{"id":21610,"date":"2024-05-27T08:10:51","date_gmt":"2024-05-27T08:10:51","guid":{"rendered":"https:\/\/netizen.gr\/?p=21610"},"modified":"2025-06-26T19:09:22","modified_gmt":"2025-06-26T19:09:22","slug":"enopoiimena-systimata-asphaleias-case-study","status":"publish","type":"post","link":"https:\/\/netizen.gr\/en\/enopoiimena-systimata-asfaleias-case-study\/","title":{"rendered":"\"Integrated Security Systems\" - The case study awarded first prize at the Security Excellence Award 2019"},"content":{"rendered":"<h5 class=\"wp-block-heading\">Innovation \u2013 Challenges<\/h5>\n\n\n\n<p class=\"wp-block-paragraph\">The project we describe involves proactive protection from criminal behaviors (theft and robbery, equipment destruction, vandalism) as well as reactive protection with planned actions and responses to such behaviors. Additionally, it included early warning for potential fire outbreaks (Fire Detection) and access control to the facility (Access Control).<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The facility comprises a complex of covered and open storage areas, a depot for parking commercial vehicles, and office buildings for administrative and technical support on the property owned by a public utility organization, responsible for operations across a geographical region of Greece.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The organization\u2019s problem that led to this project involved economic losses amounting to hundreds of thousands of Euros annually from thefts of electrical materials and equipment stored in both covered and outdoor areas of the facility. The largest losses came from the theft of materials containing large quantities of copper, resulting in their vandalism to extract the copper. There were also continuous acts of vandalism on used and retired materials which, though seemingly useless, contained significant amounts of copper as scrap. This material is collected in piles and periodically sent for recycling, creating substantial revenue for the organization. The removal of this material was carried out by regular raids of organized offenders entering through perimeter access points. Due to the size of the facility and the dispersion of the buildings, controlling access to areas beyond visitors\u2019 and employees' jurisdictions was impossible without implementing a technological solution included in the study and execution of the project.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Upon deciding to upgrade the facility's security, it was also agreed to upgrade the fire detection system.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The relevant dimensions of the facility, totaling 181 acres, include a perimeter coverage of 1.9 kilometers and building installations with a total coverage of 27,500 square meters.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The existing security systems were fragmented and outdated, offering a very low level of security in the areas where they were installed. Over the years, standalone installations in various areas and offices, without central code management, with active codes used by employees who no longer worked for the organization, with a single code for everyone, and equipment placed in inappropriate positions due to changes and renovations, essentially lacked any security planning. The outdoor areas were inadequately monitored by a single-digit number of old technology cameras without image recording, and the camera positions did not correspond to sensitive areas that needed monitoring.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The extensive risk assessment study (Risk Assessment) we conducted with on-site research and information from the organization\u2019s staff led us to conclude that, aside from the theft problem, the organization\u2019s activities were extremely sensitive and vulnerable to possible sabotage actions, with very serious consequences that exceeded the organization's operational boundaries if such an incident occurred.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">In our final report on the RA results, we suggested classifying the facility as High Risk and drawing up a budget for upgrading the security.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The security solution we proposed, which was ultimately adopted and implemented, was designed based on the principles of what NETIZEN calls Total Security Management.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We understand that security is a concept, not a product. In addition to the technological solution, we designed operational procedures and trained security managers from the existing staff to follow them, ensuring the technological equipment is effective and efficient.<\/p>\n\n\n\n<p class=\"wp-block-paragraph translation-block\">Alongside the installed technical equipment, importance was given to designing and configuring the surrounding area to deter potential offenders from malicious actions. NETIZEN engineers, after attending seminars on Crime Prevention Through Environmental Design <strong><mark class=\"has-inline-color has-text-hover-color\">(CPTED)<\/mark><\/strong>, incorporated its principles into their solutions. The CPTED principles are based on understanding a potential offender's thought process and creating an environment that discourages violations.