United Nations recognise peace process developments in the country

he members of the Security Council welcomed encouraging developments in South Sudan’s peace process, including the beginning of the formation of a Revitalised Transitional Government of National Unity (R-TGNU), and recognised that this represents a significant step towards sustainable peace by the parties to the Revitalized Agreement on the Resolution of the Conflict in the Republic of South Sudan.

The members of the Security Council also welcomed the spirit of compromise and political will demonstrated by the parties in order to create the conditions necessary to advance the peace process.

The members of the Security Council called on the signatories to the Agreement to finalise establishment of the R-TGNU and all transitional institutions, including the Hybrid Court for South Sudan, in accordance with the procedures outlined in the Agreement, which is necessary to build trust between parties and consolidate steps taken towards lasting peace.

The members of the Security Council commended the Intergovernmental Authority on Development (IGAD) for its leadership in advancing the peace process for South Sudan, the mobilisation of the African Union and all other international stakeholders for their important contributions. The members of the Security Council underscored the need for continued and active engagement on South Sudan by the region and the international community to ensure that peace, stability and prosperity are restored in the country.

The members of the Security Council recalled the costs of continued armed conflict in South Sudan and stressed the importance of full implementation of the Agreement. The members of the Security Council urged all parties to ensure the full and meaningful participation of women, youth, faith groups and civil society in implementation of the Agreement.

The members of the Security Council expressed concern at the dire humanitarian situation in South Sudan and reiterated the need for the parties on the ground to facilitate, in a manner consistent with relevant provisions of international law, the delivery of humanitarian assistance.

The members of the Security Council underscored the pressing need for accountability for continuing human rights abuses, including sexual and gender-based violence, and violations of international humanitarian law in South Sudan. They welcomed the Comprehensive Action Plan to End and Prevent All Grave Violations against Children signed by the Government on February 7, 2020 and called for its swift implementation.

The members of the Security Council recalled the obligations for the Government of South Sudan set forth under the Status-of-Forces Agreement with the United Nations Mission in South Sudan (UNMISS) and called upon the Government to allow UNMISS freedom of movement to implement its mandate to protect civilians, monitor and investigate human rights, support the delivery of humanitarian assistance and support implementation of the Agreement.

The members of the Security Council stressed that actions which threaten the peace, security or stability of South Sudan may be subject to sanctions under resolutions 2206 (2015), 2290 (2016), 2353 (2017), 2428 (2018) and 2471 (2019).

The members of the Security Council reiterated their support for the people of South Sudan and reaffirmed their strong commitment to the sovereignty, independence, territorial integrity and national unity of the Republic of South Sudan.

