Video analytics

White papers

Open credential standards and the impact on physical access control
Download
What is a universal RFID reader?
Download
System design considerations to optimize physical access control
Download
Milestone cloud deployment guide
Download
Using artificial intelligence (AI) to automate physical security systems
Download
Selecting the right network video recorder (NVR) for any vertical market
Download
How intelligent video is transforming banking and financial institutions
Download
The real cost of an outdated Video Security System
Download
Understanding the IT needs of video surveillance
Download
AI in security solution
Download
VSS - Top 4 questions to get you started
Download
3 ways AI can improve safety and reduce compliance costs
Download
Levelling up with campus safety
Download
IoT connectivity
Download
2023 trends in video surveillance
Download

News
The need for the security response to be accurate, fast, and adaptive has never been more important. A single security breach has the power to impact beyond that immediate ‘moment in time’. It can spiral into potential financial, operational, and reputational damage, taking years to recover from. Not to mention that regulatory and compliance violations can be costly, and legal action and liability claims can be debilitating. The impact to reputational damage and loss of trust caused by negative media and public scrutiny can ruin the competitive advantage. Traditional security models Traditional security models are no longer sufficient for these new environments The rise in sophisticated intrusion threats is also running alongside a shift in the way operations are handled. The introduction to 'always-on' facilities, and flexible workforces means traditional security models are no longer sufficient for these new environments. Proactive security framework Advanced situational awareness is the ability to rapidly perceive, process, and respond in dynamic environments. It is achieved by creating a proactive security framework that brings together heightened observation, pattern recognition, and predictive thinking to not only react to threats but also actively prevent them. This ability to not just see but to know more about threats in real time, respond with precision, and continuously adapt to emerging risks is crucial for maintaining safety, business continuity, and operational stability. A combination of security technologies The combination of security technologies boosts each stage of the security journey from initial detection Multi-layered security is how they do that. By creating several barriers for potential intruders, it becomes more difficult for them to breach the facility. The combination of security technologies strengthens each stage of the security journey from initial detection, through to identification and tracking, stopping threats before they can cause harm. Providing accurate detections FLIR’s multi-layered security solutions integrates intelligent imaging and sensing solutions, along with tools that continuously enhance action and response. The products are designed to provide accurate detections through all hours of the day and, critically, in low light and at night. greater site coverage increased deterrence and risk mitigation increased detection accuracy faster response to incidents reduced false alarms and increase response dispatch confidence reduced total cost of ownership enhanced regulatory compliance and reputational resilience Development of thermal solutions FLIR has been at the forefront of the critical technologies that support the safety of people and assets For more than 45 years, FLIR has been at the forefront of the critical technologies that support the protection of people and assets. The commitment and investment in research and development has delivered some of the key game-changing technological advances in the field. These include the development of thermal solutions for commercial applications and the NEXUS protocol, which enables edge-to-edge communication for fast and accurate tracking. They see beyond products and systems to solutions and behaviour. By combining thermal, visible and ground-based radar imaging with the pioneering video analytics, FLIR’s multi-layered solutions provide them with the strategic building blocks to detect, identify track, and act over a long range and in any weather condition. The power to act – now Advances in technology, automation, and integrated security systems have broadened their use making this level of comprehensive protection more accessible than ever - not just in deployment but importantly, cost. This means the affordability of strategic security is no longer a question. FLIR means every organisation can implement a strategy that aligns with its own specific risks They know their business is unique, which is why the FLIR multi-layered approach is not ‘one size fits all’. They can have the confidence of accurate detection and communication that are specifically designed to be scalable, flexible and adaptable. Working with FLIR means every organisation can implement a strategy that aligns with its own specific risks, operations, and infrastructure. Transforming situational awareness into a security benefit with FLIR FLIR is launching a series of articles and expert insights designed to help organisations move beyond the limitations of conventional measures to integrate advanced multi-layered security into a forward-thinking security strategy. They’ll drill down into each stage of the security solution implementation journey – with in-depth analysis of how FLIR’s integration of advancements in thermal, visible and ground-based radar solutions are transforming detection, identification, tracking and response. Explore how a strategic, layered approach enhances protection, mitigates risks, and ensures business continuity. Deep dive into FLIR’s next general video analytics and the digital layer of security. Discover how advances such as FLIR vAI (AI-based alarm verification) are offering significant improvements in performance over traditional AI analytics. FLIR advantage The combination of the expertise, innovation and technologies to deliver strategic advantage. It is power of integrated tailored security layers that enable them to achieve a more resilient and proactive defence to evolving threats.
Perimeter protection is the essential first line of defence in physical security, acting as a critical barrier against unauthorised access and safeguarding valuable assets. However, traditional perimeter security systems often struggle with false alarms, environmental interference, and costly manual verification — issues that can undermine both safety and efficiency. As threats grow in sophistication and perimeter security needs become more dynamic, organisations require smarter, more adaptive solutions that can deliver accurate detection and real-time response. Intelligent perimeter security SourceSecurity.com and Hikvision have collaborated to release a new white paper SourceSecurity.com and Hikvision have collaborated to release a new white paper exploring how intelligent perimeter security powered by large-scale AI and multi-sensing technologies are transforming perimeter defence. The white paper offers a comprehensive look at how integrated AI-powered video analytics, thermal imaging, radar, and fibre-optic sensing systems can overcome legacy challenges to deliver precise, scalable, and cost-effective security. Traditional perimeter security protection Conventional perimeter security often suffers from persistent false alarms caused by animals, weather, or environmental noise. Poor sensor reliability under fog, rain, or low-light conditions, combined with labour-intensive manual alarm verification, limits effectiveness and increases operational costs. Remote sites face additional hurdles related to power and network access, complicating deployment. Integration of AI and sensing technologies Advancements in large-scale AI models and sensor fusion now enable perimeter security systems to detect and verify threats with unprecedented accuracy and speed. Intelligent cameras with embedded AI reduce false alarms by more than 90%, thermal imaging ensures reliable detection regardless of weather or lighting, radar offers wide-area scanning with automatic target tracking, and fibre-optic sensing enables long-distance intrusion detection without heavy infrastructure. Tailored solutions The white paper details how different combinations of these perimeter security technologies serve short-, medium-, and long-range perimeters — providing optimised detection, verification, and rapid response for various environments including industrial sites, logistics hubs, remote facilities, and critical infrastructure.