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Specific interventions in lighting, configuring paths visitors must follow to the buildings, visible directional signs, prominent security systems, well-maintained building facades, limited and well-kept vegetation, careful placement of large objects to avoid offering cover, all these small interventions collectively signal that the area is monitored and that approaching it involves risk.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The interventions in the surrounding area based on CPTED principles were carried out in collaboration with an external landscaping company.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Special instructions were given to security managers on the importance of CPTED principles and maintaining the implemented interventions.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We designed and implemented a Control Center in a secure location within a building from which the entire facility\u2019s security systems are monitored and managed.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The central units of the alarm and fire detection systems, access control through card readers, and all the cameras installed at critical points were integrated via a closed fiber optic network onto a network platform. The platform's communication with the individual systems is possible using common communication protocols. The management of all systems is now done with a single keyboard and mouse.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Routine commands, such as activating\/deactivating alarm system sectors, fire detection system tests, locking\/unlocking access doors, etc., are entered into the platform during initial programming and presented to the operator through a series of commands (workflow) that are executed and recorded with or without relevant or necessary comments.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Management of access privileges (who, where, when, how), visitor cards, and door control is done through internal communication and approval.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">CCTV camera monitoring is not continuous by the operator as it has been proven that this method is not effective for security. Screens in the Control Center activate cameras needing attention via advanced algorithms and specialized software analysis; however, HD high-definition image recording is continuous, and access to captures\/files is easy.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The management\/support of foot patrols within and around the facility is also done via the platform and utilizes GPS technology with a special app and smartphone. The workflow confirms that all areas needing inspection are checked. Patrol transition times from one point to another are monitored by software for protection against threat attacks. Emergency situations from the foot patrol are immediately communicated to the operator for appropriate handling.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Management of emergency, threat, alarm, fire situations, what the operator should do during a crisis, is pre-designed and programmed to be displayed in the form of commands needing confirmation. Critical alarms are also sent to the NETIZEN Alarm Receiving Center for further support.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Furthermore, through the platform, operators create and generate reports either for emergency events or for internal use, control, and compliance with the set security policy.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Goals and Design<\/h5>\n\n\n\n<p class=\"wp-block-paragraph translation-block\">The solution design we proposed and ultimately adopted and implemented was based on compliance with European standards <strong><mark class=\"has-inline-color has-text-hover-color\">EN-<\/mark><\/strong>.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">Specifically:<\/h6>\n\n\n\n<p class=\"wp-block-paragraph\">For the alarm system installation, compliance with the standard:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-text-hover-color\">EN 50131<\/mark><\/strong>&nbsp;- Alarm systems - Intrusion and hold-up systems - Grade 3<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">For the equipment used in the alarm system:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-text-hover-color\">EN 50131<\/mark><\/strong>&nbsp;- Alarm systems - Intrusion and hold-up systems - Grade 4<\/li>\n\n\n\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-text-hover-color\">EN 50131<\/mark><\/strong>&nbsp;- Alarm systems - Intrusion and hold-up systems - Grade 2<\/li>\n\n\n\n<li><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-text-hover-color\"><strong>EN 50130<\/strong><\/mark>&nbsp;- Alarm systems - Alarm transmission systems<\/li>\n\n\n\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-text-hover-color\">EN 50136<\/mark><\/strong>&nbsp;- Alarm systems - Alarm transmission systems<\/li>\n<\/ul>\n\n\n\n<p class=\"wp-block-paragraph\">For the fire detection system (equipment and installation), compliance with the standard:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-text-hover-color\">EN 54<\/mark><\/strong>&nbsp;- Fire detection and fire alarm systems<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-verse\">Note that NETIZEN engineers have received training in the UK and are certified by the official British certification body Fire Industry Association (FIA) for the design, installation, inspection, and maintenance of fire detection systems according to <strong>EN 54 standars<\/strong>.