Network / IP security
inforcer, a pioneer in Microsoft-focused multi-tenant management for Managed Service Providers (MSPs), announced its selection as a Microsoft partner in enabling #IntuneforMSPs. The global initiative is designed to help MSPs consolidate tooling, reduce operational overhead, and accelerate the delivery of Microsoft 365 and Copilot services for their customers. As a Microsoft partner, inforcer enables MSPs to unlock the full value of Microsoft 365 through streamlined multi-tenant management, enh...
INTERSCHUTZ 2026 (1-6 June) is already shaping up to deliver a wealth of highlights. For the first time, the world’s major trade fair for firefighting, rescue, and civil protection will feature dedicated Rescue Robotics Days – the “DRZ Civil Protection Robotics Forum.” “By integrating this new format, INTERSCHUTZ underscores its role as a showcase for the latest technologies, products, and solutions in hazard prevention,” says Bernd Heinold, Head of INTERSCHU...
OPSWAT, a global pioneer in critical infrastructure protection (CIP), announced the opening of its international briefing centre and state-of-the-art cybersecurity lab in London, marking a significant expansion of its UK presence. The investment underscores OPSWAT’s commitment to protecting finance, defence, and operational technology in manufacturing and energy to strengthen the UK’s economic and national security. As Europe’s financial capital, London is both a centre...
DigiFlight and its subsidiary, Camelot Secure, a revolutionary cybersecurity company, announced that Loilette Loderick, Network Forensics Analyst, has been named a finalist for the prestigious TechWomen100’s Global Award for Achievement. This recognition celebrates her outstanding contributions to cybersecurity, including driving the successful remediation of thousands of vulnerabilities and her profound impact as a mentor and leader. The public can help Loilette secure the top honour f...
Hikvision has announced the integration of its AcuSeek AI-powered video analytics into two key platforms: HikCentral Professional and Hik-Connect 6. This breakthrough technology transforms the speed at which organisations and teams can search and retrieve video footage by enabling natural language queries, voice commands (voice input is available on Hik-Connect 6), image-based searches, and seamless integration across diverse security ecosystems. Advanced large-scale AI models AcuSeek...
Cohesity and Semperis announced a new product, Cohesity Identity Resilience, powered by Semperis, to defend enterprises’ critical identity infrastructure, including Microsoft Active Directory assets from cyberattacks. Now available for purchase from Cohesity, the solution is the strongest of its kind in the market, enabling companies to proactively harden defences, recover rapidly, and conduct comprehensive post-attack forensic investigations. Role within IT environments Active Director...
News
At a hearing on Sept. 16, 2025, Brett Feddersen, Chair of the Security Industry Association (SIA) Drone Security Subcommittee and vice president for strategy and government affairs at D-Fend Solutions, testified before members of Congress to discuss increasing risks from the misuse use of drones and give legislative recommendations for implementing a clear and comprehensive framework for the use of counterdrone technologies and operations across the United States. The hearing — “Unmanned and Unchecked: Confronting the Rising Threat of Malicious Drone Use in America” — focused on the growing threat posed by unauthorised and criminal use of uncrewed aircraft systems (UAS) in both domestic and international airspace. Rapid advancement of drone technology As drone technologies rapidly evolve and become ever more affordable and accessible, it is essential that policies limiting access around sensitive sites and events can be enforced and that drones used for legal and authorised purposes can be distinguished from those being used for criminal activity or potentially attacks. Along with the rapid advancement of drone technology, counter-UAS technologies have been evolving to meet these needs. Various detection technologies, such as radar, optical systems, radio communications and acoustics, allow trained security personnel to detect, track and identify drones in their airspace. Barriers to deploying counterdrone technology There are many proven ways of responding using technologies that federal agencies have fielded for many years Once a drone can be clearly identified as safe or a risk, there are many proven ways of responding using technologies federal agencies have fielded for many years; however, unnecessary barriers to deploying counterdrone technology more widely remain due to outdated laws on the books. “By taking decisive action now to modernise our laws, enhance our technological capabilities and strengthen the partnerships between all levels of government, we can ensure that our skies remain safe and that the promise of unmanned technology is never subverted by those who seek to do us harm,” said Feddersen in testimony submitted to the House Judiciary Subcommittee on Crime and Federal Government Surveillance. Awareness of drone activity Current authorities for federal agencies to detect and mitigate malicious drones are set to expire on Sept. 30, 2025, if Congress does not renew them; however, the current regime is fragmented across various federal agencies, creating confusion and potential gaps in response to incidents, especially for state and local law enforcement and trained security personnel protecting critical infrastructure. It is imperative that Congress not just renew but expand the current authorities for all federal agencies, state, local, tribal and territorial law enforcement and trained security professionals in a clear and cohesive framework to ensure that American communities can have complete air domain awareness of drone activity across the United States.
At GSX 2025, September 29 – October 1, Bosch Video Systems will introduce products and solutions designed to significantly enhance situational awareness for customers. Visitors to the GSX booth 1555 will experience a GenAI solution with reasoning capabilities, cameras with edge-based AI, and the latest version of BVMS software that helps users focus on events that need attention. Leveraging visual intelligence, the new offerings empower customers to anticipate potential incidents and quickly take measures to address adverse situations. An intelligent assistant powered by GenAI In the cloud, IVA Pro Context takes over to analyse the scene in depth, providing a second layer of intelligence By transforming simple user-created prompts into detailed, actionable instructions for monitoring specific tasks, IVA Pro Context acts as an intelligent assistant for customers. It uses a next-generation hybrid architecture that combines edge-based AI video analytics with the deep contextual understanding of cloud-based GenAI. At the edge, IVA Pro performs real-time object detection, activity recognition, and metadata generation delivering the first layer of semantic insight directly from the camera. In the cloud, IVA Pro Context takes over to analyse the scene in depth, providing a second layer of intelligence. This layer helps users understand what is happening and why it matters in a specific scenario to support proactive decision-making and problem-solving across complex environments. AI-enabled cameras for high security applications GSX booth visitors will also see an expanded portfolio of AI-enabled cameras designed to enhance surveillance and perimeter security. The DINION thermal 8100i camera combines advanced thermal imaging with built-in IVA Pro Perimeter to capture images of intruders who are moving, crawling, rolling, or camouflaged up to 1,923 feet away. Uncooled microbolometer/VOx thermal technology and large aperture optics capture even the slightest temperature changes in people and objects. When combined with IVA Pro Perimeter, the cameras provide the most reliable long-distance object detection, while minimising false positives to ensure operators receive alerts only when needed. Latest AUTODOME 7100i cameras feature The latest AUTODOME 7100i cameras feature built-in IVA Pro Buildings, IVA Pro Perimeter The latest AUTODOME 7100i cameras feature built-in IVA Pro Buildings, IVA Pro Perimeter, and the new IVA Pro Privacy. IVA Pro delivers reliable and precise object detection and classification for city surveillance, traffic monitoring, and long-distance perimeter detection. With IVA Pro Privacy, the cameras collect actionable insights, while ensuring anonymisation using semi-transparent masks for moving objects, faces, individuals, or vehicles. The cameras also support IVA Pro Traffic, IVA Pro Intelligent Tracking, and IVA Pro Appearance licences for intelligent monitoring of traffic and crowds. Smarter surveillance software for a seamless response BVMS 13.0 improves operators’ ability to assess a situation through interactive maps. Operators can see real-time movement of objects, such as people and vehicles, directly on a map, along with designated activity zones. This feature provides a live and intuitive overview of what is happening and where. Supporting early detection of unusual activity, BVMS transforms video into actionable intelligence empowering users to respond faster and seamlessly manage operations. For details on these solutions and more, visit the GSX booth 1555. Video Systems and Solutions, branded Bosch, are offered by the Keenfinity Group.
Ping Identity, a pioneer in securing digital identities for the world’s largest enterprises, announced a new AI framework designed to close the trust gap created by the rise of AI agents, along with AI-powered assistants that boost administrator productivity. This framework makes verifiable trust a foundation of every digital interaction – helping enterprises unlock frictionless convenience, strengthen governance, and open new channels for growth. Humans and AI agents "We can no longer implicitly trust what we see, hear, or receive digitally," said Peter Barker, Chief Product Officer at Ping Identity, adding "As AI becomes more embedded in the enterprise, humans and AI agents must work together seamlessly — with security and verification at the forefront." He continues, "Our AI solutions accelerate time to value by making interactions more convenient, ensuring continuous trust for a more resilient future." Identity for AI: Reducing risk, unlocking value Ping’s AI framework will ensure those agents can be trusted, managed, and scaled with confidence As businesses begin to rely on agents to serve consumers, Ping’s AI framework will ensure those agents can be trusted, managed, and scaled with confidence. The vision is to help enterprises reduce risk, maintain oversight, and unlock new opportunities by establishing the foundations of agent trust – including verifying identity, managing access, and governing agent lifecycles. Revenue potential of AI agents The framework will also support issuing unique credentials, distinguishing legitimate from malicious activity, and keeping humans in control with approval workflows. With these safeguards, enterprises can confidently capture the efficiency and revenue potential of AI agents – while preserving trust that digital interactions demand. AI for identity: Driving efficiencies for administrators AI-assistants are transforming industries by streamlining workflows and accelerating decision-making. Ping is bringing that same power to the Ping Identity Platform to help administrators navigate complex identity environments and make smarter, faster decisions. From contextual help and workflow troubleshooting to journey orchestration guidance, these assistants reduce friction and unlock new levels of efficiency. Where trust meets AI: The future of enterprise security As AI rapidly transforms the enterprise, identity is becoming the foundation of trust between humans and machines. By securing AI agents, simplifying access control, and streamlining workflows, Ping Identity is establishing identity as the foundation of enterprise trust in the AI era – ensuring innovation can scale without sacrificing security or experience.
