Home Articles posted by a&s Adria (Page 67)

Motorola to Acquire AI Communications Software Business

Motorola Solutions has entered into a definitive agreement to acquire Theatro Labs, Inc., a maker of AI and voice-powered communication and digital workflow software for frontline workers, based in Richardson, Texas.

Theatro’s software-as-a-service platform, purposefully designed for frontline workers, provides a suite of collaboration applications that deliver information in real time to help improve their productivity and physical safety. Using conversational language through a wearable device, users can ask Theatro’s AI voice assistant for guidance to assist customers, check inventory and pricing, and communicate with other team members. The technology can help accelerate employees’ work processes and product knowledge.

Additionally, with frontline employee safety threats and theft incidents continuing to rise, Theatro enables employees to discreetly alert management and security teams when they feel unsafe directly through the wearable device, while the AI voice assistant can issue step-by-step safety and incident protocol guidance to help manage a response. Theatro’s software also integrates with video security cameras to identify potential theft or safety threats, and proactively alert employees on the store floor.

“Theatro is designed to prioritise both safety and operational efficiency, which are essential for all frontline workers,” said Mahesh Saptharishi, executive vice president and chief technology officer, Motorola Solutions. “With Theatro, we are continuing to invest in innovative technologies that purposefully apply AI to protect employees while automating how they work and improving their service to customers.”

New value added services

Theatro serves well-known U.S. retailers across a broad range of merchant categories. Motorola Solutions and Theatro expect to integrate complementary workflows across Motorola Solutions’ portfolio of technologies, including body cameras, fixed video, panic buttons and radios, to provide new value-added services to existing customers while expanding growth opportunities in industries such as hospitality, healthcare, manufacturing and education.

“For more than a decade, we have been passionate about innovating for frontline workers,” said Chris Todd, President & CEO, Theatro. “We’re thrilled to be joining Motorola Solutions to enable even more capabilities that help team members remain safe while delivering their best work every day.”

Both Motorola Solutions and Theatro are exhibiting at NRF ’25 – Retail’s Big Show currently taking place in New York City.

The transaction is expected to close in the first half of 2025, following receipt of regulatory approvals and satisfaction of customary closing conditions. Terms of the transaction were not disclosed.

Quanergy Lidar Technology Helps Solve Data Centre Security Challenges

Quanergy Solutions, a leading provider of 3D Lidar solutions, is driving an awareness of its advanced 3D Lidar system, created to address critical vulnerabilities in data center security. With the rise of hyperscale, colocation, and edge facilities, data centres face unprecedented challenges in safeguarding sensitive information and ensuring uninterrupted operations.

“The future of data centre security lies in proactive, intelligent solutions,” says Adam Andres, Global VP of Sales at Quanergy. “Our 3D Lidar technology offers the advanced capabilities to detect and deter threats, ensuring the safety and reliability of critical infrastructure.”

Quanergy’s 3D Lidar is designed to eliminate blind spots, reduces false alarms by over 90%, and promises to deliver 360° real-time tracking, all while seamlessly integrating with existing infrastructure. Designed to monitor up to 1,000 moving objects simultaneously, the system provides unparalleled accuracy and adaptability even in challenging environments.

According to the company, blind spots, tailgating, and false alarms are among the top vulnerabilities in traditional security systems. Quanergy’s technology offers to tackle these issues head-on with features such as real-time tracking, comprehensive 360° coverage, and centimetre-level accuracy even in rain, fog, or total darkness. The solution also respects privacy by tracking objects without capturing personally identifiable information (PII).

Quanergy’s 3D Lidar technology has been deployed at over 100 critical infrastructure sites worldwide, delivering proven accuracy and reliability in complex environments.  According to Quanergy,the system demonstrated a 100% detection rate for simulated security breaches at a major global cloud provider, significantly reducing false alarms by 90%. This proven solution enhances data centre security while streamlining operations and reducing costs.

Suprema Recognised in Global Top 50 for 14th Consecutive Year

Suprema, a global leader of AI-based security solutions has once again been named a ‘2024 Global Top 50 Security Company’ as compiled by A&S, marking its 14th consecutive year. The top 50 list of security companies worldwide are announced annually, with companies being ranked based on revenue and profitability. Suprema has maintained its position on the list consistently since 2011.

A recent market research report, jointly published by the Security Industry Association (SIA), ASIS International, and Omdia, projects the global physical security market to grow from $51 billion in 2022 to $70 billion by 2026, with a compound annual growth rate (CAGR) of 8.2%. The report segments the physical security market into five categories: video surveillance, access control, intrusion alarms, fire detection, and other equipment. Among these, video surveillance leads the market, followed by access control as the second-largest segment. Notably, North America dominates the access control market, while regions such as Latin America, the Middle East, and Africa are expected to experience the fastest growth in the coming years.

Suprema provides access control security solutions to over 140 countries and has achieved the No. 1 market share in the biometric access control market within the EMEA (Europe, Middle East, and Africa) region.

This year, the company further accelerated its growth in emerging markets, including Africa, India, and Southeast Asia, achieving remarkable milestones. Suprema’s global leadership is underpinned by over 20 years of technological expertise, delivering reliable and high-performing products and services. The company remains at the forefront of innovation, consistently developing solutions that align with the latest security trends, including AI and cloud technologies.

Recently, Suprema launched the Bioentry W3, an AI-powered facial authentication device offering enhanced data security features. Additionally, Suprema has expanded the global reach of its Cluee, an open cloud integration service, further solidifying its market presence and achieving significant results.

