Robots on patrol – How robotics and AI are changing the security industry with Severin Pfister (Ascento)

Security robots that independently monitor terrain, recognise anomalies and communicate with existing systems - what sounds like science fiction has long since become reality. In the latest episode of FILL THE GAP, the security podcast, we talk to Severin Pfister from Ascento about the use of robotics and artificial intelligence in property protection.

We take a look at current developments, concrete application scenarios and the question of how autonomous systems can help to counter the shortage of skilled labour in the security industry. At the same time, we discuss the challenges of integrating such technologies into existing security architectures.

Listen in and subscribe now! 🔔

Never miss an episode: Subscribe to FILL THE GAP on your favourite podcast platform and stay informed about the latest developments in the field of security.

👉 Listen & subscribe:

👉 Or watch & subscribe:

👉 Do you have an exciting topic or would you like to be a guest? Write to us at: fillthegap.podcast@concepture.de or here

Miriam Strauß

Marketing & Kommunikation
Miriam Strauß is engaged daily in the latest developments in AI and marketing and is responsible for communications at Concepture.

Jetzt weiterlesen!

Cyber Security

GPS spoofing in logistics: Invisible danger for supply chains

Whether in the navigation system of modern vehicles or in the tracking chip on a freight pallet - GPS (Global Positioning System) is now an indispensable part of global supply chains and mobility solutions. But what happens when this technology is manipulated? GPS spoofing enables attackers to deliberately falsify positioning data - with potentially fatal consequences for companies, security and profitability.

Uncategorized

Vehicle restraint systems planned correctly: Safety begins before the fence

When it comes to protecting properties, infrastructure or public areas, many people first think of access control, video technology or alarm systems. But one central weak point often goes unnoticed: vehicle access - whether through accident, negligence or intent.

Fill The Gap, Security Compliance

The EU CER Directive explained – What companies need to know now

Alternativ zum Formular können Sie uns auch eine E-Mail an info@concepture.de senden.

Instead of the form, you can also send us an email to info@concepture.de.