ZBeta, a pioneer in delivering comprehensive physical security consulting services, has appointed Chris Deck as a Senior Technology Consultant. With nearly 30 years of experience in physical security system design, Chris brings deep technical expertise, proven leadership, and a global perspective to his new role. Prior roles of Chris At ZBeta, Chris partners with clients to develop and deliver integrated security infrastructures that tackle intricate challenges, exceed regulatory standards, and enhance operational performance. Chris has helped guide engineering teams, led large-scale project implementations across international markets He emphasises building security strategies that are tightly connected to organisational priorities — helping businesses protect critical assets, strengthen resilience, and create environments where businesses and security pioneers can operate with confidence and success. Over the course of his career, Chris has helped guide engineering teams, led large-scale project implementations across international markets, and provided strategic consulting for organisations in industries ranging from airports and hospitals to universities, manufacturing sites, and data centres. His track record of delivering innovative, reliable solutions has made him as a trusted advisor in the security industry. ZBeta’s innovative solutions and services “Chris’s depth of experience and consultative mindset make him an invaluable addition to our team,” said Andrew Corsaro, Vice President of Consulting Services, ZBeta. He adds, “His ability to blend technical know-how with strategic insight will further strengthen ZBeta’s ability to deliver innovative solutions and services that support our clients’ evolving needs.”
Milestone Systems will showcase the new XProtect Evidence Manager at two major industry events this fall: Global Security Exchange (GSX) 2025, Sept. 29-Oct. 1 in New Orleans (Booth 719), and the International Association of Chiefs of Police (IACP) Conference, Oct. 18-21 in Denver (Booth 4011). XProtect Evidence Manager XProtect Evidence Manager represents a compelling shift in digital evidence management systems, bringing Milestone's open platform philosophy to evidence and case handling. The system addresses the escalating costs and vendor lock-in challenges as it brings freedom to the end customers in choosing a digital evidence management solution they can customise to fit their needs. At this fall’s two major industry events in the US – GSX and IACP – security professionals will see firsthand how the XProtect Evidence Manager transforms evidence workflows through three key innovations: Workflow Efficiency: Streamlined case management that dramatically reduces the time needed to build and manage cases, allowing operators to work more effectively with comprehensive evidence from multiple sources like documents, reports, cell phone dumps, 911 calls – along with a strong search function in all assets. License-Free Sharing: Securely share evidence with stakeholders, including legal teams, investigators, and external partners, without requiring additional software licences or complex installations. Organisations can send password-protected links rather than burning DVDs or copying files to physical media. Storage Freedom: Complete flexibility to archive evidence on-premises, in the cloud, or across hybrid environments using any storage provider, including AWS, Azure, Wasabi, or existing infrastructure. How XProtect Evidence Manager breaks down the barriers? "By challenging entrenched market dynamics and introducing genuine freedom of choice, we're fundamentally disrupting how the industry approaches digital evidence," said Tim Palmquist, Vice President, Americas, Milestone Systems. He adds, "GSX and IACP provide the perfect platform to demonstrate how XProtect Evidence Manager breaks down the barriers that have kept evidence management locked in proprietary silos." Beyond law enforcement: A digital evidence management system While set with public safety in mind, XProtect Evidence Manager grows beyond law enforcement While developed with public safety in mind, XProtect Evidence Manager extends beyond law enforcement. Any organisation handling incidents that require evidence management, including airports, casinos, university campuses, corporate facilities, and healthcare systems, can benefit from this open platform approach. The XProtect Evidence Manager integrates seamlessly with XProtect video management software and analytics platforms like BriefCam to provide organisations with unprecedented freedom to build evidence management systems tailored to their specific needs without proprietary limitations. Complete portfolio enhancements Beyond the XProtect Evidence Manager, GSX and IACP attendees will experience the latest updates across Milestone's security technology portfolio. The new XProtect 2025 R2 features Access Control Visualisation on Smart Map, allowing operators to monitor doors, access points, card readers, and entry gates on the same interface as their cameras. When access-related events occur, door icons on the map automatically update, enabling operators to quickly identify and respond to security incidents. Experience the digital evidence manager at GSX 2025 Security professionals attending either event can experience live XProtect Evidence Manager demonstrations at: GSX 2025: Sept. 29-Oct. 1, New Orleans – Booth 719 IACP 2025: Oct. 18-21, Denver – Booth 4011 Demonstrations will show how a digital evidence management system, built with freedom of choice and flexibility in deployment, archiving, and integrations, helps organisations streamline evidence workflows, reduce costs, and increase operational efficiency.
Alfred International, a pioneer in smart lock solutions, will make its debut at GSX 2025 in the First Time Exhibitor Pavilion, Booth #3406, showcasing innovative access control solutions designed specifically for commercial, multi-family, and rental property markets. The company will highlight its expanding portfolio of professional-grade smart locks, led by the new DB1 Pro Smart Deadbolt and the industry-first Interconnect Kit. Key highlights DB1 Pro Smart Deadbolt: Alfred's most advanced smart deadbolt featuring triple access flexibility (PIN, mobile app, or key), support for up to 250 programmable PIN codes, enterprise-grade 128-bit encryption, and optional Z-Wave 800 Series Long Range connectivity. Interconnect Kit: Industry-first solution that transforms any Alfred smart deadbolt into a code-compliant interconnect lock with single-motion egress functionality, addressing critical needs in multi-family and commercial properties. ML2 Smart Mortise Lock: Patented retrofit solution designed to upgrade existing North American mortise locks without complete replacement, featuring Z-Wave Long Range connectivity, door position monitoring, building code compliance for both commercial and residential applications, and Wi-Charge Air Cord™ wireless power compatibility for maintenance-free operation. DB2S Smart Lock: Minimalist design with built-in RFID card reader, supporting up to 250 RFID cards and PIN codes, featuring rechargeable lithium-ion battery, multiple connectivity options including Z-Wave Long Range, and Wi-Charge Air Cord™ wireless power compatibility. Wireless Power Solutions: Alfred will showcase the world's only Wi-Charge Air Cord™ ready smart locks, offering wireless power capabilities that eliminate battery replacements and provide continuous, maintenance-free operation for unmatched convenience and energy efficiency. Commercial-grade security requirements "GSX represents an exciting opportunity for Alfred to connect directly with security professionals and property managers who understand the critical importance of reliable, scalable access control," said Brad Cook, Head of Product Integration at Alfred International. "We're thrilled to showcase solutions that bridge the gap between smart technology and commercial-grade security requirements. Our comprehensive portfolio, from the DB1 Pro and Interconnect Kit to our specialised mortise and RFID-enabled solutions, represents our commitment to serving markets that have been underserved by traditional smart lock offerings." "The DB1 Pro addresses the growing demand for versatile access management systems in professional markets, offering capacity for up to 250 programmable PIN codes and unlimited shareable Bluetooth keys. The Interconnect Kit solves a longstanding industry challenge by enabling any Alfred smart deadbolt to meet fire code compliance requirements while maintaining advanced smart access capabilities." Benefits of smart technology Together, these solutions address the evolving needs of modern property management and security professionals who require scalable, code-compliant access control without compromising the benefits of smart technology. The DB1 Pro delivers enterprise-grade functionality with capacity for up to 250 programmable PIN codes and unlimited shareable Bluetooth keys, while the Interconnect Kit solves a longstanding industry challenge by enabling any Alfred smart deadbolt to meet fire code compliance requirements. The ML2 Smart Mortise Lock provides an efficient retrofit path for upgrading legacy mortise installations commonly found in older commercial and multi-family properties, and the DB2S rounds out the portfolio with advanced RFID capabilities for enhanced access flexibility across diverse property types.


