More from and about the Security Robotics team: People and robots

The latest news worth knowing and reading

Ambos Security and Security Robotics enter into partnership

Ambos Security and Security Robotics enter into partnership

 - We are stronger together - We are delighted to announce our partnership with Ambos Security from Dresden. The Saxon company has great expertise in consulting and concept development of particularly innovative security solutions, which in future will also include...

read more
Security Robotics Innovation Days 2024

Security Robotics Innovation Days 2024

The Security Robotics Innovation Days 2024 (ID24), which took place in Leipzig from 13 to 15 August, focused on the latest developments in security robotics. Under the motto ‘Adaptability - the power of evolution’ or ‘Autonomous mobile security robots as an...

read more
Unitree meets Security Robotics

Unitree meets Security Robotics

Our company acts as a system-open software developer and robotics integration specialist. We use customised hardware, i.e. robots, drones, cameras, sensors, etc., which represent the ideal platforms and equipment at any given time to meet individual security concepts...

read more

How can I rent or buy ARGUS?

You can either rent or purchase wheeled robots like the ARGUS from Security Robotics. Please contact our sales team for further information on availability options, pricing and contract terms.

read more

Alarm verification

Alarm verification is the process of checking an alarm to determine whether there is an actual threat or whether it is a false alarm. This can be done by visual verification via cameras, audio-visual sensors or manual inspection on site. Specialised security robots...

read more

Access control

Access control refers to the measures used to monitor and regulate access to certain rooms, buildings or areas. This can be done using various technologies such as RIFD, key cards, biometric scanners or passwords to ensure that only authorised persons are granted...

read more

Control centre

A control centre is a central control room that is manned around the clock and serves as a point of contact for security issues. The emergency call and service control centre not only receives emergency calls, but also monitors all security systems, coordinates alarms...

read more

Go1

The Go1 is a robust and versatile robot that can be used in a variety of environments. It is all-terrain and can easily overcome difficult terrain and small obstacles. Its temperature resistance allows it to be used in extreme weather conditions. With its on-board and...

read more

Resiliance

Resilience refers to the ability of a system to withstand external influences without compromising its functionality or structure. In the context of safety robotics, this means that a robot or safety system should be designed and built to withstand adverse conditions...

read more

Maintenance robot

A maintenance robot is an autonomous or semi-autonomous robotic system designed to carry out maintenance work on plant, machinery or infrastructure. These robots can carry out tasks such as inspections, cleaning, repairs and other maintenance work autonomously or with...

read more

Video surveillance

Video surveillance refers to the use of different types of cameras to visually capture and record events in a specific area. This enables continuous monitoring of locations or objects in real time, real-time analyses and the subsequent evaluation of recorded video...

read more

Video compression

Video compression refers to the process of reducing the amount of data in a video by removing redundant or unimportant information while largely preserving the image quality. This makes the transmission and storage of video data more efficient, which is particularly...

read more

Video analysis

Video analysis is the automatic evaluation of video data using algorithms, software and, increasingly, AI support. Various characteristics and behaviours are recognised, interpreted and evaluated in real time in order to identify specific events, objects or...

read more

Networking

Networking is the connection and communication of different devices, systems or units with each other in order to exchange data, fulfil common tasks or carry out coordinated actions. In safety robotics, networking enables the exchange of information between different...

read more

Surveillance service

A surveillance service is a security service that is responsible for monitoring specific areas, objects or people in order to recognise and prevent potential dangers or security risks. This can be supported by the use of various technologies such as cameras, sensors...

read more

Temperature resistance

Temperature resistance refers to the ability of a device or component to function under extreme temperature conditions without losing performance or functionality. In terms of robotics, this means that the corresponding system can work reliably even at very high or...

read more

Telemetry data

Telemetry data is information that is collected by sensors in real time and transmitted wirelessly. This data provides important information about the status and performance of a system, such as a safety robot or a monitoring system. It enables remote monitoring,...

read more

Voice interaction

Voice interaction refers to the ability of a system to respond to spoken commands or requests and perform corresponding actions. Voice interaction enables, for example, the control of security robots or the retrieval of status information from monitoring systems using...

