Physical security
The sheer volume of smart locks, lock management systems, connected readers and an increasing array of Internet of Things (IoT) devices complicates the issuance and management of certificates that are foundational to establishing trust between a device and the credential used to access it. That’s why more companies are turning to PKIaaS for IoT devices. But there’s another reason to consider PKIaaS: the rise of quantum computing. Secure digital communications Gartner predict...
ZBeta, a pioneer in delivering comprehensive physical security consulting services, has appointed Chris Deck as a Senior Technology Consultant. With nearly 30 years of experience in physical security system design, Chris brings deep technical expertise, proven leadership, and a global perspective to his new role. Prior roles of Chris At ZBeta, Chris partners with clients to develop and deliver integrated security infrastructures that tackle intricate challenges, exceed regulatory standar...
Verkada, a pioneer in AI-powered physical security technology, announced that Mark Anderson has joined its Board of Directors. Anderson brings more than 25 years of technology leadership in high-growth public companies to Verkada’s Board. He currently serves on the board of 1Password. In 2024, Mark stepped off of Cloudflare’s Board to become their President of Revenue. His career highlights include: as CEO of Alteryx, pioneering the company to $1 billion in revenue, navigating...
At GSX booth #3307, Acoem, a pioneer in advanced physical security solutions, will showcase important updates to its ATD gunshot detection technology, and a new on-premises option for its Cadence software, reinforcing its position as a pioneer in edge-based acoustic AI gunshot detection. Unlike legacy systems that depend on multiple sensors or remote servers, the Acoem ATD System conducts detection and classification directly on the edge. First responders and security teams PTZ...
Allied Universal®, the world’s pioneering security and facility services company, is proud to celebrate the country’s security professionals during the 2025 National Security Officer Appreciation Week beginning through September 21. Thank security professionals “All of us at Allied Universal want to take this opportunity to thank security professionals around the world and continue to celebrate them every day,” said Steve Jones, global chairman and CEO of Alli...
Matrix Comsec, a major innovator in Security and Telecom solutions, announced its strategic participation at Intersec Saudi Arabia 2025, the Kingdom's premier security, safety, and fire protection exhibition. The event will serve as the official launchpad for Matrix’s next-generation facial recognition device. We will also be displaying surveillance solutions and access control systems, aligning with Saudi Arabia’s rapid security market growth and Vision 2030’s amb...
News
ASIS International's sold-out 2025 Latin America & Caribbean Integral Security Congress concluded in Mexico City, bringing together 521 attendees from 21 countries for two days of intensive programming focused on the evolving security landscape across Latin America and the Caribbean region. Organised by ASIS Mexico Chapter, the August 25-26 congress featured comprehensive sessions addressing critical regional security challenges, from emerging AI applications in physical security to the complexities of mass event protection ahead of Mexico's hosting of the 2026 World Cup. The sold-out event, which welcomed 521 attendees, was supported by 28 sponsorships and featured 14 exhibition booths, demonstrating the strong commitment of the regional security community to professional development and industry advancement. Keynote presentations 2025 ASIS International President Joe Olivarez, Jr., MBA, and CEO William Tenney delivered presentations highlighting ASIS International's 70th anniversary milestone and the organisation's strategic imperatives for serving the global security community. Their participation underscored ASIS International's commitment to strengthening its presence and impact across Latin America and the Caribbean. The congress featured an extensive agenda covering both traditional and emerging security challenges. Key sessions included: Global outlook and regional security impacts with Dr. Mauricio Meschoulam, Mexican professor of International Relations, an analyst with a specialisation in terrorism, mediation and peace. Private security's role in new global conflicts and AI implementation strategies Terrorist cartels and emerging compliance challenges Executive protection and crisis evacuation protocols FBI perspectives on the fentanyl crisis affecting the region Women's leadership in redefining security careers AI's impact on supply chain security Business solutions presentations Attendees benefited from business solutions presentations featuring innovative industry solutions Beyond the main programme, attendees benefited from business solutions presentations featuring innovative industry solutions for critical infrastructure, executive mobility, and smart cities development. The event also featured social responsibility sessions addressing mental health challenges facing security professionals, including burnout prevention and youth security awareness. "The overwhelming response to our LATAM & CA Congress, with attendees from 21 countries filling every seat, demonstrates the vital role ASIS International plays in connecting security professionals across the Americas,” stated Joe Olivarez, Jr., MBA, 2025 President, ASIS International. Overwhelming response “As we celebrate ASIS International’s 70th anniversary, events like this showcase how our global community continues to strengthen and adapt to meet evolving regional challenges—from emerging AI technologies to complex geopolitical threats affecting Latin America and the Caribbean," continued Joe Olivarez. The congress reinforced ASIS International's position as the premier platform for security professional development in Latin America and the Caribbean, providing essential networking opportunities and knowledge exchange among regional practitioners. Cutting-edge knowledge "This sold-out congress proved that security professionals across Latin America are hungry for the cutting-edge knowledge and networking opportunities that ASIS International provides,” said Marco Vega, CPP, Chair, ASIS Latin America Caribbean Regional Board. “From FBI insights on the fentanyl crisis to innovative AI applications in physical security, our attendees left with practical solutions they can implement immediately. The energy and engagement we witnessed over these two days reinforces why Mexico City was the perfect venue to bring together the region's security leaders.” Professional security education The success of this year's sold-out congress demonstrates the growing demand for professional security education and networking across Latin America and the Caribbean. ASIS International continues to expand its regional programming to meet the evolving needs of security professionals throughout these dynamic markets. The 2026 LATAM & CA Integral Security Congress will be held in São Paulo, Brazil in May 2026. More details to follow.
DeterTech invites industry professionals to the official launch of its newly constructed BS EN 50518:2019 Category 1 Alarm Receiving Centre (ARC) in Prestwick on Wednesday, 8th October. The day will be packed full of live demos, exclusive behind-the-scenes tours, and unique insights from experts across the crime intelligence and site security community. Speakers will include Detective Inspector Lawrence Billi of OPAL, the national police intelligence unit for serious organised acquisitive crime. Reasons to attend Learn how DeterTech’s ARC is providing real-time intruder detection for sites across the UK and Europe. Managing as many as 600,000 activations per month to protect assets and disrupt organised criminal gangs. View the cutting-edge upgrades for the high security monitoring of critical infrastructure, including bomb-proof glass and its own off-grid power supply. Listen to expert talks on the latest crime trends and solutions from industry and law enforcement. Security Site operations Mark Fitzpatrick, Director of Group Operations at DeterTech, says: "We’re thrilled to open our ARC to the public and share some exciting behind-the-scenes access to the beating heart of our site security operations." He adds, "This will be a great opportunity to bring a group of security, construction, and industry professionals together to collaborate and celebrate the latest innovations."
The latest edition of Assa Abloy’s long-running Wireless Access Control Report has just been published, and the 2025 report paints a picture of a maturing market where digital and mobile solutions are becoming the norm. With strong momentum behind trends such as wireless adoption, sustainability, and cloud services, the focus now turns to increasingly intelligent integrations and to demonstrating ROI to cement access control's role in a new generation of smart, secure, and efficient buildings. For the first time in six editions of researching and publishing this biennial report, Assa Abloy’s survey finds that wireless (fully or partly) systems have overtaken wired-only deployments among those who manage access digitally. Ongoing digitalisation of access “We are delighted to offer a snapshot of the ongoing digitalisation of access, which is steadily becoming a wireless-first technology,” says Richard Sharp, VP & Head of Product Unit Wireless Locks, DAS at Assa Abloy Opening Solutions EMEIA. “Now running for more than a decade, our report once again highlights ways for security departments and consultants to contribute to their overall business. Written in clear, business-friendly language, the report also helps all non-specialist decision-makers to stay on top of what’s happening right now in digital access – and more importantly, what’s ahead.” Physical access control Survey results presented throughout the report, in figures and tables alongside expert analysis, are based on almost 500 responses from those who work in a broad range of roles across security and facilities management, as well as IT professionals with influence over the purchasing or administration of physical access control. Almost half of respondents describe their role as “security/facility manager”. “This year’s edition of the report comes direct from the day-to-day sharp end of strategic facilities management,” adds Richard Sharp. Importance of sustainability Sustainability has gone beyond ‘merely’ a consideration: for 27% of respondents According to information from the International Energy Agency (IEA), buildings consume approximately 30% of global energy. The report confirms suggestions that, increasingly, end-users and security professionals are identifying concrete ways in which digital access can help to reduce unnecessary use. For many respondents to the survey, sustainability has gone beyond ‘merely’ a consideration: for 27% of respondents, it is the top factor when considering technology investments to enhance access management reach or capability. Strategic driver “For many organisations, across multiple and diverse sectors, sustainability is moving from a supporting role to a strategic driver,” says Richard Sharp. “Wireless systems, which reduce the need for cabling and complex infrastructure, are often seen as a ‘greener’ alternative. Battery-powered and energy harvesting devices generally consume much less energy than equivalent wired locks.” “We also see fast-growing demand for green building solutions and documentation, such as Environmental Performance Declarations (EPDs) which count towards several green certification schemes we support, including BREEAM, LEED, WELL and others.” Broader convergence trend “Access Control as a Service reflects a broader convergence trend, with physical security now aligning more closely with IT, sustainability, and workplace experience strategies,” adds Owen Kell, Senior IoT & Security Research Associate at smart-building analysts Memoori. “Organisations increasingly use access data to support occupancy analytics, ESG reporting, and operational efficiency.” Preparation for upcoming regulations The last edition of this report found significant knowledge gaps between physical and cyber security professionals The last edition of this report found significant knowledge gaps between physical and cyber security professionals. Presented with four important regional laws and directives which are (or soon will be) critical to cyber and physical security, 55% of survey respondents did not recognise any. Only 12% of 2023 survey respondents said they were fully prepared for the implications of cyber-security legislation. “The situation has improved two years on, although the new Report does identify some remaining issues,” says Richard Sharp. “With NIS2 coming into force and obligations under the EU’s Cyber Resilience Act fast approaching, this remains an area where customers and manufacturers must continue close cooperation.” Regulated risk for companies The vast majority of 2025 survey respondents (84%) felt their organisation was either already compliant, or in the process of ensuring compliance, or that these regulations were not relevant to their situation. Worryingly, when asked directly if their organisation was prepared, 16% replied to the survey with a blunt “No”. In providing commentary for this section, cyber-security governance expert Andy Watkin-Child of Veritas GRC notes, “Cyber security is quickly becoming a regulated risk for companies, either directly or indirectly, requiring boards to address cyber-security risk management or risk civil and/or criminal penalties.” Accelerated mobile adoption Adoption of mobile credentials – and mobile access management in general – has boomed Adoption of mobile credentials – and mobile access management in general – has boomed, as widely forecasted in previous editions of this Report and elsewhere. Data from the 2025 report indicates that just over a quarter of respondent organisations are making plans for a future mobile deployment (26% of survey respondents in 2025 versus 39% in 2023). The market is clearly maturing. Fully mobile credential environments now account for 17% of all respondents – more than triple the rate seen in the last edition of Assa Abloy’s report, in 2023. Early adopters “What’s changed?” asks Richard Sharp. “Many early adopters have already transitioned: mobile digital access is for the now, not just something for the future. These teams are already experiencing the operational agility, convenience, security and sustainability benefits of mobile access.” “We also see a marked fall in respondents who believe mobile access isn’t an option for them. Mobile digital access is embedded.” Market maturity Where the 2023 Report captured strong momentum towards mobile access, the 2025 edition finds increasing market maturity. As so many organisations modernise their security infrastructure, digital access systems are becoming standard, with a clear shift to mobile credentials. Convenience and enhanced security are the key benefits which have driven this adoption – and will continue to do so, the report suggests.
