Commercial security
Alfred International, a pioneer in smart lock solutions, will make its debut at GSX 2025 in the First Time Exhibitor Pavilion, Booth #3406, showcasing innovative access control solutions designed specifically for commercial, multi-family, and rental property markets. The company will highlight its expanding portfolio of professional-grade smart locks, led by the new DB1 Pro Smart Deadbolt and the industry-first Interconnect Kit. Key highlights DB1 Pro Smart Deadbolt: Alfred's most adv...
Artificial Intelligence Technology Solutions, Inc., a global pioneer in AI-driven security and productivity solutions, along with its subsidiary, RAD-I, announced after unveiling RADCam Enterprise, an existing dealer has requested a quote for 1,000 units. This request follows yesterday’s announcement of RADCam Enterprise, which expands RAD-I’s proven residential technology into enterprise, education, and public sectors. The product launch marked a significant milestone...
Allied Universal®, the world’s pioneering security and facility services company, announced that its Unified Command Centre Solution has been named a runner up for the 2025 Project of the Year by Security Distributing and Marketing (SDM) magazine. SDM’s annual Project of the Year Award recognises exceptional commercial security projects in North America and the dealers and integrators behind them. Integrates real-time video analytics The solution optimises logi...
Securitas Technology, the world’s second-largest commercial electronic security company, will showcase its latest innovations and industry-pioneering capabilities at the Global Security Exchange (GSX) 2025, taking place Sept. 29 to Oct. 1 in New Orleans, Louisiana. As a trusted partner to millions of enterprise clients worldwide, Securitas Technology will use the GSX platform to demonstrate how it is leading the future of integrated security. Experts to discuss security trends At...
Everon, a globally renowned security integrator and premier provider of commercial security, video, fire and life safety solutions ranked the third-largest security company in the U.S. by SDM Magazine, announced that it has entered into a definitive agreement to acquire the business-to-business (B2B) segments of the multifamily business from ADT LLC, one of the most trusted brands in smart home and small business security. The transaction is expected to close at the end of the third quarter of...
Ibrahim Kassem, Everon’s new Chief Technology Officer (CTO), has been in the security industry since 1998 in various IT leadership roles. Most recently, he was Chief Information Officer for a video monitoring company. With most of his professional experience rooted in commercial security, Kassem has come to understand how customer needs and demands change with the evolving technology landscape. That understanding is a foundation for his new role at Everon, the national provider of commer...
News
Everon, a major security integrator and premier provider of commercial security, video, fire and life safety solutions ranked the third-largest security company in the U.S. by SDM Magazine, announced the promotion of Carson Clemons to Vice President, National Accounts Installation. With 13 years of combined operational and sales experience in the security industry as Sr. Manager, Operational Excellence and Sr. Director, National Accounts for Everon, Clemons brings proven leadership to this new role for Everon, overseeing the company’s centralised project and programme management teams within the National Accounts and Integrated Solutions departments. Operational excellence His expertise in operational excellence will be critical in optimising operations for a customer experience that thrives on consistency, efficiency and superior customer experience across the organisation. ”Our top priority is always our customers,” said Bobby Dale, Chief Customer Officer. “Carson’s ability to focus on customer needs and deliver with speed, quality, and dependability makes him the right leader to lead and strengthen this critical part of our business.” “I’m proud of the work these teams have done to deliver service quality at a national level,” said Clemons. “We are focused on optimising our processes to make every customer interaction seamless – prioritising speed, communication, consistency, and simplicity – and it’s an honour to have the opportunity to help lead the way.”
Intelligent power management company - Eaton has launched the new Scantronic Secure Radio (SSR) Range, designed to make wireless intruder alarm systems faster to install, easier to upgrade and more tamper-proof. With over 50 years of security expertise, Eaton’s new SSR Range addresses the growing demand for flexible and secure systems. Traditional hard-wired set-ups The range combines fast structure, encrypted two-way touch and built-in cloud connectivity to secure buildings These can be deployed quickly for both residential and commercial use, without the disruption and limitations associated with traditional hard-wired set-ups. The range combines fast installation, encrypted two-way communication and built-in cloud connectivity to ensure buildings are effectively protected against sophisticated threats. New innovations New innovations in the range include: Cloud-based control with SecureConnect™ – Instantly upon installation, each system connects directly to Eaton’s SecureConnect™ platform via built-in Ethernet, with Wi-Fi and 4G options available. Installers can configure, monitor and update systems remotely, reducing site visits and improving response time. Signal Survey Mode – Built-in LED indicators show signal strength instantly, allowing installers to position devices for optimal performance before any drilling or fixing takes place. Backward compatibility – The SSR range works seamlessly with existing Eaton systems, making upgrades simple and cost-effective without the need to replace legacy devices. Reliability of a wired set-up SSR Range delivers the reliability of a wired set-up with the speed, flexibility, and remote control of a fully wireless solution The SSR Range delivers the reliability of a wired set-up with the speed, flexibility, and remote control of a fully wireless solution. This eliminates the need for disruptive retrofitting in occupied buildings, while helping businesses stay ahead of increasingly sophisticated break-in attempts and cyber intrusion risks. New SSR Range “Our new SSR Range combines the rock-solid reliability for which the Scantronic brand is known, with the smart, connected features modern security professionals demand,” said Peter Regan, Product Line Manager, Eaton. He adds, “By removing the need for hard-wired cabling, installers can work faster and more efficiently, while still delivering the highest levels of security. Built-in cloud access, intuitive installation tools, and robust two-way encryption mean systems are easy to deploy and resilient against the sophisticated threats faced by today’s commercial and residential customers.”
Allied Universal, a world pioneering security and facility services provider, is expanding further in the northeast region of the U.S. with the acquisition of Mulligan Security. For more than 30 years, Mulligan Security has provided security and fire safety services to clients in and around New York City. Its clients range from commercial properties and corporate facilities to hospitals and museums. Combining the strength “Combining the strength of our businesses and leadership teams will create new opportunities to expand our innovative security solutions to meet the needs of our clients,” said Steve Jones, global chairman and CEO of Allied Universal. “Mulligan Security’s deep expertise and strong presence in Greater New York City help strengthen Allied Universal’s footprint in the region. Together, we’ll continue serving clients in New York City and beyond with outstanding service, greater value, and continued innovation.”
Integrity360, one of Europe and EMEA’s pioneering cyber security specialists, has been named as a Representative Vendor in the 2025 Gartner Market Guide for Digital Forensics and Incident Response (DFIR). The Gartner Market Guide provides security and risk management pioneers with insights to understand the DFIR market, evaluate trends, refine requirements and identify market players. Integrity360 is listed among 40 vendors globally which, according to Gartner, best represent the DFIR market and attract the most client interest through Gartner.com searches and inquiries. Cyber insurance policies and regulations DFIR retainers are increasingly viewed as a cornerstone of cyber resilience, providing organisations with rapid access to expert teams who can investigate malicious activity, conduct forensic analysis, support recovery and perform post-incident reviews. According to Gartner, these retainers are now often required by cyber insurance policies and certain regulations, such as the Digital Operational Resilience Act (DORA). Rising security incidents The guide also highlights that the DFIR market persists to grow in response to rising security incidents The guide also highlights that the DFIR market continues to grow in response to rising security incidents, with AI integration significantly reducing investigation times and improving incident context. It emphasises the value of providers offering both reactive services - such as breach investigation and ransomware negotiation - and proactive measures including tabletop exercises, penetration testing and readiness assessments. DFIR services “We are pleased to be recognised by Gartner as a Representative Vendor in the DFIR market,” said Richard Ford, CTO at Integrity360. He adds, “As organisations face tighter regulatory mandates and increasingly sophisticated threats, we’re proud to offer DFIR services, which are designed to minimise impact, support recovery and strengthen defences against future threats.” Forensic investigation Integrity360’s DFIR services give clients 24/7 access to incident response specialists across multiple regions, enabling rapid deployment when needed. These services include forensic investigation, malware analysis and breach containment to help strengthen long-term resilience.