read more

Security technology

Security technology refers to technical solutions and systems that are used to protect people, property and information from dangers, threats and unauthorised access. These include alarm systems, video surveillance systems, access control systems, fire alarm systems,...

read more

Safety inspection

A safety inspection is a systematic review of safety precautions, related equipment or systems involved in order to identify potential risks, vulnerabilities or violations of safety standards. Various aspects such as the integrity of protective devices, the...

read more

Real-time monitoring

Real-time monitoring is a safety concept that describes the continuous and immediate recording, analysis and reaction to events in real time. This immediate and continuous monitoring of defined relevant parameters and events with networked sensors and integrated...

read more

Rel-time data

Real-time data refers to information or data that is immediately available and continuously updated without delay. This can be, for example, information about current events, sensor values, object positions or system statuses that can be processed and used without...

read more

Security drone

A security drone is a remote-controlled or autonomous flying robot that is used to monitor, explore and secure areas. The drone is equipped with various sensors and cameras to capture real-time images and data, which can then be used for monitoring and analysis. These...

read more

Smart Connectivity

Smart connectivity refers to the intelligent networking of devices and systems in a network to enable particularly efficient communication and interaction. In safety technology, smart connectivity means that various safety components and robotic systems are connected...

read more

Software as a Service

Software as a Service (SaaS) refers to a model in which applications are provided via the internet and can be used by users as a service. The software is provided, maintained and updated centrally by the provider, while users simply access and use the applications via...

read more

Software platform

A software platform is a comprehensive framework that provides various functions and services for controlling, monitoring, utilising and analysing data from autonomous robotic systems. It enables the integration and coordination of software components for the...

read more

Robotics research

Robotics research refers to the systematic investigation and development of technologies in the field of robotics. Innovative concepts, algorithms and hardware components are researched in order to improve the performance, autonomy and applicability of robotic...

read more

LTE connection

The use of LTE (Long-Term Evolution) for fast and reliable wireless connections via the 4G standard mobile network for communication between individual actuators, security systems and network devices.

read more

Gimbal

A movable suspension mechanism for cameras that reduces vibrations and enables stabilised image capture.

read more

Geofencing

Geofencing is the digital marking of a geographical area within which a specific action or reaction is triggered when an object or person enters, leaves or moves within that area. It is often used in security systems to define boundaries and automatically respond to...

read more

Drone navigation

Drone navigation refers to the ability of a drone to move in the air and determine its position while following a specific destination or route. This includes the use of GPS, GNSS and other sensors as well as the application of navigation algorithms to calculate and...

read more

Digital check-in

Digital check-in is an automated process in which visitors or customers register their arrival, often using digital devices such as tablets or touchscreens. This enables efficient management of access data and visitor information, including identity verification,...

read more

Distance sensors

Distance sensors are devices or sensors that are used to measure the distance between the sensor and an object in its environment. They detect the spatial distance using various technologies such as ultrasound, infrared, laser scanners or radar technology. These...

read more

Safety assessment

Safety assessment in the field of safety engineering and robotics is a systematic analysis and evaluation of safety aspects in a specific context. It involves identifying and evaluating potential hazards and risks in order to develop appropriate protective measures...

read more

Safety audit for robotics

A safety audit in the field of robotics refers to the systematic review of the safety aspects of robotic systems. This process aims to identify and minimise potential risks. Various safety measures and protocols in the robot systems are analysed in order to uncover...

read more

Sensor technology

Sensor technology refers to the use of various sensors, such as cameras, ultrasound and infrared, to collect precise environmental information. In safety applications, this technology enables relevant data from the environment of robots or safety systems to be...

read more

Sensor technology

Sensor technology here refers to the totality of different cameras, acoustic, visual, laser and IR sensors, or devices for the independent detection of conditions and environmental values (heat, gases, radiation), which are integrated into robots or used by them as...

read more

Return function

The return function is a mode that enables drones to automatically return to their starting position or charging station (in the case of the BEEHIVE system, the BEE returns to the HIVE) or to head for a predefined location.

read more

robotics ecosystem

A robotics ecosystem describes a network of interconnected robots, technologies, platforms and actors that work together to create innovative solutions in the field of robotics. Components such as safety robots, control systems, sensors, software and support services...

