybercriminals collect highly sensitive encrypted data — which cannot currently be decrypted using modern technologies — and wait until quantum computing becomes powerful enough to break the encryption. Earlier this year, Forrester backed Gartner’s concerns over PQC unreadiness and risks, estimating that current encryption will become vulnerable in 10 years from now, while emphasising that this could happen much faster. Quantum-resistant encryption Just 38% of TLS traffic currently supports some forms of quantum-resistant encryption According to Cloudflare, just 38% of TLS traffic currently supports some forms of quantum-resistant encryption—a figure that varies significantly by region. Cloudflare also noted that in some European countries, the adoption of quantum-resilient encryption was comparatively better. Governments and agencies, including the European Commission, the UK National Cyber Security Center and the US Department of Homeland Security, have issued frameworks urging immediate planning for PQC migration. Risks of quantum attacks Dr. Ilia Kolochenko, Chief Architect & CEO at ImmuniWeb, emphasised the urgency: “Many large organisations around the globe still seriously underestimate the risks of quantum attacks. First, with the Harvest-Now, Decrypt-Later attacks – already being deployed by both organised cybercrime and nation-state hackers – your data may already be at risk of a guaranteed compromise in the near future.” “Second, although powerful quantum computers will quite unlikely become readily available to cyber-threat actors upon their creation, many vendors and organisations are totally unprepared for a rapid migration to post-quantum cryptography. Worse, some devices and business-critical systems simply do not support PQC and shall be replaced.” Large-scale testing data He also pointed to ImmuniWeb’s large-scale testing data: “According to ImmuniWeb’s statistics, based on over 100,000,000 tested SSL/TLS servers, millions of servers around the globe still rely on the SSLv3 protocol, which has been deprecated for over a decade. This is a telling illustration that PQC migration will likely take even longer. Therefore, it is dispositive to commence your PQC migration planning and implementation now.” On the release of the tool, Dr. Kolochenko added: “Today, we are delighted to offer a simple and efficient solution to organisations of all sizes to reliably verify their PQC preparedness with our free online SSL/TLS testing tool. It can be accessed either online with a user-friendly web interface or via an API for DevSecOps and CI/CD automation.” Protection against AI bots ImmuniWeb also recently added a feature to check websites for protection against AI bots, including detection of anti-bot systems, firewalls, and “robots.txt” configuration. The tool helps organisations guard against unauthorised scraping by AI companies and data-harvesting bots.
Immersive, the pioneer in cyber resilience, announced the appointment of Aniket Menon as Chief Product Officer (CPO) and Thanos Karpouzis as Chief Technology Officer (CTO) to its executive leadership team. These critical additions will support innovation in Immersive One, the company’s unified cyber readiness platform, and reinforce Immersive’s mission to help organisations be ready for cyber threats through its AI-powered, evidence based Prove, Improve, Benchmark, and Report (PIBR) approach. Deep expertise Both c-suite pioneers bring deep expertise that aligns with Immersive’s vision for advancing enterprise cyber resilience: Aniket Menon is a cybersecurity product leader with over 15 years of experience at the intersection of security, technology, and infrastructure. Previously serving as VP of Product at Rapid7, Menon unified the company’s security operations platform and launched products spanning exposure management, detection and response, and cloud security, delivering measurable improvements in enterprise security programs. Thanos Karpouzis brings over 15 years of software industry experience, with a proven track record of innovation and delivering products that address critical customer needs. He previously served as Vice President of Engineering at Immersive, and before that was CTO at CoachHub, where he launched Aimy—the first commercial AI Leadership Coach—expanding the company’s personalised coaching capabilities. Prior to CoachHub, Karpouzis served as an engineering lead for Babbel and drove its learner apps product to become the world’s highest-grossing language-learning app, earning “Top Developer” and “Best Apps of the Year” recognition from Google Play and the App Store. Accelerating Immersive One’s technology Immersive is accelerating innovation in Immersive One’s role-specific training, simulations, ranges “Aniket and Thanos are visionary leaders who bring the expertise we need to accelerate Immersive One’s technology and platform, ensuring organisations are prepared for whatever threats may arise,” said Mark Schmitz, CEO of Immersive. “Their leadership will be pivotal as we scale our capabilities and expand our product portfolio to deliver solutions that help customers transform cybersecurity from a reactive necessity into a proactive, data-driven business function, equipping teams at every level to measure, improve, and prove their readiness.” With these appointments, Immersive is accelerating innovation in Immersive One’s role-specific training, simulations, ranges, and cyber drills, helping organisations protect their business, prove resilience to stakeholders, and adapt faster than the threats they face. Immersive One platform Immersive One is a unified platform that equips organisations to Prove, Improve, Benchmark, and Report their cyber resilience. The platform allows cyber pioneers to prove whether their technical teams, business leadership, and wider workforce are prepared for the next cyber incident with upskilling and exercises that benchmark readiness while also addressing compliance with regulations. Improving individual skill With the data and insights that come from these exercises, pioneers can then improve individual skill levels with targeted programs, rooted in individual performance data. Aligned with MITRE ATT&CK and other frameworks, Adaptive Intelligence Programs ensure organisations can prove cyber resilience with reports that back it up. Whether facing new regulations, board scrutiny, or real-world attacks, Immersive One turns people-readiness into a continuous, evidence based practice.


