Airports & Ports Security Applications
The DSC550 was tested to the new ASTM F2656-20 standard which measures the penetration level from the foremost edge of the barrier versus the back-side of the barrier like the previous standard. This can provide a difference of (1.52 m.) and makes the negative penetration level even more impressive. Design and features The DSC550 Open Frame barrier features a shallow foundation of only 24 inches (61 cm). The open-frame design additionally provides a unique counter-balance design with no spring...
One of the key problems in airport security is the sheer size of the perimeter and a large number of incidents are in fact linked to unauthorized access onto the airfield, either runways or where aircrafts are being loaded or refueled posing an extremely high risk. Most airports will combine multiple sensors and technologies to protect the actual perimeter fence and even beyond the perimeter fence, to warn of potential threats. OPTEX LiDAR sensor integration with RSA module Some airports have...
Doncaster Culture and Leisure Trust (DCLT), The Dome, required a new solution that would protect several areas, including one of the largest gym’s in Doncaster, The Fitness Village. Vanderbilt ACT365 system DCLT had a specific brief for this project that specified enhancing the staff and customer experience, while simultaneously providing access control solutions to restricted areas from the general public, members, and staff alike. Oliver Law Security (OLS) Ltd. did not hesitate to rec...
An important heritage site which played a key role in protecting the UK during World War II is itself being made safe and secure with the installation of a comprehensive and fully integrated security system, including more than 75 Dahua HD CCTV cameras. Battle of Britain Bunker The Battle of Britain Bunker is an underground operations room in Uxbridge, formerly used by No. 11 Group Fighter Command during the Second World War, most notably in the Battle of Britain and on D-Day. The operations...
Places of leisure, where one spends one’s downtime, are public by design. Unlike a bank vault or power plant, they actively invite visitors. One can’t just lock them down and hope no one turns up. Equally, to ensure user and property safety, access must not be a free for all. Managing risk - separating authorized from unauthorized people and locations - is part of every site manager’s daily routine. Intelligent locking makes this workload a whole lot easier. Intelligent keys...
The world is constantly changing, with people, data and goods moving more fluidly than ever before. The security solution needs to move with it. New Incedo Business connects all security software and hardware within one platform. One can easily scale it up or down, based on one’s needs, to keep people moving and business growing. Together. People need different access times and entry points, and the access and security requirements change day to day – so, a static solution is no lon...
Aiphone, an international manufacturer of intercom and security communication products, is announcing a touchless sensor that allows a way for visitors, vendors, and employees to initiate a contactless call with a simple gesture. Gesture activated calling Compatible with the IX Series door stations for easy installation, the sensor encourages users to “Wave Hello” to activate a call, reducing exposure to germs and the spread of bacteria in high-touch areas. This touchless solution can be easily included anywhere an IX Series door station is installed, offering a reliable method to call inside the facility to the master station without contacting the exterior intercom. Beneficial for high-volume environments This solution is valuable in high-volume environments: Educational facilities and daycare centers Condos, and other multi-tenant residential facilities Office buildings and high-rises Clinics, hospitals, and pharmacies Parking lots and garages Security communication Where security communication is required and lowering the spread of bacteria is critical, visitors or staff can request access by calling with a simple wave of the hand. From here, calls can be screened with crisp audio and clear video. This solution can also be used to greet employees who’ve lost their access control card or to facilitate contactless deliveries. Additionally, the sensor’s detection zone helps avoid unwanted activations from external sources, such as wind or outdoor debris. Its low-profile design and aesthetic look can complement any building exterior.
ComplyAdvantage, a data technology company transforming financial crime detection announced a new early-stage anti-money laundering (AML) program aimed at growth-focused startups called ComplyLaunch™. The program provides qualified startups with free access to the company’s award-winning AML and Know Your Customer (KYC) tools and resources needed to uncover and reduce the threat of money-laundering activities so they can onboard new customers with lower risk and greater trust. AML training and education In addition, ComplyAdvantage has partnered with the global financial crime compliance consultancy FINTRAIL to provide AML education and ongoing training for program participants. FINTRAIL is a recognized authority on financial crime prevention in financial technology (FinTech) and the application of regulatory technology (RegTech), working with industry-leading clients across the globe to transform, build, scale, and assure AFC compliance frameworks that are relevant for digital products. Why ComplyLaunch, Why Now? The impetus for ComplyLaunch was to prepare startups to take on money laundering The impetus for the program was to prepare startups to take on one of the biggest challenges their businesses will face, which is money laundering. If transacting startups want to maximize their competitive advantage with new or expanded services, then they need intelligent AML and risk management data solutions to prevent the unintended consequences of unknowingly onboarding criminal entities. Free access to AML As a serial entrepreneur, ComplyAdvantage founder and CEO Charles Delingpole has experienced first-hand the many challenges that startup teams face and that the early-stage prevention of money-laundering shouldn’t be one of them. As such, Delingpole believes that providing free access to ComplyAdvantage’s AML tools will allow more fintech startups to reach success faster by reducing the business exposure due to unforeseen financial crimes. “At ComplyAdvantage, we believe that free early access to AML tools and education on setting up a compliance program is a benefit to our entire fintech ecosystem,” said Charles Delingpole, founder, and CEO of ComplyAdvantage. Maintaining fintech integrity “By democratizing access to best-in-class financial crime prevention tools, we are allowing fintech startups to not only match but exceed the compliance program standards of the largest, most regulated banks. ComplyLaunch is a very important program designed to maintain the integrity of Fintech insurgents by reducing the growing threat of financial crimes.” Startup collaborations The first startups to join ComplyLaunch include trustshare, a company that’s revolutionizing escrow payments, and Juno a company that delivers comprehensive solutions to integrate multi-channel payment services with ERPs and e-Commerce platforms. “Because we’re focused on simplifying bank payments between friends, family, customers, and businesses it made complete sense for our team to join the ComplyLaunch program,” said Pete Bailey, founder, and CPO of Juno. “Partnering with ComplyAdvantage to implement their gold-standard AML detection solution means that we can onboard customers with greater confidence.” Criteria for applications Those early-stage fintech startups with no institutional funding are invited to apply for the program. To apply, applicants must meet the following criteria: Less than $1M in annual revenue Pre-seed - Seed stage A company website or web profile Less than 10 years old “We’re excited to join as a launch partner for ComplyLaunch and to provide program members with access to our world-class AML training”, said James Nurse, Managing Director of FINTRAIL EMEA. “There are future fintech unicorns waiting to grow and early money-laundering and risk prevention resources will only help them to reach their success, faster.” Helping emerging start-ups As a sign of growing community interest, the ComplyLaunch program will be promoted with the support of world-class organizations including the leading talent investor Entrepreneur First and Seccl an innovative technology platform providing outsourced custody for financial services firms looking to safeguard their clients' assets. "There has never been a greater time to start a fintech company and we've seen more and more of the world's most ambitious people wanting to startup in this space,” said Jonny Clifford, of Entrepreneur First. “With the growing complexity of financial service interdependencies, ComplyLaunch is a great idea at the perfect time to help these emerging, disruptive fintech startups to scale more easily and more confidently.” Early access to AML And finally, Max Rimple a Principal at Index Ventures and a lead investor in ComplyAdvantage also shared his thoughts on the program launch, "with the staggering amount of investment capital going into fintech and related financial services, it's important that startups have early access to intelligent AML and risk management tools so they can grow with integrity and confidence." ComplyLaunch is a starting point for fintech founders to safeguard their businesses from the risks of financial crimes "The ComplyLaunch program is a great starting point for fintech founders to safeguard their businesses from the risks of financial crimes. It's also good for their investors who appreciate that early compliance practices help to set the stage for future success." Risk Management ComplyAdvantage offers a true hyperscale financial risk insight and AML data solution that leverages machine learning and natural language processing to help regulated organizations manage their risk obligations and prevent financial crime. The company’s proprietary database is derived from millions of data points that provide dynamic, real-time insights across sanctions, watchlists, politically exposed persons, and negative news. This reduces dependence on manual review processes and legacy databases by up to 80% and improves how companies screen and monitor clients and transactions.
