The End of Security Guards? (Vigilus Robot)

Author: Ethan Ace, Published on Sep 09, 2012

"A new wave of robots is replacing workers in both manufacturing and distribution" claims the New York Times. And now a new ASIS award winning robot aims to replace security guards. In this note, we dig into the key capabilities and pricing of this new robot and how it stacks up against human guards.

Product Overview

********** ****** ****** ********** ** ********** ******* ******** ****** **** *** ********* *** features:

  • --********** *********:*** ***** *** ** *** ** **** ** * ******* of ****, *** *** ******* *******, ***** *******, ** ***-*** radio. ***** *** ********* *** ** *** ** *** ********* of *** ******** ** ** ******* *** ***** ** **** location. *** ***** **** ******* ** ******** **** ** "**** to ******* ****" ***** ***** ********* *** *** **. ******* may **** ** ********** ******** *** *** ******** *******.
  • *******: ******* ******** ******* ******* ******* *** ***** ***** *** **** for ****** ********* *** **********, ** **** ** ************** ** subjects, **** ** ******* ** ***** *********. ************, ******** *** sensors, **** ** ****** ******** ** *********** *** *** ** installed.
  • ** ******: *** ***** ******* * **** ******** ** ****** ***** *** be **** ** **** *** ************, *** ********** **** *****-***** video ********** *******. **** ***** ** *** **** ** *** robot ******.
  • ******** ************: ******* ** ********* ** *** ******* ******* ******* *** ***.*** wireless, ** ********* ********** *** ********. *** ********* ******* ******** coverage, **/** ************ ** ** ******.
  • ********:*** ******* ***** *********** ******** *** ******** ** ** *** compliant. ** *** *** ***** *** *** ** ********** ** operate *********, *** ** ****** ** ****** ** ******* ******. Its *** ***** ** ***** **** ***** *** ****, *** it ********* ***** ** ***** ******.

******* ** ******** ** ** ********* ** ** ****. ******* is *** *** *********, *** ** ******** ** ** ** the ***** ** $**,***-**,*** ***.

****'****** ***** *** ********* ******** ****** **** ******.

In ******

****'* * ***** ***** ******* *** ***** '*******':

*********

** *** *** ** ****** ** ****** ** *** **** with *********. ******** ******* ** ************ *** ** ** ********* ***********, not *** *** ***** ******* **** ******* (****** **** ***** be *********** **** ***-**). ******* **** ** ***** *** *** common, *** **** **** **** *** ** ********** *************, ***** robots *** **** ** ******* *********** *** ***** ******** ** multiple ****** ** * ********. 

Tipping *** ***** (****** *******)

***** *** ********* *********** ** *** *** *****, *** ****** of ******* ** ******* ** *** ****** ****, ***** *** battery ** *******, ****** ** **** *********. *** **** ** its ****** **** ** ********* ** *** ** ****** ****, and * **** ** *** ***** ******** ** **** ******* straight *******. ************, *** ***** ******* ****** ***** ** **** pushing (*** ******), *** ******* *** ** **** ** *** console **** *******. *** ***** ******** *****, ***** *********** ********* would ****** **** **** ****** ******* ******* **.

Dealing **** ********* ********

******** ******** *** ** * ********* *** *** *****. *** instance, *** ***** ****** ** *** **** ***** *** ******* movement ****** **** *** *****, ***** ** ******** ********** ** work ** ***** ******** **** ** ******** ** ******* ****** typically ***** ** ********** *******. **** *** ******* ** ***** if ******** *********** ********* ***** ***** *** ***** ** * facility, ** *** ***** ***** **** ** ** ******** ** accomodate ***** *********** ** ** ******** **** ******* **** ****.

***********

*** ******* ****** ** ********* **********, *** **** *** ********* of *** **** ******** ** ******, **** *** ********* ** other ******** *******, **** ** ***** ********** ** ****** *******. Gamma *** ******* ** ** *** **** ** **** *********, so *** ***** *** ** ****** ** ****** **** ***** systems, ****** ** ** ******* ** ******. 

Company ********

*** ******* ****** ******* ** ***** ***, * ***** ********** company ***** ** ******** *** ** *******************. *** ******* *** **** ********** ****** ***** **** *** is **** *** ******** ** ****** *******. *** ******* ** internally ******, *** ******* *** ********** *** ******* ** ******** it.

Channel *****

***** *** ******* ** ********* ******* ******** **** ******* *********, it ***** ** ******* ******* ******** ** **** **** *** service *** ******.

Competitive ***********

*** **** ***** ******** ***** ** **** ** ** ******, ** *** **** ********* ****** *** **** ************* (** programmed ****, ** ********** *******) ****.

Compared ** ******

*** *** *** ********** ** *** ***** ***:

  • **** ********* **** ******. ** $**,*** ** $**,*** *** ** costs ***** * **** ** * ******** ***** ***** *** the ******** ** **** **/* ****** ******** *****.
  • *** ****** ** **** ***** **** ***** ********* ** ********* to * *****. *** ***** *** ** ********* ***, ** definition, ** ****** ** ******* ** ******, ***** ******* ********* concerns *** *******.