Expert commentary
As the world’s security landscape grows ever more complex, the need for a dynamic, comprehensive, and globally minded gathering of thought pioneers and practitioners has never been more pronounced. Enter the Global Security Exchange (GSX) 2025, hosted by ASIS International, a signature event representing seven decades of commitment to advancing the security profession. This year marks a historic milestone, as GSX and ASIS International both celebrate 70 years of shaping the future of security, with New Orleans serving as the perfect host city for this anniversary celebration; making the 2025 conference not only a convergence of expertise but a tribute to the security profession’s evolution and resilience. Setting the stage: A global gathering with a rich legacy GSX has established itself as a premier international forum, bringing together security professionals Since its inception, GSX has established itself as a premier international forum, bringing together security professionals from nearly 100 countries across the globe. This diversity is both a testament to the universal importance of security and a reflection of GSX’s core objective—unifying security and business professionals under a shared mission: to elevate the industry through education, collaboration, and innovation. GSX’s member-driven approach GSX’s programming is carefully curated each year through a rigorous speaker proposal submission process by security professionals for security professionals. ASIS International consults extensively with its global membership and prior attendees to assess shifting educational needs and emerging industry priorities. This member-driven approach ensures that GSX continually evolves, remaining attuned to the rapidly changing security environment and the real-world concerns of professionals in every corner of the globe. Programming highlights: Education at the core The agenda features more than 200 sessions, giving a masterclass in the most pressing and transformative topics The heart of GSX 2025 lies in its robust educational offerings. This year, the agenda features more than 200 sessions, presenting a masterclass in the most pressing and transformative topics facing the security sector today. Three standout speakers Ian Bremmer, Sol Rashidi, and General Paul Nakasone - luminaries in geopolitics, artificial intelligence, and cybersecurity respectively—will headline the event, offering insights that bridge current realities with future opportunities. These keynote presentations promise to set the tone for an event dedicated to thought leadership and actionable intelligence. GSX 2025’s challenges and emerging trends GSX 2025’s educational framework is structured around nine distinct track themes. Each track addresses a critical area of security management, capturing both enduring challenges and emerging trends: Crime: Delving into the latest strategies for preventing, detecting, and responding to criminal activity in a world where threats are increasingly complex and transnational. Digital Transformation: Exploring the integration of cutting-edge technologies into traditional security operations, including automation, analytics, and the digitalisation of security infrastructure. Information Security/Digital Risk: Addressing the ever-expanding need to protect data, intellectual property, and privacy against cyber threats and breaches. Law/Ethics: Focusing on the legal and ethical dilemmas that security professionals navigate, from compliance to responsible innovation. Managing Organisations: Providing strategies for effective leadership, organisational change, and operational excellence within security teams and entities. National Security: Examining the intersection of corporate, governmental, and civic security with a global lens on terrorism, conflict, and cross-border risks. Physical/Operational Security: Reinforcing the foundations of asset protection, site security, and crisis response through practical case studies and new methodologies. Professional Development: Empowering attendees to advance their careers through skills training, certifications, and leadership development. Risk Management: Mapping techniques to assess, mitigate, and manage risks in a broad array of operational contexts. Together, these tracks create a comprehensive curriculum spanning the complete landscape of contemporary security—from foundational principles to emerging innovations, from physical infrastructure to digital domains, all viewed through an authentically international lens. Innovation in action: Beyond the classroom One of the hallmarks of GSX 2025 is its commitment to making education not just informative, but immersive and accessible. Attendees will find a wealth of learning opportunities woven directly into the Exhibit Hall itself. No longer confined to traditional classrooms, education pulses throughout the venue, with exhibitors invited to showcase their latest insights and real-world solutions to the industry’s most urgent trends. With approximately 500 exhibitors represented, this expansion transforms the Exhibit Hall into a vibrant nexus of exchange, discovery, and hands-on engagement. GSX’s broader ethos No special gear needed, just bring your device and headphones to access live AI-powered captions To further enhance inclusivity and participation, GSX 2025 is pioneering the use of real-time translations through Wordly, for 35 select sessions over the course of this three-day event. This feature ensures that language barriers do not hinder the sharing of ideas, enabling attendees from around the world to fully engage with content and collaborate across borders. This digital transformation is emblematic of GSX’s broader ethos: embracing innovation and experimentation to create greater access to professional development tools within the security profession. No special gear needed, just bring your device and headphones to access live AI-powered captions and translations. Specialised zones and rapid learning GSX 2025's Exhibit Hall transforms into a vibrant ecosystem of discovery, where dedicated learning stages create immersive worlds of specialised knowledge. Journey through the School Security Zone to unlock cutting-edge solutions protecting our educational communities; experience the Organisational Resilience Zone where tomorrow's adaptive strategies come to life; and energise at the X Stage, where security pioneers and integrators accelerate their expertise through lightning-fast, game-changing insights that drive real-world impact. Signature events and unique experiences No GSX experience would be complete without opportunities to connect, celebrate, and unwind No GSX experience would be complete without opportunities to connect, celebrate, and unwind. This year, “ASIS Celebrates!” will take place at the historic National WWII Museum, providing a unique backdrop for networking, reflection, and community building. Beyond formal programming, GSX 2025 pays attention to the “little touches” that make a big difference—such as the Security SyncUP Lounge, where attendees can relax, recharge, and reconnect in a welcoming setting that fosters meaningful exchanges and new friendships. The future of security, united GSX 2025 stands as a testament to seventy years of progress, learning, and community in the global security profession. As participants converge from every corner of the world, the event offers not just a forum for knowledge-sharing, but a catalyst for innovation, collaboration, and progress. With an agenda shaped by its members, a program rich in content and diversity, and a spirit of experimentation and inclusion, GSX 2025 is poised to once again set the standard for what it means to protect, connect, and inspire in a rapidly changing world.
Where and how to store security camera footage usually depends on the scale of the video surveillance project, the way you are using to record the video and how long you want to keep the recordings. If there are only few IP cameras, say 2~3 IP cameras for example, and you don’t need to keep the recordings for the month, usually using SD card which is installed in the camera is enough. Video management software A VMS provides a unified platform to manage all cameras and record footage onto centralised local storage servers If there are more than four cameras, even up to 128 cameras, NVR or CVR become the practical choice for managing and storing recordings reliably. However, if there are hundreds or thousands cameras, which need to managed and recorded, in this way video management software with centralised recording storage becomes essential. A VMS provides a unified platform to manage all cameras and record footage onto centralised local storage servers. S3-compatible cloud platforms Critically, if the VMS supports the S3 object storage protocol, users gain the flexibility to store recordings on S3-compatible cloud platforms (public or private), offering significant hardware cost savings and enhanced scalability. For such demanding environments, selecting a VMS built on an open platform architecture is strongly advised, ensuring the system can expand infinitely to meet future project growth. Video surveillance management system Users can seamlessly add subordinate servers (or disk groups like IPSAN/NAS), disk arrays, and network bandwidth Take the video surveillance management system SVMS Pro as an example. Its foundation is an open 1+N stackable architecture, enabling unlimited expansion of recording storage servers. Users can seamlessly add subordinate servers (or disk groups like IPSAN/NAS), disk arrays, and network bandwidth. This achieves extended recording durations and boosted storage performance while maintaining system stability during sustained operation (assuming environmental requirements are met). Key architectural advantages Each centralised storage module based on a Linux OS, supports up to 200 front-end video channels per server. Its N+1 stackable expansion capability utilises a distributed architecture, forming clusters of storage servers. Scaling the project involves simply adding subordinate storage modules – no modifications to existing deployments are required. Seamless S3 object storage integration Furthermore, SVMS Pro features deep integration of the S3 object storage protocol Furthermore, SVMS Pro features deep integration of the S3 object storage protocol. This allows seamless connection to major public cloud services like Alibaba Cloud OSS, Tencent Cloud COS, and Amazon S3 cloud, as well as private S3-compatible object storage solutions. This integration delivers truly limitless capacity expansion, leveraging the inherent elasticity of the cloud to effortlessly accommodate petabyte-scale video growth. Dual insurance: Multi-layered data protection The critical value of security data comes with inherent risks; losing video footage can lead to immeasurable losses. To mitigate these risks comprehensively, SVMS Pro innovates with its "Local + Cloud" Dual-Backup mechanism, leveraging S3 features to build multiple security layers: Real-Time Dual-Writing: Recordings are first written to the local disk (acting as a cache buffer). Upon local persistence, data is simultaneously replicated to cloud-based S3 storage, guaranteeing instant failover if either node fails. Smart Hot/Cold Tiering: Frequently accessed ("hot") data remains on high-performance local storage, while historical footage is automatically archived to low-cost cloud tiers, optimising storage expenses. Cross-Regional Disaster Recovery: Utilising the multi-replica and cross-region replication features of carrier-grade S3 storage inherently protects against physical disasters like earthquakes or fires. Additionally, the platform ensures comprehensive data protection through integrity verification and encrypted transmission, safeguarding data integrity and confidentiality across its entire lifecycle – from storage and transmission to access. Conclusion In essence, selecting the optimal storage solution for security footage hinges on a fundamental understanding of scalability requirements, retention needs, and data protection imperatives. As surveillance deployments grow from a few cameras to enterprise-scale systems, the underlying architecture must evolve: Localised storage (SD cards/NVRs) suffices for limited scope and short retention. Centralised VMS platforms become essential for unified management at scale, with open, modular architectures providing critical future-proofing for expansion. S3 object storage integration represents a paradigm shift, decoupling storage capacity from physical hardware and enabling truly elastic, cost-efficient scaling – both on-premises and in the cloud. Ultimately, successful large-scale video surveillance storage relies on architecting for flexibility, embedding data protection intrinsically, and strategically leveraging object storage protocols to balance performance, cost, and resilience – principles essential for safeguarding critical security data now and in the future.