read more

Robotics Integration

The seamless integration of robotic solutions into existing safety infrastructures to ensure optimum functionality. In this process, various robotic components, technologies and systems are networked with the existing security infrastructure, i.e. a wide variety of...

read more

Robotics

Robotics is a general term that refers to the research, design, construction, control and application of robots. In the context of security technology, robotics is particularly concerned with the development and implementation of robots for security-related tasks....

read more

Autonomous Mobile Robots

Autonomous Mobile Robots (AMR) are stand-alone mobile robots that operate autonomously and without human control. In the security industry, AMRs are used for various tasks, including patrolling, monitoring and inspecting specific areas. These robots utilise advanced...

read more

Robotics certification

Robotics certification is the process by which a robot or robotic system is tested by an authorised body for compliance with certain safety standards and regulations and officially certified as safe and ready for use. This certification ensures that the robot fulfils...

read more

Robot platform

The basic architecture and structure on which robotic solutions are built. This includes the design of the physical structure of a robot, including the shape, size and arrangement of the limbs and components. Drive concepts, expansion options and expected...

read more

Robot as a Service

Robot as a Service (RaaS) refers to the provision of robots and their functions as a service, usually including all associated maintenance and support services. RaaS is usually defined for a fixed, longer period of time and the associated monthly expenses on both sides.

read more

Wheel-driven robot

A wheel-driven robot uses wheels driven by electric motors to move around and is characterised by several advantages. The use of wheels enables efficient movement on different surfaces, both indoors and outdoors. This style of propulsion offers high manoeuvrability...

read more

Promobot

The Promobot is a friendly humanoid communication robot that autonomously receives and interacts with visitors. Equipped with state-of-the-art technology, it enables uncomplicated information & support for and communication with visitors using software, gestures,...

read more

Person recognition

Person recognition refers to the ability of camera systems, e.g. on board mobile robots, drones, etc., to identify and distinguish human individuals. Various (depth) sensors, cameras and AI-supported image processing technologies are used for this purpose. Recognising...

read more

Perimeter protection

Perimeter protection refers to the security measures taken to secure the outer perimeter of a facility or plant. Perimeter protection is a key part of the overall security strategy, especially in sensitive areas such as industrial facilities, military installations or...

read more

Perimeter

In security technology, a perimeter refers to the outer boundary area of a facility, plant or property. This can be realised by physical barriers such as fences, walls or gates. Protecting the perimeter is crucial to prevent unauthorised access and ensure the security...

read more

Payload

Payload refers to the payload or equipment that a robot can carry and use during operation, such as cameras, sensors or other devices. Different equipment is used depending on the robot model and deployment scenario.

read more

Patrol robot

A patrol robot is an autonomous mobile platform designed specifically for security and surveillance tasks. Its main task is to patrol predefined routes or areas, keeping an eye out for potential dangers or unusual occurrences. Typically, a patrol robot is equipped...

read more

Network security

Network security refers to the protection of communication channels and data transmissions within the networked security system against unauthorized access. To this end, measures, protocols and technologies are implemented that aim to ensure the integrity,...

read more

Machine learning

Machine learning (ML) is a technology in which algorithms and models are developed to give machines the ability to learn from data and improve their performance without being explicitly programmed. For example, ML enables robotic systems to recognize complex patterns...

read more

M2M connectivity

M2M connectivity refers to the ability of machines, devices or sensors to communicate with each other, exchange data and, for example, enable seamless connection and interaction between different networked systems. This promotes efficient collaboration, particularly...

read more

Modular platform solutions

Modular platform solutions are flexible and adaptable systems that consist of various modules that can be combined with each other. In the security industry, modular platform solutions enable the combination of individual components to meet specific requirements....

read more

Mobile video surveillance

Mobile video surveillance refers to a flexible surveillance system installed on moving platforms such as vehicles, robots or drones. These systems allow video data to be captured, transmitted and analyzed in real time from different locations. Mobile video...

read more

Critis

CRITIS refers to infrastructures that are crucial to the functioning of a society. This includes sectors such as energy supply, water management, healthcare, transportation and communications. The protection of these critical infrastructures is of paramount...

read more

Communication protocol

A communication protocol is a defined set of rules and standards that defines the structure, syntax, semantics and synchronization of communication between different systems or devices in a network. It enables smooth and standardized data transmission by defining how...