<\/pre>\n\n\n\n<p class=\"wp-block-paragraph\">For the CCTV system, compliance with the standard:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-text-hover-color\">EN 50132<\/mark><\/strong>&nbsp;- Alarm systems - CCTV surveillance systems for use in security applications<\/li>\n\n\n\n<li><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-text-hover-color\">BS 8418:2003<\/mark><\/strong>&nbsp;- Installation and remote monitoring of detector-activated CCTV systems<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-verse\">The processing of data recorded in the CCTV system and the management of user access data are designed to comply with the EU<strong>(General Data Protection Regulations<\/strong> (<strong>GDPR<\/strong>))<br><br>The selection for the role of the GDPR compliance officer was made by the organization's management, and the training was done in two parts: certified seminars by a specialized body and training by NETIZEN.<br><\/pre>\n\n\n\n<p class=\"wp-block-paragraph\">NETIZEN has adopted these European standards since 2005, as it has empirically verified the benefits of their application, primarily in reducing false events and the frequency of emergency corrective visits. Our goal is not only to offer quality security to the customer but also to minimize the overall cost of supporting the good operation of the facility during its \"lifetime.\"<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We believe that minimizing unnecessary technical visits due to false events should be a key quality objective of a security service provider. Pricing unnecessary technical visits is toxic to the customer-company relationship, emergency mobilization disrupts service planning, the cost burdens both parties equally, and it not only does not produce profit but consumes any initial profit from the project implementation.<\/p>\n\n\n\n<h5 class=\"wp-block-heading\">Deliverables, Performance, and Achievements<\/h5>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-8f761849 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p class=\"wp-block-paragraph\">The project was implemented according to the timeline and within the budgeted financial figures and profit margins.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Our communication with the organization\u2019s staff is continuous, and the information we receive indicates that, despite initial difficulties for the staff to adapt to the new, safer conditions and behaviors, the results are positive, and no loss incidents have been recorded. There have been attempts to enter through the perimeter, but they were not completed due to timely intervention via the announcement system (loudspeakers) and the combination of dispatching an immediate response.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">NETIZEN's experience in undertaking and completing projects is long-standing and significant, and our goal is always to maintain good relations with our suppliers and customers. These principles lead us to an honest approach, creating goodwill during the formation of this relationship and after its establishment. We avoid promises and never commit to something we cannot deliver. Our expertise covers all areas and fields involved in project implementation, from the moment of ordering equipment from our suppliers in Greece and abroad to signing the delivery certificate. However, when difficulties arise, good relations with our customers, continuous communication, and demonstrating genuine interest work constructively, avoiding unpleasant outcomes.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We consider the implementation of this project one of the great achievements during NETIZEN\u2019s activity. We had the opportunity to utilize state-of-the-art equipment and implement solutions designed for specific and tangible challenges based on our experience and expertise. We believe that our choices over the past years, to invest in continuous education and training and our commitment to compliance with international quality standards, have paid off. We are convinced that this project has allowed us to gain a significant reference project whose added value is clearly greater than the commercial profit derived from its implementation, and we believe it will serve as a useful tool for further developing NETIZEN.<\/p>\n<\/div>\n<\/div>\n\n\n\n<h5 class=\"wp-block-heading\">Technology, Management System, and Legal Compliance &nbsp;<\/h5>\n\n\n\n<p class=\"wp-block-paragraph\">NETIZEN has recognized the added value that the assimilation of new technologies in human resource management and the relationship with suppliers and customers brings and uses corresponding technological tools.<\/p>\n\n\n\n<p class=\"wp-block-paragraph translation-block\">The Human Resources (HR) department adopted a unified \u00a0<strong><mark class=\"has-inline-color has-text-hover-color\">Human Resources Management System (HRMS)<\/mark><\/strong>\n to manage various HR areas such as payroll, time management, recruitment and selection of suitable personnel, employee evaluation, and development through talent management processes. The HRMS has proven to be a particularly powerful tool, allowing for more effective organization and operation of the HR Department and unlocking its potential.