Intelligent & Autonomous Security Robots

Despite perimeter fences and other site barriers, intrusion into protected areas is not uncommon. When trespassing is detected in a protected area, the main task of security is to intercept the trespasser and to prevent them from committing any malicious acts. 
 
An effective solution to this challenge is the use of non-lethal weapons, for example, employing long-range, high-power acoustic devices. Some security robots are equipped with a long-range acoustic device for automatically preventing illegal activities without the need for the presence of a security officer in the area of intrusion. 
 
Now, a robotics company bids to make life easier on robot-using security teams, by giving them a brand new ability-enhancing technology
 
A new artificial intelligence technology that gives security guard robots the ability to communicate and deploy jointly at the same patrol site was unveiled by SMP Robotics, a manufacturer of autonomous mobile robots.The new technology provides an organisation additional situational awareness and streamlined guarding on the robot-guarded site. 
 
Swarm technology increases the security guard robot’s abilities to successfully patrol any given area, and enables a security operations center to coordinate the paths of multiple robots when they travel. 
 
“We listened to our customers and made updates and improvements to the technology to add this feature, and we are excited it is coming to fruition,” said Leo Ryzhenko, CEO, SMP Robotics. 
“This new technology harnesses the power of our robotic security solution with new artificial intelligence, making the robot an even greater asset to a security team.” 
 
The companies are working together closely to expand a comprehensive test track of the swarm technology to deploy in the coming months, according to roboticstomorrow.com. 
 
According to the company website, these robots can be deployed at various sites that need around-the-clock security, and swarming technology would benefit their guarding abilities.
 
These sites include:
 
1. Electrical power plants and solar farms
2. Oil and gas facilities, refineries, and chemical plants
3. Physical security of critical infrastructure
4. Mining site security systems
5. Construction and building site security
6. Warehouses and parking lots
7. Empty-property security
Also, this technology has several key features, including:
1. Swarm Intelligence for the reliable group patrolling of large areas
2. Obstacle Avoidance and anti-collision system
3. Self-Diagnostic Systems
4. Panic button and two-way audio intercom
5. Remote robot monitoring systems 24/7
6. Fully autonomous patrolling
7. Deep Learning for human recognition in the cameras’ observation range
8. Intelligent Security: recognition of staff members by uniforms
9. Cloud Data integration
 
I-HLS:
 
You Might Also Read: 
 
Toyota Is Making Humanoid Workers:
 
Autonomous Robots Will Deliver Your Lunch:
 
UK Thinks Robots And AI Will Lift Economic Growth:
 
 
 
 
 
 
« Iranian Hackers Have Infiltrated US Infrastructure
Chinese Hacker Groups Shift Focus To India »

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Resecurity

Resecurity

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

European Defence Agency (EDA)

European Defence Agency (EDA)

EDAs mission is to improve European defence capabilities. Programme areas include Cyber Defence.

Radiant Logic

Radiant Logic

Radiant Logic is a market-leading provider of federated identity solutions based on virtualization, and delivers simple, logical, and standards-based access to all identities within an organization.

NuData Security

NuData Security

NuData Security, A Mastercard Company, is an award winning behavioral biometrics company.

National Cybersecurity Hub - South Africa

National Cybersecurity Hub - South Africa

The mission of the National Cybersecurity Hub is to be the central point of collaboration for cybersecurity incidents in South Africa.

Pentera Security

Pentera Security

Pentera (formerly Pcysys) is focused on the inside threat. Our automated penetration-testing platform mimics the hacker's attack - automating the discovery of vulnerabilities.

At-Bay

At-Bay

At-Bay is the world’s first InsurSec provider designed from the ground up to help businesses tackle cyber risk head on.

Panorays

Panorays

Panorays automates third-party security lifecycle management. It is a SaaS-based platform, with no installation needed.

CyCraft Technology Corp

CyCraft Technology Corp

CyCraft is an AI company that forges the future of cybersecurity resilience through autonomous systems and human-AI collaboration.

Nordic Cyber Summit

Nordic Cyber Summit

Nordic Cyber Security Summit addresses a wide range of technological issues from the IT Security spectrum and also provides a wider perspective from all aspects of the industry.

Genius Guard

Genius Guard

Genius Guard specializes in DDoS Protection, DDoS Protected Webhosting, HYIP Hosting, Bitcoin Hosting, Cryptocurrency Hosting.

Elemental Cyber Security

Elemental Cyber Security

Elemental is a game changing cyber security compliance automation and enforcement technology provider.

Cybolt

Cybolt

Cybolt helps companies, organizations, and governments manage digital risks and live in an environment of confidence and certainty.

NVISIONx

NVISIONx

NVISIONx data risk governance platform enables companies to gain control of their enterprise data to reduce data risks, compliance scopes and storage costs.

ShieldIO

ShieldIO

ShieldIO Real-Time Homomorphic Encryption™ enables your organization to reach regulatory compliance without compromising data availability.

Twilio

Twilio

Twilio are the customer layer for the internet, powering the most engaging interactions companies build for their customers. We provide simple tools that solve hard problems.

RedSense

RedSense

RedSense provides industry-leading threat intelligence services, adversary space interaction & monitoring, net flow monitoring and interpretation for our clients.