Intelligent & Autonomous Security Robots

Despite perimeter fences and other site barriers, intrusion into protected areas is not uncommon. When trespassing is detected in a protected area, the main task of security is to intercept the trespasser and to prevent them from committing any malicious acts. 
 
An effective solution to this challenge is the use of non-lethal weapons, for example, employing long-range, high-power acoustic devices. Some security robots are equipped with a long-range acoustic device for automatically preventing illegal activities without the need for the presence of a security officer in the area of intrusion. 
 
Now, a robotics company bids to make life easier on robot-using security teams, by giving them a brand new ability-enhancing technology
 
A new artificial intelligence technology that gives security guard robots the ability to communicate and deploy jointly at the same patrol site was unveiled by SMP Robotics, a manufacturer of autonomous mobile robots.The new technology provides an organisation additional situational awareness and streamlined guarding on the robot-guarded site. 
 
Swarm technology increases the security guard robot’s abilities to successfully patrol any given area, and enables a security operations center to coordinate the paths of multiple robots when they travel. 
 
“We listened to our customers and made updates and improvements to the technology to add this feature, and we are excited it is coming to fruition,” said Leo Ryzhenko, CEO, SMP Robotics. 
“This new technology harnesses the power of our robotic security solution with new artificial intelligence, making the robot an even greater asset to a security team.” 
 
The companies are working together closely to expand a comprehensive test track of the swarm technology to deploy in the coming months, according to roboticstomorrow.com. 
 
According to the company website, these robots can be deployed at various sites that need around-the-clock security, and swarming technology would benefit their guarding abilities.
 
These sites include:
 
1. Electrical power plants and solar farms
2. Oil and gas facilities, refineries, and chemical plants
3. Physical security of critical infrastructure
4. Mining site security systems
5. Construction and building site security
6. Warehouses and parking lots
7. Empty-property security
Also, this technology has several key features, including:
1. Swarm Intelligence for the reliable group patrolling of large areas
2. Obstacle Avoidance and anti-collision system
3. Self-Diagnostic Systems
4. Panic button and two-way audio intercom
5. Remote robot monitoring systems 24/7
6. Fully autonomous patrolling
7. Deep Learning for human recognition in the cameras’ observation range
8. Intelligent Security: recognition of staff members by uniforms
9. Cloud Data integration
 
I-HLS:
 
You Might Also Read: 
 
Toyota Is Making Humanoid Workers:
 
Autonomous Robots Will Deliver Your Lunch:
 
UK Thinks Robots And AI Will Lift Economic Growth:
 
 
 
 
 
 
« Iranian Hackers Have Infiltrated US Infrastructure
Chinese Hacker Groups Shift Focus To India »

CyberSecurity Jobsite
Check Point

Directory of Suppliers

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Renaissance

Renaissance

Renaissance is Ireland's premier value added distributor of IT security solutions and a leading independent provider of business continuity consultancy.

CSO

CSO

CSO serves enterprise security decision-makers and users with the critical information they need to stay ahead of evolving threats and defend against criminal cyberattacks.

Skkynet Cloud Systems

Skkynet Cloud Systems

Skkynet is a leader in real-time data systems for the secure management and control of industrial processes (SCADA) and embedded devices (M2M).

TSARKA

TSARKA

TSARKA (formerly the Center for Analysis & Investigation of Cyber Attacks - CAICA) is a leader in cybersecurity in Central Asia, playing a key role in protecting government and private IT assets.

BlueKrypt

BlueKrypt

BlueKrypt is a consulting firm for the security of IT systems and their management.

AU10TIX

AU10TIX

AU10TIX’s smart forensic-level ID authentication technology links physical and digital identities, meets compliance mandates, and ensures your customers know their trust and safety come first.

Cyber Pathways

Cyber Pathways

Cyber Pathways brings together the next generation of Cyber professionals along with delegates who are looking to cross train and enter the cyber market.

Gorodissky IP Security

Gorodissky IP Security

Gorodissky IP Security is a comprehensive approach to protecting your intellectual property on the Internet and beyond.

AiCULUS

AiCULUS

AiCULUS is a global technology company that specializes in API security and Risk Management products.

Vancord

Vancord

Vancord is an information and security technology company that works in collaboration with clients to support their infrastructure and data security needs for today and tomorrow.

eCapital

eCapital

eCAPITAL is a leading venture capital firm that provides early to growth stage funding to technology companies in fields including software & information technology, cybersecurity and industry 4.0.

Armata Cyber Security

Armata Cyber Security

Armata exists to bring Cyber Security to all people – from home users and SMBs to large enterprises. We believe all users have the right to an affordable yet effective Cyber Security solution.

Blackwired

Blackwired

Blackwired has established a new category in cyber security with an intelligence-led model based on the USMC’s Combat Hunter programme ‘Left of Bang’.

NetBird

NetBird

NetBird combines a WireGuard-based overlay network with Zero Trust Network Access, providing a unified platform for reliable and secure connectivity.

Cyberscope

Cyberscope

Cyberscope is a Web3 security firm specializing in smart contract audits, crypto security audits, and blockchain vulnerability assessments.

Cyber Eagle

Cyber Eagle

Cyber Eagle is a sovereign-grade cybersecurity firm specializing in autonomous AI-powered defense systems for critical infrastructure protection.