“Being recognised as a Global Top 50 Security Company for 14 consecutive years is a testament to our ability to adapt swiftly to changing market trends and our relentless commitment to research and development,” said Hanchul Kim, CEO of Suprema Inc. “We will continue to strengthen our competitiveness as a global leader in AI-powered integrated security solutions and drive innovation in the industry.”

RFID Market Value to Double to $25.24 Billion by 2033

According to the latest research from Marketsandmarkets, the RFID market is expected to reach USD 25.24 billion by 2033, up from USD 12.61 billion in 2025, at a CAGR of 9.1% from 2025 to 2033.

The growth in the RFID market can be attributed to the increasing demand for automation and real-time tracking across retail, logistics & warehousing, healthcare, and manufacturing industries. The analysts found that the major drivers of growth of the market are an upsurge in demand for e-commerce and optimisation of the supply chain, enrichment of asset tracking and solutions in inventory management, increasing precision and security through RFID technological advancements, and the growing adoption of contactless transactions. The increasing demand for passive RFID tags and readers, RFID-IoT-cloud integration solutions, RFID initiatives by the government for various sectors, and smart city and Industry 4.0 initiatives are the major growth drivers for this market. The technology is becoming less expensive with time and has become more widely applicable in a broad range of industries.

Key players

This market includes key players on the world stage including Zebra Technologies Corp., Avery Dennison Corporation, Honeywell International Inc., HID Global Corporation, Datalogic S.p.A., Impinj, Inc., Gao RFID Inc., Alien Technology LLC, Caen RFID S.r.l., and Xemelgo, Inc. These businesses have adopted various organic and inorganic growth strategies such as product launches, expansions, partnerships, collaborations, and acquisitions.

Entertainment vertical is strong

In the vertical segment of the RFID market, the entertainment sector is characterized by a phenomenal growth and will attain the highest CAGR during the forecast period. The growth in the entertainment sector is chiefly driven due to the rising adoption of RFID technology and enhancing customer experience, operational processes, and security at entertainment venues such as theme parks, stadiums, and theatres. RFID-enabled wristbands and tickets are widely utilised for access control, cashless payments, and personalised services, significantly improving visitor convenience and operational efficiency. In addition, RFID technology aids in inventory management and asset tracking for equipment, costumes, and props in production houses and live events. Immersive experiences, like interactive exhibits and escape rooms, further increase the pace of the adoption of RFID solutions for real-time engagement and data collection. Thus, as demand for seamless, secure, and data-driven entertainment grows, it is likely that the inclusion of RFID solutions will become essential and therefore will grow at a tremendous rate in this segment of the market.

Larger size reduces costs and allows for greater volume

During the forecast period, the 12-inch segment in the RFID wafer size market is expected to grow at the highest CAGR. This growth will, however, be driven mainly by the demand for greater efficiency and performance in RFID applications. Larger wafers, such as the 12-inch, enable a far larger number of chips per wafer, reducing the per-unit cost of the individual chip and allowing greater volume. This requires additional wafer technology development as businesses such as logistics & warehousing, retail, and healthcare take up RFID-based technologies for asset tracking and authentication and inventory management purposes. The 12-inch wafers can support a higher density of chips and better performance and integration, which are critical to support the growth in RFID applications in various sectors. Moreover, the automation and digitisation trend across industries is also fuelling the demand for more effective and cost-controlled RFID solutions. Companies are continuing to invest in advanced RFID systems, putting the 12-inch wafer segment in a good position for witnessing a reasonable share of growth, which is another factor driving the RFID market.

Asia Pacific to remain the strongest market

Asia Pacific is anticipated to remain the largest market for RFID, because of solid industrial growth, fast uptake of technology, and substantial investments in logistics, retail, and manufacturing. This, combined with heavy investment into infrastructure, with growing pressure on supply chain efficiency, has quickly led to adoption across diverse industries. In addition, growing demands of retail, healthcare, and automotive sectors for automation, real-time tracking, and inventory management further boosts adoption of RFID technology. The research found that some key players in Asia Pacific like China, Japan, and South Korea have been leading the development of RFID technology; with the support of respective nation governments through considerable initiatives on smart cities and their economic digitalisation. Rising use of RFID solutions within the IoT ecosystems and an expanding pattern of e-commerce and smart retail are also the market contributors. In addition, benign environments that are regulatory in nature as well as the presence of big brands of RFID manufacturers within this region add to competitive edges and continued expansion within this Asia Pacific RFID market.

At the Bauhaus Museum, digital access streamlines security management and boosts user convenience

London, January 2025 – Opened to mark the 100th anniversary of Bauhaus’ founding, the Bauhaus Museum Dessau is a comprehensive public presentation of the Bauhaus Dessau Foundation collection. On show for the very first time, this valuable collection includes around 49,000 catalogued exhibits and is the second-largest Bauhaus collection in the world.

Located in the centre of the city, the museum is a building within a building – a suspended concrete structure inside a glass shell. Its architecture is characterized by transparency and simplicity in both concept and aesthetics. The glass façade reflects the surroundings to different degrees, or can be transparent, depending on lighting conditions.

Requirements for an intelligent digital key system in the museum were clearly set out in advance. The chosen solution must enable the simplest possible management of access authorizations. It should also fit unobtrusively within the building’s sophisticated architectural concept.

As in the Bauhaus main building and master houses, the Bauhaus Foundation chose a proven system: ASSA ABLOY’s eCLIQ programmable digital key solution.