Anyone responsible for facilities management or security is well aware that access control and keyholding are often challenging and, consequently, can cause a number of operational and even financial issues. Appetite for change Keyholding and access control are dynamic processes that involve daily activity and ongoing management. Keys are frequently stored off-site and exchanged daily. Access cards and fobs require setup. Every lapse creates a chain reaction: replacements, lock changes, risk reporting, all of which consume time, money, and patience. Keyholding and access control are dynamic processes that involve daily activity Against this backdrop, it’s not surprising that more and more organisations of various sizes, both in public and private sectors, are actively seeking alternatives to traditional methods of manned keyholding or manual pen-and-paper visitor logs. There is a clear shift towards technology-led solutions that offer greater reliability, visibility and scalability. The driving force behind this move is not innovation for its own sake but rising service expectations. Things must be done faster, better, more efficiently; FM and security tenders outline stricter requirements for alarm response times and service delivery, with little tolerance for service shortfalls and delays, or penalties will follow. Moving beyond the traditional approach As operational demands evolve, security and FM professionals are beginning to ask the same question: Is there a better way? “Over the past couple of years, we have seen a drastic positive change in attitudes towards new methods of keyholding,” says Stuart Wheeler, Managing Director of Keynetics. The incorporated technology enables the management of access to 100 of locations remotely Keynetics is one of the companies pioneering change in this space, offering smart key management solutions such as SentriGuard. With this system, keys are stored at the point of need in key safes with commercial-grade, certified security. They are accessed either using a temporary code or a mobile app. The incorporated technology enables management of access to hundreds of locations remotely, and provides notifications when keys are not returned or the device battery is running low. Adopting new methods Stuart recalls initial resistance to change in the market. “When we started Keynetics, there was hesitation around adopting new methods. I was told more than once, “No way I am storing keys in a key safe”, but that mindset has shifted entirely.” He attributes the change in attitude to a combination of persistent issues with the existing keyholding methods and increased understanding of the benefits that alternative approaches can offer, particularly if they offer adequate security and greater control. Identified the most common considerations “We’re now seeing strong interest from a wide variety of organisations,” he says, “including security service providers, FM companies and in-house teams operating in a range of sectors.” “Selecting the right system is often the most complex part,” he adds. “Requirements can differ significantly depending on the sector and business model, but there are key areas that tend to come up repeatedly. Over time, we’ve identified the most common considerations raised by both existing customers and those looking for a change.” Access traceability: The top priority While security remains central, the most consistently cited requirement is access traceability, or the ability to see who accessed which property, when, and for how long. In the operating domain, access data is seen as a vital resource, not only for day-to-day management “In many cases, the high security rating of the device was accepted without much debate,” Stuart notes. “What proved to be more important was the ability to run real-time audit reports without needing to visit premises and upload visit logs, or complete some other action to get hold of that valuable access data.” This growing focus is understandable. Technology is now expected to take on tasks previously carried out by personnel, but unmanned systems must still provide a high level of oversight and accountability. In the operating environment, access data is seen as a vital resource, not only for day-to-day management, but also for compliance, reporting and service performance evaluation. Security: The most risk-dependent factor Naturally, security is a high-ranking factor when selecting an access control solution. However, the emphasis placed on it varies significantly depending on the sector and the perceived risks. “For obvious reasons, clients in high-risk sectors, such as banking or government, conduct in-depth evaluations and demand robust certification,” Stuart explains. “We’ve attended countless meetings with some clients, continuously providing proof of both physical and digital security. Smaller companies with lower perceived risks, on the other hand, often acknowledged the security rating and focused more on factors like cost.” The takeaway is clear: while security is crucial, the level of scrutiny it receives is relative to the client’s sector and operational risk. Costs: Are they breaking the bank here? In many cases, new systems are executed not because they are cheap, but because the cost of doing nothing is higher It is in human nature to want the best and the shiniest, but the implementation costs may become the stopping point. For many decision-makers, the question often isn’t whether a solution is ideal, it’s whether it aligns with operational needs at a sustainable cost. FM directors work within fixed budgets, often balancing multiple objectives alongside day-to-day operations. Cost isn't just about the system itself, it is about scale. A high-end solution may be entirely feasible for a business with one manufacturing site, while even a budget-friendly option could prove expensive for someone managing hundreds of retail locations. In many cases, new systems are implemented not because they are cheap, but because the cost of doing nothing is higher. A serious issue with the current method may justify investment, where the price of failure outweighs the cost of change. Practical considerations: Installation, hardware and usability Beyond the top three factors, practicalities such as installation requirements, ease of use and maintenance also influence the decision-making process. Organisations typically seek systems that can be retrofitted with minimal disruption. Common questions include: Is the unit hardwired? Does it need a power supply or internet connection? How long does installation take? Where installation is overly complex, or the benefits do not clearly outweigh the effort required, adoption may stall. On the other hand, a quick, straightforward setup is often seen as a major advantage. Post-purchase support, including maintenance, training and customer service, is usually discussed later in the process, but remains an important factor in long-term satisfaction. System integrations: A logical next step The ability to manage multiple systems, including access control, alarms and cameras, via one interface They live in a digital age where doorbells can be answered from miles away and kettles are turned on with a tap on the phone screen. So it is no surprise that the security sector is so tech-oriented. System integration is fast becoming a top request. The ability to manage multiple systems, including access control, alarms and cameras, through one interface offers a streamlined and time-saving solution that increases control. Stuart notes, “We’re primarily a software development company, so the digital side of our solutions is built with continuous improvement in mind. Right now, one of our long-standing clients is trialling an integration between our system and AJAX alarms. Since they actively use both SentriGuard and AJAX, it makes perfect sense to manage alarm controls within the same key management platform.” While system integration is often not the top priority, it does indicate a forward-thinking, customer-centric approach. No right or wrong Ultimately, choosing the right keyholding or access control solution depends entirely on the end user’s needs. Factors such as access traceability, security (physical and digital), and implementation costs all play a part. There is no one-size-fits-all answer. Some will retain their current methods. Others will go fully keyless. Many will find a golden middle ground. But the journey doesn’t end at purchase. Continuous evaluation, access management refinement, and user feedback are essential to ensure ongoing effectiveness or to justify the search for an even better solution. After all, the market never stands still.
ZBeta, a pioneer in delivering comprehensive physical security consulting services, announced that Vince Machi has been promoted to Director of Client Program Operations. In his new role, Vince will lead the continued evolution of ZBeta’s client programs — aligning delivery excellence with the organisation’s broader strategic objectives. Machi, who previously served as Client Partner, brings more than two decades of experience in physical security, programme leadership, and technical operations. His promotion reflects the company’s commitment to delivering streamlined, data-driven, and human-centered solutions at scale. Translating strategic intent “Vince is an exceptional leader with a strong command of the complexities inherent in our work,” said Jesse Knutson, Chief Operating Officer, ZBeta. “He has a unique ability to translate strategic intent into day-to-day action, which enables our teams to operate at its highest potential. His continued leadership will be instrumental in driving consistency, quality, and innovation across every client programme we support.” Key connector Vince will serve as a key connector between ZBeta’s client-facing teams and its executive leadership Vince will serve as a key connector between ZBeta’s client-facing teams and its executive leadership. He will work closely with operational leads to manage resource planning, standardise programme delivery, and support long-term growth across the business. With a solid track record in optimising complex security initiatives, Vince is well-positioned to drive the next phase of operational maturity within ZBeta. His unique blend of technical depth, operational rigour, and client focus will help ensure the company’s programs are efficient and scalable as well as tailored to each client’s unique mission and risk environment. Exceptional security outcomes “ZBeta is redefining what it means to deliver exceptional security outcomes,” Vince said. “This new role gives me the opportunity to build on the trust we’ve established with our clients and support the continued development of our world-class team. I’m honoured to help shape how we execute, evolve, and grow — internally and in partnership with the organisations we serve.” Prior to joining ZBeta, Vince held leadership roles at Convergint Technologies and served in the U.S. Navy, where he developed an understanding of operational discipline and mission-critical coordination.