Expert commentary
Where and how to store security camera footage usually depends on the scale of the video surveillance project, the way you are using to record the video and how long you want to keep the recordings. If there are only few IP cameras, say 2~3 IP cameras for example, and you don’t need to keep the recordings for the month, usually using SD card which is installed in the camera is enough. Video management software A VMS provides a unified platform to manage all cameras and record footage onto centralised local storage servers If there are more than four cameras, even up to 128 cameras, NVR or CVR become the practical choice for managing and storing recordings reliably. However, if there are hundreds or thousands cameras, which need to managed and recorded, in this way video management software with centralised recording storage becomes essential. A VMS provides a unified platform to manage all cameras and record footage onto centralised local storage servers. S3-compatible cloud platforms Critically, if the VMS supports the S3 object storage protocol, users gain the flexibility to store recordings on S3-compatible cloud platforms (public or private), offering significant hardware cost savings and enhanced scalability. For such demanding environments, selecting a VMS built on an open platform architecture is strongly advised, ensuring the system can expand infinitely to meet future project growth. Video surveillance management system Users can seamlessly add subordinate servers (or disk groups like IPSAN/NAS), disk arrays, and network bandwidth Take the video surveillance management system SVMS Pro as an example. Its foundation is an open 1+N stackable architecture, enabling unlimited expansion of recording storage servers. Users can seamlessly add subordinate servers (or disk groups like IPSAN/NAS), disk arrays, and network bandwidth. This achieves extended recording durations and boosted storage performance while maintaining system stability during sustained operation (assuming environmental requirements are met). Key architectural advantages Each centralised storage module based on a Linux OS, supports up to 200 front-end video channels per server. Its N+1 stackable expansion capability utilises a distributed architecture, forming clusters of storage servers. Scaling the project involves simply adding subordinate storage modules – no modifications to existing deployments are required. Seamless S3 object storage integration Furthermore, SVMS Pro features deep integration of the S3 object storage protocol Furthermore, SVMS Pro features deep integration of the S3 object storage protocol. This allows seamless connection to major public cloud services like Alibaba Cloud OSS, Tencent Cloud COS, and Amazon S3 cloud, as well as private S3-compatible object storage solutions. This integration delivers truly limitless capacity expansion, leveraging the inherent elasticity of the cloud to effortlessly accommodate petabyte-scale video growth. Dual insurance: Multi-layered data protection The critical value of security data comes with inherent risks; losing video footage can lead to immeasurable losses. To mitigate these risks comprehensively, SVMS Pro innovates with its "Local + Cloud" Dual-Backup mechanism, leveraging S3 features to build multiple security layers: Real-Time Dual-Writing: Recordings are first written to the local disk (acting as a cache buffer). Upon local persistence, data is simultaneously replicated to cloud-based S3 storage, guaranteeing instant failover if either node fails. Smart Hot/Cold Tiering: Frequently accessed ("hot") data remains on high-performance local storage, while historical footage is automatically archived to low-cost cloud tiers, optimising storage expenses. Cross-Regional Disaster Recovery: Utilising the multi-replica and cross-region replication features of carrier-grade S3 storage inherently protects against physical disasters like earthquakes or fires. Additionally, the platform ensures comprehensive data protection through integrity verification and encrypted transmission, safeguarding data integrity and confidentiality across its entire lifecycle – from storage and transmission to access. Conclusion In essence, selecting the optimal storage solution for security footage hinges on a fundamental understanding of scalability requirements, retention needs, and data protection imperatives. As surveillance deployments grow from a few cameras to enterprise-scale systems, the underlying architecture must evolve: Localised storage (SD cards/NVRs) suffices for limited scope and short retention. Centralised VMS platforms become essential for unified management at scale, with open, modular architectures providing critical future-proofing for expansion. S3 object storage integration represents a paradigm shift, decoupling storage capacity from physical hardware and enabling truly elastic, cost-efficient scaling – both on-premises and in the cloud. Ultimately, successful large-scale video surveillance storage relies on architecting for flexibility, embedding data protection intrinsically, and strategically leveraging object storage protocols to balance performance, cost, and resilience – principles essential for safeguarding critical security data now and in the future.
A key characteristic of many successful companies is that good ideas come from everyone, not just specific departments or job titles. What one person sees as obvious may be questioned by someone else who is less familiar with the product or process. This simple interaction can spark a whole new, faster, and better approach. While valuing tradition is important, if someone uses the phrase “that’s how we’ve always done it,” it’s essential to analyse the process to ensure it remains optimal. Business conditions change rapidly, and what was considered a perfect process last week may need adjustments this week. Comprehensive approach to innovation This comprehensive approach to innovation fosters continuous improvement across all aspects of the organisation Innovation should permeate every level of an organisation, from product development and customer experience to sustainability practices and employee training. This comprehensive approach to innovation fosters continuous improvement across all aspects of the organisation, allowing companies to stay agile, competitive, and in tune with their customers' constantly evolving needs. Addressing real-world challenges At the heart of pervasive innovation in the security industry lies the development of smart products and solutions that address real-world challenges. This approach integrates advanced technologies to enhance security while improving user experience. For instance, the integration of mobile credentials, biometrics, real-time wireless locks, intelligent keys, and cloud-connected access control systems exemplifies how technology can streamline operations and provide users with seamless and secure access. Offering user-friendly solutions These advancements reflect a deep understanding of user needs and preferences, offering solutions that are not only secure but also convenient and user-friendly. A notable example is UniKey's Kēvo, the first Bluetooth-enabled touch-to-open smart lock, introduced in 2013. Developed in partnership with Kwikset, this innovative product allowed users to unlock doors simply by tapping the lock with a compatible smartphone. By continuously innovating across various aspects of security products and solutions, companies can ensure that their offerings remain relevant and effective in addressing the evolving challenges of the security landscape. Design-driven features Products designed for quick and straightforward installation reduce labor costs and minimise downtime Innovation extends beyond technology to encompass design-driven features that prioritise user convenience and satisfaction. For instance, ease of installation is a critical factor in the adoption of new door hardware. Products designed for quick and straightforward installation reduce labor costs and minimise downtime, making them more attractive to both installers and end users. For electronic locks, long-lasting battery performance is essential for minimising maintenance and ensuring reliability. Products with extended battery life reduce the frequency of replacements and enhance user confidence. Incorporating antimicrobial finishes into door hardware addresses growing concerns about hygiene and cleanliness. Taking hygiene a step further, touchless technology in door hardware minimises physical contact, reducing the potential for cross-contamination and enhancing user convenience. Sustainability initiatives Sustainability initiatives in door hardware have evolved from niche considerations to central pillars of modern product development, not least of which is the growing consumer demand for sustainable products, which is influencing purchasing decisions. According to a Nielsen report, 66% of global consumers are willing to spend more on a product if it comes from a sustainable brand, leading many companies to prioritise the use of recycled and recyclable materials in their products. Beyond material selection, manufacturers are also refining their production processes to minimise environmental impact. Finishing processes are evolving to use non-toxic and low-impact finishing methods, such as powder coating and physical vapor deposition. Energy-efficient door hardware Energy-efficient door hardware plays a significant role in the overall energy conservation of buildings Energy-efficient door hardware plays a significant role in the overall energy conservation of buildings. Properly designed door hardware can help maintain a building’s thermal envelope, reducing heating and cooling demands. For instance, the HID® Signo™ access control reader includes improved power supply technology and energy-saving features that ensure reduced energy consumption when the reader is in a resting state. Environmental Product Declarations To further demonstrate their commitment to sustainability, many manufacturers seek certifications validating their environmental efforts. Environmental Product Declarations (EPD) and Leadership in Energy and Environmental Design (LEED) certifications have become key indicators of a product’s environmental performance. An EPD provides detailed information about the environmental impact of a product throughout its lifecycle, aiding in the transparency that architects and builders require to make informed choices. Similarly, LEED certification emphasises energy savings and broad environmental priorities, including water efficiency, CO₂ emissions reduction, and improved indoor environmental quality. Customer service and training Innovation is also making great strides in the behind-the-scenes efforts of customer service and training. Predictive maintenance technologies are revolutionising how companies manage product performance and customer support. By utilising data analytics and IoT technologies, companies can offer maintenance alerts, remote diagnostics, and connected support services that anticipate issues and failures before they occur. This shift from reactive to predictive maintenance minimises service disruptions and enhances customer trust by ensuring products operate at optimal levels. Digital training initiatives Digital training initiatives equip employees and customers with the skills needed to utilise new technologies In parallel, digital training initiatives equip employees and customers with the skills needed to utilise new technologies in a cost-effective and accessible manner. Digital installer certification programs, learning portals, and customer enablement initiatives are all part of a comprehensive strategy to equip stakeholders with the knowledge and skills they need to succeed. By investing in comprehensive training programs, companies foster a culture of adaptability and competence, ensuring that customers can fully leverage technological advancements. This approach not only enhances operational efficiency but also strengthens customer relationships by empowering them with the knowledge to make informed decisions. Incremental improvements While groundbreaking innovations often capture headlines, it’s the steady, incremental improvements that consistently deliver real-world value. Companies can achieve sustained growth and success by focusing on continuous innovation across all facets of the organisation. This quiet progress, though less visible, is often more impactful as it builds a solid foundation for long-term achievement. In a world where change is the only constant, fostering a culture of pervasive innovation is the key to sustained relevance and growth.