“The building has an increasingly digital future,” says David Moser, SVP and Head of Digital Access Solutions at ASSA ABLOY Opening Solutions EMEIA. “Choosing a digital solution like eCLIQ, rather than mechanical access, can help organizations to work smarter and collaborate better.”

Benefits of digital access: security, convenience, reliability

“The electromechanical CLIQ master key system has already proven itself extremely well in the Bauhaus main building and in the master houses in Dessau,” explains Uwe Becker, Managing Director of Becker Sicherheitstechnik GmbH, the museum’s security partner on the project.

The eCLIQ system is a fully digital version of the CLIQ electromechanical key-operated solution. An eCLIQ system can bring digital access to almost any opening, helping filter authorized entry through doors and much more. Robust, durable cylinders and padlocks with eCLIQ technology can protect lifts, server racks, furniture, gates, mailboxes, cabinets and more with the same level of control as sensitive doors.

Every key has an integrated chip, which makes it unique. As a result, keys may be programmed individually to meet specific needs and access permissions. For keyholders, it’s a convenient solution.

The versatility and security benefits of eCLIQ are demonstrated whenever a key is lost. Each key’s access authorizations can be removed individually by reprogramming the cylinders. For greater flexibility, eCLIQ also enables access authorizations to be issued on a time-limited basis, which simplifies the management of external service providers such as maintenance contractors and cleaners.

“Digitalization helps all kinds of organizations to boost their site security and makes everyday access more convenient for everyone – employees, visitors and contractors,” adds David Moser.

Aesthetics and the switch to digital

All eCLIQ keys and cylinders are compatible with the high demands which Bauhaus places on design. They blend seamlessly with the varied installation situations of different doors and with the overall building concept in Dessau.

A standard battery inside each key powers the cylinder – and encrypts data transfer between lock, key and system. With eCLIQ, there is no need to wire cylinders or doors, which leaves building designs intact.

“ASSA ABLOY’s innovative access solutions can help you digitalize and truly future-proof access at almost any kind of site or building,” says David Moser.

“Our vast range of reliable, convenient solutions showcase the value of the digital transition and can be tailored to meet any organization’s needs or goals.”

If you also want to make your access ready for what’s ahead, visit https://www.assaabloy.com/group/emeia/campaigns/digitalwithconfidence

Saving lives and improving health: Electrical smoke ventilation systems in modern buildings

Fire safety is a fundamental requirement in modern construction as it saves lives, property, and investments.

Electrical smoke ventilation systems not only ensure safe evacuation routes and minimize structural damage during a fire but also enhance everyday building functionality.

Beyond emergency use, these systems integrate comfort ventilation for daily use to improve indoor air quality and comfort for building users.

For building owners and users, these systems represent a solution that delivers on every level – from compliance and cost-effectiveness to safety and user experience.

The ability of electrical smoke ventilation systems to combine reliability, energy efficiency, and advanced technology makes them indispensable in modern construction.

What are electrical smoke ventilation systems and how do they work?

Electrical smoke ventilation systems are designed to remove smoke and heat during a fire. By creating controlled airflows, they keep escape routes clear and minimize damage to the building.

Electrical smoke ventilation systems typically consist of:

  • Electric opening systems: Open and close ventilation points like skylights.
  • Smoke and heat detectors: Trigger the system when dangerous levels of smoke or heat are detected.
  • Control panels: Automatically activate the system or allow manual activation during an emergency.

When triggered, the system opens strategic ventilation points to create natural airflow. This process, called Natural Smoke and Heat Exhaust Ventilation (NSHEV), achieves:

  • Smoke-free escape routes for safe evacuation.
  • Lower temperatures to protect the building’s structural integrity.
  • Improved visibility for firefighters, enabling faster response.

The precision and reliability of electrical systems ensure consistent performance in critical moments.

Why choose electrical systems?

There are various technologies on the market for smoke ventilation. However, electrical solutions offer several key advantages, including:

  1. Low maintenance and service costs: Electrical systems have very few maintenance demands. In the event of service or a fault alarm, skylights can be closed remotely from the control panel, eliminating the need for manual intervention on the roof.
  2. Built-in comfort features: The electrical system has an integrated option for natural ventilation/climate control (comfort). Upgrading existing systems to comfort ventilation only require the addition of specific accessories.
  3. Great reliability: Electrical systems are less sensitive to environmental factors like temperature changes, ensuring consistent performance. Systems like those from Actulux are tested to operate reliably in both extreme heat during summer and freezing winter conditions, making them suitable for a variety of climates.
  4. Communication and integration: Electrical solutions can be easily adapted to modern building automation systems and allow remote monitoring and control. They work seamlessly with centralized controls, enabling real-time communication of alarm/fault signals from the control panel.
  5. Local compliance: Electrical systems can be adapted to meet regional safety regulations, ensuring smooth integration into local construction standards.

Benefits of electrical systems for building owners

Building owners benefit significantly from electrical smoke ventilation systems, both in terms of safety and cost efficiency.  The key advantages for building owners include:

  1. Low maintenance and long lifespan: Electrical systems require minimal upkeep, helping to reduce operational costs over time.
  2. Regulatory compliance: Meeting strict safety standards simplifies approval processes with local authorities.
  3. Integration with building automation systems: Electrical solutions can be seamlessly integrated with alarms and centralized control platforms, providing full oversight of the building’s safety measures.

For building owners, these systems represent a forward-thinking investment in operational efficiency and safety.

