Home Security Services Archive by category Security Management

Security Management

Empowering Schools in the UK with Ruijie Reyee Wi-Fi 7

Engayne Primary School is in Upminster, Essex. It has more than 600 students. The school wants to give students a good learning environment. It uses digital tools to help with teaching and school work. A strong and safe network is very important for lessons and school management.

Challenge: Network Instability and Security Issues

The school relies on digital tools for teaching, administration, and overall campus connectivity. A strong network is essential to support everything from interactive lessons and virtual classrooms to office management and school-wide communication. However, with more digital tools and devices in use, the school’s network is facing new challenges:

Many devices needed to be online at the same time, but the network was not stable, causing learning disruptions and harming the students’ experience.

All devices shared a single network without segmentation or access control, which made security a major concern.

Network management and maintenance were complicated and time-consuming.

Solution: Ruijie Reyee Wi-Fi 7 for a Smarter School

To fix these problems, Engayne Primary School installed RG-RAP72Pro Wi-Fi 7 Ceiling Access Points. This is a fast and strong solution that works well when many devices connect at the same time.

Some good things about the Ruijie Reyee Wi-Fi 7 solution:

  • Fast and Steady Connection: Keeps online lessons smooth even in high-density environments.
  • Better Security with Network Splitting: Teaching devices, office equipment, and guest devices are on different networks. This makes the network safer.
  • Easy to Manage: With Ruijie Cloud, the school network can be checked and fixed easily. This saves time and effort.

Feedback: Positive and Highly Satisfactory Experience

Head Teacher Sarah Sankey expressed her satisfaction, saying, “Since the work has been completed, all I can say is it’s been excellent. I don’t have any complaints from teachers about the internet dropping out. So all of our lessons now are successful with having everything working, and that has made it much easier for everyone with their planning.”

She also emphasized the broader impact of the upgrade: “Our network across the whole school is now stable, which is excellent. We can log in anywhere, not just for the children and teachers, but also for governor’s meetings and visitors. This is very, very positive.”

Product lists

  • 27 x RG-RAP72PRO
  • 7 x RG-NBS3200-24GT4XS-P
  • 2 x RG-NBS5200-24GT4XS-P

Suprema: BioStar X – AI-Powered Next-Generation Integrated Security Platform

Maximizing Security and Operational Efficiency with the Convergence of AI-Based Access Control and Intelligent Video Analytics

The global security market is expanding at an unprecedented rate. According to Allied Market Research, the integrated security services sector is projected to grow at a compound annual growth rate of 13.7% from 2022 to 2031, reaching USD 55.5 billion by the end of the period. This growth is fueled by increasingly complex security challenges and a rising demand for unified solutions over standalone systems. Today, major corporations, government facilities, and international airports are moving swiftly toward integrated security platforms.

Integrated security is no longer just about safeguarding buildings—it’s becoming a cornerstone of operational excellence. While traditional systems focused primarily on access control and video surveillance, modern integrated platforms now unify a broad range of building functions—from HR management and fire detection to license plate recognition, HVAC, and lighting control—all within a single interface. This evolution reflects a clear industry need: security solutions that also optimize operational workflows.

Introducing BioStar X: AI-Powered Next-Generation Integrated Security Platform

To meet this need, Suprema has developed BioStar X, a cutting-edge integrated security platform that merges AI-powered access control with intelligent video analytics. Building on over 20 years of industry expertise, Suprema has created a solution that goes far beyond conventional access control—offering intelligent, scalable, and highly stable security operations for enterprise environments. BioStar X is advanced in both AI-driven access control and video analytics and provides exceptional scalability and reliability, even in large-scale deployments.

Convergence of AI-Based Access Control and Intelligent Video Analytics

BioStar X integrates AI-based access control and video analytics into a single platform. Real-time access management, video monitoring, and intelligent analytics can all be performed simultaneously on one screen, enabling efficient monitoring with minimal personnel. In the event of an incident, users can instantly identify the situation and its location, ensuring a rapid response.

The platform also features highly advanced AI-driven data analysis capabilities. It proactively detects and responds to threats through abnormal behavior analysis, including AI-based intrusion detection, loitering detection, and fall detection.

Moreover, it enables precise data analysis and enhanced security monitoring in large-scale facilities through features such as people counting, tailgating detection, blacklist detection, and missing person tracking. As such, BioStar X plays a vital role not only in multi-use facilities like schools, malls, airports, and hospitals but also in smart buildings.

For example, when deployed in schools, BioStar X can help prevent security incidents by detecting threats such as intrusions or weapon possession using AI video analytics. It can also identify abnormal behaviors like school violence or loitering and enable immediate intervention. Facial recognition technology can restrict outsider access and integrate with academic schedules to manage classroom entry and attendance. Additionally, it automates classroom locking and motion detection to secure unoccupied rooms. The system can also be integrated with pre-registration visitor management systems, enhancing campus-wide security through facial recognition or QR-based identity verification.

Maximizing Operational Efficiency and Security through a Unified Platform

By integrating multiple security systems—such as access control and video surveillance—into one platform, BioStar X allows security personnel to monitor and manage all security operations in real time through a single interface, eliminating the need to juggle separate systems. This streamlines security processes, enables rapid incident response, and improves both operational efficiency and overall security performance.

Improved efficiency also allows for optimized personnel allocation, while the reduced number of standalone systems lowers maintenance requirements and operational costs—ultimately driving down long-term expenses. Furthermore, BioStar X’s flexible scalability means additional security systems don’t need to be added separately. It can grow alongside organizational needs, enabling safer and more efficient environments.

Scalable and Stable for Enterprise Environments

For large-scale facilities, such as corporate buildings and government institutions, scalability and stability are essential. BioStar X supports the registration of tens of thousands of users and can reliably operate a vast number of devices—making it a true enterprise-grade solution. Suprema is already supporting major deployments like the Sejong Government Complex in Korea and the Mohammed VI University Hospital in Morocco.

The platform also offers the flexibility to meet complex enterprise requirements. With seamless integration capabilities for third-party systems and customizable UI/UX options, BioStar X can be tailored to meet even the most demanding environments. Security teams can personalize dashboards to display specific video feeds, data sets, or applications—delivering a user experience that is both powerful and intuitive.