Elite Interactive Solutions, a remote video guarding pioneer using proprietary intelligence and integration to achieve proven, real-time crime prevention, announces it will have an exhibit hall presence for the first time at the Global Security Exposition (GSX). This year’s GSX takes place Sept. 29-Oct. 1 at the Ernest N. Morial Convention Center in New Orleans. Organised by ASIS International, the tradeshow is one of industry’s renowned annual North American events, typically drawing more than 20,000 professionals from across the commercial security channel. Elite’s substantial differentiation “Elite has one of the industry’s most compelling stories to tell and solutions to offer — market-renowned client retention based on unmatched success preventing crimes in real-time,” says Marketing Director, Scott Goldfine. He adds, “Our leadership and reps are eager to meet with technology pioneers, commercial end users, integrators, guard companies and media alike at GSX to discuss Elite’s substantial differentiation, how the solution optimises security effectiveness and efficiency, and mutually beneficial partnerships.” Elite’s remote guarding services Elite’s 24/7/365 SOCC directly prevented more than 78,000 incidents and actively assisted with police Scheduled visitors to Elite’s GSX show-floor suite (No. 1177) will learn about remote guarding services that are having a profound impact on preventing crimes. During 2024, Elite’s 24/7/365 Security Operations Command Centre (SOCC) directly prevented more than 78,000 incidents and actively assisted with police in 1,900 other live crime situations that concluded with suspects being detained or arrested 57% of the time. Those incidents and police engagement totals were record highs, as were the 19.4 million events cleared along with the 1,074 arrests & detainments. Elite’s added value Elite’s added value includes serving as a force multiplier and live eyewitness partner to police as they respond to active crimes in progress. Elite is the only company with its own Law Enforcement Advisory Board, comprised of former police chiefs who are integral to the company’s standardised dispatch protocols and jurisdictional relationships. Despite increases in clients, cameras and alerts during the past several years, Elite has maintained its promise of zero false alarms and its pledge to never miss an event. Elite's crime prevention solution Through the years, Elite has continued to innovate and perfect its crime prevention solution Through the years, Elite has continued to innovate and perfect its crime prevention solution, which is predicated on the scientific blend of four pillars: technologies, practices, people and partnerships. These elements coalesce within its nerve centre, a state-of-the-art, subterranean UL Security Operations Command Center located within one of the nation’s most fortified buildings in Downtown Los Angeles that is manned 24/7 by former military and law enforcement operators. Elite's long-term choice “During the past couple of years, Elite has significantly ramped up its exposure and growth. Hosting a suite on the show floor at GSX continues that progression as the company ramps up to scale its services nationwide,” adds Scott Goldfine. He continues, “We are excited to engage in meaningful conversations and explain why — whether it’s partnering with technology providers, guard companies and integrators or protecting commercial end users — Elite is the ideal, long-term choice. We look forward to seeing everyone there!” What: Global Security Expo (GSX); gsx.org (get show app at gsx.org/mobile) Where: Ernest N. Morial Convention Centre, New Orleans; Suite 1177 (on expo floor) Why: Elite Interactive Solutions; Set meetings via GSX app When: Sept. 29-Oct. 1 (Mon.-Tue. 9:30-4:30, Wed. 9:30-3)
iDenfy, a Lithuanian-based RegTech company best known for its identity verification and fraud prevention automation solutions, introduced a new addition to its Know Your Business (KYB) platform, the Secretary of State (SOS) business search tool. This new feature helps businesses instantly connect and verify company information across all 50 U.S. states using official Secretary of State records. The new API solution will strive to help high-risk companies, such as fintechs and banks, improve KYB onboarding accuracy and ensure compliance across different states. Compliance and financial requirements SOS is the official authority in each state of the USA, responsible for maintaining business roll records The Secretary of State (SOS) is the official authority in each United States of America, responsible for maintaining business registration records. These databases are saved in order to contain important information if a business is legally registered, its current status (active or inactive), and if it has filed all necessary reports to remain in good standing, meaning that it has met and continues to maintain all compliance and financial requirements. Without this verification step, any business risks to onboard shell companies or entities which are engaged in financial infidelity. SOS lookup system According to Domantas Ciulde, the CEO of iDenfy, streamlining access to SOS filings helps save time, as manually checking all these databases can be a hassle: “Our SOS lookup system connects to all U.S. SOS office portals and extracts relevant information about another company in seconds, which is vital for B2B partnerships and KYB compliance." "Otherwise, analysts need to look up all portals manually, and it can be confusing, as some companies are registered in one state, while they actually operate in another location.” iDenfy’s SOS business search tool iDenfy’s SOS business search tool simplifies what has traditionally been a fragmented and time-consuming process According to Ciulde, in cases like this, multiple SOS portals need to be checked, and they can be gated with fees and the need to create multiple accounts to access simple corporate information. Currently, iDenfy’s SOS business search tool simplifies what has traditionally been a fragmented and time-consuming process. The system is able to automatically receive official data from the Secretary of State and compile a short but very detailed PDF report which summarises the company’s registration details, legal status, entity type (such as LLC or Corporation), tax ID, registered address, and if any governing person or stakeholder is involved. Extra layer of security iDenfy’s SOS tool also helps to identify potential threats such as inactive entities, missing or inconsistent registration data, and past bankruptcies. These red flags often signal shell companies and suspicious activity. By identifying these risks early, businesses can protect themselves from reputational damage or regulatory fines. Additionally, once a business’s legal data is pulled from the SOS database, it’s automatically cross-checked against other KYB criteria, including sanctions lists, adverse media, and tax ID verification directly from IRS records. New vendors and business partners Companies with weak due diligence processes face an average breach cost of $4.88 million For high-risk industries like crypto, this extra layer of security is essential in order to avoid bad actors from unclear companies. It’s worth mentioning that as cyber threats continue to rise globally, proper business verification is no longer optional. According to IBM’s 2024 Cost of a Data Breach Report, companies with weak due diligence processes face an average breach cost of $4.88 million, especially when onboarding new vendors and business partners without sufficient background checks. iDenfy’s KYB tools Domantas Ciulde, CEO of iDenfy, added, “Our goal is to provide businesses with the tools they need to stay compliant while maintaining speed. Access to Secretary of State records was the missing link in many onboarding processes. Now, we finally automated that link and made it part of the same dashboard used for identity checks.” iDenfy’s KYB tools are already being used by companies across finance, fintech, e-commerce, and crypto. The new SOS business search is now live and available to all users on iDenfy’s dashboard.


