Home Archive by category Najave II (Page 2)

Najave II

The principles of gas measuring technology

How has gas detection developed over the years?

In mining, hazardous levels of gas concentration can build up all the time, causing powerful explosions and accidents. The search for methods for the early detection of hazardous gases, such as methane and carbon monoxide, was therefore already of crucial importance in the 19th and 20th centuries to ensure the safety of miners. The first method of gas detection involved the use of canaries. For this, a canary was kept in a small cage and monitored regularly. If the bird displayed any signs of stress or illness, this was taken as a clear warning signal for the presence of hazardous gases. To protect the animal‘s health, flame lamps would then be used to determine hazardous levels of gas concentration.

For this, the miners lit the flames in a fresh air environment. If the flame shrank in size or began to go out, this indicated a low level of oxygen in the air. If, on the other hand, the flame increased in size, this was a sign that methane – as well as oxygen – was present in the mine. Gas warning technology has continued to develop to this day. Today, precise, compact and robust gas detectors are used to monitor dangerous gas concentrations and combustible vapours.

Various technologies such as catalytic, electrochemical, infrared, ultrasonic or MPS technologies offer the best possible options for monitoring and analysing the ambient air. These allow safe and reliable gas detection in a wide range of applications and ensure maximum protection for lives and plants.

The gas detectors must monitor various gases and vapours safely and continuously in changing conditions. This requires maximum reliability, flexibility and stability in order to protect the safety of people and plants in the best possible way. In addition, not every gas detector may be used in every working environment. It is therefore necessary

to check whether the required device specifications are met before use. These device requirements are explained in the relevant standards and regulations.

What are gases?

Matter above its boiling point is generally referred to as a gas. In this physical state, the molecules or atoms move far away from each other and completely occupy the available space. In contrast to matter in solid and liquid states, gases have no solid form and no solid volume.

Gases consist of a swarm of molecules moving randomly and chaotically, constantly colliding with each other and with everything around them. They fill every available space and, because of the high speed at which they are moving, mix rapidly with any atmosphere into which they are released.

Gases can be lighter or heavier than air or have approximately the same density. Gases can have an odour or be odourless. There are coloured and colourless gases. Even if you cannot see, smell or touch them, this does not mean that they are not present. Gases in principle are not harmful. They are, after all, part of the earth‘s atmosphere. It is only when their concentration exceeds critical levels that there is a risk of poisoning and explosion and, if it falls below these levels, danger of suffocation from lack of oxygen.

Methane, for example, is colourless and odourless and difficult to detect when present. However, as this natural gas is used in many homes for heating and cooking, it is present in people‘s everyday lives. Vehicle engines burn fuel and oxygen and produce emissions/waste gases containing nitrogen oxides, carbon monoxide and carbon dioxide

and are a hazard to life and plants. Oxygen and hydrogen must also be detected continuously to keep the ambient air clean and prevent oxyhydrogen explosions.

What are the different gas hazards?

Choosing the correct measuring principle is of central importance in the detection of gas hazards. Each measuring principle is suitable for different danger zones and is optimised for either toxic and/or combustible gases and oxygen. In principle, the following gas hazards can be distinguished:

  1. Explosion hazard due to combustible gases

Wherever combustible gases such as methane, butane and propane are present, there is an increased risk of explosion, for example in petrochemicals, industry and refineries. Sensors with a catalytic sensor element for combustible gases are used here.

  1. Excess oxygen and lack of oxygen

While excess oxygen makes materials more flammable, a lack of oxygen is life-threatening. Oxygen can be consumed or displaced by another gas. Sensors with an electrochemical sensor element are generally used for monitoring oxygen levels.

  1. Toxicity

Hazards from toxic gases can arise in a wide variety of areas, such as in industrial production processes or during transport, but also in natural processes, such as putrefaction processes during the degradation of biomass. Sensors with an electrochemical sensor element for toxic gases are used here.

In addition to the different gas groups, selecting the suitable measurement method depends on many other factors, such as checking whether other hazardous substances are present in the environment (cross-sensitivity), whether continuous measurement or long-term or short-term measurement is required and whether there needs to be an alarm and warning notification if limit values are exceeded.

What are the sensors and measuring principles used in gas detection?

The sensors use certain properties of the gas to convert them into an electrical signal. The following measuring principles are used in gas detection technology: the electrochemical measuring principle, the catalytic measuring principle, the infrared measuring principle, the semiconductor measuring principle and the MPS measuring principle.

The electrochemical measuring principle

Electrochemical sensors are often used because of their precision, sensitivity and fast reaction times. They are used in areas such as environmental monitoring, medical diagnostics, food control and industry.

Electrochemical gas sensors work in a similar way to batteries and are used to measure carbon monoxide (CO), nitric oxide (NO), nitrogen dioxide (NO2), ammonia (NH3) and oxygen (O2). The ambient air to be monitored diffuses through the filter membrane into the liquid electrolyte of the sensor.

The chemical process of the measurement is an oxidation, whereby one molecule of the target gas is exchanged for one molecule of oxygen. The reaction drives the oxygen molecule into the counter electrode, resulting in a current signal (nA) between the measuring and reference electrodes. As a rule, gas sensors are specific, so there is little – if any – cross-sensitivity to other substances.

Advantages

  • Linear measurement signal
  • Highly sensitive
  • Low cost

Catalytic measuring principle

The catalytic measuring method involves measurement using pellistor and catalytic bead sensors and is suitable for measuring explosive gases and vapours. In this measuring method, two platinum coils are embedded in a ceramic layer and connected electrically via a bridge circuit (a Wheatstone measuring bridge).

The surface of one platinum coil is activated with an oxidation-promoting catalyst, while the surface of the other platinum coil is not activated. Current flows through the coils, heating them to approx 500 °C. The oxygen in the air reacts with the combustible gas on the surface of the active coil. This increases the temperature and resistance in the active platinum coil, causing the bridge to become unbalanced. This process can be measured.

Advantages

  • Total measurement of many combustible gases
  • Linear signal
  • High measurement accuracy
  • Poisoning from silicones etc.

Infrared measuring principle

The infrared measuring principle involves the measurement of CO2, methane etc. using infrared sensors. The IR principle uses the individual absorption spectrum of the gas to be measured as a base and determines the exact concentration by analysing it precisely and quantitatively. Since all measured gases absorb in different spectral ranges, this results in a kind of „fingerprint“ that allows selective characterisation with almost no cross-sensitivities.

Advantages:

  • Low cross-sensitivity
  • High measurement accuracy
  • Wide measuring range
  • High selectivity
  • Dust & dew point sensitive
  • Long lifetime
  • Low maintenance costs

Semiconductor measuring principle

Semiconductor sensors are used for some toxic and explosive gases. A metal oxide-based semiconductor (tin oxide) is applied to a substrate. The substrate contains electrodes that measure the resistance of the semiconductor and a heater that heats the semiconductor to 200 to 400 °C.

The sensor reacts to changes in the composition of the surrounding atmosphere by changing the resistance of the semiconductor. Reducing gases such as carbon monoxide or hydrogen lower the resistance of the semiconductor. The sensitivity of the semiconductor to a specific gas can be changed through the temperature of the semiconductor.

Advantages

  • Low budget
  • Versatile in use
  • Non-selective
  • Robust

MPS measuring principle

MPS sensor technology is used to detect combustible gases such as hydrogen, methane, propane and acetylene as well as refrigerants. This highly flexible sensor solution is attractive for a wide range of applications. MPSTM sensors are particularly suitable for areas that are difficult to access, as they can operate for long periods without requiring calibration or maintenance. The integrated environmental sensor measures the change in thermodynamic properties.

Advantages

  • Lifetime 15+ years
  • Maintenance free
  • Low power consumption
  • High linearity
  • High stability
  • Non-selective
  • Environmental compensation

What do explosion protection and explosion limits mean?

 Explosion protection

Many combustible substances come into play in industrial processes. This releases combustible gases and vapours through valves or other openings. For prevention purposes, these danger zones are called Ex-areas in which only equipment of a safe ignition protection category may be used.

Explosion protection is standardised worldwide and based on the 3-zone concept. Ex zones are areas in which a hazardous explosive atmosphere exists. The zones can be distinguished as follows:

EX-Zone Type of hazard Areas in which a hazar­dous explosive atmosphere exists Permitted devices/

Protective measures

Zone 0 Permanent danger of explosive atmosphere e.g. inside containers Ex-protected devices required
Zone 1 Occasional danger of explosive atmosphere The immediate vicinity of Zone 0, e.g. filling openings Ex-protected devices recommended, non-ex-protected devices with special protective measures
Zone 2 Low risk of explosive atmosphere The area surrounding Zones 0 and 1 Non-ex-protected devices, provided the probability of an explosive atmosphere is low

Explosion limits

The explosion range is defined by a Lower Flammability Level (LFL) and an Upper Flammability Level (UFL). The Lower Flammability Level describes the lowest concentration of a combustible substance in the air at which a flame can ignite and spread.

The Upper Explosion Limit describes the highest concentration at which a flame can only just ignite and spread independently. However, it should be noted here that the situation can change rapidly, for example through dispersal of the mixture caused by a gust of wind, and the concentration can then again fall below the Upper Flammability Level.

Which requirements and guidelines apply to gas detectors?

 Safe Integrity Level – SIL

The Safety Integrity Level, also known as the safety requirement level (SIL for short), is an internationally-recognised measured variable in the field of functional safety. The Safety Integrity Level is used to assess electrical/electronic/

programmable electronic (E/E/PE) systems and refers to the reliability of safety functions.

4 SIL levels are used to determine the potential risk to persons, systems, plants and processes. These are realised using safety functions with the aid of a safety instrumented system (SIS), which may consist of different equipment such as sensors, actuators and control elements. A distinction is made between SIL1 up to SIL4, which requires the strictest measures for the greatest risk. These are requirement measures for the probability of dangerous random failures.

Functional safety is part of the overall safety of a device, a plant, a train, a car or any other complex automated system. The aim of functional safety is always to protect people, plants and the environment from malfunctions. Without functional safety, trains would not be accidentfree, chemical plants would not be able to be operated safely, or airbags would be triggered at the wrong moment.

Which certificates and standards are required for gas detectors?

Many applications require special certificates that prove that the gas detectors meet environmental requirements, such as ATEX, ISO, Marine, IEC, EN, SIL, etc. Gas detectors also differ significantly in respect of their technical features. In particular, there are sometimes considerable differences in terms of functionality, calibration, lifetime

and suitability for installation as well as userfriendliness. MSR-Electronic offers a wide range of gas detectors for the detection of toxic and combustible gases.