In today’s fast-evolving aviation landscape, innovation isn’t optional — it’s essential. With passenger traffic in the Asia-Pacific continuing to surge, the region is facing a pivotal moment: adapt with scalable tech, or fall behind. In January 2025 alone, APAC carriers accounted for 56.6% of global passenger traffic growth. Airports are operating at near capacity, with a record-high Passenger Load Factor (PLF) of 82.1%, leading to pronounced congestion at check-in counters, security checkpoints, and boarding gates. Increasing passenger volumes As airports strive to manage increasing passenger volumes without resorting to costly and time-consuming infrastructure expansions, technology — particularly facial recognition and biometric automation — emerges as a viable solution. However, the full realisation of these innovations requires more than just installing new system However, the full realisation of these innovations requires more than just installing new systems. It’s about building the right ecosystem of partners, processes, and policies to ensure sustainable, secure, and scalable growth. Presenting physical documents According to their estimates, over 120 APAC airports have already deployed biometric solutions at key travel touchpoints, including check-in, bag drop, security, and boarding. Thailand exemplifies this shift, with facial recognition deployed at six major airports — Suvarnabhumi, Don Mueang, Chiang Mai, Chiang Rai, Phuket, and Hat Yai — dramatically reducing passenger processing times. These systems allow travelers to verify their identities seamlessly at multiple touchpoints, from check-in and security screening to boarding gates, without presenting physical documents. This case reflects the Airports of Thailand’s (AOT) commitment to leveraging technology to improve operational efficiency and passenger experience. Digital identity programs Biometric solutions also extend beyond the airport: digital identity programs enable travelers to verify their identities before arriving at the terminal, creating seamless journeys from curb to gate. In this environment, facial recognition is not merely a futuristic innovation; it has become an operational imperative. Airports that fail to adapt risk falling behind, unable to manage burgeoning passenger volumes or meet evolving traveller expectations. True operational efficiency Despite its transformative potential, biometric technology cannot be successfully deployed in isolation. Achieving true operational efficiency through facial recognition requires strategic collaboration among technology vendors, IT integrators, airports, airlines, and regulatory authorities. Several pillars underpin a successful biometric implementation: Interoperability: Biometric systems must integrate seamlessly with a wide array of airline platforms, security protocols, and airport infrastructure. Lack of interoperability can lead to fragmented systems that frustrate staff and passengers alike. Scalability: Passenger volumes are forecasted to continue rising. Biometric solutions must be designed to scale rapidly in response to demand surges and future security challenges. Data Privacy and Security: With growing public scrutiny over personal data usage, airports must implement robust security frameworks that prioritise privacy and transparency. Encryption, consent-based use, and strict access controls are critical to gaining and retaining passenger trust. Future security challenges BKI can achieve significant throughput gains without major construction disruptions A case study illustrates these points: Malaysia’s planned revamp of Kota Kinabalu International Airport (BKI) aims to boost capacity by 33% over the next few years. Rather than expanding physical infrastructure alone, authorities are exploring facial recognition solutions to increase efficiency within existing spaces. By integrating biometric checkpoints at key touchpoints, BKI can achieve significant throughput gains without major construction disruptions. Such outcomes are only possible through well-coordinated technology partnerships, where vendors, airports, and integrators work toward a shared vision of future-ready travel. AI-powered computer vision What’s Next: Fully Biometric-Enabled Travel Looking ahead, the pressure on APAC airports is set to intensify. Airports Council International projects 9.5 billion air travelers globally by the end of 2025, a volume traditional processing methods cannot manage effectively. In response, AI-powered computer vision and facial recognition will continue to refine biometric processes, delivering higher accuracy rates and faster verification. Future systems will leverage real-time liveness detection, predictive analytics for crowd management, and seamless integrations across all travel stages. A fully biometric-enabled journey is becoming reality: Check-in with a glance at a kiosk Drop bags without producing an ID or boarding pass Clear security with automated facial recognition portals Board flights through biometric-enabled gates — without ever presenting a physical document. Experiencing significant growth Seamless integration across touchpoints creates a unified, frictionless journey In this vision of the future, identity becomes the ticket. Seamless integration across touchpoints creates a unified, frictionless journey. For APAC airports experiencing significant growth, full biometric enablement is becoming increasingly important for maintaining efficiency and staying competitive. At the same time, such a future demands robust technology ecosystems, where ongoing innovation is supported by partnerships that align regulatory, operational, and technological goals. Expanding physical infrastructure Building the Smart Airports of Tomorrow: Join the Conversation The aviation sector in APAC stands at a critical crossroads. Passenger growth, operational challenges, and heightened security requirements are converging, creating an urgent need for innovation. Facial recognition and biometric automation offer a clear path forward, enabling airports to handle growing volumes, enhance security, and deliver superior passenger experiences without necessarily expanding physical infrastructure. Facial recognition solutions Yet, the success of these innovations hinges on strategic, trusted technology partnerships. Airports must collaborate with technology vendors, IT system integrators, airlines, and regulators to ensure interoperability, scalability, and data security. At RecFaces, they believe the future of APAC airports is fully biometric-enabled. To explore how tech collaborations and advanced facial recognition solutions can transform airport operations, they invite users to join their free online panel discussion on April 30: ‘Smart Airports Start With Smart Tech: Facial Biometrics for APAC Airports.’