Expert commentary
A key characteristic of many successful companies is that good ideas come from everyone, not just specific departments or job titles. What one person sees as obvious may be questioned by someone else who is less familiar with the product or process. This simple interaction can spark a whole new, faster, and better approach. While valuing tradition is important, if someone uses the phrase “that’s how we’ve always done it,” it’s essential to analyse the process to ensure it remains optimal. Business conditions change rapidly, and what was considered a perfect process last week may need adjustments this week. Comprehensive approach to innovation This comprehensive approach to innovation fosters continuous improvement across all aspects of the organisation Innovation should permeate every level of an organisation, from product development and customer experience to sustainability practices and employee training. This comprehensive approach to innovation fosters continuous improvement across all aspects of the organisation, allowing companies to stay agile, competitive, and in tune with their customers' constantly evolving needs. Addressing real-world challenges At the heart of pervasive innovation in the security industry lies the development of smart products and solutions that address real-world challenges. This approach integrates advanced technologies to enhance security while improving user experience. For instance, the integration of mobile credentials, biometrics, real-time wireless locks, intelligent keys, and cloud-connected access control systems exemplifies how technology can streamline operations and provide users with seamless and secure access. Offering user-friendly solutions These advancements reflect a deep understanding of user needs and preferences, offering solutions that are not only secure but also convenient and user-friendly. A notable example is UniKey's Kēvo, the first Bluetooth-enabled touch-to-open smart lock, introduced in 2013. Developed in partnership with Kwikset, this innovative product allowed users to unlock doors simply by tapping the lock with a compatible smartphone. By continuously innovating across various aspects of security products and solutions, companies can ensure that their offerings remain relevant and effective in addressing the evolving challenges of the security landscape. Design-driven features Products designed for quick and straightforward installation reduce labor costs and minimise downtime Innovation extends beyond technology to encompass design-driven features that prioritise user convenience and satisfaction. For instance, ease of installation is a critical factor in the adoption of new door hardware. Products designed for quick and straightforward installation reduce labor costs and minimise downtime, making them more attractive to both installers and end users. For electronic locks, long-lasting battery performance is essential for minimising maintenance and ensuring reliability. Products with extended battery life reduce the frequency of replacements and enhance user confidence. Incorporating antimicrobial finishes into door hardware addresses growing concerns about hygiene and cleanliness. Taking hygiene a step further, touchless technology in door hardware minimises physical contact, reducing the potential for cross-contamination and enhancing user convenience. Sustainability initiatives Sustainability initiatives in door hardware have evolved from niche considerations to central pillars of modern product development, not least of which is the growing consumer demand for sustainable products, which is influencing purchasing decisions. According to a Nielsen report, 66% of global consumers are willing to spend more on a product if it comes from a sustainable brand, leading many companies to prioritise the use of recycled and recyclable materials in their products. Beyond material selection, manufacturers are also refining their production processes to minimise environmental impact. Finishing processes are evolving to use non-toxic and low-impact finishing methods, such as powder coating and physical vapor deposition. Energy-efficient door hardware Energy-efficient door hardware plays a significant role in the overall energy conservation of buildings Energy-efficient door hardware plays a significant role in the overall energy conservation of buildings. Properly designed door hardware can help maintain a building’s thermal envelope, reducing heating and cooling demands. For instance, the HID® Signo™ access control reader includes improved power supply technology and energy-saving features that ensure reduced energy consumption when the reader is in a resting state. Environmental Product Declarations To further demonstrate their commitment to sustainability, many manufacturers seek certifications validating their environmental efforts. Environmental Product Declarations (EPD) and Leadership in Energy and Environmental Design (LEED) certifications have become key indicators of a product’s environmental performance. An EPD provides detailed information about the environmental impact of a product throughout its lifecycle, aiding in the transparency that architects and builders require to make informed choices. Similarly, LEED certification emphasises energy savings and broad environmental priorities, including water efficiency, CO₂ emissions reduction, and improved indoor environmental quality. Customer service and training Innovation is also making great strides in the behind-the-scenes efforts of customer service and training. Predictive maintenance technologies are revolutionising how companies manage product performance and customer support. By utilising data analytics and IoT technologies, companies can offer maintenance alerts, remote diagnostics, and connected support services that anticipate issues and failures before they occur. This shift from reactive to predictive maintenance minimises service disruptions and enhances customer trust by ensuring products operate at optimal levels. Digital training initiatives Digital training initiatives equip employees and customers with the skills needed to utilise new technologies In parallel, digital training initiatives equip employees and customers with the skills needed to utilise new technologies in a cost-effective and accessible manner. Digital installer certification programs, learning portals, and customer enablement initiatives are all part of a comprehensive strategy to equip stakeholders with the knowledge and skills they need to succeed. By investing in comprehensive training programs, companies foster a culture of adaptability and competence, ensuring that customers can fully leverage technological advancements. This approach not only enhances operational efficiency but also strengthens customer relationships by empowering them with the knowledge to make informed decisions. Incremental improvements While groundbreaking innovations often capture headlines, it’s the steady, incremental improvements that consistently deliver real-world value. Companies can achieve sustained growth and success by focusing on continuous innovation across all facets of the organisation. This quiet progress, though less visible, is often more impactful as it builds a solid foundation for long-term achievement. In a world where change is the only constant, fostering a culture of pervasive innovation is the key to sustained relevance and growth.
March is Women in Security Month, a time dedicated to celebrating and promoting the contributions of women in the security field—particularly in cybersecurity. This observance aligns with Women’s History Month, providing an opportunity to reflect on the progress made and the work still needed to advance gender equity in security. Evolving role of women in security The security industry has witnessed a steady increase in women's participation. According to ISC2 Research in its “Women’s Role in Filling the Workforce Gap” report, women make up an estimated 20 to 25 percent of the security industry. Promisingly, younger generations are entering the profession at higher rates, with 26 percent of working professionals under 30 identifying as women. The security industry has witnessed a steady increase in women's participation The research tells us that women are thriving in a variety of roles, from engineering and system administration to sales, marketing, and project leadership. Key factors driving this transformation include mentorship programs, male allies advocating for gender equality, and cultural shifts recognising the unique perspectives and strengths women bring to security challenges. These efforts are fostering more inclusive environments and ultimately strengthening the industry. The value of diverse perspectives in security Security is not a one-size-fits-all industry—each organisation and facility has unique needs that require varied perspectives. Greater representation of women has introduced fresh approaches to problem-solving, fostering collaboration and driving innovation. By integrating diverse viewpoints, security professionals can create more effective solutions that better address end-user needs. Industry support for women’s professional growth SIA's WISF offers subcommittees such as NavigateHER, SupportHER, and UpLiftHER Organisations like the Security Industry Association (SIA) and ASIS International have established networking platforms and initiatives to support women in security. Events such as the Security LeadHER Conference provide valuable professional development and networking opportunities. Companies are also investing in science, technology, engineering, and mathematics (STEM) initiatives, hands-on training, and recruitment programs to attract more women into the field. Additionally, SIA's Women in Security Forum (WISF) offers subcommittees such as NavigateHER, SupportHER, and UpLiftHER, which provide pathways for engagement and growth. Challenges women in security face Despite progress, challenges remain. Many women still feel it necessary to repeatedly prove their expertise, take on additional informal responsibilities, or carefully navigate workplace dynamics. Imposter syndrome can be another hurdle, even for accomplished professionals. However, women in security are addressing these challenges by setting boundaries, advocating for themselves, and supporting one another through mentorship. By excelling in leadership and technical roles, women are reshaping outdated perceptions and advocating for more inclusive workplace policies. Steps industry pioneers can take To further support women in security, industry pioneers could: Provide targeted professional development and career advancement opportunities. Foster strong, supportive communities that recognise and mentor women. Implement structured mentorship programs that connect experienced professionals with newcomers. Promote workplace flexibility to help employees balance personal and career commitments. Actively challenge biases and advocate for meaningful change within organisations. Advice for women entering the security field Here are key pieces of advice for women considering a career in security: Own Your Expertise – Have confidence in your knowledge and skills. Seek Out Mentors & Allies – Connect with supportive professionals who can guide your career. Build a Strong Network – Join organisations like ASIS Women in Security, SIA Women in Security Forum, or Women in CyberSecurity (WiCyS), and attend industry events to expand your connections. Speak Up & Take Space – Confidently share your ideas and challenge outdated norms. Develop Resilience & Advocate for Yourself – Push past biases, demand the respect you deserve, and negotiate for fair salaries and promotions. Keep Learning & Stay Ahead – Continually build your expertise to stay competitive in the evolving security industry. The future of women in security As the security industry evolves with technological advancements and global changes, opportunities for women will continue to expand. Women are not just participating in the industry’s growth—they are shaping its future. With growing mentorship programs, male allies advocating for gender equality, and ongoing cultural shifts, the focus is no longer just on breaking barriers but on building bridges to new opportunities.