International SOS, the world’s pioneering health and security risk management services firm, announced a strategic partnership with Exlog Global (Exlog), a boutique, veteran-owned risk solutions provider. Together, they will deliver a seamless, intelligence-led executive services solution that integrates security and protective intelligence in one unified program. Intelligence and threat monitoring The joint solution will feature executive exposure assessments, protective intelligence and threat monitoring The joint solution will feature executive exposure assessments, protective intelligence and threat monitoring, a dedicated executive response hotline, high-quality security and medical support and proactive escalation protocols. Optional services include executive protection, residential and office Physical Security Assessments, security awareness training, risk assessments, online profile reduction, resilience training and technical surveillance countermeasures. Exlog Global’s protective intelligence capabilities Giles Hill, Global Head of Security Services, International SOS, said, “By combining our global intelligence, security, and medical expertise with Exlog Global’s protective intelligence capabilities, we are able to deliver a powerful executive services program that meets the ever-evolving needs of our clients." George Taylor, CEO, Exlog Global, said, “This partnership ensures that pioneers are supported by best-in-class protective intelligence, security, and health integration—delivered discreetly, globally, and with measurable value.” Evolving threat landscape Exlog is a veteran-founded U.S. risk solutions firm that has protective intelligence, contingency planning Exlog is a veteran-founded U.S. risk solutions firm that delivers protective intelligence, contingency planning and critical incident response backed by 24/7 global monitoring customised to end user requirements. This collaboration unites two industry pioneers dedicated to safeguarding people and organisations against the complex and evolving threat landscape. Integrated medical and security assistance International SOS brings over 40 years of experience supporting multinational corporations, governments, and NGOs with integrated medical and security assistance in more than 190 countries. Leveraging elite military, intelligence, and risk management backgrounds, Exlog complements this global footprint with specialised expertise in protective intelligence, critical incident response and the development and staffing of client-dedicated GSOCs and VSOCs. Shared commitment to global assistance The partnership is grounded in a shared commitment to global assistance, integrated expertise and proven value. By aligning capabilities, International SOS and Exlog deliver: Global Reach – Operational capability in 190+ countries. Integrated Expertise – A unified health, intelligence, and security program. Proven Value – Cost and operational efficiency by consolidating fragmented vendor solutions. Privacy Prioritisation – Highest levels of data privacy and discretion with information. Standards-Based Delivery – Best practice aligned with ISO 31000, 31030, and 22361. This partnership underscores both organisations’ mission to protect people and enable organisations to operate with confidence—anywhere in the world.


Expert commentary
Physical security isn’t a one-time project or a static system. It’s a dynamic, ongoing process and program that requires constant attention and management to remain effective. While the initial implementation of a security system — what we often call Day 1 — is critical, the ongoing maintenance, service, and adjustments made after systems are operational, or Day 2, are equally essential. Security program long-term Organisations that fail to focus on post-occupancy security operations risk falling victim Organisations that fail to focus on post-occupancy security operations risk falling victim to a phenomenon known as "program drift," where systems and policies gradually deviate from their intended standards over time. To manage your security program long-term, you often need an outside perspective. By engaging a security partner to provide managed services, organisations can achieve a strategic solution for maintaining their security programs' integrity, effectiveness, and efficiency over the long term. Let’s look at the reasons why. Moving beyond Day 1 Day 1 is the milestone moment when a security system is launched — whether it’s a new system, an upgraded access control platform, or a transition to advanced surveillance technology. On this day, all components align with established policies and standards. Yet, Day 1 is only the beginning of a security program's lifecycle. What happens on Day 2 and beyond is often where the real work begins. Without a robust plan for ongoing service and maintenance, security systems can quickly fall out of compliance. Policies become outdated, configurations drift, and vulnerabilities emerge. This gradual degradation — program drift — occurs not due to neglect but as a natural result of decentralised management; competing operational priorities; and the lack of dedicated, knowledgeable resources to oversee the systems. Avoiding program drift Drift is particularly pronounced in physical security because, unlike other building systems Program drift occurs when a security program’s elements — such as access controls, camera placements, or intrusion detection settings — gradually become misaligned from their intended standards. Think of a straight line representing perfect compliance on Day 1. Over time, various factors push individual components off this line. Left unchecked, these deviations accumulate, leading to significant vulnerabilities and deferred remediation costs that would be much easier to manage and predict with a more proactive approach. Drift is particularly pronounced in physical security because, unlike other building systems such as lighting or HVAC, security measures are often viewed as inconveniences. Even when systems function as designed, features like turnstiles, visitor management, or additional access controls may face pushback for being "in the way" of daily operations. This resistance and the Day 2 problems that often result — along with the lack of centralised oversight — exacerbate the risk of misalignment and ongoing inefficiencies. Why centralised post-occupancy management matters Post-occupancy management is critical for maintaining the long-term health of a security program. Facility managers, who are often tasked with overseeing security systems, may lack the technical expertise or bandwidth to handle the complexity of modern security infrastructure. Partnering with dedicated professionals to help meet these responsibilities ensures systems are managed effectively and vulnerabilities are addressed proactively. It also helps improve system availability and uptime, accelerate break/fix response and resolution times, lower ownership costs by reducing unnecessary and repeat service dispatches, and achieve a more consistent end-user experience. Moreover, centralised management provides a consistent framework for handling security systems across multiple sites. This consistency is vital in preventing Program Drift, ensuring that local variations or individual decisions do not undermine the organisation’s overall security posture. The case for managed services Hiring outside consultants offers a proactive and professional approach to mitigating program drift Hiring outside consultants offers a proactive and professional approach to mitigating program drift. Specialised providers have the expertise, tools, and resources to manage complex security systems effectively and ensure those systems remain aligned with organisational policies and performance expectations. By acting as a dedicated external resource and interfacing regularly with your security team, your consultant can help you build, manage, and optimise a variety of services that help keep your program on track. These services range from system health and availability management (break fix); move, add change management; system configuration administration; and program/project management offices. Key benefits in the following areas Let’s look at how a managed services a partner can yield key benefits in the following areas: Standards compliance. Centralised management ensures that security systems and processes remain in compliance with established policies and standards, reducing vulnerabilities caused by ad hoc changes or decentralised management. Operational efficiency. Managed services streamline maintenance and support workflows, minimise downtime, and ensure quick issue resolution. Enhanced security resilience. Proactive monitoring and maintenance reduce the likelihood of system failures and improve overall system reliability. Standardised processes for move-add-change (MAC) activities ensure that security configurations remain consistent across locations. Cost savings. Outsourced providers help organisations optimise resources, avoid errors, and benefit from economies of scale in service delivery. Strategic focus. Outsourcing also allows internal teams to shift their focus from routine operational tasks to higher-value activities, such as strategic planning, threat analysis, and incident response. Long-term value of security investments While Day 1 success is the foundation of a comprehensive program, what happens on Day 2 determines your ability to realise the long-term value of your security investments. As the complexity of security challenges grows, pioneers must prioritise sustained management and professionalised oversight to protect their organisations, making the conversation around post-occupancy security more critical than ever. By adopting innovative strategies, implementing mature toolsets and processes, and leveraging specialised expertise, organisations can ensure their programs remain robust, aligned, and prepared to meet the challenges of tomorrow.