Image provided by ASSA ABLOY
Access Control
Rebecca Morpeth-Spayne

Flexible access management

Powering digital access with energy-harvesting technology frees organizations from wiring and even batteries. However, to meet the challenges of the future, digital access needs more. It needs technologies and software platforms flexible enough to grow and adapt with the evolving needs of each organization, protecting their investment in digital access while delivering an ROI every day. Using decades of expertise in designing and engineering key-based access cylinders and solutions, ASSA ABLOY developed PULSE, key-based digital access powered by innovative energy-harvesting technology and part of ASSA ABLOYs suite of digital access solutions. With ABLOY PULSE, the kinetic energy generated by inserting the intelligent key is harvested to power the lock’s encrypted digital security. This energy source – keyholder input – is completely renewable and contributes to building sustainability goals. Building users enjoy everyday convenience. They carry one PULSE key pre-programmed with all their access rights. It has an RFID tag inside and can also operate readers, whether on wireless locks or wall-mounted beside an electrified opening. Building users do not need to carry two credentials. To enhance site security and user privacy, PULSE credentials are powered by Seos®, the latest generation of technology with the highest encryption and authentication standards. ABLOY PULSE offers building managers reliable security they can trust. They can equip almost any opening with a device range which includes door cylinders, cam-locks, furniture locks and padlocks for indoor and outdoor use. There is no cabling, wiring or batteries required: PULSE locking cylinders and keys are self-powered by reliable energy-harvesting technology. “ABLOY PULSE offers customers a flexible solution to digitalize their access management and make their access ready for what’s ahead. It has been developed to integrate easily with their building solutions,” says Jarno Onnela, PULSE Product Manager at ABLOY. “PULSE cylinders are fast and cost-efficient to install, because they require no major adjustments to a door. An installer simply swaps out an existing mechanical cylinder.” ABLOY PULSE can be managed from cloud-based ASSA ABLOY Access® software. This intuitive solution enables organizations to manage access from anywhere. Both keys and cylinders are reusable and reprogrammable: managing staff turnover becomes faster and simpler for facilities teams. Security staff can issue access and block lost keys from wherever they are. The unique advantages of PULSE technology have already been recognized by awards juries in Europe, the Middle East and beyond. It was named Sustainability Champion Award winner at Intersec 2024, Dubai. In 2022, PULSE cylinders’ energy-harvesting performance earned the Construction Energy Award at the BYGGERI fair in Denmark. “ABLOY PULSE already protects many different types of site, from commercial buildings and multi-residential housing, to education and healthcare premises,” adds Jarno. “New functionalities in ASSA ABLOY Access management software, such as support for reservation systems, continue to further expand use-cases. We have also extended the availability of this innovative solution to new markets including Scandinavia, France, the UK, Poland, Singapore, Hong Kong and Benelux countries.” Extend the range of locking solutions with ASSA ABLOY Access ASSA ABLOY Access also integrates seamlessly with the ABLOY CUMULUS mobile and keyless access solution. Completely customizable, with intuitive APIs and SDKs for app development, CUMULUS becomes part of each customer’s individual workflows in a way specific to their own organization. In addition, the revolutionary CUMULUS Controller adds mobile access capability to any electric or electronic lock – from any brand. ABLOY CUMULUS instantly makes digital access mobile ready. It can go wherever the customer needs. To learn more about ABLOY PULSE, visit https://www.assaabloy.com/group/emeia/solutions/topics/access-control/abloy-pulse

Read More »
Image provided by Reconeyez
Reconeyez
Rebecca Morpeth-Spayne

Reconeyez appoints Peter Young

Reconeyez, provider of wireless outdoor intrusion detection systems with AI visual verification, is pleased to announce the appointment of Peter Young as Chief Executive Officer. Peter joins Reconeyez with a proven track record of scaling international technology businesses, leading high-performing teams, and executing strategic exits. He has previously served as CEO of SpatialBuzz, acquired by a Nasdaq-listed company, and held senior roles at Mesaplexx and Aircom, leading both to significant commercial success. Peter Young commented: “Reconeyez has developed a uniquely intelligent platform that transforms how critical assets and infrastructure are monitored and protected. I’m thrilled to join this exceptional team and lead the next phase of global growth – bringing Reconeyez to new markets, partners and customers.” Tauri Tuubel, Co-founder & CTO added: “I’m pleased to welcome Peter on board. His leadership experience in high-growth, high-tech businesses — including multiple successful exits — makes him an excellent addition to our team.” Peter will split his time between Tallinn, the UK, and the USA, collaborating closely with Reconeyez’ international teams to expand presence in core markets across Europe, North America, and beyond. Reconeyez remains at the forefront of innovation, with ongoing advancements in AI capabilities and system performance. The recent launch of the Reconeyez SIM, reflects the company’s investment in continued development and commitment to working closely with partners and security professionals to deliver enhancements.