read more

Spot

Spot, developed by Boston Dynamics, is a versatile walking robot that is particularly suitable for use in small to medium-sized areas. With impressive flexibility, it performs precision patrols in security, measurements on installations and access control. Equipped...

read more

Communication robot

A communication robot is an intelligent robot designed to communicate with humans and perform specific reception and access management tasks. With a friendly appearance, the robot welcomes visitors, moves autonomously and has advanced technologies. Equipped with...

read more

Walking robot

A walking robot is a robot that has legs or leg-like means of locomotion and moves by running or walking. This type of robot imitates the locomotion of living creatures and has a similar range of movement, e.g. the ability to climb stairs.Walking robots are...

read more

Beehive

The Beehive drone from Sunflower Labs is an autonomous flying robot system that is suitable for aerial surveillance. With terrain independence, it is particularly suitable for medium to large areas. The drone performs effective aerial patrols, reliably detects and...

read more

Argus

ARGUS is a wheeled patrol robot designed for perimeter surveillance of extensive outdoor areas. Its robust chassis enables all-terrain use in various weather conditions (IP65). With 360° panoramic video surveillance, daylight and thermal PTZ cameras, it ensures...

read more

Weather resistance

Weather resistance is the ability of a robot to work effectively under different, even rapidly changing weather & environmental conditions, such as rain, snow, wind, sunshine, air pressure, humidity, etc.

read more

Easy maintenance

Ease of maintenance means designing robots in such a way that maintenance work can be carried out easily and efficiently to minimize downtime.

read more

LTE connection

The use of LTE (Long-Term Evolution) for fast and reliable wireless connections via the 4G standard mobile network for communication between individual actuators, security systems and network devices.

read more

Live streaming

Live streaming is the real-time transmission of video or image material from a camera, e.g. on board a drone or a robot, to one or more control centers / control stations.

read more

LIDAR

LIDAR is the abbreviation for Light Detection and Ranging and uses modern laser processes for precise distance measurements and environmental data acquisition. The resulting data is collected in real time and, with the appropriate processing software, can generate a...

read more

Service life

Service life, in relation to technical systems, is the estimated time during which a robot or safety system will function properly before extensive repairs or replacements are required. It depends on various factors such as material quality, operating conditions and...

read more

Noise protection

Noise protection describes a bundle of measures and technologies to minimize the noise pollution caused by the use of robot-supported systems. This can include the integration of noise-absorbing materials, the optimization of motion sequences or the use of quiet drive...

read more

Artificial intelligence

Artificial intelligence is the ability of machines to use algorithms to perform human-like thought processes in order to recognize patterns, solve problems or make decisions. The simulation of human-like intelligence in computer-controlled systems, often used to allow...

read more

Collision safety

Collision safety refers to the ability of a system to avoid collisions or minimize their impact. When robots interact with objects, people or other robots, technologies must be integrated to prevent accidents or damage. This can be achieved through various sensors,...

read more

Camera drone

A camera drone is an unmanned aerial platform that is equipped with one or more integrated cameras and is used to record image and/or video material from the air. In security applications, a camera drone can be used to monitor terrain, events or critical...

read more

Cascadability

Cascadability refers to the fact that safety systems or robotic components can be interconnected in a way that enables a hierarchical arrangement. This enables effective coordination and communication between the different parts of the system. In safety applications,...

read more

AI-assisted navigation

AI-assisted navigation refers to the use of artificial intelligence (AI) to enable robots to navigate autonomously in different environments. The AI continuously analyses environmental data, plans safe routes, takes obstacles into account and optimizes the robot's...

read more

ISO 9001 certification

ISO 9001 certification refers to compliance with quality management standards in accordance with the ISO 9001 standard and demonstrates that the company has implemented quality management practices to ensure the efficiency, consistency and customer focus of its...

read more

IoT integration

IoT integration uses Internet of Things technologies to improve the networking of robots and safety systems. Data and information is exchanged between robots and other networked devices to enable improved control, monitoring and efficiency. In the safety sector, IoT...

read more

Height limitation

The maximum altitude that a) a drone can reach due to technical limitations or b) is set by law to comply with safety regulations.