Currently, in security surveillance, the application of intelligent analysis technology has two approaches: front-end intelligence and back-end intelligence. Front-end intelligence Front-end intelligence is typically implemented within the video surveillance camera itself, integrating AI edge algorithms into the camera. Its advantages include: acquiring video in real-time and performing video analysis and feedback results immediately. Benefits No consumption of network resources like bandwidth; Offers real-time and highly efficient analysis; Obtains results immediately; relatively low cost; Highly flexible deployment. Disadvantages Due to the small physical size of cameras, hardware expansion space is limited. AI edge algorithms are often confined to a fixed few types, such as perimeter intrusion detection, tripwire, abandoned object detection, etc. It cannot flexibly load customised intelligent functions. The other approach is back-end intelligence, which usually requires installing an intelligent analysis server in the monitoring centre, integrating AI edge algorithms into this back-end server. Advantages: Hardware components can be flexibly expanded based on project requirements, thereby enhancing the server's overall analytical capability. It can also flexibly customise and load various intelligent algorithms according to project needs, capable of loading dozens or even hundreds of algorithms. Disadvantages: Because back-end intelligence requires first collecting the video stream from the front-end cameras in real-time before analysis, it consumes significant resources like bandwidth. It cannot provide immediate feedback of intelligent analysis results like front-end intelligence, lacks flexible deployment options, and the cost is very high. Development of intelligent analysis technology AI edge analytics boxes have emerged in the security surveillance market, defining another front-end With the development of intelligent analysis technology, AI edge analytics boxes have emerged in the security surveillance market, representing another front-end intelligence product. These boxes themselves can integrate dozens of AI edge algorithms, enriching the variety of AI algorithms available for front-end intelligent cameras while maintaining flexible deployment. Users can freely choose to deploy the box at the front-end (near the camera) or at the monitoring centre end to function as a small intelligent analysis server. Front-end (camera side) When deployed at the front-end (camera side): There is no need to dismantle existing video surveillance equipment. The real-time video stream from the original camera can be analysed directly within the AI box, and results are fed back. Since the camera and AI box are usually on the same network, this consumes minimal bandwidth resources, offering excellent real-time performance, timeliness, and efficiency. After the AI edge analytics box analyses the video, the results can be transmitted to the monitoring centre video management platform server via the internet, VPN dedicated line, 4G, 5G, etc., for storage, real-time display, and retrieval. Monitoring centre end When deployed at the monitoring centre end: The AI edge analytics box can function as a small video analysis server. Individual AI analytics boxes can be stacked to aggregate their analytical power, enabling the analysis of large volumes of video streams transmitted from the front-end. Since the cost of the AI edge analytics box itself is significantly lower than that of a full intelligent analysis server, using AI analytics boxes to implement intelligent solutions is often more economical and practical for small to medium-sized intelligent security surveillance projects. AI box application. AI box deployment application Edge AI Box does not require changes to existing video surveillance kit deployments Since the Edge AI Box does not require changes to existing video surveillance equipment deployments and only upgrades the original system to enable intelligent applications for existing monitoring devices, it can save significant labour costs associated with on-site deployment personnel. After the Edge AI Box and AI-powered cameras transmit intelligent analysis results to the platform, what can the platform do? Taking the video surveillance management platform SVMS Pro as an example. SVMS Pro video surveillance management software First SVMS Pro provides centralised management for multiple AI Boxes across diverse networks (LAN, WAN, VPN, 4G/5G). This flexibility enables users to deploy AI Boxes anywhere project requirements demand. With the AI Box and cameras connected to the SVMS Pro video surveillance management software, users can select video channels for analysis. The AI Box automatically analyses the chosen channels, transmits the results, and triggers alarms back to SVMS Pro. This seamless integration provides a unified platform for users to: Configure event settings Define alarm-triggering actions (such as alarm recording and alarm video pop-up). Alerts originating from the AI Box can trigger video recording via the SVMS Pro platform. These recordings are then stored long-term within the SVMS Pro platform. This capability resolves the limitation of the AI Box itself, which cannot store recordings for extended periods due to constraints imposed by its physical size. Search historical alarm events Manage active alarms View alarm statistics Additionally, SVMS Pro facilitates pushing the analysed results to third-party platforms via the network. SVMS Pro provide various AI intelligent solutions for different scenarios. AI intelligent solutions for different scenarios AI box + video surveillance management software SVMS Pro provides various AI intelligent solutions for different scenarios. For example: In smart construction site applications, AI box can provide not wearing safety helmet and reflective vest detection, fight detection, area intrusion detection, wandering detection, fire detection, etc., and display real-time results in real-time on SVMS Pro. Users can watch real-time video from different places, store the recordings, playback, get the real-time AI alarms, put the video on the video wall, etc., all in one platform. SVMS Pro and AI Edge Boxes Combined force of SVMS Pro and AI Edge Boxes presents a truly unified and intelligent solution In essence, the combined force of SVMS Pro and AI Edge Boxes presents a truly unified and intelligent solution, effectively overcoming the inherent limitations of both traditional front-end and back-end surveillance intelligence. The AI Edge Boxes deliver powerful, real-time analytics at the edge or as scalable micro-servers, offering unprecedented flexibility and cost-effectiveness – particularly vital for small to medium-sized projects. SVMS Pro elevates this capability by providing centralised command and control, seamlessly integrating diverse AI Boxes across any network to offer comprehensive video management. Advanced AI surveillance This synergy enables robust features like intelligent event configuration, alarm-triggered recording with long-term SVMS Pro storage, historical event search, and cross-platform integration, all within a single, cost-optimised platform. From construction sites to broader security networks, this unified solution transforms raw video into actionable intelligence, democratising advanced AI surveillance by making it accessible, practical, and economically viable. SVMS Pro and AI Edge Boxes together redefine intelligent video management for the modern era.
Security beat
Ibrahim Kassem, Everon’s new Chief Technology Officer (CTO), has been in the security industry since 1998 in various IT leadership roles. Most recently, he was Chief Information Officer for a video monitoring company. With most of his professional experience rooted in commercial security, Kassem has come to understand how customer needs and demands change with the evolving technology landscape. That understanding is a foundation for his new role at Everon, the national provider of commercial security, fire, and life safety solutions formerly known as ADT Commercial. Integrate AI to security operations “In this role, I am responsible for any customer-facing technology at Everon,” says Kassem. “Our primary focus is to provide a platform that will make it easy to do business with us. That platform will involve most of our solutions, including video monitoring which is the near-future focus for us.” As an integrator, Everon’s objective is to identify the best solutions. “We have partners that we leverage to help develop solutions for our customers that directly respond to their needs,” says Kassem. “For example, we partner with video camera providers to integrate AI to take security operations to the next level.” Demand for video monitoring Everon is looking to shift from reacting to events after they take place toward proactive monitoring Like most security operations, Everon is looking to shift from reacting to events after they take place toward proactive monitoring and preventing crimes as they are happening or deterring them from taking place. The ability to detect objects and behaviours is possible through AI. “Through this detection, we can respond accordingly – that’s why it’s at the forefront of our video monitoring efforts,” says Kassem. Every pursuit at Everon is in response to customer demand, and there is tremendous demand for video monitoring, says Kassem. Customer needs are the main philosophy behind the development and acquisition of technology, which also ensures that Everon is at the forefront of evolving with the security industry. Video-based security solutions “Right now, we’re noticing a trend towards video-based security solutions versus solely intrusion and guarding,” says Kassem. Everon seeks to strike a balance between “build versus buy.” The integrator prefers to buy when there is a proven product that will bring the most value. “We’re an integrator before we are a developer of technology,” says Kassem. “However, we are not shy about complementing a technology that we purchase with technology that we build if we don’t find the proper platform.” Video monitoring solutions and services Everon continues to evolve in step with ongoing trends, including smarter AI and analytics, smarter cameras Everon continues to evolve in step with ongoing trends, including smarter AI and analytics, smarter cameras, faster internet connectivity, and availability of wireless through 4G, LTE, and 5G connections. All of these are critical pieces of the video monitoring roadmap, says Kassem. “We aim to develop our video monitoring solutions and services to provide the best value to enterprises, reduce false alarms, and focus on relevant activities to save time and money,” he adds. “That’s what we’re looking forward to in the next couple of years.” Dependence on physical security Everon provides video monitoring services on a monthly basis, so the approach plays well with their recurring monthly revenue (RMR) model. Video monitoring is in great demand, and Everon is working towards being pioneers in that space, pushing to make it a major part of their future offerings. Everon is working towards being pioneer in that space, pushing to make it a major part of their future offerings “The dependence on physical security has gotten expensive, and many responding agencies no longer dispatch without video verification, which is the biggest technology challenge currently in the commercial security space,” says Kassem. “Video monitoring is the most direct, effective answer to that challenge, replacing costly, around-the-clock guarding services while also providing video verification for first responders and law enforcement agencies.” Portfolio of security solution offerings Everon roots all its pursuits in responding to the customer. Making the difference in Everon’s approach is an eagerness to listen, an awareness of industry trends and changes, and a full portfolio of security solution offerings. “Our technological roadmap is ambitious, innovative, and looks to the future through our thoughtful investments in this space, including through acquisitions of technology and top talent,” says Kassem. “All our efforts are supported by our teams of experts with decades of experience.”