From where I sit in talking to security pioneers every day, the traditional Global Security Operations Centre (GSOC) stands at a critical inflection point. Security teams are up against challenges in staffing, operational efficiency, and more threat complexity, which means “thinking outside the box” is becoming critical. The use of artificial intelligence (AI) is emerging as more than a buzzword in these situations; it’s becoming a game-changing force multiplier in security operations. Reaching a breaking point Today's GSOCs face a perfect storm of operational challenges. Security operators, typically earning between $20-40 per hour, require extensive training periods lasting weeks or months as a result of the numerous applications they’re tasked with using. Yet the industry grapples with insane turnover rates of 100-% to 300% annually, creating a costly cycle of continuous recruitment and training. Meanwhile, operators are drowning in video feeds and alarms, leading to fatigue, missed incidents, and delayed response times. Practical applications for AI The reality of many GSOCs, however, is a disjointed mess of multiple applications The GSOC is the centre of an organization’s security and in a perfect world, all of the data related to safety across multiple facilities flows through there, giving operators a clear picture of what’s going on at any given time. The reality of many GSOCs, however, is a disjointed mess of multiple applications. Think about all the platforms needed to respond to a single incident – access control alarm, video to verify, standard operating procedures (SOPs) stored on a shared drive, radios to get a hold of a guard to dispatch, finding a list of emergency numbers and corresponding it to where the incident is happening, and manually logging the results. Steps into a single platform Not only is there a case for unifying all of these steps into a single platform that pulls in data from various sources, but layering response with AI-enabled technology to achieve the following: Real-time video analysis and threat detection. AI-enabled systems are revolutionising surveillance operations by simultaneously monitoring multiple video feeds, detecting and classifying objects, people, and behaviours in real-time. The technology excels at identifying suspicious activities such as loitering, abandoned objects, or unauthorised access attempts, automatically alerting operators to potential threats – or even identifying false alarms that can take human operators away from the work they’re doing – all while maintaining vigilance across numerous camera feeds. Intelligent alarm management. One of AI's most immediate impacts is in addressing the chronic problem of false alarms. By analysing multiple data points simultaneously, AI technology can intelligently filter and verify alerts, dramatically reducing false positives that traditionally consume valuable operator time. An AI GSOC operator, for example, can assess an incoming alarm and either identify it as a real threat (then escalate to its human supervisors) or use SOPs to determine that the alarm is false, providing feedback and reasoning that’s collected and assessed. This intelligent triage ensures security teams focus on genuine threats rather than chasing false alarms, significantly improving response efficiency. Automated incident response. When security incidents occur, AI systems can instantly gather relevant data from multiple sources – including video feeds, access control logs, and sensor data – to generate preliminary incident reports and initiate appropriate response protocols. This automation ensures consistent application of security procedures while maintaining detailed documentation for compliance and analysis purposes. Predictive analytics and pattern recognition. By analysing historical data, AI systems can identify patterns that might indicate emerging security risks before they materialise. This includes detecting unusual access patterns, anomalies in foot traffic, or behavioural patterns that suggest potential future security threats, enabling proactive rather than reactive security measures. The benefits to the business While AI can be used in so many ways to reduce false alarms, create more efficiencies, and help GSOC operators elevate their roles to be more strategic, there is still a stigma associated with its use. However, a lot of the conversations around this kind of investment can be elevated to reflect positively on the business, which can help achieve more buy-in from leadership. Here are some of the ways: Operational improvements: Dramatic reduction in false alarm rates through intelligent verification systems that analyse multiple data points simultaneously Response times cut significantly through automated triage and threat assessment protocols Standardised and consistent application of security protocols across all shifts and incidents More efficient resource allocation through AI-driven staffing recommendations based on historical patterns Expanded security coverage without proportional staffing increases, enabling monitoring of multiple locations simultaneously Enhanced incident documentation through automated report generation and data collection Improved situational awareness through real-time correlation of multiple data sources Reduced training time for new operators through AI-assisted guidance systems Better compliance management through automated protocol enforcement and documentation Business impact: Significant cost savings through reduced false alarm response and more efficient staffing Decreased liability exposure through comprehensive incident documentation and consistent protocol application Enhanced regulatory compliance through automated record-keeping and standardised procedures Improved risk management through predictive analytics and early warning capabilities Better return on investment for security technology through integrated AI-driven optimization Increased scalability of security operations without proportional cost increases More robust business continuity through improved threat detection and response Enhanced protection of critical assets through constant AI monitoring Personnel impact: Reduced operator burnout through automation of routine and repetitive tasks Enhanced job satisfaction as operators focus on strategic decision-making rather than routine monitoring Improved work-life balance through more efficient resource allocation New career development opportunities in AI-enabled security operations Better retention rates through reduced stress and increased job engagement Enhanced skill development as operators learn to work with advanced technology Improved team collaboration through AI-assisted information sharing More effective decision-making support through AI-driven insights Greater operator confidence through AI-backed verification of security events AI and the road ahead Integration of AI into the GSOC is about more than simply technological advancement While security historically hasn’t changed as quickly as its cyber counterparts, its evolution is imminent. Integration of AI into the GSOC is about more than simply technological advancement; it’s a seismic shift in how organisations approach security operations. The future of this is in the partnership between human expertise and AI capabilities, where technology handles routine monitoring and initial threat assessment, allowing security personnel to focus on complex decision-making and strategic security initiatives. Transformation of security operations For security pioneers looking to implement AI in their GSOCs, success lies in thoughtful integration that considers both technical requirements and human factors. By carefully balancing automation with human oversight, organisations can create more effective, efficient, and responsive security operations that deliver tangible value to the enterprise. The transformation of security operations through AI isn't just about doing more with less – it's about doing better with what we have. As threats become more sophisticated and security demands continue to grow, AI-enabled GSOCs will be better positioned to meet these challenges while delivering enhanced protection for people, assets, and operations.