read more

high-security area

A high-security area is a specially secured area in which particularly strict security precautions apply. This includes locations where robots are used in sensitive or critical environments, for example in the industrial manufacture of products with national security...

read more

Georeferencing

Georeferencing refers to the process of linking spatial data with geographical coordinates. This enables objects or information to be clearly assigned to specific locations. In practice, this means that security systems or robots, for example, can use georeferenced...

read more

Integration

Integration is the seamless incorporation of robots into existing security or operating systems and the merging of different components, systems or technologies into a functioning unit. This enables smooth interaction and coordination between different elements in...

read more

Infrared camera

An infrared camera is a camera that detects infrared radiation and uses it for imaging. It enables the detection of heat signatures and also works in poor lighting conditions. In security applications, it is often used to monitor areas, detect people or objects in the...

read more

Human-robot collaboration

Cooperation between humans and robots in order to exploit synergies in certain tasks is known as human-robot collaboration. This involves human employees working directly with robots in a shared environment or on shared tasks. This requires special safety precautions...

read more

Obstacle detection

Obstacle detection describes the ability of a robot to recognize, identify and react to objects in its environment. This is achieved through the use of sensors such as cameras, ultrasound, lidar or radar, which continuously scan the environment. The detected obstacles...

read more

Hazard detection

Hazard detection is the ability of a system to identify potential threats or risks in its environment. This is achieved through the use of various sensors such as cameras, radar systems, infrared detectors and other technologies. The system continuously analyzes the...

read more

Radio communication

In security technology and robotics, radio communication is often used for wireless control and data transmission between robots, drones and connected control centers / control devices. Radio communication and networking of devices and systems.

read more

Early warning system

An early warning system is a security instrument that serves to provide early warning of potential dangers or threats. It enables the timely detection of anomalies or unusual events in order to initiate preventive measures and minimize damage. Ideally, incidents can...

read more

Remote monitoring

Remote monitoring is the monitoring of systems, devices or environments from a distance. This can include monitoring functions, statuses or events to ensure that they correspond to the expected parameters.

read more

Remote control

Remote control refers to the ability to control various types of robots from a remote location using a web application, physical controller or mobile app, i.e. wireless connections. Often used for special tasks or in hazardous environments or for applications that...

read more

Troubleshooting

Troubleshooting is the process of identifying, analyzing and correcting problems or malfunctions in a system. This process is crucial to ensure the proper functioning, reliability and safety of systems and robots.

read more

Detection range

The detection range refers to the physical space in which sensors or cameras are placed and in which they can detect events or activities. It is the spatial extent within which the system, such as a robot, drone, etc., is able to collect and analyze data or information.

read more

Event-driven monitoring

With event-driven monitoring, the monitoring system reacts to certain events, conditions or alarms and triggers corresponding, predefined actions. Sensors and algorithms are configured to detect specific events, such as entering a restricted area or the occurrence of...

read more

Event detection

Event detection refers to the automatic identification and recording of specific events or situations using sensors and algorithms. This technology makes it possible to recognise relevant incidents, react to them and, if necessary, initiate appropriate measures to...

read more

Event recording

Event recording is the automatic documentation and storage of relevant events. Data on specific incidents or activities is recorded and archived. These recordings are used for later analysis, checking safety incidents or optimising robotic processes.

read more

Energy efficiency

Energy efficiency refers to the level of efficient energy consumption of robotic systems that is necessary to ensure consistent performance and sustainable and cost-effective operating costs.

read more

Application scenarios

Application scenarios are the various areas of application in which robotics solutions for security and surveillance can be used. This can include, for example, the monitoring of industrial plants, public places or critical infrastructures.

read more

Intruder alarm

An intruder alarm is triggered when unauthorised persons or objects are detected. The sensor technology for detecting unauthorised intrusion can be permanently installed or installed and used on board mobile patrol systems.

read more

Edge computing

Edge computing in robotics refers to the local processing of data directly on the robot platform or in the immediate vicinity of where the system is used. This enables latency-critical tasks to be performed in real time without having to transfer all data to remote...

read more

Real-time monitoring

Real-time monitoring is a safety concept that describes the continuous and immediate recording, analysis and reaction to events in real time. This immediate and continuous monitoring of defined relevant parameters and events with networked sensors and integrated...