The speed, scale and sophistication of today's safety threats can outpace human capacity to keep up. The implementation of artificial intelligence (AI) is essential to keep people safer and must be designed and deployed transparently. The complexity of today’s AI applications is expanding in physical security, with more AI models leveraging data to tune performance and using third-party application programming interfaces (APIs). In this context, it can be difficult to find clear, consolidated, transparent information about AI’s use in enterprise security technologies. How AI is used across the company’s technologies Motorola Solutions is taking a layered approach to help users easily understand how AI is used Motorola Solutions is taking a layered approach to help users easily understand how AI is used across the company’s technologies, starting at a high level with AI labels affixed to products, and getting more granular with structured information about AI testing, assessments and more. “We are aiming to provide clarity to the user and those they help protect to increase trust and transparency in AI innovation,” says Hamish Dobson, Corporate Vice President, Avigilon and Pelco Products, Motorola Solutions. Importance of AI transparency The AI labels, which have been compared to nutrition labels used on consumer products, are designed to be clear and easy-to-read at a glance. Each label explains the type of AI used, who owns the data processed, human controls, and the purpose behind the product’s specific application of AI. AI labels are comparable to nutrition labels used on consumer products. “We regularly seek input from external stakeholders – including customers, partners, consultants, investors, policymakers, and community members – on many aspects of our business,” says Dobson. “We briefed select customers and industry groups on our AI labels initiative and received positive feedback.” He continues: “Like us, customers and industry groups understand the importance of AI transparency and are looking for ways to clarify AI usage in public safety and enterprise security.” AI transparency efforts AI transparency efforts have taken on a variety of forms such as model cards, transparency notes Across industry, AI transparency efforts have taken on a variety of forms such as model cards, transparency notes and, in Motorola’s case, AI labels. The company pledges to continue to engage with industry participants on efforts to advance the overall pace, adoption, and maturity of responsible innovation initiatives across the industry, says Dobson. The AI labels help to increase dialogue and understanding of AI’s use in the security technologies that help to keep people safer. Motorola Solutions is looking to inform customers about how AI is being used to automate mundane tasks and prioritise information that may be critical to performing their roles. Motorola’s L6Q licence plate recognition For example, a business using Motorola’s L6Q licence plate recognition camera in its parking lot could view the AI label and see that AI is used to help recognise licence plate characteristics of vehicles within its view. The label would also help the customer understand that they maintain ownership and control of the data AI can process and can determine the data retention period. The label would also help the customer understand that they maintain ownership. What type of AI is being used AI outputs should have human oversight, and a user should understand the sources of data “By providing knowledge of where and what type of AI is being used, our customers can better understand what they are deploying, configure settings appropriately and inform their constituents,” says Dobson. AI-assisted experiences should be designed to be accountable and transparent, according to Motorola Solutions. AI outputs should have human oversight, and a user should understand the sources of data from which suggestions were drawn. AI labels highlight that the data AI can access is customer-owned and controlled, helping to increase confidence that AI outputs are based on that customer's specific data. Responsible and ethical use of technologies The AI label’s “first or third party model” section explains the source of the AI model. A first-party model is developed in-house by Motorola Solutions. A third-party model is developed outside of Motorola Solutions and made available by a third-party vendor; however, it may be customised by Motorola Solutions. MTAC is a multidisciplinary group that advises the company on the reliable and ethical use of technologies “This section aims to foster dialogue with our customers around Motorola Solutions’ role in testing, training, and refining the AI model or models used in our products,” says Dobson. Helping to propel the AI Label initiative, the Motorola Solutions Technology Advisory Committee (MTAC) is a multidisciplinary group that advises the company on the responsible and ethical use of technologies, including data and AI. Industry trends in technology’s responsible design MTAC continuously explores new ways to enhance trust with customers and the communities they serve, while helping to keep Motorola Solutions a step ahead of industry trends in technology’s responsible design, development, and use, according to the company. The MTAC “Blueprint” sets out the core principles that drive the approach. “We’re excited by the opportunity to continue to lead in this area through additional innovation, thought leadership, and stakeholder engagement,” says Dobson. Human-centered design New capabilities specifically augment human skills and capacity with the goal of helping humans Rather than replacing human decision-making, AI technologies will, in fact, augment it. Human-centered design is a core principle of the responsible technology “Blueprint” Motorola Solutions is developing. New capabilities specifically augment human skills and capacity with the goal of helping humans spend time on what matters most during a safety or security incident, applying their unique judgement, knowledge, and oversight in high-stakes environments. AI’s recommendations “We purposefully deploy AI to augment human focus, effort and performance,” says Dobson. “We design AI to maximise human strengths like judgement and reasoning and to adapt to changing roles, tasks, risk levels, and cognitive states while keeping AI outputs traceable and transparent, whereby the user can easily see, check and override AI’s recommendations.”
For all the emphasis on cloud systems and centralised servers at ISC West, a lot of innovation in security video systems is happening at the edge. New advancements inside video cameras are boosting capabilities at the edge, from advancements in processing power to artificial intelligence (AI) and machine learning (ML) algorithms that can now be deployed directly on the cameras or edge devices. Advancements in AI algorithms The progress of video systems becoming smarter at the edge is driven by the need for real-time insights, lower latency, bandwidth efficiency, enhanced privacy, and improved reliability. Advancements in edge computing hardware and AI algorithms are enabling a range of intelligent video applications across various industries, including physical security. Smarter functionality at the edge is a benefit of new computer systems-on-chips (SoCs) that are driving new heights of performance for today’s cameras. Axis Communications’ ARTPEC-9 Axis Communications’ new ARTPEC-9 SoC offers advanced video compression to reduce bandwidth Axis Communication’s new ARTPEC-9 system-on-chip (SoC) offers advanced video compression to reduce bandwidth and storage needs. With a low bitrate, the SoC helps deliver high-quality imaging with outstanding forensic detail. ARTPEC-9 also offers enhanced deep learning capabilities to allow users to leverage the latest video analytics and accelerate the implementation of AI technology. Axis maintains control over all aspects of the chip’s development to ensure high quality and cybersecurity. Among the benefits of ARTPEC-9 are better AI and deep learning, better image quality, better cybersecurity, and AV1 license-free video compression (see below). Hanwha Vision’s Wisenet 9 Hanwha Vision has launched Wisenet 9, its most advanced AI-powered System on Chip (SoC). Wisenet 9’s enhanced edge AI capabilities increase performance as the volume and complexity of security threats demand real-time, accurate analysis. By elevating edge-device performance, AI empowers systems to quickly analyse vast amounts of video data and discern crucial patterns and anomalies. A key differentiator driving Wisenet 9 is deployment of two Neural Processing Units (NPUs), which improve performance three-fold compared to Wisenet 7, the previous SoC generation. While one NPU handles image processing, the other focuses on object detection and advanced analytics. This dual NPU concept was introduced to ensure video quality and analytics have independent resources, thus preventing one function from impacting the performance of the other. The latest from Ambarella Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers Off the ISC West trade show floor in a nearby meeting room, semiconductor company Ambarella demonstrated how it will continue to push the envelope of what is possible with generative AI at the edge. Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers and recently achieved the milestone of 30 million cumulative units shipped. The demonstrations highlight Ambarella’s ability to enable scalable, high-performance reasoning and vision AI applications across its ultra-efficient, edge-inference CVflow 3.0 AI SoC portfolio. The company’s DeepSeek GenAI models run on three different price/performance levels of its SoC portfolio. In addition to advancements in GenAI processing at the edge, Ambarella integrates image processing, encoding and system-level functions into all its AI SoCs. New standard for video encoding: AV1 AV1 compression is a next-generation video coding technology that offers significant improvements in compression efficiency and video quality, especially at lower bitrates. Its royalty-free nature positions it as a crucial codec for the future of internet video. AV1 compression is a next-generation video coding technology. Axis Communication’s ARTPEC-9 chip now supports the AV1 video encoding standard. By embracing this standard, which is new to the physical security market although it was introduced in 2018, Axis sets the stage for AV1 compression to eventually become the industry standard, replacing H.264 and H.265. Network video transmission AV1 is an open-source, license-free coding format designed mainly for efficient network video transmission AV1 is an open-source, license-free coding format designed specifically for efficient network video transmission. It delivers high-quality video at low bitrates, reducing bandwidth consumption and storage costs. The codec was developed by the Alliance for Open Media (AOM), a nonprofit organisation founded in 2015 by Google, Intel, Amazon, Microsoft, Netflix, and Mozilla (among others), to provide open-standard, next-gen video coding technology. AV1 is ideal for cloud solutions—making streaming applications more robust, scalable, and capable of delivering real-time insights. Now the ARTPEC-9 chipset brings these benefits to the surveillance industry, and AV1 is currently supported by AXIS Camera Station. Providers of major video management solutions (VMS) such as Genetec and Milestone will be adding support for AV1, with further developments already underway. More intelligence at the edge Intelligence inside video cameras comes from the processing power and algorithms that enable them to perform tasks beyond simply capturing and recording images. This "intelligence" allows cameras to analyse the video stream in real-time, identify objects, detect events, and make decisions or provide alerts based on what they "see." New and improved SoCs are driving performance improvements at the edge. The increasing power of embedded processors and advancements in AI are continuously expanding the capabilities of intelligent video cameras.