Gun violence remains one of the most unpredictable threats in today’s physical security landscape. When it strikes, seconds matter. The ability to detect and respond to gunfire almost instantaneously can determine outcomes. Security pioneers and first responders know this, and yet too many gunshot detection systems in operation today are shackled by outdated assumptions and aging architecture. The demand now is not for incremental improvements, but for a complete rethinking of how these systems function. Prevailing model For years, the prevailing model has relied on server-heavy frameworks and complex sensor networks that introduce unnecessary latency and complexity. Systems that depend on sending audio data to remote servers for analysis are inherently slower. In a live gunfire situation, waiting even a few seconds for confirmation can be the difference between life and death. The expectation in 2025 is clear: detection and actionable intelligence must occur in real time, with no delays. Edge-based intelligence: The new standard Deploying three or more sensors to cover an area imposes significant cost and operational burdens To minimise points of failure and latency, the future of gunshot detection lies in edge processing. Intelligence must reside inside the sensor itself, not in a data centre or a remote server. Edge-based acoustic sensors can now detect and geolocate gunshots in under three seconds without external dependencies. They do not require triangulation or corroboration from multiple devices. One sensor, one shot, one instant location—that is the new standard. Consider the limitations of traditional perimeter-based systems. Deploying three or more sensors to cover an area imposes significant cost and operational burdens. Maintaining this infrastructure often means trade-offs in coverage and flexibility. For example, if a detection system can only triangulate within a ring of sensors, there will be no information available for shots fired outside this restricted perimeter, even from a short distance away. Worse, these older models are prone to false positives triggered by fireworks, construction noise, or other environmental sounds. Each false alert erodes confidence in the system and burdens response teams unnecessarily. Contrast this with modern edge-AI sensors that not only detect the muzzle blast of a firearm but also analyse the ballistic wave of a hypersonic projectile in motion. This dual-signature capability delivers a level of accuracy far beyond what older systems can offer. When a shot is fired, the sensor detects, classifies, and pinpoints the event almost instantly. There is no reliance on back-end processing or corroborative triangulation. The sensor acts autonomously and decisively. Real-time response with visual confirmation The level of integration changes gunshot detection from a passive alerting tool into an active part These advancements do not stop at detection. Integration with existing security infrastructure is crucial. Modern sensors leverage open standards such as ONVIF Profile S to control pan-tilt-zoom (PTZ) cameras directly. As soon as a gunshot is detected, the sensor can automatically cue a camera to the exact coordinates of the event. This process happens in less than three seconds, giving operators live visual intelligence of the situation as it unfolds. The days of security personnel scouring multiple camera feeds or responding to vague reports are over. Today, they can focus their attention on the precise location of the threat. This level of integration transforms gunshot detection from a passive alerting tool into an active part of situational awareness. It provides command centres and first responders with actionable intelligence, enabling them to make informed decisions in real time. It is not enough to know that a shot was fired; security teams need to see where it happened and assess the scene immediately. Adapting to the environment Environmental adaptability is another area where modern edge-based systems excel. Acoustic detection has long struggled with ambient noise. Urban environments are filled with loud, impulsive sounds that can easily be mistaken for gunfire. However, edge-AI sensors can now be trained to understand the acoustic profile of their specific environment. They learn what constitutes normal background noise and adjust accordingly. If a venue frequently hosts fireworks displays or is situated near construction zones, edge-processed AI systems can be trained to differentiate those sounds from genuine threats. This site-specific learning dramatically reduces false positives and enhances overall system reliability. Flexibility in deployment A single intelligent sensor can now provide broad coverage with minimal setup Flexibility in deployment is equally important. Today’s security needs are not confined to permanent installations. Large public events, temporary venues, and rapidly evolving threat environments require portable solutions. Edge-based sensors can be deployed on mobile platforms such as trailers or temporary masts, providing high-precision detection wherever it is needed. Because all processing occurs at the edge, these mobile systems do not rely on centralised servers to function effectively. The sensor is the system. This shift represents a fundamental change in how security professionals approach gunshot detection. The industry is moving away from reactive, infrastructure-heavy models toward proactive, efficient, and adaptable solutions. A single intelligent sensor can now provide broad coverage with minimal setup. It detects, locates, and visually confirms threats autonomously. Interoperability further enhances the value of modern systems. By embracing open protocols, these sensors integrate seamlessly with existing video management systems (VMS) and security platforms. Organisations are no longer locked into proprietary ecosystems. They can deploy best-in-class solutions that work together harmoniously. This openness accelerates deployment and reduces friction, a critical advantage when securing dynamic environments on tight timelines. Privacy by design Alert signals contain location, timing, and sound type data only with no continuous listening Privacy concerns are front and centre in any surveillance deployment and the thought of an audio listening device can raise eyebrows. Modern gunshot sensors are event-driven and only share short recordings (such as a 1.5-second clip for verification) triggered by gunshot levels (over 100 dB). Conversations and other ambient audio are neither captured nor stored. Alert signals contain location, timing, and sound classification information only with no continuous listening or streaming. Closing the gap between detection and response Ultimately, doing gunshot detection right demands a new mindset. Edge processing is not a technical novelty; it is an operational necessity. Security pioneers must expect and demand more from their detection systems—faster alerts, smarter filtering, real-time visual confirmation, seamless integration, and scalable deployment. The technology to achieve this exists today. High-accuracy, real-time gunshot detection is not a future promise; it is a present reality. The responsibility now lies with the industry to embrace this better way forward. Communities and the professionals who protect them deserve solutions that rise to meet today’s challenges with intelligence, speed, and precision.
The physical security industry has been in love with the cloud for quite some time. And understandably so. The promise of instant scalability, centralised access, and simplified maintenance is hard to ignore, especially in an era of remote work and distributed facilities. But reality is catching up to the hype. For many, especially those dealing with video surveillance at scale, the cloud is no longer the catch-all solution it once seemed. Rising costs, bandwidth limitations, and latency issues are exposing its shortcomings. And the more resolution increases, from HD to 4K and beyond, the heavier that burden becomes. Modern security cameras This is where edge computing, specifically AI-enabled edge processing available in modern security cameras, starts to look less like an option and more like a necessity. But it’s not just about adding intelligence to cameras. It’s about how that intelligence is deployed, scaled, and maintained. This leads us to containerisation and tools such as Docker, which are a revolutionary piece of the puzzle. When cloud isn't enough Cloud analytics for video sounds great in theory: stream everything to the cloud Let’s start with a basic issue. Cloud analytics for video sounds great in theory: stream everything to the cloud, let powerful servers do the thinking, then serve up results to end-users in real time. However, in practice, this model can break down quickly for many end-users. Raw video is heavy. A single 4K camera streaming 24/7 can generate terabytes of data per month. Multiply that by hundreds or thousands of cameras, and the bandwidth and storage costs become unsustainable. Then there’s latency. If AI needs to detect a person entering a restricted area or identify a licence plate in motion, seconds count. Routing video to a cloud server for analysis and waiting for a response can introduce delays. Adding in concerns about uptime, such as what happens if the internet connection goes down, it becomes clear why relying exclusively on the cloud creates friction for mission-critical deployments. The edge advantage Edge processing turns that model on its head. Instead of sending everything out for analysis, edge-enabled cameras do the heavy lifting on-site. AI algorithms run directly on the device, interpreting what they see in real time. They generate metadata—lightweight descriptions of events, objects, or behaviors—rather than raw video. This metadata can be used to trigger alerts, inform decisions, or guide further review. The benefits are obvious: latency drops, bandwidth use plummets, and storage becomes more efficient. Edge processing solves many cloud deployment issues by keeping the compute where the data is generated, on the device. This frees the cloud up to do what it’s best at: providing scalable and centralised access to important footage. But where does the edge go from here? How do we evolve these powerful IoT devices to deliver even more situational awareness? Enter Docker: An app store for Edge AI They package an app along with everything it needs to run: the code, settings, libraries, and tools This is where the concept of containerisation and open development platforms like Docker comes in. Let’s start with an analogy that is helpful for understanding containers. Imagine you're getting ready for a trip. Rather than hoping your hotel has everything you need, you pack a suitcase with all your essentials: clothes, toiletries, chargers, maybe even snacks. When you arrive at your destination, you open the suitcase and you’re ready to go. You don’t need to borrow anything or adjust to whatever the hotel has, since you’ve brought your own reliable setup. Containers in software work the same way. They package an app along with everything it needs to run: the code, settings, libraries, and tools. This means the application behaves exactly the same, whether it’s running on a developer’s laptop, on the edge in an IoT device, or in the cloud. Security camera with a powerful edge processor There’s no last-minute scrambling to make it compatible with the environment it lands in, because it’s self-contained, portable, and consistent. Just like a well-packed suitcase simplifies travel, containers simplify software deployment. They make applications faster to start, easier to manage, and more predictable, no matter where they’re used. For a security camera with a powerful edge processor, it’s like giving the camera its own specialised toolkit that can be swapped out or upgraded without touching the rest of the system. It also means you can run multiple AI applications on a single camera, each in its own isolated environment. Integrators and end-users These applications don’t interfere with each other and can be updated independently Want to add fall detection to a healthcare facility’s camera network? Just deploy the analytics in a container. Need to monitor loading docks for pallet counts at a warehouse? Spin up a different container. These applications don’t interfere with each other and can be updated independently. As a developer, if you use an open container platform like Docker, any system that supports Docker can utilise your software. This removes the need to do expensive custom work for each partner and ecosystem. This is one reason Docker containers are tried and true in the larger IT space and are just starting to get traction in the security sector. Docker also makes this scalable. Developers can build AI tools once and push them out to hundreds or thousands of devices. Integrators and end-users can customise deployments without being locked into proprietary ecosystems. And because containers isolate applications from core system functions, security risks are minimised. Metadata, not megabytes Traditional video analytics systems often require full video streams to be processed One of the most underappreciated aspects of this method is the way it redefines data flow. Traditional video analytics systems often require full video streams to be processed in centralised servers, either on-premises or in the cloud. This model is brittle and costly, and it’s also unnecessary. Most of the time, users aren’t interested in every frame. They’re looking for specific events. Edge AI enables cameras to generate metadata about what they see: “Vehicle detected at 4:02 PM,” “Person loitering at entrance,” “Package removed from shelf.” This metadata can be transmitted instantly with minimal bandwidth. Video can still be recorded locally or in the cloud, but only accessed when needed. This dramatically reduces network load and allows the cloud to be used more strategically: for remote access, long-term archiving, or large-scale data aggregation, without being overwhelmed by volume. Building smarter systems, together A single camera can run analytics from multiple third parties, all within a secure, containerised framework An equally important aspect of containerisation is how it opens up the ecosystem. Traditional security systems are often built as closed solutions. Everything—from the cameras to the software to the analytics—comes from a single vendor. While this simplifies procurement, it limits innovation and flexibility. Docker flips that model. Because it’s an open, well-established standard, developers from any background can create applications for edge devices. Integrators can mix and match tools to meet unique customer needs. A single camera can run analytics from multiple third parties, all within a secure, containerised framework. This is a profound shift. Security cameras stop being fixed-function appliances and become software-defined platforms. And like any good platform, their value increases with the range of tools available. Hybrid: The realistic future So, where does this leave the cloud? It is still essential, but in a more specialised role. The most robust, future-proof architectures will be hybrid: edge-first and cloud-supported. Real-time detection and decision-making happen locally, where speed and uptime matter most. The cloud handles oversight, coordination, and data warehousing. Real-time detection and decision-making happen locally, where speed and uptime matter most This hybrid model is especially useful for organisations with complex deployments. A manufacturing plant might retain video locally for 30 days but push older footage to the cloud to meet retention requirements. A retail chain might analyse customer flow on-site but aggregate trend data in the cloud for HQ-level insight. Hybrid gives organisations the flexibility to optimise cost, compliance, and performance. Regulatory realities It’s also worth noting that not every organisation can, or should, store data in the cloud. Privacy regulations like GDPR in Europe or similar laws elsewhere require strict control over where data is stored. In many cases, sensitive footage must remain in-country. Edge and hybrid models can make compliance easier by minimising unnecessary data movement. Conclusion: Smart security starts at the edge The next wave of innovation in physical security won’t come from bigger cloud servers or faster internet connections. It will come from smarter edge devices, with cameras and sensors that don’t just record, but understand and classify events. And the foundation for that intelligence isn’t just AI, but how that AI is deployed. Containerisation via platforms like Docker is unlocking new levels of flexibility, security, and scalability for the physical security industry. By embracing open standards, supporting modular applications, and rethinking how data flows through the system, physical security professionals can build solutions that are not only more effective but also more sustainable, secure, and adaptable. The cloud still has its place. But the edge is essential to the future for real-time intelligence, mission-critical uptime, and cost-effective deployment.