Installing an Intercom System for Business

Modern intercom systems for business can be integrated with other security solutions to boost the end user’s security and operations. Installing an intercom system for business, meanwhile, requires various considerations. This article takes a closer look.

Source: William Pao, asmag.com

Intercom systems for business allow visitors to communicate with their host and gain entry once they are approved. That said, intercoms are an integral part of security at business organizations and can be beneficial for a range of end user entities.

“All business types can benefit from an intercom system, whether large or small, because they face many of the same challenges. Communication is always important, and intercoms help to reduce liabilities when it comes to staff safety by monitoring customer interactions and keeping a record of traffic into and out of a location. Large businesses, schools, healthcare facilities, and other entities also integrate their intercom solutions with mass notification systems, lock down procedures, or to communicate with occupants in the event of a weather emergency,” said John Hemp, Director of Sales for Mid Atlantic & New England at Aiphone.

“Rather than directing all calls to the reception, a visitor intercom can be set to intercom the relevant departments. This cuts down on hunting down different people or having the receptionist vet on behalf of the entire company. A delivery or guest looking for the HR department can directly communicate with HR and inform them. In addition, IP intercom that uses mobile phone apps ensures that the visitor is always attended to even if the party is not in the office,” said Ler Wee Meng, MD of Securevision. “Therefore, any company that has a door access system in place would benefit from an intercom – large companies with multiple departments or SMEs with just two people. The key is to communicate with visitors and grant access.”

Integrative features

More and more, modern intercom systems for business can integrate with other security solutions such as video surveillance and access control. This has major benefits for the end use entity.

“For example, they can integrate with video surveillance systems, automatically displaying the video feed of the calling location on the control center’s video wall when an IP intercom terminal calls, aiding security personnel in understanding the situation,” said Zhou Liang, CTO of SPON Communications.

“Integrating intercom systems into other security systems can help improve overall security, and operations. For example, if an intercom is integrated into an access control system, an organization can communicate with and grant visitors access to the facility more easily and efficiently. When integrated with video, organizations can gain visual intelligence, for example, confirming that the person visiting really is there to deliver a package,” said Alex Kazerani, CVP for Cloud Video Security and Access Control at Motorola Solutions.

Kazerani cites his company’s own examples. “The cloud-native Avigilon Alta offers the Video Intercom Reader Pro, which is an all-in-one device with integrated intercom, video, and an access control reader. This combines all of your front door security devices into one, with a 5MP built-in camera, AI-powered call routing technology with two-way audio, and reliable touchless access for credentialed users,” he said. “This creates frictionless, yet secure, access for both visitors and users alike. Visitors can simply say the name of who they’re visiting or ask to speak to a reception. Calls are routed to the appropriate people, who can view live video, speak live with visitors, and easily grant them access using a mobile app or via the Avigilon Alta Control Center.”

Installation tips

Installation of an intercom system for business requires considerations from multiple fronts. These include the location of installation and the angle at which the system should be installed, among others.

“The installation locations for IP intercom systems in businesses include parking lot entrances/exits, garages, perimeter areas of campuses, building hallways/public areas, office entrances/exits, and stairwell entrances/exits. During installation, the bottom of IP intercom terminals should be 1.5 meters above the ground to ensure clear capture and transmission of voice and facial images during intercom,” Zhou said. “IP intercom terminals typically require minimal maintenance as the control center can display real-time online/offline/task status. Remote monitoring of the audio and video feed from front-end IP intercom terminals is possible.”

Video quality, meanwhile, is also important.

“Video quality should be considered at various times during the day when the sunlight will be in different positions. Users should also look at the entire field of view and not just the center area where the guest will be. The edges of the view should be clear or a region should be privacy-masked if cameras are pointed at sensitive areas,” Kazerani said. “Most of the maintenance needs will be due to the intercom being accessible to the general public. It will have the expected amount of wear and tear and it may need to be in a ruggedized enclosure if in a high-traffic area. Also, the video feed should be monitored to ensure that nothing is obscuring the camera lens like dirt or oils from people’s fingers.”

There are other points to consider as well. “IP door phones are often rated for outdoor use. And in many cases, the door phones can be installed with rain covers. Vandal-proof rating may not be necessary unless the business is located in a place where there is a threat of vandalism,” Ler said.

Finally, communication with customer is important.

“I would recommend talking with the customer about their normal business practices and communication habits when selecting and installing an intercom solution. The goal is to enhance their communication abilities without adding complexity. Collaborating with IT departments when installing an IP solution is necessary – especially when a system will live on the IT network,” Hemp said.

He added: “Another piece of advice is to plan out wire runs ahead of time and make sure it is physically possible to place devices where the customer wants them. It’s important to test out accessibility, wire paths, and wall or desk placement. Communication with the customer is key and solutions need to work within their existing parameters of doing business. We don’t want to install a solution that’s going to slow them down or make things inconvenient. If the system is not easy to use the customer will stop using it in the long run and ultimately forfeit the security benefits of installing an intercom system.”

Building a Strong Cybersecurity Foundation for Your Video Solutions

In today’s digital world, it’s little surprise that cybersecurity is top of mind in many boardrooms. Indeed, 96% of CEOs say that it’s essential to their organisation’s growth and stability, according to Accenture.

And they are right to be concerned, because cybercrime is projected to cost the world a staggering $9.5 trillion USD in 2024 according to research firm, Cybersecurity Ventures. Such losses can be business-ending, without even considering the cost of reputational damage and unscheduled downtime.

By Jos Beernink, Vice President EMEA at Milestone Systems

The cyber-risks of video

Being aware of the risks of an insecure video surveillance system – and how to mitigate these – is therefore a critical skill for all security leaders. Cameras, connected sensors, and video management software (VMS) can present attractive targets for malicious actors, thanks to the data collected by them. This data can be used for blackmail or to gather confidential information. Hackers can sell footage of your building layout and staffing levels at different times of the day to criminals, for example.

IP cameras can also be used as gateway devices for larger attacks, including global distributed denial of service (DDoS) attacks that use connected cameras and other devices to send a flood of traffic to targeted websites and other infrastructure.

When it comes to protecting businesses, no two systems will be the same. The protections for a school will be very different to that of a data centre or solar farm. The first step in protecting your organisation and its surveillance systems, therefore, is understanding what needs to be protected, how, and from whom. Plus the potential damage that can occur when (not if) an attack happens.

The NIS2 Directive

Protecting your camera and video systems is about to become even more important due to the incoming NIS2 Directive, a Europe-wide legislation that aims to boost the overall level of cybersecurity in network and information systems. Any surveillance installation that falls within targeted “essential” industries will be impacted by this (these include the energy sector, transport, banking, public administration, and digital infrastructures).

Under NIS2, users are required not only to assess their own systems, but also conduct a comprehensive risk assessment to ensure their entire supply chain is compliant. In today’s interconnected systems, achieving compliance across the supply chain can be challenging.

By way of an example, the Log4j vulnerability recently affected millions of computers across the world, and highlights the direct impact on systems utilising this open-source logging library as a small part of their software suite. It’s notable that a few software manufacturers, including Milestone Systems, which prioritize secure design and avoid any use of open source, remained unaffected.

The NIS2 Directive recognises that physical security threats pose a significant risk to organisations with digital operations. Installing cameras and other systems to control access to digital assets like server rooms and data centres is vital. Such organisations will need to take active, ongoing, steps to ensure their video network’s security is as robust as possible.

The importance of physical security

One unique aspect of video networks is how many devices are located in public, potentially vulnerable, areas. Most organisations need to install cameras to monitor busy areas, entrances and exits to restricted areas, or remote parts of a site. This can have the effect of putting cameras at higher risk; making it easier for attackers to gain access and disconnect devices. This means that multi-layered security to keep devices safe and separate from the wider IT network is essential. It also means that without adequate protection, a video surveillance system can be less secure than a classical IT system. That’s worth bearing in mind when addressing your video and IT network cybersecurity as a whole.

Everyone’s responsibility

The NIS2 Directive emphasises that IT and security work together to build a robust cybersecurity strategy. Your IT team will need to be closely involved when implementing your video cybersecurity strategy. They will work with you on some of the foundational elements of protecting your VMS and connected devices, because of their experience in areas like virtual private network (VPNs) and virtual local area networks (VLANs).

Knowing who takes care of what, can help you to assign accountability for things like upgrades, auditing, and penetration testing. Sometimes an external party, like a manufacturer or installer, is responsible for some aspects of your cybersecurity. Therefore, when starting your cybersecurity strategy, you’ll need to check:

  1. Assess the nature of the business – and its goals.
  2. Determine the local rules and regulations.
  3. Confirm who is responsible for maintaining your system.
  4. Ask who monitors your system. Unusual traffic or alerts of technical errors can be an indication of a cyber-attack.
  5. Be clear about who has access to your video and computer network. Is the level of access appropriate to their needs? Does an operator have too high a level of access, or does someone who has left your organisation still have login credentials?

Speaking of access, you’ll also need to consider physical elements like who has access to a VMS server room. Alarms and access control measures can help to prevent unauthorised individuals from getting into sensitive areas where your video data is located.

Consider the human element

It’s worth considering your overall training program, as the human factor can be a significant weakness in your cybersecurity — accounting for between 88 to 95% of data breaches, according to a joint study by Stanford University Professor Jeff Hancock and security firm Tessian. Even something as simple as re-using a personal password to log into a VMS account, or falling for social engineering attacks (like an ‘urgent’ email from a manager requesting account details) can undermine every technical cybersecurity feature you implement.

Hence why regular training for your security team is important, as it can keep them updated on the latest threats and new ways to protect themselves and your system from harm. User control can also assist here, with admin and data access rights only given to those who require it. Assigning different VMS user credentials will (hopefully) prevent password sharing and allows you to remove a user’s access when they leave your company.

Foundational cybersecurity measures

Alongside this, there are some basic foundations that you can ensure you’re following to make your video system less attractive to attackers. These include updating your cameras’ firmware and VMS device drivers to the newest versions. Updates are typically made on an ongoing basis, so make sure your camera manufacturer issues regular security updates that include vulnerability patching and additional protections against new threats. Much like how keeping your smartphone or laptop updated reduces the risk of a hack, staying up to date with your VMS and camera updates will make them less attractive to hackers.