Read More »
Image provided by Rhombus
cloud
Rebecca Morpeth-Spayne

AI Search to Power Instant Security Footage

Rhombus announced the launch of Rhombus AI Search. The solution uses natural language processing to provide security teams with an intuitive and immediate way to scan and analyze security camera footage with custom text prompts, significantly reducing incident investigation time from hours to seconds. Rhombus AI Search is the newest addition to Rhombus’ fast-growing portfolio of AI capabilities. The company recently launched several AI-driven products and integrations designed to help customers achieve smarter, faster security analysis. “Security investigations are often a race against time, but security teams must manually review hours of footage across multiple cameras to find what they need,” said Brandon Salzberg, Chief Technology Officer, Rhombus. “With Rhombus AI Search, we’ve fundamentally reimagined this process. Teams can now simply type what they’re looking for—a red van in a specific area, or a person in a blue shirt carrying a package—and get back comprehensive and curated results within seconds. Our AI technology extends search capabilities far beyond preset criteria, allowing organizations to search for virtually anything they can think of. Tell us what to find and we’ll find it, in seconds.” Technical capabilities of Rhombus AI Search include: Type-to-search: Users can describe exactly what they are looking for in natural language, eliminating the constraints of traditional fixed search filters. Multi-camera analysis: The system automatically reviews footage across multiple cameras simultaneously, providing comprehensive results. Near-instant results: Search results are curated within seconds, substantially reducing investigation time. Contextual understanding: Advanced AI comprehends complex scenarios and situational context beyond simple object recognition. Similarity search: Keying off of one image, a user can search for images that look similar. “Rhombus AI Search leverages modern breakthroughs around large language models to enable organizations to react to incidents or other anomalies with ease and simplicity,” said Andrew Gallatin, Director of R&D, Rhombus. “Backed by natural language processing, teams can find what they need without navigating complex menus or being constrained by search limitations, but at the same time feel confident that employee privacy will be respected through advanced moderation techniques.” Rhombus AI Search delivers several benefits for organizations across industries. Security teams get faster incident resolution capabilities, quickly locating critical footage without spending hours manually reviewing video. Improved compliance becomes easier as organizations can swiftly find events that provide necessary visual evidence for documentation requirements. The solution also drives significant operational efficiencies, with security personnel regaining valuable time by letting advanced AI handle the heavy lifting of video analysis. Perhaps most importantly, when seconds count during critical situations, these faster investigations can prevent incidents from escalating, leading to improved safety outcomes for everyone involved. Rhombus AI Search also integrates seamlessly with the company’s comprehensive cloud-managed physical security platform, which is built to protect organizations’ people, assets, and data while offering full interoperability and flexibility. Reinforcing Rhombus’ commitment to innovation in physical security, the new AI solution joins Rhombus’ suite of AI-powered tools, including AI index points, ChatGPT integration, Faces 2.0, and Combined Event Search.