Security beat
Big news on the mergers and acquisitions (M&A) front is closing out 2024, a year in which several shifts changed the face of the physical security manufacturer community. Announced in December, German giant Bosch Group is selling its Building Technologies division’s product business for security and communications technology to the European investment firm Triton. Bosch division selling to Triton The transaction encompasses three business units – Video, Access and Intrusion, and Communication – and thus the entire product business of Bosch Building Technologies that was offered for sale. All 4,300 associates employed in these units at more than 90 locations worldwide will be taken over. The transaction reflects a growing confidence in the security market among private equity companies such as Triton, Becklar, and Volaris. Sharing best practices Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership Acre Security, previously acquired by Triton, has benefited from Triton’s strategic guidance and expertise, according to the company, which is confident Bosch will experience the same level of support and opportunity to thrive. Acre Security and Bosch will remain independent, standalone companies under Triton’s ownership, but will benefit from the potential to collaborate and share best practices as part of the broader Triton portfolio. Resideo acquires Snap One Earlier in 2024, there were other large M&A transactions. In the spring, Resideo Technologies, Inc., a manufacturer and distributor of technology-driven products and solutions, agreed to acquire Snap One Holdings Corp., a provider of smart-living products, services, and software to professional integrators. The transaction is valued at $1.4 billion, inclusive of net debt. Upon closing, Snap One becomes part of Resideo's ADI Global Distribution business. Honeywell buys Carrier’s Access Solutions In late 2023, Honeywell announced plans to enhance and strengthen its building automation capabilities with the acquisition of Carrier Global Corporation’s Global Access Solutions business for $4.95 billion, in an all-cash transaction. The acquisition, which played out through 2024, includes both hardware and software solutions, adding three respected brands to Honeywell’s portfolio with a focus on life safety and digital access solutions. Acquired brands include LenelS2, commercial and enterprise access solutions; Onity electronic locks; and Supra cloud-based electronic real estate lock boxes. Hirsch reemerges as an iconic brand The Identiv sale was originally announced in April, subject to regulatory approval Identiv announced plans to sell its physical security business and assets to Vitaprotech, the security solutions provider that also acquired British manufacturer, TDSI, in 2019. The Identiv sale was originally announced in April, subject to regulatory approval. As a result of the sale, Hirsch, a global security technology pioneer advancing physical security, video intelligence, cybersecurity, and digital identification solutions, announces the relaunch of its iconic brand and strengthened focus on the industry’s most complete high-security, end-to-end platform. Ease of use security solutions The move seeks to reposition Hirsch as the global pioneer in physical security, video intelligence, and identity solutions, protecting everything from small enterprises to critical national infrastructure. With a 43-year-strong foundation in the industry, Hirsch’s mission has always been empowering a secure, connected world, combining government-grade high security with ease of use. Milestone and Arcules unite Effective July 1, 2024, global video technology company Milestone Systems announced its merger with the cloud-based video surveillance solutions provider, Arcules. Both companies are owned by Japanese multinational Canon Inc. Based in Irvine, Calif., Arcules was spun off from Milestone in 2017. The merger brings together Milestone and Arcules’ best-in-class capabilities within video management software (VMS), video analytics, and video surveillance as a service (VSaaS), providing a complete video technology offering. More M&A stories in 2024 In other M&A moves in 2024, cloud-based workforce management software provider Synerion USA Inc. acquired cloud-based video surveillance and access control solutions platform Qumulex Inc. Also, the global pioneer in airspace awareness and security, Dedrone, became part of the public safety and technology company Axon. The acquisition unites two companies with a shared mission to improve public safety and national security by staying ahead of persistent and escalating threats, enabling faster, more effective responses and ultimately protecting more lives in more places.
The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelengths. Irradiating the human palm with near-infrared light waves yields an image of the vascular pattern. A venous distribution map can be processed and compared to pre-registered data to match and confirm identity. Palm vein biometrics The idea of palm vein biometrics goes back to the 1980s when palm vein scanners emerged as commercial products in the 1990s. The devices gained some traction in military-grade and high-security applications, although the technology was too expensive to become popular among mainstream applications such as physical access control. Anviz Global is expanding palm vein technology into mainstream applications, featuring a lower price point that will open new market opportunities. Palm vein technology “Palm vein technology has been viewed as a boutique product because it is costly and has not developed as a mainstream product,” says Mark Vena, Senior Director of Business Strategy and Development for Anviz Global. “With a more compelling price point, the market can see the technology more broadly. We can change the game in terms of how people think about palm vein technology.” FAR and FRR Palm vein technology is more accurate than either fingerprint (0.0001% FAR) or facial recognition (0.001% FAR) Iris recognition is considered the gold standard in biometric identification, but palm vein technology can almost achieve the accuracy of iris. The false accept rate (FAR) for palm vein technology is 0.00008%, compared to 0.00005% for iris recognition systems. The false reject rate (FRR) is comparable at 0.01% for either technology. Palm vein technology is more accurate than either fingerprint (0.0001% FAR) or facial recognition (0.001% FAR). Palm vein identification occurs in less than half a second. M7 Palm “Anviz is seeking to bring a high level of capability to more mainstream commercial applications,” says Vena, specifically providing a lower-cost palm vein unit. The M7 Palm by Anviz can achieve next-generation biometric access control for greater security and intelligence. The door-mounted unit combines palm vein recognition with an RFID card reader and PIN code (using a 17-button keypad), all configurable for multi-factor authentication. Outdoor applications The robust unit, including a narrow metal exterior design, provides strong vandal resistance (IK10) and stability for outdoor applications. To ensure a weatherproof design, the IP66 rating indicates the product is completely protected against dust and can withstand strong jets of water from any direction. Power-over-ethernet (PoE) enables centralised power management and the ability to remotely reboot devices. Wiegand-out interface The unit communicates using RS-485 or TCP/IP and can connect locks, exit buttons, door contacts, doorbells, etc The unit communicates using RS-485 or TCP/IP and can connect locks, exit buttons, door contacts, doorbells, etc. The Wiegand-out interface can connect to standard third-party controllers, or a built-in relay can trigger a lock directly. Capacity is 500 users. Because palm vein recognition originates from the physiological characteristics of the human body, it represents a “credential” that cannot be forged, lost, or left at home. It is not easily counterfeited or worn out. Multi-factor authentication Applications include industries requiring high security such as government, judicial, and banking. Multi-factor authentication eliminates fraud and ensures safety at banks, data centers, airports, prisons, and government. An end user might opt for higher levels of access control for a laboratory or server room. For dealers and integrators, palm vein technology, including multi-factor authentication, provides an additional option for customers seeking to protect high-security areas on a large campus. Card readers Card readers may suffice for most of the doors, but an important laboratory or cash-handling area requires more protection. Palm vein technology can secure a casino cash cage or a room containing corporate secrets. Time of Flight ToF laser-ranging uses a laser to measure the distance to an object by calculating the time Time of Flight (ToF) laser-ranging achieves accurate measurement to ensure the right distance for operation. ToF laser-ranging uses a laser to measure the distance to an object by calculating the time it takes for the laser light to travel to the object and back. Palm vein technology operates in the range of 10 to 30cm (4 to 12 inches). The proprietary BioNANO palm vein recognition algorithm enables accurate and fast scanning speed. Non-contact biometric The non-contact biometric performs in touchless environments and does not contribute to lingering health concerns in the post-COVID world. The technology is accurate across all hand types and skin tones. Users may feel more comfortable scanning their hands than their eyes. Optimal human-machine interaction M7 Palm’s optimal human-machine interaction and user experience include a low-power-consumption OLED screen to deliver clear text notifications to the user. Advantages of M7 Palm include accuracy, stability, security, and privacy. Features include easy installation with standard processes and no special tools, centralised power management, simplified cabling, and less maintenance. Managing the system is expedited by integration with the Anviz CrossChex Standard access control and time management dashboard, used by more than 30,000 enterprises, and the system can be integrated with any access control system. Security for SMBs Anviz Global is a converged intelligent security provider for SMBs and enterprise organisations Anviz Global is a converged intelligent security provider for small- and medium-sized businesses (SMBs) and enterprise organisations. The company’s product line includes biometrics, video surveillance, and security management solutions based on the cloud, Internet of Things (IoT) and artificial intelligence (AI) technologies. Privacy concerns Anviz is part of the Xthings family of companies, which includes Ultraloq (smart locks), Utec (smart home), Bright (smart lighting), Secu365 (SaaS Platform), and Ulticam (smart cameras). Privacy concerns are minimised because palm vein recognition does not directly store the original image but rather extracts feature information through algorithmic models. Personal data is protected through obfuscation and encryption.