<\/p>\n\n\n\n<p class=\"wp-block-paragraph translation-block\">The <strong><mark class=\"has-inline-color has-text-hover-color\">Customer Relations Management (CRM)<\/mark><\/strong> <strong><mark class=\"has-inline-color has-text-hover-color\"><\/mark><\/strong> suite has been integrated across the company's operational activities. Every customer communication is recorded, as well as the history of the relationship with the company and the services received. Routine and emergency technical visits for preventive and corrective interventions, project management, sales support, sales request tracking, internal meetings, and any potentially useful information are accessible to all NETIZEN staff for retrieval and inputting new data. The CRM also provides the information that forms the quality indicators shaping NETIZEN's strategy and goals.<\/p>\n\n\n\n<p class=\"wp-block-paragraph translation-block\">The financial and sales management departments, through the commercial <strong><mark class=\"has-inline-color has-text-hover-color\">Enterprise Resources Management (ERP) <\/mark><\/strong>program with modules supporting all our activities, from material orders, costing, and supply chain to sales, manage NETIZEN's finances more efficiently, significantly reducing the company's operating costs.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">Beyond compliance with European security standards for the services provided, NETIZEN strives to offer quality services continuously. For this reason, its staff is trained and encouraged to actively participate in the processes required to ensure the conditions and recommendations described in the management systems for which the company holds compliance certification.<\/p>\n\n\n\n<h6 class=\"wp-block-heading\">These systems are:<\/h6>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-text-hover-color\">ISO 9001:2015 <\/mark><\/strong>- Quality Management System&nbsp;<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We conduct the required internal audits of quality management systems as per the international standard and provide training to our staff to understand and implement the standard's requirements.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-text-hover-color\">ISO 14001:2015<\/mark><\/strong> - Environmental Management System<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">NETIZEN monitors, measures, and evaluates the type and magnitude of the environmental impacts of its operations.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-text-hover-color\">OHSAS 18001:2007<\/mark><\/strong> - Occupational Health &amp; Safety Management System<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">We ensure that specific procedures exist so that all known potential hazards within our activity scope are continuously recognizable, adequately identified, and located, their contribution to occupational risk is fully assessed, and all risks requiring control are managed with appropriate measures by properly trained individuals.<\/p>\n\n\n\n<p class=\"wp-block-paragraph\"><strong><mark style=\"background-color:rgba(0, 0, 0, 0)\" class=\"has-inline-color has-text-hover-color\">ISO 27001 : 2013<\/mark><\/strong>&nbsp;- Information Security Management System<\/p>\n\n\n\n<p class=\"wp-block-paragraph\">The security of the information in our systems is of primary importance to us. Organizational risks have been identified, assessed, and managed satisfactorily and correctly. Through NETIZEN's commitment to information security and regular evaluations, we monitor the system's performance and continuously improve it.<\/p>\n\n\n\n<p class=\"wp-block-paragraph translation-block\"><strong><mark class=\"has-inline-color has-text-hover-color\">NETIZEN complies with all provisions of Law 3707\/2008 (Government Gazette 209\/A\/8-10-2008)<\/mark><\/strong>, which replaced Law 2518\/1997, regarding security service companies (I.E.P.Y.A.), and operates according to the operating conditions as well as the required qualifications and obligations of its staff as described in the law.<\/p>","protected":false},"excerpt":{"rendered":"<p>The project we describe concerns proactive protection against offending behaviours (theft and robbery, destruction of equipment, vandalism) as well as reactive protection by planning actions and activities that take place when such behaviours are detected. Also included was the early warning of the possibility of a fire (FireDetection) and the control of access to the facility (AccessControl).