BioStar X as an Essential Security Solution for the Future of Security

As security threats evolve, so too must the technologies that protect us. BioStar X represents the next generation of intelligent, integrated security—engineered for organizations that require more than just protection. Whether you manage a corporate office, a smart building, or a public institution, BioStar X delivers the perfect blend of advanced security and operational efficiency. It’s not just a platform—it’s a strategic investment in the safety, intelligence, and future-readiness of your organization.

Roombanker Seeks Distributors in the Adria Region

Roombanker, a manufacturer of high-quality wireless alarm systems at affordable prices, is looking for qualified distributors in the Adria region.

Roombanker is an experienced manufacturer of IoT-based wireless smart home systems. Its product team, with years of experience at world-renowned security brands, brings extensive expertise from the global security market. Drawing on this experience, Roombanker developed an advanced wireless alarm system that integrates cutting-edge technologies such as two-way communication, 128-bit AES encryption, and FHSS (Frequency Hopping Spread Spectrum) for enhanced security and reliability.

Designed specifically for residential and small business applications, Roombanker solutions ensure fast installation and simple operation for customers around the world. In addition to security systems, Roombanker also offers a complete range of home automation, energy management, and environmental monitoring solutions to meet the demands of a rapidly evolving market.

Requirements for Recruiting Distributors

Roombanker is seeking distributors who meet the following criteria:

  1. Strong Customer and User Relations: Ability to build and maintain excellent relationships with customers and users, providing exceptional service and support.
  2. Regional Influence: A strong presence and influence within the local market, with a well-established network and reputation.
  3. Effective Brand Marketing and Product Promotion: Proven skills in brand marketing and promoting products to a broad audience, with a focus on growing market share.
  4. Sales and Technical Support Capability: A dedicated sales and technical support team, with a solid understanding of the security market and the ability to effectively support Roombanker’s product line.

Roombanker Support for Distributors

Roombanker is committed to providing comprehensive support to our distributors to ensure their success:

  1. Rebate Incentives: We offer attractive rebate incentives to help agents expand their business and increase profitability.
  2. Store Support: Our partners receive assistance in establishing and promoting multiple sales channels, including traffic generation strategies to position agents as leading service providers in the region.
  3. Business Guidance: Distributors benefit from Roombanker’s extensive business support, including guidance on sales strategies, product offerings, and access to our broader network of resources.

How to Apply

Roombanker offers two convenient methods for interested distributors to apply:

Method 1:

Scan the QR code to fill out the registration form and provide your contact information. Roombanker will reach out to you promptly once they receive your registration.

Method 2:

Submit your application directly through the company website. Roombanker business development team will review your submission and contact you to discuss the next steps, including details on partnership terms and conditions.

For more information, visit Roombanker Website or contact its distributor relations team at mia.zhao@roombanker.com.

Method 2:
Submit your application directly through our website. Our business development team will review your submission and contact you to discuss the next steps, including details on partnership terms and conditions.

For more information, visit Roombanker Website or contact our distributor relations team at mia.zhao@roombanker.com.

Roombanker Wireless Alarm System Features

The Roombanker Wireless Alarm System offers comprehensive home security with advanced connectivity and cutting-edge features:

  • Triple Connectivity: The system control panel (also called Home Security Hub) supports 4G, WiFi, and Ethernet connections, ensuring reliable operation even in areas with variable internet availability. It also includes an 8-hour Li-ion battery backup, keeping the system operational in case of a sudden power cut.
  • Long-range Connectivity Protocols: The system is compatible with Zigbee, Bluetooth Low Energy (BLE), and our proprietary RBF (Sub GHz protocol). RBF extends up to 3500 meters in open fields, utilizing FHSS, 128-bit AES encryption, and two-way communication technology for robust security.
  • Mobile App for Easy Installation: The system includes a user-friendly mobile app (RB-Link) for easy installation, device configuration, and real-time signal strength monitoring to help users find the optimal setup location.
  • Pet-Friendly PIR Motion Detector: Equipped with multiple precision technologies such as anti-white light detection, digital temperature compensation, and an independent floating threshold for accurate motion detection.
  • Tamper-Proof Door and Window Sensors: Magnetic sensors that trigger an alert if tampered with or displaced.
  • Elegant Alarm Keypads: These keypads feature one-touch emergency alarms (medical, fire, and general emergencies), support for up to 69 users, multi-user operation, and a duress silent alarm for added security.
  • Portable Key Fobs: Simple one-touch controls for quick arming and disarming, plus two customizable buttons for other automated scenes.
  • Solar-Powered Outdoor Siren: A weather-resistant siren that operates on solar power for outdoor security needs.
  • Fast-Response Indoor Siren: A loud indoor siren with adjustable volume and multiple alarm sound options.
  • Additional Security Devices: Roombanker offers a variety of other devices, including smoke detectors, two-probe water leak detectors, and more to enhance overall security.
  • Home Energy Monitoring Devices: The system also integrates home automation features, with smart plugs, high-current wall switches, low-current smart relays, and temperature/humidity monitors to help optimize home energy management.

6 key technology trends affecting the security sector in 2025

We’ve once again reached the time of year when we look ahead to some of the technology trends that will affect the security sector over the coming 12 months. The pace of change is as fast as ever.

Written by:
Johan Paulsson, CTO, Axis Communications
Mats Thulin, Director Core Technologies, Axis Communications
Thomas Ekdahl, Engineering Manager, Axis Communications

Some of the trends are evolutions of those we’ve seen in previous years. An obvious one is the continued interest in how AI will be applied in our sector, and we’ve highlighted some of the new considerations that will need to be addressed moving forwards. Others are new, or even a resurgence of topics we may not have focused on for a while.

National and regional legislators will once again try to keep pace with technological innovation. AI, cybersecurity, privacy, the need for resilience in critical entities… All these (and more) will be the focus of proposed and new regulation. We haven’t highlighted this as a specific trend, but it’s no less a priority and something every organization will need to respond to.

We believe that within all of these trends lies significant opportunity for the sector. For our customers that means enhanced capabilities, more flexibility, greater efficiency and increased value.