Case studies
DeterTech, a pioneer in intruder detection and site security, is proud to announce its involvement with the latest series of DIY SOS: The Big Build Ireland, with the next episode due to air on Sunday 5th October on RTÉ One. One episode this series focuses on a life-changing project in Killinarden, Tallaght to adapt the home of nine-year-old Cayden and his family into a safe and accessible space that is tailored to their needs. Cayden was born with Arthrogryposis and is fully dependent on a wheelchair. The DIY SOS team stepped in after learning he was largely confined to the living room and needed to be carried upstairs, to and from his bedroom and to the toilet affecting his and his family’s qualities of life. Seeing so many volunteer tradespeople and suppliers come together to transform the terraced house was a truly special moment and makes for a spectacular reveal. DeterTech volunteers Members of DeterTech volunteered alongside more than 90 incredible tradespeople and suppliers Members of DeterTech volunteered alongside more than 90 incredible tradespeople and suppliers – from builders and electricians through to landscapers and gardeners. DeterTech also supplied the site security solutions necessary to protect people, tools and materials throughout the build. Speaking about the project Michael Kennedy, CFO, DeterTech, says: “We pride ourselves on bringing greater peace of mind to people and communities every day. Being there on reveal day to see the reaction is something I’ll never forget. I’d like to pay huge thanks to the entire DIY SOS family for involving us, and to all the volunteers, suppliers and organisers who worked so hard to create a better future for Cayden and his family.” DeterTech on board Helena Ryan, Managing Director Cooga Safety Services Group and Safety Supervisor for DIY SOS: The Big Build Ireland, adds: “One of the builds that features this series had 1,346 people on site, all of whom benefitted from the services DeterTech provides. DeterTech went above and beyond, did phenomenal work and I look forward to collaborating again in the future.” Orlagh Murphy of indiepics, the production company behind the show, concludes: “Having DeterTech on board has been a game-changer for our site safety and security. It gives our crew, contractors and volunteers the confidence they need to press on and transform the homes of our very deserving recipients.”
Located in the heart of California’s Central Valley, the Clovis Police Department serves the rapidly growing community of Clovis, California—a vibrant city situated just northeast of Fresno in Fresno County. Home to over 129,000 residents, Clovis is known for its strong community values, family-friendly neighbourhoods, and forward-thinking city leadership. Once a historic railroad town, Clovis has transformed into a modern, thriving municipality, consistently ranked among California’s best places to live. Real-time public safety technology Clovis maintains a lean public safety model, with about 130 sworn officers and a total department staff Despite its growth, Clovis maintains a lean public safety model, with approximately 130 sworn officers and a total department staff of about 230 employees. The department takes pride in its reputation for innovation, responsiveness, and community trust, often operating with fewer resources than larger metropolitan areas—yet delivering highly efficient and effective policing services. As the city continues to expand—adding new residential developments, commercial centres, and educational infrastructure—the need for advanced, real-time public safety technology has never been greater. Commitment to innovation and collaboration Recognising this, Clovis PD launched a bold initiative to build a Real Time Information Centre (RTIC)—a centralised hub designed to unify data from hundreds of surveillance cameras, licence plate readers, dispatch systems, drone feeds, and body-worn cameras. The department’s goal: enhance officer safety, accelerate response times, and support smarter decision-making across the entire public safety ecosystem. With a deep commitment to innovation and collaboration, the Clovis Police Department is setting the standard for what’s possible in modern law enforcement. The challenge For Clovis PD, the answer began with re-imagining how real-time data is gathered, visualised, and acted upon As technology rapidly reshapes the public safety landscape, Clovis PD faced a key question: How could a lean, high-performing department continue to meet the demands of a growing city while maintaining visibility, speed, and responsiveness across a diverse set of threats and situations? For Clovis PD, the answer began with re-imagining how real-time data is gathered, visualised, and acted upon. The department managed streams of mission-critical information from hundreds of surveillance cameras, LPRs, drones, dispatch systems, and body-worn cameras—but these assets were siloed and difficult to manage from a single point of control. Officers and dispatchers needed faster access to the right information at the right time, and leadership needed a way to centralise command operations without overwhelming staff or adding layers of complexity. Future of real-time collaboration What Clovis required was a unified platform that could make sense of multiple inputs, prioritise action, and scale as the city’s needs evolved. It had to be powerful, but also intuitive and accessible to analysts, officers, and supervisors alike. Most importantly, it needed to be built in a way that would support not just the workflows—but the future of real-time collaboration between departments, field units, city pioneers, and neighbouring agencies. That vision became the foundation for Clovis PD’s Real Time Information Centre (RTIC)—and set the stage for a successful deployment with RGB Spectrum and Wildfire Technology. The RGB Spectrum solution: Zio and XtendPoint in action At the heart of Clovis PD’s RTIC is RGB Spectrum’s Zio® AV-over-IP platform and XtendPoint™ KVM-over-IP system, providing the centralised control, flexible visualisation, and easy expandability the department needed. Powering the visual backbone The Zio 4000 video wall processor seamlessly drives a 14’ × 5.6’ Barco TruePix 0.9 mm pixel pitch LED video wall, displaying live video from across the city, interactive maps, drone feeds, dispatch data, and analytic tools. With 16 HDMI inputs and 12 outputs, Zio acts as the visual brain of the RTIC—integrating diverse content streams into a single pane of glass for maximum awareness. Operators can quickly shift between presets for specific scenarios (e.g., drone deployment, vehicle pursuit, or major traffic events). Video streams are not only viewable in the RTIC but are routed to other locations, including Dispatch, the Emergency Operations Centre (EOC), supervisor offices, and field units. Zio also supports future integration with remote web access portals—allowing city officials and council members to view situational data during major incidents. Control with confidence Clovis PD operators use RGB Spectrum’s XtendPoint KVM-over-IP to control and interact with up to eight systems Clovis PD operators use RGB Spectrum’s XtendPoint KVM-over-IP to control and interact with up to eight independent systems simultaneously using a single keyboard and mouse. Each operator station features two 43″ curved 4K displays, creating a panoramic, ergonomic environment that consolidates workflows and boosts productivity. “What sold me on RGB was how effortless it was for everyone to manipulate the screen and display what they needed—everyone had access, and it just worked,” Chief Fleming, Chief of Police, Clovis Police Department. This intuitive plug-and-play interface significantly reduces training time and enables officers, dispatchers, and analysts to work fluidly between tasks—whether monitoring cameras, controlling drones, running licence plates, or launching live body cam feeds. Future-ready architecture: Built to expand RGB Spectrum’s IP-based architecture offers the flexibility Clovis PD needs to grow and adapt over time: Drone Expansion: As Clovis expands its DFR (Drone as First Responder) program with multiple Brink drone launch sites, the system will support direct drone video integration into the video wall and remote routing to field teams and fire personnel. Body-Worn Cameras: Using Axon’s new Respond technology, live body cam video is now accessible in real time—giving analysts and dispatchers critical visual data, especially when officers can’t communicate via radio. Mobile Command & Trailers: RGB Spectrum’s architecture enables future integration with mobile assets like camera trailers and portable operations centres, giving Clovis PD the tools to bring their RTIC capabilities to festivals, parades, emergencies, and other offsite events. “We’re not just solving for today’s challenges—we’re setting the foundation for tomorrow’s public safety technology,” said Chief Fleming. The human factor: Designed for everyday use From video wall presets to XtendPoint switching, every component was designed with the operator in mind Despite the complexity of the system’s backend, Clovis PD has found it remarkably easy to use. From video wall presets to XtendPoint switching, every component was designed with the operator in mind. Chief Fleming notes that even with staff rotating through dispatch or new to the RTIC, most users are up and running with minimal training. As the department continues to grow its analytics and drone teams, they’re confident in scaling the system further—without retraining or major technical overhauls. Inter-agency collaboration & City Council engagement The new RTIC isn’t just benefiting Clovis PD—it’s elevating collaboration with fire, EMS, and neighbouring jurisdictions. Fire & EMS: Fire department command staff are integrated into the drone viewing platform, allowing them to view aerial video in real time from their phones or tablets. County-wide Visibility: Drone video and surveillance feeds are shareable with county partners via secure portals, enabling unified situational awareness across jurisdictions. City Council Access: The Zio platform can generate remote viewing links that allow City Council and department heads to access selected live data and camera feeds during major incidents or EOC activations—keeping decision-makers informed without disrupting operations. This capability has not only improved response times and safety but has also proven to be a valuable selling point for gaining city support. Community pioneers now have full visibility into how investments in public safety technology translate to real-world benefits. The role of Wildfire Technology: Seamless execution As the system integrator, Wildfire Technology delivered end-to-end project success. From vendor selection and budgeting to installation, training, and post-deployment support, Wildfire guided Clovis PD every step of the way. Created detailed project plans and electrical requirements Helped secure sole-source documentation to streamline approval Completed installation and commissioning in under 30 days Provided responsive support and firmware updates post-launch “Everything was clean, professional, and ahead of schedule. Their team cared about the space like it was their own. That kind of integrity is rare,” Chief Fleming. Forward-thinking technology deployment From integrated drone surveillance and mobile command capabilities to remote city leadership access Clovis PD’s RTIC is built not just for now—but for the evolving needs of tomorrow. From integrated drone surveillance and mobile command capabilities to remote city leadership access and future third-party analytics platforms, the department is thinking beyond traditional law enforcement. They’ve already begun planning to host open houses and agency tours, sharing their story to help others nationwide modernise their own public safety operations. “If something doesn’t work, we’ll say so. But RGB Spectrum’s real-time visualisation system is absolutely working for us—and we rely on it every day,” Chief Fleming. Final thoughts The partnership between RGB Spectrum and Wildfire Technology helped Clovis PD bring its vision of a fully connected, mission-critical Real Time Information Centre to life. The result is a scalable, ergonomic, and operator-friendly environment that strengthens officer safety, improves situational awareness, and increases the department’s ability to respond and adapt in real time. “This isn’t just about the tech—it’s about what the tech enables. And with RGB and Wildfire behind us, we’ve built something that’s going to serve Clovis for years to come,” Chief Fleming.
