Intelligent & Autonomous Security Robots

Despite perimeter fences and other site barriers, intrusion into protected areas is not uncommon. When trespassing is detected in a protected area, the main task of security is to intercept the trespasser and to prevent them from committing any malicious acts. 
 
An effective solution to this challenge is the use of non-lethal weapons, for example, employing long-range, high-power acoustic devices. Some security robots are equipped with a long-range acoustic device for automatically preventing illegal activities without the need for the presence of a security officer in the area of intrusion. 
 
Now, a robotics company bids to make life easier on robot-using security teams, by giving them a brand new ability-enhancing technology
 
A new artificial intelligence technology that gives security guard robots the ability to communicate and deploy jointly at the same patrol site was unveiled by SMP Robotics, a manufacturer of autonomous mobile robots.The new technology provides an organisation additional situational awareness and streamlined guarding on the robot-guarded site. 
 
Swarm technology increases the security guard robot’s abilities to successfully patrol any given area, and enables a security operations center to coordinate the paths of multiple robots when they travel. 
 
“We listened to our customers and made updates and improvements to the technology to add this feature, and we are excited it is coming to fruition,” said Leo Ryzhenko, CEO, SMP Robotics. 
“This new technology harnesses the power of our robotic security solution with new artificial intelligence, making the robot an even greater asset to a security team.” 
 
The companies are working together closely to expand a comprehensive test track of the swarm technology to deploy in the coming months, according to roboticstomorrow.com. 
 
According to the company website, these robots can be deployed at various sites that need around-the-clock security, and swarming technology would benefit their guarding abilities.
 
These sites include:
 
1. Electrical power plants and solar farms
2. Oil and gas facilities, refineries, and chemical plants
3. Physical security of critical infrastructure
4. Mining site security systems
5. Construction and building site security
6. Warehouses and parking lots
7. Empty-property security
Also, this technology has several key features, including:
1. Swarm Intelligence for the reliable group patrolling of large areas
2. Obstacle Avoidance and anti-collision system
3. Self-Diagnostic Systems
4. Panic button and two-way audio intercom
5. Remote robot monitoring systems 24/7
6. Fully autonomous patrolling
7. Deep Learning for human recognition in the cameras’ observation range
8. Intelligent Security: recognition of staff members by uniforms
9. Cloud Data integration
 
I-HLS:
 
You Might Also Read: 
 
Toyota Is Making Humanoid Workers:
 
Autonomous Robots Will Deliver Your Lunch:
 
UK Thinks Robots And AI Will Lift Economic Growth:
 
 
 
 
 
 
« Iranian Hackers Have Infiltrated US Infrastructure
Chinese Hacker Groups Shift Focus To India »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

RioRey

RioRey

The DDoS mitigation specialist, from single server to Enterprise wide carrier level networks the RioRey Solution provides effective immediate and easy to manage protection.

DataVisor

DataVisor

DataVisor is a big data fraud detection and anti-money laundering solution.

BTWorks

BTWorks

BTWorks provides identity management and anti-phishing / smishing solutions for web and mobile apps.

Equilibrium Security Services

Equilibrium Security Services

Equilibrium Security Services is a specialist cyber security company providing a full spectrum of IT security solutions from consultancy to design & implementation and managed security services.

RunSafe Security

RunSafe Security

RunSafe Security is the pioneer of a patented cyberhardening transformation process designed to disrupt attackers and protect vulnerable embedded systems and devices.

Information and Communication Technology Authority (ICT Authority) - Kenya

Information and Communication Technology Authority (ICT Authority) - Kenya

The ICT Authority is responsible for enforcing ICT standards in Government and ensuring information security.

Syskode Technologies

Syskode Technologies

Sykode Technologies is a next-generation global technology company offering an integrated portfolio of advisory services, products and solutions in areas including AI, IoT and Cyber Security.

Veriff

Veriff

Veriff provides highly-automated identity-verification services that prevent fraud like nothing else on the market.

Censys

Censys

Our customers rely on Censys data to get the global visibility they need of their attack surfaces in order to proactively prevent nation-state attacks and emerging threats.

Conseal Security

Conseal Security

Mobile app security testing done well. Conseal Security are specialists in mobile app penetration testing. Our expert-led security analysis quickly finds security vulnerabilities in your apps.

Maxxsure

Maxxsure

Maxxsure provides a platform for executive management, leveraging proprietary technology that identifies, measures, and scores a company’s cyber risks.

iSTORM

iSTORM

iStorm specialise in supporting organisations who require a range of Privacy, Security and Penetration testing related services.

ViewDS Identity Solutions

ViewDS Identity Solutions

ViewDS Identity Solutions develops innovative identity software including cloud identity management solutions, directory services, access and authorization management solutions.

ESProfiler

ESProfiler

Enterprise Security Profiler. Empowering CISOs with clarity & confidence in their security programme by visualising capabilities, usage and spend against their key threat priorities.

JustunSecure

JustunSecure

JustunSecure is dedicated to promoting information technology and cybersecurity in Africa.

Aeris

Aeris

Aeris IoT Watchtower is the world’s first fully integrated cyber security solution for cellular IoT devices.