Hybrid solutions: the foundation for freedom of choice

In previous years we’ve highlighted how hybrid architectures – those making best use of edge, cloud, and on-premise technologies – have become the de facto choice for security solutions.

The drivers for the choice of architecture will be unique to every organization, taking into account technological, legal, ethical and governance concerns and requirements. The environment is evolving quickly, and therefore freedom of choice is imperative.

Hybrid solutions give freedom of choice in how to store, view, and analyze video, or manage devices. A combination of edge, cloud, and on-premise technologies can deliver an optimal total system solution, or its flexibility used to choose the specific instance preferred.

Whether demanded by emerging local and regional regulations or concerns over control of data, cost, or energy efficiency, hybrid solutions will continue to offer the greatest flexibility in creating architectures to best suit specific organizational needs and allow a system to be scaled.

AI evolution alongside AI efficiency

Development within the field of AI continues to race ahead. Deep learning technologies are the bread and butter of most analytics solutions within the security sector, while newer generative AI technologies are rapidly maturing. There is still a lot of hype in certain areas but real applications of generative AI in the security sector are becoming available. Each step of evolution brings with it a new set of opportunities, but also ethical, legal, and corporate considerations.

Generative AI models are large and require much compute capacity to execute, which creates a debate in how to balance the cost of AI (both in terms of financial investment, but also in terms of energy use and environmental impact) with its value. A lot of effort is being put into reducing the size of the models while maintaining the quality of results. The increased use of AI technologies only reinforces hybrid architectures as the standard.

The various ‘flavors’ of AI – from deep learning-based object recognition to generative AI – either demand or benefit from being applied at different places in the value chain, and in specific environments. Generative AI can assist operators in interacting with security solutions in natural language but, for the foreseeable future at least, require significant processing power. Conversely, deep learning-based analytics such as enhanced object recognition can be performed within surveillance cameras themselves.

Eventually this will enable generative models to be, at least partly, run on cameras with high-quality results. At the same time the models are improving in quality with regards to ethical aspects, bias, hallucinations, and the risk of making the wrong decisions.

Over time there is a big opportunity to dramatically change the efficiency and effectiveness of security operations. Algorithms will be able to understand what is happening in a scene and react to anomalies, based on the analysis on different types of input data, including but not limited to visual information. Input data will come from radar, audio, and numerous other sensors. This will create solutions that enable increasingly proactive capabilities and generate valuable insights in security scenarios for long term planning.

Beyond safety and security becomes real

The application of increasingly advanced computer vision, audio, access control and other connected technologies continues to serve security and safety use cases. Greater accuracy of analytics through the application of AI – particularly in object recognition – means that incidents can be responded to more quickly and effectively than ever before.

What is also clear is that the data generated by sensors of all types – video, audio, environmental, and more – can benefit numerous use case beyond the traditional. While still a relatively small part of the market, we expect to see an acceleration of applications aligned to operational efficiency and business intelligence.

This trend highlights the opportunities for increased collaboration across customer organizations. Technology being sourced or specified for one use case could well be used in another area of a business’s operations. For instance, data being created by video cameras employed principally for security purposes can be analyzed over time to improve customer or employee experience, sustainability, or process efficiency.

Through the high-quality hardware platforms available, the pace of development and innovation is astounding. Hardware vendors that foster an open and collaborative ecosystem of application developers and system integrators will bring greatest value to customers most quickly.

The “rebirth” of image quality

It may be counterintuitive to suggest that a focus on image quality is a trend in the sector, where many would assume it’s always been a priority (which, of course, it has). The trend is in how the images from visual sensors are being used, and with that the increased opportunities that better image quality brings.

The paradigm shifts when we consider that images are now often being initially viewed and analyzed by computers rather than humans, and that images are being viewed continuously, rather than when an incident of interest has taken place.

Advances in analytics and AI mean that a higher resolution image will inevitably lead to a better result, whatever the use case. Object recognition will be more accurate and more detailed data (and metadata) created. The drive towards even better image quality has been reignited.

With this has come opportunities for efficiency as well as effectiveness. A single camera producing much higher image quality can cover as large an area as multiple cameras would have been needed for previously. Higher resolution images also support analytics, for instance in large crowds, busy traffic intersections, or fast-moving production lines.

The human is still very much “in the loop”, as the saying goes. Operators will be automatically alerted to scenes they need to pay attention to, increasing efficiency and effectiveness of a response. Image quality as a focus will also place keen attention on the maintenance of surveillance cameras – still often a manual task – as small obstructions can have a significant impact on analysis.

The long-term value in products comes through software support

At the higher end of the security sector, the quality of hardware has been improving year-on-year. Today, hardware devices can be of such high-quality – particularly in terms of performance and capabilities – that expectations about their lifetime are greater than ever.

But while quality hardware can last for many years – as illustrated by the length of warranties – the defining factor in a camera’s functionality, including cybersecurity, and therefore its lifetime value, comes through ongoing software support.

Vendor commitments to support software throughout the expected lifetime of the hardware are essential; software that continues to enhance and build on the capabilities of the camera and keep it as secure as possible.

This also underpins the total cost of ownership of hardware. An investment in better quality camera, with comprehensive software support throughout its lifecycle, will ultimately be a more effective and efficient solution.

Technology autonomy to the customer’s benefit

Our role, and that of our partner ecosystem, is ultimately to focus on meeting the needs of customers. Technology for technology’s sake serves nobody’s purpose – innovations must be aligned to the priorities of the end user.

This clearly means supporting customers’ goals in safety and security, operational efficiency, and business intelligence. But it also means supporting their cybersecurity posture, commitment to sustainability through energy efficient solutions, and flexibility and freedom of choice via open standards-based technologies and platforms.

Technology vendors with more autonomy over their core technologies are clearly best placed to support these customer requirements. Greater control over foundational technology, from the silicon “upwards”, will allow a vendor to design specific capabilities and functionality aligned to customer needs into its products. Such an approach to core technology ownership will also allow a vendor to stand by commitments of being “secure by design”.

Furthermore, greater control of technology – at a component or even material level – is an important prerequisite to more effectively mitigate the risks of broader disruption to global supply chains. This enhances the ability to meet the requirements of customers, when they are needed.