Powder bed-based laser melting of metals (PBF-LB/M) is a key technology in additive manufacturing that makes it possible to produce highly complex and high-performance metal components with customised material and functional properties. This technology is used in numerous industries - from aerospace and medical technology to the automotive industry - and is considered groundbreaking for the manufacturing of the future. Advances in process monitoring and control are crucial to further increasing the quality, reproducibility and efficiency of this manufacturing process. Imaging components of the research project A key challenge is the precise analysis of the layer-by-layer laser melting process, as this has a decisive influence on component quality. As part of research into increasing process stability and efficiency, students and scientific staff at the Laser Application Centre (LAZ) at Aalen University are conducting global, dynamic observation of the PBF-LB/M process. The imaging components of the research project are two high-performance USB3 industrial cameras from IDS In the context of high-speed process control with temperature feedback, phenomena such as spatter and smoke formation, solidification behaviour, and the safe movement of mechanical components during additive manufacturing are investigated. This is supplemented by a high-resolution, static analysis of the remelted component layer geometries and precise detection of potential defects in the powder layers in order to be able to draw well-founded conclusions about the resulting component quality. The imaging components of the research project are two high-performance USB3 industrial cameras from IDS Imaging Development Systems. Two IDS industrial cameras provide the necessary image information The two different tasks require different camera models. "We use a model from the USB3 uEye CP camera family for the global, dynamic observation of the PBF-LB/M process, such as splashes or the formation of smoke." "A USB3 uEye camera from the SE series is used for the static, high-resolution identification of anomalies within the powder layers and in the remelted component layer geometries," explains David Kolb, research associate at the LAZ. Requirements for the camera systems The requirements for the two IDS camera systems are different due to their areas of application in the PBF-LB/M The requirements for the two IDS camera systems are different due to their areas of application in the PBF-LB/M. "Since powder bed-based laser beam melting of metals is a highly dynamic additive manufacturing process in which the component is generated layer by layer, the following features were particularly important for global, dynamic monitoring: The camera must offer a resolution of more than 1000 x 1000 pixels and a frame rate of more than 100 fps, cover an image field of at least 100 mm x 100 mm and have a trigger port for video recordings," says David Kolb, explaining the choice of camera model. The selected U3-3040CP-C-HQ Rev.2.2 enables excellent image quality even in low light or when the camera should take pictures of fast-moving objects. The integrated IMX273 global shutter CMOS sensor from Sony's Pregius range scores particularly well for its image quality, high sensitivity and wide dynamic range. With a resolution of 1.58 megapixels (1456 x 1088 px), it achieves a frame rate of 251 frames per second - ideal for detailed video and image analyses of dynamic processes. Layer-by-layer PBF-LB/M process The video sequence/image shows the layer-by-layer PBF-LB/M process with different laser parameters, recorded with the U3-3040CP-C-HQ Rev.2.2 from IDS using the IDS peak software. "Depending on the setting of the industrial camera, various process properties such as material evaporation or the quantity and direction of splashes during the PBF-LB/M can be observed and quantified," says David Kolb, describing the application. "The knowledge gained from this provides us with important information to understand the laser-material interactions of the additive manufacturing process in greater depth and to be able to customise the manufacturing parameters depending on the material or, for example, the component geometry." New types of soft magnetic components The stator half-shell made of FeSi6.5, based on this, enables ideal adaption to the needs of transverse flux machines To determine the process parameters, cube-shaped components were additively manufactured and the global manufacturing process was analysed using the USB3 uEye CP camera. This made it possible to identify optimum laser parameters with which new types of soft magnetic components for more efficient electric motors of the future can be produced from the difficult-to-process iron-silicon alloy with 6.5 wt.% silicon (FeSi6.5). The stator half-shell made of FeSi6.5 based on this enables ideal adaptation to the special requirements of transverse flux machines thanks to its optimised, three-dimensional magnetic flux guidance. Use of additive manufacturing technologies The high electrical resistance of the material and the design freedom of the PBF-LB/M allow a reduction in eddy current losses, increased power density and the integration of additional functions such as cooling structures. Both the complex geometry and the brittle, soft magnetic material FeSi6.5 are almost impossible to produce or process using conventional manufacturing processes and require the use of additive manufacturing technologies. BSI technology The sensor must be able to detect geometric features below 40 µm in order to identify defects in the layers For static, high-resolution observation of powder layers or component layer geometries, on the other hand, the following camera properties are required in particular - in addition to a trigger port for single image recording: The sensor must be able to detect geometric features below 40 µm in order to identify defects in the layers and offer an image field of at least 100 mm × 100 mm and an image ratio that is as square as possible (1:1). This is exactly what the 20.36 megapixel (4512 x 4512 px) industrial camera U3-3990SE Rev.1.2 delivers. With the IMX541, it has a high-performance, extremely high-resolution, large-format 1.1" CMOS sensor from Sony's Pregius S series. The BSI technology ("Back Side Illuminated") used enables smaller pixels (2.74 µm) and a higher resolution, as well as improved quantum efficiency and sensitivity. User-friendly and flexibly integrable IDS cameras "Thanks to the particularly user-friendly and flexibly integrable IDS cameras, the necessary adjustments to the test setup could be implemented quickly and easily so that the USB3 uEye SE can be positioned specifically at a defined angle," explains David Kolb. The near-vertical observation of the individual powder component geometry layers will provide valuable insights The near-vertical observation of the individual powder component geometry layers will provide valuable insights into component quality and potential manufacturing defects once the final adjustments have been completed. In this way, crucial information about the properties of additively manufactured components can be obtained and used specifically to optimise the manufacturing processes. Outlook Research in the field of PBF-LB/M is essential for the development and processing of new material alloys and the production of performance-enhancing, sometimes multi-material component geometries. An in-depth understanding of the process helps to minimise defects and realise innovative designs that would not be possible using conventional production methods. The IDS cameras provide in-depth insights into the PBF-LB/M and thus make a valuable contribution to research, development and transfer (R&D&T) - for example, in the processing of new material alloys or the production of complex, application-optimised (multi-material) components. In future, artificial intelligence will be used to automatically analyse the dynamic and static observation of the PBF-LB/M. The aim is to gain an even better understanding of the highly dynamic laser-material interaction - such as the number and trajectory of spatter and the formation of process errors - and to further improve the additive manufacturing process in terms of resource efficiency and sustainability.
ZeroEyes, the creators of the first AI-based gun detection video analytics platform to earn the full U.S. Department of Homeland Security SAFETY Act Designation, and Singlewire Software, the pioneer in solutions that help keep people safe and informed, announced a new partnership to improve emergency communications in schools. As part of this collaboration, Glassboro Public School District (GPSD) in New Jersey has become the first joint customer to deploy an integrated solution combining ZeroEyes’ AI gun detection with Singlewire’s InformaCast incident management software. Real-time gun detection alerts This integration supports faster, more coordinated emergency responses The integration enables real-time gun detection alerts from ZeroEyes to automatically trigger Singlewire’s InformaCast system, which can instantly distribute customised alerts across a wide range of devices. These include digital signage, PA systems, strobe lights, desk phones and more, all reaching targeted audiences. This integration supports faster, more coordinated emergency responses and ensures critical information reaches those who need it most. Hosting emergency training exercises GPSD is a Pre-K through 12 public school district located in Glassboro, New Jersey, serving approximately 1,950 students and 350 staff members across four schools and two district buildings. With a diverse student population and deep partnerships with neighboring Rowan University, the district offers specialised academics in Performing Arts, STEM, Biomedical Studies, and Business Leadership. The district prioritises safety and mental health, using tools like Senso and Gaggle to flag concerning keywords in emails, as well as hosting emergency training exercises with local law enforcement. ZeroEyes’ capabilities “Our district was immediately impressed upon seeing a demonstration of ZeroEyes’ capabilities, and recognised that integrating it with our Singlewire software would significantly enhance our security system,” said Craig Stephenson, assistant superintendent at GPSD. “The safety of our students and staff is our top priority, and this integration adds a critical new layer of protection.” Based in Madison, Wisconsin, Singlewire Software is a major provider of mass notification systems for schools, healthcare, government, and enterprise organisations. InformaCast platform Its InformaCast platform enables organisations to communicate quickly and effectively during emergencies and daily operations. Singlewire serves more than 2,000 K-12 customers across all 50 states and is widely trusted for its reliability and flexibility in high-stakes environments. “Shootings typically last only five to seven minutes, so every second counts,” said Terry Swanson, president and CEO of Singlewire Software. “By integrating ZeroEyes’ AI-based detection with our mass notification platform, we help schools take fast, decisive action. Our goal is to keep people safe and informed everywhere, every time, and this partnership strengthens that mission.” AI gun detection AI gun detection and intelligent situational awareness software layers onto existing digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to first responders and school staff as quickly as 3 to 5 seconds from detection. Integration with Singlewire “This integration with Singlewire is a powerful example of how two technologies can complement each other to enhance school safety,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “While ZeroEyes provides the critical early detection of a potential threat, Singlewire enables that intelligence to be instantly delivered across a wide range of devices and formats.” “It’s a mutually beneficial partnership that simplifies emergency response and helps protect lives. We’re proud to see this technology in action with Glassboro Public Schools and look forward to bringing it to more districts in the future.”
