Security management
ZBeta, a pioneer in delivering comprehensive physical security consulting services, has appointed Chris Deck as a Senior Technology Consultant. With nearly 30 years of experience in physical security system design, Chris brings deep technical expertise, proven leadership, and a global perspective to his new role. Prior roles of Chris At ZBeta, Chris partners with clients to develop and deliver integrated security infrastructures that tackle intricate challenges, exceed regulatory standar...
Milestone Systems will showcase the new XProtect Evidence Manager at two major industry events this fall: Global Security Exchange (GSX) 2025, Sept. 29-Oct. 1 in New Orleans (Booth 719), and the International Association of Chiefs of Police (IACP) Conference, Oct. 18-21 in Denver (Booth 4011). XProtect Evidence Manager XProtect Evidence Manager represents a compelling shift in digital evidence management systems, bringing Milestone's open platform philosophy to evidence and case handling. The...
Securitas, the intelligent security solutions partner with world-pioneering technology and expertise, announced an ambitious sustainability strategy aimed at helping clients achieve their goals, while creating measurable value for the business. The new sustainability strategy is built on three powerful pillars: develop people, decarbonise business, and demonstrate integrity. These commitments will enhance efficiency, retention, and trust, ensuring the quality and reliability clients can depend...
Allied Universal®, the world’s pioneering security and facility services company, announced that its Unified Command Centre Solution has been named a runner up for the 2025 Project of the Year by Security Distributing and Marketing (SDM) magazine. SDM’s annual Project of the Year Award recognises exceptional commercial security projects in North America and the dealers and integrators behind them. Integrates real-time video analytics The solution optimises logi...
Salto North America has appointed Bob Wilkins as director of marketing and category management, further strengthening its leadership team as the company continues to expand its market presence and deliver solution-driven access control technology. Wilkins, based in St. Louis, will oversee the growth of both the marketing and category management teams. His role will focus on positioning SALTO WECOSYSTEM in the market, supporting business partners, and driving brand awareness across North America...
Securitas Technology, the world’s second-largest commercial electronic security company, will showcase its latest innovations and industry-pioneering capabilities at the Global Security Exchange (GSX) 2025, taking place Sept. 29 to Oct. 1 in New Orleans, Louisiana. As a trusted partner to millions of enterprise clients worldwide, Securitas Technology will use the GSX platform to demonstrate how it is leading the future of integrated security. Experts to discuss security trends At...
News
Anyone responsible for facilities management or security is well aware that access control and keyholding are often challenging and, consequently, can cause a number of operational and even financial issues. Appetite for change Keyholding and access control are dynamic processes that involve daily activity and ongoing management. Keys are frequently stored off-site and exchanged daily. Access cards and fobs require setup. Every lapse creates a chain reaction: replacements, lock changes, risk reporting, all of which consume time, money, and patience. Keyholding and access control are dynamic processes that involve daily activity Against this backdrop, it’s not surprising that more and more organisations of various sizes, both in public and private sectors, are actively seeking alternatives to traditional methods of manned keyholding or manual pen-and-paper visitor logs. There is a clear shift towards technology-led solutions that offer greater reliability, visibility and scalability. The driving force behind this move is not innovation for its own sake but rising service expectations. Things must be done faster, better, more efficiently; FM and security tenders outline stricter requirements for alarm response times and service delivery, with little tolerance for service shortfalls and delays, or penalties will follow. Moving beyond the traditional approach As operational demands evolve, security and FM professionals are beginning to ask the same question: Is there a better way? “Over the past couple of years, we have seen a drastic positive change in attitudes towards new methods of keyholding,” says Stuart Wheeler, Managing Director of Keynetics. The incorporated technology enables the management of access to 100 of locations remotely Keynetics is one of the companies pioneering change in this space, offering smart key management solutions such as SentriGuard. With this system, keys are stored at the point of need in key safes with commercial-grade, certified security. They are accessed either using a temporary code or a mobile app. The incorporated technology enables management of access to hundreds of locations remotely, and provides notifications when keys are not returned or the device battery is running low. Adopting new methods Stuart recalls initial resistance to change in the market. “When we started Keynetics, there was hesitation around adopting new methods. I was told more than once, “No way I am storing keys in a key safe”, but that mindset has shifted entirely.” He attributes the change in attitude to a combination of persistent issues with the existing keyholding methods and increased understanding of the benefits that alternative approaches can offer, particularly if they offer adequate security and greater control. Identified the most common considerations “We’re now seeing strong interest from a wide variety of organisations,” he says, “including security service providers, FM companies and in-house teams operating in a range of sectors.” “Selecting the right system is often the most complex part,” he adds. “Requirements can differ significantly depending on the sector and business model, but there are key areas that tend to come up repeatedly. Over time, we’ve identified the most common considerations raised by both existing customers and those looking for a change.” Access traceability: The top priority While security remains central, the most consistently cited requirement is access traceability, or the ability to see who accessed which property, when, and for how long. In the operating domain, access data is seen as a vital resource, not only for day-to-day management “In many cases, the high security rating of the device was accepted without much debate,” Stuart notes. “What proved to be more important was the ability to run real-time audit reports without needing to visit premises and upload visit logs, or complete some other action to get hold of that valuable access data.” This growing focus is understandable. Technology is now expected to take on tasks previously carried out by personnel, but unmanned systems must still provide a high level of oversight and accountability. In the operating environment, access data is seen as a vital resource, not only for day-to-day management, but also for compliance, reporting and service performance evaluation. Security: The most risk-dependent factor Naturally, security is a high-ranking factor when selecting an access control solution. However, the emphasis placed on it varies significantly depending on the sector and the perceived risks. “For obvious reasons, clients in high-risk sectors, such as banking or government, conduct in-depth evaluations and demand robust certification,” Stuart explains. “We’ve attended countless meetings with some clients, continuously providing proof of both physical and digital security. Smaller companies with lower perceived risks, on the other hand, often acknowledged the security rating and focused more on factors like cost.” The takeaway is clear: while security is crucial, the level of scrutiny it receives is relative to the client’s sector and operational risk. Costs: Are they breaking the bank here? In many cases, new systems are executed not because they are cheap, but because the cost of doing nothing is higher It is in human nature to want the best and the shiniest, but the implementation costs may become the stopping point. For many decision-makers, the question often isn’t whether a solution is ideal, it’s whether it aligns with operational needs at a sustainable cost. FM directors work within fixed budgets, often balancing multiple objectives alongside day-to-day operations. Cost isn't just about the system itself, it is about scale. A high-end solution may be entirely feasible for a business with one manufacturing site, while even a budget-friendly option could prove expensive for someone managing hundreds of retail locations. In many cases, new systems are implemented not because they are cheap, but because the cost of doing nothing is higher. A serious issue with the current method may justify investment, where the price of failure outweighs the cost of change. Practical considerations: Installation, hardware and usability Beyond the top three factors, practicalities such as installation requirements, ease of use and maintenance also influence the decision-making process. Organisations typically seek systems that can be retrofitted with minimal disruption. Common questions include: Is the unit hardwired? Does it need a power supply or internet connection? How long does installation take? Where installation is overly complex, or the benefits do not clearly outweigh the effort required, adoption may stall. On the other hand, a quick, straightforward setup is often seen as a major advantage. Post-purchase support, including maintenance, training and customer service, is usually discussed later in the process, but remains an important factor in long-term satisfaction. System integrations: A logical next step The ability to manage multiple systems, including access control, alarms and cameras, via one interface They live in a digital age where doorbells can be answered from miles away and kettles are turned on with a tap on the phone screen. So it is no surprise that the security sector is so tech-oriented. System integration is fast becoming a top request. The ability to manage multiple systems, including access control, alarms and cameras, through one interface offers a streamlined and time-saving solution that increases control. Stuart notes, “We’re primarily a software development company, so the digital side of our solutions is built with continuous improvement in mind. Right now, one of our long-standing clients is trialling an integration between our system and AJAX alarms. Since they actively use both SentriGuard and AJAX, it makes perfect sense to manage alarm controls within the same key management platform.” While system integration is often not the top priority, it does indicate a forward-thinking, customer-centric approach. No right or wrong Ultimately, choosing the right keyholding or access control solution depends entirely on the end user’s needs. Factors such as access traceability, security (physical and digital), and implementation costs all play a part. There is no one-size-fits-all answer. Some will retain their current methods. Others will go fully keyless. Many will find a golden middle ground. But the journey doesn’t end at purchase. Continuous evaluation, access management refinement, and user feedback are essential to ensure ongoing effectiveness or to justify the search for an even better solution. After all, the market never stands still.