Cawamo, a next-generation security SaaS company, announced it will exhibit at the Global Security Exchange (GSX) with live demonstrations of its unified, AI-powered command & control platform. GSX will be held September 29–October 1 at the Ernest N. Morial Convention Centre in New Orleans. Organised by ASIS International, GSX is one of North America’s largest annual security events, convening thousands of professionals from across the commercial security ecosystem. Real-time AI analytics “Security operations teams are tired of stitching together a ‘Frankenstein’ stack,’” said David Yakov, CEO of Cawamo. “Cawamo is a game-changer that replaces multiple point products with one platform: Cloud VMS, PSIM workflow, real-time AI analytics, cloud recording, health monitoring, reporting, and SIP-based talk-down — all deployed the same day, without upfront hardware. That means faster response, lower operating costs, and a cleaner operator experience.” How operators can showcase Cawamo will showcase how operators can: View live sites, recent recordings, and AI insights in a single pane of glass Trigger automated or operator-led SIP audio talk-down with configurable playbooks Connect to virtually any IP camera with rapid onboarding Generate incident and trend reports for both monitoring centres and enterprise SOCs Scale from one site to nationwide deployments without new on-prem hardware How same-day command & control reduces time-to-value “We built Cawamo to help remote monitoring companies, integrators, and enterprise SOCs run lean while elevating service quality,” added Mike Taylor, VP, Americas. “At GSX, visitors will see how same-day command & control reduces time-to-value — from proof-of-concept to production — in hours, not months.” What: Global Security Exchange (GSX) Where: Ernest N. Morial Convention Centre, New Orleans Why: See Cawamo’s unified AI Command & Control in action (Booth 2401) and learn how it consolidates PSIM, Cloud VMS, AI analytics, recording, health monitoring, reporting, and SIP talk-down into one platform When: Sept. 29–Oct. 1 (Mon.–Tue. 9:30–4:30 p.m., Wed. 9:30–3 p.m)
The latest generation of AI video solutions is significantly outperforming conventional security systems in retail applications, achieving faster return-on-investment and delivering notable new benefits, says IDIS in its latest market assessment. While conventional surveillance systems are focused largely on security and targeted at loss prevention, the latest AI-powered video solutions are proving to be as attractive to retail sales directors, marketing departments, and heads of finance, says the Korean video technology pioneer. IDIS’s ongoing successes The latest IDIS educational eBook, designing compelling retail video solutions to increase efficiency and boost profits, explains that while the market is highly fragmented, making it potentially difficult for buyers to evaluate which AI solutions offer genuine value, systems integrators can offer compelling, value-driven solutions by learning from the recent wave of successful multi-branch and international retail projects. Drawing on IDIS’s ongoing successes working with a wide range of retail businesses, including fashion and beauty branch retailers, franchises, luxury boutiques, and supermarket chains, the eBook shows how systems integrators can easily design and quickly install solutions that deliver multiple benefits, not just improving loss prevention but increasing operational efficiency and boosting profits. New range of AI-enhanced video solutions New range of AI-enhanced video solutions from edge cameras and AI boxes is not costly or complex to set up Better yet, the new range of AI-enhanced video solutions from edge cameras and AI boxes is not costly or complex to set up, and can now provide accurate answers to a wide range of intelligence questions that matter to retailers – including location footfall, customer capture rates and conversion rates, demographic data, dwell time, and data around seasonal and longer-term trends. Accurate, reliable, and granular data is becoming essential for centralised retail management teams, which oversee multiple remote branches and need a clear picture of each location's performance, says Koray Ozyildirim, IDIS Türkiye Country Manager and one of IDIS’s retail experts. How the latest AI video solutions are unlocking significant new value Only with accurate information can these decision makers know where to open, close, or expand stores; what rents are realistic in each location; and how local store managers and staff are performing versus other locations, which enables centrally informed decisions to support each store or regional branches with the right stock, promotions, marketing, displays, and staffing levels. “This new IDIS guide explains clearly how the latest AI video solutions are unlocking significant new value, what they are measuring, and what they are revealing,” Koray Ozyildirim adds. “Available to download for free, it is essential reading for any systems integrators working in today’s fast-moving retail space.”
Expert commentary
Currently, in security surveillance, the application of intelligent analysis technology has two approaches: front-end intelligence and back-end intelligence. Front-end intelligence Front-end intelligence is typically implemented within the video surveillance camera itself, integrating AI edge algorithms into the camera. Its advantages include: acquiring video in real-time and performing video analysis and feedback results immediately. Benefits No consumption of network resources like bandwidth; Offers real-time and highly efficient analysis; Obtains results immediately; relatively low cost; Highly flexible deployment. Disadvantages Due to the small physical size of cameras, hardware expansion space is limited. AI edge algorithms are often confined to a fixed few types, such as perimeter intrusion detection, tripwire, abandoned object detection, etc. It cannot flexibly load customised intelligent functions. The other approach is back-end intelligence, which usually requires installing an intelligent analysis server in the monitoring centre, integrating AI edge algorithms into this back-end server. Advantages: Hardware components can be flexibly expanded based on project requirements, thereby enhancing the server's overall analytical capability. It can also flexibly customise and load various intelligent algorithms according to project needs, capable of loading dozens or even hundreds of algorithms. Disadvantages: Because back-end intelligence requires first collecting the video stream from the front-end cameras in real-time before analysis, it consumes significant resources like bandwidth. It cannot provide immediate feedback of intelligent analysis results like front-end intelligence, lacks flexible deployment options, and the cost is very high. Development of intelligent analysis technology AI edge analytics boxes have emerged in the security surveillance market, defining another front-end With the development of intelligent analysis technology, AI edge analytics boxes have emerged in the security surveillance market, representing another front-end intelligence product. These boxes themselves can integrate dozens of AI edge algorithms, enriching the variety of AI algorithms available for front-end intelligent cameras while maintaining flexible deployment. Users can freely choose to deploy the box at the front-end (near the camera) or at the monitoring centre end to function as a small intelligent analysis server. Front-end (camera side) When deployed at the front-end (camera side): There is no need to dismantle existing video surveillance equipment. The real-time video stream from the original camera can be analysed directly within the AI box, and results are fed back. Since the camera and AI box are usually on the same network, this consumes minimal bandwidth resources, offering excellent real-time performance, timeliness, and efficiency. After the AI edge analytics box analyses the video, the results can be transmitted to the monitoring centre video management platform server via the internet, VPN dedicated line, 4G, 5G, etc., for storage, real-time display, and retrieval. Monitoring centre end When deployed at the monitoring centre end: The AI edge analytics box can function as a small video analysis server. Individual AI analytics boxes can be stacked to aggregate their analytical power, enabling the analysis of large volumes of video streams transmitted from the front-end. Since the cost of the AI edge analytics box itself is significantly lower than that of a full intelligent analysis server, using AI analytics boxes to implement intelligent solutions is often more economical and practical for small to medium-sized intelligent security surveillance projects. AI box application. AI box deployment application Edge AI Box does not require changes to existing video surveillance kit deployments Since the Edge AI Box does not require changes to existing video surveillance equipment deployments and only upgrades the original system to enable intelligent applications for existing monitoring devices, it can save significant labour costs associated with on-site deployment personnel. After the Edge AI Box and AI-powered cameras transmit intelligent analysis results to the platform, what can the platform do? Taking the video surveillance management platform SVMS Pro as an example. SVMS Pro video surveillance management software First SVMS Pro provides centralised management for multiple AI Boxes across diverse networks (LAN, WAN, VPN, 4G/5G). This flexibility enables users to deploy AI Boxes anywhere project requirements demand. With the AI Box and cameras connected to the SVMS Pro video surveillance management software, users can select video channels for analysis. The AI Box automatically analyses the chosen channels, transmits the results, and triggers alarms back to SVMS Pro. This seamless integration provides a unified platform for users to: Configure event settings Define alarm-triggering actions (such as alarm recording and alarm video pop-up). Alerts originating from the AI Box can trigger video recording via the SVMS Pro platform. These recordings are then stored long-term within the SVMS Pro platform. This capability resolves the limitation of the AI Box itself, which cannot store recordings for extended periods due to constraints imposed by its physical size. Search historical alarm events Manage active alarms View alarm statistics Additionally, SVMS Pro facilitates pushing the analysed results to third-party platforms via the network. SVMS Pro provide various AI intelligent solutions for different scenarios. AI intelligent solutions for different scenarios AI box + video surveillance management software SVMS Pro provides various AI intelligent solutions for different scenarios. For example: In smart construction site applications, AI box can provide not wearing safety helmet and reflective vest detection, fight detection, area intrusion detection, wandering detection, fire detection, etc., and display real-time results in real-time on SVMS Pro. Users can watch real-time video from different places, store the recordings, playback, get the real-time AI alarms, put the video on the video wall, etc., all in one platform. SVMS Pro and AI Edge Boxes Combined force of SVMS Pro and AI Edge Boxes presents a truly unified and intelligent solution In essence, the combined force of SVMS Pro and AI Edge Boxes presents a truly unified and intelligent solution, effectively overcoming the inherent limitations of both traditional front-end and back-end surveillance intelligence. The AI Edge Boxes deliver powerful, real-time analytics at the edge or as scalable micro-servers, offering unprecedented flexibility and cost-effectiveness – particularly vital for small to medium-sized projects. SVMS Pro elevates this capability by providing centralised command and control, seamlessly integrating diverse AI Boxes across any network to offer comprehensive video management. Advanced AI surveillance This synergy enables robust features like intelligent event configuration, alarm-triggered recording with long-term SVMS Pro storage, historical event search, and cross-platform integration, all within a single, cost-optimised platform. From construction sites to broader security networks, this unified solution transforms raw video into actionable intelligence, democratising advanced AI surveillance by making it accessible, practical, and economically viable. SVMS Pro and AI Edge Boxes together redefine intelligent video management for the modern era.