We’re already seeing companies that would have traditionally been seen as software vendors designing their own semiconductors to gain more control over their service delivery – particularly in the area of AI – and we foresee this trend continuing in all sectors. Core technology independence is a trend we’re proud to say we’re some way ahead of, having developed our own system-on-chip, ARTPEC, for the last 25 years.

So, there you have it, our take on some of the trends that will shape the security sector in 2025. We’re sure you’ll have views on these and maybe some other trends of your own. We’d be delighted to continue the discussion on this with you.

Aikom: Smart Connectivity and Data Collection to Optimize Marketing Strategies in Stores

In the retail sector, Wi-Fi is no longer just a tool for providing connectivity to customers; it has evolved into a powerful marketing lever. Cambium Networks, a leader in wireless solutions, has developed advanced technologies that transform Wi-Fi infrastructure into a tool for analyzing customer behavior and personalizing their shopping experiences. This evolution not only improves connectivity within stores but also offers new opportunities for retailers to engage and retain customers. Let’s see how.

Wi-Fi as a marketing lever in retail

Today, free Wi-Fi is a standard service in stores, but Cambium Networks has developed solutions that go far beyond simple connectivity. By integrating Wi-Fi technology with sophisticated data analysis tools, retailers can gather valuable insights into customer behavior, such as shopping paths, time spent in-store, and areas of greatest interest. This data, collected anonymously and in full respect of privacy, allows retailers to personalize the commercial offering and optimize space layouts, thereby enhancing the shopping experience and increasing conversion rates.

A concrete example is the use of Wi-Fi in shopping centers, where the average time spent by customers is higher. This allows for a detailed picture of customer preferences, monitoring which customer segments visit certain stores, which paths are most frequented, and which stores customers linger in the most. These data are extremely important for marketing departments, as they enable the creation of personalized and thus more effective communication campaigns, significantly improving commercial performance.

Improving customer experience

In addition to data collection, Cambium Networks’ Wi-Fi offers customers a stable and fast connection, enhancing their overall in-store experience. Good connectivity allows customers to use their mobile devices to search for product information, compare prices, or share their shopping experiences on social media in real time. This not only enriches the shopping experience but also creates new opportunities for engagement through digital platforms.

Cambium Networks Solutions

cnMaestro is a next-generation network management solution designed for Cambium Networks’ wireless and wired solutions. It offers flexible scalability and centralized control through a single pane of glass, ensuring secure and comprehensive lifecycle management of the network. With zero-touch provisioning, monitoring, and troubleshooting capabilities, cnMaestro simplifies operations and ensures continuous, optimized maintenance.

X7-35X is an indoor access point that supports Wi-Fi 7. It can transmit data at very high speeds (up to 9.2 Gbps, aggregating all available bands), but what sets it apart is the maximum number of concurrently connected users, which can reach up to 768 per device, making it suitable even for the largest, most crowded stores or large shopping centers. This device already integrates all the functionalities to quickly set up guest portals. It is also future-proof, supporting IoT protocols like BLE and ZigBee.

Aikom International and Cambium Networks

Wi-Fi has become much more than a simple connectivity service: it is a powerful marketing tool that can transform the shopping experience and significantly boost sales. Aikom International, the official distributor of Cambium Networks, is the ideal partner to implement these solutions.

Building a Strong Cybersecurity Foundation for Your Video Solutions

In today’s digital world, it’s little surprise that cybersecurity is top of mind in many boardrooms. Indeed, 96% of CEOs say that it’s essential to their organisation’s growth and stability, according to Accenture.

And they are right to be concerned, because cybercrime is projected to cost the world a staggering $9.5 trillion USD in 2024 according to research firm, Cybersecurity Ventures. Such losses can be business-ending, without even considering the cost of reputational damage and unscheduled downtime.

By Jos Beernink, Vice President EMEA at Milestone Systems

The cyber-risks of video

Being aware of the risks of an insecure video surveillance system – and how to mitigate these – is therefore a critical skill for all security leaders. Cameras, connected sensors, and video management software (VMS) can present attractive targets for malicious actors, thanks to the data collected by them. This data can be used for blackmail or to gather confidential information. Hackers can sell footage of your building layout and staffing levels at different times of the day to criminals, for example.

IP cameras can also be used as gateway devices for larger attacks, including global distributed denial of service (DDoS) attacks that use connected cameras and other devices to send a flood of traffic to targeted websites and other infrastructure.

When it comes to protecting businesses, no two systems will be the same. The protections for a school will be very different to that of a data centre or solar farm. The first step in protecting your organisation and its surveillance systems, therefore, is understanding what needs to be protected, how, and from whom. Plus the potential damage that can occur when (not if) an attack happens.

The NIS2 Directive

Protecting your camera and video systems is about to become even more important due to the incoming NIS2 Directive, a Europe-wide legislation that aims to boost the overall level of cybersecurity in network and information systems. Any surveillance installation that falls within targeted “essential” industries will be impacted by this (these include the energy sector, transport, banking, public administration, and digital infrastructures).

Under NIS2, users are required not only to assess their own systems, but also conduct a comprehensive risk assessment to ensure their entire supply chain is compliant. In today’s interconnected systems, achieving compliance across the supply chain can be challenging.

By way of an example, the Log4j vulnerability recently affected millions of computers across the world, and highlights the direct impact on systems utilising this open-source logging library as a small part of their software suite. It’s notable that a few software manufacturers, including Milestone Systems, which prioritize secure design and avoid any use of open source, remained unaffected.

The NIS2 Directive recognises that physical security threats pose a significant risk to organisations with digital operations. Installing cameras and other systems to control access to digital assets like server rooms and data centres is vital. Such organisations will need to take active, ongoing, steps to ensure their video network’s security is as robust as possible.

The importance of physical security

One unique aspect of video networks is how many devices are located in public, potentially vulnerable, areas. Most organisations need to install cameras to monitor busy areas, entrances and exits to restricted areas, or remote parts of a site. This can have the effect of putting cameras at higher risk; making it easier for attackers to gain access and disconnect devices. This means that multi-layered security to keep devices safe and separate from the wider IT network is essential. It also means that without adequate protection, a video surveillance system can be less secure than a classical IT system. That’s worth bearing in mind when addressing your video and IT network cybersecurity as a whole.