When the doors open at London’s Olympia on 30th September for the International Security Expo 2025, visitors to Stand D110 will find Hirsch UK making a strong statement about the future of integrated, high-security technology. The company, long recognised for its expertise in protecting critical infrastructure and sensitive facilities, will use the event to showcase its full portfolio of Access Control, Perimeter Security, and Video Surveillance solutions. Designed to work seamlessly together, these technologies embody Hirsch’s “edge-to-core” philosophy – a layered approach that protects sites from the outer boundary right through to the control room. International Security Expo Hirsch will be showcasing several of its NPSA (National Protective Security Authority) approved solutions Hirsch will be showcasing several of its NPSA (National Protective Security Authority) approved solutions, underlining their suitability for some of the UK’s most demanding security applications. For Managing Director Richard Huison, recently appointed to lead Hirsch UK, the show is particularly significant. Not only will it be his first International Security Expo with the company, but it also marks an important moment in Hirsch’s ongoing innovation journey. “I’m excited to be joining Hirsch UK at such a pivotal time for the company and to make my first appearance at the International Security Expo under the Hirsch banner,” Huison said. Best minds and technologies “This event brings together some of the best minds and technologies in the security sector, and it’s the perfect platform for us to demonstrate the breadth and depth of our high-security capabilities.” “The launch of Lumor and the opportunity to showcase Velocity Central mark a significant step forward for Hirsch, but they’re just part of a much wider portfolio we’ll be bringing to the show. I look forward to engaging with customers, partners, and peers over the two days,” concluded Huison. Intrusion detection system Lumor can be fence-mounted or buried to provide accurate, real-time detection and location of potential intrusions At the centre of the stand will be the premiere of Lumor, a next-generation fibre optic perimeter intrusion detection system. Designed for exceptional flexibility, Lumor can be fence-mounted or buried to provide accurate, real-time detection and location of potential intrusions, even in the most challenging conditions. With its passive fibre design and minimal maintenance requirements, Lumor offers dependable performance and long-term value. Integrated security management platform Visitors will also have the opportunity to experience Velocity Central, Hirsch’s latest edge-to-core integrated security management platform, unifying access control, video surveillance, and intrusion detection into a single, intuitive interface. Live demonstrations will show how Velocity Central’s real-time mapping, event prioritisation, and integrated video verification empower operators to make faster, better-informed decisions. Velocity Access Control But Hirsch’s presence at the show goes far beyond Lumor and Velocity Central But Hirsch’s presence at the show goes far beyond Lumor and Velocity Central. On Stand D110, attendees will see a broad cross-section of the company’s security technologies, including Velocity Access Control, the powerful analytics-driven Velocity Vision Video solutions and NPSA Approved perimeter intrusion detection products, all of which are engineered for the most challenging environments. Visitors should also look out for live demonstrations of Hirsch’s NPSA- approved HatchSecure hatch detection system in the Live Immersive Arena - where Hirsch is a proud Sponsor - throughout the show. This specialist solution provides high-assurance monitoring for hatches, delivering early warning of tampering or unauthorised entry. HatchSecure Solution For Hirsch UK’s Director of Perimeter, Adam O’Reilly, the Immersive Arena is an ideal place to experience Hirsch UK’s NPSA Approved HatchSecure Solution and underlines the strength of Hirsch’s high-security Perimeter Portfolio. “International Security Expo’s Live Immersive Arena is the perfect stage to show HatchSecure in action, demonstrating how we detect and deter real-world attempts to compromise critical access points,” said Adam O’Reilly. “The HatchSecure demonstrations will give attendees a close-up look at its precision detection capabilities and ease of integration into broader security systems and highlights our commitment to giving customers clearer insight, faster response, and stronger protection across complex sites.” Trusted partner Hirsch’s presence at the International Security Expo underscores its role as a trusted partner for organisations that cannot afford to compromise on security. With live demonstrations, product launches, Stand D110 promises to be a must-visit destination for anyone seeking to explore the next generation of integrated, high-security solutions.
Everon, a major security integrator and premier provider of commercial security, video, fire and life safety solutions ranked the third-largest security company in the U.S. by SDM Magazine, announced the promotion of Carson Clemons to Vice President, National Accounts Installation. With 13 years of combined operational and sales experience in the security industry as Sr. Manager, Operational Excellence and Sr. Director, National Accounts for Everon, Clemons brings proven leadership to this new role for Everon, overseeing the company’s centralised project and programme management teams within the National Accounts and Integrated Solutions departments. Operational excellence His expertise in operational excellence will be critical in optimising operations for a customer experience that thrives on consistency, efficiency and superior customer experience across the organisation. ”Our top priority is always our customers,” said Bobby Dale, Chief Customer Officer. “Carson’s ability to focus on customer needs and deliver with speed, quality, and dependability makes him the right leader to lead and strengthen this critical part of our business.” “I’m proud of the work these teams have done to deliver service quality at a national level,” said Clemons. “We are focused on optimising our processes to make every customer interaction seamless – prioritising speed, communication, consistency, and simplicity – and it’s an honour to have the opportunity to help lead the way.”
ZBeta, a pioneer in delivering comprehensive physical security consulting services, announced that Vince Machi has been promoted to Director of Client Program Operations. In his new role, Vince will lead the continued evolution of ZBeta’s client programs — aligning delivery excellence with the organisation’s broader strategic objectives. Machi, who previously served as Client Partner, brings more than two decades of experience in physical security, programme leadership, and technical operations. His promotion reflects the company’s commitment to delivering streamlined, data-driven, and human-centered solutions at scale. Translating strategic intent “Vince is an exceptional leader with a strong command of the complexities inherent in our work,” said Jesse Knutson, Chief Operating Officer, ZBeta. “He has a unique ability to translate strategic intent into day-to-day action, which enables our teams to operate at its highest potential. His continued leadership will be instrumental in driving consistency, quality, and innovation across every client programme we support.” Key connector Vince will serve as a key connector between ZBeta’s client-facing teams and its executive leadership Vince will serve as a key connector between ZBeta’s client-facing teams and its executive leadership. He will work closely with operational leads to manage resource planning, standardise programme delivery, and support long-term growth across the business. With a solid track record in optimising complex security initiatives, Vince is well-positioned to drive the next phase of operational maturity within ZBeta. His unique blend of technical depth, operational rigour, and client focus will help ensure the company’s programs are efficient and scalable as well as tailored to each client’s unique mission and risk environment. Exceptional security outcomes “ZBeta is redefining what it means to deliver exceptional security outcomes,” Vince said. “This new role gives me the opportunity to build on the trust we’ve established with our clients and support the continued development of our world-class team. I’m honoured to help shape how we execute, evolve, and grow — internally and in partnership with the organisations we serve.” Prior to joining ZBeta, Vince held leadership roles at Convergint Technologies and served in the U.S. Navy, where he developed an understanding of operational discipline and mission-critical coordination.
The Revolutionary FAR Overhaul (RFO) marks the most sweeping rewrite of the Federal Acquisition Regulations in over four decades. As a result, contractors and subcontractors are navigating the intensified focus on domestic sourcing requirements, multi-tiered sourcing provisions and the heightened risk of stop-work orders, contract terminations and settlement processes. However, with change comes opportunity. As the DoD moves to modernise, accelerate awards, streamline regulations and implement preferences for commercial items, the defence industrial base is poised for transformation! Conference's featured perspectives The conference will feature perspectives from an esteemed speaker faculty, including: Peter Guinto, Senior Advisor for Defence Pricing and Supplier Management, OSD Defence Pricing, Contracting and Acquisition Policy, Department of Defence Gary Kaufman: Program Security Officer, United States Department of Defence Use promo code D10-999-SS26 at registration to save an additional 10%!
International SOS, the world’s pioneering health and security risk management services firm, announced a strategic partnership with Exlog Global (Exlog), a boutique, veteran-owned risk solutions provider. Together, they will deliver a seamless, intelligence-led executive services solution that integrates security and protective intelligence in one unified program. Intelligence and threat monitoring The joint solution will feature executive exposure assessments, protective intelligence and threat monitoring The joint solution will feature executive exposure assessments, protective intelligence and threat monitoring, a dedicated executive response hotline, high-quality security and medical support and proactive escalation protocols. Optional services include executive protection, residential and office Physical Security Assessments, security awareness training, risk assessments, online profile reduction, resilience training and technical surveillance countermeasures. Exlog Global’s protective intelligence capabilities Giles Hill, Global Head of Security Services, International SOS, said, “By combining our global intelligence, security, and medical expertise with Exlog Global’s protective intelligence capabilities, we are able to deliver a powerful executive services program that meets the ever-evolving needs of our clients." George Taylor, CEO, Exlog Global, said, “This partnership ensures that pioneers are supported by best-in-class protective intelligence, security, and health integration—delivered discreetly, globally, and with measurable value.” Evolving threat landscape Exlog is a veteran-founded U.S. risk solutions firm that has protective intelligence, contingency planning Exlog is a veteran-founded U.S. risk solutions firm that delivers protective intelligence, contingency planning and critical incident response backed by 24/7 global monitoring customised to end user requirements. This collaboration unites two industry pioneers dedicated to safeguarding people and organisations against the complex and evolving threat landscape. Integrated medical and security assistance International SOS brings over 40 years of experience supporting multinational corporations, governments, and NGOs with integrated medical and security assistance in more than 190 countries. Leveraging elite military, intelligence, and risk management backgrounds, Exlog complements this global footprint with specialised expertise in protective intelligence, critical incident response and the development and staffing of client-dedicated GSOCs and VSOCs. Shared commitment to global assistance The partnership is grounded in a shared commitment to global assistance, integrated expertise and proven value. By aligning capabilities, International SOS and Exlog deliver: Global Reach – Operational capability in 190+ countries. Integrated Expertise – A unified health, intelligence, and security program. Proven Value – Cost and operational efficiency by consolidating fragmented vendor solutions. Privacy Prioritisation – Highest levels of data privacy and discretion with information. Standards-Based Delivery – Best practice aligned with ISO 31000, 31030, and 22361. This partnership underscores both organisations’ mission to protect people and enable organisations to operate with confidence—anywhere in the world.