A security solutions developer, designer, and provider, Videcon, has launched their new Concept Pro ColourSmart camera range, providing clear full-color imagery 24 hours a day. The complete CCTV range combines Videcon’s Deep Learning technology and powerful software, to allow footage to always remain in color with clear and crisp imagery, day, or night. ColourSmart Features The ColourSmart cameras have a larger lens and image sensor which allows them to let in as much light as possible, software that provides a crisp and clear image, and warm white light which will activate if there isn’t sufficient ambient lighting to keep the image in color. Each camera is also equipped with Videcon’s innovative Deep Learning technology, which means that sensors focus only on events that matter and it can distinguish people and vehicles from other moving objects. Camera system for everyone Videcon Managing Director, Matt Rushall said, “We’re so excited to be launching our new Concept Pro ColourSmart range and we hope this is the start of our customers seeing their security in an entirely new way.” “Our team have been hard at work ensuring the cameras have the best color imagery possible, along with our Deep Learning software and its compatibility with other security systems to make it a security system that’s for everyone at all times.”
SpotterRF, a company that specializes in designing Compact Surveillance Radar systems for highly critical sites, announces the integration of their Radar technology with the ULISSE COMPACT HD range of PTZ cameras manufactured by Videotec, creator of professional video surveillance cameras. In this integrated solution, the radar helps the camera to always look in the right direction by tracking potential threats in the vicinity. This greatly increases the value of the cameras by creating a fully automated system that enhances situational awareness and prevents incidents before they happen in large critical areas. Perimeter security Using cutting-edge radar technology, SpotterRF can pinpoint the GPS location of unwanted intrusions around the property and potential threats beyond the perimeter. In a perfectly synchronized operation and without human intervention, the radars rapidly and continuously send these exact coordinates to the connected Videotec PTZ cameras. The response is immediate and they can be programmed to zoom in for greater detail, capture sharp Full HD images of the target and send them in real time to the operator’s monitor. The system promptly sends alerts to operators of an alarm, and due to the near-zero false alarm rate of the radars, this occurs only when there is actually something of interest happening on the site. PTZ camera for surveillance The Videotec ULISSE COMPACT HD PTZ camera offers excellent visual surveillance capability coupled with high functional and mechanical performance in outdoor areas. With its wide field of vision and fast positioning, it is capable of capturing great quality Full HD images in the most adverse environments. The combined system from SpotterRF and Videotec has been proven in many real-world deployments worldwide, such as electrical substations, military zones, and other large sensible areas.
The 2021 edition of Saudi International Airshow will double in size, with more than 100,000 square meter surface exhibition space, two new exhibition halls, in addition to the existing hall and a static display. Despite COVID-19 and several months of slow business, many requests for exhibiting have been received as Saudi International Airshow will be the first airshow to be held in 2021, the organizers said. Hosted by Saudi Aviation Club and held under the Patronage of His Royal Highness Prince Sultan bin Salman bin Abdulaziz Al Saud, Chairman of the Saudi Space Commission, Founder and Chairman of Saudi Aviation Club, Saudi International Airshow will take place at Thumamah Airport, Riyadh from 16 to 28 February 2021. Aerospace products and services For its second edition, Saudi International Airshow will introduce two new areas: Space & Satellite, and Aviation & Aerospace Cybersecurity, and will host more than 500 international booths where exhibitors will showcase a full range of aerospace products and services. The exhibition will have stations located next to the runway to offer a full range of aircraft available for test flights. World’s top aviation companies have confirmed their commitment to Saudi International Airshow 2021 The world’s top aerospace and aviation companies have confirmed their commitment to Saudi International Airshow 2021, the organizers added. International Pavilions, representing countries such as USA, France, UK, Russia, China, Czech Republic will have dedicated zones at the show. Saudi International Airshow has become one of the top Aviation & Aerospace events within the Middle East, as Saudi Arabia is the largest market within the region. Unmanned Aerial Vehicle Saudi International Airshow connects the Aviation and Aerospace industry to Saudi Arabia. It provides the perfect platform to learn, network and conduct business across all areas of the industry and promote successful worldwide trade. The show will also provide an opportunity to meet the Unmanned Aerial Vehicle (UAV) community and learn about UAV technology. The outstanding 2019 edition established Saudi International Airshow as one of the key events within the aviation & aerospace industry. The first edition was attended by more than 20,000 people, featured more than 80 aircraft, 57 participating countries, and 267 local and international companies who signed 15 Memorandums of Understanding (MoUs).