Everyone’s responsibility

The NIS2 Directive emphasises that IT and security work together to build a robust cybersecurity strategy. Your IT team will need to be closely involved when implementing your video cybersecurity strategy. They will work with you on some of the foundational elements of protecting your VMS and connected devices, because of their experience in areas like virtual private network (VPNs) and virtual local area networks (VLANs).

Knowing who takes care of what, can help you to assign accountability for things like upgrades, auditing, and penetration testing. Sometimes an external party, like a manufacturer or installer, is responsible for some aspects of your cybersecurity. Therefore, when starting your cybersecurity strategy, you’ll need to check:

  1. Assess the nature of the business – and its goals.
  2. Determine the local rules and regulations.
  3. Confirm who is responsible for maintaining your system.
  4. Ask who monitors your system. Unusual traffic or alerts of technical errors can be an indication of a cyber-attack.
  5. Be clear about who has access to your video and computer network. Is the level of access appropriate to their needs? Does an operator have too high a level of access, or does someone who has left your organisation still have login credentials?

Speaking of access, you’ll also need to consider physical elements like who has access to a VMS server room. Alarms and access control measures can help to prevent unauthorised individuals from getting into sensitive areas where your video data is located.

Consider the human element

It’s worth considering your overall training program, as the human factor can be a significant weakness in your cybersecurity — accounting for between 88 to 95% of data breaches, according to a joint study by Stanford University Professor Jeff Hancock and security firm Tessian. Even something as simple as re-using a personal password to log into a VMS account, or falling for social engineering attacks (like an ‘urgent’ email from a manager requesting account details) can undermine every technical cybersecurity feature you implement.

Hence why regular training for your security team is important, as it can keep them updated on the latest threats and new ways to protect themselves and your system from harm. User control can also assist here, with admin and data access rights only given to those who require it. Assigning different VMS user credentials will (hopefully) prevent password sharing and allows you to remove a user’s access when they leave your company.

Foundational cybersecurity measures

Alongside this, there are some basic foundations that you can ensure you’re following to make your video system less attractive to attackers. These include updating your cameras’ firmware and VMS device drivers to the newest versions. Updates are typically made on an ongoing basis, so make sure your camera manufacturer issues regular security updates that include vulnerability patching and additional protections against new threats. Much like how keeping your smartphone or laptop updated reduces the risk of a hack, staying up to date with your VMS and camera updates will make them less attractive to hackers.

Disabling your cameras’ built-in admin account, or changing the default password is one of the first things to do when installing a new device. Then you can ensure your cameras are only supporting HTTPS (the secure version of HTTP).

To ensure the best protection, your chosen password should be a combination of lowercase and uppercase letters as well as special characters and numbers. They should contain no easily guessable words or phrases – using the word ‘password’ is an absolute no! Passwords also shouldn’t contain any information that identifies a user, or that a hacker could gain off of their public profiles and social media. As importantly, VMS accounts shouldn’t be shared by multiple users.

Keep your networks separate

Generally speaking, it’s a good idea to keep your video network separate from your wider IT network. You can do this through VPNs (which is essential if you have people accessing your systems remotely, outside of your local network), and through VLANs that keep your video system partitioned and isolated from your other computer systems. If your cameras or VMS are compromised, for example by someone accessing a device located on the street or from an operator unwittingly using a USB with malware on it, a hacker cannot use your video system to access more of your organisation’s data. It serves to limit the damage.

The importance of multi-layered security

A widescale breach in 2021 offers a hard lesson in what can potentially go wrong when you fail to secure your camera systems effectively. A cyber-attack on a system provider in the USA exposed video recordings from 150,000 cameras, but also the sensitive financial information of high-profile customers. Hackers gained access to the provider’s systems using a username and password that was exposed in the public domain. This illustrates the importance of good password habits (regular password changes, using hard-to-guess passwords, and training people not to share their passwords with others).

Over 100 employees had ‘super admin’ privileges in the provider’s system, which gave access to footage from thousands of customer cameras, unknown to them. Setting the right access level for each user, ensures that the risk and potential spread of a hack is limited. Put another way, the more admins you have, the more targets there are for hackers to exploit.

Finally, alongside camera footage, hackers could also access sensitive financial and customer information through the breach. Separating your video network from your IT network limits how far a hacker can go if they do access your system. It prevents them from accessing your business’ financial and product data, operations, and other sensitive systems.

Cybersecurity is continuous

With all that said, every system will have vulnerability and the cybersecurity space is constantly evolving. Being aware, in control, and responsible when using video will go a long way in protecting your organisation.

To help you on your journey towards a cybersecure video network, Milestone Systems is hosting a series of cybersecurity webinars. Whether you are starting out on cybersecurity or are looking at building on existing cyber measures, these webinars and events will help you build resilience in your video system. More details of these webinars, including the first webinar on the foundational elements of a video cybersecurity strategy, can be found here: t.ly/nuvno.

Learn what Milestone can do for your organization. Our video management software (VMS) can be customized to meet your every need. From keeping people and property safe to operating businesses more efficiently. We invite you to experience the power and functionality of Milestone’s VMS software through the exclusive Demo Trail, providing a hands-on experience with our state-of-the-art video management solutions.

About Milestone Systems

Milestone Systems is a leading provider of data-driven video technology software in and beyond security that helps the world see how to ensure safety, protect assets, and increase business efficiency. Milestone enables an open platform community that drives collaboration and innovation in the development and use of network video technology, with reliable and scalable solutions that are proven in more than 500,000 customer sites worldwide. Founded in 1998, Milestone is a stand-alone company in the Canon Group. For more information visit: www.milestonesys.com. For news and other press releases, visit our Newsroom.

 

How Much Does a Security System Actually Cost?

When buying a security system, decisions often come down to the price tag of cameras, storage, and installation, yet taking this approach can leave the end user with major challenges ahead. Surveillance systems last anywhere from five to 20+ years, so condensing all cost considerations down to the initial expense fails to consider the bigger picture.