Expert commentary
As the world’s security landscape grows ever more complex, the need for a dynamic, comprehensive, and globally minded gathering of thought pioneers and practitioners has never been more pronounced. Enter the Global Security Exchange (GSX) 2025, hosted by ASIS International, a signature event representing seven decades of commitment to advancing the security profession. This year marks a historic milestone, as GSX and ASIS International both celebrate 70 years of shaping the future of security, with New Orleans serving as the perfect host city for this anniversary celebration; making the 2025 conference not only a convergence of expertise but a tribute to the security profession’s evolution and resilience. Setting the stage: A global gathering with a rich legacy GSX has established itself as a premier international forum, bringing together security professionals Since its inception, GSX has established itself as a premier international forum, bringing together security professionals from nearly 100 countries across the globe. This diversity is both a testament to the universal importance of security and a reflection of GSX’s core objective—unifying security and business professionals under a shared mission: to elevate the industry through education, collaboration, and innovation. GSX’s member-driven approach GSX’s programming is carefully curated each year through a rigorous speaker proposal submission process by security professionals for security professionals. ASIS International consults extensively with its global membership and prior attendees to assess shifting educational needs and emerging industry priorities. This member-driven approach ensures that GSX continually evolves, remaining attuned to the rapidly changing security environment and the real-world concerns of professionals in every corner of the globe. Programming highlights: Education at the core The agenda features more than 200 sessions, giving a masterclass in the most pressing and transformative topics The heart of GSX 2025 lies in its robust educational offerings. This year, the agenda features more than 200 sessions, presenting a masterclass in the most pressing and transformative topics facing the security sector today. Three standout speakers Ian Bremmer, Sol Rashidi, and General Paul Nakasone - luminaries in geopolitics, artificial intelligence, and cybersecurity respectively—will headline the event, offering insights that bridge current realities with future opportunities. These keynote presentations promise to set the tone for an event dedicated to thought leadership and actionable intelligence. GSX 2025’s challenges and emerging trends GSX 2025’s educational framework is structured around nine distinct track themes. Each track addresses a critical area of security management, capturing both enduring challenges and emerging trends: Crime: Delving into the latest strategies for preventing, detecting, and responding to criminal activity in a world where threats are increasingly complex and transnational. Digital Transformation: Exploring the integration of cutting-edge technologies into traditional security operations, including automation, analytics, and the digitalisation of security infrastructure. Information Security/Digital Risk: Addressing the ever-expanding need to protect data, intellectual property, and privacy against cyber threats and breaches. Law/Ethics: Focusing on the legal and ethical dilemmas that security professionals navigate, from compliance to responsible innovation. Managing Organisations: Providing strategies for effective leadership, organisational change, and operational excellence within security teams and entities. National Security: Examining the intersection of corporate, governmental, and civic security with a global lens on terrorism, conflict, and cross-border risks. Physical/Operational Security: Reinforcing the foundations of asset protection, site security, and crisis response through practical case studies and new methodologies. Professional Development: Empowering attendees to advance their careers through skills training, certifications, and leadership development. Risk Management: Mapping techniques to assess, mitigate, and manage risks in a broad array of operational contexts. Together, these tracks create a comprehensive curriculum spanning the complete landscape of contemporary security—from foundational principles to emerging innovations, from physical infrastructure to digital domains, all viewed through an authentically international lens. Innovation in action: Beyond the classroom One of the hallmarks of GSX 2025 is its commitment to making education not just informative, but immersive and accessible. Attendees will find a wealth of learning opportunities woven directly into the Exhibit Hall itself. No longer confined to traditional classrooms, education pulses throughout the venue, with exhibitors invited to showcase their latest insights and real-world solutions to the industry’s most urgent trends. With approximately 500 exhibitors represented, this expansion transforms the Exhibit Hall into a vibrant nexus of exchange, discovery, and hands-on engagement. GSX’s broader ethos No special gear needed, just bring your device and headphones to access live AI-powered captions To further enhance inclusivity and participation, GSX 2025 is pioneering the use of real-time translations through Wordly, for 35 select sessions over the course of this three-day event. This feature ensures that language barriers do not hinder the sharing of ideas, enabling attendees from around the world to fully engage with content and collaborate across borders. This digital transformation is emblematic of GSX’s broader ethos: embracing innovation and experimentation to create greater access to professional development tools within the security profession. No special gear needed, just bring your device and headphones to access live AI-powered captions and translations. Specialised zones and rapid learning GSX 2025's Exhibit Hall transforms into a vibrant ecosystem of discovery, where dedicated learning stages create immersive worlds of specialised knowledge. Journey through the School Security Zone to unlock cutting-edge solutions protecting our educational communities; experience the Organisational Resilience Zone where tomorrow's adaptive strategies come to life; and energise at the X Stage, where security pioneers and integrators accelerate their expertise through lightning-fast, game-changing insights that drive real-world impact. Signature events and unique experiences No GSX experience would be complete without opportunities to connect, celebrate, and unwind No GSX experience would be complete without opportunities to connect, celebrate, and unwind. This year, “ASIS Celebrates!” will take place at the historic National WWII Museum, providing a unique backdrop for networking, reflection, and community building. Beyond formal programming, GSX 2025 pays attention to the “little touches” that make a big difference—such as the Security SyncUP Lounge, where attendees can relax, recharge, and reconnect in a welcoming setting that fosters meaningful exchanges and new friendships. The future of security, united GSX 2025 stands as a testament to seventy years of progress, learning, and community in the global security profession. As participants converge from every corner of the world, the event offers not just a forum for knowledge-sharing, but a catalyst for innovation, collaboration, and progress. With an agenda shaped by its members, a program rich in content and diversity, and a spirit of experimentation and inclusion, GSX 2025 is poised to once again set the standard for what it means to protect, connect, and inspire in a rapidly changing world.
Physical security isn’t a one-time project or a static system. It’s a dynamic, ongoing process and program that requires constant attention and management to remain effective. While the initial implementation of a security system — what we often call Day 1 — is critical, the ongoing maintenance, service, and adjustments made after systems are operational, or Day 2, are equally essential. Security program long-term Organisations that fail to focus on post-occupancy security operations risk falling victim Organisations that fail to focus on post-occupancy security operations risk falling victim to a phenomenon known as "program drift," where systems and policies gradually deviate from their intended standards over time. To manage your security program long-term, you often need an outside perspective. By engaging a security partner to provide managed services, organisations can achieve a strategic solution for maintaining their security programs' integrity, effectiveness, and efficiency over the long term. Let’s look at the reasons why. Moving beyond Day 1 Day 1 is the milestone moment when a security system is launched — whether it’s a new system, an upgraded access control platform, or a transition to advanced surveillance technology. On this day, all components align with established policies and standards. Yet, Day 1 is only the beginning of a security program's lifecycle. What happens on Day 2 and beyond is often where the real work begins. Without a robust plan for ongoing service and maintenance, security systems can quickly fall out of compliance. Policies become outdated, configurations drift, and vulnerabilities emerge. This gradual degradation — program drift — occurs not due to neglect but as a natural result of decentralised management; competing operational priorities; and the lack of dedicated, knowledgeable resources to oversee the systems. Avoiding program drift Drift is particularly pronounced in physical security because, unlike other building systems Program drift occurs when a security program’s elements — such as access controls, camera placements, or intrusion detection settings — gradually become misaligned from their intended standards. Think of a straight line representing perfect compliance on Day 1. Over time, various factors push individual components off this line. Left unchecked, these deviations accumulate, leading to significant vulnerabilities and deferred remediation costs that would be much easier to manage and predict with a more proactive approach. Drift is particularly pronounced in physical security because, unlike other building systems such as lighting or HVAC, security measures are often viewed as inconveniences. Even when systems function as designed, features like turnstiles, visitor management, or additional access controls may face pushback for being "in the way" of daily operations. This resistance and the Day 2 problems that often result — along with the lack of centralised oversight — exacerbate the risk of misalignment and ongoing inefficiencies. Why centralised post-occupancy management matters Post-occupancy management is critical for maintaining the long-term health of a security program. Facility managers, who are often tasked with overseeing security systems, may lack the technical expertise or bandwidth to handle the complexity of modern security infrastructure. Partnering with dedicated professionals to help meet these responsibilities ensures systems are managed effectively and vulnerabilities are addressed proactively. It also helps improve system availability and uptime, accelerate break/fix response and resolution times, lower ownership costs by reducing unnecessary and repeat service dispatches, and achieve a more consistent end-user experience. Moreover, centralised management provides a consistent framework for handling security systems across multiple sites. This consistency is vital in preventing Program Drift, ensuring that local variations or individual decisions do not undermine the organisation’s overall security posture. The case for managed services Hiring outside consultants offers a proactive and professional approach to mitigating program drift Hiring outside consultants offers a proactive and professional approach to mitigating program drift. Specialised providers have the expertise, tools, and resources to manage complex security systems effectively and ensure those systems remain aligned with organisational policies and performance expectations. By acting as a dedicated external resource and interfacing regularly with your security team, your consultant can help you build, manage, and optimise a variety of services that help keep your program on track. These services range from system health and availability management (break fix); move, add change management; system configuration administration; and program/project management offices. Key benefits in the following areas Let’s look at how a managed services a partner can yield key benefits in the following areas: Standards compliance. Centralised management ensures that security systems and processes remain in compliance with established policies and standards, reducing vulnerabilities caused by ad hoc changes or decentralised management. Operational efficiency. Managed services streamline maintenance and support workflows, minimise downtime, and ensure quick issue resolution. Enhanced security resilience. Proactive monitoring and maintenance reduce the likelihood of system failures and improve overall system reliability. Standardised processes for move-add-change (MAC) activities ensure that security configurations remain consistent across locations. Cost savings. Outsourced providers help organisations optimise resources, avoid errors, and benefit from economies of scale in service delivery. Strategic focus. Outsourcing also allows internal teams to shift their focus from routine operational tasks to higher-value activities, such as strategic planning, threat analysis, and incident response. Long-term value of security investments While Day 1 success is the foundation of a comprehensive program, what happens on Day 2 determines your ability to realise the long-term value of your security investments. As the complexity of security challenges grows, pioneers must prioritise sustained management and professionalised oversight to protect their organisations, making the conversation around post-occupancy security more critical than ever. By adopting innovative strategies, implementing mature toolsets and processes, and leveraging specialised expertise, organisations can ensure their programs remain robust, aligned, and prepared to meet the challenges of tomorrow.