Dahua Technology, with its award winning deep learning algorithms, proudly releases WizMind – a portfolio of solutions composed of project-oriented products including IPC, NVR, PTZ, XVR, thermal and software platforms, delivering precise, reliable and comprehensive AI solutions to verticals including government, retail, energy, finance and transportation. WizMind's human-oriented solutions Powered by AI and deep learning algorithms, WizMind provides comprehensive human-oriented solutions including facial recognition, privacy protection, human video metadata, people counting and stereo analysis, enabling rapid and precise reaction. In addition, it provides more precise and effective AI search to locate targets, generating various human data for business analysis. According to IHS, the total market value of professional video surveillance equipment will grow to $27.2 million by 2023 To protect portrait data, WizMind provides outstanding privacy protection. Based on deep learning algorithms, WizMind supports real-time mosaic masking of the human face or body detected in the monitoring area, which is needed in courtroom scenarios and may be valuable to retailers which can optimize their business through intelligent analysis of customer flow, recorded without violating privacy or GDPR. WizMind based on vehicles WizMind boasts multiple vehicle-based AI solutions, such as ANPR and vehicle metadata, illegal parking which provide more attributes of vehicles for easy control, quick search and business analysis. It is widely used in urban areas, residential community entrances, parking lots and toll stations. By extracting and comparing plate numbers with databases, ANPR helps managers of parking lots and city roads improve vehicle management efficiency with functions like Blacklist Alarm and VIP Recognition. ANPR also supports vehicle tracking, which helps police efficiently locate vehicles according to the crosschecking result. ANPR is able to recognize plate numbers in over 58 countries. WizMind with thermal technology WizMind combines deep learning algorithms with thermal imaging technology to help users achieve ultra-long-distance monitoring in harsh environments, non-contact temperature monitoring and early fire prevention. The Dahua WizMind series is compatible with mainstream third party technology partners With an accuracy of 0.3 degrees Celcius and a speed that monitors three people per second, Dahua’s High Accuracy Body Temperature Monitoring Solution has been widely and successfully applied within transportation hubs, financial institutions, commercial complexes, schools and other places all over the world, joining the global efforts in pandemic prevention and control. WizMind Ecosystem Initiating openness and collaboration, the Dahua WizMind series is compatible with mainstream third party technology partners, such as Milestone, AxxonSoft, ISS and others. Furthermore, WizMind Ecosystem provides the DHOP and sufficient API for our technology partners, enabling them to combine real AI joint solutions to our common customers, and a series of marketing activities will be engaged with our ecosystem partners. Dahua WizMind, a high-end AI series, aims to serve demanding scenarios in many vertical industries. With the mission of “enabling a safer society and smarter living”, Dahua Technology will continue to focus on “innovation, quality and service” to serve its partners and customers around the world.
Display solutions play a key role in SOCs in providing the screens needed for individuals and teams to visualize and share the multiple data sources needed in an SOC today. Security Operation Center (SOC) Every SOC has multiple sources and inputs, both physical and virtual, all of which provide numerous data points to operators, in order to provide the highest levels of physical and cyber security, including surveillance camera feeds, access control and alarm systems for physical security, as well as dashboards and web apps for cyber security applications. Today’s advancements in technology and computing power not only have increasingly made security systems much more scalable, by adding hundreds, if not thousands, of more data points to an SOC, but the rate at which the data comes in has significantly increased as well. Accurate monitoring and surveillance This has made monitoring and surveillance much more accurate and effective, but also more challenging for operators, as they can’t realistically monitor the hundreds, even thousands of cameras, dashboards, calls, etc. in a reactive manner. Lacking situational awareness is often one of the primary factors in poor decision making In order for operators in SOC’s to be able to mitigate incidents in a less reactive way and take meaningful action, streamlined actionable data is needed. This is what will ensure operators in SOC truly have situational awareness. Situational awareness is a key foundation of effective decision making. In its simplest form, ‘It is knowing what is going on’. Lacking situational awareness is often one of the primary factors in poor decision making and in accidents attributed to human error. Achieving ‘true’ situational awareness Situational awareness isn’t just what has already happened, but what is likely to happen next and to achieve ‘true’ situational awareness, a combination of actionable data and the ability to deliver that information or data to the right people, at the right time. This is where visualization platforms (known as visual networking platforms) that provide both the situational real estate, as well as support for computer vision and AI, can help SOCs achieve true situational awareness Role of computer vision and AI technologies Proactive situational awareness is when the data coming into the SOC is analyzed in real time and then, brought forward to operators who are decision makers and key stakeholders in near real time for actionable visualization. Computer vision is a field of Artificial Intelligence that trains computers to interpret and understand digital images and videos. It is a way to automate tasks that the human visual system can also carry out, the automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. There are numerous potential value adds that computer vision can provide to operation centers of different kinds. Here are some examples: Face Recognition: Face detection algorithms can be applied to filter and identify an individual. Biometric Systems: AI can be applied to biometric descriptions such as fingerprint, iris, and face matching. Surveillance: Computer vision supports IoT cameras used to monitor activities and movements of just about any kind that might be related to security and safety, whether that's on the job safety or physical security. Smart Cities: AI and computer vision can be used to improve mobility through quantitative, objective and automated management of resource use (car parks, roads, public squares, etc.) based on the analysis of CCTV data. Event Recognition: Improve the visualization and the decision-making process of human operators or existing video surveillance solutions, by integrating real-time video data analysis algorithms to understand the content of the filmed scene and to extract the relevant information from it. Monitoring: Responding to specific tasks in terms of continuous monitoring and surveillance in many different application frameworks: improved management of logistics in storage warehouses, counting of people during event gatherings, monitoring of subway stations, coastal areas, etc. Computer Vision applications When considering a Computer Vision application, it’s important to ensure that the rest of the infrastructure in the Operation Center, for example the solution that drives the displays and video walls, will connect and work well with the computer vision application. The best way to do this of course is to use a software-driven approach to displaying information and data, rather than a traditional AV hardware approach, which may present incompatibilities. Software-defined and open technology solutions Software-defined and open technology solutions provide a wider support for any type of application the SOC may need Software-defined and open technology solutions provide a wider support for any type of application the SOC may need, including computer vision. In the modern world, with everything going digital, all security services and applications have become networked, and as such, they belong to IT. AV applications and services have increasingly become an integral part of an organization’s IT infrastructure. Software-defined approach to AV IT teams responsible for data protection are more in favor of a software-defined approach to AV that allow virtualised, open technologies as opposed to traditional hardware-based solutions. Software’s flexibility allows for more efficient refreshment cycles, expansions and upgrades. The rise of AV-over-IP technologies have enabled IT teams in SOC’s to effectively integrate AV solutions into their existing stack, greatly reducing overhead costs, when it comes to technology investments, staff training, maintenance, and even physical infrastructure. AV-over-IP software platforms Moreover, with AV-over-IP, software-defined AV platforms, IT teams can more easily integrate AI and Computer Vision applications within the SOC, and have better control of the data coming in, while achieving true situational awareness. Situational awareness is all about actionable data delivered to the right people, at the right time, in order to address security incidents and challenges. Situational awareness is all about actionable data delivered to the right people Often, the people who need to know about security risks or breaches are not physically present in the operation centers, so having the data and information locked up within the four walls of the SOC does not provide true situational awareness. hyper-scalable visual platforms Instead there is a need to be able to deliver the video stream, the dashboard of the data and information to any screen anywhere, at any time — including desktops, tablets phones — for the right people to see, whether that is an executive in a different office or working from home, or security guards walking the halls or streets. New technologies are continuing to extend the reach and the benefits of security operation centers. However, interoperability plays a key role in bringing together AI, machine learning and computer vision technologies, in order to ensure data is turned into actionable data, which is delivered to the right people to provide ‘true’ situational awareness. Software-defined, AV-over-IP platforms are the perfect medium to facilitate this for any organizations with physical and cyber security needs.