The physical security industry has been in love with the cloud for quite some time. And understandably so. The promise of instant scalability, centralised access, and simplified maintenance is hard to ignore, especially in an era of remote work and distributed facilities. But reality is catching up to the hype. For many, especially those dealing with video surveillance at scale, the cloud is no longer the catch-all solution it once seemed. Rising costs, bandwidth limitations, and latency issues are exposing its shortcomings. And the more resolution increases, from HD to 4K and beyond, the heavier that burden becomes. Modern security cameras This is where edge computing, specifically AI-enabled edge processing available in modern security cameras, starts to look less like an option and more like a necessity. But it’s not just about adding intelligence to cameras. It’s about how that intelligence is deployed, scaled, and maintained. This leads us to containerisation and tools such as Docker, which are a revolutionary piece of the puzzle. When cloud isn't enough Cloud analytics for video sounds great in theory: stream everything to the cloud Let’s start with a basic issue. Cloud analytics for video sounds great in theory: stream everything to the cloud, let powerful servers do the thinking, then serve up results to end-users in real time. However, in practice, this model can break down quickly for many end-users. Raw video is heavy. A single 4K camera streaming 24/7 can generate terabytes of data per month. Multiply that by hundreds or thousands of cameras, and the bandwidth and storage costs become unsustainable. Then there’s latency. If AI needs to detect a person entering a restricted area or identify a licence plate in motion, seconds count. Routing video to a cloud server for analysis and waiting for a response can introduce delays. Adding in concerns about uptime, such as what happens if the internet connection goes down, it becomes clear why relying exclusively on the cloud creates friction for mission-critical deployments. The edge advantage Edge processing turns that model on its head. Instead of sending everything out for analysis, edge-enabled cameras do the heavy lifting on-site. AI algorithms run directly on the device, interpreting what they see in real time. They generate metadata—lightweight descriptions of events, objects, or behaviors—rather than raw video. This metadata can be used to trigger alerts, inform decisions, or guide further review. The benefits are obvious: latency drops, bandwidth use plummets, and storage becomes more efficient. Edge processing solves many cloud deployment issues by keeping the compute where the data is generated, on the device. This frees the cloud up to do what it’s best at: providing scalable and centralised access to important footage. But where does the edge go from here? How do we evolve these powerful IoT devices to deliver even more situational awareness? Enter Docker: An app store for Edge AI They package an app along with everything it needs to run: the code, settings, libraries, and tools This is where the concept of containerisation and open development platforms like Docker comes in. Let’s start with an analogy that is helpful for understanding containers. Imagine you're getting ready for a trip. Rather than hoping your hotel has everything you need, you pack a suitcase with all your essentials: clothes, toiletries, chargers, maybe even snacks. When you arrive at your destination, you open the suitcase and you’re ready to go. You don’t need to borrow anything or adjust to whatever the hotel has, since you’ve brought your own reliable setup. Containers in software work the same way. They package an app along with everything it needs to run: the code, settings, libraries, and tools. This means the application behaves exactly the same, whether it’s running on a developer’s laptop, on the edge in an IoT device, or in the cloud. Security camera with a powerful edge processor There’s no last-minute scrambling to make it compatible with the environment it lands in, because it’s self-contained, portable, and consistent. Just like a well-packed suitcase simplifies travel, containers simplify software deployment. They make applications faster to start, easier to manage, and more predictable, no matter where they’re used. For a security camera with a powerful edge processor, it’s like giving the camera its own specialised toolkit that can be swapped out or upgraded without touching the rest of the system. It also means you can run multiple AI applications on a single camera, each in its own isolated environment. Integrators and end-users These applications don’t interfere with each other and can be updated independently Want to add fall detection to a healthcare facility’s camera network? Just deploy the analytics in a container. Need to monitor loading docks for pallet counts at a warehouse? Spin up a different container. These applications don’t interfere with each other and can be updated independently. As a developer, if you use an open container platform like Docker, any system that supports Docker can utilise your software. This removes the need to do expensive custom work for each partner and ecosystem. This is one reason Docker containers are tried and true in the larger IT space and are just starting to get traction in the security sector. Docker also makes this scalable. Developers can build AI tools once and push them out to hundreds or thousands of devices. Integrators and end-users can customise deployments without being locked into proprietary ecosystems. And because containers isolate applications from core system functions, security risks are minimised. Metadata, not megabytes Traditional video analytics systems often require full video streams to be processed One of the most underappreciated aspects of this method is the way it redefines data flow. Traditional video analytics systems often require full video streams to be processed in centralised servers, either on-premises or in the cloud. This model is brittle and costly, and it’s also unnecessary. Most of the time, users aren’t interested in every frame. They’re looking for specific events. Edge AI enables cameras to generate metadata about what they see: “Vehicle detected at 4:02 PM,” “Person loitering at entrance,” “Package removed from shelf.” This metadata can be transmitted instantly with minimal bandwidth. Video can still be recorded locally or in the cloud, but only accessed when needed. This dramatically reduces network load and allows the cloud to be used more strategically: for remote access, long-term archiving, or large-scale data aggregation, without being overwhelmed by volume. Building smarter systems, together A single camera can run analytics from multiple third parties, all within a secure, containerised framework An equally important aspect of containerisation is how it opens up the ecosystem. Traditional security systems are often built as closed solutions. Everything—from the cameras to the software to the analytics—comes from a single vendor. While this simplifies procurement, it limits innovation and flexibility. Docker flips that model. Because it’s an open, well-established standard, developers from any background can create applications for edge devices. Integrators can mix and match tools to meet unique customer needs. A single camera can run analytics from multiple third parties, all within a secure, containerised framework. This is a profound shift. Security cameras stop being fixed-function appliances and become software-defined platforms. And like any good platform, their value increases with the range of tools available. Hybrid: The realistic future So, where does this leave the cloud? It is still essential, but in a more specialised role. The most robust, future-proof architectures will be hybrid: edge-first and cloud-supported. Real-time detection and decision-making happen locally, where speed and uptime matter most. The cloud handles oversight, coordination, and data warehousing. Real-time detection and decision-making happen locally, where speed and uptime matter most This hybrid model is especially useful for organisations with complex deployments. A manufacturing plant might retain video locally for 30 days but push older footage to the cloud to meet retention requirements. A retail chain might analyse customer flow on-site but aggregate trend data in the cloud for HQ-level insight. Hybrid gives organisations the flexibility to optimise cost, compliance, and performance. Regulatory realities It’s also worth noting that not every organisation can, or should, store data in the cloud. Privacy regulations like GDPR in Europe or similar laws elsewhere require strict control over where data is stored. In many cases, sensitive footage must remain in-country. Edge and hybrid models can make compliance easier by minimising unnecessary data movement. Conclusion: Smart security starts at the edge The next wave of innovation in physical security won’t come from bigger cloud servers or faster internet connections. It will come from smarter edge devices, with cameras and sensors that don’t just record, but understand and classify events. And the foundation for that intelligence isn’t just AI, but how that AI is deployed. Containerisation via platforms like Docker is unlocking new levels of flexibility, security, and scalability for the physical security industry. By embracing open standards, supporting modular applications, and rethinking how data flows through the system, physical security professionals can build solutions that are not only more effective but also more sustainable, secure, and adaptable. The cloud still has its place. But the edge is essential to the future for real-time intelligence, mission-critical uptime, and cost-effective deployment.