An attention-grabbing exhibit at GSX 2024 in Orlando involved a robot dog that could open a door. Boston Dynamics robot dog ASSA ABLOY impressed attendees with the robotics demonstration, featuring the Boston Dynamics robot dog that could open a door using either an HID credential or a mechanical grip. This innovation represents a shift toward more autonomous security solutions and is suitable for environments where human access may be limited. ASSA ABLOY impressed attendees with the Boston Dynamics robot dog Operational efficiency Eye-catching exhibits at the GSX in Orlando, showcasing the future of security technology It was one of many eye-catching exhibits at the GSX in Orlando, showcasing the future of security technology, and offering practical solutions to the industry's challenges. For security professionals, the advancements presented opportunities to enhance operational efficiency and to maintain a proactive stance in a rapidly evolving market. Control ID face identification Alongside their robot demonstration, ASSA ABLOY also highlighted the Control ID Face Identification. Access Controller, providing advanced facial recognition access control. From identity management to AI-driven surveillance systems, GSX 2024 offered a glimpse into the tools that can streamline processes, increase security, and reduce costs. Here are some other highlights. ASSA ABLOY also highlighted the Control ID Face Identification More integration with critical infrastructure A major theme at GSX 2024 was the increasing integration of security solutions with critical infrastructure. ALCEA (formerly ASSA ABLOY Critical Infrastructure) is an example. Their globalised software solution ALWIN is designed for managing access control, visitor management, and other security factors across multiple locations. ALCEA's approach involves not only internal collaborations within ASSA ABLOY but also partnerships with external organisations. An example of innovation is the Neenah Foundry lockable manhole cover, blending safety and security. Solving identity management challenges The solution simplifies onboarding and access request changes while ensuring compliance with policies Identity management continues to be a key focus in the security sector, and AMAG Technology addresses this need with its Symmetry Connect product. The solution simplifies onboarding and access request changes while ensuring compliance with policies. For professionals overseeing identity access management, Symmetry Connect provides a streamlined, automated approach, reducing human error and increasing operational efficiency. AMAG also sees a growing demand for efficient visitor management systems, especially in the post-COVID landscape. AMAG’s products cater to the need for enhanced security without overburdening staff. AI and cloud-based surveillance solutions Axis Communications highlighted its advancements in AI and cloud-based video management systems with its AXIS Camera Station Edge and Pro products. These solutions can connect seamlessly to cloud systems, providing security professionals with easy access to surveillance data anywhere. With the increasing need for centralised management, Axis’s offerings ensure that security teams can efficiently manage surveillance with minimal infrastructure. Axis also showcased its commitment to AI-driven analytics based on superior video quality. There were also networked audio solutions for public announcements and background music, among other uses. Body-worn cameras for corporate and healthcare uses Traditionally focused on law enforcement, Axon is now expanding its body-worn cameras and TASER technology into corporate, retail and healthcare environments. Their Axon Body Workforce camera is a practical solution for protecting frontline workers in high-risk environments. Axon also introduced drone-based solutions for real-time aerial awareness Axon also introduced drone-based solutions for real-time aerial awareness, a significant benefit for large campuses or remote locations. As more industries adopt corporate surveillance systems, Axon’s offerings provide flexible, scalable solutions that address the need for real-time, actionable intelligence. Cloud-based access for smart buildings Brivo’s native cloud systems and flexible credentials offer practical, future-proof security options Brivo showcased how cloud technology is revolutionising access control by offering systems that integrate seamlessly with other smart building platforms. Their open API approach enables collaboration with IT teams, bridging the gap between physical security and IT management. Brivo’s new partnership with Comcast Smart Solutions illustrates how large enterprises can implement advanced solutions, including access control while maintaining flexibility. For professionals managing complex building environments, Brivo’s native cloud systems and flexible credentials offer practical, future-proof security options. AI-powered multi-sensor camera Hanwha focused on an AI-powered multi-sensor camera, equipped with an NVIDIA processor capable of running complex analytics. In addition, Hanwha’s new AI camera technology can process multiple video streams simultaneously, either stream from its sensors or outside cameras, enabling better tracking of objects in complex environments. Their eight-channel AI Box, which converts legacy cameras into AI-enabled devices, is an attractive solution for professionals seeking to upgrade existing systems without the need for complete overhauls. For security teams looking to enhance situational awareness, Hanwha’s AI-based offerings provide advanced, scalable solutions. Workflow management and hybrid cloud security Genetec continued the theme of integrated solutions with their Operations Centre module for Security Centre, which consolidates work management into a single platform. Built on lean management principles, this system simplifies workflow for security professionals, promoting real-time collaboration across mobile and web platforms. As the industry shifts from on-premises systems to hybrid cloud solutions, Genetec’s products provide seamless transitions for organisations. Their new SaaS Security Centre also allows for natural language video searches in multiple languages, making it easier for global teams to manage operations across locations. Simplifying remote surveillance The company’s focus on scalability and efficiency is demonstrated by the “Eagle Eye Complete” subscription service Eagle Eye Networks showcased their continued international expansion, highlighting a new data centre opening in Saudi Arabia and new hiring initiatives in Australia and Europe. Their “Eagle Eye Anywhere” solar-powered camera system exemplifies the move towards flexible, easy-to-install solutions that can be deployed in remote locations. Integrators benefit from simplified maintenance through remote management, reducing the need for on-site support and ensuring operational continuity. The company’s focus on scalability and efficiency, as demonstrated by the “Eagle Eye Complete” subscription service, reflects the broader industry’s shift toward managed security services. Tailored solutions for commercial clients Everon continues its transition away from its former identity as ADT Commercial. Claiming the status of a competitive commercial integrator, Everon is reinventing itself by offering customised billing and monitoring solutions for a range of industries. Their cloud-based business intelligence platform, which combines video surveillance with data analysis, is aimed at enhancing operational awareness by detecting anomalies such as OSHA violations or retail point-of-sale exceptions. With AI-driven dashboards, clients can customise their security solutions to meet specific needs, reflecting a growing demand for tailored, data-driven security applications. Innovation through cloud and mobile LenelS2 is part of Honeywell, and they emphasised their investment in cloud and mobile solutions at GSX 2024. Their "Enterprise OnGuard Cloud" platform, launched in June 2024, is a testament to the growing demand for cloud-enabled access control systems. With the addition of NFC-enabled Blue Diamond credentials, LenelS2 is pushing towards smarter, more secure mobile access options. The strategic combination of Lenel’s solutions with Honeywell’s infrastructure offers users enhanced engineering capabilities and global reach. This reflects a broader market trend of integrating mobile devices into physical security protocols. Bringing AI to everyday security LPR system, combined with their Searchlight Cloud Analytics, offers a powerful tool for identifying security risks March Networks highlighted their new AI-driven smart search feature, designed to help security teams quickly detect operational anomalies in retail and financial environments. From identifying misplaced cash in quick-service restaurants (QSRs) to detecting "jackpotting" attacks on ATMs, their solution highlights the increasing importance of AI in enhancing both security and operational efficiency. Their Licence Plate Recognition (LPR) system, combined with their Searchlight Cloud Analytics, offers a powerful tool for identifying and responding to security risks in real-time, emphasising the practicality of AI in daily security operations. Driving sustainability in security Securitas showcased its commitment to sustainability, a growing concern for businesses across all industries. By providing CO2 data for clients and promoting digital tools like mobile credentials, Securitas is leading the charge in creating greener, more sustainable security solutions. Their focus on remote services and occupancy insights offers companies a way to reduce their environmental impact while enhancing security operations. The company’s alignment with science-based targets and circular economy practices signifies the increasing role sustainability will play in the security sector. Future lies in integration The GSX 2024 trade show revealed that the future of security lies in intelligent integration, AI-driven analytics, and cloud-based management systems. The innovations presented will help security professionals streamline their operations, enhance situational awareness, and future-proof their systems. As these technologies continue to evolve, professionals must stay informed about the latest advancements to maintain a competitive edge in the security marketplace. GSX was a great place to start. At the end of the day at GSX, it wasn’t just the robot dog that was opening doors …. to the future of security systems. {##Poll1727925373 - Of the important factors highlighted at GSX 2024, which do you consider most when adopting new security solutions?##}