<\/p>","protected":false},"author":1,"featured_media":21611,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[90],"tags":[],"class_list":["post-21610","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-netizen"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.1 (Yoast SEO v27.1.1) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>\u201c\u0395\u03bd\u03bf\u03c0\u03bf\u03b9\u03b7\u03bc\u03ad\u03bd\u03b1 \u03a3\u03c5\u03c3\u03c4\u03ae\u03bc\u03b1\u03c4\u03b1 \u0391\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2\u201d \u03c4o \u0392\u03c1\u03b1\u03b2\u03b5\u03c5\u03bc\u03ad\u03bd\u03bf Case Study - Netizen<\/title>\n<meta name=\"description\" content=\"To \u03ad\u03c1\u03b3\u03bf \u03b1\u03c6\u03bf\u03c1\u03ac \u03c4\u03b7\u03bd \u03c0\u03c1\u03bf\u03bb\u03b7\u03c0\u03c4\u03b9\u03ba\u03ae \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1 \u03b1\u03c0\u03cc \u03c0\u03b1\u03c1\u03b1\u03b2\u03b1\u03c4\u03b9\u03ba\u03ad\u03c2 \u03c3\u03c5\u03bc\u03c0\u03b5\u03c1\u03b9\u03c6\u03bf\u03c1\u03ad\u03c2 \u03bc\u03b5 \u03c4\u03b7\u03bd \u03b5\u03bd\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b7 \u03b4\u03b9\u03ac\u03c6\u03bf\u03c1\u03c9\u03bd \u03c3\u03c5\u03c3\u03c4\u03b7\u03bc\u03ac\u03c4\u03c9\u03bd \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/netizen.gr\/en\/enopoiimena-systimata-asphaleias-case-study\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u201c\u0395\u03bd\u03bf\u03c0\u03bf\u03b9\u03b7\u03bc\u03ad\u03bd\u03b1 \u03c3\u03c5\u03c3\u03c4\u03ae\u03bc\u03b1\u03c4\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2\u201d To Case Study \u03c0\u03bf\u03c5 \u03b2\u03c1\u03b1\u03b2\u03b5\u03cd\u03c4\u03b7\u03ba\u03b5 \u03bc\u03b5 \u03c4\u03bf 1\u03bf \u03b2\u03c1\u03b1\u03b2\u03b5\u03af\u03bf \u03c3\u03c4\u03b1 Security Excellence Award 2019\" \/>\n<meta property=\"og:description\" content=\"To \u03ad\u03c1\u03b3\u03bf \u03b1\u03c6\u03bf\u03c1\u03ac \u03c4\u03b7\u03bd \u03c0\u03c1\u03bf\u03bb\u03b7\u03c0\u03c4\u03b9\u03ba\u03ae \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1 \u03b1\u03c0\u03cc \u03c0\u03b1\u03c1\u03b1\u03b2\u03b1\u03c4\u03b9\u03ba\u03ad\u03c2 \u03c3\u03c5\u03bc\u03c0\u03b5\u03c1\u03b9\u03c6\u03bf\u03c1\u03ad\u03c2 \u03bc\u03b5 \u03c4\u03b7\u03bd \u03b5\u03bd\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b7 \u03b4\u03b9\u03ac\u03c6\u03bf\u03c1\u03c9\u03bd \u03c3\u03c5\u03c3\u03c4\u03b7\u03bc\u03ac\u03c4\u03c9\u03bd \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/netizen.gr\/en\/enopoiimena-systimata-asphaleias-case-study\/\" \/>\n<meta property=\"og:site_name\" content=\"Netizen\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/profile.php?id=61578280323066\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-27T08:10:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-26T19:09:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/netizen.gr\/wp-content\/uploads\/2024\/05\/netizen-security-case-study-01.png\" \/>\n\t<meta property=\"og:image:width\" content=\"867\" \/>\n\t<meta property=\"og:image:height\" content=\"458\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@netizensecurity\" \/>\n<meta name=\"twitter:site\" content=\"@netizensecurity\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"11 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/netizen.gr\/#\/schema\/person\/5c68263580428bdafb2af4ee0f1f8f20\"},\"headline\":\"\u201c\u0395\u03bd\u03bf\u03c0\u03bf\u03b9\u03b7\u03bc\u03ad\u03bd\u03b1 \u03c3\u03c5\u03c3\u03c4\u03ae\u03bc\u03b1\u03c4\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2\u201d To Case Study \u03c0\u03bf\u03c5 \u03b2\u03c1\u03b1\u03b2\u03b5\u03cd\u03c4\u03b7\u03ba\u03b5 \u03bc\u03b5 \u03c4\u03bf 1\u03bf \u03b2\u03c1\u03b1\u03b2\u03b5\u03af\u03bf \u03c3\u03c4\u03b1 Security Excellence Award 2019\",\"datePublished\":\"2024-05-27T08:10:51+00:00\",\"dateModified\":\"2025-06-26T19:09:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/\"},\"wordCount\":137,\"publisher\":{\"@id\":\"https:\/\/netizen.gr\/#organization\"},\"image\":{\"@id\":\"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/netizen.gr\/wp-content\/uploads\/2024\/05\/netizen-security-case-study-01.png\",\"articleSection\":[\"Netizen\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/\",\"url\":\"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/\",\"name\":\"\u201c\u0395\u03bd\u03bf\u03c0\u03bf\u03b9\u03b7\u03bc\u03ad\u03bd\u03b1 \u03a3\u03c5\u03c3\u03c4\u03ae\u03bc\u03b1\u03c4\u03b1 \u0391\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2\u201d \u03c4o \u0392\u03c1\u03b1\u03b2\u03b5\u03c5\u03bc\u03ad\u03bd\u03bf Case Study - Netizen\",\"isPartOf\":{\"@id\":\"https:\/\/netizen.gr\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/netizen.gr\/wp-content\/uploads\/2024\/05\/netizen-security-case-study-01.png\",\"datePublished\":\"2024-05-27T08:10:51+00:00\",\"dateModified\":\"2025-06-26T19:09:22+00:00\",\"description\":\"To \u03ad\u03c1\u03b3\u03bf \u03b1\u03c6\u03bf\u03c1\u03ac \u03c4\u03b7\u03bd \u03c0\u03c1\u03bf\u03bb\u03b7\u03c0\u03c4\u03b9\u03ba\u03ae \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1 \u03b1\u03c0\u03cc \u03c0\u03b1\u03c1\u03b1\u03b2\u03b1\u03c4\u03b9\u03ba\u03ad\u03c2 \u03c3\u03c5\u03bc\u03c0\u03b5\u03c1\u03b9\u03c6\u03bf\u03c1\u03ad\u03c2 \u03bc\u03b5 \u03c4\u03b7\u03bd \u03b5\u03bd\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b7 \u03b4\u03b9\u03ac\u03c6\u03bf\u03c1\u03c9\u03bd \u03c3\u03c5\u03c3\u03c4\u03b7\u03bc\u03ac\u03c4\u03c9\u03bd \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2.