In the old days, hopping onto the platform from a not-yet-stopped train was a commonplace stunt for daily commuters in a hurry. It was a thrilling, but dangerous part of railway travel. Today, rail travel is generally much safer, but thrill and fame seekers are finding new, creative ways to use the railway to court notoriety online. Earlier this month, a young man filmed himself laying on the tracks and allowing a train to pass over him. In another instance, two people were seen misusing a level crossing to get an 'Instagram worthy' picture. Meanwhile, the media has recently reported stories from Austria to Australia of people (and in some cases children) being seriously hurt or killed whilst attempting to train surf. Safety and security of the railway Safety and security have always been a top priority for railways and supporting agencies For rail companies, such incidents cause great distress and bring often unjust headlines that question the level of safety and security of the railway. Then, of course, there is the impact on the timetable when incidents cause significant delays. The ramifications of just one incident can be significant, as illustrated by a case in February when a track trespasser caused 16 trains to be cancelled and a further 54 to be partially cancelled at the cost of approximately 600,000 euros. Despite the negative stories, safety and security have always been a top priority for railways and supporting agencies. The British Transport Police, for example, traces its origin back to 1830 when the force was established following the death of a member of Parliament, who was struck by a passing train after alighting onto the track of the newly opened Liverpool and Manchester Railway. Modern surveillance Today, trains, platforms, yards, level crossings and sections of track are monitored by some of the very latest technology hardware and software, from high-definition cameras with built-in advanced video analytics capabilities to PSIM (physical security information management) systems that can be used to orchestrate a response to anything from a trespasser on the line to a major derailment. Even with all these systems, the sheer scale of rail networks means it is simply not possible to always have eyes everywhere. True of video analytics If a driver spots someone or something on the line and immediately applies the emergency brake What’s more, whilst the technology continues to make huge leaps forward, affordability and usability can limit their effectiveness. This has been especially true of video analytics and object detection, where distinguishing between a human trespasser or an animal can be challenging, especially in low light (a particular issue with passenger and freight trains running round the clock). With trains moving at a high speed, early detection is everything. If a driver spots someone or something on the line and immediately applies the emergency brake, it could take the train as much as one mile to come to a stop. LiDAR to the rescue So, what can be done to improve response times for drivers and other stakeholders? One recommendation is to focus on key sections of the rail network that provide easier access for trespassers, such as stations, platforms, tunnels, bridges and level crossings, where more than a quarter of all significant accidents occur on EU railways. This is already standard operating procedure for most rail companies. However, a growing number are going beyond the 'standard' safety and security measures, with the introduction of high-tech solutions such as 3D LiDAR (Light Detection and Ranging) sensors. This technology is already familiar to the rail industry. It has been used for some time in applications ranging from surveying environments in preparation for building high-speed rail networks to mapping railway tracks and surrounding infrastructure for ongoing maintenance works. Management of virtual perimeters LiDAR enables the creation and management of virtual perimeters and/or safe zones In the context of safety and security on the railway, LiDAR enables the creation and management of virtual perimeters and/or safe zones with pinpoint accuracy. A good example would be at level crossings where a high volume of vehicle and pedestrian traffic crosses the track when the barrier is raised, but it must be clear for rolling stock to pass safely. LiDAR sensors can be programmed to automatically switch on minutes before a train is scheduled to pass through the crossing and turned off after it has cleared the area. During this time, any movement detected with this ‘live zone’ would create an alert in the control room. Further layer of protection The addition of cameras would provide a real-time feed of the situation, enabling the control room operator to act. That could involve sending a message via a public address system to clear the area, alerting the approaching train driver to take appropriate action, and alerting emergency services and maintenance teams if there is a vehicle, animal or other blockage on the track. The investment many rail operators have made in PSIM and CAD (computer-aided dispatch) can add a further layer of protection. These systems provide the operator not only with guidance regarding the next best action but also automatically triggered responses to orchestrate the entire incident management process. Protecting critical infrastructure All of these pieces of rail infrastructure and the joint network stand to benefit from the use of LiDAR Level crossings are a good example of environments where it is not viable to have round-the-clock live surveillance, but monitoring is essential at key times. It is a similar case for stations late at night, bridges and depots, all of which are susceptible to acts of trespass, vandalism (particularly graffiti) and theft. All of these pieces of rail infrastructure and the collective network stand to benefit from the use of LiDAR, as incidents are prevented or their impact mitigated in terms of the effect on the timetable, negative publicity, fines and the costs of investigations. Latest Report on Railway Safety and Interoperability The latest Report on Railway Safety and Interoperability in the EU stated that “European railways remain among the safest in the world, with major accidents becoming rare and significant accidents decreasing in the last two decades.” This good news is heightened by the fact that more people than ever in Europe are choosing to let the ‘train take the strain’, with passenger numbers reaching record levels. However, whilst passengers may no longer be swinging open train doors and jumping from moving carriages just to get to work a few seconds earlier, the risks on the railways have evolved. With more rolling stock travelling at higher speeds on lines old and new, there is a need to revisit the traditional methods of safeguarding areas on the network, to deter, detect and protect against those seeking fame, infamy or gain.
Security beat
For all the emphasis on cloud systems and centralised servers at ISC West, a lot of innovation in security video systems is happening at the edge. New advancements inside video cameras are boosting capabilities at the edge, from advancements in processing power to artificial intelligence (AI) and machine learning (ML) algorithms that can now be deployed directly on the cameras or edge devices. Advancements in AI algorithms The progress of video systems becoming smarter at the edge is driven by the need for real-time insights, lower latency, bandwidth efficiency, enhanced privacy, and improved reliability. Advancements in edge computing hardware and AI algorithms are enabling a range of intelligent video applications across various industries, including physical security. Smarter functionality at the edge is a benefit of new computer systems-on-chips (SoCs) that are driving new heights of performance for today’s cameras. Axis Communications’ ARTPEC-9 Axis Communications’ new ARTPEC-9 SoC offers advanced video compression to reduce bandwidth Axis Communication’s new ARTPEC-9 system-on-chip (SoC) offers advanced video compression to reduce bandwidth and storage needs. With a low bitrate, the SoC helps deliver high-quality imaging with outstanding forensic detail. ARTPEC-9 also offers enhanced deep learning capabilities to allow users to leverage the latest video analytics and accelerate the implementation of AI technology. Axis maintains control over all aspects of the chip’s development to ensure high quality and cybersecurity. Among the benefits of ARTPEC-9 are better AI and deep learning, better image quality, better cybersecurity, and AV1 license-free video compression (see below). Hanwha Vision’s Wisenet 9 Hanwha Vision has launched Wisenet 9, its most advanced AI-powered System on Chip (SoC). Wisenet 9’s enhanced edge AI capabilities increase performance as the volume and complexity of security threats demand real-time, accurate analysis. By elevating edge-device performance, AI empowers systems to quickly analyse vast amounts of video data and discern crucial patterns and anomalies. A key differentiator driving Wisenet 9 is deployment of two Neural Processing Units (NPUs), which improve performance three-fold compared to Wisenet 7, the previous SoC generation. While one NPU handles image processing, the other focuses on object detection and advanced analytics. This dual NPU concept was introduced to ensure video quality and analytics have independent resources, thus preventing one function from impacting the performance of the other. The latest from Ambarella Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers Off the ISC West trade show floor in a nearby meeting room, semiconductor company Ambarella demonstrated how it will continue to push the envelope of what is possible with generative AI at the edge. Ambarella is a supplier of edge AI systems-on-chips to multiple video camera manufacturers and recently achieved the milestone of 30 million cumulative units shipped. The demonstrations highlight Ambarella’s ability to enable scalable, high-performance reasoning and vision AI applications across its ultra-efficient, edge-inference CVflow 3.0 AI SoC portfolio. The company’s DeepSeek GenAI models run on three different price/performance levels of its SoC portfolio. In addition to advancements in GenAI processing at the edge, Ambarella integrates image processing, encoding and system-level functions into all its AI SoCs. New standard for video encoding: AV1 AV1 compression is a next-generation video coding technology that offers significant improvements in compression efficiency and video quality, especially at lower bitrates. Its royalty-free nature positions it as a crucial codec for the future of internet video. AV1 compression is a next-generation video coding technology. Axis Communication’s ARTPEC-9 chip now supports the AV1 video encoding standard. By embracing this standard, which is new to the physical security market although it was introduced in 2018, Axis sets the stage for AV1 compression to eventually become the industry standard, replacing H.264 and H.265. Network video transmission AV1 is an open-source, license-free coding format designed mainly for efficient network video transmission AV1 is an open-source, license-free coding format designed specifically for efficient network video transmission. It delivers high-quality video at low bitrates, reducing bandwidth consumption and storage costs. The codec was developed by the Alliance for Open Media (AOM), a nonprofit organisation founded in 2015 by Google, Intel, Amazon, Microsoft, Netflix, and Mozilla (among others), to provide open-standard, next-gen video coding technology. AV1 is ideal for cloud solutions—making streaming applications more robust, scalable, and capable of delivering real-time insights. Now the ARTPEC-9 chipset brings these benefits to the surveillance industry, and AV1 is currently supported by AXIS Camera Station. Providers of major video management solutions (VMS) such as Genetec and Milestone will be adding support for AV1, with further developments already underway. More intelligence at the edge Intelligence inside video cameras comes from the processing power and algorithms that enable them to perform tasks beyond simply capturing and recording images. This "intelligence" allows cameras to analyse the video stream in real-time, identify objects, detect events, and make decisions or provide alerts based on what they "see." New and improved SoCs are driving performance improvements at the edge. The increasing power of embedded processors and advancements in AI are continuously expanding the capabilities of intelligent video cameras.