Security beat
For all the emphasis on cloud systems and centralised servers at ISC West, a lot of innovation in security video systems is happening at the edge. New advancements inside video cameras are boosting capabilities at the edge, from advancements in processing power to artificial intelligence (AI) and machine learning (ML) algorithms that can now be deployed directly on the cameras or edge devices. Advancements in AI algorithms The progress of video systems becoming smarter at the edge is driven by the need for real-time insights, lower latency, bandwidth efficiency, enhanced privacy, and improved reliability. Advancements in edge computing hardware and AI algorithms are enabling a range of intelligent video applications across various industries, including physical security. Smarter functionality at the edge is a benefit of new computer systems-on-chips (SoCs) that are driving new heights of performance for today’s cameras. Axis Communications’ ARTPEC-9 Axis Communications’ new ARTPEC-9 SoC offers advanced video compression to reduce bandwidth Axis Communication’s new ARTPEC-9 system-on-chip (SoC) offers advanced video compression to reduce bandwidth and storage needs. With a low bitrate, the SoC helps deliver high-quality imaging with outstanding forensic detail. ARTPEC-9 also offers enhanced deep learning capabilities to allow users to leverage the latest video analytics and accelerate the implementation of AI technology. Axis maintains control over all aspects of the chip’s development to ensure high quality and cybersecurity. Among the benefits of ARTPEC-9 are better AI and deep learning, better image quality, better cybersecurity, and AV1 license-free video compression (see below). Hanwha Vision’s Wisenet 9 Hanwha Vision has launched Wisenet 9, its most advanced AI-powered System on Chip (SoC). Wisenet 9’s enhanced edge AI capabilities increase performance as the volume and complexity of security threats demand real-time, accurate analysis. By elevating edge-device performance, AI empowers systems to quickly analyse vast amounts of video data and discern crucial patterns and anomalies. A key differentiator driving Wisenet 9 is deployment of two Neural Processing Units (NPUs), which improve performance three-fold compared to Wisenet 7, the previous SoC generation. While one NPU handles image processing, the other focuses on object detection and advanced analytics. This dual NPU concept was introduced to ensure video quality and analytics have independent resources, thus preventing one function from impacting the performance of the other. The latest from Ambarella Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers Off the ISC West trade show floor in a nearby meeting room, semiconductor company Ambarella demonstrated how it will continue to push the envelope of what is possible with generative AI at the edge. Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers and recently achieved the milestone of 30 million cumulative units shipped. The demonstrations highlight Ambarella’s ability to enable scalable, high-performance reasoning and vision AI applications across its ultra-efficient, edge-inference CVflow 3.0 AI SoC portfolio. The company’s DeepSeek GenAI models run on three different price/performance levels of its SoC portfolio. In addition to advancements in GenAI processing at the edge, Ambarella integrates image processing, encoding and system-level functions into all its AI SoCs. New standard for video encoding: AV1 AV1 compression is a next-generation video coding technology that offers significant improvements in compression efficiency and video quality, especially at lower bitrates. Its royalty-free nature positions it as a crucial codec for the future of internet video. AV1 compression is a next-generation video coding technology. Axis Communication’s ARTPEC-9 chip now supports the AV1 video encoding standard. By embracing this standard, which is new to the physical security market although it was introduced in 2018, Axis sets the stage for AV1 compression to eventually become the industry standard, replacing H.264 and H.265. Network video transmission AV1 is an open-source, license-free coding format designed mainly for efficient network video transmission AV1 is an open-source, license-free coding format designed specifically for efficient network video transmission. It delivers high-quality video at low bitrates, reducing bandwidth consumption and storage costs. The codec was developed by the Alliance for Open Media (AOM), a nonprofit organisation founded in 2015 by Google, Intel, Amazon, Microsoft, Netflix, and Mozilla (among others), to provide open-standard, next-gen video coding technology. AV1 is ideal for cloud solutions—making streaming applications more robust, scalable, and capable of delivering real-time insights. Now the ARTPEC-9 chipset brings these benefits to the surveillance industry, and AV1 is currently supported by AXIS Camera Station. Providers of major video management solutions (VMS) such as Genetec and Milestone will be adding support for AV1, with further developments already underway. More intelligence at the edge Intelligence inside video cameras comes from the processing power and algorithms that enable them to perform tasks beyond simply capturing and recording images. This "intelligence" allows cameras to analyse the video stream in real-time, identify objects, detect events, and make decisions or provide alerts based on what they "see." New and improved SoCs are driving performance improvements at the edge. The increasing power of embedded processors and advancements in AI are continuously expanding the capabilities of intelligent video cameras.
ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.
The shift from standalone systems to fully integrated solutions is one of the biggest shifts the security industry has experienced in recent years. There is a higher demand for integrated solutions that go beyond just security at the device and software level, and manufacturers have been continuously developing improved application programming interfaces (APIs), and hybrid and cloud-connected solutions. Artificial intelligence (AI) Also, artificial intelligence (AI) plays an important role in modern intrusion systems by helping enable automated threat detection, real-time response, and predictive analysis. AI algorithms can analyse vast amounts of data to identify patterns and anomalies that may indicate security breaches. Security solutions are being developed with a focus on AI and machine learning to provide more proactive and resilient defences against increasingly sophisticated cyber threats. Benefits of AI AI-driven security solutions can continuously learn and adapt to new threats, providing more robust protection “The practical benefits of AI in security systems include enhanced accuracy in detecting threats, reduced response times through automation, and the capability to anticipate and prevent potential vulnerabilities before they are exploited,” says Sergio Castillejos, President, of Commercial Security at Honeywell. Additionally, AI-driven security solutions can continuously learn and adapt to new threats, providing businesses with more robust and dynamic protection. Unified Intelligent Command user interface Honeywell meets the challenge of better-integrated systems with a unified Intelligent Command user interface (UI). Castillejos says Honeywell continually innovates with the latest analytics and encryption to keep up with evolving threats. Honeywell’s products integrate with many offerings for partners to construct a robust and modern system relevant to their security needs. Advanced cloud-based security Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection Advanced cloud-based security technologies have been developed that offer real-time monitoring, automated threat detection, and remote management, essential for hybrid work environments, says Castillejos. “These solutions enhance scalability, improve data analytics capabilities, and provide seamless updates reducing significant maintenance costs that help companies to respond swiftly to emerging threats and enable robust, adaptive security measures.” Physical and digital security The best security systems are a combination of physical, digital, and national security, says Castillejos. While Honeywell focuses on providing the best in physical and digital security within their solutions, protecting sensitive and/or personal information must also be within the responsibility of the organisational policy. Cybersecurity for connected devices Some of the challenges in the next five years will likely include integrating advanced technologies Security systems can safeguard this information by being highly configurable while also notifying users of unwanted activity. Sometimes, just restricting access to sensitive areas can be enough. However, in the world of data analysis and machine learning, security systems can audit and report on users who have accessed data to ensure that the protections are in place. Some of the challenges in the next five years will likely include integrating advanced technologies such as AI and the Internet of Things (IoT) while securing cybersecurity for connected devices, notes Castillejos. Balancing act “Additionally, there will be a growing need for skilled professionals to manage and maintain these complex, connected systems,” he says. “Balancing cost-effectiveness with the demand for resilient security solutions will also pose a significant challenge, especially for smaller businesses.” Legacy systems that are susceptible to vulnerabilities like cloning or unauthorised access present the largest challenge to overcome. “However, as technology evolves, it becomes more challenging for a customer to manage a unified security system rather than a collection of unique solutions that all operate independently,” says Castillejos. Disruptive technology But investing in the newest analytics, AI and IoT will not improve a company’s physical security systems if they do nothing with the data. “They are not a replacement for the devices that keep people and property safe,” says Castillejos. “They can enhance a user’s experience and speed up the time to respond when they are planned correctly.” The best security systems will look at disruptive technology as another tool in the overall system. However, the focus should remain on the user experience. If the latest technology is not properly integrated or configured, it will turn into more noise that most operators will ignore. {##Poll1720586145 - Which is the most useful benefit of artificial intelligence (AI) in security systems?##}