Human beings have a long-standing relationship with privacy and security. For centuries, we’ve locked our doors, held close our most precious possessions, and been wary of the threats posed by thieves. As time has gone on, our relationship with security has become more complicated as we’ve now got much more to be protective of. As technological advancements in security have got smarter and stronger, so have those looking to compromise it. Cybersecurity Cybersecurity, however, is still incredibly new to humans when we look at the long relationship that we have with security in general. As much as we understand the basics, such as keeping our passwords secure and storing data in safe places, our understanding of cybersecurity as a whole is complicated and so is our understanding of the threats that it protects against. However, the relationship between physical security and cybersecurity is often interlinked. Business leaders may find themselves weighing up the different risks to the physical security of their business. As a result, they implement CCTV into the office space, and alarms are placed on doors to help repel intruders. Importance of cybersecurity But what happens when the data that is collected from such security devices is also at risk of being stolen, and you don’t have to break through the front door of an office to get it? The answer is that your physical security can lose its power to keep your business safe if your cybersecurity is weak. As a result, cybersecurity is incredibly important to empower your physical security. We’ve seen the risks posed by cybersecurity hacks in recent news. Video security company Verkada recently suffered a security breach as malicious attackers obtained access to the contents of many of its live camera feeds, and a recent report by the UK government says two in five UK firms experienced cyberattacks in 2020. Cloud computing – The solution Cloud stores information in data centres located anywhere in the world, and is maintained by a third party Cloud computing offers a solution. The cloud stores your information in data centres located anywhere in the world and is maintained by a third party, such as Claranet. As the data sits on hosted servers, it’s easily accessible while not being at risk of being stolen through your physical device. Here’s why cloud computing can help to ensure that your physical security and the data it holds aren’t compromised. Cloud anxiety It’s completely normal to speculate whether your data is safe when it’s stored within a cloud infrastructure. As we are effectively outsourcing our security by storing our important files on servers we have no control over - and, in some cases, limited understanding of - it’s natural to worry about how vulnerable this is to cyber-attacks. The reality is, the data that you save on the cloud is likely to be a lot safer than that which you store on your device. Cyber hackers can try and trick you into clicking on links that deploy malware or pose as a help desk trying to fix your machine. As a result, they can access your device and if this is where you’re storing important security data, then it is vulnerable. Cloud service providers Cloud service providers offer security that is a lot stronger than the software in the personal computer Cloud service providers offer security that is a lot stronger than the software that is likely in place on your personal computer. Hyperscalers such as Microsoft and Amazon Web Service (AWS) are able to hire countless more security experts than any individual company - save the corporate behemoth - could afford. These major platform owners have culpability for thousands of customers on their cloud and are constantly working to enhance the security of their platforms. The security provided by cloud service providers such as Claranet is an extension of these capabilities. Cloud resistance Cloud servers are located in remote locations that workers don’t have access to. They are also encrypted, which is the process of converting information or data into code to prevent unauthorized access. Additionally, cloud infrastructure providers like ourselves look to regularly update your security to protect against viruses and malware, leaving you free to get on with your work without any niggling worries about your data being at risk from hackers. Data centres Cloud providers provide sophisticated security measures and solutions in the form of firewalls and AI Additionally, cloud providers are also able to provide sophisticated security measures and solutions in the form of firewalls and artificial intelligence, as well as data redundancy, where the same piece of data is held within several separate data centres. This is effectively super-strong backup and recovery, meaning that if a server goes down, you can access your files from a backup server. Empowering physical security with cybersecurity By storing the data gathered by your physical security in the cloud, you're not just significantly reducing the risk of cyber-attacks, but also protecting it from physical threats such as damage in the event of a fire or flood. Rather than viewing your physical and cybersecurity as two different entities, treat them as part of one system: if one is compromised, the other is also at risk. They should work in tandem to keep your whole organization secure.