\",\"breadcrumb\":{\"@id\":\"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/#primaryimage\",\"url\":\"https:\/\/netizen.gr\/wp-content\/uploads\/2024\/05\/netizen-security-case-study-01.png\",\"contentUrl\":\"https:\/\/netizen.gr\/wp-content\/uploads\/2024\/05\/netizen-security-case-study-01.png\",\"width\":867,\"height\":458,\"caption\":\"\u03c6\u03c1\u03ac\u03c7\u03c4\u03b7\u03c2 \u03c0\u03b5\u03c1\u03b9\u03bc\u03b5\u03c4\u03c1\u03b9\u03ba\u03ae\u03c2 \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1\u03c2\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/netizen.gr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u201c\u0395\u03bd\u03bf\u03c0\u03bf\u03b9\u03b7\u03bc\u03ad\u03bd\u03b1 \u03c3\u03c5\u03c3\u03c4\u03ae\u03bc\u03b1\u03c4\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2\u201d To Case Study \u03c0\u03bf\u03c5 \u03b2\u03c1\u03b1\u03b2\u03b5\u03cd\u03c4\u03b7\u03ba\u03b5 \u03bc\u03b5 \u03c4\u03bf 1\u03bf \u03b2\u03c1\u03b1\u03b2\u03b5\u03af\u03bf \u03c3\u03c4\u03b1 Security Excellence Award 2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/netizen.gr\/#website\",\"url\":\"https:\/\/netizen.gr\/\",\"name\":\"Netizen \u03a0\u03c1\u03bf\u03b7\u03b3\u03bc\u03ad\u03bd\u03b5\u03c2 \u03a5\u03c0\u03b7\u03c1\u03b5\u03c3\u03af\u03b5\u03c2 \u0391\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2 & \u03a6\u03cd\u03bb\u03b1\u03be\u03b7\u03c2 \u03bc\u03b5 \u03a4\u03b5\u03c7\u03bd\u03bf\u03bb\u03bf\u03b3\u03af\u03b1 AI\",\"description\":\"\u0397 Netizen \u03c6\u03ad\u03c1\u03bd\u03b5\u03b9 \u03c4\u03b7 \u03bd\u03ad\u03b1 \u03b5\u03c0\u03bf\u03c7\u03ae \u03c3\u03c4\u03b9\u03c2 \u03c5\u03c0\u03b7\u03c1\u03b5\u03c3\u03af\u03b5\u03c2 \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1\u03c2\",\"publisher\":{\"@id\":\"https:\/\/netizen.gr\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/netizen.gr\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/netizen.gr\/#organization\",\"name\":\"Netizen \u03a0\u03c1\u03bf\u03b7\u03b3\u03bc\u03ad\u03bd\u03b5\u03c2 \u03a5\u03c0\u03b7\u03c1\u03b5\u03c3\u03af\u03b5\u03c2 \u03c6\u03cd\u03bb\u03b1\u03be\u03b7\u03c2\",\"alternateName\":\"\u03a0\u03c1\u03bf\u03b7\u03b3\u03bc\u03ad\u03bd\u03b5\u03c2 \u03a5\u03c0\u03b7\u03c1\u03b5\u03c3\u03af\u03b5\u03c2 \u0391\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2 & \u03a6\u03cd\u03bb\u03b1\u03be\u03b7\u03c2 \u03bc\u03b5 \u03a4\u03b5\u03c7\u03bd\u03bf\u03bb\u03bf\u03b3\u03af\u03b1 AI\",\"url\":\"https:\/\/netizen.gr\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/netizen.gr\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/netizen.gr\/wp-content\/uploads\/2025\/01\/Netizen-Logo-696X696.webp\",\"contentUrl\":\"https:\/\/netizen.gr\/wp-content\/uploads\/2025\/01\/Netizen-Logo-696X696.webp\",\"width\":696,\"height\":696,\"caption\":\"Netizen \u03a0\u03c1\u03bf\u03b7\u03b3\u03bc\u03ad\u03bd\u03b5\u03c2 \u03a5\u03c0\u03b7\u03c1\u03b5\u03c3\u03af\u03b5\u03c2 \u03c6\u03cd\u03bb\u03b1\u03be\u03b7\u03c2\"},\"image\":{\"@id\":\"https:\/\/netizen.gr\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/profile.php?id=61578280323066\",\"https:\/\/x.com\/netizensecurity\",\"https:\/\/www.instagram.com\/netizen_security\"],\"description\":\"\u0397 Netizen \u03b5\u03af\u03bd\u03b1\u03b9 \u03bc\u03af\u03b1 \u03b5\u03bb\u03bb\u03b7\u03bd\u03b9\u03ba\u03ae \u03b5\u03c4\u03b1\u03b9\u03c1\u03b5\u03af\u03b1 \u03c3\u03c5\u03c3\u03c4\u03b7\u03bc\u03ac\u03c4\u03c9\u03bd \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2 \u03c0\u03bf\u03c5 \u03b5\u03be\u03b5\u03b9\u03b4\u03b9\u03ba\u03b5\u03cd\u03b5\u03c4\u03b1\u03b9 \u03c3\u03c4\u03b7\u03bd \u03b7\u03bb\u03b5\u03ba\u03c4\u03c1\u03bf\u03bd\u03b9\u03ba\u03ae \u03c6\u03cd\u03bb\u03b1\u03be\u03b7, \u03c4\u03b7\u03bd 24\u03c9\u03c1\u03b7 \u03b5\u03c0\u03b9\u03c4\u03ae\u03c1\u03b7\u03c3\u03b7 \u03c7\u03ce\u03c1\u03c9\u03bd \u03ba\u03b1\u03b9 \u03c4\u03b9\u03c2 \u03bf\u03bb\u03bf\u03ba\u03bb\u03b7\u03c1\u03c9\u03bc\u03ad\u03bd\u03b5\u03c2 \u03c5\u03c0\u03b7\u03c1\u03b5\u03c3\u03af\u03b5\u03c2 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2 \u03b3\u03b9\u03b1 \u03b5\u03c0\u03b9\u03c7\u03b5\u03b9\u03c1\u03ae\u03c3\u03b5\u03b9\u03c2, \u03bf\u03c1\u03b3\u03b1\u03bd\u03b9\u03c3\u03bc\u03bf\u03cd\u03c2, \u03be\u03b5\u03bd\u03bf\u03b4\u03bf\u03c7\u03b5\u03af\u03b1 \u03ba\u03b1\u03b9 \u03ba\u03c1\u03af\u03c3\u03b9\u03bc\u03b5\u03c2 \u03c5\u03c0\u03bf\u03b4\u03bf\u03bc\u03ad\u03c2. \u039c\u03b5 \u03c0\u03c1\u03c9\u03c4\u03bf\u03c0\u03bf\u03c1\u03b9\u03b1\u03ba\u03ad\u03c2 \u03bb\u03cd\u03c3\u03b5\u03b9\u03c2 \u03cc\u03c0\u03c9\u03c2 \u03bf \u0397\u03bb\u03b5\u03ba\u03c4\u03c1\u03bf\u03bd\u03b9\u03ba\u03cc\u03c2 \u03a6\u03cd\u03bb\u03b1\u03ba\u03b1\u03c2 - Total Defender \u03ba\u03b1\u03b9 \u03c4\u03b5\u03c7\u03bd\u03bf\u03bb\u03bf\u03b3\u03af\u03b5\u03c2 AI Video Analytics & IoT, \u03b7 Netizen \u03b1\u03bd\u03c4\u03b9\u03ba\u03b1\u03b8\u03b9\u03c3\u03c4\u03ac \u03c4\u03b7 \u03c3\u03c4\u03b1\u03c4\u03b9\u03ba\u03ae \u03c6\u03cd\u03bb\u03b1\u03be\u03b7 \u03bc\u03b5 \u03ad\u03be\u03c5\u03c0\u03bd\u03b1, \u03b1\u03c0\u03bf\u03b4\u03bf\u03c4\u03b9\u03ba\u03ac \u03ba\u03b1\u03b9 \u03b2\u03b9\u03ce\u03c3\u03b9\u03bc\u03b1 \u03c3\u03c5\u03c3\u03c4\u03ae\u03bc\u03b1\u03c4\u03b1 \u03b1\u03c3\u03c6\u03ac\u03bb\u03b5\u03b9\u03b1\u03c2 \u03c0\u03bf\u03c5 \u03c0\u03c1\u03bf\u03c3\u03c6\u03ad\u03c1\u03bf\u03c5\u03bd \u03c3\u03c5\u03bd\u03b5\u03c7\u03ae \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1, \u03bc\u03b5\u03b9\u03c9\u03bc\u03ad\u03bd\u03bf \u03ba\u03cc\u03c3\u03c4\u03bf\u03c2 \u03ba\u03b1\u03b9 \u03c0\u03bb\u03ae\u03c1\u03b7 \u03b1\u03be\u03b9\u03bf\u03c0\u03b9\u03c3\u03c4\u03af\u03b1. \u0397 \u03b5\u03c4\u03b1\u03b9\u03c1\u03b5\u03af\u03b1 \u03b4\u03b9\u03b1\u03b8\u03ad\u03c4\u03b5\u03b9 \u03c0\u03b9\u03c3\u03c4\u03bf\u03c0\u03bf\u03b9\u03ae\u03c3\u03b5\u03b9\u03c2 ISO, \u03b5\u03af\u03bd\u03b1\u03b9 \u03bc\u03ad\u03bb\u03bf\u03c2 \u03c4\u03bf\u03c5 European KNX Association \u03ba\u03b1\u03b9 \u03bb\u03b5\u03b9\u03c4\u03bf\u03c5\u03c1\u03b3\u03b5\u03af \u03c0\u03bb\u03ae\u03c1\u03c9\u03c2 \u03b1\u03b4\u03b5\u03b9\u03bf\u03b4\u03bf\u03c4\u03b7\u03bc\u03ad\u03bd\u03b7 \u03b1\u03c0\u03cc \u03c4\u03bf \u03a5\u03c0\u03bf\u03c5\u03c1\u03b3\u03b5\u03af\u03bf \u03a0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1\u03c2 \u03c4\u03bf\u03c5 \u03a0\u03bf\u03bb\u03af\u03c4\u03b7 \u03ba\u03b1\u03b9 \u03c4\u03b7\u03bd \u0395\u03bb\u03bb\u03b7\u03bd\u03b9\u03ba\u03ae \u0391\u03c3\u03c4\u03c5\u03bd\u03bf\u03bc\u03af\u03b1.