The physical security industry has been in love with the cloud for quite some time. And understandably so. The promise of instant scalability, centralised access, and simplified maintenance is hard to ignore, especially in an era of remote work and distributed facilities. But reality is catching up to the hype. For many, especially those dealing with video surveillance at scale, the cloud is no longer the catch-all solution it once seemed. Rising costs, bandwidth limitations, and latency issues are exposing its shortcomings. And the more resolution increases, from HD to 4K and beyond, the heavier that burden becomes. Modern security cameras This is where edge computing, specifically AI-enabled edge processing available in modern security cameras, starts to look less like an option and more like a necessity. But it’s not just about adding intelligence to cameras. It’s about how that intelligence is deployed, scaled, and maintained. This leads us to containerisation and tools such as Docker, which are a revolutionary piece of the puzzle. When cloud isn't enough Cloud analytics for video sounds great in theory: stream everything to the cloud Let’s start with a basic issue. Cloud analytics for video sounds great in theory: stream everything to the cloud, let powerful servers do the thinking, then serve up results to end-users in real time. However, in practice, this model can break down quickly for many end-users. Raw video is heavy. A single 4K camera streaming 24/7 can generate terabytes of data per month. Multiply that by hundreds or thousands of cameras, and the bandwidth and storage costs become unsustainable. Then there’s latency. If AI needs to detect a person entering a restricted area or identify a licence plate in motion, seconds count. Routing video to a cloud server for analysis and waiting for a response can introduce delays. Adding in concerns about uptime, such as what happens if the internet connection goes down, it becomes clear why relying exclusively on the cloud creates friction for mission-critical deployments. The edge advantage Edge processing turns that model on its head. Instead of sending everything out for analysis, edge-enabled cameras do the heavy lifting on-site. AI algorithms run directly on the device, interpreting what they see in real time. They generate metadata—lightweight descriptions of events, objects, or behaviors—rather than raw video. This metadata can be used to trigger alerts, inform decisions, or guide further review. The benefits are obvious: latency drops, bandwidth use plummets, and storage becomes more efficient. Edge processing solves many cloud deployment issues by keeping the compute where the data is generated, on the device. This frees the cloud up to do what it’s best at: providing scalable and centralised access to important footage. But where does the edge go from here? How do we evolve these powerful IoT devices to deliver even more situational awareness? Enter Docker: An app store for Edge AI They package an app along with everything it needs to run: the code, settings, libraries, and tools This is where the concept of containerisation and open development platforms like Docker comes in. Let’s start with an analogy that is helpful for understanding containers. Imagine you're getting ready for a trip. Rather than hoping your hotel has everything you need, you pack a suitcase with all your essentials: clothes, toiletries, chargers, maybe even snacks. When you arrive at your destination, you open the suitcase and you’re ready to go. You don’t need to borrow anything or adjust to whatever the hotel has, since you’ve brought your own reliable setup. Containers in software work the same way. They package an app along with everything it needs to run: the code, settings, libraries, and tools. This means the application behaves exactly the same, whether it’s running on a developer’s laptop, on the edge in an IoT device, or in the cloud. Security camera with a powerful edge processor There’s no last-minute scrambling to make it compatible with the environment it lands in, because it’s self-contained, portable, and consistent. Just like a well-packed suitcase simplifies travel, containers simplify software deployment. They make applications faster to start, easier to manage, and more predictable, no matter where they’re used. For a security camera with a powerful edge processor, it’s like giving the camera its own specialised toolkit that can be swapped out or upgraded without touching the rest of the system. It also means you can run multiple AI applications on a single camera, each in its own isolated environment. Integrators and end-users These applications don’t interfere with each other and can be updated independently Want to add fall detection to a healthcare facility’s camera network? Just deploy the analytics in a container. Need to monitor loading docks for pallet counts at a warehouse? Spin up a different container. These applications don’t interfere with each other and can be updated independently. As a developer, if you use an open container platform like Docker, any system that supports Docker can utilise your software. This removes the need to do expensive custom work for each partner and ecosystem. This is one reason Docker containers are tried and true in the larger IT space and are just starting to get traction in the security sector. Docker also makes this scalable. Developers can build AI tools once and push them out to hundreds or thousands of devices. Integrators and end-users can customise deployments without being locked into proprietary ecosystems. And because containers isolate applications from core system functions, security risks are minimised. Metadata, not megabytes Traditional video analytics systems often require full video streams to be processed One of the most underappreciated aspects of this method is the way it redefines data flow. Traditional video analytics systems often require full video streams to be processed in centralised servers, either on-premises or in the cloud. This model is brittle and costly, and it’s also unnecessary. Most of the time, users aren’t interested in every frame. They’re looking for specific events. Edge AI enables cameras to generate metadata about what they see: “Vehicle detected at 4:02 PM,” “Person loitering at entrance,” “Package removed from shelf.” This metadata can be transmitted instantly with minimal bandwidth. Video can still be recorded locally or in the cloud, but only accessed when needed. This dramatically reduces network load and allows the cloud to be used more strategically: for remote access, long-term archiving, or large-scale data aggregation, without being overwhelmed by volume. Building smarter systems, together A single camera can run analytics from multiple third parties, all within a secure, containerised framework An equally important aspect of containerisation is how it opens up the ecosystem. Traditional security systems are often built as closed solutions. Everything—from the cameras to the software to the analytics—comes from a single vendor. While this simplifies procurement, it limits innovation and flexibility. Docker flips that model. Because it’s an open, well-established standard, developers from any background can create applications for edge devices. Integrators can mix and match tools to meet unique customer needs. A single camera can run analytics from multiple third parties, all within a secure, containerised framework. This is a profound shift. Security cameras stop being fixed-function appliances and become software-defined platforms. And like any good platform, their value increases with the range of tools available. Hybrid: The realistic future So, where does this leave the cloud? It is still essential, but in a more specialised role. The most robust, future-proof architectures will be hybrid: edge-first and cloud-supported. Real-time detection and decision-making happen locally, where speed and uptime matter most. The cloud handles oversight, coordination, and data warehousing. Real-time detection and decision-making happen locally, where speed and uptime matter most This hybrid model is especially useful for organisations with complex deployments. A manufacturing plant might retain video locally for 30 days but push older footage to the cloud to meet retention requirements. A retail chain might analyse customer flow on-site but aggregate trend data in the cloud for HQ-level insight. Hybrid gives organisations the flexibility to optimise cost, compliance, and performance. Regulatory realities It’s also worth noting that not every organisation can, or should, store data in the cloud. Privacy regulations like GDPR in Europe or similar laws elsewhere require strict control over where data is stored. In many cases, sensitive footage must remain in-country. Edge and hybrid models can make compliance easier by minimising unnecessary data movement. Conclusion: Smart security starts at the edge The next wave of innovation in physical security won’t come from bigger cloud servers or faster internet connections. It will come from smarter edge devices, with cameras and sensors that don’t just record, but understand and classify events. And the foundation for that intelligence isn’t just AI, but how that AI is deployed. Containerisation via platforms like Docker is unlocking new levels of flexibility, security, and scalability for the physical security industry. By embracing open standards, supporting modular applications, and rethinking how data flows through the system, physical security professionals can build solutions that are not only more effective but also more sustainable, secure, and adaptable. The cloud still has its place. But the edge is essential to the future for real-time intelligence, mission-critical uptime, and cost-effective deployment.