read more

Drone insurance

Drone insurance is a specialised form of insurance that provides cover for risks associated with the operation of drones. This can cover damage to the drone itself, liability claims for damage to third parties or their property and other drone-specific risks.

read more

Drone surveillance

Drone surveillance encompasses both the use of technology to monitor airspace for unmanned aerial vehicles and the use of drones themselves to monitor and secure specific areas. It includes recording drone movements, identifying flying objects and analysing...

read more

Drone system

A drone system is:a) A robotic system consisting of one or more drones and their base stations, which serves, for example, as a weather station, weather protection, charging station, etc. (see Beehive drone system).b) A combination of several drones that act together...

read more

Drone management

Drone management describes the coordinated planning, management, monitoring and control of drone operations to ensure safe and efficient flight operations and compliance with legal requirements and safety standards.

read more

Drone

A drone is an unmanned aerial vehicle that operates remotely or autonomously. It can be used for various purposes, including surveillance, surveying, delivery or recreational activities. Drones can be equipped with cameras, sensors or other payloads to fulfil specific...

read more

Drone defence

Drone defence refers to the development and implementation of systems designed to detect, identify and defend against unwanted or potentially dangerous drones. These systems can use various technologies such as radar, cameras, radio jammers or other means to detect...

read more

Digital reception service

A digital reception service is a stationary or mobile, multifunctional service that offers digital interfaces for interaction with visitors or users. Specialised robots provide support, particularly in the areas of communication and information.

read more

Data processing

Data processing is the systematic processing of information by robot-controlled systems. This includes recording, analysing, storing and interpreting data in order to make safety-relevant decisions and carry out appropriate actions. Data processing forms a central...

read more

Data backup

Data backup is the systematic backup of data in or from robot-controlled systems to ensure their availability and integrity. Regular backups and redundant storage solutions minimise potential data loss due to malfunctions, attacks or other unforeseen events. An...

read more

Data security

Data security in the context of security technology and robotics refers to measures taken to ensure the confidentiality, integrity and availability of data in robot-controlled systems. This includes protective mechanisms against unauthorised access, manipulation or...

read more

Privacy policies

Privacy policies are defined rules and regulations that govern the handling of personal data by organisations or companies. These policies define how personal information should be collected, stored, processed, transmitted and protected. Their aim is to protect the...

read more

Data capture

Data capture refers to the process of collecting, recording and storing information from various sources. This process can be manual or automated and involves the collection of raw data that is later analysed and processed to obtain relevant information for...

read more

Biometric access control

Biometric access control refers to a security system that controls access to rooms, buildings or sensitive areas through the use of biometric features. It uses unique physiological or behavioural characteristics, such as fingerprints, retina scans or facial...

read more

Biometric authentication

Biometric authentication refers to the method of identifying or verifying individuals based on unique physiological or behavioural characteristics. These include fingerprints, facial or iris recognition, voice analysis and other biological characteristics. The purpose...

read more

Autonomous robotics

Autonomous robotics refers to the ability of robotic systems to perform tasks and operations autonomously, without ongoing human control. These robots are equipped with advanced sensors, algorithms and decision-making mechanisms that enable them to understand their...

read more

Autonomous inspection

Autonomous inspection is the independent inspection of systems or areas. In terms of robotics, autonomous inspection refers to the process in which a robot performs inspection tasks independently, without continuous human control. The robot uses sensors, image...

read more

User-friendliness

User-friendliness refers to the design of user interfaces, control options and interactions in order to promote intuitive operation of the robots and associated / necessary software.

read more

Anti-collision system

An anti-collision system is a technology developed to prevent collisions between objects, vehicles or other moving parts. It uses sensors, data processing algorithms and control units to detect potential collision hazards and take appropriate action. As a rule, this...

read more

Alarm system

An alarm system is a security device that is used to detect unauthorised access, dangers or unusual events and to draw attention to them by means of alarms. It consists of sensors, control units and alarm transmitters to identify potential security threats and enable...

read more

Actuator

Actuator is a real, physical device or person that plays a role in security processes. Examples include surveillance cameras, access control systems, doors/gates or security personnel. In a technological context, an actuator is part of a security solution that...

read more

3D mapping

3D mapping refers to the creation of three-dimensional maps of the environment to provide accurate navigation information for robots. Generated mapping data can also be used for other purposes (digital twin in the construction sector, etc.).

read more

Which services does Security Robotics offer?