\",\"email\":\"info@netizen.gr\",\"telephone\":\"+30 210 40 82 804\",\"legalName\":\"NE\u03a4I\u0396EN CENTRAL STATION \u039c\u039f\u039d\u039f\u03a0\u03a1\u039f\u03a3\u03a9\u03a0\u0397 \u0399\u0394\u0399\u03a9\u03a4\u0399\u039a\u0397 \u039a\u0395\u03a6\u0391\u039b\u0391\u0399\u039f\u03a5\u03a7\u0399\u039a\u0397\",\"numberOfEmployees\":{\"@type\":\"QuantitativeValue\",\"minValue\":\"11\",\"maxValue\":\"50\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/netizen.gr\/#\/schema\/person\/5c68263580428bdafb2af4ee0f1f8f20\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/netizen.gr\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/30822b56bd97022ae47360068c3261343c2ecdc86f7bdd145d12087ebb181dbd?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/30822b56bd97022ae47360068c3261343c2ecdc86f7bdd145d12087ebb181dbd?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/www.kustom.gr\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"\"Unified Security Systems\" the Award Winning Case Study - Netizen","description":"The project concerns proactive protection against offending behaviour by integrating various security systems.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/netizen.gr\/en\/enopoiimena-systimata-asphaleias-case-study\/","og_locale":"en_US","og_type":"article","og_title":"\u201c\u0395\u03bd\u03bf\u03c0\u03bf\u03b9\u03b7\u03bc\u03ad\u03bd\u03b1 \u03c3\u03c5\u03c3\u03c4\u03ae\u03bc\u03b1\u03c4\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2\u201d To Case Study \u03c0\u03bf\u03c5 \u03b2\u03c1\u03b1\u03b2\u03b5\u03cd\u03c4\u03b7\u03ba\u03b5 \u03bc\u03b5 \u03c4\u03bf 1\u03bf \u03b2\u03c1\u03b1\u03b2\u03b5\u03af\u03bf \u03c3\u03c4\u03b1 Security Excellence Award 2019","og_description":"To \u03ad\u03c1\u03b3\u03bf \u03b1\u03c6\u03bf\u03c1\u03ac \u03c4\u03b7\u03bd \u03c0\u03c1\u03bf\u03bb\u03b7\u03c0\u03c4\u03b9\u03ba\u03ae \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1 \u03b1\u03c0\u03cc \u03c0\u03b1\u03c1\u03b1\u03b2\u03b1\u03c4\u03b9\u03ba\u03ad\u03c2 \u03c3\u03c5\u03bc\u03c0\u03b5\u03c1\u03b9\u03c6\u03bf\u03c1\u03ad\u03c2 \u03bc\u03b5 \u03c4\u03b7\u03bd \u03b5\u03bd\u03bf\u03c0\u03bf\u03af\u03b7\u03c3\u03b7 \u03b4\u03b9\u03ac\u03c6\u03bf\u03c1\u03c9\u03bd \u03c3\u03c5\u03c3\u03c4\u03b7\u03bc\u03ac\u03c4\u03c9\u03bd \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2.","og_url":"https:\/\/netizen.gr\/en\/enopoiimena-systimata-asphaleias-case-study\/","og_site_name":"Netizen","article_publisher":"https:\/\/www.facebook.com\/profile.php?id=61578280323066","article_published_time":"2024-05-27T08:10:51+00:00","article_modified_time":"2025-06-26T19:09:22+00:00","og_image":[{"width":867,"height":458,"url":"https:\/\/netizen.gr\/wp-content\/uploads\/2024\/05\/netizen-security-case-study-01.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@netizensecurity","twitter_site":"@netizensecurity","twitter_misc":{"Written by":"admin","Est. reading time":"11 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/#article","isPartOf":{"@id":"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/"},"author":{"name":"admin","@id":"https:\/\/netizen.gr\/#\/schema\/person\/5c68263580428bdafb2af4ee0f1f8f20"},"headline":"\u201c\u0395\u03bd\u03bf\u03c0\u03bf\u03b9\u03b7\u03bc\u03ad\u03bd\u03b1 \u03c3\u03c5\u03c3\u03c4\u03ae\u03bc\u03b1\u03c4\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2\u201d To Case Study \u03c0\u03bf\u03c5 \u03b2\u03c1\u03b1\u03b2\u03b5\u03cd\u03c4\u03b7\u03ba\u03b5 \u03bc\u03b5 \u03c4\u03bf 1\u03bf \u03b2\u03c1\u03b1\u03b2\u03b5\u03af\u03bf \u03c3\u03c4\u03b1 Security Excellence Award 2019","datePublished":"2024-05-27T08:10:51+00:00","dateModified":"2025-06-26T19:09:22+00:00","mainEntityOfPage":{"@id":"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/"},"wordCount":137,"publisher":{"@id":"https:\/\/netizen.gr\/#organization"},"image":{"@id":"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/#primaryimage"},"thumbnailUrl":"https:\/\/netizen.gr\/wp-content\/uploads\/2024\/05\/netizen-security-case-study-01.png","articleSection":["Netizen"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/","url":"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/","name":"\"Unified Security Systems\" the Award Winning Case Study - Netizen","isPartOf":{"@id":"https:\/\/netizen.gr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/#primaryimage"},"image":{"@id":"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/#primaryimage"},"thumbnailUrl":"https:\/\/netizen.gr\/wp-content\/uploads\/2024\/05\/netizen-security-case-study-01.png","datePublished":"2024-05-27T08:10:51+00:00","dateModified":"2025-06-26T19:09:22+00:00","description":"The