Security beat
The speed, scale and sophistication of today's safety threats can outpace human capacity to keep up. The implementation of artificial intelligence (AI) is essential to keep people safer and must be designed and deployed transparently. The complexity of today’s AI applications is expanding in physical security, with more AI models leveraging data to tune performance and using third-party application programming interfaces (APIs). In this context, it can be difficult to find clear, consolidated, transparent information about AI’s use in enterprise security technologies. How AI is used across the company’s technologies Motorola Solutions is taking a layered approach to help users easily understand how AI is used Motorola Solutions is taking a layered approach to help users easily understand how AI is used across the company’s technologies, starting at a high level with AI labels affixed to products, and getting more granular with structured information about AI testing, assessments and more. “We are aiming to provide clarity to the user and those they help protect to increase trust and transparency in AI innovation,” says Hamish Dobson, Corporate Vice President, Avigilon and Pelco Products, Motorola Solutions. Importance of AI transparency The AI labels, which have been compared to nutrition labels used on consumer products, are designed to be clear and easy-to-read at a glance. Each label explains the type of AI used, who owns the data processed, human controls, and the purpose behind the product’s specific application of AI. AI labels are comparable to nutrition labels used on consumer products. “We regularly seek input from external stakeholders – including customers, partners, consultants, investors, policymakers, and community members – on many aspects of our business,” says Dobson. “We briefed select customers and industry groups on our AI labels initiative and received positive feedback.” He continues: “Like us, customers and industry groups understand the importance of AI transparency and are looking for ways to clarify AI usage in public safety and enterprise security.” AI transparency efforts AI transparency efforts have taken on a variety of forms such as model cards, transparency notes Across industry, AI transparency efforts have taken on a variety of forms such as model cards, transparency notes and, in Motorola’s case, AI labels. The company pledges to continue to engage with industry participants on efforts to advance the overall pace, adoption, and maturity of responsible innovation initiatives across the industry, says Dobson. The AI labels help to increase dialogue and understanding of AI’s use in the security technologies that help to keep people safer. Motorola Solutions is looking to inform customers about how AI is being used to automate mundane tasks and prioritise information that may be critical to performing their roles. Motorola’s L6Q licence plate recognition For example, a business using Motorola’s L6Q licence plate recognition camera in its parking lot could view the AI label and see that AI is used to help recognise licence plate characteristics of vehicles within its view. The label would also help the customer understand that they maintain ownership and control of the data AI can process and can determine the data retention period. The label would also help the customer understand that they maintain ownership. What type of AI is being used AI outputs should have human oversight, and a user should understand the sources of data “By providing knowledge of where and what type of AI is being used, our customers can better understand what they are deploying, configure settings appropriately and inform their constituents,” says Dobson. AI-assisted experiences should be designed to be accountable and transparent, according to Motorola Solutions. AI outputs should have human oversight, and a user should understand the sources of data from which suggestions were drawn. AI labels highlight that the data AI can access is customer-owned and controlled, helping to increase confidence that AI outputs are based on that customer's specific data. Responsible and ethical use of technologies The AI label’s “first or third party model” section explains the source of the AI model. A first-party model is developed in-house by Motorola Solutions. A third-party model is developed outside of Motorola Solutions and made available by a third-party vendor; however, it may be customised by Motorola Solutions. MTAC is a multidisciplinary group that advises the company on the reliable and ethical use of technologies “This section aims to foster dialogue with our customers around Motorola Solutions’ role in testing, training, and refining the AI model or models used in our products,” says Dobson. Helping to propel the AI Label initiative, the Motorola Solutions Technology Advisory Committee (MTAC) is a multidisciplinary group that advises the company on the responsible and ethical use of technologies, including data and AI. Industry trends in technology’s responsible design MTAC continuously explores new ways to enhance trust with customers and the communities they serve, while helping to keep Motorola Solutions a step ahead of industry trends in technology’s responsible design, development, and use, according to the company. The MTAC “Blueprint” sets out the core principles that drive the approach. “We’re excited by the opportunity to continue to lead in this area through additional innovation, thought leadership, and stakeholder engagement,” says Dobson. Human-centered design New capabilities specifically augment human skills and capacity with the goal of helping humans Rather than replacing human decision-making, AI technologies will, in fact, augment it. Human-centered design is a core principle of the responsible technology “Blueprint” Motorola Solutions is developing. New capabilities specifically augment human skills and capacity with the goal of helping humans spend time on what matters most during a safety or security incident, applying their unique judgement, knowledge, and oversight in high-stakes environments. AI’s recommendations “We purposefully deploy AI to augment human focus, effort and performance,” says Dobson. “We design AI to maximise human strengths like judgement and reasoning and to adapt to changing roles, tasks, risk levels, and cognitive states while keeping AI outputs traceable and transparent, whereby the user can easily see, check and override AI’s recommendations.”
For all the emphasis on cloud systems and centralised servers at ISC West, a lot of innovation in security video systems is happening at the edge. New advancements inside video cameras are boosting capabilities at the edge, from advancements in processing power to artificial intelligence (AI) and machine learning (ML) algorithms that can now be deployed directly on the cameras or edge devices. Advancements in AI algorithms The progress of video systems becoming smarter at the edge is driven by the need for real-time insights, lower latency, bandwidth efficiency, enhanced privacy, and improved reliability. Advancements in edge computing hardware and AI algorithms are enabling a range of intelligent video applications across various industries, including physical security. Smarter functionality at the edge is a benefit of new computer systems-on-chips (SoCs) that are driving new heights of performance for today’s cameras. Axis Communications’ ARTPEC-9 Axis Communications’ new ARTPEC-9 SoC offers advanced video compression to reduce bandwidth Axis Communication’s new ARTPEC-9 system-on-chip (SoC) offers advanced video compression to reduce bandwidth and storage needs. With a low bitrate, the SoC helps deliver high-quality imaging with outstanding forensic detail. ARTPEC-9 also offers enhanced deep learning capabilities to allow users to leverage the latest video analytics and accelerate the implementation of AI technology. Axis maintains control over all aspects of the chip’s development to ensure high quality and cybersecurity. Among the benefits of ARTPEC-9 are better AI and deep learning, better image quality, better cybersecurity, and AV1 license-free video compression (see below). Hanwha Vision’s Wisenet 9 Hanwha Vision has launched Wisenet 9, its most advanced AI-powered System on Chip (SoC). Wisenet 9’s enhanced edge AI capabilities increase performance as the volume and complexity of security threats demand real-time, accurate analysis. By elevating edge-device performance, AI empowers systems to quickly analyse vast amounts of video data and discern crucial patterns and anomalies. A key differentiator driving Wisenet 9 is deployment of two Neural Processing Units (NPUs), which improve performance three-fold compared to Wisenet 7, the previous SoC generation. While one NPU handles image processing, the other focuses on object detection and advanced analytics. This dual NPU concept was introduced to ensure video quality and analytics have independent resources, thus preventing one function from impacting the performance of the other. The latest from Ambarella Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers Off the ISC West trade show floor in a nearby meeting room, semiconductor company Ambarella demonstrated how it will continue to push the envelope of what is possible with generative AI at the edge. Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers and recently achieved the milestone of 30 million cumulative units shipped. The demonstrations highlight Ambarella’s ability to enable scalable, high-performance reasoning and vision AI applications across its ultra-efficient, edge-inference CVflow 3.0 AI SoC portfolio. The company’s DeepSeek GenAI models run on three different price/performance levels of its SoC portfolio. In addition to advancements in GenAI processing at the edge, Ambarella integrates image processing, encoding and system-level functions into all its AI SoCs. New standard for video encoding: AV1 AV1 compression is a next-generation video coding technology that offers significant improvements in compression efficiency and video quality, especially at lower bitrates. Its royalty-free nature positions it as a crucial codec for the future of internet video. AV1 compression is a next-generation video coding technology. Axis Communication’s ARTPEC-9 chip now supports the AV1 video encoding standard. By embracing this standard, which is new to the physical security market although it was introduced in 2018, Axis sets the stage for AV1 compression to eventually become the industry standard, replacing H.264 and H.265. Network video transmission AV1 is an open-source, license-free coding format designed mainly for efficient network video transmission AV1 is an open-source, license-free coding format designed specifically for efficient network video transmission. It delivers high-quality video at low bitrates, reducing bandwidth consumption and storage costs. The codec was developed by the Alliance for Open Media (AOM), a nonprofit organisation founded in 2015 by Google, Intel, Amazon, Microsoft, Netflix, and Mozilla (among others), to provide open-standard, next-gen video coding technology. AV1 is ideal for cloud solutions—making streaming applications more robust, scalable, and capable of delivering real-time insights. Now the ARTPEC-9 chipset brings these benefits to the surveillance industry, and AV1 is currently supported by AXIS Camera Station. Providers of major video management solutions (VMS) such as Genetec and Milestone will be adding support for AV1, with further developments already underway. More intelligence at the edge Intelligence inside video cameras comes from the processing power and algorithms that enable them to perform tasks beyond simply capturing and recording images. This "intelligence" allows cameras to analyse the video stream in real-time, identify objects, detect events, and make decisions or provide alerts based on what they "see." New and improved SoCs are driving performance improvements at the edge. The increasing power of embedded processors and advancements in AI are continuously expanding the capabilities of intelligent video cameras.