Security beat
Anyone who has been in a proverbial cave for the last couple of years faced a language barrier at this year’s ISC West 2025 trade show. The industry’s latest wave of innovation has brought with it a new bounty of jargon and buzzwords, some of which I heard at ISC West for the first time. As a public service, we are happy to provide the following partial glossary to promote better understanding of the newer terms. (Some are new to the security industry but have been around in the IT world for years.) Obviously, if we can’t understand the meaning of the industry’s lexicon (and agree on the meaning of terms!), we will struggle to embrace the full benefits of the latest industry innovation. Not to mention, we will struggle to communicate. Generative AI Generative AI can identify an object in an image based on its understanding of previous objects This was perhaps the most common new(ish) term I heard bouncing around at ISC West. While the term artificial intelligence (AI) now rolls off everyone’s tongue, the generative “version” of the term is catching up. Generative AI uses what it has learned to create something new. The name comes from the core function of this type of artificial intelligence: it can generate (or create) new content. It doesn’t just copy and paste; it understands the underlying patterns and creates something original based on that understanding. In the case of video, for example, generative AI can identify an object in an image based on its understanding of previous objects it has seen. Video and security Generative AI can tell you something digitally about what is happening in an environment. There is no longer a need to write “rules;” the system can take in data, contextualise it, and understand it, even if it does not exactly match something it has seen before. In the case of video and security, generative AI offers more flexibility and better understanding. From 2014 to 2024, the emphasis was on detecting and classifying things; today AI is expanding to allow new ways to handle data, not so prescriptive and no more rules engines. Agentic AI Agentic AI refers to artificial intelligence systems that can operate autonomously to achieve specific goals Agentic AI refers to artificial intelligence systems that can operate autonomously to achieve specific goals, with minimal to no direct human intervention. In addition to the capabilities of generative AI, agentic AI can take action based on what it detects and understands. Use of agentic AI typically revolves around an if/then scenario. That is, if action A occurs, then the system should proceed with action B. For example, if an AI system “sees” a fire, then it will shut down that part of the building automatically without a human having to initiate the shutdown. There is a lot of discussion in the industry about the need to keep humans involved in the decision-making loop, so the use of truly autonomous systems will likely be limited in the foreseeable future. However, the ability of agentic AI to act on critical information in a timely manner, in effect to serve as an “agent” in place of a human decision-maker, will find its place in physical security as we move forward. Inference Inference is another common term related to AI. It refers to the process by which an AI model uses the knowledge it gained during its training phase to make predictions, classifications, or generate outputs on new, unseen data. The direct relationship of this term to physical security and video is obvious. In the simplest terms, an AI system is “trained” by learning patterns, relationships, and features from a large dataset. During inference, the trained model is presented with new questions (data it hasn't seen before), and it applies what it learned during training to provide answers or make decisions. Simply put, inference is what makes AI systems intelligent. Containerisation Dividing a massive security management system into several separate containers enables management of the various parts In IT, containerisation is a form of operating system-level virtualisation that allows you to package an application and all its dependencies (libraries, binaries, configuration files) into a single, portable image called a container. This container can then be run consistently across any infrastructure that supports containerisation, such as a developer's laptop, a testing environment, or a server in the cloud. In the physical security industry, you hear “containerisation” used in the context of separating out the various components of a larger system. Dividing a massive security management system into several independent containers enables the various parts to be managed, updated, and enhanced without impacting the larger whole. Genetec’s SecurityCentre cloud platform Think of it like shipping containers in the real world. Each container holds everything an application needs to run, isolated from other applications and from the underlying system. This ensures that the application will work the same way regardless of the environment it is deployed in. “It took us five years to containerise Genetec’s SecurityCentre cloud platform, but containerisation now simplifies delivering updates to products whenever we want,” says Andrew Elvish, Genetec’s VP Marketing. Among other benefits, containerisation enables Genetec to provide more frequent updates--every 12 days. Headless appliance Headless appliance is a device that is managed and controlled remotely through a network or web interface A headless appliance is a device that is managed and controlled remotely through a network or web interface. The device is like a “body without a head” in the traditional sense of computer interaction: It performs its intended function, but without any visual output or input device for local interaction. In physical security, such devices are increasingly part of cloud-based systems in which the centralised software manages and operates all the disparate “headless” devices. A headless appliance does not have a Windows management system. “The whole thing is managed through the as-a-service cloud system,” says Elvish. With a headless device, you just plug it into the network, and it is managed by your system. You manage the Linux-based device remotely, so configuring and deploying it is easy. Democratising AI You hear the term democratising AI used by camera manufacturers who are looking to expand AI capabilities throughout their camera lines, including value-priced models. For example, even i-PRO’s value-priced cameras (U series) now have AI – fulfilling their promise to democratise AI. Another approach is to connect non-AI-equipped cameras to the network by way of an AI-equipped camera, a process known as “AI-relay.” For instance, i-PRO can incorporate non-AI cameras into a system by routing/connecting them through an X-series camera to provide AI functionality. Bosch is also embracing AI throughout its video camera line and enabling customers to choose application-specific analytics for each use case, in effect, tailoring each camera to the application, and providing AI to everyone. Context Cloud system also enables users to ask open-ended queries that involve context, in addition to detection Context refers to an AI system that can understand the “why” of a situation. For example, if someone stops in an area and triggers a video “loitering” analytic, the event might trigger an alarm involving an operator. However, if an AI system can provide “context” (e.g., he stopped to tie his shoe), then the event can be easily dismissed by the automated system without involving an operator. Bosch’s IVA-Pro Context product is a service-based model that adds context to edge detection. The cloud system also enables users to ask open-ended questions that involve context in addition to detection. For example, rather than asking "do you see a gas can?" you can ask "do you see any safety hazards in this scene?" The pre-trained model understands most common objects, and understands correlations, such as "a gas can could be a safety hazard.” A scaled-down on-premise version of the IVA Context product will be available in 2026. Bosch showed a prototype at ISC West. Most video data is never viewed by an operator. Context allows a system to look at all the video with "almost human eyes." Cameras are essentially watching themselves, and understanding why something happened and what we can do. All that previously unwatched video is now being watched by the system itself, boosted by the ability to add “context” to the system. Any meaningful information based on context can trigger a response by an operator. Data lake A data lake is a centralised repository that allows one to store vast amounts of structured, semi-structured, and unstructured data in its native format. In the case of the physical security marketplace, a data lake includes data generated by systems outside the physical security infrastructure, from inventory and logistics systems, for example. A data lake is where an enterprise can accumulate all their data, from the weather to Point-of-Sale information to logistics, to whatever they can gather. Putting the data in one place (a “data lake”) enables them to mine that data and parse it in different ways using AI to provide information and insights into their business. Notably, a data lake contains all a company’s data, not just security or video data, which opens up new opportunities to leverage the value of data beyond security and safety applications. Crunching the various information in a data lake, therefore, security technology can be used to maximise business operations.