*******, *** ***** *** **** *** *********** ******** ** * human:

  • **********: * ***** ***** ** **** ****** ** ***** ********* **** a ***** *****. *****, ********* *** *** **** ********* *** robot ** * ******** ******. ************, ********** * ******** ** a **** **** ******* ***** **** ******* ********* **** ******* over * *****.
  • ********: ***** ****** *** ******* ** ********** ****** *** ***** ******* areas *** ******* ** ***. ** *** ******** *** ******** floors ** ********* ***** ***** **** ** *******, ******* *********, Vigilus ** ****** * **** ***.
  • ******** *******: ******** ****** ***** ***** ********* *** ******** ********* *********, escorting ****, ********* **** **** *****. * ***** **** *** be **** ** ** ****, ** ***, ** ****.
  • *****: ** $**,***+, ** ** *** ***** *** ******* ********** for ******** *****.
  • ***** ******: ******* *** **** *********** ********** ***** *** **** ******** ** the **** ** ****** ***** ****** ** ****** ** ********. Security ******** *** ****-****** ** ******, ** ***** ******** ********** such ** **** *** ** ***********.

**** *****, ***** *** *** ********** ** *** ******** ******** and *** *********** **** **** **** ******, ** ***** **** will ** *** ** *** **** ***** *******, ****** ***** products ** *** ****. *******, ******* **** **** **** * significant ****** **** **** ***** ** *********, ** **** ******** is ***** ** *** *******.

Login to read this IPVM report.
Why do I need to log in?
IPVM conducts unique testing and research funded by member's payments enabling us to offer the most independent, accurate and in-depth information.

Related Reports

S2 Access Control / 'Unified Security Management' Profile on May 08, 2018
In our 13th access control company profile, we examine S2 Security's Netbox platform: Unified Security Management Platform positioning Core...
IP Network Hardware for Surveillance Guide on May 02, 2018
Video surveillance systems depend on IP networking equipment. In this guide, we explain the key pieces of equipment and features, explaining where...
Favorite Access Control Manufacturers 2018 on Apr 26, 2018
150+ Integrators told IPVM "What is your favorite access control management software/system? Why? Unlike the 2016 access favorites where a group...
April 2018 IP Networking Course on Apr 19, 2018
This is the last chance to register for our IP Networking course. Register now. NEW - 2 sessions per class, 'day' and 'night' to give you double...
Strong ISC West 2018, Says Manufacturers, GSX / ASIS Expected Weaker on Apr 17, 2018
Manufacturers say ISC West 2018 was strong, continuing the trend we have seen in 2017 results and 2016 results. However, those same 100...
Best and Worst ISC West 2018 on Apr 16, 2018
ISC West 2018 had strong attendance, modest overall new products, and a surge in Artificial Intelligence marketing. First, here are 20+...
ISC West 2018 Access Control Rundown on Apr 06, 2018
For ISC West 2018, what is new and interesting in access control?  This rundown will bring you up to speed on the exhibitors, what they are...
The 5 Major Lock Profiles Guide - Euro, Oval, KIK, Interchangeable Core, Mortise on Apr 03, 2018
Locks are used everywhere, but they are not all the same. In fact, even the shape of the lock changes, sometimes for no other reason than...
70+ New Products Directory Spring 2018 on Apr 02, 2018
We have compiled a list of new products for Spring 2018 in the categories: Video Surveillance Access Control Fire and Intrusion Other...
Wireless Networking For Video Surveillance Guide on Mar 29, 2018
Wireless networking is a niche in video surveillance applications, but it can be a difficult one to understand with proper wireless design,...

Most Recent Industry Reports

Software Only VMS vs NVR Appliances on May 23, 2018
Should you buy your own PC/server and load VMS software on it or get a turnkey appliance (both hardware and software, e.g., NVR, Hybrid DVR) from a...
Buy Arecont: Top Bid $10 Million Cash on May 22, 2018
Last year, Arecont had a deal for a purchase price of $170 million (see Failed Arecont China Acquisition). This year, Arecont has a deal for a...
Installing Box Cameras Indoors Tutorial on May 22, 2018
This tutorial starts our physical installation for video surveillance series, starting with Box Cameras, one of the oldest and most basic types....
The Hikvision Smart Classroom Behavior Management System on May 22, 2018
Hikvision's rapidly growing offering of analytics, which we most recently examined with Hikvision's ethnic minority analytics, is now going into...
Dahua Intrusion Analytics And VMD Tested on May 21, 2018
Dahua ships basic analytics on practically all their cameras, ranging from low cost to high end. To see how these analytics work in real world...
Exacq Improving Technical Support, Responding To Integrator Complaints on May 21, 2018
Exacq had been a long-term favorite of integrators, but since their 2014 Tyco acquisition, Exacq has fallen in IPVM integrator studies (though...
Best Manufacturer Technical Support 2018 on May 21, 2018
While 5 manufacturers made the worst technical support 2018 list, only 3 stood out as providing the best technical support to 190+ integrators in...
Stealth / UCIT - Remote Video Monitoring Provider Profile on May 18, 2018
Can 2 remote video monitoring companies, Stealth Monitoring from the US and UCIT from Canada combine to impact the market and compete in a changing...
Cybersecurity for IP Video Surveillance Guide on May 18, 2018
Keeping surveillance networks secure can be a daunting task, but there are several methods that can greatly reduce risk, especially when used in...
Forced Entry / Duress Access Tutorial on May 17, 2018
Even though access control normally keeps people safe, tragedies have revealed a significant issue. If users are forced to unlock doors for...

The world's leading video surveillance information source, IPVM provides the best reporting, testing and training for 10,000+ members globally. Dedicated to independent and objective information, we uniquely refuse any and all advertisements, sponsorship and consulting from manufacturers.

About | FAQ | Contact