The transition to remote working has been a revelation for many traditional office staff, yet concerns over data security risks are rising. Mark Harper of HSM explains why businesses and their remote workers must remain vigilant when it comes to physical document security in homes. Pre-pandemic, home offices were often that neglected room in people’s homes. But now things are different. After the initial lockdown in 2020, 46.6% of UK workers did some work at home with 86% of those doing so because of the pandemic. Semi-Permanent workspaces Since then, many have found that over time, those semi-permanent workspaces have become slightly more permanent – with official hybrid working coming into effect for an assortment of businesses and their teams. The adoption of hybrid working can in fact be seen as one of the few positives to come from the pandemic, with less travel, more freedom and higher productivity top of the benefits list for businesses and their employees. The handling of sensitive documents, is a growing concern for office managers But those welcomed benefits don’t tell the whole story. The transition to remote working has undoubtedly impacted workplace security, with various touch points at risk. The handling of sensitive documents for example, is a growing concern for office managers. In simpler times, sensitive data was more or less contained in an office space, but with millions of home setups to now think about, how can businesses and their office managers control the issue of desk data? Physical document security As of January 2021, it’s said that one in three UK workers are based exclusively at home. That’s millions of individuals from a variety of sectors, all of which must continue in their efforts to remain data secure. With that, reports of cyber security fears are consistently making the news but that shouldn’t be the sole focus. There is also the underlying, but growing, issue of physical document security. The move to remote working hasn’t removed these physical forms of data – think hard drives, USBs and paper based documentation. A recent surge in demand for home printers for example, only exemplifies the use of physical documents and the potential security issues home offices are facing. Adding to that, research conducted in 2020 found that two out of three employees who printed documents at home admitted to binning those documents both in and outside of their house without shredding them. Data security concern Without the right equipment, policies and guidance, businesses are sure to be at risk Those findings present a huge data security concern, one that must be fixed immediately. The Information Commissioner’s Office (ICO) has since released guidance for those working from their bedrooms and dining tables. Designed to help overcome these challenges, the ‘security checklists’ and ‘top tips’ should be the first port of call for many. Yet throughout, the ICO make reference to ‘following your organization’s policies and guidance’ – highlighting that the onus isn’t solely on the individuals working from their makeshift offices. Office managers have a monumental task on their hands to ensure teams are well equipped within their home setups. Without the right equipment, policies and guidance, businesses are sure to be at risk. But it would be wrong to insinuate that unsecure desk data has only now become an issue for organizations. Modern office spaces Keeping clear desks has long been a battle for many office managers. In fact, clear desk policies are practiced in most modern office spaces, with it recognized as a key preventative to personal information being wrongly accessed and so falling foul of GDPR legislation. Throwing sensitive documents in the bin was never an option pre-pandemic However, the unsupervised aspect of home working has led to a potentially more lax approach to these policies, or in some cases, they can’t be followed at all. For those taking a more laid back approach, organization leaders must remind staff of their data security responsibilities and why clear desk policies have previously proven effective. Ultimately, throwing sensitive documents in the bin was never an option pre-pandemic and this must be carried through to home workspaces now. Securely destroy documents There are also concerns over the equipment people have access to at home. For example, without a reliable home shredding solution, data security suddenly becomes a tougher task. To add to that, several recommendations state that employees working from home should avoid throwing documents away by instead transporting them to the office for shredding once lockdown rules ease. While this is an option, it does pose further issues, with document security at risk of accidental loss or even theft throughout the transportation period, not to mention the time spent in storage. The best and most effective way to securely destroy documents is at the source, especially in environments where higher levels of personal data is regularly handled. Correct shredding equipment The recent findings on home office behavior represent a true security risk Only when home workers implement their own clear desk policies alongside the correct shredding equipment (at the correct security level), can both home office spaces and regular offices become data secure. Realistically, these solutions should, like the common home printer, become a staple in home office spaces moving forward. The likelihood is that many UK workers will remain in their home offices for the foreseeable future, only to emerge as hybrid workers post-pandemic. And while the current working environment is more ideal for some than others, the recent findings on home office behavior represent a true security risk to organizations. With this in mind, it’s now more key than ever for business leaders, their office managers and homeworkers to all step up and get a handle on home data security policies (as well as maintaining their standards back at the office) – starting with the implementation of clear desk policies. After all, a clear desk equals a clear mind.
When 150,000 video surveillance cameras get hacked, it’s big news. Even if the main reason for the hack was to make a point. Even if the major consequence is bad publicity for a video company (and, by extension, the entire video surveillance industry). The target of the hack was Silicon Valley startup Verkada, which has collected a massive trove of security-camera data from its 150,000 surveillance cameras inside hospitals, companies, police departments, prisons and schools. Previously, Verkada has been known for an aggressive sales approach and its intent to disrupt the traditional video market. The data breach was accomplished by an international hacker collective and was first reported by Bloomberg. The reported reasons for the hack were “lots of curiosity, fighting for freedom of information and against intellectual property, a huge dose of anti-capitalism, a hint of anarchism – and it’s also just too much fun not to do it,” according to Bloomberg. Tesla amongst those impacted The “fun” included access to a video showing the inside of a Florida hospital, where eight hospital staffers tackled a man and pinned him to the bed. Inside a Massachusetts police station, officers are seen questioning a man in handcuffsA view inside a Tesla warehouse in Shanghai, China, showed workers on an assembly line. Inside a Massachusetts police station, officers are seen questioning a man in handcuffs. There are even views from Verkada security cameras inside Sandy Hook Elementary School in Connecticut, where a gunman killed more than 20 people in 2012. In a “security update” statement, Verkada reports: “Our internal security experts are actively investigating the matter. Out of an abundance of caution, we have implemented additional security measures to restrict account access and further protect our customers.” Hacking was possible due to built-in feature The hacker group was able to obtain “root” access on the cameras, meaning they could use the cameras to execute their own code, reports Bloomberg. Obtaining this degree of access to the camera did not require any additional hackingUsing that access, they could pivot and obtain access to the broader corporate network of Verkada’s customers or hijack the cameras and use them as a platform to launch future hacks, the hackers told Bloomberg. Obtaining this degree of access to the camera did not require any additional hacking, as it was a built-in feature. Elisa Costante, VP of research for cybersecurity firm Forescout, calls the Verkada security camera hack "shocking." "Connected cameras are supposed to provide an additional layer of security to organizations that install them,” she says. “Yet, as the Verkada security camera breach has shown, the exact opposite is often true. [It is worrisome that] the attack wasn't even very sophisticated and didn't involve exploiting a known or unknown vulnerability. The bad actors simply used valid credentials to access the data stored on a cloud server.” Super Admin account had access to all cameras Hackers gained access to Verkada through a “Super Admin” account, allowing them to peer into the cameras of all of its customers. They found a username and password for an administrator account publicly exposed on the internet, according to Bloomberg. The hackers lost access to the video feeds and archives after Bloomberg contacted Verkada.Hackers lost access to the video feeds and archives after Bloomberg contacted Verkada The results could have been worse, says Costante. "In this case, the bad actors have seemingly only resorted to viewing the footage these cameras have captured. But they are likely able to cause a lot more damage if they choose to do so, as our own research team has discovered. We were able to intercept, record and replace real-time footage from smart cameras by exploiting unencrypted video streaming protocols and performing a man-in-the-middle attack. This effectively gives criminals a virtual invisibility cloak to physically access premises and wreak havoc in the real world.” Impact on broader video surveillance industry The impact of a well-publicised cyber-attack on the broader video surveillance industry is also a concern. “As an industry, and as manufacturers in physical security, we cannot take these hacks lightly,” says Christian Morin, CSO & Vice-President of Integrations & Cloud Services, Genetec. “The potential broad-reaching impact of these hacks on physical security systems, including providing a beachhead to facilitate lateral movement onto networks, resulting in data and privacy breaches or access to critical assets and infrastructure, cannot be overstated. It is our responsibility and duty to users of our technology to prioritise data privacy and cybersecurity in the development, distribution, and deployment of video surveillance systems.” Widespread government and healthcare use The Verkada cameras are in widespread use within government and healthcare, which are by far the company’s most dominant verticals. Lesser verticals for them are manufacturing, financial and retail.The Verkada website pledges to take privacy seriously Verkada’s line of hybrid cloud security cameras combines edge-based processing with the capabilities of cloud computing. Cameras analyse events in real-time, while simultaneously leveraging computer vision technology for insights that bring speed and efficiency to incidents and investigations. Command, Verakda’s centralised web-based platform, provides users with access to footage they need. Motion detection, people analytics, and vehicle analytics enable searches across an organization to find relevant footage. The Verkada website pledges to take privacy seriously: “We are passionate about developing products that enhance the security and privacy of organizations and individuals. We believe that well-built, user-friendly systems make it easier to manage and secure physical environments in ways that respect the privacy of individuals while simultaneously keeping them safe.”