By: Ricardo Marranita, Product Growth Manager, Axis Communications; E-mail: ricardo.marranita@axis.com

The initial costs to purchase and set up a security system tend to account for just 30% of the total costs experienced during the lifetime of the system – also known as the total cost of ownership. Despite this, many end users may even make their decision based on the price of cameras alone. In effect, they are making their choice with just a 10-15% view of the total security system costs. The reality is that roughly 70% of expenses come after the system has been installed. Sadly, these can come as a nasty surprise for those end users who have not considered the indirect security system costs.

Taking some time to think about how the system will be used and the costs associated with that use can create significant savings in the long run. Initial choices – such as the type of device to deploy –impact future expenses, from power consumption to monitoring and maintenance. While we’ll focus on cameras specifically here, this principle applies to any device within a surveillance system. Considering the total cost of ownership will help you to identify the questions to ask as you make your decision on which new security system to purchase.

Look Beyond the Cameras’ Price Tag

Filtering is an important step in the purchase process: setting out your surveillance requirements and the available budget is key to narrowing down your choices. Unfortunately, too many initial conversations around requirements focus on the cameras alone, without considering the broader requirements of the system as a whole – from energy use to storage needs.

It might be tempting to focus the budget conversation on cameras, rather than where money will need to be spent to operate and maintain those cameras. Yet the security system will need to support your needs for the foreseeable future. It’s worth remembering that the costs to operate, monitor and maintain certain cameras often exceed the devices themselves and must therefore be weighed up before the purchase is made.

Forecasting Storage Costs

If you’re in the market for a new surveillance system, it’s very likely that you’ll need to consider how to store footage once recorded. On average, legislation requires potential evidence to be stored for a month. Yet in some regions or use cases, this is extended to 180 days – making storage a considerable factor in overall security system costs.

To avoid being caught out with significant server and electricity expenses after cameras are installed, it’s critical to consider the different storage costs associated with each camera model you’re considering. It can be a false economy to purchase cheaper cameras to cut down the initial outlay if they come with vast storage requirements, forcing you to spend more on servers and energy costs in the long run.

Equally, if you plan to reduce storage costs by shrinking the size of the video stored, you will need to carefully choose the right devices to ensure that compressing the video doesn’t compromise evidence quality by pixelating or blurring images to the point that it’s no longer possible to identify a suspect. Ending up with poor-quality footage that cannot act as useful evidence can defeat your objective of installing the security system in the first place. Some cameras come with sophisticated technology that can reserve all the important forensic detail you need while lowering bandwidth and storage requirements, and therefore long-term costs. It’s worth checking any claims of high-quality footage with low storage requirements before you install the system to ensure it meets your expectations.

Each set of requirements is unique. For example, you may require high-quality images even in the dark. While some cameras might compensate for low light levels by increasing the gain and therefore, storage requirements and costs, other options use alternative light-optimizing technologies that do not have the same large-scale impact on storage costs. They might even help you to save your budget by removing the need for additional external lighting.

Anticipating All Indirect Costs

The type of device you choose will influence costs far beyond storage. To forecast the full security system cost, monitoring, maintenance, and electricity use must also be considered.

Once you crunch the numbers, the costs can start to build up quite quickly but crucially, the devices you choose will have a knock-on impact on the extent of these figures. Opting for more economical cameras and devices at the start can result in staggering indirect costs. By contrast, choosing higher-quality cameras and devices at the outset can enable you to cut those indirect security system costs in the long term, introducing savings that you can use to reinvest in and grow your business faster.

As one example, owners of surveillance systems installed in tough environmental conditions, such as a maritime port or chemical plant, may face significant maintenance bills to clean salt water and dust off cameras. By upgrading to more sophisticated cameras that offer remote cleaning functions, or have been designed with self-cleaning materials and components, such as a hydrophilic dome, they can reduce the maintenance – and therefore costs – required.

Turning a Purchase Into an Investment

By considering how your initial decision on which type of camera to buy can impact the chain of future costs, you can shift the purchasing decision into an investment. Achieving this can be as simple as asking yourself just a few questions.

The first concerns the features you want to get with the camera, as well as the need for storage space that getting such a camera entails. Another question concerns the projected costs of powering such a system in the long run. It is important to get a picture of the role of supporting technologies in the camera in the formation of total costs. Finally, it is worth looking at their share in general costs.

The question ‘How much does a security system cost?’ goes far beyond the initial purchase. Making the right choice for you based on the bigger picture can mean a slightly higher initial outlay, but it pays itself back in the long run.

In short, taking the time to ask the right questions at the outset – and finding partners who are open to answering those questions and helping you calculate the long-term costs – allows you to avoid any nasty surprises in future electricity, storage, operational, or maintenance costs. Importantly, it will also ensure that you end up with the security system that is right for your specific requirements.

Five Steps to Optimize Your Investment

Deciding which security system to purchase demands careful consideration. After all, security systems can last for five years or more, so weighing up all relevant factors at the start can lead to significant cost savings and an improved return on your investment (ROI) in the long run. While it may feel daunting, there are five straightforward steps you can follow to ensure you are making the most of your investment. Following these steps enables you to decide on the right security system for your organization, while also optimizing your investment.

Choose the Camera According to the Value It Adds

It may seem obvious but as an initial step, ask yourself “Why are you buying cameras?” Device price and features are important considerations, but it’s vital to understand what your organization needs the cameras to do before you start to weigh up the value of the different functions on offer in each.

Clarity here is vital to figuring out if the cameras on your shortlist will perform in the way you need or provide the evidence you require. For example, are you installing a security system to protect profits in a retail environment by tackling theft and fraud? Are you aiming to optimize production and avoid downtime in a factory? Or are you looking to ensure the safety and security of your employees and passengers in a public transport setting?

There are many different ways in which security systems can be deployed to help your organization – from improving security to creating business value. Narrowing down why exactly you are purchasing the system is a key first step to ensuring you are set up to optimize your investment.

Calculate How the Device Influences the Rest of the System

Next, you will need to figure out how your camera choice affects the rest of the system. Storage is an obvious factor in this calculation. More inexpensive cameras may seem appealing but if their compression technology is limited to reducing bitrate to lower bandwidth and storage requirements, that saving comes at the cost of quality footage – jeopardizing the very reason you’re installing the system in the first place. On the other hand, more sophisticated cameras may have a higher initial cost but come equipped with intelligent algorithms that preserve relevant forensic information in full resolution and at a full frame rate while requiring a lot less storage space. As a result, you can recoup the initial price through lower storage costs in the years to come.