Anyone who has been in a proverbial cave for the last couple of years faced a language barrier at this year’s ISC West 2025 trade show. The industry’s latest wave of innovation has brought with it a new bounty of jargon and buzzwords, some of which I heard at ISC West for the first time. As a public service, we are happy to provide the following partial glossary to promote better understanding of the newer terms. (Some are new to the security industry but have been around in the IT world for years.) Obviously, if we can’t understand the meaning of the industry’s lexicon (and agree on the meaning of terms!), we will struggle to embrace the full benefits of the latest industry innovation. Not to mention, we will struggle to communicate. Generative AI Generative AI can identify an object in an image based on its understanding of previous objects This was perhaps the most common new(ish) term I heard bouncing around at ISC West. While the term artificial intelligence (AI) now rolls off everyone’s tongue, the generative “version” of the term is catching up. Generative AI uses what it has learned to create something new. The name comes from the core function of this type of artificial intelligence: it can generate (or create) new content. It doesn’t just copy and paste; it understands the underlying patterns and creates something original based on that understanding. In the case of video, for example, generative AI can identify an object in an image based on its understanding of previous objects it has seen. Video and security Generative AI can tell you something digitally about what is happening in an environment. There is no longer a need to write “rules;” the system can take in data, contextualise it, and understand it, even if it does not exactly match something it has seen before. In the case of video and security, generative AI offers more flexibility and better understanding. From 2014 to 2024, the emphasis was on detecting and classifying things; today AI is expanding to allow new ways to handle data, not so prescriptive and no more rules engines. Agentic AI Agentic AI refers to artificial intelligence systems that can operate autonomously to achieve specific goals Agentic AI refers to artificial intelligence systems that can operate autonomously to achieve specific goals, with minimal to no direct human intervention. In addition to the capabilities of generative AI, agentic AI can take action based on what it detects and understands. Use of agentic AI typically revolves around an if/then scenario. That is, if action A occurs, then the system should proceed with action B. For example, if an AI system “sees” a fire, then it will shut down that part of the building automatically without a human having to initiate the shutdown. There is a lot of discussion in the industry about the need to keep humans involved in the decision-making loop, so the use of truly autonomous systems will likely be limited in the foreseeable future. However, the ability of agentic AI to act on critical information in a timely manner, in effect to serve as an “agent” in place of a human decision-maker, will find its place in physical security as we move forward. Inference Inference is another common term related to AI. It refers to the process by which an AI model uses the knowledge it gained during its training phase to make predictions, classifications, or generate outputs on new, unseen data. The direct relationship of this term to physical security and video is obvious. In the simplest terms, an AI system is “trained” by learning patterns, relationships, and features from a large dataset. During inference, the trained model is presented with new questions (data it hasn't seen before), and it applies what it learned during training to provide answers or make decisions. Simply put, inference is what makes AI systems intelligent. Containerisation Dividing a massive security management system into several separate containers enables management of the various parts In IT, containerisation is a form of operating system-level virtualisation that allows you to package an application and all its dependencies (libraries, binaries, configuration files) into a single, portable image called a container. This container can then be run consistently across any infrastructure that supports containerisation, such as a developer's laptop, a testing environment, or a server in the cloud. In the physical security industry, you hear “containerisation” used in the context of separating out the various components of a larger system. Dividing a massive security management system into several independent containers enables the various parts to be managed, updated, and enhanced without impacting the larger whole. Genetec’s SecurityCentre cloud platform Think of it like shipping containers in the real world. Each container holds everything an application needs to run, isolated from other applications and from the underlying system. This ensures that the application will work the same way regardless of the environment it is deployed in. “It took us five years to containerise Genetec’s SecurityCentre cloud platform, but containerisation now simplifies delivering updates to products whenever we want,” says Andrew Elvish, Genetec’s VP Marketing. Among other benefits, containerisation enables Genetec to provide more frequent updates--every 12 days. Headless appliance Headless appliance is a device that is managed and controlled remotely through a network or web interface A headless appliance is a device that is managed and controlled remotely through a network or web interface. The device is like a “body without a head” in the traditional sense of computer interaction: It performs its intended function, but without any visual output or input device for local interaction. In physical security, such devices are increasingly part of cloud-based systems in which the centralised software manages and operates all the disparate “headless” devices. A headless appliance does not have a Windows management system. “The whole thing is managed through the as-a-service cloud system,” says Elvish. With a headless device, you just plug it into the network, and it is managed by your system. You manage the Linux-based device remotely, so configuring and deploying it is easy. Democratising AI You hear the term democratising AI used by camera manufacturers who are looking to expand AI capabilities throughout their camera lines, including value-priced models. For example, even i-PRO’s value-priced cameras (U series) now have AI – fulfilling their promise to democratise AI. Another approach is to connect non-AI-equipped cameras to the network by way of an AI-equipped camera, a process known as “AI-relay.” For instance, i-PRO can incorporate non-AI cameras into a system by routing/connecting them through an X-series camera to provide AI functionality. Bosch is also embracing AI throughout its video camera line and enabling customers to choose application-specific analytics for each use case, in effect, tailoring each camera to the application, and providing AI to everyone. Context Cloud system also enables users to ask open-ended queries that involve context, in addition to detection Context refers to an AI system that can understand the “why” of a situation. For example, if someone stops in an area and triggers a video “loitering” analytic, the event might trigger an alarm involving an operator. However, if an AI system can provide “context” (e.g., he stopped to tie his shoe), then the event can be easily dismissed by the automated system without involving an operator. Bosch’s IVA-Pro Context product is a service-based model that adds context to edge detection. The cloud system also enables users to ask open-ended questions that involve context in addition to detection. For example, rather than asking "do you see a gas can?" you can ask "do you see any safety hazards in this scene?" The pre-trained model understands most common objects, and understands correlations, such as "a gas can could be a safety hazard.” A scaled-down on-premise version of the IVA Context product will be available in 2026. Bosch showed a prototype at ISC West. Most video data is never viewed by an operator. Context allows a system to look at all the video with "almost human eyes." Cameras are essentially watching themselves, and understanding why something happened and what we can do. All that previously unwatched video is now being watched by the system itself, boosted by the ability to add “context” to the system. Any meaningful information based on context can trigger a response by an operator. Data lake A data lake is a centralised repository that allows one to store vast amounts of structured, semi-structured, and unstructured data in its native format. In the case of the physical security marketplace, a data lake includes data generated by systems outside the physical security infrastructure, from inventory and logistics systems, for example. A data lake is where an enterprise can accumulate all their data, from the weather to Point-of-Sale information to logistics, to whatever they can gather. Putting the data in one place (a “data lake”) enables them to mine that data and parse it in different ways using AI to provide information and insights into their business. Notably, a data lake contains all a company’s data, not just security or video data, which opens up new opportunities to leverage the value of data beyond security and safety applications. Crunching the various information in a data lake, therefore, security technology can be used to maximise business operations.
Case studies
DeterTech, a pioneer in intruder detection and site security, is proud to announce its involvement with the latest series of DIY SOS: The Big Build Ireland, with the next episode due to air on Sunday 5th October on RTÉ One. One episode this series focuses on a life-changing project in Killinarden, Tallaght to adapt the home of nine-year-old Cayden and his family into a safe and accessible space that is tailored to their needs. Cayden was born with Arthrogryposis and is fully dependent on a wheelchair. The DIY SOS team stepped in after learning he was largely confined to the living room and needed to be carried upstairs, to and from his bedroom and to the toilet affecting his and his family’s qualities of life. Seeing so many volunteer tradespeople and suppliers come together to transform the terraced house was a truly special moment and makes for a spectacular reveal. DeterTech volunteers Members of DeterTech volunteered alongside more than 90 incredible tradespeople and suppliers Members of DeterTech volunteered alongside more than 90 incredible tradespeople and suppliers – from builders and electricians through to landscapers and gardeners. DeterTech also supplied the site security solutions necessary to protect people, tools and materials throughout the build. Speaking about the project Michael Kennedy, CFO, DeterTech, says: “We pride ourselves on bringing greater peace of mind to people and communities every day. Being there on reveal day to see the reaction is something I’ll never forget. I’d like to pay huge thanks to the entire DIY SOS family for involving us, and to all the volunteers, suppliers and organisers who worked so hard to create a better future for Cayden and his family.” DeterTech on board Helena Ryan, Managing Director Cooga Safety Services Group and Safety Supervisor for DIY SOS: The Big Build Ireland, adds: “One of the builds that features this series had 1,346 people on site, all of whom benefitted from the services DeterTech provides. DeterTech went above and beyond, did phenomenal work and I look forward to collaborating again in the future.” Orlagh Murphy of indiepics, the production company behind the show, concludes: “Having DeterTech on board has been a game-changer for our site safety and security. It gives our crew, contractors and volunteers the confidence they need to press on and transform the homes of our very deserving recipients.”