Case studies
DeterTech, a pioneer in intruder detection and site security, is proud to announce its involvement with the latest series of DIY SOS: The Big Build Ireland, with the next episode due to air on Sunday 5th October on RTÉ One. One episode this series focuses on a life-changing project in Killinarden, Tallaght to adapt the home of nine-year-old Cayden and his family into a safe and accessible space that is tailored to their needs. Cayden was born with Arthrogryposis and is fully dependent on a wheelchair. The DIY SOS team stepped in after learning he was largely confined to the living room and needed to be carried upstairs, to and from his bedroom and to the toilet affecting his and his family’s qualities of life. Seeing so many volunteer tradespeople and suppliers come together to transform the terraced house was a truly special moment and makes for a spectacular reveal. DeterTech volunteers Members of DeterTech volunteered alongside more than 90 incredible tradespeople and suppliers Members of DeterTech volunteered alongside more than 90 incredible tradespeople and suppliers – from builders and electricians through to landscapers and gardeners. DeterTech also supplied the site security solutions necessary to protect people, tools and materials throughout the build. Speaking about the project Michael Kennedy, CFO, DeterTech, says: “We pride ourselves on bringing greater peace of mind to people and communities every day. Being there on reveal day to see the reaction is something I’ll never forget. I’d like to pay huge thanks to the entire DIY SOS family for involving us, and to all the volunteers, suppliers and organisers who worked so hard to create a better future for Cayden and his family.” DeterTech on board Helena Ryan, Managing Director Cooga Safety Services Group and Safety Supervisor for DIY SOS: The Big Build Ireland, adds: “One of the builds that features this series had 1,346 people on site, all of whom benefitted from the services DeterTech provides. DeterTech went above and beyond, did phenomenal work and I look forward to collaborating again in the future.” Orlagh Murphy of indiepics, the production company behind the show, concludes: “Having DeterTech on board has been a game-changer for our site safety and security. It gives our crew, contractors and volunteers the confidence they need to press on and transform the homes of our very deserving recipients.”
ZeroEyes, the creators of the first AI-based gun detection video analytics platform to earn the full U.S. Department of Homeland Security SAFETY Act Designation, and Singlewire Software, the pioneer in solutions that help keep people safe and informed, announced a new partnership to improve emergency communications in schools. As part of this collaboration, Glassboro Public School District (GPSD) in New Jersey has become the first joint customer to deploy an integrated solution combining ZeroEyes’ AI gun detection with Singlewire’s InformaCast incident management software. Real-time gun detection alerts This integration supports faster, more coordinated emergency responses The integration enables real-time gun detection alerts from ZeroEyes to automatically trigger Singlewire’s InformaCast system, which can instantly distribute customised alerts across a wide range of devices. These include digital signage, PA systems, strobe lights, desk phones and more, all reaching targeted audiences. This integration supports faster, more coordinated emergency responses and ensures critical information reaches those who need it most. Hosting emergency training exercises GPSD is a Pre-K through 12 public school district located in Glassboro, New Jersey, serving approximately 1,950 students and 350 staff members across four schools and two district buildings. With a diverse student population and deep partnerships with neighboring Rowan University, the district offers specialised academics in Performing Arts, STEM, Biomedical Studies, and Business Leadership. The district prioritises safety and mental health, using tools like Senso and Gaggle to flag concerning keywords in emails, as well as hosting emergency training exercises with local law enforcement. ZeroEyes’ capabilities “Our district was immediately impressed upon seeing a demonstration of ZeroEyes’ capabilities, and recognised that integrating it with our Singlewire software would significantly enhance our security system,” said Craig Stephenson, assistant superintendent at GPSD. “The safety of our students and staff is our top priority, and this integration adds a critical new layer of protection.” Based in Madison, Wisconsin, Singlewire Software is a major provider of mass notification systems for schools, healthcare, government, and enterprise organisations. InformaCast platform Its InformaCast platform enables organisations to communicate quickly and effectively during emergencies and daily operations. Singlewire serves more than 2,000 K-12 customers across all 50 states and is widely trusted for its reliability and flexibility in high-stakes environments. “Shootings typically last only five to seven minutes, so every second counts,” said Terry Swanson, president and CEO of Singlewire Software. “By integrating ZeroEyes’ AI-based detection with our mass notification platform, we help schools take fast, decisive action. Our goal is to keep people safe and informed everywhere, every time, and this partnership strengthens that mission.” AI gun detection AI gun detection and intelligent situational awareness software layers onto existing digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to first responders and school staff as quickly as 3 to 5 seconds from detection. Integration with Singlewire “This integration with Singlewire is a powerful example of how two technologies can complement each other to enhance school safety,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “While ZeroEyes provides the critical early detection of a potential threat, Singlewire enables that intelligence to be instantly delivered across a wide range of devices and formats.” “It’s a mutually beneficial partnership that simplifies emergency response and helps protect lives. We’re proud to see this technology in action with Glassboro Public Schools and look forward to bringing it to more districts in the future.”
Garden Spot Communities, a continuing care retirement facility in New Holland, Pennsylvania, has grown a comprehensive video security solution over nearly 20 years that maintains the facility's welcoming, open-door philosophy, while ensuring resident safety. The community operates public restaurants and welcomes neighbours across its 230-acre campus, while securing 1,100 residents using Milestone Systems XProtect video management software (VMS). Technology partnership Garden Spot maintains an intentionally open campus that includes a Starbucks cafe open to the public Garden Spot Communities, along with their Lancaster-based integrator partner App-Techs, have continually expanded their Milestone XProtect VMS to cover the unique needs of their nearly 1.4 million square foot facility, which accommodates diverse camera brands and technologies. Unlike traditional senior living facilities that rely on gates and fences, Garden Spot maintains an intentionally open campus that includes a Starbucks cafe open to the public. The system includes wireless links extending coverage to perimeter areas up to 300 metres from main buildings, supporting the facility's philosophy of openness rather than barriers. Eyes across campus "Having a comprehensive video system is key to our operating such a large enterprise," said Steve Muller, Chief Operating Officer at Garden Spot Communities. He adds, "Garden Spot's core philosophy from the very beginning is that what we don't spend on fences and gates, we can spend on cameras. We need to have eyes on what's happening across campus, and with a system like Milestone, we can do exactly that." Operational benefits The video system serves as an integral operational tool, enabling staff to respond quickly to emergencies The video system serves as an integral operational tool, enabling staff to respond quickly to emergencies and maintain situational awareness across the campus. The technology provides enhanced safety, improved operational efficiency, and valuable peace of mind for staff and families. Staff access video feeds from security workstations, office desktops, and mobile phones for timely response to situations. The system proves most valuable when a resident is missing from their normal routine, with staff turning to video as their first investigative step. In one case, cameras enabled rapid response to locate a gentleman with dementia who had left campus, preventing potential harm. Seamless monitoring Beyond security, the system supports operational needs, including weather monitoring during Pennsylvania winters and remote monitoring of the facility's aeroponic greenhouse. The system operates across multiple Dell servers with centralised management, enabling seamless monitoring from a single interface. App-Techs' Health Utility Monitor software provides telemetry data every five minutes, enabling proactive maintenance that resolves issues before staff notice them. Open platform The open platform approach provides flexibility in camera selection rather than locking the facility into a single manufacturer. This flexibility enabled system evolution from a four-camera installation in 2006 to today's comprehensive 110-camera network. The partnership with App-Techs extends beyond installation to ongoing system health monitoring, ensuring consistent performance while allowing Garden Spot staff to focus on operations rather than technical troubleshooting. Garden Spot's experience demonstrates how open platform video technology can support organisational values, while providing essential operational capabilities. The system has adapted and grown alongside facility needs, proving that investments in scalable technology provide lasting value for senior living communities seeking to balance security with community openness.
