Intelligent & Autonomous Security Robots

Despite perimeter fences and other site barriers, intrusion into protected areas is not uncommon. When trespassing is detected in a protected area, the main task of security is to intercept the trespasser and to prevent them from committing any malicious acts. 
 
An effective solution to this challenge is the use of non-lethal weapons, for example, employing long-range, high-power acoustic devices. Some security robots are equipped with a long-range acoustic device for automatically preventing illegal activities without the need for the presence of a security officer in the area of intrusion. 
 
Now, a robotics company bids to make life easier on robot-using security teams, by giving them a brand new ability-enhancing technology
 
A new artificial intelligence technology that gives security guard robots the ability to communicate and deploy jointly at the same patrol site was unveiled by SMP Robotics, a manufacturer of autonomous mobile robots.The new technology provides an organisation additional situational awareness and streamlined guarding on the robot-guarded site. 
 
Swarm technology increases the security guard robot’s abilities to successfully patrol any given area, and enables a security operations center to coordinate the paths of multiple robots when they travel. 
 
“We listened to our customers and made updates and improvements to the technology to add this feature, and we are excited it is coming to fruition,” said Leo Ryzhenko, CEO, SMP Robotics. 
“This new technology harnesses the power of our robotic security solution with new artificial intelligence, making the robot an even greater asset to a security team.” 
 
The companies are working together closely to expand a comprehensive test track of the swarm technology to deploy in the coming months, according to roboticstomorrow.com. 
 
According to the company website, these robots can be deployed at various sites that need around-the-clock security, and swarming technology would benefit their guarding abilities.
 
These sites include:
 
1. Electrical power plants and solar farms
2. Oil and gas facilities, refineries, and chemical plants
3. Physical security of critical infrastructure
4. Mining site security systems
5. Construction and building site security
6. Warehouses and parking lots
7. Empty-property security
Also, this technology has several key features, including:
1. Swarm Intelligence for the reliable group patrolling of large areas
2. Obstacle Avoidance and anti-collision system
3. Self-Diagnostic Systems
4. Panic button and two-way audio intercom
5. Remote robot monitoring systems 24/7
6. Fully autonomous patrolling
7. Deep Learning for human recognition in the cameras’ observation range
8. Intelligent Security: recognition of staff members by uniforms
9. Cloud Data integration
 
I-HLS:
 
You Might Also Read: 
 
Toyota Is Making Humanoid Workers:
 
Autonomous Robots Will Deliver Your Lunch:
 
UK Thinks Robots And AI Will Lift Economic Growth:
 
 
 
 
 
 
« Iranian Hackers Have Infiltrated US Infrastructure
Chinese Hacker Groups Shift Focus To India »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Lynx Software Technologies

Lynx Software Technologies

Lynx provide secure software and operating systems for use in mission critical applications such as aerospace, medical, transportation and IoT.

Maryman & Associates

Maryman & Associates

Maryman & Associates are specialists in computer forensic investigations, incident response and e-discovery services.

OmniNet

OmniNet

OmniNet delivers the next generation of cybersecurity and is the only provider in the market to move the edge of small businesses to a virtual, omnipresent perimeter.

NetFort

NetFort

NetFort provides software products to monitor activity on virtual and physical networks.

netfiles

netfiles

netfiles offers highly secure data rooms for sensitive business processes and secure data exchange.

Trinity Cyber

Trinity Cyber

Trinity Cyber’s patent-pending technology stops attacks before they reach internal networks,reducing risk and increasing cost to adversaries.

TechBeacon

TechBeacon

TechBeacon.com is a digital hub by and for software engineering, IT and security professionals sharing practical and passionate guidance to real-world challenges.

Redhorse

Redhorse

Redhorse provides top-tier consulting to help clients address mission-critical government problems in National Security, Networking Technology, Energy and the Environment.

Help AG

Help AG

Help AG provides leading enterprise businesses and governments across the Middle East with strategic consultancy combined with tailored information security solutions and services.

AutoSec

AutoSec

AutoSec supports the FFI program Electronics, Software and Communication by dissemination and exploitation of the results of projects related to automotive cybersecurity.

ViewQwest

ViewQwest

ViewQwest is a regional telecommunications & information technology services company. We specialize in providing Connectivity, Managed Network, Managed SD-WAN, and Managed Security solutions.

Sendmarc

Sendmarc

Sendmarc automates the process of protecting your domain from being used in email impersonation and phishing attacks.

Siren

Siren

Siren provides the leading Investigative Intelligence Platform to some of the world’s leading Law Enforcement, National Security and Cyber threat investigators.

Cybecs Security Solutions

Cybecs Security Solutions

Cybecs was founded to address rapid technological advancement, changing business models, global privacy regulations, and increasing cyber threats for global organizations.

Rankiteo

Rankiteo

At Rankiteo, we are pioneers in cybersecurity risk management. Our mission is to empower organizations with the tools they need to assess, enhance, and safeguard their digital landscapes.

Redblock

Redblock

Redblock's mission is to eliminate the drudgery and repetitive 'eye on the glass' work done by Security Teams.