Anyone who has been in a proverbial cave for the last couple of years faced a language barrier at this year’s ISC West 2025 trade show. The industry’s latest wave of innovation has brought with it a new bounty of jargon and buzzwords, some of which I heard at ISC West for the first time. As a public service, we are happy to provide the following partial glossary to promote better understanding of the newer terms. (Some are new to the security industry but have been around in the IT world for years.) Obviously, if we can’t understand the meaning of the industry’s lexicon (and agree on the meaning of terms!), we will struggle to embrace the full benefits of the latest industry innovation. Not to mention, we will struggle to communicate. Generative AI Generative AI can identify an object in an image based on its understanding of previous objects This was perhaps the most common new(ish) term I heard bouncing around at ISC West. While the term artificial intelligence (AI) now rolls off everyone’s tongue, the generative “version” of the term is catching up. Generative AI uses what it has learned to create something new. The name comes from the core function of this type of artificial intelligence: it can generate (or create) new content. It doesn’t just copy and paste; it understands the underlying patterns and creates something original based on that understanding. In the case of video, for example, generative AI can identify an object in an image based on its understanding of previous objects it has seen. Video and security Generative AI can tell you something digitally about what is happening in an environment. There is no longer a need to write “rules;” the system can take in data, contextualise it, and understand it, even if it does not exactly match something it has seen before. In the case of video and security, generative AI offers more flexibility and better understanding. From 2014 to 2024, the emphasis was on detecting and classifying things; today AI is expanding to allow new ways to handle data, not so prescriptive and no more rules engines. Agentic AI Agentic AI refers to artificial intelligence systems that can operate autonomously to achieve specific goals Agentic AI refers to artificial intelligence systems that can operate autonomously to achieve specific goals, with minimal to no direct human intervention. In addition to the capabilities of generative AI, agentic AI can take action based on what it detects and understands. Use of agentic AI typically revolves around an if/then scenario. That is, if action A occurs, then the system should proceed with action B. For example, if an AI system “sees” a fire, then it will shut down that part of the building automatically without a human having to initiate the shutdown. There is a lot of discussion in the industry about the need to keep humans involved in the decision-making loop, so the use of truly autonomous systems will likely be limited in the foreseeable future. However, the ability of agentic AI to act on critical information in a timely manner, in effect to serve as an “agent” in place of a human decision-maker, will find its place in physical security as we move forward. Inference Inference is another common term related to AI. It refers to the process by which an AI model uses the knowledge it gained during its training phase to make predictions, classifications, or generate outputs on new, unseen data. The direct relationship of this term to physical security and video is obvious. In the simplest terms, an AI system is “trained” by learning patterns, relationships, and features from a large dataset. During inference, the trained model is presented with new questions (data it hasn't seen before), and it applies what it learned during training to provide answers or make decisions. Simply put, inference is what makes AI systems intelligent. Containerisation Dividing a massive security management system into several separate containers enables management of the various parts In IT, containerisation is a form of operating system-level virtualisation that allows you to package an application and all its dependencies (libraries, binaries, configuration files) into a single, portable image called a container. This container can then be run consistently across any infrastructure that supports containerisation, such as a developer's laptop, a testing environment, or a server in the cloud. In the physical security industry, you hear “containerisation” used in the context of separating out the various components of a larger system. Dividing a massive security management system into several independent containers enables the various parts to be managed, updated, and enhanced without impacting the larger whole. Genetec’s SecurityCentre cloud platform Think of it like shipping containers in the real world. Each container holds everything an application needs to run, isolated from other applications and from the underlying system. This ensures that the application will work the same way regardless of the environment it is deployed in. “It took us five years to containerise Genetec’s SecurityCentre cloud platform, but containerisation now simplifies delivering updates to products whenever we want,” says Andrew Elvish, Genetec’s VP Marketing. Among other benefits, containerisation enables Genetec to provide more frequent updates--every 12 days. Headless appliance Headless appliance is a device that is managed and controlled remotely through a network or web interface A headless appliance is a device that is managed and controlled remotely through a network or web interface. The device is like a “body without a head” in the traditional sense of computer interaction: It performs its intended function, but without any visual output or input device for local interaction. In physical security, such devices are increasingly part of cloud-based systems in which the centralised software manages and operates all the disparate “headless” devices. A headless appliance does not have a Windows management system. “The whole thing is managed through the as-a-service cloud system,” says Elvish. With a headless device, you just plug it into the network, and it is managed by your system. You manage the Linux-based device remotely, so configuring and deploying it is easy. Democratising AI You hear the term democratising AI used by camera manufacturers who are looking to expand AI capabilities throughout their camera lines, including value-priced models. For example, even i-PRO’s value-priced cameras (U series) now have AI – fulfilling their promise to democratise AI. Another approach is to connect non-AI-equipped cameras to the network by way of an AI-equipped camera, a process known as “AI-relay.” For instance, i-PRO can incorporate non-AI cameras into a system by routing/connecting them through an X-series camera to provide AI functionality. Bosch is also embracing AI throughout its video camera line and enabling customers to choose application-specific analytics for each use case, in effect, tailoring each camera to the application, and providing AI to everyone. Context Cloud system also enables users to ask open-ended queries that involve context, in addition to detection Context refers to an AI system that can understand the “why” of a situation. For example, if someone stops in an area and triggers a video “loitering” analytic, the event might trigger an alarm involving an operator. However, if an AI system can provide “context” (e.g., he stopped to tie his shoe), then the event can be easily dismissed by the automated system without involving an operator. Bosch’s IVA-Pro Context product is a service-based model that adds context to edge detection. The cloud system also enables users to ask open-ended questions that involve context in addition to detection. For example, rather than asking "do you see a gas can?" you can ask "do you see any safety hazards in this scene?" The pre-trained model understands most common objects, and understands correlations, such as "a gas can could be a safety hazard.” A scaled-down on-premise version of the IVA Context product will be available in 2026. Bosch showed a prototype at ISC West. Most video data is never viewed by an operator. Context allows a system to look at all the video with "almost human eyes." Cameras are essentially watching themselves, and understanding why something happened and what we can do. All that previously unwatched video is now being watched by the system itself, boosted by the ability to add “context” to the system. Any meaningful information based on context can trigger a response by an operator. Data lake A data lake is a centralised repository that allows one to store vast amounts of structured, semi-structured, and unstructured data in its native format. In the case of the physical security marketplace, a data lake includes data generated by systems outside the physical security infrastructure, from inventory and logistics systems, for example. A data lake is where an enterprise can accumulate all their data, from the weather to Point-of-Sale information to logistics, to whatever they can gather. Putting the data in one place (a “data lake”) enables them to mine that data and parse it in different ways using AI to provide information and insights into their business. Notably, a data lake contains all a company’s data, not just security or video data, which opens up new opportunities to leverage the value of data beyond security and safety applications. Crunching the various information in a data lake, therefore, security technology can be used to maximise business operations.