Elegance, design and entertainment – that’s what the new Grand Sapphire Resort & Casino in Iskele, in the east of the Turkish Republic of Northern Cyprus (TRNC), stands for. This exclusive hotel complex, located directly on the beach of the Karpaz Peninsula, offers guests top-level service, stunning architecture and a very special highlight: a casino with 42 live game tables and over 300 slot machines across a 2,700 m² gaming area. To ensure that guests not only have an impressive but also a safe experience, Grand Sapphire relies on a customised video surveillance solution from Dallmeier. The “Made in Germany” video technology ensures around-the-clock security and efficient processes – not only through high product quality, but also through the highest standards for data protection and data security. Data protection requirements One of the main requirements was the complete monitoring of gaming areas When the casino was opened, the security team at the Grand Sapphire Resort faced the task of implementing a modern casino security solution that would ensure both guest safety and smooth operations. “Our goal was to create a top-tier casino environment – and that includes a security concept that combines quality, data protection and efficiency,” explains Bayram Tegay, General Manager at Grand Sapphire. One of the main requirements was the complete monitoring of gaming areas, especially the live game tables, without interfering with day-to-day operations. At the same time, an exceptionally high level of data protection had to be maintained. Strict compliance regulations “In Northern Cyprus, casinos face especially strict compliance regulations,” says Yücel Çalişkan, Surveillance Manager at the resort. “Our department operates in full isolation from the rest of the organisation. Protecting sensitive data is not optional for us – it is the very foundation of our work.” Integrated surveillance concept The team opted for a comprehensive video surveillance system from Dallmeier The team opted for a comprehensive video surveillance system from Dallmeier, planned and implemented by Dallmeier Türkiye. The customised security concept was visualised and preconfigured using the 3D camera planning tool PlanD. “PlanD offered the customer 100% planning reliability,” says Orhan Yörükoğlu, Director of Dallmeier Türkiye A.Ş. “Project stakeholders could see in advance exactly which camera would cover which area and what the overall project scope would be. That was enormously helpful for decision-making.” Precision from eight meters above All cameras were installed at a height of approximately eight meters on the ceiling All cameras were installed at a height of approximately eight meters on the ceiling – a technical challenge solved through the use of high-resolution cameras with suitable optics. For seamless surveillance of the 42 live game tables, slot areas and entrances, the installation combines Dallmeier PTZ and dome cameras. To provide a full overview of the gaming floor, a Panomera S8 multifocal sensor system is used. Thanks to its unique optical design, Panomera delivers a complete overview of the casino floor while still allowing detailed zoom-in views where needed. Central control room In the central control room, four operators work per shift on three 27-inch monitors each, while 18 large-format monitors provide overall visual control. Recording is handled redundantly via IPS 10000 network video recorders. The entire system is managed using the Hemisphere VMS platform operated on four VMC Touch workstations. For non-public areas, ONVIF-compatible third-party cameras are used, and their data is also fully integrated into the Dallmeier system thanks to Hemisphere’s open system architecture. Facial recognition Another key feature is the integration of a Corsight facial recognition system, operated on dome cameras Another key feature is the integration of a Corsight facial recognition system, operated on dome cameras. The system automatically identifies blacklisted individuals when they approach the casino entrance and notifies both front desk and security personnel in real time. “This feature not only helps us enforce bans, but also strengthens our guests’ sense of security,” says Çalişkan. “We receive alerts within seconds if a blacklisted individual tries to enter the casino.” Although the casino is open from 12:00 noon to 6:00 am, the surveillance system operates 24/7. This ensures that potential threats such as break-ins or tampering outside of business hours are reliably detected. In day-to-day operations, the system significantly speeds up incident resolution – for example, in the case of misunderstandings between dealers and guests. Closed network architecture The entire system operates within a completely closed network – with no physical or wireless interfaces to other systems, no cloud connectivity, and no mobile access. This architecture ensures full data security and regulatory compliance. Internally, strict policies are in place: surveillance staff are not permitted to have contact with employees from other departments. This underscores the critical role of data protection in the casino environment of Northern Cyprus. The current system architecture is designed for seamless future expansion. AI-based functions and video content analytics (VCA) can be integrated at any time if required. Security meets efficiency With the Dallmeier solution, Grand Sapphire benefits from a state-of-the-art surveillance system that not only meets the highest security standards but also supports operational efficiency. Casino Manager Bayram Tegay concludes: “The image quality, system responsiveness and support have really convinced us. For us, it was absolutely the right decision. Thanks to Dallmeier, we can make well-founded decisions at any time – quickly, reliably and based on high-quality data.”