project concerns proactive protection against offending behaviour by integrating various security systems.","breadcrumb":{"@id":"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/#primaryimage","url":"https:\/\/netizen.gr\/wp-content\/uploads\/2024\/05\/netizen-security-case-study-01.png","contentUrl":"https:\/\/netizen.gr\/wp-content\/uploads\/2024\/05\/netizen-security-case-study-01.png","width":867,"height":458,"caption":"\u03c6\u03c1\u03ac\u03c7\u03c4\u03b7\u03c2 \u03c0\u03b5\u03c1\u03b9\u03bc\u03b5\u03c4\u03c1\u03b9\u03ba\u03ae\u03c2 \u03c0\u03c1\u03bf\u03c3\u03c4\u03b1\u03c3\u03af\u03b1\u03c2"},{"@type":"BreadcrumbList","@id":"https:\/\/netizen.gr\/enopoiimena-systimata-asfaleias-case-study\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/netizen.gr\/"},{"@type":"ListItem","position":2,"name":"\u201c\u0395\u03bd\u03bf\u03c0\u03bf\u03b9\u03b7\u03bc\u03ad\u03bd\u03b1 \u03c3\u03c5\u03c3\u03c4\u03ae\u03bc\u03b1\u03c4\u03b1 \u03b1\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2\u201d To Case Study \u03c0\u03bf\u03c5 \u03b2\u03c1\u03b1\u03b2\u03b5\u03cd\u03c4\u03b7\u03ba\u03b5 \u03bc\u03b5 \u03c4\u03bf 1\u03bf \u03b2\u03c1\u03b1\u03b2\u03b5\u03af\u03bf \u03c3\u03c4\u03b1 Security Excellence Award 2019"}]},{"@type":"WebSite","@id":"https:\/\/netizen.gr\/#website","url":"https:\/\/netizen.gr\/","name":"Netizen Advanced Security &amp; Guarding Services with AI Technology","description":"Netizen brings a new era to security services.","publisher":{"@id":"https:\/\/netizen.gr\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/netizen.gr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/netizen.gr\/#organization","name":"Netizen Advanced Security Services","alternateName":"\u03a0\u03c1\u03bf\u03b7\u03b3\u03bc\u03ad\u03bd\u03b5\u03c2 \u03a5\u03c0\u03b7\u03c1\u03b5\u03c3\u03af\u03b5\u03c2 \u0391\u03c3\u03c6\u03b1\u03bb\u03b5\u03af\u03b1\u03c2 & \u03a6\u03cd\u03bb\u03b1\u03be\u03b7\u03c2 \u03bc\u03b5 \u03a4\u03b5\u03c7\u03bd\u03bf\u03bb\u03bf\u03b3\u03af\u03b1 AI","url":"https:\/\/netizen.gr\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netizen.gr\/#\/schema\/logo\/image\/","url":"https:\/\/netizen.gr\/wp-content\/uploads\/2025\/01\/Netizen-Logo-696X696.webp","contentUrl":"https:\/\/netizen.gr\/wp-content\/uploads\/2025\/01\/Netizen-Logo-696X696.webp","width":696,"height":696,"caption":"Netizen \u03a0\u03c1\u03bf\u03b7\u03b3\u03bc\u03ad\u03bd\u03b5\u03c2 \u03a5\u03c0\u03b7\u03c1\u03b5\u03c3\u03af\u03b5\u03c2 \u03c6\u03cd\u03bb\u03b1\u03be\u03b7\u03c2"},"image":{"@id":"https:\/\/netizen.gr\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/profile.php?id=61578280323066","https:\/\/x.com\/netizensecurity","https:\/\/www.instagram.com\/netizen_security"],"description":"Netizen is a Greek security systems company specializing in electronic security, 24-hour surveillance and integrated security services for businesses, organizations, hotels and critical infrastructure. With innovative solutions such as the Electronic Guardian - Total Defender and AI Video Analytics &amp; IoT technologies, Netizen replaces static guarding with smart, efficient and sustainable security systems that offer continuous protection, reduced costs and full reliability. The company has ISO certifications, is a member of the European KNX Association and is fully licensed by the Ministry of Citizen Protection and the Greek Police.","email":"info@netizen.gr","telephone":"+30 210 40 82 804","legalName":"NE\u03a4I\u0396EN CENTRAL STATION \u039c\u039f\u039d\u039f\u03a0\u03a1\u039f\u03a3\u03a9\u03a0\u0397 \u0399\u0394\u0399\u03a9\u03a4\u0399\u039a\u0397 \u039a\u0395\u03a6\u0391\u039b\u0391\u0399\u039f\u03a5\u03a7\u0399\u039a\u0397","numberOfEmployees":{"@type":"QuantitativeValue","minValue":"11","maxValue":"50"}},{"@type":"Person","@id":"https:\/\/netizen.gr\/#\/schema\/person\/5c68263580428bdafb2af4ee0f1f8f20","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/netizen.gr\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/30822b56bd97022ae47360068c3261343c2ecdc86f7bdd145d12087ebb181dbd?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/30822b56bd97022ae47360068c3261343c2ecdc86f7bdd145d12087ebb181dbd?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/www.kustom.gr"]}]}},"_links":{"self":[{"href":"https:\/\/netizen.gr\/en\/wp-json\/wp\/v2\/posts\/21610","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/netizen.gr\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/netizen.gr\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/netizen.gr\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/netizen.gr\/en\/wp-json\/wp\/v2\/comments?post=21610"}],"version-history":[{"count":8,"href":"https:\/\/netizen.gr\/en\/wp-json\/wp\/v2\/posts\/21610\/revisions"}],"predecessor-version":[{"id":22304,"href":"https:\/\/netizen.gr\/en\/wp-json\/wp\/v2\/posts\/21610\/revisions\/22304"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/netizen.gr\/en\/wp-json\/wp\/v2\/media\/21611"}],"wp:attachment":[{"href":"https:\/\/netizen.gr\/en\/wp-json\/wp\/v2\/media?parent=21610"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/netizen.gr\/en\/wp-json\/wp\/v2\/categories?post=21610"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/netizen.gr\/en\/wp-json\/wp\/v2\/tags?post=21610"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}