Disabling your cameras’ built-in admin account, or changing the default password is one of the first things to do when installing a new device. Then you can ensure your cameras are only supporting HTTPS (the secure version of HTTP).

To ensure the best protection, your chosen password should be a combination of lowercase and uppercase letters as well as special characters and numbers. They should contain no easily guessable words or phrases – using the word ‘password’ is an absolute no! Passwords also shouldn’t contain any information that identifies a user, or that a hacker could gain off of their public profiles and social media. As importantly, VMS accounts shouldn’t be shared by multiple users.

Keep your networks separate

Generally speaking, it’s a good idea to keep your video network separate from your wider IT network. You can do this through VPNs (which is essential if you have people accessing your systems remotely, outside of your local network), and through VLANs that keep your video system partitioned and isolated from your other computer systems. If your cameras or VMS are compromised, for example by someone accessing a device located on the street or from an operator unwittingly using a USB with malware on it, a hacker cannot use your video system to access more of your organisation’s data. It serves to limit the damage.

The importance of multi-layered security

A widescale breach in 2021 offers a hard lesson in what can potentially go wrong when you fail to secure your camera systems effectively. A cyber-attack on a system provider in the USA exposed video recordings from 150,000 cameras, but also the sensitive financial information of high-profile customers. Hackers gained access to the provider’s systems using a username and password that was exposed in the public domain. This illustrates the importance of good password habits (regular password changes, using hard-to-guess passwords, and training people not to share their passwords with others).

Over 100 employees had ‘super admin’ privileges in the provider’s system, which gave access to footage from thousands of customer cameras, unknown to them. Setting the right access level for each user, ensures that the risk and potential spread of a hack is limited. Put another way, the more admins you have, the more targets there are for hackers to exploit.

Finally, alongside camera footage, hackers could also access sensitive financial and customer information through the breach. Separating your video network from your IT network limits how far a hacker can go if they do access your system. It prevents them from accessing your business’ financial and product data, operations, and other sensitive systems.

Cybersecurity is continuous

With all that said, every system will have vulnerability and the cybersecurity space is constantly evolving. Being aware, in control, and responsible when using video will go a long way in protecting your organisation.

To help you on your journey towards a cybersecure video network, Milestone Systems is hosting a series of cybersecurity webinars. Whether you are starting out on cybersecurity or are looking at building on existing cyber measures, these webinars and events will help you build resilience in your video system. More details of these webinars, including the first webinar on the foundational elements of a video cybersecurity strategy, can be found here: t.ly/nuvno.

Learn what Milestone can do for your organization. Our video management software (VMS) can be customized to meet your every need. From keeping people and property safe to operating businesses more efficiently. We invite you to experience the power and functionality of Milestone’s VMS software through the exclusive Demo Trail, providing a hands-on experience with our state-of-the-art video management solutions.

About Milestone Systems

Milestone Systems is a leading provider of data-driven video technology software in and beyond security that helps the world see how to ensure safety, protect assets, and increase business efficiency. Milestone enables an open platform community that drives collaboration and innovation in the development and use of network video technology, with reliable and scalable solutions that are proven in more than 500,000 customer sites worldwide. Founded in 1998, Milestone is a stand-alone company in the Canon Group. For more information visit: www.milestonesys.com. For news and other press releases, visit our Newsroom.

 

Selecting an Intercom System for Business

Intercom systems play an important role in securing residential and commercial properties. For business users, what should they look for when selecting an intercom system that best fits their needs? This article takes a closer look.

Source: William Pao, asmag.com

Intercom systems for business allow visitors to communicate directly with the host/receptionist desk and gain access into a building once their identity is verified. Benefits are manifold. One major benefit, of course, is offering enhanced security to the end user organization.

“IP audio video intercoms can greatly enhance the security for businesses. With the IP audio video intercom, you can not only speak to and see the visitors, but you also have a digital record of that visit, allowing audit or any investigation that may be required,” said Ler Wee Meng, MD of Securevision.

Other than security, intercom systems for business can offer greater operational efficiency as well.

“The advantages of using IP intercom systems for businesses are twofold. On one hand, they can enhance the personal safety of employees (for example, restricting access to strangers, enabling employees to make one-click calls to security personnel in case of safety threats). On the other hand, these systems can make business operations more efficient (for example, employees participating in video conferences at their workstations through IP network visual control consoles, reducing the need for physical movement and thereby increasing productivity),” said Zhou Liang, CTO of SPON Communications.

How to select an intercom system for business

Selecting an intercom system for business should take several factors into consideration. For example, should the user get a wired or wireless system? Should it include remote unlocking capability? Below we offer four points for consideration when selecting an intercom system for business.

Wired vs. wireless

Wired intercom systems offer clear and stable communication yet requires wiring and cabling. Wireless solutions, on the other hand, offer more flexibility yet are subject to communication quality issues.

“Wired intercoms are a great choice when you need a reliable security system with robust cybersecurity features and stable access to power. This is very beneficial for businesses, hospitals, and or schools where usage is an order of magnitude more than a single family residential solution. However, some older buildings might not have the right type of wiring available at the front door, which could make it more challenging, or costly to install,” said Alex Kazerani, CVP for Cloud Video Security and Access Control at Motorola Solutions. “Wireless intercoms offer more installation convenience, and are comparably less costly. This makes it easier to install in some locations that are harder to wire, and it’s easier to add additional intercoms as needed. Users can access and manage their wireless intercoms from anywhere over Wi-Fi, however they depend on stable wireless network connections to operate.”

“The choice between wired and wireless depends on usage scenarios. For fixed communication with high-quality requirements, wired intercoms are more suitable. For mobile communication with flexible deployment, wireless intercoms are preferable,” Zhou said.

Video vs. audio

Next, the user should consider whether to get a video or audio-only intercom system for business. Generally speaking, video intercoms offer more advantages than their audio-only counterparts.

“Video is always better than audio because it enables visual verification of guests. Audio-only intercom systems are typically a little less expensive, but with these systems you forgo the ability to integrate a video door station with your surveillance systems for facial captures. A video intercom system also ensures visual verification so that you are allowing access to only the people you are seeing and speaking to. With an audio-only system, you might be opening the door for what you think is one person – and instead five unknown people enter through the secure door,” said John Hemp, Director of Sales for Mid Atlantic & New England at Aiphone.

“Video alone doesn’t allow for audio conversations. By combining it with audio, security staff can help improve the experience for visitors. For example, a delivery person at the wrong entrance can be directed to the correct door. However, audio alone doesn’t provide the visual information that can be helpful for making a decision to grant access or not. In the case of audio-only systems, there may be a camera nearby, but it may not have the right angle, or be integrated in with the intercom system, requiring the user to switch between applications,” Kazerani, said. “Intercoms with both video and audio offer the best combination of visitor experience, ease of use and safety and security.”

Intercom with remote unlock capability?

According to Hemp, this really comes down to end user policies and procedures. “Some high-security buildings require guests to be escorted while on the grounds and some do not. Outside of high-security applications, a remote door release is usually best for convenience purposes, allowing staff to multitask and manage access to a location without physically being there to open the door. Staff can stay on-task in their offices or at a remote location and still manage secure access to the doors,” he said.

“Many intercoms offer remote unlock capability. Depending on the organization’s security concerns, this feature can be turned off or disabled. Perhaps in selecting the IP Intercom, choose those that provide tight security control over the mobile apps. Only authorized members can log in and install the app and members can be added or removed from the app by the administrator,” Ler said.

Support for both telephone line and mobile app

Some newer intercom models can integrate with the telephone system and use mobile apps, and this indeed offers certain advantages.

“Connecting through phone lines allows the ability to make the intercom part of an existing phone system and also dial outside phone numbers, such as 9-1-1 or 24-hour monitoring centers. This is especially useful for rescue assistance applications, area of rescue, emergency towers and call boxes, and lock down procedures,” Hemp said.

He added: “Mobile apps give customers the flexibility to be able to move throughout a facility and still be able to manage the doors without being tied to a desk. Churches and schools love mobile apps for use with after school programs and sports. While faculty may be in the gym or the library, they can still manage visitors through a mobile app integration. School resource officers can also move freely through a facility and can often trigger lock downs from a mobile app allowing them to address an emergency in in the moment without needing access to a physical master station. Mobile apps offer enormous flexibility to customers while reducing potential delays in response times.”

LiDAR: How It Transforms Airport Security

Security is an important part of airport operations. More and more, LiDAR or light detection and ranging is used to boost airports’ security and efficiency. This article takes a closer look.

Source: William Pao

Needless to say, airports attach great importance to security, especially amid heightened security issues at airport facilities. According to Osprey Flight Solutions, from January to July 2022, the company issued five alerts reporting shootings at Dallas Love Field, Miami, San Francisco, Greenville-Spartanburg and Nashville airports, some of which resulted in disruption to airport operations. Osprey also issued three alerts highlighting stabbing incidents that have affected aviation workers and passengers in 2022 at San Francisco Airport and Boston Logan International Airport. To counter these issues, airports adopt advanced security systems such as video surveillance and access control.

Why is LiDAR good for an airport?

Increasingly, LiDAR is also used in airports to enhance security, operational efficiency as well as passenger experience. LiDAR works by way of shooting laser pulses into the environment; the pulses bounce off objects and return to the sensor, allowing the system to draw a highly detailed 3D map of the surroundings. More and more, it’s found its way into airports due to its various advantages.

“In 2023, several leading international airport groups initiated substantial LiDAR projects that will bring advanced people flow monitoring capabilities to tens of thousands of square meters in 2024,” said Raul Bravo, President and Founder of Outsight. “This technology is now recognized as the next generation for monitoring people flow, curbside, and parking areas. This shift to covering large zones, such as complete terminals or even entire airports, follows an initial phase where stereo-vision cameras were predominantly used in local and relatively small-sized areas to monitor touchpoints, like passport control zones.”

“The practical applications for 3D LiDAR solutions are game changers for enhanced airport physical security and business operations, and the ability to improve the traveller experience from the curb to the boarding gate. From a technological perspective, 3D LiDAR solutions can continuously track people in large and dense environments with extreme accuracy, seeing far beyond the limitations of conventional 2D video imaging and analytics,” said Enzo Signore, CEO of Quanergy Solutions.

Indeed, LiDAR offers certain advantages over other types of security systems, for example, video surveillance. In particular, privacy protection is a major benefit.