Case studies
Centro Ilarco is a state-of-the-art commercial office building in the heart of Bogotá, Colombia. Designed to accommodate three corporate towers with a total of 90 offices, this landmark structure focuses on providing innovative, secure, and seamless access experiences for its tenants. The solution As a multi-building office complex, Centro Ilarco required a robust access control system to ensure security, manage tenant entry, and streamline visitor access at every entry point. To meet these needs, the DNAKE S617 8” Facial Recognition Door Station was installed across the building. Since its implementation, Centro Ilarco has experienced a significant boost in both security and operational efficiency. Tenants now enjoy hassle-free, touchless access to their offices, while building management benefits from real-time monitoring, detailed access logs, and centralised control of all entry points. DNAKE smart intercom solution has not only enhanced security but also improved the overall tenant experience. Installed products S617 8” Facial Recognition Android Door Station Smart Pro APP
The global energy landscape is evolving at an unprecedented pace. With the increased adoption of renewable energy sources and the drive for a more sustainable future, the demand for efficient energy storage has never been greater. Enter Battery Energy Storage Systems (BESS)—the backbone of modern energy infrastructure, ensuring stability, resilience, and efficiency in power distribution. Record-breaking growth in storage In 2024, the US battery storage market saw record-breaking growth, with nearly 9.2 gigawatts (GW) of new capacity installed in late November alone, according to figures from S&P Global. But how is this supercharged leap into more stable power distribution fairing on a fundamental level? Despite an estimated capacity increase in the United States of a staggering 89% in 2024, according to U.S. Energy Information Administration (EIA), there is still more to be done to ensure this rapid rollout of these mainly Lithium-ion battery systems don’t pose a threat to workers, communities and the energy infrastructure. US battery storage market saw record-breaking growth, with nearly 9.2 GW of new capacity The global importance of battery energy storage systems BESS helps to bridge the gap by storing excess energy when supply is high BESS plays a critical role in balancing power supply and demand, especially as more countries transition to renewable energy sources like solar and wind. Typically, renewable energy sources are inherently intermittent—meaning they don’t produce electricity consistently throughout the day, due to a variety of uncontrollable environmental factors. BESS helps to bridge the gap by storing excess energy when supply is high and distributing it when demand peaks. While the idea of shoring up the energy infrastructure to greater withstand periods of intense strain is a laudable (and indeed, logical) one, they must ensure that in the haste to erect new BESS sites, they don’t overlook vital safety concerns. How BESS underpins growing support for the electrification In addition to grid stabilisation, BESS is instrumental in enhancing energy reliability. By storing surplus electricity, BESS ensures that power remains available even during blackouts or grid failures. It’s also an important element of reducing carbon emissions, as with stored renewable energy, reliance on fossil fuel-powered plants decreases, leading to a more sustainable energy mix. Let’s not forget how BESS underpins growing support for the electrification of transportation. As electric vehicles (EVs) gain traction, BESS can facilitate fast-charging infrastructure without overloading the grid. Prominence of BESS installations can mean greater risks Renewable energy producers added 10.5 GWh power to the energy network, according to market intelligence In February 2025 alone, renewable energy producers added 10.5 GWh capacity to the global energy network, according to market intelligence firm Rho Motion’s Battery Energy Stationary Storage Monthly Database. But while BESS sites are a useful way to prevent overloading the world’s power supplies—releasing stored energy at peak times when power generators come under greater strain—they come with challenges. One of the greatest concerns is thermal runaway, a dangerous chain reaction in which rising temperatures spread from one battery cell to another. Why advanced thermal imaging solutions are essential Without proper monitoring and early detection of potential failures, thermal runaway incidents can easily snowball into devastating fires. These fires spread rapidly, passing from unit to unit, causing sizable financial losses, environmental damage, and, of course, safety hazards—including releasing toxic substances such as hydrogen fluoride gas. Advanced thermal imaging solutions are becoming essential to keep BESS sites safe That’s why advanced thermal imaging solutions are becoming essential to keep BESS sites safe and operational. Fixed thermal cameras with advanced analytics are the go-to solution, as they can trigger alarms and suppression systems when temperatures pass a set threshold.
The slit lamp examination is one of the most important diagnostic techniques in ophthalmology. It enables a detailed examination of the anterior, middle and posterior segment of the eye. Ophthalmologists can use it to recognise the smallest changes, anomalies or damage. This procedure is used for the early detection and monitoring of the progression of eye diseases such as corneal injuries, eye infections, retinal detachment or macular degeneration. However, the eye with its fast movements is a challenging subject to photograph; motion blur and shaking are typical image errors. IDS USB3 Vision industrial camera OCULUS Optikgeräte GmbH develops instruments for eye diagnostics for ophthalmologists To facilitate diagnostics for ophthalmologists and opticians, improve the workflow and at the same time shorten examination times, fast and reliable slit lamp documentation systems are required. They must provide meaningful images and be designed to be user-friendly and ergonomic. The German company OCULUS Optikgeräte GmbH develops instruments for eye diagnostics for ophthalmologists, optometrists and opticians. Part of the extensive portfolio: one of the world's smallest and lightest image documentation systems for slit lamps. A powerful, high-resolution USB3 Vision industrial camera from IDS is integrated, especially for applications in medical technology and microscopy. Efficient system The OCULUS ImageCam®3 universal slit lamp image documentation system is not only intuitive and easy to use, but also sets high standards in digital slit lamp photography. This includes an outstanding field of view that enables highly precise diagnoses of the anterior, middle and posterior segments of the eye. The images are captured by a particularly low-light, high-performance IDS camera from the USB3 uEye+ CP family. OCULUS ImageCam® 3 OCULUS ImageCam® 3 makes this possible without any loss of quality "Only a fast camera delivers low-noise images in the difficult recording situations at the eye," explains Michael Moos, Product Manager at OCULUS, the choice of camera model. Another important requirement criterion is speed. "The advanced camera features enable continuous shooting at up to 60 frames per second. Among other things, these series recordings make it possible to record the eye during breaks in movement. The innovative frame-out-of-video function enables simple documentation of the entire examination process at the slit lamp, whereby the best quality individual images can then be selected for evaluation," says Michael Moos. The OCULUS ImageCam® 3 makes this possible without any loss of quality while minimising the time required. Powerful camera The IDS camera from the CP family is predestined for use in medical technology, as it offers extensive pixel pre-processing and has an internal 120 MB image memory for buffering image sequences. This enables a high data rate of 420 MByte/s, low CPU load and easy