Benefits of electrical systems for building users

The ultimate beneficiaries of electrical smoke ventilation systems are the people who live, work, or visit the building. Benefits for users include:

  1. Enhanced safety during fires: These systems ensure clear evacuation routes by removing smoke quickly and effectively.
  2. Improved indoor air quality and comfort: Many electrical systems double as ventilation solutions for daily use, improving air quality and comfort.
  3. Peace of mind: With advanced monitoring and self-testing, occupants can trust that the system is always ready to protect them in an emergency.

For building users, these systems deliver both immediate safety and long-term benefits, improving their overall experience within the building.

Please insert this text in a factbox:

Why must skylights open in the event of a fire?

Opening skylights is a crucial aspect of fire safety as it allows smoke and heat to escape, protecting both lives and the building itself. Smoke poses the greatest threat during a fire, often being the primary cause of fatalities due to reduced visibility, toxic inhalation, and blocked escape routes.

By opening skylights strategically, smoke and heat are expelled, providing several critical benefits:

  1. Smoke removal: Open skylights create natural airflow, allowing smoke to rise and escape. This prevents it from accumulating in hallways and other critical areas.
  2. Clear evacuation routes: By removing smoke, escape routes such as staircases and corridors remain accessible, giving occupants a safe path to exit the building.
  3. Structural protection: Heat trapped inside a building can weaken its structural elements, increasing the risk of collapse. Proper ventilation lowers the temperature, protecting the building’s integrity.
  4. Support for firefighters: Ventilating smoke and heat improves visibility and prevents fire from spreading, enabling first responders to work more effectively.

Modern electrical systems automate this process, ensuring that skylights open quickly and strategically during a fire, saving precious time and lives.

ISE 2025: Connection Restored

ISE, the world-renowned annual tech show for the systems integration and audiovisual industry, will return to Fira de Barcelona Gran Via from 4-7 February 2025. Registration is now open for this must-attend event, offering a wealth of technological innovation, cutting-edge advancements, and inspiration for professionals in the integrated AV and security solutions community.

ISE 2025 promises to be an essential event for professionals who value cutting-edge security solutions and technological advancements, providing insights into the latest trends and innovations. The show features seven dedicated Technology Zones showcasing the world’s leading technology and solution suppliers, making it easier for attendees to find and compare the solutions they are looking for, and saving them time. Leading brands like Audinate, Bosch Security Solutions, Hikvision, LundHalsey, and Zenitel will showcase state-of-the-art AV solutions, providing valuable insights into how integrated systems can enhance automated security solutions.

Mike Blackman, Managing Director of Integrated Systems Events, explains: “ISE 2025 will be our most ambitious, inspiring, and motivating edition to date. We’re looking forward to a host of new initiatives and features, an expanded and more easily accessible content programme that digs deep into the most significant megatrends shaping our industry, as well as the unveiling of Hall 8.1 accessed via the conveniently located North Access point. ISE is the global destination to get your connection restored with the industry – through virtually impossible experiences, unrivalled networking opportunities, and state-of-the-art technology, as well as even more chances for career and personal development.”

As ISE 2025 evolves with exciting new features, a reimagined content programme, and a strong focus on AI, the Opening Keynote address on Tuesday 4 February is set to be an essential destination for attendees eager to discover why now is the time for business leaders to rethink their organisations for an AI-defined future. Globally acclaimed digital analyst, author, and visionary Brian Solis, known for his profound insights into the intersection of technology, business, and culture, will share his vision on how the pro AV and systems integration industry can change and innovate through the latest developments in artificial intelligence (AI).

Across the show floor at ISE 2025, you’ll discover an eye-popping array of technologies. There’ll also be the opportunity to explore how this technology is applied in real-life projects throughout the city, with ISE’s impressive collection of Tech Tours as well as the continued sponsorship of the annual LLUM BCN Festival of Light.

ISE brings the global AV and systems integration community together with unparalleled networking opportunities to connect with peers, industry leaders, and potential partners. From dedicated networking events to informal meetups, ISE is the place to make those invaluable connections that drive your business forward.

This year, ISE has shaken up the content programme to give greater focus to the mega trends making an impact in the industry: Cyber Security, AI, Retail, Audio, and Sustainability. These dedicated track sessions complement the Summit programme and will take place from Tuesday through to Thursday. The entire programme provides a platform for security experts to stay ahead of industry trends and network with key players in the field.

As a reader of A&S Adria, you can use code ‘asadriamag’ to book your FREE pass, visit iseurope.org.

 

Synology: Transforming Enterprise Data Protection: Addressing Modern Backup Challenges

Written by Jia-Yu, Liu, Executive Vice President of Application Group of Synology

Data backup has been a fundamental component for managing digital information. As a provider of data management solutions, Synology has consistently worked to protect our customers’ data, with our backup solutions now safeguarding over 25 million devices and accounts, earning widespread market acceptance. Through 25 years of experience in the industry, we’ve witnessed the evolution of data protection challenges and have continuously adapted our solutions to meet emerging needs.

Yet, we’ve observed a persistent challenge in the backup market in resource consumption. Data protection is often perceived as a preventive expense rather than a proactive measure to enhance business operations. This perception makes it more difficult for IT teams to justify budget requests to the management teams. Furthermore, with enterprises managing diverse workloads across on-premises, cloud, virtualized, and containerized environments, while confronting evolving attack vectors, IT teams must also consider various protection strategies including deduplication, ensure data visibility, off-site backup, immutability, and air-gap solutions across organizations. These requirements dramatically increase both costs and management complexity, stretching IT resources thin.

This realization inspired us to pursue a more ambitious vision: to unify all the essential elements for modern data protection into a seamless system built from the ground up, rather than assembled through piecemeal integration. It combines backup servers, software, and storage with essential security features, including immutability, air-gapping, and backup verification, all paired with a transparent and reasonable pricing structure that sets it apart from any existing enterprise backup solutions.