“Besides reliable detection of unauthorized intrusions with a low false alarm rate, data privacy is particularly important at airports. LiDAR captures data anonymously, ensuring the preservation of individuals’ privacy rights. With a larger field of view and more flexible mounting options, LiDARs are also more cost-effective than cameras because there is only a smaller amount needed to cover the desired area,” said Florian Petit, Co-Founder and Chief Experience Officer (CXO) of Blickfeld.

“LiDAR, when used with the right processing software, is increasingly preferred in airports due to its precision in tracking passengers’ journeys and its inherent anonymity. This technology does not capture any personal details, aligning with privacy laws like GDPR, and reducing legal and ethical concerns. This anonymity also increases LiDAR’s acceptability among passengers and staff, enhancing airport security and operational efficiency,” said Bravo. “Additionally, the industrialization of LiDAR technology has significantly reduced costs. Outsight uses RoboSense’s LiDAR in several airport applications. Because RoboSense is now able to mass-produce their LiDAR, these solutions have become more affordable than traditional camera or stereo-vision systems and deliver higher value.”

LiDAR airport application

Generally speaking, LiDAR has security and non-security applications at airports. Not only can they secure airports, but they can also enhance operational efficiency and the user experience. Below we take a closer look.

Security

According to Signore, in terms of security, a breach in the perimeter, even just one, can potentially bring airport operations to a standstill, leading to flight delays and compromising the safety of travellers and personnel. “The consequences may include significant financial repercussions for airports, encompassing substantial fines, damages, and the loss of millions of dollars in revenue,” he said. “3D LiDAR is a proven technology for superior perimeter intrusion detection applications. 3D LiDAR also provides a highly effective means of eliminating tailgating and piggybacking through security mantraps and revolving doors into secured areas, which is a prevalent security challenge in busy airport terminals.”

“Unauthorized access to critical areas, such as aircraft parking zones, must be promptly detected, triggering an immediate alarm for swift intervention by security personnel,” Petit said. “Simultaneously, the detection solution must only trigger an alarm for unauthorized human entry. Intrusion detection systems lacking 3D LiDAR data often fail in this regard, resulting in numerous false alarms, triggered for example by vegetation or animals.”

Operational efficiency

LiDAR can provide insights into occupancy and foot traffic at the airport. This, in turn, can help operators allocate resources more effectively.

“From an operational perspective, LiDAR facilitates the real-time, effective allocation of resources and staff management. Advanced software solutions, such as those offered by Outsight, introduce unique features like the automatic detection of overflowing queues. If not addressed promptly, such situations can lead to a diminished passenger experience,” Bravo said.

“A 3D LiDAR solution delivers new sources of data-driven intelligence on pedestrian and vehicular movements and density/occupancy, providing airport management with insights to better allocate personnel resources and processes. This includes everything from baggage handling to queue management for deliveries and food/retail areas, and personnel and traveller transportation services,” Signore said.

Improved user experience

This, then, can lead to a better user/traveller experience at the airport. “A 3D LiDAR provides the unparalleled ability to simultaneously track up to 600 individuals in crowded terminals, including check-in areas, security checkpoints, boarding gates, retail and dining areas, and baggage transport systems and claim areas. Here, the people and vehicle counting and tracking can assist with queue management to monitor and manage wait and dwell times to ensure smoother operations, which ultimately enhances the traveller experience,” Signore said.

How to Successfully Deploy a LiDAR System in Airports

As we mentioned earlier, LiDAR is increasingly used in airports for security and non-security purposes. But how can a LiDAR system be set up right? This article takes a closer look.

LiDAR has increasingly found its way into airports. LiDAR stands for light detection and ranging and works by way of shooting laser beams into the environment and analyzing the beams that return. More and more, it’s used by airports as a viable solution not just for security, but for operational efficiency as well.

“To avoid lengthy waiting times at the security checkpoints, passenger volumes and movements in the check-in hall can be detected and analyzed. LiDAR-based people counting technology allows the staffing of the security checkpoints lanes to be adapted to the actual passenger traffic,” said Florian Petit, Co-Founder and Chief Experience Officer of Blickfeld.

Advantages over video surveillance

Indeed, LiDAR offers certain benefits to airport operators, compared to conventional security systems such as video surveillance. “3D LiDAR sensors can cover a very large area compared to traditional cameras by an order of magnitude. Coupled with its hyper-accuracy, 3D LiDAR provides a significant total cost of ownership (TCO) advantage, which becomes even greater when considering the cost of infrastructure, cabling, and deployment. In short, you only need a few LiDAR sensors to cover the same area that would otherwise require several cameras to monitor,” said Enzo Signore, CEO of Quanergy Solutions.

Raul Bravo, President and Founder of Outsight, agrees.

“While LiDAR technology used to be quite expensive and more on the prototype level, it’s now much more accessible both in terms of cost and performance,” he said. “The value you get from (Outsight partner) RoboSense LiDAR these days is impressive. Thanks to the company’s technological progress and increased production, it’s become a more affordable option compared to regular camera systems. What adds to its cost-effectiveness is using fewer units per square meter, cutting down on everything from hardware costs to installation, wiring, networking, and ongoing maintenance.”

Bravo adds that the cost saved from false alarms reduction achieved by LiDAR can also be significant. “LiDAR’s advanced features significantly mitigate the issue of false alarms, a major concern in security operations, where false alarm rates can reach as high as 97 per cent, leading to alarm fatigue and potential security lapses. In 2022, these false alarms cost an estimated US$1.8 billion in wasted resources. LiDAR, especially when paired with sophisticated software, marks a significant advancement in this area,” he said.

Working in conjunction with cameras

Yet this doesn’t mean LiDAR can’t work in conjunction with cameras in airports. In fact, both technologies can complement each other quite well.

“3D LiDAR can easily become the ‘third eye’ of any security camera system. 3D LiDAR sensors provide object geolocation with pinpoint accuracy to the PTZ cameras to enable a ‘slew to cue’ workflow so the cameras never lose sight of the people/objects identified for tracking,” Signore said.

“In many scenarios, after the detection of unauthorized intrusions with LiDAR technology, cameras are employed for verification, which can also be beneficial in airports. However, careful attention must be paid to protecting individuals’ privacy rights in this process,” Petit said. “The high resolution of the data provided by the Blickfeld Security solution can in certain cases eliminate the need for cameras for verification and distinguish people anonymously from other objects.”

Deploying a LiDAR system in airports

As with other types of security solutions, deploying a LiDAR system in airports requires careful planning and a thorough understanding of the airport environment.

“3D LiDAR deployment at commercial airports needs to be strategically planned and deployed just like a security camera-based solution to ensure that the desired wide area coverage is obtained,” Signore said.

“The optimal installation depends on the specific local conditions. Typically, an installation on the hall ceiling or other elevated areas is recommended, allowing the sensors to have a comprehensive view and minimizing the number of devices required. With Blickfeld’s Qb2 LiDAR solution, installation and operation are notably straightforward. This is due to the software on the device requiring less cabling, and the possibility of WLAN transmission of the data,” Petit said.

According to Bravo, successfully deploying a LiDAR solution hinges on three critical aspects: engaging with LiDAR technology experts, ensuring distinct expertise in hardware and software, and utilizing advanced 3D simulation software.

“The complex nature of LiDAR technology necessitates collaboration with seasoned professionals. This specialized technology requires expertise that many companies, traditionally offering old-fashioned solutions like Wifi tracking or Stereo-vision, may not possess,” he said.

Bravo added: “It’s essential that hardware and software components are provided by expert entities, keeping full inter-operability. Crafting LiDAR software is a complex task, more challenging than traditional computer vision software for cameras, and requires its own set of specialized skills, distinct from hardware design and manufacturing. For planning, advanced tools like Outsight’s 3D LiDAR Simulator are indispensable in optimizing sensor setup, a crucial step in deployment. Utilized in over 2000 projects, this tool is both a pioneer and leader in its field.”

Historic Munich building adds digital key-based access management

London, March 2024 – Munich’s Hofbräuhaus enjoys an iconic status, as both a heritage property and a spiritual home for lovers of German beer. “In this historic building is the world’s most famous tavern,” explains its Security Manager, Robert Graßl. “The whole world goes in and out. Security is very important.”

Bavarian Duke Wilhelm V commissioned Munich’s original Hofbräuhaus in 1589, initially as a brewery to supply the Wittelsbacher Hof. Moved at the end of the 19th century and severely damaged during World War II, it underwent reconstruction in 1958. It now attracts tourists and city locals, seating up to 3,000 guests indoors and a further 400 in the beer garden.

Although the building is an important heritage monument, it required 21st-century digital access to keep site users safe and streamline day-to-day operations. They wanted fast, secure access rights management for employees and service providers – including up to 100 waiters working each shift – within a unified system which could authorize access at both the Hofbräuhaus and their food production facility in Brunntal.

Of course, inobtrusive digital devices and low-impact installation were a necessity to ensure compliance with heritage preservation regulations.

Digital access for a famous heritage building

Many electronic access products and technologies are not appropriate for historic buildings. An eCLIQ key-based digital access solution is different: eCLIQ cylinders are compatible with the strict monument preservation requirements at the Hofbräuhaus. They have a flush fit, so don’t even appear to be part of an electronic locking system. With wireless installation at the doors, devices blend with the building interior.

“We can exchange a mechanical cylinder 1:1 with an eCLIQ cylinder without having to modify anything on the door or install cables,” confirms Miriem Hammoudi, Business Development Manager at ASSA ABLOY Sicherheitstechnik GmbH.

ASSA ABLOY fitted around 100 eCLIQ locking cylinders and supplied 340 eCLIQ programmable keys for Hofbräuhaus managers to issue to relevant staff and service contractors.

Easy operation for flexible, cost-efficient management

Every eCLIQ key has an integrated chip and is programmable individually for the keyholder. The versatility of eCLIQ is demonstrated when a key is lost: Access authorizations are removed rapidly – simply by reprogramming cylinders – ensuring security is maintained. The eCLIQ system also helps manage workflows for service providers such as cleaners: Their access is enabled on a time-limited basis. A standard battery inside each programmable electronic key powers the cylinder or padlock on insertion – and encrypts data transfer between cylinder, key and system – so no external power source or wiring is needed.

The Hofbräuhaus team manages their system via a flexible, scalable web-based platform, CLIQ Web Manager: “I can program keys from anywhere or also block them quickly if a key has been lost or if someone is no longer allowed to enter,” says Robert Graßl. “And I can install any cylinder in any door by adjusting the length. I don’t have to carry extra stock which is really cost effective.”