Security Robotics is an IT system house, experienced software developer and integrator in the field of robotics + AI with the following specialisations: Innovative security robots: we deploy state-of-the-art security robots equipped with advanced sensors, cameras and...

read more

How long can the GO1 walking robot be used?

The operating time of the GO1 walking robot is made particularly efficient by the use of Quickload rechargeable batteries, which can be replaced within seconds. The GO1 can be used continuously for 1-2 hours without the need for a long charging time. This function...

read more

For which applications is the GO1 suitable?

The GO1 is extremely versatile and is suitable for a wide range of applications. Due to its compact design, flexibility and robust features, the GO1 can be used in various scenarios, such as Guarding and security: the GO1 can be used as an agile supporter in guarding....

read more

Which sensors and cameras are integrated in the GO1?

The GO1 has ultrasonic sensors, foot force sensors and 5 sets of fish-eye stereo cameras for a high-resolution 360° all-round view. Various additional modules are also available, such as LIDAR and a thermal imaging camera, which significantly expand its perception...

read more

What degree of autonomy does the Spot walking robot have?

SPOT operates completely autonomously and follows predefined routes, with dynamic algorithms and AI support ensuring optimised autonomous behaviour. It is possible to switch flexibly between the routes, and the immediate reaction to events can also be defined. After...

read more

What technical features make SPOT particularly efficient?

SPOT impresses with AI algorithms and big data analysis, which enable it to gain precision and intelligence with every use. Its modular and customisable equipment with, for example, stereo cameras, LIDAR, PTZ camera, thermal imaging camera, 3-axis arm with gripping...

read more

In which languages can communication robots communicate?

Modern systems such as Promobot are multilingual and generally speak the most widely spoken languages in the world. This enables a broad communication capability to address visitors from different regions. This includes languages such as English, German, Spanish,...

read more

In which areas are communication robots used?

Communication robots are used in a variety of environments and industries to support human-oriented tasks and take over routine tasks and digitalised processes. Examples include Reception services in companies: Communication robots are used as digital reception...

read more

Are drones suitable for rapid alarm verification?

As the fastest system in the portfolio of autonomous security robots, the drone system is perfect for alarm verification. In the event of an alarm, triggered by a fence sensor for example, the drone can be automatically sent to the alarm location. Live video...

read more

What advantages do small training groups offer?

The conscious decision for small groups or individual training at modern academies offers a variety of advantages. The focus is on providing participants with a highly personalized learning environment. Due to the limited number of participants, each individual...

read more

Why is software often offered in the SaaS model?

The increasingly frequent exclusive provision of software in the SaaS model offers users a number of advantages. In addition to continuous support, this model enables flexible and scalable utilisation without having to make high initial investments. The permanent...

read more

How is data security guaranteed for robotic safety systems?

The data security of rented robotic systems is ensured by encrypted communication and comprehensive security measures. Providers such as Security Robotics implement advanced encryption technologies, secure protocols and conduct regular security audits to ensure the...

read more
Security event in Hamburg: knowledge exchange & networking

Security event in Hamburg: knowledge exchange & networking

In just a few days, on 22 & 23 February 2024, Hamburg will once again be the meeting place for security experts. The renowned NBS, Northern Business School, is putting together what belongs together and organising a highly interesting security event consisting of...

read more
The next bis thing – AI use in the security sector

The next bis thing – AI use in the security sector

Even though robotics is in our name, mobile, autonomous and very versatile assistants, supporters and colleagues are only ever one part, the hardware part, when we talk about innovations and modern solutions for the security industry. The use of AI, which fulfils a...

read more
Goodbye 2023 – welcome 2024

Goodbye 2023 – welcome 2024

Our look back at a turbulent and exciting 2023 At Security Robotics, it is also a cherished tradition to pause in the first few days of a new year and review the past months. We take time to compare our original plans and intentions with actual events, draw...

read more
Digital communication and data streaming

Digital communication and data streaming

We often provide information about the importance of autonomous robotic systems, AI support, networked safety concepts, integration of IoT-enabled actuators and our digital solutions ACUDA (Autonomous Centre of Unified Digital Actors) and NUCRON (IoT Injector). The...