ZE Government Solutions (ZEGS), a wholly owned subsidiary of AI-based gun detection pioneer - ZeroEyes, announced that its new ZeroEyes Awareness Kit (ZAK), a drone featuring advanced built-in video analytics capabilities, which allows for real-time threat detection and early warning, was used to enhance security at Joint Base Charleston (JB-CHS)’s August 16 Summer Fest Concert. ZEGS rapidly deployed its computer vision software onboard an Easy Aerial tethered drone to augment security forces with overwatch capabilities, alerting the teams to any potential firearms or unauthorised personnel on the active flight line. Deployment of ZAK for real-time security Set-up took less than 30 minutes and provided JB-CHS and its defenders with an AI-enabled security platform Joint Base Charleston is a U.S. military installation in South Carolina that serves as a hub for various military operations, including airlift and airdrop operations, naval nuclear training, and logistics support. Its annual Summer Fest concert is sponsored by Air Force Entertainment. This announcement marks the first deployment of ZAK for real-time security in a real-world environment since its development as part of the Air Force Research Laboratory’s Small Business Innovation Research (SBIR) Program. Set-up took less than 30 minutes and provided JB-CHS and its defenders with an AI-enabled security platform to enhance operations for the on-base event. Extra layer of aircrew security ZAK provided overwatch for six continuous hours of flight time, protecting more than 1,000 base personnel and their families. While the operational test was for an in-garrison Morale, Welfare, and Recreational (MWR)-sponsored event, the capability is intended to provide roll-on/roll-off security for C-17 crews based out of JB-CHS. The capability easily transfers to downrange operations providing an extra layer of aircrew security in emergency situations and austere environments and incorporates Tactical Awareness Kit (TAK) plug-in capability. Drone threat detection system “This significant achievement was made possible through our collaboration with the Palmetto Spark Cell at JB-CHS, which played a crucial role in enabling the real-time use of ZAK during this live event, when security was paramount,” said Dustin Kisling, Executive Vice President for ZeroEyes Government Solutions. He adds, “Their support allowed us to tailor our tethered drone threat detection system to meet the most demanding security use cases for Air Mobility Command. By providing a platform for rigorous testing and iterative development, the Palmetto Spark Cell has been instrumental in advancing ZAK’s capabilities and ensuring its readiness for deployment in real-world scenarios.” The future of the Air Force Drone Program and AI July SECDEF memo specifically stated that 'small UAS are such critical force enablers that they must be prioritised' The July SECDEF memo specifically stated that 'small UAS are such critical force enablers that they must be prioritised at the same level as major weapons systems.' 'No later than September 1, 2025, the U.S. Army, the U.S. Navy, the U.S. Marine Corps and the U.S. Air Force will establish deliberately screened, active-duty experimental formations purpose-built to enable rapid scaling of small UAS across the Joint Force by 2026.' Use of small UAS platforms This expedited timeline laid out by the current administration has raised the urgency levels of the force looking to pursue and sustain drone programs. In anticipation of directives like this following the use of small UAS platforms in Ukraine, ZEGS recognised the need for enhanced operations using Artificial Intelligence to combat threats in combat zones and for use in home-station operations where safety of force is crucial. With the help of the SBIR program and the Palmetto Spark, ZEGS was able to add this capability to its portfolio of public safety and DoD solutions. Growing industry need for AI While necessary, the SECDEF drone directive only addresses one component of the issue While necessary, the SECDEF drone directive only addresses one component of the issue – the deployment of a large number of sensors does not necessarily correspond to an improvement in situational awareness, as it often results in a deluge of information being delivered to operators or analysts. This information overload can place a significant cognitive burden, distracting them from the mission at hand. JB-CHS recognised this and has partnered with ZEGS to deliver a unique force multiplier for their drone program through the use of AI and computer vision. ZEGS’ capabilities with drone operations ZEGS enables a streamlined approach to surveillance of threats, whether downrange with adversaries or protecting citizens against insider threats in-garrison during public events. The pre-emptive efforts to combine ZEGS’ capabilities with drone operations has put Joint Base Charleston, Air Mobility Command, and the US Air Force ahead of the curve and leading the pack for future operations.
Interface Systems, a major managed service provider delivering business security, actionable insights, and purpose-built networks for multi-location businesses, announced the successful completion of a major security upgrade for Bethesda Community Church and Bethesda Christian School in Fort Worth, Texas. Serving more than 530 students from preschool through 12th grade, Bethesda Christian School is recognised among the top private schools in Texas. Between church services, school operations, and community events, the multi-building, 26-acre campus welcomes hundreds of people daily. This high level of activity required modern safety and security systems to protect students, staff, and parishioners while simplifying daily operations. Communication challenges Bethesda’s aging fire alarms, intercoms, and CCTV system were increasingly unreliable, creating false alarms and communication challenges. To address these concerns, the church turned to Interface to modernise its infrastructure. Interface designed and deployed an integrated solution that included: Fire Alarm System: Replacing the outdated system with a modern fire alarm system that communicates urgency effectively without causing unnecessary panic, particularly important for schoolchildren. Managed Access Control: Introducing a modern system that makes it easier for administrators to manage entry to the campus. The cloud-based setup means they can grant or restrict access remotely, without having to manage complex on-site servers. Video Surveillance Upgrade: Installing a 64-channel IP camera system on the new school building, with expansion capability to replace legacy analogue cameras over time. The system provides remote monitoring and allows staff to verify alarms with live video before responding, helping to reduce unnecessary dispatches. Intercom and Paging: Replacing the outdated intercom with a flexible IP-based system that supports school bell scheduling, room-to-room communication, and all-campus announcements. It also integrates with access control, giving administrators a simple way to manage visitor entry. Effective system “The new system is effective. It gets the point across that it’s time to evacuate, but it doesn’t create panic, especially among the kids,” said Rick Campbell, Facilities Manager at Bethesda Community Church. “Having remote access to cameras and alarms has been a huge help.” The installation was carefully phased to minimise disruption to classes and worship services. “Interface worked around the kids and kept us up and running during installation,” Campbell added. “The integration was seamless, and now everything is running smoothly.” Interface’s upgrades With Interface’s upgrades, Bethesda has significantly reduced false dispatches, streamlined communication across the campus, and gained the ability to scale its systems for future growth. “Initially, we were unsure about the cost, but the investment has been well worth it,” Campbell concluded. “I’d recommend Interface to other churches without hesitation.”


Products


Round table discussion
Students deserve a safe and positive environment where they can learn and thrive. Teachers and administrators should be able to focus on their primary role of educating students because they feel supported and protected by a comprehensive security plan. Staff require a clear protocol for responding to emergencies. And parents deserve peace of mind that their children are safe during the school day. One of the tools for safer schools is physical security technology. We asked our Expert Panel Roundtable: How can physical security systems make schools safer?
Access control, video surveillance, and intrusion detection systems evolved largely independently in the physical security industry. Integrating those systems to the benefit of an enterprise's overall security has traditionally fallen on security integrators working in cooperation with manufacturers. However, today's market has also evolved to include companies that provide "unified platforms,” bringing together various disparate security systems and functions under a single, centralised management interface. We asked our Expert Panel Roundtable: What are the advantages of installing physical security systems as a unified platform?
New technology advancements significantly increase efficiency and productivity in any industry, including physical security. Enhanced innovation both creates new products and services and improves existing products, all for the benefit of security manufacturers, integrators, and end users. Companies that embrace new technology stay ahead of the curve and gain a significant competitive advantage. In addition, they can differentiate themselves in the marketplace. We asked this week's Expert Panel Roundtable: What are the most promising new technologies in the physical security industry?
White papers

Open credential standards and the impact on physical access control
Download
What is a universal RFID reader?
Download
System design considerations to optimize physical access control
Download
Milestone cloud deployment guide
Download
How biometrics are reshaping security in a connected world
Download
Using artificial intelligence (AI) to automate physical security systems
Download
Palm vein recognition
Download
Physical access control
Download
The 2024 state of physical access trend report
Download
The security challenges of data centers
Download
Security practices for hotels
Download
Access control system planning phase 2
Download
Honeywell GARD USB threat report 2024
Download
Access control system planning phase 1
Download
How to lower labour costs when installing video surveillance
Download


Artificial Intelligence in Security
Download
Elevating security through multi-sensing solutions and large-scale AI
Download
Open credential standards and the impact on physical access control
Download
Combining security and networking technologies for a unified solution
Download
What is a universal RFID reader?
Download