With the hosting solution chosen, access data is stored securely at ASSA ABLOY, accessible anytime and from any location, which is an ideal configuration for managing large systems or multiple locations. Their system is easy to expand anytime – future-proofing Hofbräuhaus access.

“The situation before the new master key system was installed was problematic,” says Robert Graßl. “Keys were distributed and nobody knew who held them. Now, everyone carries only one key programmed with details of where and when they can enter. It’s perfect.”

To watch a video about this customer reference, visit https://youtu.be/HfhVyGMEF-c?feature=shared

Adriatic region in 2023: Unified Market Dynamics Between East and West

In this year’s survey of the security market of the Adriatic region, we interviewed nine representatives of well-known global manufacturers of security equipment. The findings are, without exception, positive. Business growth, diversification of projects, and utilization of advanced security solutions marked the past year in South-Eastern Europe

By: Damir Muharemović and Mirza Bahić: E-mail: redakcija@asadria.com

The Southeast European security market has fully recovered from the effects of the pandemic, disruptions in the distribution chain, and inflation. Several years of uncertainty have turned into an opportunity for a new beginning in the form of more comprehensive security solutions and services that have applications beyond the traditional security framework. Producers and their regional partners have resourcefully resisted the economic and market challenges and are now achieving increasingly better results. There are many project opportunities and it’s just a matter of being ready to compete in offering more customized, reasonably priced, and technologically sophisticated solutions.

Separate focus

We discussed the state of the projects in this flourishing field with the regional directors, key customer managers, and business development managers of nine big names from the security world: Ajax Systems, Avigilon (Motorola Solutions), Axis, Bosch, Konica Minolta, Supreme, Uniview, VIVOTEK and ZKTeco. Everyone spoke highly of last year’s business in the Adriatic region and beyond, with the difference in favoring one country over another and certain verticals over others. Each country has its specificities, but it is important to note how the region, as a market whose constituents naturally rely on each other, establishes its recognizability as a link between Eastern and Western Europe. “Our notable success in the Balkan region, marked by a 36% growth from 2021 to 2022 and a subsequent 30% increase from 2022 to 2023, underscores the region’s unique market dynamics and justifies its distinct focus apart from Western or Eastern Europe,” says Artem Arifov, business development manager at Suprema Europe. He also specifies how the Balkan region offers a rich landscape of its globally competitive software development companies specializing in TnA solutions, for example. “This trend aligns with the growing demand for custom advanced TnA solutions among end-users, positioning Suprema favorably for continued success and innovation in collaboration with these local developers,” adds Arifov.

The Balkan region offers a rich landscape of its globally competitive software development companies specializing in TnA solutions. This trend aligns with the growing demand for custom advanced TnA solutions among end-users

Consistent and visible growth

“Our Adriatic region has many countries that are smaller compared to other Western EU countries, and whose development is affected by many different influences. Whether some of the SEA countries will be recognized as being safe for foreign investments depends on many factors. This is precisely what affects the development of the security market, so that each of the countries of the SEA region, with its specificities, affects the creation of the overall regional average. We estimate that the entire region will have an average growth of around 5%. At the same time, we also see Hungary as the only country that will have higher growth than this average”, says Danijel Jerković, CEO of the South East Adria Safety Solutions at Bosch Building Technologies – Security Systems. Regarding investments and their annual growth rates, Jerković analyzed their trends over the past ten years. Based on this, he points out that almost all countries in the southeast Adriatic region have had a similar growth in foreign investments depending on the year, between 1.2% and 4.5%. More positive trends are found in Slovenia which recorded growth in foreign investments of up to 6% for that period.

At Avigilon, a company owned by Motorola Solutions, they note uneven investment cycles from country to country, and from year to year. Yet, looking at the region as a whole, they note “consistent and visible growth, which applies both to EU countries and to those that they are not members of the Union”, adds Andrej Ćuraković, sales director for the Balkans and Middle Europe for video security and access control with the company.

Manufacturers achieve success

Economic and investment trends have had a positive effect on all providers of security products and solutions in this area which, according to Axis, achieved 50% growth compared to 2022. “I still don’t have an insight into the complete state of the regional market. But what I have had the opportunity to see so far are extremely positive indicators that suggest that all manufacturers on our market have had a great year,” says Stjepan Šurmanović, Axis Communications’ key account Manager for South-East Europe which, apart from the countries of the former Yugoslavia, covers the markets of Albania, Bulgaria and Greece (from January 1st). For years, the Serbian market was the largest one for Axis in this region. But things are changing at the top. “Serbia did not disappoint in terms of end-year results in 2023, but the majority of our investments were in Bulgaria.” The markets of Croatia, Slovenia, Serbia, and Bulgaria record a marked growth every year. But it is noticeable that the south of the region is also gradually rising and more interesting projects are now popping up in those countries as well. We have yet to explore the Greek market this year, but the entire Axis team for Southeast Europe is looking forward to this challenge because we believe that we know how to work with developing markets. We plan to use the experience gained from the development of the region in Greece and offer our partners a high level of cooperation and support”, points out Šurmanović.

Excellent success in Bosnia and Herzegovina and Serbia

Along with Greece and Cyprus, Bulgaria is singled out as the best place for business in 2023 by Ilia Yashmakov, sales director for the Balkans & Adriatic at Ajax Systems. He adds that like “most European economies, the security market had very mild organic growth” and that 2023 was very successful for them. Uniview, on the other hand, recorded double-digit growth in Serbia, but achieved the greatest success in Bosnia and Herzegovina – a 100% increase. “The success is particularly noticeable in Bosnia, thanks to the hard work of our partner and close cooperation with our Bosnian team. We successfully won several projects in the bidding and eventually achieved growth over 100%,” says Tsing Tang, director of Eastern Europe at Uniview Technologies.

Significant growth is also expected at ZKTeco which has been present in the Adriatic region market for years. “We have a network of loyal partners that help us grow year after year. We have the strongest presence in Croatia, Serbia, and Albania. And we are looking for distributors in other countries of the region. Therefore, we still see a huge opportunity for growth,” said Kinga Zarzycka, general manager of the distribution business unit at ZKTeco Europe.

Given that the region covers a large area stretching from Ukraine to Greece in the south and Slovenia in the west, the area of coverage is highly diverse for Đorđe Baćić, business development manager at VIVOTEK. Within the area covered, the largest market is Ukrainian due to the high demand for security equipment. “Even with increased demand for a country in war, business is difficult, so my job is to help partners in Ukraine as much as I can,” says Baćić.

Economic and investment trends have had a positive effect on all providers of security products and solutions in our area

Focus on the solutions that go outside the standard security scope

 Vito Lalić, MOBOTIX’s business development manager for the Adria region at Konica Minolta, stresses that the growth trend continues in all markets in the region without exception, even in higher percentages than expected. He explains that this is mostly due to a series of solutions that are going beyond the standard security scope, with a focus on two essential security features. “The first one is business security, where we noticed that it is not just the standard focus on the protection (like perimeter protection) but rather on the manufacturing security via thermal EN54 cameras, for instance. It can give more results and information and provide a level of protection that a conventional camera cannot. Another type of market demand has to do with digitization and integration of data sourced from cameras such as traffic monitoring, monitoring the integration of logistics processes, and analysis of metadata. It can be used by several services for better planning and response. You can certainly feel the shift towards non-standard solutions”, says Lalić. In Konica’s case, Croatia and Bosnia and Herzegovina excelled in the logistics and waste control sectors, while the other countries focused more on traditional security solutions. It is a motivation and a message for manufacturers to strengthen communication to make the market better aware of new solutions.

PROJECTS

All major global companies that participated in our survey reported positive business outcomes in the past year. They supplied their products and solutions for several projects from different verticals. This indicates not only the economic recovery of the Adriatic countries and increasing investments but also the diversification of the production portfolio of a large number of manufacturers. This allows them to occupy a position from which they can meet the increasingly complex demands of the market, such as those for more advanced analytical technologies in the mid-price device range.

Quality before price

However, the best news is the growing demand for quality solutions that adhere to European standards and norms. For decades, price was the deciding factor when choosing security equipment and services. Yet, the focus is gradually shifting to quality and reliability. “It was not easy to convince regional integrators to give a chance to and consider solutions that are not based solely on low prices, but rather provide value and a long-term business and technological perspective. Throughout this period, the market has rewarded our efforts and the idea that the cheapest is not always the best. And, ultimately, the cheapest is not exactly “cheap” in the long-term perspective of the prolonged life cycles of projects,” says Šurmanović. He adds that Axis is recognized as a reliable supplier of solutions that provide added value to projects. This pioneering company in IP video surveillance, known for its work in the enterprise sector, has mostly implemented advanced solutions related to the protection of industry, critical infrastructure, traffic, and smart cities.

EN54 standard

Bosch continued its multi-year business growth in the region last year. The reliability of its brand name was a decisive factor in the selection of its equipment for tenders. “It is obvious that the markets in the Southeast Adriatic region are increasingly aware of the importance of implementing reliable fire detection systems within the framework of the EN 54 standard, and that they have found a reliable partner in Bosch. We are pleased with the increasing interest of installation companies in Bosch’s fire protection products and solutions”, says Jerković. What gives that company an advantage is its understanding of the specifics of the requirements of individual branches of the economy. “We can offer a wide range of solutions for very complex requirements that depend on the types of investments in individual countries within the SEA region. Thus, in eastern SEA countries, we are active in the health and industrial sectors of the economy, while in the countries of the central SEA region, the same goes for the industry, logistics, and transport”, says Jerković, adding that they implement fire protection solutions in commercial and business centers in all countries.

Yet, the best news is the increasingly sought-after quality solutions that respect European standards and norms. For decades, price was the deciding factor when choosing security equipment and services, but the focus is gradually shifting to quality and reliability

Demand for detailed analytics

Taiwanese manufacturer VIVOTEK has been most active in the enterprise vertical and this is reflected in its revenue structure. These are high- and mid-range camera models that provide additional value accompanied by high-quality analytics and in-depth video searches. Users are increasingly looking for more advanced solutions with new, more efficient analytical technologies. As the most interesting project in 2023, they point out the one implemented in Romania, where they delivered over 60 PTZ cameras and more than 200 bullet and dome mid-range and high-end cameras. “The project itself is interesting because we worked on covering a large open space where we created an automated solution with VIVOTEK analytics that triggers when a person appears and automatically directs the PTZ camera to that location. The PTZ camera continues monitoring the object as long as it is in its line-of-sight field. The combination involves 2-3 fixed cameras covered by one PTZ camera. The most important thing about this solution is that our PTZ camera can monitor more than one fixed camera. Entire communication between the fixed and PTZ cameras is direct, on a camera-per-camera basis. VMS does not have any functions, apart from receiving events”, explains Baćić.