Read More »
Copyright: Security Buyer
Guarding
Rebecca Morpeth-Spayne

Mind Games – The Psychological Perimeter

Joseph Clarke analyses how combining psychological deterrence with physical barriers, hidden detection, and forensic marking enhances perimeter security  Perimeter security is commonly perceived as a purely physical matter—fences, barriers, gates, and surveillance technology designed explicitly to prevent unauthorised entry. However, the true effectiveness of these measures extends far beyond their tangible presence, significantly shaped by their psychological influence on potential intruders. While physical resilience is undoubtedly critical, perimeter security’s greatest strength often lies in how effectively it manipulates intruders’ perceptions, expectations, and fears.  Psychology remains an overlooked yet powerful element in security strategies. Human decision-making, particularly when related to criminal activity, is strongly influenced by subconscious evaluations of risk, reward, and consequence. Traditional security planning frequently emphasises tangible defences, neglecting how these defences psychologically impact those assessing vulnerabilities. Effective security solutions must therefore leverage psychological deterrence, transforming simple physical barriers into symbols of strength, uncertainty, and inevitable consequence in the mind of the offender.  This article argues that truly effective perimeter protection relies heavily upon the psychological reactions it provokes—instilling uncertainty, amplifying perceived risk, and inducing fear of detection and consequence. By deliberately harnessing these psychological elements, security strategies transcend mere physical defence, becoming proactive tools that reduce incidents not merely through physical resilience, but through cognitive deterrence. Understanding and applying these psychological principles allows security planners to not just prevent breaches, but to actively discourage attempts, fundamentally reshaping the effectiveness of modern perimeter protection.  Physical appearance and psychological messaging  The visual impression of perimeter fencing is a crucial yet subtle factor in effective security strategies, extending significantly beyond its obvious physical purpose. Robust, imposing barriers serve as powerful psychological deterrents, silently communicating authority, strength, and the high likelihood of failure to potential intruders. This subtle psychological messaging can deter criminal attempts well before any physical contact is made, often making it an even more valuable asset than the barrier’s sheer physical resistance.  Barkers Fencing, for example, exemplifies this principle by creating perimeter solutions specifically designed not only for physical durability but also to project strength and impenetrability. Their fencing installations are intentionally formidable, engineered to present a daunting challenge at first glance. This deliberate visual messaging conveys authority, suggesting both preparedness and resilience, effectively discouraging would-be intruders by creating immediate psychological barriers. Potential offenders instinctively evaluate these structures as not only difficult but psychologically intimidating, leading them to question the practicality and likelihood of a successful intrusion attempt.  Similarly, Jacksons Fencing demonstrates how the aesthetics and maintenance standards of perimeter barriers directly influence intruder perceptions. Their consistently well-maintained fences suggest vigilance and professional oversight, sending a clear, subconscious signal of active security management. Such meticulous attention to appearance reinforces the perception that the perimeter is closely monitored and professionally secured, increasing intruders’ perceived risk of discovery and subsequent failure. The professionalism implied by Jacksons’ aesthetics significantly enhances psychological deterrence, subtly alerting potential intruders that breaching the perimeter would be neither quick nor easy.  Visual impressions powerfully influence intruder decision-making processes due to basic human psychology: threats that appear challenging, well-maintained, and actively monitored naturally raise perceived risk. The human instinct to avoid unnecessary difficulty and risk means potential offenders often abandon plans long before testing a perimeter’s physical resistance. In this sense, the psychological dimension of robust, visually impressive fencing—exemplified by Barkers and Jacksons—is arguably one of perimeter security’s most effective yet underappreciated tools…. To read the full article, see our latest issue.

Read More »
Image provided by ICT
Access Control
Rebecca Morpeth-Spayne

ICT combines legacy and executive force

Integrated Control Technology (ICT) demonstrates the power of legacy and leadership in determining success and growth in industry   Integrated Control Technology (ICT) has ushered in a new chapter with the appointment of Andy Bane as its Chief Executive Officer. With decades of leadership experience in operational technology and software, Andy is poised to leverage his expertise with the vision and enduring legacy of Hayden Burr, ICT’s founder and new Chief Innovation Officer.  With the pace of change in the industry, it’s crucial that companies show strong leadership to earn and keep the respect of their customers. And that’s why this appointment brings the best of both worlds for ICT.  Potential and opportunity  Andy Bane explains the three main motivations for him to join the New Zealand headquartered manufacturer. “First is the team, a terrific group of dedicated, resourceful problem solvers with a shared focus on helping customers succeed. There’s also terrific potential for ICT customers across the globe to grow. I’m really eager to create those ‘ah-ha’ moments where things become possible for them.”  And finally, it lies with the solution. ICT’s unified Protege platform is purpose-built for access control, intrusion detection, and smart building automation – all backed by a team with deep subject matter expertise. “All of this made it an easy decision to take up the reins.”  A pivot for innovation  It’s been more than 20 years since Hayden Burr founded ICT, and he’s been leading from the front ever since. It’s easy to see why he’s energised for this change, saying, “I’m excited to pivot to a role that will enable me to think deeply about future needs, and where things are headed. This role allows me to focus not just on product innovations but also on all the ways we can evolve to better meet the needs of our partners and customers.”  Priorities for growth  Bane elaborates on why he thinks it’s important that growth goes beyond just having a great product. “Our focus is on three key pillars – scaling operations, strengthening go-to-market strategies, and advancing our technology platform.”  “We have a very open and flexible platform, something our partners value highly. One of them told me, “I haven’t found anything ICT can’t do – and do reliably and repeatedly!” That’s a testament to the engineering behind our solutions.”  “That said, we know integrators and end-users look at more than just features. The total cost of ownership, the quality of our training, the expertise of our support team – all of this matters. ICT already excels here, but we’ll continue our push to be even better.”  “We’re also exploring deeper solutions for key verticals like healthcare, multifamily, education, and banking. Our new tagline ‘Secure Your Success,’ captures the essence of what ICT aims to achieve – ensuring our partners and customers thrive.”  Access evolving  It’s obvious to those who work across security that the industry continues to evolve rapidly. A large focus of Bane’s introduction to ICT has been speaking to customers across the globe, to better understand what this means to them.   “They’re asking for adaptable solutions that are easy to integrate across technologies. Our open platform aligns perfectly with this demand by offering flexibility and futureproofing. No one wants to be locked into a rigid, closed system,” says Bane.  “There’s also a need for hybrid cloud capabilities. While the cloud is becoming more prominent, many users still require on-premises solutions. ICT is committed to delivering both because it’s not a one-size-fits-all world.”  To read the full article, see our latest issue.