Garden Spot Communities, a continuing care retirement facility in New Holland, Pennsylvania, has grown a comprehensive video security solution over nearly 20 years that maintains the facility's welcoming, open-door philosophy, while ensuring resident safety. The community operates public restaurants and welcomes neighbours across its 230-acre campus, while securing 1,100 residents using Milestone Systems XProtect video management software (VMS). Technology partnership Garden Spot maintains an intentionally open campus that includes a Starbucks cafe open to the public Garden Spot Communities, along with their Lancaster-based integrator partner App-Techs, have continually expanded their Milestone XProtect VMS to cover the unique needs of their nearly 1.4 million square foot facility, which accommodates diverse camera brands and technologies. Unlike traditional senior living facilities that rely on gates and fences, Garden Spot maintains an intentionally open campus that includes a Starbucks cafe open to the public. The system includes wireless links extending coverage to perimeter areas up to 300 metres from main buildings, supporting the facility's philosophy of openness rather than barriers. Eyes across campus "Having a comprehensive video system is key to our operating such a large enterprise," said Steve Muller, Chief Operating Officer at Garden Spot Communities. He adds, "Garden Spot's core philosophy from the very beginning is that what we don't spend on fences and gates, we can spend on cameras. We need to have eyes on what's happening across campus, and with a system like Milestone, we can do exactly that." Operational benefits The video system serves as an integral operational tool, enabling staff to respond quickly to emergencies The video system serves as an integral operational tool, enabling staff to respond quickly to emergencies and maintain situational awareness across the campus. The technology provides enhanced safety, improved operational efficiency, and valuable peace of mind for staff and families. Staff access video feeds from security workstations, office desktops, and mobile phones for timely response to situations. The system proves most valuable when a resident is missing from their normal routine, with staff turning to video as their first investigative step. In one case, cameras enabled rapid response to locate a gentleman with dementia who had left campus, preventing potential harm. Seamless monitoring Beyond security, the system supports operational needs, including weather monitoring during Pennsylvania winters and remote monitoring of the facility's aeroponic greenhouse. The system operates across multiple Dell servers with centralised management, enabling seamless monitoring from a single interface. App-Techs' Health Utility Monitor software provides telemetry data every five minutes, enabling proactive maintenance that resolves issues before staff notice them. Open platform The open platform approach provides flexibility in camera selection rather than locking the facility into a single manufacturer. This flexibility enabled system evolution from a four-camera installation in 2006 to today's comprehensive 110-camera network. The partnership with App-Techs extends beyond installation to ongoing system health monitoring, ensuring consistent performance while allowing Garden Spot staff to focus on operations rather than technical troubleshooting. Garden Spot's experience demonstrates how open platform video technology can support organisational values, while providing essential operational capabilities. The system has adapted and grown alongside facility needs, proving that investments in scalable technology provide lasting value for senior living communities seeking to balance security with community openness.
Keihan Bus, established in 1922, is a long-standing public transportation provider with over 100 years of service in Japan. Its network spans Osaka, Kyoto, and Shiga prefectures, offering a wide range of safe and reliable transportation services and carrying over 10,000 passengers daily. The company also operates routes that serve major tourist destinations such as Kiyomizu-dera in Kyoto and Dotonbori in Osaka, as well as direct access to the venue of Expo 2025 Osaka, Kansai, Japan—a major international event expected to attract millions of visitors from around the world. Through these services, Keihan Bus contributes to both regional mobility and Japan’s broader efforts to welcome global travellers. Among all its depots, the Hirakata Depot manages the largest fleet and is regarded as one of the company’s key operational hubs. To enhance manpower dispatch efficiency in its bus depot, Keihan Bus implemented VIVOTEK’s intelligent traffic solution to improve operational workflows. Challenges Hirakata Depot expanded its parking space and increased its fleet to around 120 vehicles As part of its relocation on March 23, 2025, the Hirakata Depot expanded its parking space and increased its fleet to around 120 vehicles, underscoring the need for a more efficient vehicle management system. Even before the move, manually verifying each bus’s parking location was labour-intensive and inefficient. Staff had to physically check where each bus was parked and update a whiteboard using numbered magnets to represent each bus. Compounding the issue, new regulations introduced in April 2024 limiting driver work hours further exacerbated the shortage of bus drivers. This heightened the urgency of reducing operational workloads through digital transformation. To meet these challenges, Keihan Bus aimed to modernise its analog parking management process and streamline daily operations, especially at its busiest depot. Solutions LPR cameras were installed throughout the depot to capture and recognise the licence plates of buses in real time To achieve operational efficiency, Keihan Bus, in close collaboration with IBS Japan and Mobile Create, implemented a Bus Depot Monitoring System powered by VIVOTEK’s licence plate recognition (LPR) technology, using VIVOTEK’s IP9165-LPR-v2 JPN 12–40mm cameras. LPR cameras were installed throughout the depot to capture and recognise licence plates of buses in real time during entry, exit, and parking. The captured data is processed to identify the latest detected location of each vehicle, and the parking information is displayed on digital signage. This allows drivers to quickly find their assigned bus before beginning their shift, reducing unnecessary delays and confusion. By replacing this analog system with digital monitoring, the company has significantly improved its efficiency and reduced the workload for both drivers and depot staff. Benefit According to Keihan Bus, choosing VIVOTEK’s solution has brought multiple advantages: Reliable Performance: The camera evaluation results were highly positive, with excellent recognition accuracy that inspired confidence in the system’s reliability. VIVOTEK’s WDR Pro technology effectively reduces the impact of harsh backlighting, such as strong afternoon sunlight, while its SNV (Supreme Night Visibility) ensures that licence plates remain clearly visible even in low-light conditions. User-Friendly Setup: Compared to other options, VIVOTEK's system offered a more intuitive setup process. Strong Local Support: The local support provided by IBS Japan, including on-site assistance, was more responsive and comprehensive than that of other vendors. System Compatibility: The data transfer format was compatible with the depot’s existing infrastructure, allowing for a smoother integration process. Customer feedback “After implementing the system, we monitored its performance and fine-tuned the settings to fit our operational environment. As a result, the accuracy has remained consistently high and stable over time. Knowing that long-term maintenance support is available makes us feel secure,” Keihan Bus Hirakata Depot. “This was our first experience working on a solution-based project, and we started from scratch, feeling our way through. Thanks to the strong support from IBS Japan, we were able to successfully take off.” “Gaining hands-on experience with a camera-based solution has become a major source of confidence for us. Although this was our first time implementing an LPR solution, having this successful case now gives us the confidence to apply and propose it for future projects as well,” Mobile Create Co., Ltd.


Products


Round table discussion
Students deserve a safe and positive environment where they can learn and thrive. Teachers and administrators should be able to focus on their primary role of educating students because they feel supported and protected by a comprehensive security plan. Staff require a clear protocol for responding to emergencies. And parents deserve peace of mind that their children are safe during the school day. One of the tools for safer schools is physical security technology. We asked our Expert Panel Roundtable: How can physical security systems make schools safer?
Physical security and cybersecurity are deeply intertwined in today’s systems. A weakness in one realm can quickly lead to a breach in the other, and vice versa. However, given the symbiotic relationship, why do physical security systems so often fall short when it comes to cybersecurity protection? We asked our Expert Panel Roundtable: Why does cybersecurity continue to be a weak link for physical security systems?
Ethics can impact a company's reputation, profitability, and overall sustainability. Ethics extend beyond the law to encompass doing the "right thing" even when it is not legally mandated. As technologies such as artificial intelligence and data sharing continue to impact the physical security industry, a focus on ethics today is timelier than ever. A commitment to moral principles is critical to build a successful, sustainable, and respected industry. We asked our Expert Panel Roundtable: What is the role of ethics when deploying emerging technologies in physical security?
White papers

Combining security and networking technologies for a unified solution
Download
Open credential standards and the impact on physical access control
Download
What is a universal RFID reader?
Download
System design considerations to optimize physical access control
Download
Milestone cloud deployment guide
Download
Maximising enterprise security systems in the cloud
Download
The 4 pillars of AI in managing high-stakes critical events
Download
The power of integration in physical security systems
Download
Using artificial intelligence (AI) to automate physical security systems
Download
A modern guide to data loss prevention
Download
2025 Trends in video surveillance
Download
Maximising security and performance
Download
Palm vein recognition
Download
Physical access control
Download
The key to unlocking K12 school safety grants
Download


Artificial Intelligence in Security
Download
Elevating security through multi-sensing solutions and large-scale AI
Download
Open credential standards and the impact on physical access control
Download
Combining security and networking technologies for a unified solution
Download
What is a universal RFID reader?
Download