Yet storage requirements and costs are only one piece of the calculation to consider at this point. What about ease of installation? Or how fast it will be to configure the devices and add everything to your system?

It’s also worth thinking about what accessories you will require to ensure the security system meets your objectives if you choose certain camera models. For example, if the cameras you have chosen require extra accessories to mount, this will have a knock-on impact on installation – making it slower and more costly than initially predicted. If you realize this on the day of installation, there is a significant risk of delays to the whole project. To optimize a security system investment, the full picture of all costs – not just the devices themselves – is important.

Estimate the Cost of Using and Running the System

It’s also important to ask, ‘What happens once the system is up and running?’ This step is often overlooked: some may accept the system’s operational costs as the natural cost of doing business, while others may not put too much thought into it if it ends up under another department’s budget. Yet spending some time to think about the costs required to keep the system up and running is important for all decision-makers involved in purchasing a security system: it’s where the bigger losses creep in. While it might not affect you or your department directly, it impacts your organization. And if your company loses money through the system’s high running costs, it could eventually impact your budget too.

This means that it is worth thinking about the electricity usage, required maintenance and the costs of monitoring the system. But how can the different cameras in your shortlist affect these costs? You can assess this by writing down a few key questions.

First, you need to consider how much power your cameras use and how this might affect your electricity bill? On a related note, how much storage do you need for specific cameras and how does that affect your electricity costs in the long run? Finally, you need to know if the cameras offer any smart functionality to reduce the overall cost. For example, do they offer superior analytics performance such as deep learning and edge analytics, reducing false alarms and speeding up forensic search to reduce operational costs? The devices you choose will ultimately impact all the costs to come throughout the security system’s lifecycle.

Predict the Impact the System Will Have on the Business

Once you have mapped out the bigger picture cost implications for the cameras on your shortlist, consider the end result: how will the system help your business? Will it drive greater efficiency, reduce theft, improve the service you provide to customers, and improve employee retention by creating a safer workplace?

Ultimately, the correct security system for your organization can create business value, which translates to improving the bottom line. It’s important to quantify how the security system will impact your business so you can weigh those benefits up against the total costs when making your decision.

Thinking this through often involves collaboration across departments, ensuring the bigger picture of the system’s impact on the business as a whole is considered. As an added benefit, cross-departmental cooperation also opens up the possibility of tapping into bigger budgets and getting additional buy-in on the surveillance system as well as the advantages it can bring to the business.

Make the Best Decision for Your Organization

This final step is about evaluating the information you have uncovered in the previous stages and factoring all of those insights into your final decision. As long as you are taking some new insight from this process, whether considering the value added of the device you are choosing or calculating its associated running costs, you are taking a step in the right direction – moving from purchasing a security system to making an investment that can reap better rewards for your organization.

Completing this exercise of working through the various scenarios attached to purchasing different security devices will set you up to optimize the system you buy to your company’s benefit. Rather than making a choice based on upfront cost, you are making a decision with the long-term view in mind and reducing the risk of unpleasant surprise costs cropping up in the years to come.

Working with the right partner to select the right system

Importantly, you don’t need to do this alone. The process of asking these questions helps you identify which partners are invested in your organization’s long-term success. It’s critical to find the right partner who will work through these scenarios with you to find the system that works in your best interest – both in terms of a total cost of ownership that works for you and a system that meets your requirements to drive long-term value.

Suprema: Ultra-Wideband Positioning

Whereas conventional RF technology measures distance by signal strength using the RSSI method, UWB measures distance by TOF. In the TOF method, signals are sent similarly to how radar works. Signal strength often decreases due to environmental influence, making it difficult to use this measurement as an absolute standard. However, signal speed is always constant.

By: Artem Arifov, Business Development Manager, Suprema Europe and North Africa; E-mail: aarifov@supremainc.com, sales_eu@supremainc.com

As of 2023, smartphones from both Apple and Samsung now come equipped with ultra-wideband (UWB) technology. Apple devices use UWB for AirDrop proximity sharing with iPhones and for location tracking via digital tags to keep tabs on users’ important items like wallets and bags. The SmartThings Find feature on Samsung’s Galaxy phone models uses UWB to find lost digital devices.

At first glance, it may seem that finding devices and objects is a very simple function. However, from a technical standpoint, it is actually very difficult to achieve high enough accuracy to instantly find devices and objects in a complex indoor space such as a home or office. UWB is an RF technology that makes this accuracy possible.

TOF–Based Distance Measurement

 It is known that UWB can measure an object’s exact position within an error of only about 5 to 10 cm. To achieve such high accuracy, UWB makes use of wideband communication and Time-of-Flight (TOF)–based distance measurement technology.

While 2.4 GHz-based short-distance wireless communications such as Wi-Fi or Bluetooth Low Energy Protocol (BLE) generally have a communication band of several MHz, UWB has a communication band of several GHz. This much higher bandwidth allows for far fewer communication failure retries and a faster response speed.

Whereas conventional RF technology measures distance by signal strength using the RSSI (Received Signal Strength Indicator) method, UWB measures distance by TOF. In the TOF method, signals are sent similarly to how radar works, with distance measured as a time difference when the signal returns. Signal strength often decreases due to environmental influence, making it difficult to use this measurement as an absolute standard. However, signal speed is always constant, making TOF-based ranging more accurate than RSSI-based ranging, and a much better measurement for use as an absolute standard. Furthermore, if a signal’s angle is added, even more precise position measurement is possible.

Will UWB Change Access Security?

GPS-based positioning is subject to a general error of about 50 meters. In an outdoor environment, a 50-meter error may not be significant. However, in the case of indoor positioning, it is important to have a much higher degree of precision.

Increased accuracy indoor positioning technology has been continuously studied for decades through various methods such as Wi-Fi, Bluetooth, and geomagnetism. With UWB, it has finally reached a level of performance that can satisfy the market and users. UWB makes it possible to identify the user’s exact location information within a building, and this information can be used as data to work with various services.