A result of the COVID-19 pandemic has been fewer crowds gathering for outdoor events. However, sooner or later, crowded events will surge, as will the danger of injury or death from vehicle attacks. The threats of vehicular violence are still present even though collisions have become less frequent and traffic, in general, is at a significant low. Preparing for such instances remains a high priority, and institutions are seeking to take a preemptive stance to prevent major incidents before they happen. Vehicle security barriers Even amid the pandemic, manufacturers of vehicle barriers have not seen a major impact on their sales. “Half of the battle against aggressors perpetrating a vehicle attack is pre-planning,” says Greg Hamm, Vice President of Sales and Marketing, Delta Scientific. He says Delta is fortunate to have long-standing trust relationships with many agencies, built over the last 46 years. “We're happy to see that demand for vehicle security barriers has not changed much – customers are preparing for the future when crowds will be present again, and probably larger than ever,” adds Stuart Glen, National Sales Manager of Jackson’s Fencing. “Lots of councils are using the downtime to install or upgrade security around town and city centers, which is promising.” Physical structures such as bollards, barriers, and barricades can stop a vehicle from entering a high-foot-traffic area. Temporary venues can deploy portable barriers. "We're happy to see that demand for vehicle security barriers has not changed much" Fully automated system The first consideration is the level of security required for a particular location. A parking garage for a foreign embassy or federal courthouse will require far more serious security measures than a parking lot for a mall. Other primary factors to consider include the frequency of vehicles moving in and out and whether there will be vehicle inspections performed or a fully automated system at the entrance. “A key challenge when protecting people from vehicle attacks is trying to ensure that the public are kept safe, but do not feel worried or overly aware of any risks,” says Glen. “People should feel protected and be able to move freely. Discreet measures such as bollards are ideal as they don't restrict pedestrian flow but are very effective in the case of a hostile vehicle attack.” Sparking future assaults The use of vehicles as tools of destruction has become one of the top concerns for security specialists Events and sports venues need increased protection as they are likely targets due to the high numbers of crowds. Places of worship are sadly another target that should be given extra protection, says Glen. The use of vehicles as tools of destruction has become one of the top concerns for security specialists. This tactic has grown popular regardless of ideology and is especially alarming when coupled with cars’ accessibility. In many places, individuals only need a valid driver’s license to rent a truck. News of a particular attack encourages or inspires other individuals to perpetuate the same form of violence. Unfortunately, this creates a feedback loop as more reports emerge following these tragedies, potentially sparking future assaults. Straightforward security solutions In the case of vehicle-ramming attacks, there are straightforward security solutions to protect patrons. Delta Scientific offers over 100 product designs, emphasizing barriers that stop and destroy attacking vehicles. Delta’s barriers carry crash ratings from PU50 up to K54 and include sophisticated control systems that provide custom optimization. Control systems feature the latest, most advanced protection technology. Early warning systems enable active security measures built into Delta products plus alert features to on-site security personnel. Delta Scientific’s High Security Protection and Barricade Systems are used internationally by governments, armed forces, federal agencies, private corporations, and other industries. Jackson’s Fencing’s range of solutions includes fencing, bollards, road blockers, and gates. They have been tested to PAS 68 standards and can stop a 7.5-ton vehicle traveling at 50mph (80km/h). The products come with a 25-year guarantee. Attractive timber appearance They offer crash ratings up to M50 and include both automated barriers and passive bollards In addition, their unique Linebacker PNR system is a cable crash fence, encased within a timber post and rail fence, offering a completely discreet yet highly effective vehicle security barrier with an attractive timber appearance. Facilities that require day-to-day employee and civilian access need permanent solutions installed to thwart daily terror threats, says Hamm of Delta Scientific. Solutions include wedge barriers, bollards, beams, and sliding gates with high duty cycles and excellent reliability coupled with appropriate crash ratings. Local fairs and festivals, parades, conventions, sports, and vaccination sites utilize portable barriers that can be towed into place and set up within 30 minutes. They offer crash ratings up to M50 and include both automated barriers and passive bollards. They can be plugged into a local 120v source and provide a portable solution that allows vehicle throughput by pushing a button. Vehicle-borne attacks Both temporary and permanent barriers are extremely effective, says Glen of Jackson’s Fencing. Temporary barriers can be deployed rapidly and removed when a threat has passed (for example, an event such as the London marathon, where large crowds gather), while permanent measures are used for sites that will always be a high-risk target. Glen says temporary barriers also generally have a more dominating appearance and wider footprint. Permanent measures are used for sites that will always be a high-risk target. Temporary barriers can be used immediately after a risk assessment highlights vehicle-borne attacks as a threat to a site before permanent measures are installed. They can help to identify the ideal positioning of permanent barriers – often it's a case of trial and error before finding a solution that works well for one’s particular needs. The United States Department of Homeland Security (DHS) has provided certification according to the Support Anti-terrorism by Fostering Effective Technology Act (SAFETY Act) of 2002. Access control products This certification minimizes insurance risks for organizations that deploy authorized Delta vehicle access control products to protect against terrorists and errant drivers. All products certified are covered retroactively back to 1984 and are now authorized to carry the SAFETY Act Designated mark. By minimizing insurance risks to deploying authorized Delta vehicle access systems, this certification lets customers feel comfortable knowing that they have the full faith and backing of the Department of Homeland Security. A common planning deficiency occurs when designers choose non-certified barriers or barricades A common planning deficiency occurs when designers choose non-certified barriers or barricades. Certified equipment has been tested and proven to work under extreme conditions, thus giving planners the confidence they rely on. No area is more critical to the vehicle barrier selection process than testing. Without adequate testing, there is no assurance that the barrier will resist the threat. Independent testing company Testing is normally done by an independent testing company or government agency, such as the Department of State (DOS) and ASTM. Comprehensive reports of test results are issued and are available from the testing agency or manufacturer. A common misconception among the general public is that the barriers are ‘ugly,’ but this often comes from the appearance of temporary barriers that are installed for testing purposes before deciding on permanent measures. Temporary barriers often have a large footprint because they have no foundations and can be quite obtrusive. There are actually many discreet and attractive permanent solutions such as road blockers and stainless steel rising bollards, which allow flexible control over entry and security, and can be rapidly activated.