The pattern of veins in the hand contains unique information that can be used for identity. Blood flowing through veins in the human body can absorb light waves of specific wavelengths. Irradiating the human palm with near-infrared light waves yields an image of the vascular pattern. A venous distribution map can be processed and compared to pre-registered data to match and confirm identity. Palm vein biometrics The idea of palm vein biometrics goes back to the 1980s when palm vein scanners emerged as commercial products in the 1990s. The devices gained some traction in military-grade and high-security applications, although the technology was too expensive to become popular among mainstream applications such as physical access control. Anviz Global is expanding palm vein technology into mainstream applications, featuring a lower price point that will open new market opportunities. Palm vein technology “Palm vein technology has been viewed as a boutique product because it is costly and has not developed as a mainstream product,” says Mark Vena, Senior Director of Business Strategy and Development for Anviz Global. “With a more compelling price point, the market can see the technology more broadly. We can change the game in terms of how people think about palm vein technology.” FAR and FRR Palm vein technology is more accurate than either fingerprint (0.0001% FAR) or facial recognition (0.001% FAR) Iris recognition is considered the gold standard in biometric identification, but palm vein technology can almost achieve the accuracy of iris. The false accept rate (FAR) for palm vein technology is 0.00008%, compared to 0.00005% for iris recognition systems. The false reject rate (FRR) is comparable at 0.01% for either technology. Palm vein technology is more accurate than either fingerprint (0.0001% FAR) or facial recognition (0.001% FAR). Palm vein identification occurs in less than half a second. M7 Palm “Anviz is seeking to bring a high level of capability to more mainstream commercial applications,” says Vena, specifically providing a lower-cost palm vein unit. The M7 Palm by Anviz can achieve next-generation biometric access control for greater security and intelligence. The door-mounted unit combines palm vein recognition with an RFID card reader and PIN code (using a 17-button keypad), all configurable for multi-factor authentication. Outdoor applications The robust unit, including a narrow metal exterior design, provides strong vandal resistance (IK10) and stability for outdoor applications. To ensure a weatherproof design, the IP66 rating indicates the product is completely protected against dust and can withstand strong jets of water from any direction. Power-over-ethernet (PoE) enables centralised power management and the ability to remotely reboot devices. Wiegand-out interface The unit communicates using RS-485 or TCP/IP and can connect locks, exit buttons, door contacts, doorbells, etc The unit communicates using RS-485 or TCP/IP and can connect locks, exit buttons, door contacts, doorbells, etc. The Wiegand-out interface can connect to standard third-party controllers, or a built-in relay can trigger a lock directly. Capacity is 500 users. Because palm vein recognition originates from the physiological characteristics of the human body, it represents a “credential” that cannot be forged, lost, or left at home. It is not easily counterfeited or worn out. Multi-factor authentication Applications include industries requiring high security such as government, judicial, and banking. Multi-factor authentication eliminates fraud and ensures safety at banks, data centers, airports, prisons, and government. An end user might opt for higher levels of access control for a laboratory or server room. For dealers and integrators, palm vein technology, including multi-factor authentication, provides an additional option for customers seeking to protect high-security areas on a large campus. Card readers Card readers may suffice for most of the doors, but an important laboratory or cash-handling area requires more protection. Palm vein technology can secure a casino cash cage or a room containing corporate secrets. Time of Flight ToF laser-ranging uses a laser to measure the distance to an object by calculating the time Time of Flight (ToF) laser-ranging achieves accurate measurement to ensure the right distance for operation. ToF laser-ranging uses a laser to measure the distance to an object by calculating the time it takes for the laser light to travel to the object and back. Palm vein technology operates in the range of 10 to 30cm (4 to 12 inches). The proprietary BioNANO palm vein recognition algorithm enables accurate and fast scanning speed. Non-contact biometric The non-contact biometric performs in touchless environments and does not contribute to lingering health concerns in the post-COVID world. The technology is accurate across all hand types and skin tones. Users may feel more comfortable scanning their hands than their eyes. Optimal human-machine interaction M7 Palm’s optimal human-machine interaction and user experience include a low-power-consumption OLED screen to deliver clear text notifications to the user. Advantages of M7 Palm include accuracy, stability, security, and privacy. Features include easy installation with standard processes and no special tools, centralised power management, simplified cabling, and less maintenance. Managing the system is expedited by integration with the Anviz CrossChex Standard access control and time management dashboard, used by more than 30,000 enterprises, and the system can be integrated with any access control system. Security for SMBs Anviz Global is a converged intelligent security provider for SMBs and enterprise organisations Anviz Global is a converged intelligent security provider for small- and medium-sized businesses (SMBs) and enterprise organisations. The company’s product line includes biometrics, video surveillance, and security management solutions based on the cloud, Internet of Things (IoT) and artificial intelligence (AI) technologies. Privacy concerns Anviz is part of the Xthings family of companies, which includes Ultraloq (smart locks), Utec (smart home), Bright (smart lighting), Secu365 (SaaS Platform), and Ulticam (smart cameras). Privacy concerns are minimised because palm vein recognition does not directly store the original image but rather extracts feature information through algorithmic models. Personal data is protected through obfuscation and encryption.
The information age is changing. Today, we are at the center of addressing one of the most critical issues in the digital age: the misinformation age. While most awareness of this problem has emerged in the consumer and political worlds, the issue cannot be ignored when it comes to the authenticity and protection of video and security data. Video surveillance data SWEAR is a company with the mission to ensure the integrity of video surveillance data by mapping video data and writing it into the blockchain, providing real-time, immutable proof of authenticity. Blockchain, which is the underlying technology that enables cryptocurrencies, is a decentralised digital ledger that securely stores records across a network of computers in a way that is transparent, immutable, and resistant to tampering. SWEAR solution The SWEAR solution is based on proactive, foundational protection that validates data at the source The SWEAR solution is based on proactive, foundational protection that validates data at the source before any opportunity for manipulation can occur. “Our technology is about proving what’s real and our goal is to ensure that security content and video surveillance data remain untampered with and reliable when needed,” says Jason Crawforth, Founder and CEO of SWEAR. Real-time authentication Security leaders need to ensure that the content they are relying on to make mission-critical decisions is authentic. Once verified, organisations can be sure that their investment in video can be trusted for critical use cases, including intelligence operations, legal investigations, and enterprise-scale security strategies. SWEAR seeks to embed trust and authenticity directly into video surveillance content at the point of creation. This ensures real-time authentication while proactively preventing tampering or manipulation before it can happen. AI-generated content The rise of AI-generated content, such as deepfakes, introduces significant challenges As AI transforms the landscape of video surveillance by enhancing threat detection and predictive analysis, it also introduces the very real risk of manipulation through AI-generated content. This presents a significant challenge in protecting critical security data, especially in mission-critical applications. The rise of AI-generated content, such as deepfakes, introduces significant challenges when it comes to ensuring the protection of digital media like video surveillance. Recent study findings It is a fact that digital media content is being questioned more regularly, which puts businesses, legal systems, and public trust at risk. A recent study from the Pew Research Center found that 63 percent of Americans believe altered videos and images create significant confusion about the facts of current issues. Last month, California Governor Gavin Newsom signed three bills aimed at curbing the use of AI to create fake images or videos in political ads ahead of the 2024 election. Footage authenticity “While most of the news cycle has centered on the use of fake content in politics, we need to think about how manipulated videos could affect security,” says Crawforth. “In video surveillance, ensuring the authenticity of footage is critical for keeping operations secure and safe around the world. That means verifying and protecting video data is a must.” Organisations must be capable of performing thorough digital investigations, which involve retrieving and analysing video and security data from devices and networks through a chain of evidence. Digital forensic capabilities Strong digital forensic capabilities also enhance incident response, risk management, and proactive security An in-depth understanding of who has handled video data, how it was handled, and where it has been is an important step in responding to security incidents, safeguarding assets, and protecting critical infrastructure. Strong digital forensic capabilities also enhance incident response, risk management, and proactive security measures, all essential for risk management, regulatory compliance, and cost control, says Crawforth. An unbroken chain of custody “By using tools to identify, preserve, and analyse digital evidence, organisations can ensure swift and accurate responses to security incidents,” he adds. “Using the latest tools and techniques is vital for maintaining a strong security posture." "But you must ensure your digital content isn’t manipulated.” SWEAR’s technology provides an unbroken chain of custody, ensuring that video evidence can be trusted and admissible in court and forensic applications. Authenticating content Authenticating content also strengthens accountability and trust, protecting organisations By verifying video content is protected from tampering, manipulation, or forgery, organisations can be sure that they have reliable evidence that produces actionable results. Authenticating content also strengthens accountability and trust, protecting organisations from legal disputes or compliance violations. Safeguarding digital content “With an increasing amount of disinformation in today’s world, we sought to develop an innovative solution to safeguard the integrity of digital content,” says Crawforth. SWEAR safeguards security content using real-time “digital DNA” encoding. It integrates directly at the video management system level, ensuring it is preserved with a secure chain of custody and maintains integrity for evidentiary purposes. Real-time “digital DNA” encoding The digital DNA is then stored on a blockchain, creating an immutable record The solution integrates with cameras and other recording devices to map this digital DNA of the video data, all in real-time. The digital DNA is then stored on a blockchain, creating an immutable record that tracks the content’s history and integrity. Any attempt to manipulate the media can be instantly detected by comparing the current state of the media to its original, authenticated version. SWEAR is actively collaborating with video management solution providers to integrate the technology into their platforms. Video and security data benefits “We’re still in the early stages of our collaboration in this space, but it is clear that the industry recognises that we have to work together to mitigate this risk proactively before it becomes a significant issue,” says Crawforth. “The feedback we have received from the industry to date has been beyond our expectations, and we expect to have more integration partners to highlight shortly.” “We should approach this as a collaborative effort across the industry, as ensuring the authenticity of video and security data benefits everyone involved,” says Crawforth.