Boon Edam Inc., a global pioneer in physical security entrance products, is excited to share that American University in Washington, D.C., has completed the installation of five Lifeline Speedlane Compact turnstiles and one Winglock Swing Gate as part of a comprehensive renovation of its Terrace Dining Room (TDR), the university’s main dining hall serving thousands of students, faculty, and staff each day. Improved systems Manual point-of-sale card swipes slowed entry, resulted in higher-than-normal error rates At a university where thousands of students move through campus each day, the entrance to the Terrace Dining Room had become a frequent source of crowding and delays. Long lines routinely snaked up the stairs from the entryway during peak meal times, frustrating community members. Manual point-of-sale card swipes slowed entry, resulted in higher-than-normal error rates, and created demand-based planning challenges. With improved systems, staff can prioritise exceptional guest service rather than managing long lines. Seamless integration Seamless integration with the campus meal plan transaction system eases congestion Seamless integration with the campus meal plan transaction system eases congestion, allowing for more meaningful guest interactions. Additionally, real-time data on guest traffic enables better staffing and demand forecasting, ensuring the right team is in place to elevate the overall experience. The university needed a more intelligent, streamlined solution that could improve flow, enable better planning, and support a better dining experience for its students, faculty, staff, and guests. Comprehensive transformation As part of a comprehensive transformation of the TDR, American University (AU) selected Boon Edam’s Lifeline Speedlane Compact turnstiles to deliver a secure, modern access solution that aligned with the dining hall’s upgraded design and high traffic demands. From the earliest planning phases, access management and control were a top priority. Working closely with the university’s OneCard, auxiliary services technology, and planning and project management teams, Chartwells Higher Education, and the Atrium Campus support team, Boon Edam provided a solution that met the university’s vision for fast, intuitive, and secure student entry. Students now tap their AU OneCard to gain immediate access with real-time verification of meal plan status and account balances. The system has been fully integrated with the Atrium Campus meal plan system, delivering a seamless user experience. Speedlane design The system enables seamless movement, improving security and meal plan integrity Boon Edam’s sleek, low-profile Speedlane design complements the architectural aesthetic of the new space, while advanced security measures ensure only authorised users gain entry. The system enables seamless movement, improving security and meal plan integrity without creating a restrictive feel. “This was a strategic effort to blend security, efficiency, and design,” said Michael LoBasso, Associate Director of Auxiliaries Technology at American University. “It was a true collaboration with Boon Edam, Chartwells, our campus partners, and Atrium Campus to create a dining experience that’s secure, smart, and seamless.” Enhanced efficiency With thousands of students passing through the Terrace Dining Room during peak hours, American University needed a solution that could keep pace with real-world campus demand. Boon Edam’s Lifeline Speedlane Compact turnstiles delivered, combining bi-directional access control, intuitive LED guidance, and fast user identification to eliminate bottlenecks and maintain steady throughput during the day. Two Speedlane Compacts serve as dedicated entrances, three more manage exit flow, and a Winglock Swing gate provides additional flexibility for deliveries and large group access. Operational oversight This layout enables smooth, consistent movement in and out of the facility, freeing staff from manual enforcement and allowing them to focus on service and hospitality. The system has proven reliable under pressure, handling volume efficiently while supporting the university’s goals around student satisfaction and operational oversight. Accessibility and modernisation The new layout supports smoother traffic flow, more inclusive dining options The renovation of the Terrace Dining Room was more than a visual upgrade. It was an investment in the student experience, operational efficiency, and forward-thinking design. The new layout supports smoother traffic flow, more inclusive dining options, and a welcoming space where students can gather, recharge, and connect. American University’s focus was on accessibility and modernisation, and Boon Edam’s Speedlane Compact turnstiles contributed meaningfully to that vision. They helped to improve secure access with low energy consumption and a minimal operational footprint. The result is an access solution that fits seamlessly into a high-volume environment while aligning with long-term sustainability goals.
Genetec Inc., the pioneer in enterprise physical security software, announced that its cloud-based vehicle investigation system, Cloudrunner™, is now hosted in Canada on the Microsoft Azure cloud platform. This will ensure that sensitive data for Canadian law enforcement, security agencies, and private-sector organisations remains in Canada while delivering responsiveness, scalability, and reliability. Vehicle-centric investigation system Cloudrunner is a cloud-native vehicle-centric investigation system that helps public safety agencies Cloudrunner is a cloud-native vehicle-centric investigation system that helps public safety agencies and security teams detect, analyse, and respond to vehicle-related crime. Designed with privacy and compliance in mind, Cloudrunner supports proactive policing and community safety. It offers real-time alerts, historical search tools, and an intuitive map-based interface that makes it easy to visualise vehicle activity, collaborate across jurisdictions, and share insights securely. Data-driven tools “With vehicle-related crime on the rise in Canada, law enforcement agencies need powerful, data-driven tools that help them solve cases faster and keep communities safe,” said Larry Legere, Commercial Director at Genetec Inc. "By hosting Cloudrunner in Canada, we're giving agencies the tools they need to make quick, informed decisions that help them stay ahead of criminal activity, while keeping sensitive data within our borders.” Users can quickly identify vehicles Cloudrunner enables users to quickly identify vehicles of interest, even with partial information By combining automated licence plate recognition (ALPR) with rich metadata, such as vehicle type, make, model, and colour, Cloudrunner enables users to quickly identify vehicles of interest, even with partial information, at any time of day or night, and in any weather condition. The platform supports real-time hotlist alerts, historical search capabilities, and investigative tools that help law enforcement locate suspects on the move, and close cases faster. Evaluation of Cloudrunner "One of our primary considerations during the evaluation of Cloudrunner was ensuring that all collected data would be securely stored and remain within Canadian borders," said Jeff Joyce, Manager - Parking Services, at the University of British Columbia (UBC). "Data sovereignty was a non-negotiable priority for us, as it not only addresses regulatory requirements but also reinforces our commitment to protecting sensitive information and upholding the trust of our campus community." Setting up Cloudrunner Canada now joins a growing list of countries, including the United States, Australia, and New Zealand, where Cloudrunner is hosted locally to meet the needs of agencies that require data to reside within national borders. New and existing Canadian users will automatically use Canada as their hosting region when setting up Cloudrunner, with no changes to existing workflows.
Nightwatch Security & Telephone LLC, Sedalia, Mo., took a common problem for first responders – ready access to schools in an emergency – and turned it into a positive with a cloud management platform. Nightwatch owner Jeff Kesterson is partnering with local law enforcement on implementing an Emergency Response Platform (ERP) which gives police, sheriff and state highway patrol agencies in Sedalia and Pettis County greater accessibility and situational awareness at local school campuses. Cloud management platform The company provides access control, intrusion detection and video surveillance, managed via the Connect ONE Leveraged through the Connect ONE® by Connected Technologies cloud management platform, first responders and School Resource Officers (SROs) can view real-time activity at local schools, initiate immediate access, or lock down the protected premises. Nightwatch is the systems integrator and physical security service provider to the Sedalia School District (Sedalia 200), one of the largest districts in the county with over 4,500 students in PK-12 facilities; Sacred Heart School; La Monte R-IV School in neighbouring La Monte, Mo., and Greenridge R-VIII. The company provides access control, intrusion detection and video surveillance, managed through the Connect ONE cloud platform management interface. Remote locking and unlocking capabilities “We asked Connected Technologies to develop a simple way to update, administer and input agency officer’s codes/credentials for the schools through Connect ONE,” said Jeff Kesterson. “They came back with the ERP, which unifies all the school’s individual systems into one interface for viewing, management and control without separate site logins. It goes even further, and allows remote locking and unlocking capabilities during critical threats,” he said. Fobs and system permissions Users can manage the fobs and system permissions in one place for all the schools viathe ERP Kesterson added that first responders, as well as SROs at each school, maintain access with proximity access control key fobs, but updating the devices to stay current with staffing changes was unwieldy. Now, users can manage the fobs and system permissions in one place for all the schools through the ERP. Sedalia 200 school administration manages more than 700 fobs annually, utilising the Connect ONE platform daily. The ERP provides agencies with a separate login with certain designated permissions for first responders who can only see customer site locations shared by Nightwatch. Via the emergency dashboard, first responders can login to view cameras (where implemented), unlock doors and outputs, activate task functions, initiate lockdown and view recent activity. Door access control and camera viewing The Sedalia Police Department has access to schools within the city limits: Sedalia 200 which includes 10 schools plus administration and maintenance buildings and Sacred Heart School. The Missouri State Highway Patrol A has access to the same schools as the Pettis County Sheriff’s Office The Pettis County Sheriff’s Office has access to Sedalia 200 schools and buildings; Sacred Heart School; La Monte R-IV; and Greenridge R-VIII school districts. The Missouri State Highway Patrol A has access to the same schools as the Pettis County Sheriff’s Office. The ERP allows Nightwatch to easily set up various zones of jurisdiction, giving first responders access to the schools they are obligated/expected to respond to an emergency. Of the four school districts using the ERP, all except Sacred Heart School provide both door access control and camera viewing/playback to the departments with access. ERP for enhanced accessibility and response Commander Joshua Howell, Operation's Support Bureau, Sedalia Police Department, said the ERP is a huge timesaver, and allows the department to administer key fob credentials, streamlining the process when personnel access requires modification. “Ease of administering credentials was important and adding or removing personnel from the system was clunky before the ERP. Instead of logging into all the school systems separately, we can look at everything in one place,” he said. Commander Howell added that the platform allows authorities to unlock doors if an emergency responder doesn’t have a proximity device, saving time as opposed to dispatching a patrol officer to the scene. The Pettis County Sheriff’s Office is also leveraging the ERP for enhanced accessibility and response readiness. School safety planning Sheriff’s Office has over 650 square miles in the county, including Sedalia and smaller cities “This has been a great tool for us,” said Sergeant John Cline, SRO Unit Supervisor, Pettis Co. Sheriff’s Office. “We’re continuing to build it out and have integrated it into our school safety planning. Being able to remotely manage key fobs and initiate lockdowns – there’s substantial benefit to having that immediate control,” he said. The Sheriff’s Office has jurisdiction over 650 square miles in the county, including Sedalia and several smaller cities. It manages some 40 key fob credentials issued to patrol officers and SROs assigned to the schools. SROs serve the daily law enforcement needs of the schools, but if they aren’t available to provide access in an emergency, the ERP provides that function in real-time. Emergency Response Platform Nightwatch provided training on the interface to the units, and Sgt. Cline said it was intuitive “Our schools recognise the importance of having a close relationship with law enforcement,” Sgt. Cline continued. “Being able to get into a building quickly when seconds count has made the relationship that much stronger,” he said. Nightwatch provided training on the interface to the departments, and Sgt. Cline said it was intuitive and easy to grasp in a one-hour session. “The Emergency Response Platform allows Connect ONE dealers to partner with local law enforcement by providing the tools they need to defuse an emergency quickly and effectively with powerful information to view and control facility security,” says Dan Simon, Co-Founder, Connect ONE. “It’s a great solution to assist in public safety while also ensuring you keep a customer long-term.” Other benefits of the Emergency Response Platform A single application screen to add or remove agency personnel system codes/access credentials from shared customer systems. System codes are included in profile templates, so permissions come pre-defined for simple additions by the agency. Permissions may only be modified by the dealer to prevent misconfiguration; customers will maintain the ability to view the permissions without making changes. Activity by agency personnel is reviewable by the customer in reporting and notifications. Connect ONE and the ERP is the unified, cloud management platform for schools that’s making a difference with easier access while increasing situational awareness for first responders.