The result is ActiveProtect.

Resolving The Simplicity Illusion

When vendors discuss simplicity, they typically refer to the ability to backup multiple sources with a single software solution or centralized management across multiple servers through a unified interface. However, this only addresses surface-level management complexity. The entire IT procurement process for data protection remains lengthy and complex – from initial survey and price comparison to proof of concept, procurement, and ongoing service and contract maintenance.

Through extensive customer engagement, we’ve identified that organizations often struggle with a fundamental challenge: sourcing hardware and software separately to piece together their data protection systems. For instance, determining the optimal hardware configuration and settings for a chosen backup software requires significant time for tuning since these aren’t pre-configured during product design. Performance assessment adds another layer of complexity. Even when vendors like Veeam provide recommended specifications, budget constraints often force organizations to explore alternative configurations. This can lead to extended procurement times, as each configuration requires detailed testing and validation to ensure it meets performance requirements. Organizations commonly find that recommended specs don’t always deliver the expected results, adding further time to deployment as they seek adjustments and compatibility solutions across multiple vendors.

This fragmented approach incurs hidden costs in both integration and ongoing maintenance, issues that ActiveProtect addresses with its fully integrated solution.

ActiveProtect addresses these issues through its integrated approach, combining hardware and software engineering into one solution that automatically applies optimal settings upon deployment. Unlike DIY solutions that require separate security updates and individualized evaluation processes, these setups often rely on third-party computing servers and repositories, such as those from Dell or StoreOnce in the case of Veeam. This reliance creates a significant blind spot, as the primary solution provider may not be fully aware of vulnerabilities within third-party systems. Even a seemingly minor flaw, when linked with others, can become a critical security risk, making such systems not only harder to detect vulnerabilities in but also significantly slower to respond to potential threats. In contrast, ActiveProtect streamlines maintenance by consolidating updates across the entire system.

When replacements are needed, ActiveProtect simplifies the process with HDD migration, avoiding the extensive reconfiguration that many standalone systems demand. In addition, unlike backup software vendors that rely on costly third-party repositories to enable advanced features, ActiveProtect integrates these capabilities natively. With built-in functionalities like source-side deduplication and WORM technology immutable encryption, it achieves optimal storage allocation, enhances performance, and significantly reduces the workload for IT personnel, eliminating the need for external dependencies.

Redefining Ease of Use

While ease of use is universally emphasized, Synology sets a distinctly higher standard. Our customers consistently tell us that Synology’s interface is genuinely user-friendly and intuitive, requiring minimal familiarization or training for effective use. This is crucial because the hidden costs of training IT staff on complex interfaces, obtaining certifications, and managing staff retention are substantial.

The traditional approach requires IT professionals to spend weeks or months learning new systems, obtaining and maintaining certifications, navigating complex deployment procedures, and managing multiple management interfaces. For example, solutions like Veritas heavily depend on backup experts who must master command-line interfaces and Java-based operations, making recovery procedures and compliance testing nearly impossible without specialized expertise, and this knowledge is often lost when certified staff leave the organization. While most vendors offer comprehensive training programs, this often increases vendor lock-in and restricts enterprise flexibility.

ActiveProtect’s unified management portal offers comprehensive visibility and control across the entire backup infrastructure, from on-premises to remote sites and cloud repositories, allowing IT teams to execute complex tasks through a single, intuitive interface.

Unique and Transparent Cost Structure

The current market structure helps explain why costs remain high. With complex licensing models from vendors like Veeam and Veritas, calculating costs becomes challenging. For example, Veeam calculates by workload: a VM counts as one workload, a PC counts as three, unstructured data on object storage, NAS, and file shares is billed in 500GB increments, and Microsoft 365 is billed per user. This complexity makes cost estimation difficult, especially as protecting a single VM or Saas accounts requires additional licenses, potentially leaving gaps in backup coverage if licensing limits are exceeded. Veritas, on the other hand, uses source data size for capacity licensing, which can prevent backups if data usage spikes unexpectedly, making budget planning even more uncertain. These factors collectively drive up costs, often making cost-effective solutions inaccessible for enterprises.

Unlike other vendors that charge extra for premium features, ActiveProtect enables organizations to perform backups entirely license-free. This includes essential functionalities such as source-side, cross-side, and global deduplication, immutability, air-gapping, and backup copies. Centralized management for up to three backup servers is also provided at no additional cost. For deployments managing more than three backup servers in a cluster, customers can choose to purchase a CMS license, which is based solely on the number of servers within the cluster. This straightforward and transparent pricing structure allows organizations to scale their protection strategies efficiently while maintaining predictable costs.

Synology’s Vision for Modern Data Protection

With ransomware threats at an all-time high, data security should be a fundamental capability accessible to all enterprises. Synology’s vision has always been to innovate through our integrated hardware and software development capabilities, rationalizing costs through a single-vendor model to democratize IT management.

Through ActiveProtect, we deliver unique advantages through pre-configured hardware-software integration and rapid deployment capabilities. The unified management interface simplifies daily operations, while our transparent licensing model ensures predictable total cost of ownership. This approach enables automated configuration with optimal settings applied during deployment, unified management through a single interface for all backup operations, and streamlined licensing based solely on the number of backup servers under management.