Projects in different verticals

 The diversification of the portfolio and the quality of the equipment are the right measures of success. In any case, this approach to the market is applied at Avigilon. They highlight critical infrastructure, public administration, sports arenas, and retail as areas in which particularly strong growth is recorded. In 2023 they realized many strategic projects, both in the public and business sectors. Among these is the continuation of the project with the Nikola Tesla Airport in Belgrade and Rimac Technology, which chose them as a technology partner for their new campus in Sveta Nedjelja.

As for Suprema, which offers a versatile portfolio of solutions for access control, the company confirms that key projects in the Balkans took place in different sectors. They cite different verticals – banking, universities, government projects, and commercial/business centers. At the same time, Uniview boasts of securing one of the most famous music festivals in Europe – EXIT in Novi Sad – where their cameras protected visitors and participants so that they could fully enjoy the program.

According to Zarzycka, ZKTeco’s devices were very popular in gyms, hotels, and small and medium-sized businesses. As for references, they point out larger projects such as the Football Stadium in Osijek, the Viktor Lenac Shipyard in Rijeka, and the Valamar Riviera Hotel on the island of Krk in Croatia. For Ajax Systems, the Ukrainian provider of alarm systems, the residential sector is naturally in focus, but the more intriguing announcement is that they “will have a different answer” next year. They are probably alluding to the fact that they recently came out with an offer in the field of video surveillance for the first time. A new and serious player will eventually seek his piece of the pie in that extremely competitive market.

BEST-SELLING PRODUCTS

 Artificial intelligence is on everyone’s mind

 When it comes to the most sought-after technologies in the Adriatic region, this year’s research pointed to the variety of technological trends that shape the landscape of the security market in this part of the world. Based on the answers we received, it is easy to conclude that all the companies were focused on innovations and customizations in 2023 to respond to the specific needs of the regional market. This created a dynamic environment that encourages progress in the local security sector.

At Axis Communications, the focus is on offering open platforms and personalized solutions for different customer profiles. The integration platform EDGE, which enables the customization of projects according to the specific needs of clients, was particularly in demand. For regional buyers, the choice is facilitated by development partners tasked with directing these solutions to various areas, such as incident management systems, license plate recognition, classification of vehicle brands and types, speed detection, and various other functions related to artificial intelligence.

Functional AI was also in demand in the cameras offered by VIVOTEK. “They are mainly looking for cameras that have advanced AI technology Smart VCA, i.e. analytics for detecting people and vehicles, and Deep Search saving attributes with the video,” says Bačić. He adds that buyers do not neglect the price either, because 5 MP models with fixed and motorized lenses were the most sold. At the same time, cameras in the business segment, which include bullet and dome PTZ models of 5 MP and 8 MP, generated much revenue.

Representatives of Avigilon also state that regional customers have shown a more pronounced interest in solutions guided by artificial intelligence. This particularly applies to the demand for intelligent systems that support security operations—specifically, those capable of sending alerts to security personnel when they must take appropriate measures in the field. Here, the role of artificial intelligence is to direct the user’s attention to key aspects of security.

For regional buyers, the choice is facilitated by development partners tasked with directing these solutions to various areas, such as incident management systems, license plate recognition, classification of vehicle brands and types, speed detection, and various other functions related to artificial intelligence.

Customers are looking for cameras that are more than just that

When it comes to cameras, customers have shown interest in devices that offer more than just keeping a record of events on the ground in a surveilled area. Like the rest of the world, the region is experiencing a growing awareness that the camera, as a visual sensor, can provide significantly more information and knowledge compared to the traditional application of video surveillance systems. Users purchase these devices to access data that is transferred to cloud services, while cities use them to improve various urban processes, including municipal services, security, traffic, urban planning, air quality and water flow monitoring, flood protection, and the like.

“Highly requested solutions in the segment of traffic and smart cities, industry and critical infrastructure were ex-certified cameras. The same applies to advanced perimeter protection with thermal cameras and video analytics that can detect critical events, with the gradual establishment of fully or partially autonomous systems,” says Šurmanović.

​Thermal cameras, especially the EN54 series, brought significant revenue to MOBOTIX. Its representatives believe that this is an important indicator of the growing willingness of users to invest more in thermal imaging solutions. Solutions for night surveillance were equally in demand, for which the company Uniview Technologies emphasizes its Easy Star series which was designed for this purpose. With a competitive price, this series was the best-selling model of this company in the Adriatic region. Starlight network cameras, which offer high-quality color images and precise information about suspicious activity during nighttime intervals, have also been popular.

Thermal cameras, especially the EN54 series, brought significant revenue to MOBOTIX. They believe that this is an important indicator of the growing willingness of users to invest more in thermal imaging solutions. Solutions for night surveillance were equally in demand, for which the company Uniview Technologies particularly emphasizes its Easy Star series, which was designed for this purpose. With a competitive price, this series was the best-selling model of this company in the Adriatic region. Starlight network cameras have also been popular since they offer high-quality color images and precise information about suspicious activity during nighttime.

„Most crimes, over 70%, happen at night. Based on this situation, we launched the Easy Star series which are good at obtaining colorful images and providing colorful information of criminals at night and which not only meets the needs of project-oriented customers, but also suits the SMB and distribution market“, says Tang.

Video analytics and VMS also made the list of the most requested technologies. At Konica Minolta, they state that there is a particularly high demand for functions such as license plate recognition (LPR), parking space identification, and object detection. At the same time, the most important thing for customers is the stability of the products, as well as their accuracy rate. They also noticed a growing interest in the implementation of video surveillance management systems, especially since those from the domain of business-class solutions have finally become available for small users as in the case of Luxriot VMS, for instance.

Cities use the cameras to improve various urban processes, including municipal services, security, traffic, urban planning, air quality and water flow monitoring, flood protection, and the like

It’s not all about the price

Fire protection solutions continued to climb high on the list of best-selling products in 2023. In Bosch Building Technologies, they state that innovative solutions were most sought after, particularly the cameras designed for early video detection of fires, such as Aviotec NG. In addition, Bosch’s Jerković says that the new members of the AVENAR family of detectors attracted the interest of users in the form of the new model FAP-425-DOTCO-R. It brings combined optical and thermal sensors and an additional specialized sensor for quick detection of carbon monoxide. Hospitals, clinics, homes for the elderly and infirm, as well as users of garages and parking lots are among the clients who have demonstrated an interest in this system.

Ajax Systems is proud of the success of its series of fire alarm detectors, which have followed this manufacturer’s wireless alarm systems in popularity. Access control was the most profitable segment for ZKTeco Europe, followed by other most popular products from the company’s portfolio, such as pedestrian barriers and parking ramps. Arifov highlights the success of the X-Station 2 system as Suprema’s best-selling product in the regional market. This device is intended for time & attendance and offers the possibility of displaying customized TnA and codes according to specific occupations, which facilitates the monitoring of work in different branches.

Ultimately, it was not only commercial security products that were popular in the Adriatic region. Bosch’s free software tool Safety System Designer, which is intended for designers for quick configuration of EN 54 fire alarm systems, has also attracted great interest from users, particularly for its support for the integration with AutoCAD software.

Innovative solutions were most sought after, particularly the cameras designed for early video detection of fires

TECHNOLOGY TRENDS IN 2023

In the past year, the security technology industry has undergone significant changes at the global level. The echo of this tide has also shaped the dominant trends in the regional sector. Through the statements of leading experts, we will look at the key technological innovations that, according to them, marked the year 2023 on the regional market.

Focus on cost reduction and energy challenges

Tang from Uniview Technologies predicts that in 2024 the focus will shift to wireless solutions in security systems. This change will include a triad of Wi-Fi cameras, and cloud and mobile applications, which will offer a reduction in total costs and easier installation to their users. Uniview is preparing for these trends by expanding its product portfolio to include wireless solutions that should bring more favorable total cost savings to users compared to traditional analog and wired IP solutions. This especially applies to solutions for smaller businesses, as well as home products for smart homes. Among the latter, solutions that will enable simpler storage of energy at a time of higher energy prices will be in higher demand. Uniview will therefore focus its efforts on promoting systems like Hopetrek, which includes a portable charger (power bank), energy storage for residential environments, and industrial and commercial energy storage solutions. The new storage system will also have an integrated computer, battery unit, BMS, EMS, fire protection system, and temperature control system.

Investing in cyber protection and edge-based data processing

Another important trend is the ubiquitous use of the cloud, which has led to a large-scale opening to the internet and significantly strengthened the associated risks of cyber-attacks on the entire spectrum of security systems. The increased threat now also entails large investments in cyber protection. This is significantly influenced by the trend of transnational legal regulation of this field through new directives that all EU members will have to implement starting January 1, 2025, including NIS2.

The third indicator of the direction in which the industry is moving is the increasingly advanced possibilities of integration and performance of actions at the edge or in the device itself, including cameras, radars, thermal cameras, a combination of radars and cameras, etc. These solutions are now more in demand than ever and will shape the direction of the security sector. With greater generation of data and metadata at the edge, the demand for cloud-based platforms is also growing. They will manage all metadata from the camera that goes to cloud services simply and efficiently, with the help of the most accessible and user-friendly interfaces.

Finally, Jerković puts machine learning next to AI in terms of technological importance, noting that we should not forget the Internet of Things and blockchain as well.

AI dominance and user focus

For Axis Communications’ Šurmanović and his colleague Ćuraković from Avigilon, AI technology marked the year 2023 as a key security trend. This technological breakthrough includes a shift from traditional motion detectors to AI-based event detectors, enabling advanced analytics and personalization solutions. ” Artificial intelligence has finally replaced the now outdated event detectors based on standard motion detection, which relied on changes in pixels within the image”, says Šurmanović.

Baćić from VIVOTEK emphasizes the importance of investing in AI functions to improve user experience. The focus on deep search functions based on this technology provides new opportunities in event investigation, and faster search and response, which is the first step towards automating security systems.