ISC West 2025 in Las Vegas showcased the latest advancements in security technology, offering security professionals a glimpse into the future of the industry. This year's expo highlighted the growing influence of artificial intelligence (AI), cloud computing, and enhanced integration. The pioneering comprehensive and converged security event attracted nearly 29,000 industry professionals to the Venetian Convention Centre. Integration into unified platforms Several companies emphasised the importance of cloud-based solutions and the integration of diverse security components into unified platforms. For example, Brivo's Security Suite provides “everything in one platform” – not just access control. Customers only pay for what they use because the system is flexible and scalable from a single door to enterprise level applications. Brivo’s suite includes video, but the system can also tie in with third-party “partners.” Genetec's Security Centre allows for more frequent updates through the cloud. Milestone is undergoing a two-year transition to bring its Xprotect system into the future by incorporating Arcules and Briefcam into a video-as-a service product. Suprema introduced BioStar X, which integrates access control and video analytics into a single platform. AI and mobile credentials Axis Communications’ Cloud Connect product announced three new partnerships at ISC West 2025 Axis Communications’ Cloud Connect product announced three new partnerships at ISC West – Eagle Eye Networks, SecuriThings, and Wesco. They join the three partners announced during the first year of Axis Cloud Connect – Genetec, Kone (elevators) and Milestone. AI and mobile credentials were still hot topics at ISC West 2025, but the conversation has evolved beyond amazement at the technologies’ capabilities and now centres on more practical aspects. From the theoretical to the practical “AI and mobility are still the ‘flavors de jour,’ but messages are evolving to manifest AI for better outcomes,” says Heather Torrey, General Manager, Commercial Security, Americas, for Honeywell Building Automation. The company has reframed its security portfolio to be very building- and business-focused, continuing to grow and evolve after the recent acquisition of LenelS2. “From the theoretical to the practical, we want customers to be part of the conversation so we can deliver AI that is meaningful to them, focusing on what’s most important,” says Torrey. Under Honeywell’s new ownership structure, “each part of the business can be more focused on customers’ needs,” she says. Honeywell continues its journey around mobile access and credentialing and migrating to cloud solutions. Innovations in Access Control Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems Access control remains a critical component of security systems, and ISC West 2025 showcased several innovations in this area. Acre is releasing “Gallery,” its version of the App Store for access control. DormaKaba is launching the Keyscan KC Series door controller with TCP/IP connectivity and enhanced features. Gallagher’s new Quickswitch access control board simplifies the migration from legacy systems. Johnson Controls highlighted its C-Cure command centre and C-Cure IQ web client, offering a unified approach to access control and video. Hardware integrations for security panels For service provider Alarm.com, hardware products prepare a path to greater customer experiences, says Abe Kinney, Alarm.com’s Director, Product Management, who oversees hardware integrations for security panels, sensors, video, etc., and drives new product development. “We are looking to bridge the physical world to digital world,” he says. “We want to bring an advantage to our dealers that they can bring to customers.” Because Alarm.com’s customers pay a monthly fee, the products must be durable and economical, says Kinney. “It should work with no need for truck rolls.” The importance of longevity and flexibility Products are evaluated based on features, price, and ease of installation Products are evaluated based on features, price, and ease of installation. In particular, longevity is important for the Alarm.com’s pro channel. There is also a growing emphasis on deterrence industrywide. Says Kinney: “We recognise that detection is part of it, but we need to prevent problems from happening in the first place. And the industry is re-evaluating.” When it comes to cloud intelligence, Eagle Eye Networks puts the emphasis on flexibility. They offer AI that can perform anywhere on the system infrastructure, on the camera, on their on-site bridge device, or in the cloud. They support their own AI and also any AI product from a third party. “We focus on what customers want from the data AI detects,” says Hans Kahler, Eagle Eye Networks’ Chief Operating Officer. Integration with other systems A timely alert from gun detection could save a life, but AI can also generate information that might be used and analysed later, such as point-of-sale information, dwell time, foot traffic, etc. “What people want is the ability to work with the data for business intelligence,” says Kahler. Integration with other systems provides new opportunities for customers: For example, a licence plate reader at a restaurant drive-thru could trigger customisation of the menu board digital signage based on the customer’s previous buying pattern. Relentless Innovation Assa Abloy handles more than 40 million SKUs for all its various brands, faked in 28 factories in the US Assa Abloy handles more than 40 million stock keeping units (SKUs) for all its various brands manufactured in 28 factories in the United States. Merely complying with regulations such as the “Buy American Act” is a monumental effort considering the massive product line, attendees heard at Assa Abloy’s Annual ISC West Breakfast focusing on compliance challenges in the security market. Meanwhile, back at the trade show booth, Assa Abloy focused on “relentless innovation” in every corner of its product line. Assa Abloy’s message: Innovation in security does not have to be about AI or automation. In fact, inventive approaches to products come in all shapes and sizes and at every level of the product portfolio, and innovation is happening faster than ever. For example, the Safebolt product from Securitech, a brand recently acquired by Assa Abloy, can quickly lock down existing doors with the press of a red button on a cylindrical or mortise lock. Temporary Systems to Secure Events Securing events is the focus of Allied Universal's Unified Command Solutions, which specialises in setting up temporary security systems for conventions, trade shows, festivals, construction sites, parades, and other events. They can add technology to situations where previously mostly security officers were used, providing safety/security and enabling more efficient event operation. “We can put cameras anywhere, whether they need power or not, use cell service or WiFi, a localised network or the internet, or whatever,” says Andrew LaMadrid, VP, Sales for Allied Universal's Unified Command Solutions. Event operation and management IDIS came to ISC West looking to leverage new products that they did not promote in the past The focus is on easy implementation, flexibility, and fast setup and removal. “We look for a solution to solve each customer’s pain points,” says LaMadrid. They specialise in setting up and deploying surveillance cameras for safety/security and for event operation and management. Mobile surveillance is a relatively new “piece of our puzzle” when it comes to protecting high-profile events. “People are excited about what we can offer that’s new,” says LaMadrid. Unified Command Solutions has been around for about 12 years and was acquired by Allied Universal last summer. IDIS came to ISC West looking to leverage new products that they did not promote in the past, and visitors were very interested in those solutions, says Scott Switzer, IDIS CEO. “The progression of our product line has been tremendous,” he says. Last year, the IDIS booth offered only basic analytics, but this year they had 30 different advanced analytics including gun and aggression detection using the advanced solution “IDIS Vaidio AI.” What Makes You Different? The most common question IDIS hears at their trade show booth is: “What makes you different?” The answer: They offer an end-to-end solution, including cameras; they manage, control, design from end-to-end; and there is no need for multiple integrations. The time needed to install an IDIS system is significantly less because of the simplicity. “We have customers we have supported and grown together for over 20 years,” says Switzer. The company previously deployed IDIS cameras under the Costar brand before the Korean IDIS brand was introduced into the U.S. (IDIS purchased Costar and changed the name to IDIS America.) “This has been a tremendous show for us; we are looking to build our momentum and let more people know about IDIS,” says Switzer. Managing real AI at the edge The depth of their metadata enables new applications, whether for security or business operations Based in Prague, Czech Republic, and with U.S. offices in Pennsylvania, FF Group provides licence plate recognition for harsh environments. Using Axis cameras, they offer “managed real AI at the edge,” selling through a nationwide distributed network, says Alex Osypov, CEO and Founder of FF Group. Markets include parking lots, cities/municipalities, police, government, water systems, etc. The depth of their metadata enables new applications, whether for security or business operations. They are looking to combine and correlate data including LIDAR, RADAR, etc. to exploit the advantages of “data fusion.” Osypov says: “The market is growing because we are involving other adjacent markets.” Unified platforms and advanced tools Several companies are focusing on enhancing security operations centres (SOCs) by providing unified platforms and advanced tools. Axon’s Fusus system “layers” onto existing infrastructure, tying together various sensors into a single interface for real-time monitoring and information sharing. Increasingly, enterprises have invested in a lot of technologies – ac, video, asset trackers – but none of it talks together. Fusus ties all the systems together so that operators no longer have to look at 10 different screens. Rather, there is a “single pane of glass” that shows everything and facilitates sharing of information with law enforcement. Motorola also showcased its Security Operations Centre, which integrates hardware, software, smart sensors, communication radios, and broadband devices to streamline incident management.