Polar bear alarm

Oskar Strøm, a renowned expedition leader, heads film expeditions in Svalbard. These expeditions focus on documenting polar bears in their natural Arctic habitat. To capture unique footage, the film crew lives in extreme conditions: enduring very low temperatures, residing in small sleeping pods, and positioning themselves in close proximity to polar bears. Strøm required a solution to secure the camp and protect his team and valuable equipment from polar bears wandering around searching for food.

Protecting a remote site from furry intruders

Living next to polar bears in Svalbard to film them presents unique safety risks for Oskar Strøm’s crew. Hungry polar bears often dare into human camps to search for food and can threaten crew members or damage valuable equipment. Moreover, the lack of infrastructure necessitates generators, increasing fire risks. The crew’s compact sleeping pods create concerns about carbon monoxide buildup. This combination of wildlife threats, fire hazards, and potential CO poisoning in a remote Arctic location demands a comprehensive and reliable security solution capable of simultaneously addressing multiple risks in extreme conditions.

Designlarm’s task was to develop a system to detect polar bear intrusions and alert the crew immediately. The solution had to protect personnel and expensive equipment, including generators and filming gear, while also including fire and carbon monoxide detection. The system needed to be easy and intuitive to install, requiring minimal maintenance, and capable of operating without laid cables or constant internet connectivity.
This comprehensive security setup had to function effectively and self-sufficiently in Svalbard’s harsh environment, where technical support is not readily accessible.

A wireless security system that withstands extreme Arctic conditions

Designlarm chose the Ajax system for Oskar Strøm’s expeditions for its versatility, reliability, and intuitiveness. The Ajax ecosystem offers a comprehensive range of products that address all the expedition’s security needs. The system’s wireless operation was crucial for covering the camp area, where sleeping pods are spread out, and there are no structures for cable attachment. This wireless capability allowed for flexible placement of devices across the entire site, ensuring protection without the need for complex wiring.

The security system for the Arctic expedition is built around Hub 2 Plus Jeweller. This control panel uses Ajax proprietary radio protocols Jeweller to ensure reliable communication between all devices without leaning on internet access. This feature is crucial in the Arctic, where 2G/3G/4G coverage is nonexistent, and the team relies on limited and expensive Starlink internet access. Thanks to reliable two-way communication, Hub 2 Plus Jeweller receives alarms from detectors and delivers them to users. This ensures no alarm will be missed, guaranteeing protection even without Wi-Fi or cellular communication. At the same time, occasional internet connections allow for system updates. Powered by 12-24V PSU (type A), the Ajax hub operates on low-voltage sources instead of relying on a standard power grid, which is absent in remote Svalbard.

Four DualCurtain Outdoor Jeweller detectors are placed around the camp’s perimeter to guard the camp against polar bear intrusions. Each device features two narrow-angle motion detectors facing opposite directions and providing a total detection range of up to 30 meters (15 meters in each direction). This way, the bear’s approach will be registered in advance, not on the doorsteps of the sleeping pods. The viewing angle can be adjusted by 3 degrees horizontally on each side, eliminating blind spots and ensuring comprehensive coverage. To minimize false alarms caused by snow or small animals, the detectors use a software algorithm that analyzes signals from IR sensors. When triggered, DualCurtain Outdoor Jeweller detectors send alarms to indoor and outdoor sirens, effectively alerting the crew if a polar bear enters the camp.

MotionCam Outdoor (PhOD) Jeweller detectors serve as a second line of defense and provide motion detection with visual verification of alarms. When a polar bear crosses the perimeter, monitored by DualCurtain Outdoor Jeweller detectors, the system immediately triggers an alarm. While the bear moves around the camp, the built-in camera from MotionCam Outdoor (PhOD) Jeweller takes a series of photos, which the crew can see in the Ajax app within 9 seconds when connection to the internet is available. This visual verification allows the team to monitor the bear’s actions and exact location within the camp.

Indoor and outdoor sirens were installed in the camp to alert the team of security violations and deter curious or aggressive polar bears. HomeSiren Jeweller devices are installed inside sleeping pods to quickly wake the crew if a polar bear breaches the camp perimeter. The sirens provide immediate notification of danger and are impossible to ignore. StreetSiren Jeweller devices are deployed for external alerting. They serve a dual purpose: warn the crew about an intrusion and aim to deter approaching polar bears thanks to a tone. StreetSiren can produce a sound of up to 113 dB, lasting up to 3 minutes.

The Ajax SpaceControl Jeweller key fob is an essential component of Oskar Strøm’s security system. This compact device allows control of the alarm system even without the internet. With the key fob, users can arm, disarm, set night mode, or trigger an alarm manually. Its impressive 1,300-meter connection range to the hub ensures system control from various points around the camp.

In addition to the threat of polar bears, the expedition team faced the invisible danger of carbon monoxide poisoning. This risk is high in their small, tightly sealed sleeping pods, where CO can quickly accumulate to dangerous levels. To address this issue, Designlarm installed FireProtect 2 (Heat/Smoke/CO) Jeweller detectors. They have a built-in siren and LED indicator to alert when a sensor detects a threatening CO level. The detector is always active and reacts 24/7, regardless of the system’s security mode. In addition, the detector will also alert the team of the fire. Its unique smoke chamber doesn’t require regular cleaning, while a dual-spectrum sensor differentiates smoke from steam, reducing false alarms.

The Ajax security system has demonstrated remarkable durability and reliability even in extreme Arctic conditions. Despite being rated for temperatures down to –40 °C, the system operated effectively at –45 °C. Over 1.5 months, outdoor devices such as DualCurtain Outdoor Jeweller, MotionCam Outdoor (PhOD) Jeweller, and StreetSiren Jeweller have been operating without issues in these severe conditions. The only notable effect of extreme cold was faster battery drainage, which is expected at such low temperatures. However, this wasn’t a significant issue as the system informs users about low battery levels in advance. Anticipating this challenge, the expedition team had prepared by bringing an ample supply of spare batteries.