Case studies
DFNBG Gastro GmbH & Co. KG, operator of 48 Dunkin' branches and other catering establishments in Germany, has migrated to the MOBOTIX CLOUD for the central management of its video surveillance. DFNBG partnered with MOBOTIX Diamond Partner VALEO IT Neteye GmbH for more than ten years, who have implemented and continuously optimised secure and efficient MOBOTIX video solutions in the 48 Dunkin' branches. Data protection regulations The operation of local storage systems was proving particularly difficult in shopping centres Due to the strong growth of DFNBG, the demands on the existing video management system increased. The local storage of video data became increasingly complex - both in terms of data protection regulations and the management of access rights. The operation of local storage systems was proving particularly difficult in shopping centres. The solution: a gradual migration from local NAS storage to the data protection-compliant MOBOTIX CLOUD. Access management and GDPR: the MOBOTIX CLOUD as a solution The MOBOTIX CLOUD video surveillance-as-a-service (VSaaS) offering allows users to conveniently control their cameras via a free app. The recorded videos are stored in highly available and cyber-secure data centres located close to the user. This ensures data protection-compliant storage in accordance with the GDPR. Intelligent camera technology A key advantage of the MOBOTIX CLOUD is the combination of intelligent camera technology A key advantage of the MOBOTIX CLOUD is the combination of intelligent camera technology and a powerful cloud platform. The cameras analyse events on site and only transfer relevant data to the cloud. This minimises bandwidth requirements while maintaining the highest security standards. MOBOTIX Bridge Communication between the cameras and the cloud takes place via the MOBOTIX Bridge, a highly secure connection unit that ensures protected data transmission. The cloud solution also eliminates the need to operate separate server rooms with high security standards on site - a clear advantage for branches in shopping centres or high-traffic locations. DFNBG can control access rights Around half of the Dunkin' branches have already been converted to the MOBOTIX CLOUD Cloud data is managed directly by the users themselves. This means that companies such as DFNBG can control their access rights centrally without having to create individual solutions for each branch. “It was clear to us that the system is secure - including cyber-secure - and exceeds our requirements. But the central management of all access rights really saves us time and money,” says Harry Taubert, Construction & Development Manager at DFNBG. Around half of the Dunkin' branches have already been converted to the MOBOTIX CLOUD, and the remaining locations will follow successively. VALEO IT Neteye: MOBOTIX partner for innovative video solutions As a long-standing MOBOTIX Diamond Partner and one of the largest integrators of MOBOTIX systems in Germany, VALEO IT Neteye has been instrumental in delivering customised, future-ready surveillance solutions to DFNBG. VALEO IT Neteye also offers full-service training to DFNBG to ensure everyone stays up to date with industry changes. “We only offer our customers MOBOTIX solutions because we are absolutely convinced of the quality and durability of the products manufactured in Germany,” explains Norbert von Breidbach-Bürresheim, Managing Director of VALEO IT Neteye.
Founded in Taiwan, 85°C Bakery Cafe has rapidly expanded into an internationally recognised brand, known for its diverse baked goods and beverages. With over 80 locations across the United States, the company faced the complex challenge of managing security and operations at scale—especially with a lean IT team of just seven people. To keep operations running smoothly, they partnered with VIVOTEK, a global pioneer in security solutions, to deploy the AI-powered VORTEX Cloud Surveillance Platform, which enhances visibility, reliability, and operational efficiency across their retail operations. “Retail is not just about selling things. It’s about building trust and creating relationships.” — Ariel, IT Director, 85°C Bakery Cafe Challenge Legacy surveillance systems can’t keep up with expansion Growth outpaces surveillance: As 85°C expanded rapidly across the U.S., their existing surveillance systems struggled to keep pace, resulting in operational challenges. In retail, fast incident resolution is crucial to customer satisfaction. At 85°C Bakery Cafe, their legacy surveillance system became a bottleneck, leading to increased costs, time delays, and operational risks. Unstable legacy systems: NVR failures occurred monthly, taking upward of 25 days to repair, with a cost impact of around $2,000 annually for replacements. Fragmented management: Lack of centralised access made it difficult to monitor, retrieve, or share video footage. Limited support: With only a seven-member IT team, managing all systems across multiple stores and scaling was challenging. Solution Built for retail efficiency: Faster setup & deployment and centralised cloud control To overcome these challenges, 85°C Bakery Cafe implemented VORTEX by VIVOTEK, an AI-powered cloud surveillance solution designed for retail efficiency. For a small IT team managing dozens of busy stores, simplifying setup, streamlining operations, and supporting growth without overhauling infrastructure were critical. Hybrid compatibility: VORTEX unifies over 200 legacy cameras and 150 cloud cameras onto one platform without extra replacement costs. Centralised management: It enables remote access control, receives instant alerts, searches the video footage in seconds with AI technology, and simplifies incident handling. Rapid deployment: Plug-and-play setup cuts deployment time by 50%, keeping store launches efficient and streamlined. “Setting up in each location used to take us two to three days… With VORTEX plug-and-play, we’re done in just one day.” — Jason Chow, Tech Support Manager, 85°C Bakery Cafe. Results Smoother operations and better customer experience For 85°C Bakery Cafe, VORTEX made physical security operations more proactive by improving response times, reducing disruptions, and giving staff the tools to stay focused on customers, not equipment. The plug-and-play setup cut installation time by up to 50%, while cloud-based management reduced site visits and operational costs. These improvements not only lightened the technical workload and streamlined daily operations but also strengthened customer trust with faster service and reliable incident resolution. "With Deep Search, we can find people or items in seconds. If a customer loses something, we trace it and recover it quickly."— Nolan Carter, Facilities Manager, 85°C Bakery Cafe. "VORTEX helps us prevent disputes and track items that go missing. It keeps the entire store running smoothly. When stores run better, customers stay longer and they come back more often."— Ariel, IT Director, 85°C Bakery Cafe.
Seamless ASSA ABLOY digital access is now part of the Sharry workplace experience. By connecting Sharry with ASSA ABLOY’s ARX access control solution, businesses can administer secure employee access via mobile credentials as well as visitor management, all from a single unified platform, helping to save time and costs. This new integration combines ASSA ABLOY’s digital access expertise with the convenient functionality of a Sharry workplace platform. It allows administrators to control access permissions, streamline credential management and simplify guest registration directly within Sharry's ecosystem. With Sharry and ARX, customers now have a choice of mobile credentials, supporting Wallet, NFC and BLE unlocking. Integration with the Sharry workplace platform “It is exciting that we can expand our ARX solution via integration with Sharry workplace experience platform to make day-to-day life easier for our customers,” says Matti Kuismin, VP & Head of Product Unit EAC at ASSA ABLOY Opening Solutions EMEIA. “The ARX security solution is an open platform and easy to integrate. Through integration with Sharry as a mobile-first technology, we enable easy-to-use mobile keys within Wallet – and do that with the highest security standards.” “We have already deployed the integrated solution with a customer in Scandinavia. Their employees now access their offices with the tap of a phone or smartwatch, thanks to the use of HID mobile credentials, both app- and Wallet-based.” Enhance security with integrated access management Integration with Sharry now enables skills and security chiefs to combine access and visitor management Developed from decades of access expertise and experience, ASSA ABLOY ARX combines digital access with alarm functionality, and is available for both Offline and Online (real-time) management. ARX is built on an open platform model, to connect seamlessly with a broad range of complementary business systems and software. The integration with Sharry now enables facilities and security managers to combine access and visitor management within a single solution. Sharry streamlines the process of employee onboarding (and offboarding), which is now integrated with access permission management, including the easy distribution of mobile credentials. It simplifies visitor management, saving staff time, and provides workplace analytics with a genuine ROI. ARX’s robust security infrastructure “We’re excited to expand our access control ecosystem with ASSA ABLOY ARX, a proven and trusted security solution,” says Karel Hudínek, Head of Technology Partnerships at Sharry. “This integration brings seamless credential management, automated access assignments, and an enhanced user experience to enterprises and property managers." "By combining ARX’s robust security infrastructure with Sharry’s mobile-first technology, we enable a smarter, more efficient approach to access management – one that simplifies operations while maintaining the highest security standards.” The Sharry/ARX integration is now available to all ASSA ABLOY customers in the Scandinavia region.
Amthal Group Companies has supported Tradestars’ new Hackney Wick site with a comprehensive, ground-up technology stack, incorporating integrated smart security and fire safety for the benefit of the thriving entrepreneurial community. Tradestars offers flexible co-warehousing facilities for entrepreneurs looking for collaborative workspaces and shared resources to foster innovation and growth. Its newest location presents spaces in Hackney Wick to suit individual business needs. Integrated security solution Amthal to design a fully integrated security solution that was installed, monitored and maintained With the site spread out across multiple blocks and topped with residential accommodation, Tradestars worked directly with Amthal to design a fully integrated security solution that was installed, monitored and maintained for the benefit of the growing community. The result is a secure, technology-led site with members able to book facilities, and open doors to access offices, meeting rooms and amenities via their phone, whilst giving community managers centralised control over the building. Security and fire safety measures Says Jonathan Marriott, Construction Director at Tradestars: “Our work with Amthal has been instrumental in elevating our Hackney Wick site into a secure, cowarehousing business environment." “With their expertise, we’ve seamlessly integrated comprehensive security and fire safety measures, ensuring the safety and peace of mind of our thriving entrepreneurial community. The ability for our members to effortlessly book facilities and access various amenities via their phones, all while providing our community managers centralised control, truly enhances the Tradestars experience.” Advanced technology features of Amthal Amthal designed and installed a fully integrated, ground-up technology stack – from fibre connectivity Following a detailed risk assessment across the site facilities, in cooperation with main contractors, Amthal designed and installed a fully integrated, ground-up technology stack – from fibre connectivity, Wi-Fi, audiovisual and space management solutions, to fire, security and access control. Paul Rosenthal, Amthal Group Business Development Director added: “Being involved right from the initial design stages of the building site, enabled us to create a system to encourage connectivity, collaboration and innovation. One where members enjoy streamlined access, advanced technology features, and a safe working environment." Integrating fire safety and security systems Rosenthal added: “The focus on integrating fire safety and security systems means the growing community can focus on building their business vision, safe in the knowledge that they are powered and protected wherever they are on site, fitting today’s mobile-connected lifestyle." "This is complemented by fully managed services and support to ensure the continuous operation and maintenance of the complete ecosystem.”