read more
Be digital, stay human and love robots – Digital X 2023

Be digital, stay human and love robots – Digital X 2023

There is probably no other European event that is as consistently and broadly dedicated to the topic of digitalisation as Deutsche Telekom's aptly named DIGITAL X event. Based in Cologne, the event remains true to its location year after year, but always brings in new...

read more
Security Robotics Innovation Days – impressions of 2023

Security Robotics Innovation Days – impressions of 2023

Information / knowledge / insight can also be obtained virtually in a variety of ways: via podcast, by reading a brochure, visiting a website and informative phone calls / video calls, etc. However, none of this can replace the personal impression and up-close, direct...

read more
Security robotics roadshow – a short review

Security robotics roadshow – a short review

1 idea, 1 month, 5 events. The Security Robotics Roadshow was a complete success and made the month of June a particularly exciting and varied one for our team. The approach of participating in very different locations / events and thus informing and even inspiring a...

read more
3…2…1…ARGUS ready for patrolling

3…2…1…ARGUS ready for patrolling

The Innovation Days, our three-day event, are behind us. And while some colleagues dismantled its components such as tents, fences and other technology, our software specialists and integrators returned to their tasks, unloading large wooden boxes and freeing a duo of...

read more
IPS – Innovative Navigation for Robotic Systems

IPS – Innovative Navigation for Robotic Systems

Networked robotic systems that are used in the areas of security, maintenance and facility management score points there primarily thanks to their mobility and modularity. In order to be able to follow defined routes and act autonomously, these systems must be able to...

read more
Advantages of networked security robots

Advantages of networked security robots

In current, more aptly called conservative security concepts, technical solutions are often still used too selectively, a camera here, a motion detector there, a light barrier there. Although attention is paid to covering critical and access areas as completely as...

read more
Digital transformation in the security sector

Digital transformation in the security sector

Our innovative modular platform solutions Learn all about our innovative modular platform solutions, AI-powered robotics, networked IoT security components, machine-to-machine communication, data normalisation, API and #artificialintelligence. Be curious about the...

read more
EU top politician Marion Walsmann visits Security Robotics

EU top politician Marion Walsmann visits Security Robotics

To help shape the digital future, you first have to understand it. And especially when it comes to topics such as AI, robotics and smart security systems, nothing is more enlightening than entering into an intensive discourse with inventors, innovators and precisely...

read more
Why we should help shape the EU’s AI law.

Why we should help shape the EU’s AI law.

Traditionally, the EU goes into the political summer break until the beginning of September. One topic that has occupied the representatives of the "Telecommunications Working Group" in particular right up to the last session is the so-called AI Act (Artificial...

read more
Humans and robots – service partner for the future?

Humans and robots – service partner for the future?

An ordinary morning in an ordinary company. An employee enters the main gate of the branch. His digital access authorisation is automatically recorded, verified and he can continue on his way without delay. Other employees approach with an unusual amount of luggage....

read more
SPOT proves its skills at the DB Test Centre Delitzsch

SPOT proves its skills at the DB Test Centre Delitzsch

The Security Robotics Innovation Days have become a permanent fixture in our own company and well-known companies also take part in the event every year full of curiosity. In September 2021, we got into conversation with Mr Schermann, CTO (Security) of Deutsche Bahn...

read more
Security Robotics at the Dussmann Autonomous Day

Security Robotics at the Dussmann Autonomous Day

Security Robotalk: State-of-the-art robot solutions for the modern facility management specialist Dussmann Service New technologies are conquering the world, gaining more and more importance in the course of digitalization - also in the facility management industry....

read more
The new precision work in security

The new precision work in security

Security Robotalk: Precision at the very highest level - this is how robots are used in industry There are industries that feel the technology shift more than others. One of these is the security industry. On the one hand, it feels it directly - through...

read more
How safety robots change Industry 4.0

How safety robots change Industry 4.0

Security Robotalk: Guard, measure, accompany - this is how Industry 4.0 is changing the security industry with robots 3 am. Large pressure vessels stand on a huge factory site. Silence reigns. Only a light rhythmic and mechanical tapping can be heard. It is the...

read more