Case studies
ZeroEyes, the creators of the first AI-based gun detection video analytics platform to earn the full U.S. Department of Homeland Security SAFETY Act Designation, and Singlewire Software, the pioneer in solutions that help keep people safe and informed, announced a new partnership to improve emergency communications in schools. As part of this collaboration, Glassboro Public School District (GPSD) in New Jersey has become the first joint customer to deploy an integrated solution combining ZeroEyes’ AI gun detection with Singlewire’s InformaCast incident management software. Real-time gun detection alerts This integration supports faster, more coordinated emergency responses The integration enables real-time gun detection alerts from ZeroEyes to automatically trigger Singlewire’s InformaCast system, which can instantly distribute customised alerts across a wide range of devices. These include digital signage, PA systems, strobe lights, desk phones and more, all reaching targeted audiences. This integration supports faster, more coordinated emergency responses and ensures critical information reaches those who need it most. Hosting emergency training exercises GPSD is a Pre-K through 12 public school district located in Glassboro, New Jersey, serving approximately 1,950 students and 350 staff members across four schools and two district buildings. With a diverse student population and deep partnerships with neighboring Rowan University, the district offers specialised academics in Performing Arts, STEM, Biomedical Studies, and Business Leadership. The district prioritises safety and mental health, using tools like Senso and Gaggle to flag concerning keywords in emails, as well as hosting emergency training exercises with local law enforcement. ZeroEyes’ capabilities “Our district was immediately impressed upon seeing a demonstration of ZeroEyes’ capabilities, and recognised that integrating it with our Singlewire software would significantly enhance our security system,” said Craig Stephenson, assistant superintendent at GPSD. “The safety of our students and staff is our top priority, and this integration adds a critical new layer of protection.” Based in Madison, Wisconsin, Singlewire Software is a major provider of mass notification systems for schools, healthcare, government, and enterprise organisations. InformaCast platform Its InformaCast platform enables organisations to communicate quickly and effectively during emergencies and daily operations. Singlewire serves more than 2,000 K-12 customers across all 50 states and is widely trusted for its reliability and flexibility in high-stakes environments. “Shootings typically last only five to seven minutes, so every second counts,” said Terry Swanson, president and CEO of Singlewire Software. “By integrating ZeroEyes’ AI-based detection with our mass notification platform, we help schools take fast, decisive action. Our goal is to keep people safe and informed everywhere, every time, and this partnership strengthens that mission.” AI gun detection AI gun detection and intelligent situational awareness software layers onto existing digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Center (ZOC), the industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by military and law enforcement veterans. If these experts determine that the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to first responders and school staff as quickly as 3 to 5 seconds from detection. Integration with Singlewire “This integration with Singlewire is a powerful example of how two technologies can complement each other to enhance school safety,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “While ZeroEyes provides the critical early detection of a potential threat, Singlewire enables that intelligence to be instantly delivered across a wide range of devices and formats.” “It’s a mutually beneficial partnership that simplifies emergency response and helps protect lives. We’re proud to see this technology in action with Glassboro Public Schools and look forward to bringing it to more districts in the future.”
i-PRO Co., Ltd. (formerly Panasonic Security), a pioneering manufacturer of edge computing cameras for security and public safety, announced the successful deployment of its advanced, AI-powered camera technology at a major UK aerospace manufacturing facility. The project, delivered in partnership with long-time integrator Richards CCTV, modernised the site’s ageing security infrastructure, addressing stringent aviation industry compliance needs while enhancing safety, operational efficiency, and future scalability. Advanced functionality and analytics The customer, a prominent supplier within the global aerospace supply chain, operates in a high-risk environment The customer, a prominent supplier within the global aerospace supply chain, operates in a high-risk environment where precision engineering and rigorous safety standards are essential. Its legacy security system had grown increasingly unreliable, lacking the advanced functionality and analytics required for the complex security landscape. With high-value assets, civil aviation regulations, and extensive health-and-safety oversight requirements at play, the company sought a more intelligent, robust, and resilient security platform. i-PRO’s edge-AI camera technology To meet these demands, Richards CCTV designed and implemented a comprehensive upgrade based on i-PRO’s edge-AI camera technology. The installation included 169 high-performance cameras deployed across production lines, common areas, external perimeters, and critical zones. Key components Advanced camera technology i-PRO’s AI-powered search application that turns camera metadata into actionable intelligence i-PRO’s portfolio includes AI-enabled S-Series cameras that can distinguish people from objects in real time to reduce false alarms, high-speed PTZ cameras that extend perimeter awareness, and fixed domes that deliver clear evidence in shared spaces to help resolve incidents quickly. The cameras are integrated with Active Guard, i-PRO’s AI-powered search application that turns camera metadata into actionable intelligence, enabling operators to run real-time alerts and proactively manage incidents before they escalate. Remote monitoring and analytics enhance operational efficiency Real-time alerts and mobile integration allow managers to receive live notifications and make decisions remotely, reducing the need for constant on-site supervision. Meanwhile, embedded AI analytics enable quality-control teams to detect manufacturing anomalies earlier, increasing production integrity and minimising downtime. “Our client was happy to lean on our long-standing experience working with i-PRO cameras and the local i-PRO team,” said Phil Luckman, Sales Account Manager at Richards CCTV. “Knowing that i-PRO is willing to properly engage with a customer, come on-site if required, and help demonstrate a proof-of-concept is invaluable.” System reliability and ease of integration Post-deployment, the aerospace plant has seen measurable improvements across several fronts From the outset, system reliability and ease of integration were key. Richards CCTV reported that all 169 devices were “quick to configure and install,” with minimal disruption to day-to-day operations. i-PRO’s durable design, five-year hardware warranties for certified partners, and responsive UK-based support team ensured a smooth, future-proof, deployment and instilled confidence in the long-term viability of the platform. Post-deployment, the aerospace manufacturer has seen measurable improvements across several fronts. The ability to analyse footage from multiple angles has helped refute false personal injury claims, while also identifying root causes of legitimate incidents, leading to meaningful updates in health-and-safety policies. The new system’s high-fidelity audit trails also support quality assurance and compliance documentation, delivering transparency for internal stakeholders and regulators alike. New use cases for i-PRO’s evolving AI capabilities Looking ahead, the installation offers scalability and future-proofing, enabling the end user to adapt the system to continuously evolving needs and industry standards. Planned expansions include securing additional tree-lined zones and increasing coverage in logistics corridors. The facility is also exploring new use cases for i-PRO’s evolving AI capabilities, including automated detection of PPE compliance and unsafe behaviours around heavy machinery. “The cameras provide excellent images in all lighting conditions—every single one performed out of the box,” added Luckman. “With their build quality and long warranties, we know the i-PRO system will deliver long-term value.”