Yashmakov of Ajax Systems supports the thesis of the growing importance of user experience, noting that this is not limited to new technologies. Regardless of whether it pertains to anti-burglary or any other security domain, this company views the popularization of the approach that prioritizes “the user is king” as a key future trend. This will, according to Yashmakov, drive the security market in the next five to ten years.

Cloud solutions will strengthen the security culture

At Avigilon, they point out global and regional migration towards cloud solutions as an important technological trend in the year ahead. Cloud solutions are becoming the basis of comprehensive security systems because they offer reliability and readiness to face future challenges. “It will be a way for organizations to ensure that their solutions for video security and access control remain equipped with the most innovative capabilities and intelligent analytics, which will help them build a resilient security culture,” says Ćuraković.

Jerković from Bosch believes that the broader picture of technological developments in the region must include “improvements in various applications, remote connectivity with systems, and progressive data storage in the cloud within the industry”. According to him, the regional security landscape significantly shapes the development of the startup ecosystem, the rise of e-commerce, and the increasing digitization of public services.

Uniview has also joined this technological trend and redesigned its cloud platform in 2023 to feature new data transfer strategies that focus on the prevention of network congestion and data packet loss.

The regional security landscape significantly shapes the development of the startup ecosystem, the rise of e-commerce, and the increasing digitization of public services

Centralization and versatility

Zarzycka of ZKTeco Europe notices a growing demand for versatile access control solutions that meet an ever-widening range of customer needs. ZKTeco recognizes technologies such as facial recognition, proximity cards, and reading palms or fingerprints as dominant trends in this segment.

For 2024, Lalić from MOBOTIX predicts a growth in the demand for system centralization in physical protection. This is a consequence of the users’ need to integrate different systems, for which MOBOTIX offers solutions such as the open platform VMS and the PSIM platform for unifying systems in one place. “Users who have haphazardly invested in physical protection systems of various brands for years are now facing more problems as their business grows and they now aim for centralization,” says Lalić.

In the end, it can be concluded that the year 2023 on the regional market was marked by technological progress, especially in the segment of artificial intelligence, migration to the cloud, access control with a wider field of application, and energy sustainability. What is encouraging is the swift mirroring of global trends within the regional market, indicating the dynamism of its development and technological and business integration with the global security industry.

In 2024, the demand for system centralization in the physical protection segment is predicted to grow as a result of the user’s need for the integration of different systems

 

MPS Gas Sensor Is on the Market Following Intensive Development

The MPS gas sensor, developed in cooperation with NevadaNano, represents the latest innovative sensor technology for the detection of flammable gases and refrigerants.

The MPS gas sensor from MSR-Electronic belongs to the latest generation and offers unprecedented safety for people and installations. The MPS gas sensor are particularly suitable for hard-to-reach areas and complex applications, as they can operate for long periods without requiring calibration or maintenance; be it, for example, in the petrochemical industry, industrial plants, H2 research, production, transport, logistics, the refrigeration industry or even in the oil and gas industry as well as in the shipping and offshore sectors.

False alarms and inaccurate readings are a thing of the past

After almost 40 years, NevadaNano, in collaboration with the University of Nevada, Reno, has succeeded in developing a gas sensor for combustible, explosive and flammable gases using MPS technology, which overcomes the hurdles faced by existing sensors.

This not only includes high accuracy, linearity, stability and repeatability over the sensor’s entire lifetime, but also resistance to poisoning, which is particularly advantageous for plants that are frequently exposed to various gases and external influences. The gas sensors can be used to detect refrigerant gases, hydrogen, acetylene, methane and propane.

MSR-Electronic features on top

Thanks to its collaboration with NevadaNano, MSR-Electronic has succeeded in bringing a gas sensor onto the market with a service life of over 15 years. This is a significantly longer service life compared with other MPS gas sensors on the market. A special advantage is the neutralisation of the groups.  This means that the MPS sensors from MSR-Electronic are individually adapted to the target gas and thus achieve a significantly higher level of accuracy.

The MPS sensor is available in both the PolyGard and PolyXeta product series from MSR-Electronic. These include the typical MSR advantages of easy changing using X-Change Technology, powerful processors in each individual sensor for easy reading of all sensor data, modular and flexible controller solutions and, last but not least, personal support from MSR-Electronic, its subsidiaries and local partners.

Let’s start generation MPS sensor

“Since first making contact with Gary Collins, Vice President of Sales & Marketing (NevadaNano), in 2020, and following an intensive in-house development phase, MSR-Electronic is now presenting a pioneering product, which stands out enormously from the competition in terms of service life and accuracy of measuring values. We are very proud of our collaboration with NevadaNano,” says Harald Schmitt, CEO of MSR-Electronic.“

We are excited to work with MSR-Electronic to bring our groundbreaking MPS sensor technology to their range of fixed gas monitors,” said Karl Roberts European Sales Director at NevadaNano.“We share MSR’s commitment to continuous innovation, to support our core market requirements for enhanced solutions to address their key concerns around sensor performance, reliability and life cycle cost”.

2023 Tech Trends Maturity and Sustainability Index Survey

The “2023 Tech Trends Maturity and Suitability Index Survey,” sponsored by ZKTeco, garnered responses from 633 channel players offering validated insights into the technologies significantly impacting the video surveillance and access control industry. This year’s survey includes a closer look at biometrics, with insights into the industry and emerging trends from key market players and a comprehensive analysis of the survey results.

Ongoing and Emerging Trends

Mature and suitable: Radar and LiDAR (2), edge processing/storage (3), unmanned security platforms (4), artificial intelligence (5) and 5G wireless communications (6); Mature but not as suitable: Li-Fi (1)

5G ranks high in the survey and for good reasons too; the technology with its fast speed and low latency has been a key enabler in AIoT and is now increasingly seen in video surveillance with more cameras being 5G-enabled. Also ranking high are edge processing/storage, unmanned security platforms (robots and drones) and radar/LiDAR, the latter of which are companion detection technologies to video surveillance, being able to detect objects in inclement conditions. LiFi or light fidelity is becoming mature yet is still deemed unsuitable as a transmission solution.

Access Control

Mature and suitable: Touchless biometrics (7) and building/property management integration (8); Mature but not as suitable: Unimodal biometrics (1), touch biometrics (2), wireless locks (3), cloud access control (4) and digital twins (5); Not as mature nor suitable: Multimodal biometrics (6)

Touchless biometrics such as face and palm recognition are gaining ground post-pandemic while building management integration suits the current green and sustainability trends well. Unimodal biometrics and touch biometrics, while technologically mature, rank lower in suitability as organizations attach stronger importance to the security, safety and health of their workers. Multimodal biometrics, on the other hand, is moving up along the suitability index due to the extra layer of security it offers.

Video Surveillance

Mature and suitable: Mobile apps for video surveillance (7), low light color cameras (6), 4K resolution (5), cloud video surveillance (4) and bi-spectral camera (3); Not so mature nor suitable: 8K resolution (1) and tri-spectral camera (2)

Lowlight color cameras offer good color-capturing capabilities in lowlight conditions and continue to gain ground in video surveillance thanks to more advanced lenses and image processors available. 4K allows users to zoom in and still see clear images, making it useful in large-scene environments such as city surveillance. Bi-spectral cameras whereby visible light and thermal camera units are combined into one device are beneficial in industrial settings. By comparison, 8K resolution and tri-special cameras (with UV combined) are not as suitable, at least at this point in video surveillance.

 

2023 Video Surveillance Tech Trend Survey: AI Dominance Continues

In this year’s asmag.com video surveillance technology survey, sponsored by ZKTeco, lowlight color cameras, 4K and bi-spectral solutions all ranked high in both market suitability and technical maturity, while AI continues to gain traction as a solution that fulfils users’ security and operational needs. This article takes a closer look at the results.

AI

AI, in particular AI predictive analytics and anomaly detection, ranks very high on the suitability index. This is understandable, as more and more users rely on AI to achieve better security and efficiency.

“2023 saw the growing influence of artificial intelligence (AI) as data-driven video technology, the combination of AI and video technology. In data-driven video technology, instead of people watching the video, the software watches the video,” said Rahul Yadav, CTO of Milestone Systems. “Data-driven video technology is disrupting the security industry, but it’s not removing people from the solution; it’s moving people to the center of the solution. Software is now the tool at the periphery doing the watching, identifying objects, recognizing patterns, trends, and correlations, and using these to create insights and actionable intelligence.”

“In the video surveillance market, manufacturers are continuing to focus on AI-based analytics. i-PRO’s Scene Change Detection is an example of how analytics are evolving beyond recognizing people, vehicles and attributes,” said Adam Lowenstein, Director of Product Management at i-PRO Americas. “At the same time, we have heard more issues and concerns about how analytics are being used. Privacy concerns are being highlighted more often due to AI being frequently in the news, along with misconceptions about the difference between AI and facial recognition. As a result, we’ve had more enquiries about our edge-based AI Privacy Guard feature that applies a mosaic to the face or entire figure of a person.”

“In the coming years, we will see innovative surveillance solutions come to market that are more cost-effective through the cloud and smarter through AI. In particular, we can expect to see Edge AI cameras that capture, store, analyze, and connect to the cloud from the edge of a single device, instead of having to build many separate systems and infrastructure such as video devices, storage servers, and AI analysis servers,” said Choong Hoon Ha, Chief Sales and Marketing Officer at Hanwha Vision.

As far as technical maturity is concerned, AI predictive analytics and anomaly detection ranks in the middle. But that’s sure to change once better chips and algorithms become available to make AI even more mature and reliable.

Lowlight Color Cameras

Lowlight color cameras rank highly in both suitability and maturity. Indeed, thanks to better lenses, sensors and chips, coloring capturing in extremely low Lux conditions has become increasingly feasible, and for users who attach great importance to nighttime surveillance, this has proven beneficial for them.

“Low-light color security cameras are commonly used in critical infrastructure facilities such as power plants, water treatment facilities, airports, and other major transportation hubs often as an alternative or in combination with thermal imaging cameras. Low-light cameras help ensure security and integrity of vital sites, even during nighttime or low-light scenarios,” said Jamie Barnfield, senior sales director, IDIS Europe. “They are also useful to monitor entrances, exits, and interior spaces that experience challenging light conditions, allowing for accurate identification of activities in real-time and deliver crisp, clear recorded footage.”

“Since i-PRO has been ahead of the curve with low-light sensors delivering excellent color reproduction for some time, it is not what we would describe as a new trend. However, we have worked hard to educate the market on the benefits of capturing color in low light,” Lowenstein said. “Beyond the obvious benefits for humans to better identify a person or vehicle, AI-based object recognition also functions much better when it has color information to work with.”