Following its recent acquisition, Vidsys will continue to operate, now as an ‘An ARES Security Company’. The Vidsys brand is known worldwide for its PSIM (physical security information management) solution and the acquisition will accelerate the next generation of products that incorporate Artificial Intelligence (AI) to enhance their value to Vidsys clients and the overall market. ARES Security Corporation has developed and deployed security and public safety software solutions for the past 20 years, solving complex physical security challenges. Their AVERT security software solution supports the full lifecycle of physical security operations: risk and technology assessment and design, training, and intelligent real-time incident response. AVERT security software AVERT security software helps clients by increasing security effectiveness and reducing cost AVERT security software helps clients by increasing security effectiveness and reducing cost. Clients are in many market segments including Corporate, Military, Government, Power, Data Centers, Transportation and Ports. Vidsys’ PSIM will immediately be improved by incorporating AVERT C2 (Command & Control), allowing clients access to expanded capabilities and an advanced technical roadmap. “Over time we will migrate the Vidsys technology to our state-of-the-art, multi-tenant SaaS architecture that includes secure, multi-site data sharing, an updated library of connectors, and integration to the AVERT digital twin, artificial intelligence/machine learning and automation capability,” said Ben Eazzetta, ARES Security Corporation’s Chief Executive Officer (CEO). Technical roadmap for upgrading to AI-PSIM platform “We are a client-centric company, and we will continue to support Vidsys clients,” stated Ben Eazzetta, adding “We will focus initial efforts towards closing any required and promised capability gaps and offer a significantly improved technical roadmap for the platform to be upgraded to AI-PSIM.” Additional AVERT products will be made available to Vidsys clients in a ‘cost-effective way’. They include technology for assessment and design, virtual tabletop and virtual reality training and enhanced AI and robotics capability surrounding the digital twin. A ‘digital twin’ is a digital representation of a physical object. Rapid incident response and robotic sentries interfaces ARES/Vidsys solution offers capabilities with extremely high levels of automation for rapid incident response ARES has a strong market position in several verticals that require a robust and automated next-generation AI-PSIM. The ARES/Vidsys solution offers capabilities with extremely high levels of automation that enable rapid incident response and incorporate advanced features, such as interfaces to robotic sentries. “These capabilities, along with a more automated deployment process, will allow Vidsys to scale their acquisition of customers across key verticals in which ARES is already active. This automated deployment process will also open new opportunities to work with system integrators who have shied away from PSIM projects in recent years,” stated Ben Eazzetta. Optimizing security operations ARES believes the physical security market is underserved by technology that optimizes operations. Ben Eazzetta adds, “All of our products are designed to optimize security operation, and the acquisition of Vidsys allows us to accelerate the development of the next generation PSIM that is adaptive and intelligent, powered by AVERT’s AI, and Modeling and Simulation system.” Vidsys pioneered PSIM in the security industry and created a robust library of connectors, providing an integrated real-time incident response system powered by a rules engine. Together, the AVERT/Vidsys solution seeks to transform the way security operations centers (SOCs) operate and respond to emergencies. Vidsys pioneered PSIM in the security industry and created a robust library of connectors Managing security at multiple sites Ben Eazzetta said, “There’s no denying that some in the security industry see PSIM as a four-letter word. But PSIM exists because it meets a need in the security operations center that cannot be met by either video management or incident management systems. It is critical that PSIM evolves to meet the rapidly changing demands of enterprise clients.” He adds, “Our clients need to manage security at multiple sites, each with different security plans and threats, they need adaptive rules engines to manage complex incidents and emergency responses, and they need automation to seamlessly command and control all security assets, including robotic assets.” Flexible and intelligent software Future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation “The future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation that enables very rapid incident response and incorporates advanced capabilities such as interfaces to robotic sentries,” said Ben Eazzetta. He adds, “To achieve this, we are replacing the brittle, difficult-to-configure rules engine of today’s PSIM with machine learning and AI capabilities that can produce automated/optimized responses or recommendations in near real time.” SaaS-enabled and remotely hosted system The systems will be SaaS-enabled, remotely hosted and easily configurable to reduce the cost and time of deployments for large enterprise implementations and easily supported by end-users, and system integrators. In a post-Covid-19 world, it is critical that enterprise security software solutions be adaptive, intelligent, automated and offer the ability for disparate teams to share information and collaborate in a meaningful way, while responding to incidents and emergencies in real-time. The ARES/Vidsys offering is a lifecycle solution that meets the needs of enterprise security operations. Next-generation of AI-PSIM “ARES has always pushed the needle of what is possible with our AVERT solution, ever since development of our digital twin technology began in 1999 to protect our nation’s nuclear stockpiles,” said Ben Eazzetta, adding “Today, we continue to innovate with the next generation of AI-PSIM.” So what’s ahead for ARES and Vidsys in 2021? “A lot of Zoom calls!” laughs Eazzetta, adding “We are excited to leverage the decades of hard work that both teams have put into our solutions. We all realize the fantastic opportunity we have been given to create a next-generation AI-PSIM and to open new markets for all of our products and solutions.” He adds, “Combining the two companies will lead to improved development/support capability and significantly improved roadmaps for our clients. We will provide immediate ROI for clients by lowering deployment costs and leveraging the entire suite of products to provide more immediate value while continuing to deliver as promised, like ARES always does.”