Read More »
Copyright: Security Buyer
Access Control
Rebecca Morpeth-Spayne

Is Your Office Security Failing?

Unification and the user experience is transforming corporate security—enhancing access control, surveillance, and cybersecurity for intelligent workplace protection, writes Rebecca Spayne  Corporate security is no longer just about preventing unauthorised access—it’s about creating an intelligent, seamless experience for users while maximising operational efficiency. Office security infrastructures have traditionally operated in silos, with independent systems managing access control, surveillance, parking, and visitor authentication, often leading to inefficiencies and security gaps. However, as businesses embrace integrated security ecosystems, the focus has shifted to unified security systems that leverage real-time data, AI-driven automation, and IoT connectivity.  As John Szczygiel, COO at Brivo  stated, “Corporate security and risk managers today face a rapidly evolving global threat landscape, with cybersecurity, data breaches, and ransomware attacks among their top concerns. An ever-mobile workforce, coupled with hybrid work arrangements, increases attack surfaces, making endpoint security and managing insider threats more critical than ever. Physical security remains a priority, especially with workplace violence and civil unrest on the rise. “To stay ahead, security and risk managers must adopt a proactive, intelligence-driven approach, leveraging technology and forward-thinking suppliers to mitigate emerging threats on a continuous basis. The best choices are suppliers who bring mature, cloud-native solutions to bear with an array of AI-driven intelligent agents able to rapidly identify important trends from mountains of data. These tools enable security and risk managers to facilitate the productivity of their workforce at a controlled cost while keeping everyone safe.”  One of the primary drivers of this transition is the need for seamless user experience. Employees and visitors expect a frictionless journey from car park entry to workspace access, reducing the delays and inefficiencies associated with legacy security systems. HID’s access control platforms and Verkada’s cloud-based security solutions exemplify the shift toward unified security ecosystems, integrating ANPR-enabled parking access, biometric or mobile-based door authentication, and real-time occupancy tracking for a seamless user experience. The key to achieving seamless security lies in the integration of data-driven insights with physical security measures, ensuring that users move effortlessly through various checkpoints while maintaining strict security compliance.  Companies like Integrated Control Technology (ICT) have developed multi-layered security platforms that unify video surveillance, access control, and building automation within a single, intuitive dashboard—enhancing situational awareness and streamlining security operations.   By consolidating these critical security components, businesses can gain unprecedented visibility over their facilities, enabling faster response times and more informed decision-making. The next phase of security evolution isn’t just about preventing threats—it’s about leveraging data insights to improve building operations and enhance workplace experiences. Security must now be viewed not as a standalone measure but as an integrated function of corporate infrastructure, actively contributing to efficiency, sustainability, and employee well-being…. Read the full article in our latest issue.

Read More »
Scroll to Top