UHD

4K ranks highest for maturity and at the high end for suitability. Thanks to better sensors and codec technologies, 4K or 8MP security cameras can capture UHD images while keeping bandwidth consumption and storage at low. This makes 4K especially ideal for scenarios where the user needs to, for example, establish the pattern of a person’s clothes or identify the plate number of a vehicle far away. But does it mean the higher the resolution, the better? Not necessarily. Consider 8K, which ranks low in both suitability and maturity. Further, UHD may be more expensive, and they may work less effectively in lowlight conditions.

“Since the 4K market is still growing compared to Full HD installations, 8K use cases represent a tiny minority for most customers today. Many users have found that having a combination of a multi-sensor camera which covers 360 degrees in HD or 4K coupled with an auto-tracking PTZ camera that can optically zoom in much closer, is more practical, flexible and affordable. 8K also impacts storage and bandwidth considerably compared to 4K cameras. It also takes extremely good lighting conditions to benefit from 33 megapixels of resolution in most security installations,” Lowenstein said.

“It is still true that lower resolutions are the more cost-effective solution. Moreover, they are still absolutely sufficient for many applications. Especially in the low-light range, the lower resolutions are currently even better, since larger pixel sizes capture more light. This is why MOBOTIX also offers a 4MP low-light sensor for the MOBOTIX 7 series,” said Thomas Lausten, CEO of MOBOTIX. “But we are convinced that the more demanding an application is to be, the higher resolutions will be required.”

Bi-spectral Cameras

Also ranking high on the chart is bi-spectral cameras where a visible camera unit and a thermal camera unit are combined into one. This is especially ideal for factory and industrial settings where detection and verification of smoke, heat and fire points are critical. Now there are also tri-spectral cameras with a third, UV component added. But these rank lower in the survey.

“There is already interest in some fields outside of the security industry such as environmental monitoring and agriculture as tri-spectral scans capture images in different lighting conditions and provide valuable insight and detail that is not visible to the naked eye.  Yet for the time being, multispectral and bi-spectral cameras are most in demand to improve the accuracy of many AI-powered analytics applications, that are unable to hit the ‘sweet spot’ of up to 98 percent accuracy for people counting in retail,” Barnfield said.

Also, it should be noted that whether visible, bi-spectral or tri-spectral, these are just means to an end. “For the time being, it is not important whether the image is optical, IR or UV-based. That is a decision defined by the task at hand and the environment. What is decisive is the comprehensive intelligence with which the system is supported. This was also the prevailing trend in 2023: artificial intelligence-based software that, in combination with a camera, correctly detects situations that precede unwanted events to ultimately prevent them, but also to optimize processes,” Lausten said.

Other Items on the Survey

Cloud video surveillance ranks high, allowing users to opt out of investing in NVRs and servers. SSD in storage is also gaining prominence, presenting a faster and more reliable storage solution. Finally, solar-powered video surveillance is gaining ground in market suitability, providing a viable solution in remote areas where power is not readily available.

 

2023 Access Control Trend Survey: Touchless, Multimodal Biometrics Gain Ground

This year’s Security 50 access control technology survey sees building management integration and touchless biometrics both ranking high in terms of technical maturity and market suitability. Meanwhile, multimodal biometrics, where users are authenticated by more than one biometric modality, are gaining ground. This article takes a closer look.

Building Management Integration

Building management integrated with access control ranks the highest in suitability. In terms of maturity, it clinched a high spot as well. Indeed, more and more users are turning to building management-access control integration due to its various benefits, including one-stop management and energy savings.

“The modern building environment is a complex network of numerous systems, including air conditioning, water drainage, plumbing, electricity, fire alarms, security systems, and home or office automation systems. Managing each of these systems independently can be a daunting task, often leading to inefficiencies and an increased likelihood of errors. More and more building owners and operators are recognizing the value of a unified platform that brings together the management of all these systems,” said Raymond So, Head of Marketing at ZKTeco.

He added: “In a well-integrated building management system, there is a high degree of interaction between different systems and devices. For instance, an access control system can be integrated with the lighting and HVAC systems to automatically adjust the environment based on occupancy. This level of interaction enhances building security, increases energy efficiency, and improves the overall user experience by creating a more intuitive and responsive environment.”

Touchless vs. touch biometrics

For biometrics, the survey shows touchless biometrics such as face and iris recognition rank high in both suitability and maturity. Touch biometrics, meanwhile, ranks the highest in maturity. This is understandable, as touch biometrics, mainly fingerprints, have been in use for decades. Yet, the value of touchless biometrics is also being realized, especially in the post-pandemic era.

“Touch biometrics have been around for decades and are widely deployed for access control applications. So, yes, we agree they are more mature in terms of their acceptance and maturity in the marketplace,” said Brian DeGonia, Director for Biometric Solution Enablement, Extended Access Technologies at HID. “Touchless biometrics however are gaining ground quickly due to the frictionless, ease of use and the ability to operate without contacting a surface that may be of health concern. The performance of touchless matching algorithms is improving quickly and drastically to have the same characteristics as their touch counterparts.”

“The growing prominence of touchless biometrics is shaped by factors such as hygiene, user-friendliness, speed, cultural considerations, and market trends. Despite this, touch-based biometrics continue to hold their ground owing to their maturity and familiarity among users,” So said. “At ZKTeco, we are committed to advancing both touch and touchless biometric technologies to cater to our diverse global clientele. Our focus remains on delivering cutting-edge, reliable, and user-friendly biometric solutions that align with evolving market needs and trends.”

“AI-based identity solutions and touchless biometrics have gained deep adoption in the access control realm. This is a result of the outcome of a sustainable solution during the pandemic outcry for a safe and secure access control solution, requiring a hands-free contactless proposition. The advent of AI and the steep innovation and improvement over the recent years has also accelerated and pushed the adoption curve towards a new behaviour and trust for contactless biometrics for access management and identity management,” said Alex Tan, Regional Sales Head for ASEAN at IDEMIA. “The requirement for hard credentials or digital cards will get softer by each year as ESG initiatives and governance come center stage for every enterprise – be it at the local or governmental level. This is also driven by the fact that biometrics are virtually perpetual requiring little to no credentialing after support.”

Multimodal Biometrics Pick Up Steam

The survey further finds unimodal biometrics ranking higher on maturity, while multimodal biometrics are not as mature but are gaining ground in suitability. Indeed, multimodal biometrics are seeing increased adoption due to certain benefits.

“These include higher accuracy, where multimodal biometrics can reduce the error rates and increase the confidence levels of the system by combining the strengths of different modalities and compensating for the weaknesses of each one; higher security, where multimodal biometrics can prevent spoofing attacks and enhance the privacy of the users by requiring more than one biometric trait to grant access; and higher user convenience, where multimodal biometrics can offer more flexibility and choice to the users by allowing them to select the most suitable and comfortable modality for a given situation,” said Hanchul Kim, CEO of Suprema.

However, multimodal biometrics also have some challenges and limitations that make them less mature than unimodal biometrics. These include higher cost and complexity, and less stable infrastructure. Yet these can be overcome in time.

“Multimodal biometrics have a great potential to overcome their current limitations and become more mature and widely used in the future as the technology evolves and the market demand changes over time,” Kim said.

“Multimodal biometrics are increasing in use for identification. For authentication, unimodal works quite well and is very mature. But for large-scale identification use cases or in applications that require a higher level of security and assurance, multimodal biometrics can be used to disambiguate where an unimodal biometric may match more than one person. By using more than one biometric factor, you get better assurance that you’ve identified the correct person,” DeGonia said.

However, this is not to negate the popularity of unimodal solutions which some said would stick around for a while. “This is in line with human behavioural mechanics where people are simply more geared towards doing simpler or lesser gestures to attain the same outcome. Take for instance making a phone call, one with the early 1900s rotary dial gesture versus the late 1960’s push-button gesture. Even despite saving only a few seconds in the process, convenience and speed is the driver that brought about the demise of rotary dial phones. As convenience and accuracy take center stage, touchless unimodal authentication like facial recognition or fingerprint technology will make up the vast majority of authentication modalities. It is hard to beat the convenience of not bringing anything but yourself (something that you are) instead of having to hold or wear something (something that you have or carry),” Tan said.

He added: “In the past, only sensitive areas/doors will require multimodal technology to ensure effective security posture at that area. The same is true for the field of IAM like making important transactions like payment. Thus, multimodal in its true use case is meant for important transactions; otherwise, the inaccuracy may happen in certain unimodal technologies. Hence, the value of any biometrics is to get its 1:N function to work accurately with speed and inclusion. Just look at how we unlock our phone, do we use multimodal to unlock it? No. multimodal is only to heighten the security stance for special environment/use case.”

Dual Biometrics

At this time, multimodal biometrics are mostly dual-modal, namely using two modalities to authenticate. According to our survey, face-fingerprint and face-palm rank higher in both suitability and maturity than palm-fingerprint.

Our interviewees mostly agreed with the results. “When thinking about duo-modal biometrics, you often look to use different, distinct body features. A hand consists of both the fingers and the palm. As a result, you commonly see face-fingerprint implementations since these technologies are readily available in the market and in form factors that can be easily integrated,” DeGonia said.

“Face fingerprint is one of the most common and popular duo-modal biometric technologies, as it combines two of the most widely used and reliable biometric modalities. Face-palm is a relatively new duo-modal biometric technology, but it has gained a lot of attention and interest in recent years. It combines face recognition with palm print or palm vein recognition, which are both contactless and robust modalities. It has been applied in some emerging applications, such as health care, banking, and education. Face-palm offers high performance, privacy, hygiene, and flexibility,” Kim said.

He added: “Face-fingerprint and face-palm are both suitable for applications that require high levels of security and convenience. They can provide fast and accurate verification or identification with minimal user interaction and effort. They can also prevent spoofing attacks and protect user privacy by requiring more than one biometric trait to grant access.

According to Kim, palm fingerprint is a less common and less mature duo-modal biometric technology. “It combines two contact-based modalities that require different sensors and capture methods. It has been used in some niche applications, such as forensic investigation, and criminal identification,” he said. “Palm-fingerprint is less suitable for applications that require high levels of security and convenience. It can provide high uniqueness and diversity of biometric features, but it also requires more user interaction and effort to capture both modalities. It can also be affected by environmental factors, such as dirt, moisture and temperature that can degrade the quality of the biometric images.”