Now let’s shift the perspective and consider how accurate location information will change access security:

Accurate distance measurement, when used together with face recognition or mobile access credentials, will enable walk-through entry and exit without any need for special authentication procedures — finally making possible a highly futuristic technology that everyone in the access security industry has been imagining for decades.

Accurate location measurement will lead to the emergence of an access security system that no longer requires the installation of authentication readers on every door. It will be possible to check and verify the credentials of every person trying to access each door without using individual door access readers at all.

UWB will enable accurate distance and location measurement. These two features will enable safe and convenient access for both companies and users, without any need to install separate access readers or go through a separate authentication process for each door one is trying to access.

UWB Advances With Smartphones

One important prerequisite must be met before UWB can enable this change: it is necessary for UWB to be supported in all smartphones on the market.

That being said, UWB is already supported in Apple iPhones and Samsung’s Galaxy series, and mid-range smartphone brands such as Xiaomi have also announced plans to enhance their new products with UWB technology. Considering the rapid adoption rate in existing smartphones, there is a high probability that almost all smartphones will support UWB within just two to three years, making our prediction for the future of access security that much closer to becoming a reality.

AEM testers just got even better

Are you fed up with using testers that don’t meet your expectations, or had to carry multiple testers to find a fault? Finally available through EGAL, d.o.o., Ljubljana in Central and South-Eastern Europe, AEM is a company that not only values customer feedback but also strives to offer the best products available.

AEM’s award-winning CV-100 platform and its Network Service Assistant (NSA) has been improved with the New Enhanced Range of testers, which has now become the company’s standard range. AEM has made several enhancements based on customer feedback – the most notable being a capacitive touchscreen that is easier to use and navigate, with much-improved screen resolution.

Feature packed

It’s not just the screens that have improved. All CV-100 platforms, including the K50E, link adaptors even more rugged and durable, which means more time on-site and less downtime. For installers that need to carry out optical fiber testing, the K51E and K61E kits now come with more standard equipment including an inspection probe. This allows you to inspect fiber ends for dust or damage, ensuring your fiber connectors are always clean and ready for testing. The testers come with SC connectors and launch leads included, making both the K51E and K61E, LC, and SC ready right out of the box!

Perfect solution

Companies that specialize in smart/intelligent buildings should look at AEM’s K60E and K61E testers, which are the perfect solution for those requiring even more advanced features. Both testers get all the additional kit mentioned above but also come with a Category 6A patch cord adaptor, allowing you to carry out modular plug terminated link (MPTL) tests – essential for any installer installing Wi-Fi access points or IP CCTV cameras. This ensures that all Internet of Things now come with a new set of permanent link adaptors. These adaptors feature a ruggedized cable that is built to last and they have also been upgraded to meet Cat 8.1 standards. The shroud to plug has also been improved, making these permanent (IoT) devices can be installed to the correct standard, ensuring your work is always up to par.

Don’t just take our word for it – AEM testers have been tried and tested by real customers who have given glowing testimonials about their effectiveness and value for money.

Smart thinking

AEM CV-100 testers have always had advanced smart/intelligent building capabilities and are designed for more than just straight cable certification. They offer features like power over Ethernet (PoE) under load to determine if IoT devices have enough power, network tests that produce MAC and IP addresses, and traceroute to identify faults outside the local network. Plus, now they’re even better!

AEM understands that investing in equipment can be a significant expense, which is why it offers a 3-year care plan, including calibration and accidental damage. All adaptors can be swapped out once a year when worn, ensuring that your equipment is always ready when needed. AEM even protects your tester if it’s accidentally damaged – if it cannot be repaired, AEM will replace it.

Get in touch

For more information about AEM in the Central and South-Eastern European countries, call our EGAL sales team on + 386 (0)31 737 831 or send an email sales@egal-eu.com.

https://egal-eu.com/en/aem/

More Sustainable and Efficient Energy Storage Systems

With the company’s strategic adjustment and business upgrade, Uniview has gradually transformed into a global AIoT product and solution provider, exploring new growth opportunities. Energy storage is one of the most important directions.

By: Tsing Tang, CEO, East Europe, Zhejiang Uniview Technologies; E-mail: tangsiqing@uniview.com

Battery energy storage systems are a crucial component of the new energy industry and have the potential to revolutionize our daily lives. They can provide power to homes during outages and enable off-grid energy solutions. Uniview constantly integrates power electronics and digital technologies to meet the ever-changing market demands. Uniview hopes to bring cleaner and more sustainable energy to consumers around the world.

The First System for Residential Environments

Among the latest exciting developments is the release of the Uniview ESS SAH5B10 A EU, the company’s first whole home energy storage system designed for residential consumers. This all-new solution serves as an excellent option for those seeking a more sustainable and efficient way to power their homes.

Uniview RESS is an energy storage system that keeps your home powered during an outage and provides energy independence from the grid. It’s just like an energy bank account where you can make deposits and withdrawals as you see fit. By storing sufficient power within the batteries, Uniview RESS can reduce or eliminate your reliance on the utility electrical grid, make electricity more affordable, and get well-prepared for unexpected blackouts, emergencies, and other disasters. Recharging UNV RESS with lower prices of off-peak grid power can also effectively reduce monthly electricity bills.

Features

To meet the market demand, Uniview RESS bears the following highlights:

  • Easy installation: With just 3 step cable connection, you can set up a residential ESS
  • Good components, good quality
  • Smart control and monitor: With the APP, you can control and monitor ESS just by fingertips
  • 7% increase in usable capacity: Uniview B10 provides 97% of the rated battery capacity to be usable, while others only 90%
  • As long as 15 years lifespan: 6000+ cycles over 70% SOH, 3500+ cycles over 80% SOH
  • On-grid & off-grid hybrid ESS system: Minimize the modification of home circuitry

Multiple Uses

Uniview provides accountable, high-quality, easy-to-use, and safe products, ranging from portable power stations (Portable RESS) and portable solar panels to residential energy storage systems (RESS) for homes and businesses worldwide. With the integrated and applied technologies of both lithium-ion battery energy storage and AIoT technologies, Uniview is dedicated to developing the state of art ESS products to meet the various demands of different scenarios, products to meet the various demands of different scenarios, from portable power stations to residential ESS.

More information please visit www.uniview.com. If you have any business queries, please contact

chenkexin@uniview.com