integration. The Sony Pregius IMX265 in the model used here is considered one of the best CMOS image sensors in the 3 MP class. The USB3 Vision industrial camera U3-3270CP Rev.2.2 with the 1/1.8" global shutter sensor thus achieves a resolution of 3.19 megapixels (2064 x 1544 px). IDS test camera functions The IDS camera from the CP family is predestined for use in medical technology "In this case, however, the image is scaled down using AOI in order to achieve a significantly higher frame rate," explains Phillip Schissler, Sales Manager Medical and Microscopy at IDS. OCULUS has integrated the camera with the IDS peak software development kit. "IDS peak allows users to test camera functions in detail and optimise them for your own applications," says the IDS Medical expert. Decisive selection criterion for the model However, the camera is not only recommended for medical technology and microscopy in terms of sensitivity, dynamic range and linearity. In addition to the required light intensity and speed, the size of the camera was also a decisive selection criterion for the model. At around 50 grams, the camera's small 29 x 29 x 29 millimetre magnesium housing is as light as it is robust, underlining its suitability for space-critical applications. Facilitated slit lamp diagnostics A beam splitter divides the light between the camera and the eyepiece of the slit lamp To deliver optimum diagnostic images, the system includes a high-quality beam splitter in addition to the camera. A beam splitter divides the light between the camera and the eyepiece of the slit lamp to simultaneously illuminate and view the eye, allowing a detailed examination of each eye segment. The beam splitter of the OCULUS system has a purely mechanical iris diaphragm that significantly increases the depth of field, regardless of the position of the pathological findings. It can also be adapted to all commercially available slit lamps. Highest quality standards in laboratory and diagnostics "The camera unit and the beam splitter are extremely small and light. This means in daily practice: It is barely noticeable, is very easy to attach and delivers images like no other in this size. This makes daily slit lamp diagnostics easier in the truest sense of the word," says the manufacturer. In terms of image quality, reliability and long-term availability, IDS stands for the highest quality standards in laboratory and diagnostics. Benefit from the image documentation system The slit lamp photos of the OCULUS ImageCam® 3 help factual documentation of eye states The slit lamp photos of the OCULUS ImageCam® 3 enable objective documentation of eye conditions in order to monitor the progress of diseases and compare treatments. Patients also benefit from the image documentation system. The visual references of the diagnosis created in this way help them to better understand their state of health and the doctors' treatment plan. The medical findings can be saved and archived accordingly. Outlook Innovative image processing systems such as OCULUS ImageCam®, which use powerful industrial cameras to deliver informative, high-contrast images with a high depth of field, help to improve diagnostic accuracy, efficiency and patient care in ophthalmology. Artificial intelligence (AI) is increasingly being integrated into the analysis of slit lamp images in order to automatically recognise diseases, support diagnostic decisions, improve the workflow for doctors and develop new treatment methods. Further development of technologies The company develops first-class instruments for eye diagnostics for this clearly defined group of users The company OCULUS Optikgeräte GmbH has been a partner for ophthalmologists, optometrists and opticians worldwide for 125 years. The company develops first-class instruments for eye diagnostics for this clearly defined group of users. The measure of all things is the high demands of customers and the continuous further development of technologies. Over 55% of OCULUS' sales are realised in foreign markets. OCULUS customers' service More than 400 employees work at the OCULUS headquarters. More than 60 % of them work in research and development, production and customer service. With 12 company-owned subsidiaries and more than 200 wholesalers in over 80 countries, OCULUS is at its customers' service around the globe. Founded in 1895, the family business is now jointly managed by the third and fourth generations.
Silverstein Properties, a pioneering real estate development, investment, and management firm, and its partners SwiftConnect, Allegion, and Kastle, announced they are live with resident keys in Apple Wallet for all apartment units at a multi-family housing location: Silverstein’s Silver Towers residential property at 606 West 42nd Street in New York City. Silverstein’s residential tenants now have an easy and secure way to add a resident key to Apple Wallet to access the apartment building and unlock their homes with a simple tap of an iPhone or Apple Watch—thus eliminating the need to use a traditional, physical key. Resident key in Apple Wallet The rollout of keys in Apple Wallet marks an important milestone for the U.S. real estate industry “We’re excited to make it easy for our residents to use their resident key in Apple Wallet to get into their buildings, homes, and common areas, which builds upon our previous offering to office tenants who use their employee badge in Apple Wallet to access offices and shared spaces including lounges, cafes, conference facilities, and yoga studios,” said Tal Kerret, President of Silverstein Properties. The rollout of keys in Apple Wallet marks an important milestone for the U.S. real estate industry, as property owners and employers reimagine the home and workplace experience for residents, office tenants, and employees. SwiftConnect’s success: Enhance security for residents “The Silver Towers project builds on SwiftConnect’s success in delivering seamless access via NFC wallets across the most iconic commercial real estate properties in New York and beyond,” said Matt Kopel, co-CEO and President of SwiftConnect. “We are excited to once again partner with Silverstein Properties and to extend our leadership into the multi-family housing market. Now, residents can easily access their personal spaces with their iPhone and Apple Watch, and property teams are able to enhance security for their residents—while also automating the process of managing keys and access.” Modern access-control solution SwiftConnect integrates with the Kastle Access Control platform; Schlage® mobile credentials To provide residential tenants with this experience, SwiftConnect integrates with the Kastle Access Control platform; Schlage® mobile credentials; and access control devices from Allegion™, as well as all other necessary business platforms and systems to create a unified digital network for hassle-free mobile access. “Kastle is thrilled to be a partner on the Silver Tower project, leveraging Kastle’s robust and proven access-control products to create a modern access-control solution that delivers an unparalleled experience both property owners and residents can trust,” said Haniel Lynn, CEO of Kastle. Schlage mobile-enabled wireless locks “We are excited to work with SwiftConnect and play an important role in Silver Tower's resident key in Apple Wallet multifamily housing deployment,” said Mark Casey, Vice President of National Electronic Sales of Allegion. “Resident Keys in Apple Wallet—alongside our Schlage mobile credentials and Schlage mobile-enabled wireless locks—not only enhances security and convenience for residents, but also exemplifies our commitment to driving the future of seamless access and smart apartment technology.” How seamless access works at Silver Towers Tenants can add their resident key to Apple Wallet after an initial set-up through Silverstein’s Inspire app, using SwiftConnect’s AccessCloud platform. Once added, tenants can hold their iPhone or Apple Watch near a door reader or smart lock for seamless access to the apartment building, their home, and shared fitness and amenity spaces. With Express Mode, tenants don’t need to wake or unlock their device to use their resident key—they can simply hold their device near a reader and go. If an iPhone needs to be charged, they can still use their device to access their apartment and amenity spaces with Power Reserve. Resident key in Apple Wallet takes full advantage of the privacy and security features already built into iPhone and Apple Watch. Data is encrypted and protected against tampering and theft, and Apple cannot see when and where a resident uses a home key in Wallet. Silverstein’s holistic customer experience program The new offering falls under Inspire, Silverstein’s holistic customer experience program that reshapes how, when, and where the company’s customers live and work. Inspire brings hospitality services, social and wellness programming, data-driven workplace technology, and a flexible workspace solution under one umbrella. Since its inception 67 years ago, Silverstein Properties has been recognised for driving innovative technology adoption to enhance the tenant experience. The company has built a reputation for developing exceptional projects, enhancing local communities, providing outstanding services to customers and partners, and driving innovation within the industry.