RGB Spectrum™, a pioneer in mission-critical video solutions for real-time decision support, announced that the City of Norman, Oklahoma, has selected the company to deliver a video processing and control system for its new Traffic Management Centre (TMC). This innovative display approach will replace the traditional front-of-room screen with personal console-based video walls, setting a new standard for operational efficiency. RGB Spectrum’s Zio® 4000 series New system redefines what’s possible in compact, efficient traffic management environments Designed in partnership with global engineering and design firm Stantec, the new system redefines what’s possible in compact, efficient traffic management environments. At the core of the deployment is RGB Spectrum’s Zio® 4000 series video processor, XtendPoint® KVM-over-IP, and RGB Rack PCs, enabling seamless, customised workflows to operators. Norman’s commitment “Norman’s commitment to cutting-edge technology ensures we can effectively monitor traffic patterns and enhance safety for all who live, work, and travel through our city,” said David R. Riesland, City Transportation Engineer, City of Norman. “This project has been over 15 years in the making, and it’s incredibly rewarding to see that long-time vision finally become reality. We’re excited to partner with RGB Spectrum to implement a best-in-class solution that supports our mission.” Five discrete networks The new 2,300 square-foot facility will be transformed from a shell space into a highly functional centre, including three offices, an operations room, and an IT room. Within the operations space, four operators oversee five discrete networks—ranging from ATMS/ITS and enterprise to public safety, security, and web administration—through a fully distributed architecture. Each operator will have access to five dedicated Rack PCs located remotely in the IT room, allowing for quiet, clutter-free workstations and centralised maintenance. RGB Spectrum’s XtendPoint KVM The upper displays at the station serve as “videowalls,” dynamically combining a mix of sources Using RGB Spectrum’s XtendPoint KVM-over-IP with multiviewing capability, operators control and interact with any PC across any network from their consoles. The upper displays at each station serve as personalised “videowalls,” dynamically combining a mix of sources. Each operator can mirror a common display layout or configure their own unique, task-specific view. RGB Spectrum performance and adaptability In total, any operator can control and view any or all of the 20 Rack PCs, providing a flexible and resilient operations environment. Whether deploying a centralised videowall or a decentralised, operator-specific layout, RGB Spectrum delivers the mission-critical performance and adaptability that modern traffic management centres demand.
The space-saving yet full-function video spectral comparator Regula 4306 has been deployed at Wattay International Airport in Vientiane, the Lao People’s Democratic Republic, to strengthen the country’s border security. This initiative aims to combat transnational crimes, including human trafficking, smuggling, and irregular migration. Forged identity documents Lao People’s Democratic Republic faces growing challenges in identifying forged identity documents Like many countries, the Lao People’s Democratic Republic faces growing challenges in identifying forged identity documents used by criminals and irregular migrants. Until recently, document verification at border checkpoints relied heavily on manual inspection, which was time-consuming, prone to errors, and less effective against increasingly sophisticated forgery techniques. Adopting a forensic solution In collaboration with International Organisation for Migration (IOM), the Lao immigration authorities began modernising their approach by adopting a forensic solution to strengthen document authentication and border security. In partnership with IOM in the Lao People’s Democratic Republic and the Australian Department of Home Affairs, the Lao immigration authorities deployed the Regula 4306 video spectral comparator at the country’s major airport in Vientiane. This step equipped border officials with advanced forensic tools for in-depth document authentication, and significantly automated the whole process. Array of features in the Regula 4306 With an array of features in the Regula 4306, ID proof at the Lao border earned much precision With a vast array of features in the Regula 4306, ID verification at the Lao border achieved much-needed high precision. For instance, the device’s high-resolution 8 MP camera with 60x optical zoom captures document images at up to 18,900 ppi and enables officials to analyse even the finest details, including printing techniques. Hyperspectral imaging module Additionally, with over 40 types of light sources and 18 light filters, the Regula 4306 allows authorities at the second line of border control to examine the most intricate document security features, such as holograms, watermarks, microprinting, and optically variable elements, ensuring a more reliable fraud detection process. Apart from that, 3D visualisation helps analyse a document’s surface relief and intersecting lines, and the hyperspectral imaging module enables forensic experts to detect document alterations, differentiate ink properties, or recover faded text. Regula Forensic Studio cross-platform software Regula 4306 is controlled via Regula Forensic Studio (RFS) cross-platform software Regula 4306 is controlled via Regula Forensic Studio (RFS) cross-platform software. With RFS, an expert can perform a wide range of examinations, conduct precise measurements and comparisons, process images in various modes, and generate comprehensive examination reports without losing a single detail. Its powerful tools and intuitive interface ensure accuracy and reliability, enabling thorough and efficient forensic investigations. Regula’s identity document template database Integrated with Regula Document Reader SDK, RFS enables comprehensive, automated document checks, eliminating the need for additional equipment or software. Regula Document Reader SDK can instantly recognise and validate IDs’ machine-readable zones (MRZs), RFID chips, barcodes, and invisible personal information (IPI), significantly reducing manual workload and minimising human error. Also, as it is backed up by Regula’s identity document template database (the most comprehensive in the world), this software is able to verify a wide range of IDs from 251 countries and territories, even the rarest ones. Adoption of Regula 4306 Regula experts conducted specialised training sessions for the Lao immigration officials To ensure seamless adoption of Regula 4306 at Wattay International Airport, Regula experts conducted specialised training sessions for the Lao immigration officials. This ensured that they had hands-on experience and were fully equipped to handle advanced document verification. “Integrating Regula’s devices into the Lao border management operations is a vital step toward combating serious crimes such as human trafficking and irregular migration. This technology enables detection of fraudulent documents with higher accuracy, eliminating human errors,” says Shareen Tuladhar, Chief of Mission, IOM in the Lao People’s Democratic Republic. Lao immigration authorities “Border crossings are the frontline of many serious crimes, making border security crucial to the country's overall safety. We are honoured to contribute to strengthening Lao border security." "By equipping the Lao immigration authorities with our top-selling video spectral comparator, the Regula 4306, we are providing them with advanced forensic tools to precisely detect even the most sophisticated document forgeries and stop criminals before they can cause harm,” comments Alex Lewanowicz, Director of Hardware Engineering at Regula.


Round table discussion
A system's lifecycle is the journey it takes from planning and design through to decommissioning. Considering the entire lifecycle of a system can encourage integrators and end users to embrace higher-quality technologies with an eye toward maximising their value over time rather than focusing on lower-priced equipment. For additional insights, we asked our Expert Panel Roundtable: How does consideration of system lifecycles impact the choice of physical security technologies?
Access control, video surveillance, and intrusion detection systems evolved largely independently in the physical security industry. Integrating those systems to the benefit of an enterprise's overall security has traditionally fallen on security integrators working in cooperation with manufacturers. However, today's market has also evolved to include companies that provide "unified platforms,” bringing together various disparate security systems and functions under a single, centralised management interface. We asked our Expert Panel Roundtable: What are the advantages of installing physical security systems as a unified platform?
In many cases, architectural design and layout dictate optimal placement of security devices like cameras, access control readers, and sensors. Poor design can lead to blind spots, reduced coverage, and ineffective surveillance. However, planning that involves all the various stakeholders can maximise both security and design elements. We asked this week’s Expert Panel Roundtable: When are building design and physical security systems complementary? When are they at odds?
Products


White papers

The ultimate guide to mastering key control
Download
Cybersecurity for enterprise: The essential guide to protecting your business
Download
How to create a successful physical security roadmap
Download
A guide to moving physical security into the Cloud
Download
Safeguard Students With New Techniques And Technology
Download
Intelligent video security solutions
Download
How to implement a physical security strategy with privacy in mind
Download
Access and security in the age of hybrid working
Download
Cybersecurity in keyless access management
Download
Understanding key control systems and best practices
Download
IoT connectivity
Download
Smart surveillance in the workplace
Download
5 ways to strengthen physical security with an integrated system
Download
11 advantages of a combined system for access control and intrusion
Download
Wireless Access Control eBook
Download

Videos
Security management: Manufacturers & Suppliers
- Dahua Technology Security management
- Vicon Security management
- Seagate Security management
- Bosch Security management
- CEM Security management
- IFS Security management
- Hikvision Security management
- VIVOTEK Security management
- Vanderbilt Security management
- Parabit Security management
- BCDVideo Security management
- Pelco Security management
- ComNet Security management
- AV Costar Security management
- TESA Security management
- Hanwha Vision Security management
- OPTEX Security management
- DSC Security management
- Messoa Security management
- FLIR Systems Security management

Artificial Intelligence in Security
Download
Elevating security through multi-sensing solutions and large-scale AI
Download
Open credential standards and the impact on physical access control
Download
Combining security and networking technologies for a unified solution
Download
What is a universal RFID reader?
Download