Xtract One Technologies announced its SmartGateway has been selected by Meridian Public School District (MPSD) in Meridian, Mississippi, to amplify school safety throughout its campuses. The comprehensive, customisable entry screening solution is designed to unobtrusively scan students and visitors with the ability to detect concealed threats before they are brought onto campus, maintaining a secure, yet welcoming, school environment. Xtract One’s SmartGateway Meridian Public Schools selected SmartGateway due to its proven ability to give advanced detection abilities Understanding the importance of fostering a safe learning environment, Meridian Public Schools is set to deploy Xtract One’s SmartGateway initially for the High School, and with plans to eventually deploy across all ten campuses, prioritising the safety of over 4,500 students and 1,000 employees. After evaluating several safety solutions, Meridian Public Schools selected SmartGateway due to its proven ability to deliver advanced detection capabilities with minimal disruptions. Effective safety protocol “Proactive threat detection is crucial for preventing disturbance in educational institutions. The right system combined with a strategic, holistic, and people-first plan makes for an even more effective safety protocol,” said Peter Evans, CEO of Xtract One. “We’re excited to expand our school footprint working with Meridian Public Schools, as our presence helps ensure that students and faculty can prioritise a focus on education without personal safety concerns.” Security challenges and safer environments “At Meridian Public Schools, maintaining the safety of our students, staff, and visitors is our highest priority and our partnership with Xtract One is an example of that,” said Chief Cornelius Parks, Chief of Police at Meridian Public School District. SmartGateway replaces rough metal detectors with fast, reliable, and accurate weapons screening at security “We’re passionate about cultivating safer spaces for the community that allow individuals to enter our buildings, and experience a positive learning environment." "The implementation of SmartGateway demonstrates the shared commitment between MPSD and Xtract One in proactively detecting and addressing security challenges and creating safer environments for the community that allow individuals to enjoy campus life, experience an optimal learning environment, and have peace of mind." SmartGateway AI sensors SmartGateway replaces intimidating metal detectors with fast, reliable, and accurate weapons screening at security checkpoints. Powered by AI sensors, SmartGateway detects threats discreetly, without invading the sense of privacy of those passing through the system. SmartGateway unobtrusively scans individuals for guns, knives, and other prohibited items as they enter the building. The system allows for seamless passage through checkpoints, enabling uninterrupted flow of movement that lets individuals enter the building significantly reducing the need to divest of low-volume personal items.
ZeroEyes, the creators of the first AI-based gun detection video analytics platform to earn the full U.S. Department of Homeland Security SAFETY Act Designation, announced that its proactive gun detection and intelligent situational awareness solution has been deployed by the Erika J. Glazer Family Campus of the Wilshire Boulevard Temple to protect members and staff against gun-related threats. Founded in 1862, it is the oldest Jewish congregation and synagogue in Los Angeles, California. Growing anti-Jewish threats The Public Policy Institute of California also reports that hate crimes in the state have been on the rise The campus spans an entire city block and features the organisation’s Byzantine-Revival Sanctuary, a designated National Register of Historic Places landmark. It also houses the Erika J. Glazer Early Childhood Center, Brawerman Elementary School East, the Edgar F. Magnin Religious School, and the Karsh Family Social Service Center, which serves the surrounding community with a weekly food pantry and provides free dental care, vision care, mental health services, legal aid, and English language support. Amidst the Israel-Hamas war, anti-Jewish threats have surged. According to the ADL, over 10,000 antisemitic incidents were recorded in the U.S. between October 2023 and 2024, the highest number in a single year since the organisation began tracking in 1979. The Public Policy Institute of California also reports that hate crimes in the state have been on the rise for nearly a decade, with numbers spiking in recent years. Multilayered security system The addition of ZeroEyes to its multilayered security system enhances proactive alerting As a religious-based organisation located near Koreatown, Wilshire Boulevard Temple has implemented multiple security measures to protect its 6,000 congregants, including an extensive camera network and advanced access control features. The addition of ZeroEyes to its multilayered security system enhances proactive alerting and situational awareness, helping to prevent and mitigate gun-related violence. “In today’s environment, with heightened tensions and ongoing protests, having a platform that detects weapons and provides real-time situational awareness is instrumental in protecting our congregation,” said Paul Hutchinson, chief security officer at Wilshire Boulevard Temple. “ZeroEyes serves as a force multiplier, enhancing our existing security measures to ensure that our community is safe.” ZeroEyes' AI gun detection If a gun is identified, images are instantly shared with the ZeroEyes Operations Center ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry’s only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to temple staff as quickly as 3 to 5 seconds from detection. Ensuring the congregation’s safety "The freedom to practice one’s faith without fear is a fundamental right,” said Mike Lahiff, CEO and cofounder of ZeroEyes. “We applaud Wilshire Boulevard Temple for taking proactive measures to ensure the safety and well-being of their congregation. Their dedication to creating a secure environment is a powerful example of community leadership."


Round table discussion
Students deserve a safe and positive environment where they can learn and thrive. Teachers and administrators should be able to focus on their primary role of educating students because they feel supported and protected by a comprehensive security plan. Staff require a clear protocol for responding to emergencies. And parents deserve peace of mind that their children are safe during the school day. One of the tools for safer schools is physical security technology. We asked our Expert Panel Roundtable: How can physical security systems make schools safer?
Physical security and cybersecurity are deeply intertwined in today’s systems. A weakness in one realm can quickly lead to a breach in the other, and vice versa. However, given the symbiotic relationship, why do physical security systems so often fall short when it comes to cybersecurity protection? We asked our Expert Panel Roundtable: Why does cybersecurity continue to be a weak link for physical security systems?
Ethics can impact a company's reputation, profitability, and overall sustainability. Ethics extend beyond the law to encompass doing the "right thing" even when it is not legally mandated. As technologies such as artificial intelligence and data sharing continue to impact the physical security industry, a focus on ethics today is timelier than ever. A commitment to moral principles is critical to build a successful, sustainable, and respected industry. We asked our Expert Panel Roundtable: What is the role of ethics when deploying emerging technologies in physical security?
Products


White papers

Combining security and networking technologies for a unified solution
Download
What is a universal RFID reader?
Download
Maximising enterprise security systems in the cloud
Download
The power of integration in physical security systems
Download
Preventing loss, securing assets
Download
Using artificial intelligence (AI) to automate physical security systems
Download
Integrating IT & physical security teams
Download
Verkada workplace safety survey
Download
How to create a successful physical security roadmap
Download
5 easy steps to an upgraded video surveillance system
Download
Improving city mobility using connected video technology
Download
5 ways to strengthen physical security with an integrated system
Download
The benefits of Edge AI + Cloud for security systems
Download
Unified physical security
Download
Integrated access control: reap the benefits of connected security
Download

Videos
Physical security: Manufacturers & Suppliers

Artificial Intelligence in Security
Download
Elevating security through multi-sensing solutions and large-scale AI
Download
Open credential standards and the impact on physical access control
Download
Combining security and networking technologies for a unified solution
Download
What is a universal RFID reader?
Download