ZeroEyes, the creators of the first AI-based gun detection video analytics platform to earn the full U.S. Department of Homeland Security SAFETY Act Designation, announced that its proactive AI gun detection and intelligent situational awareness software has been deployed at Midland Christian School in Midland, Texas, to help protect students, staff, and visitors from gun-related threats. Located in Midland, Texas, Midland Christian School is a private, faith-based institution serving 1,286 K-12 students and 164 faculty members on a campus comprising six buildings. Upgraded its security with investments The school operates as a tight-knit community, making campus-wide safety an especially high priority With a community-driven, Christ-centered mission, Midland Christian School focuses on teaching students its core values, “Live for God. Love like Jesus. Learn for Life.” The school operates as a tight-knit community, making campus-wide safety an especially high priority. Recently, Midland Christian upgraded its security with investments such as 3M security film on all glass windows, a 24/7 on-campus security officer, and a dedicated Safety Committee made up of parents and school leadership. The adoption of ZeroEyes represents the latest step in advancing its layered safety strategy. ZeroEyes security efforts “Since 1957, Midland Christian School has striven to enrich students’ lives academically, spiritually, and emotionally,” said Dr. Gregory Anderson, President of Midland Christian School. “Their safety is a critical part of that mission, and adding ZeroEyes to our security efforts enables us to respond faster and more effectively to potential threats.” Existing digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto digital security cameras ZeroEyes' AI gun detection and intelligent situational awareness software layers onto existing digital security cameras. If a gun is identified, images are instantly shared with the ZeroEyes Operations Centre (ZOC), the industry's only U.S.-based, fully in-house operation centre, which is staffed 24/7/365 by specially trained U.S. military and law enforcement veterans. If these experts determine the threat is valid, they dispatch alerts and actionable intelligence — including visual description, gun type, and last known location — to local law enforcement and school administration as quickly as 3 to 5 seconds from detection. Proactive and strategic approach “Midland Christian School has taken a proactive and strategic approach to campus security, protecting students and teachers without compromising its positive, welcoming environment,” said Mike Lahiff, CEO and co-founder of ZeroEyes. “We’re proud to support their efforts with our unique solution designed to mitigate gun-related incidents with speed, accuracy, and integrity.”
ZE Government Solutions (ZEGS), a wholly owned subsidiary of AI-based gun detection pioneer - ZeroEyes, announced that its new ZeroEyes Awareness Kit (ZAK), a drone featuring advanced built-in video analytics capabilities, which allows for real-time threat detection and early warning, was used to enhance security at Joint Base Charleston (JB-CHS)’s August 16 Summer Fest Concert. ZEGS rapidly deployed its computer vision software onboard an Easy Aerial tethered drone to augment security forces with overwatch capabilities, alerting the teams to any potential firearms or unauthorised personnel on the active flight line. Deployment of ZAK for real-time security Set-up took less than 30 minutes and provided JB-CHS and its defenders with an AI-enabled security platform Joint Base Charleston is a U.S. military installation in South Carolina that serves as a hub for various military operations, including airlift and airdrop operations, naval nuclear training, and logistics support. Its annual Summer Fest concert is sponsored by Air Force Entertainment. This announcement marks the first deployment of ZAK for real-time security in a real-world environment since its development as part of the Air Force Research Laboratory’s Small Business Innovation Research (SBIR) Program. Set-up took less than 30 minutes and provided JB-CHS and its defenders with an AI-enabled security platform to enhance operations for the on-base event. Extra layer of aircrew security ZAK provided overwatch for six continuous hours of flight time, protecting more than 1,000 base personnel and their families. While the operational test was for an in-garrison Morale, Welfare, and Recreational (MWR)-sponsored event, the capability is intended to provide roll-on/roll-off security for C-17 crews based out of JB-CHS. The capability easily transfers to downrange operations providing an extra layer of aircrew security in emergency situations and austere environments and incorporates Tactical Awareness Kit (TAK) plug-in capability. Drone threat detection system “This significant achievement was made possible through our collaboration with the Palmetto Spark Cell at JB-CHS, which played a crucial role in enabling the real-time use of ZAK during this live event, when security was paramount,” said Dustin Kisling, Executive Vice President for ZeroEyes Government Solutions. He adds, “Their support allowed us to tailor our tethered drone threat detection system to meet the most demanding security use cases for Air Mobility Command. By providing a platform for rigorous testing and iterative development, the Palmetto Spark Cell has been instrumental in advancing ZAK’s capabilities and ensuring its readiness for deployment in real-world scenarios.” The future of the Air Force Drone Program and AI July SECDEF memo specifically stated that 'small UAS are such critical force enablers that they must be prioritised' The July SECDEF memo specifically stated that 'small UAS are such critical force enablers that they must be prioritised at the same level as major weapons systems.' 'No later than September 1, 2025, the U.S. Army, the U.S. Navy, the U.S. Marine Corps and the U.S. Air Force will establish deliberately screened, active-duty experimental formations purpose-built to enable rapid scaling of small UAS across the Joint Force by 2026.' Use of small UAS platforms This expedited timeline laid out by the current administration has raised the urgency levels of the force looking to pursue and sustain drone programs. In anticipation of directives like this following the use of small UAS platforms in Ukraine, ZEGS recognised the need for enhanced operations using Artificial Intelligence to combat threats in combat zones and for use in home-station operations where safety of force is crucial. With the help of the SBIR program and the Palmetto Spark, ZEGS was able to add this capability to its portfolio of public safety and DoD solutions. Growing industry need for AI While necessary, the SECDEF drone directive only addresses one component of the issue While necessary, the SECDEF drone directive only addresses one component of the issue – the deployment of a large number of sensors does not necessarily correspond to an improvement in situational awareness, as it often results in a deluge of information being delivered to operators or analysts. This information overload can place a significant cognitive burden, distracting them from the mission at hand. JB-CHS recognised this and has partnered with ZEGS to deliver a unique force multiplier for their drone program through the use of AI and computer vision. ZEGS’ capabilities with drone operations ZEGS enables a streamlined approach to surveillance of threats, whether downrange with adversaries or protecting citizens against insider threats in-garrison during public events. The pre-emptive efforts to combine ZEGS’ capabilities with drone operations has put Joint Base Charleston, Air Mobility Command, and the US Air Force ahead of the curve and leading the pack for future operations.
Round table discussion
Future-proofing your skillset is about embracing continuous learning and developing a versatile set of competencies that remain valuable regardless of technological shifts or industry changes. In the security marketplace, it is not about predicting the exact jobs of the future, but rather equipping yourself to adapt and thrive in the uncertain security landscape. But where to begin? The emerging technology shifts in the security industry provide clues, such as the growing importance of cybersecurity and artificial intelligence (AI). We asked our Expert Panel Roundtable: How can physical security professionals “future-proof” their skillsets to prepare for emerging technologies?
Physical security technologies are a prominent tool used by correctional facilities to provide a safe, secure, and controlled environment for staff, inmates, and the wider community. Among several functions, security technologies are used to prevent unauthorised access, to detect contraband, to monitor inmate movements and activities, and to protect staff. For security technology manufacturers, integrators and consultants, the corrections market presents distinctive challenges. We asked our Expert Panel Roundtable: What are the unique aspects of the corrections market, and how should the physical security industry adapt?
As cutting-edge trends go, convergence has been around for at least two decades. The meaning has shifted over the years, and if anything, the idea of convergence has gotten even more aspirational. Unfortunately, the widespread use of the term has also paradoxically undermined its meaning and power. However, today's concept of convergence has matured to provide new levels of benefit for security professionals. We asked our Expert Panel Roundtable: How has the meaning of “convergence” evolved in the security market? How are systems today more converged than ever?
Products


Video analytics: Manufacturers & Suppliers
- Bosch Video analytics
- Hanwha Vision Video analytics
- Avigilon Video analytics
- Hikvision Video analytics
- Axis Communications Video analytics
- Honeywell Security Video analytics
- FLIR Systems Video analytics
- IndigoVision Video analytics
- March Networks Video analytics
- AV Costar Video analytics
- VideoIQ Video analytics
- Videotec Video analytics
- AMAG Video analytics
- LTV Europe Video analytics