Why Ajax

  • Performance surpassing expectations. Ajax devices have demonstrated exceptional reliability in the harsh Arctic conditions and outperformed their specified operational parameters. They provided dependable protection against polar bear encounters and other potential threats in one of the world’s most challenging environments.
  • Reliable operation without constant connectivity. An Ajax security system functions effectively without continuous connection to the internet. Hub 2 Plus Jeweller maintains communication between all devices and continues to process and respond to alarms even when there is no internet connection.
  • System mobility and ease of installation. One person managed to install and configure the entire system using the intuitive Ajax app. The whole process is fast and does nor require specialized tools.

Interview: Thomas Napora, General Manager & VP EMEA, ICT

We unified various services into a single solution with a powerful central system – the controller. The Protege GX controller will unify the database for access control and intrusion and can dynamically manage different scenarios. When it was released in 2009, with its DIN Rail hardware design, it was really ahead of its time.

By: Damir Muharemovic; E-mail: editorial@asadria.com

a&s Adria: Can you tell us about your background and experience? How did you come to work with ICT?

Napora: At 18 years old, I joined the German Air Force and was working in various technical and management positions and locations, including the NATO Air Force Headquarters. During this time, I gathered a lot of experience in IT and my role evolved towards physical security as the products became network devices.

Afterwards, I worked for multiple, multinational security companies and my roles evolved from engineering to sales and senior management responsibilities. I have developed my skillset and knowledge across various technologies ; ranging from IT Software and Hardware, Network, Access Control, Intrusion Detection Systems, Building Automation, 2D/3D LiDAR, MW/PIR/IR Sensors, IP Cameras, VMS, PSIM, IoT and SaaS to now a Unified Access Control/Intrusion/Building Automation platform at ICT.

My sales and senior management roles were across the EMEA region, in which I have extensively travelled which made me appreciate and understand the variety of the markets, countries, cultures and mentalities. When I was approached by ICT’s CEO and Founder, Hayden Burr, who explains that as part of his plans of global expansion of the already very successful company, EMEA was a critical, but difficult part to build, I felt it fitted perfectly with my experience and knowledge. It was for me the right next step to raise to the challenge to establish the EMEA region for ICT as Vice President and General Manager, EMEA.

a&s Adria: Integrated Control Technology (ICT) manufactures unified and intelligent electronic access control and security solutions. Could you walk us through the company’s history? What were its most important milestones?

Napora: Integrated Control Technology (ICT) was founded in 2003, by Hayden and Rachael Burr in Aukland, New Zealand, with the vison of unification of access control, intrusion and automation. A big milestone was in 2009 when Protege GX, the unified enterprise security platform was released. With its DIN Rail hardware design, it was really ahead of its time.

In 2013 the offering expanded with Protege WX, tailored to small and medium businesses and the tSec multi-technology card readers. In 2016 the Protege Mobile App brought access and control to mobile phones. Then, in 2023, ICT released Protege Wireless Locks in North America, and a new team was created in EMEA to bring localized, sales, technical, and operational support to the region – we’re now a team of 9 people.

a&s Adria: Can you present your portfolio in brief? What types of products ICT produces and for what purpose?

Napora: Fundamentally, ICT offers a unified access control and intrusion detection solution that can scale, and is easy to customize. There are two different systems, the web-based Protege WX for a single site, and our server based multisite platform, Protege GX. On the hardware side, ICT offers a range of door and input/output expanders which work with both systems. So, to expand from a single locationto multisite, only the controller would need replacing. Multi-technology readers, mobile credentials, and mobile configuration app are also all part of the offering.

a&s Adria: Protege WX is a web-based, all-in-one system integrating access control, intrusion detection, and building automation into a unified solution. What are the key benefits of such a system to a client?

Napora: An access control and alarm panel in one controller brings greater value. You no longer need to run two separate systems which saves time and money at install. When you add automation to the mix, you begin to see its true power. With just a single tap of a card, you can now unlock the door, disarm the alarm, and turn the lights and aircon on.

a&s Adria: Even though it is primarily intended for SMBs, Protege WX modular hardware design provides the flexibility to accommodate any installation. How can a client scale this system to fulfill his requirements?

Napora: Using door expanders, one Protege WX controller can manage up to 128 doors which is already a relatively large system. Also, as the Protege range is inter-compatible, so if additional software solution or integration is required, the only change would be an easy upgrade to a Protege GX controller – all the rest of the equipment can remain the same.

a&s Adria: Small and medium businesses often face challenges when it comes to maintaining a 24/7 security presence due to budget constraints. Given the rise of offsite monitoring solutions, how would you explain the advantages of IP monitoring over traditional alarm dialers in terms of cost-effectiveness, reliability, and security? Additionally, how do features like onboard Ethernet adapters, cellular modems, and ArmorIP encryption contribute to enhancing alarm reporting and ensuring rapid, accurate responses to triggered alarms?

Napora: IP monitoring is a more reliable, cost-effective, and secure alternative to traditional alarm dialers. Unlike analog systems that rely on costly phone lines and slower communication methods, IP monitoring significantly reduces operating costs while providing near-instant alarm transmission using existing internet connections, rather than costly phone lines that traditional analog alarm dialers rely on.