About a year and a half ago, Peter de Jong introduced Dahua to Fred Koks, General Manager of KITT Engineering. Since then, Dahua, KITT Engineering, and Ocean Outdoor have completed five joint projects. Follow-up appointments for the next two projects are already scheduled. Looking back "Let's see what happens" was Fred's reaction when introduced to Dahua. ''We evaluate our portfolio with suppliers every year,'' he explained. "We have to. So much is changing and new technology is developing incredibly fast. You have to keep up." He knows better than anyone how mobile the market is. "Among suppliers of LED screens, there is a constant battle for market position and new technology. We all know the big providers and the market pioneers. But it is not necessarily that they are also at the forefront of technology." Working in collaboration Erwin van Domselaar, Operations & Project Manager at Ocean Outdoor, says his company dares to blindly trust the expertise of Koks and his people when choosing a particular type of LED screen. "KITT Engineering is our technical supplier. They are very good at distinguishing good products from bad ones, and we trust them completely. When they have a product they see a future in, they discuss it with us to see if we can take on a project together with it." Shopping centre - Koperwiek In Dahua's case, that first project is a screen in a shopping centre called Koperwiek – an indoor shopping centre with more than a hundred fashion-related shops – located in Capelle aan den Ijssel. "That was a relatively small project," Erwin recalls. "The screen was not too big. But the initial learnings and experience with the screen were very good before we started. And the installation itself went off without a hitch. Exactly what we expected from this product." Shopping centre - Sterrenburg Soon, a second project was launched. This time in a shopping centre called Sterrenburg in Dordrecht. "Here, not everything went smoothly right away. Not regarding the screen, but its coincidence with the shopping centre's renovation. They had just finished." "All the walls had been neatly plastered and at that moment we asked if a new cable could be drawn. Fortunately, all this was eventually dealt with and solved in a very pleasant cooperation with the project developer, but it took some time." Pure craftsmanship The third and fourth projects are true masterpieces. In Hoofddorp, KITT Engineering installed a corner screen. "A unique screen for us," says Erwin. "It is the first screen that goes around a corner. It is half a meter that goes around the corner, fitting in super nicely with the surroundings." "On paper, a huge screen of forty square meters, but when you stand there, you don't notice it because it blends in so well with the surroundings. We are always looking for something new and surprising. And a screen that turns around the corner offers a lot of new possibilities. For example, in terms of 3D content." The screen turns around the corner Fred adds, "The screen doesn't just go around the corner, it goes around the corner seamlessly. KITT is always trying to bring novelties forward so we've had corner screens before. But that was in art projects and things like that where requirements are a lot lower." "In the process, we were able to try out various techniques and we also found out that the products we had at our disposal at that time were not one hundred percent ready." Cold corner "Then Dahua came up with a prototype, we were very pleased with the 'cold corner' as we call it. It is LED on LED, without a seam." To understand how clever this feat of engineering is, it's worth realising that the margin you have to make the image seamless is the space between two LEDs. Millimeter work, on a length of ten by five meters. Zuidplein shopping centre "The fourth project was placing a screen in the atrium of Zuidplein shopping centre in Rotterdam," Peter says. "The screen was placed against a glass elevator." "When you see that, [it is] not normal the way it came together. You don't see a cable or anything. Fantastic." Westfield Mall The fifth project collaboration between Dahua, KITT Engineering, and Ocean Outdoor is an LED display screen in Westfield Mall in the Netherlands. 24/7 remote system monitoring In addition to the regular LED screen and the driving system, a screen control and monitoring system was also developed to monitor the primary system at every point. “We want to see remotely how our assets in the country are doing," Fred explains. From the video player to dysfunctional LEDs, everything can be monitored remotely. For instance, it prevents the light intensity from being too high. Something that can have major consequences in outdoor advertising.
High-quality skin care products, developed using the latest technologies and manufactured sustainably: the international Babor Beauty Group is represented in more than 70 countries with its sought-after beauty brands. Research and development as well as production take place at the company's headquarters in Aachen, Germany, while filling and logistics are located just a few miles away in Eschweiler. Use of digital process In 2023, the family enterprise inaugurated a cutting-edge production facility here, known as the “Babor Beauty Cluster”. Around half a million jars, tubes, and ampoules are filled there every day, and logistics and shipping are also handled on-site. A special feature of the 60,000 sq.m plant is its extensive use of digital processes for working and operating as efficiently as possible. The fully networked complete solution from Bosch Building Technologies for safety, security, and building management makes a valuable contribution to this. Greater safety, security, comfort, and efficiency The smart solution integrates, among other things, fire protection, intrusion alarm, and access control systems The smart solution from Bosch Building Technologies was precisely tailored to meet the Babor Beauty Group’s requirements. It integrates, among other things, fire protection, intrusion alarm, and access control systems, as well as a video security solution for safeguarding the perimeter and premises. AI-based video security for fast, frictionless reception The AI-based video security solution analyses every captured image while using predefined rules and only triggers an alarm if at least one of them is met. This avoids false alarms, thus enabling even more effective security management. The solution from Bosch Building Technologies also includes a digital visitor management system that saves time with a self-registration function. It ensures fast, frictionless reception of guests and tradespeople and includes audit-proof archiving, which significantly eases the workload of Babor’s operating team. Smart truck and parking space management The moment a truck enters a predefined loading zone, an intelligent recognition function initiates video recording Another highlight is the smart truck and parking space management with license plate detection for user-friendly access control. Properly secured loads are also automatically documented. The moment a truck enters a predefined loading zone, an intelligent recognition function initiates video recording to provide comprehensive documentation of the process. Management system for control across sites The Babor Beauty Group’s technical operations and facility management team is responsible for both the company’s headquarters in Aachen and the production and logistics cluster in Eschweiler. The safety and security systems of both sites have therefore been integrated into the “Building Integration System 360” from Bosch Building Technologies. Centralised management platform This centralised management platform provides control of all building systems, enabling Babor Beauty Group's operations and management team to respond efficiently to security-related events. The solution is also flexibly scalable to facilitate the integration of future site extensions. Bosch Building Technologies will operate this complete solution for the next ten years within the scope of a build-operate-transfer model.


Round table discussion
As cutting-edge trends go, convergence has been around for at least two decades. The meaning has shifted over the years, and if anything, the idea of convergence has gotten even more aspirational. Unfortunately, the widespread use of the term has also paradoxically undermined its meaning and power. However, today's concept of convergence has matured to provide new levels of benefit for security professionals. We asked our Expert Panel Roundtable: How has the meaning of “convergence” evolved in the security market? How are systems today more converged than ever?
The security marketplace has its share of buzzwords, which are words or phrases that become popular and widely used in a specific industry. Buzzwords can be useful for conveying complex ideas quickly, but they can also be misused or misunderstood. Within a specific industry, such as security, buzzwords can create a sense of shared understanding and belonging. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the security industry?
By all accounts, technology development is moving at a rapid pace in today's markets, including the physical security industry. However, market uptake of the newest technologies may lag, whether because of a lack of clear communication or not enough education of potential customers. We asked this week's Expert Panel Roundtable: How can the industry do a better job of promoting emerging technologies in physical security environments?
Products


White papers

How biometrics are reshaping security in a connected world
Download
How to create a successful physical security roadmap
Download
Intelligent video security solutions
Download
11 advantages of a combined system for access control and intrusion
Download
12 questions to ask your access control provider
Download
Six things to look for when adding AI cameras to your operation
Download
10 step guide to staying ahead of emerging security threats
Download
Exploring new vertical markets for professional security systems
Download
5 steps to finding the right access control system for you
Download
Preparing your organisation with quality situational awareness
Download

Videos
Commercial security: Manufacturers & Suppliers

Artificial Intelligence in Security
Download
Elevating security through multi-sensing solutions and large-scale AI
Download
Open credential standards and the impact on physical access control
Download
Combining security and networking technologies for a unified solution
Download
What is a universal RFID reader?
Download