ICT’s ArmorIP solution takes security to the next level with advanced encryption to safeguard data transmissions, and cellular modems for 4G backup in case of internet outages. With ArmorIP, alarm signals now include detailed, actionable information – such as event time, panel details, and user identifiers – which allows monitoring centres to respond with precision and speed.

a&s Adria: Would you say that its communication via an RS-485 connection and support for OSDP 2.2 make it a robust and safe security solution and why?

Napora: Yes, it’s about striking the balance between security and flexibility. With ICT’s proprietary RS-485 protocol you get AES-256 encryption.. However when compatibility with other systems is required, OSDP 2.2 gives a secure alternative using RS-485 protocols with AES-128 encryption. This means an OSDP reader can be paired with a MIFARE DESFire card and an ICT Protege controller to create a totally encrypted communications path from the card to the server. Also, OSDP allows constant, bi-directional communication, which means that any interference with the reader cabling will be detected in seconds.

a&s Adria: As an enterprise-level solution, what are the key differences of Protege GX?

Napora: Protege GX has an unlimited number of doors or sites. The software suite allows custom floorplans and provides different types of reporting such as time and attendance. As well as third-party integrations with VMS platforms, lifts, wireless locks, biometric readers, and more, Protege GX makes it easy to customize existing operational systems thanks to simple database synchronization and custom APIs.

a&s Adria: Aside from the ones mentioned in this interview, what product range would you stand out as the most-selling one in the European market?

Napora: In Europe, we are very successful in projects where an open and scalable platform is required. ICT Protege GX can easily integrate with existing operational and security systems, through data sync and its ability to read multiple formats. For instance, Protege GX offers a very easy migration from the Interlogix Verex Afx platform, which is now end of life, while keeping some of the legacy equipment. Aside from the Protege controllers, and expanders, our multi-technology reader range is also very popular. The existing tSec range offers a choice of colours, 3 sizes, with or without keypads, and customizable LEDs, with multi-technology including 13.56MHz, 125kHz, and Bluetooth. They can read a variety of formats which allows many end users to keep their existing credentials, while new users use MIFARE DESFire.

a&s Adria: “My vision is to make access, intrusion, and automation easy for our customers. A lot of security products are complicated and only offer one service. Our driving idea is that you create success – and value – when you combine them into a unified solution”, said Hayden Burr, Founder & CEO of ICT. How do you accomplish this? Can you give us an example?

Napora: The way to accomplish this is through a powerful brain which is the controller. The Protege GX controller will unify the database for access control and intrusion and can dynamically manage different scenarios. A simple one would be to arm an area at the count of zero person. Another scenario will allow access and disarm an area only when the supervisor is in. It is the same with building automation, if an area is empty, the light and aircon can be switched off, or if there are windows sensors, the aircon would stop when the window is open and start again when the window is closed.

Another way to optimize operations and create value, is when our customers use our Protege platform not only to secure premises but also to automate bookings, by sending a pin code to their customers once the booking is confirmed, that can be then entered to our keypad readers to grant them access during the time allowed.

a&s Adria: Your ICT Dealer Network (IDN) program is designed to ensure customers receive expert services from qualified and capable security installers. With an emphasis on rigorous standards, including an audited qualification process, the integrity and guidelines of the program ensure members deliver a high level of customer satisfaction.

Napora: Our goal is to serve the end user, offer them a bespoke solution while making the installation, and the use of it as easy as possible. To achieve this, it is crucial that our installation partners are well trained. They need to understand all the functionalities of our solutions, the best practice to implement it. We have a strict certification program, especially for Protege GX, which ensures that level of expertise. Each certified engineer needs to recertify every two years, ensuring new features are covered.

a&s Adria: Could you share recent case studies where ICT’s products or solutions made a significant impact on a customer’s safety and operational efficiency?

Napora: The City of Parramatta in western Sydney, Australia, has demonstrated the tangible advantages of ICT enterprise security. By implementing unified access control and automation across 110 city locations, Parramatta enhanced safety and streamlined operations, all managed through a dedicated 24/7 Security Operations Centre. Mo Al Salemi, Security Platform Specialist for the City of Parramatta, noted, “Our core operation, everything we have integrates with ICT Protege GX; that is our foundation.”

This has allowed Parramatta to innovate further, integrating automated systems for public facility bookings like sports clubs or meeting rooms through the council website. “It’s all automated,” said Al Salemi. When users access buildings with valid credentials, lights, HVAC, hot water, AV, and other systems activate on-demand. This approach reduces energy waste while adding convenience for users. By integrating smart solutions, Parramatta has not only achieved operational efficiencies but also reduced utility costs and manual interventions significantly.

a&s Adria: What will ICT focus on in the next 3-5 years in terms of new technologies and market development? What are you plans for the European market?

Napora: We are focused on the customer, which is why updates to the user interface are underway to make it even more user-friendly. We’ve also adopted protocols like OSDP 2.2, functions like signed firmware updates, and use of a secure access module within the reader – which will be available in our upcoming TSL line – so we ensure our access readers are built to withstand the ever-changing security landscape.

But really, the future is going to be built around open technology, so we want to provide the foundation for your access, security, and building automation needs. Our open, unified solution has very well received by the market, and allows us and our partners the flexibility to build a solution that meets the unique needs of end users.

In EMEA, the region is now fully operational and the team continues to grow as we support our growing customer base. We are looking to certain countries to establish coverage and market share before as we onboard the right partners in new territories in the next 5 years, so we can expand and offer full coverage throughout the region.

In parallel, we are working on having the right infrastructure with logistics hubs and building a strong local team to provide localised pre-sales, sales, post-sales, marketing, and operational support.