ARST is a public transportation company in Cagliari, Italy. The company operates a massive fleet of about 800 public buses throughout the island of Sardinia. During the vehicle modernization process, the company decided to deploy new centralized CCTV systems to enhance the security level of passengers and drivers. Challenges First of all, the low-definition images captured by the original surveillance equipment cannot meet the company’s advanced monitoring needs. Second, the bus driver could not achieve point-to-point communication with the command center in real-time. In addition, in case of an accident, there was no emergency button on the bus before to report the emergency to the command center. Solution To help ARST revamp its bus security system, a customized Dahua mobile solution consisting of more than 3,000 cameras and 750 MXVRs, Panic Buttons, DSS integrated platform as well as other accessories was employed. The data collected from the front-end cameras are integrated in the control room via DSS4004, where emergency calls, geo-localization of vehicles, and statistics can be managed. Video recorder MXVR6212 supports real-time vehicle location tracking and monitoring, GPS and video can be uploaded via a wireless network Each bus is equipped with a Penta-hybrid video recorder MXVR6212, 4, 6, or 8 HAC-HDBW2241F cameras and panic buttons. The main features of the systems are data encryption, people counting, hot spot, router 3G/4G, dynamic management of the LCD monitor on board, and geo-localization via the DSS app. As the first mobile XVR adopting HDCVI/AHD/TVI/CVBS/IP signals, MXVR6212 can achieve 1080P high-definition real-time recording. It supports real-time vehicle location tracking and monitoring, and all information such as GPS and video can be uploaded via a wireless network – 3G/4G/WIFI. In addition, the device can also support the connection of various accessories, such as card readers, fuel sensors, and emergency buttons. Furthermore, it has passed EN50155/ISO16750 to meet the requirements for mobile use. Other than the city bus, this device can be used in various applications, such as school buses, taxis, police cars, trains, trucks, etc. Mobile camera The 2MP HAC-HDBW2241F-M-A mobile camera is designed with a shock-proof compact case, which makes it convenient to be installed and adaptable to various applications. Boasting the strengths of the Dahua self-developed HDCVI technology, the camera offers high-quality images and ensures real-time transmission. Also, it adopts a high-performance sensor to provide incomparable performance even under extreme lowlight environment. The Starlight feature allows capturing of more details and recognizing accurate colors at night or in scenes with limited illumination. DSS platform At the control room, Dahua DSS platform was utilized to control and manage the mobile devices deployed on the bus. It displays real-time location, speed, direction of mobile device, playback device’s history location, and supports alarm for over-speeding, entering, and leaving the E-FENCE. Aside from central management, the Business Intelligence feature of Dahua DSS platform also allows the user to export Heat Map reports and people counting statistics, helping operator companies to optimize the driving route to generate more profit. Benefits With upgraded Dahua system, the command center can communicate with every single vehicle of ARST Bus Company in real-time, enabling them to deliver instructions to the driver, allowing the driver to report immediately to the command center in case of an emergency through the panic button, and ensuring the safety of passengers and drivers. The Dahua mobile solution with high-definition monitoring performance reduces theft and robbery on buses and enables bus companies to collect accurate information about traffic flows and automatically download data to assist efficient and profitable operations. The Dahua mobile solution mounted onboard has been proven to be highly efficient and reliable, which were also applied in two other Italian bus companies: AMAT Bus Company in Taranto and AMTAB Bus Company in Bari.
Recently, Planet Fitness, with the help of their preferred system integrator Adirondack Direct, incorporated a video surveillance solution from Hanwha Techwin and Genetec that not only enhances security, but also improves operations. When leadership evaluated security at their 70-plus corporate run locations a few years ago, they chose to incorporate a video surveillance solution that would address security needs and would be advanced enough to help with management and operations. Each of Planet Fitness’ corporate-owned clubs throughout North America is outfitted with approximately eight to 15 video cameras that provide around the clock coverage of the parking lot, lobby, break room, the fitness area where members workout and other key areas – without invading private areas, such as locker rooms and other intimate spaces. After issuing a Request for Proposal, Planet Fitness Senior Vice President of Corporate Club Operations Jim Esposito said they tested several of the leading camera and video management software (VMS) solutions, but ultimately decided on Hanwha video surveillance cameras managed by the Genetec Security Center platform. Esposito said they wanted to use Hanwha’s 360-degree cameras in particular because they provide more coverage, yet they save in hardware expenses because fewer cameras are needed. 360-degree fisheye camera Hanwha’s SNF-8010 5 MP 360-degree fisheye camera provides 5MP at 20FPS which captures smoother video at a higher framerate with true day and night function. Built-in on-camera de-warping allows instant access to PTZ, quad view, and panorama views. Alarm triggers for the Hanwha SNF-8010 include intelligent motion detection, audio detection, tampering detection, alarm input and network disconnection.Adirondack Direct also offers a 24-hour monitoring service and liaisons with law enforcement when needed A typical system setup at Planet Fitness includes placing cameras 25 feet from the wall and 50 feet apart which provides almost 2,000 square feet of coverage per camera. Club managers, regional managers and corporate employees manage the system via the Genetec Security Center which provides convenient bookmarks of recorded incidents so that – instead of time spent searching through video – events are already tagged. Adirondack Direct also offers a 24-hour monitoring service and liaisons with law enforcement when needed. “We knew that Planet Fitness would need thousands of video surveillance cameras for this project and it’s very important to consider reliability and functionality as well as durability,” said Adirondack Direct Director of Security and Technology, Tim Collins. “Hanwha has the lowest customer return number and that means that they manufacture products that aren’t sidelined by constant replacement and repairs.” Collins said Adirondack Direct has long recommended Genetec’s Security Center for video surveillance management because it provides the best open-architecture platform, robust features and is easy to use. Security Center blends IP security systems within a single intuitive interface to simplify operations and empowers organizations through enhanced situational awareness, unified command and control and connectivity to the cloud. When a Lunk Alarm is pressed, Genetec’s Security Center creates a bookmark of the event which provides video evidence of what preceded the alarm and how it was managed Business intelligence While the Hanwha-Genetec solution has provided an excellent security system – as well as protection against liability for slip and fall incidents – it’s also improved operations in multiple ways by providing invaluable business intelligence, said Esposito. Planet Fitness has a judgement-free environment for individuals who want to work out, but don’t want to have to endure the negatives so often found in gyms: loud grunts, the clanging of dropped weights and aggressive behavior. Anyone engaging in obnoxious behavior will likely be the recipient of a Lunk Alarm and the flashing lights, sirens and unwanted attention that accompanies it.Use of the Lunk Alarm – or lack of use – can be an indicator of how the club is operating Use of the Lunk Alarm – or lack of use – can be an indicator of how the club is operating. In order to monitor and evaluate use of the Lunk Alarms, Adirondack Direct has integrated the Lunk Alarm into the Hanwha-Gentec video solution. When a Lunk Alarm is pressed, Genetec’s Security Center creates a bookmark of the event which provides video evidence of what preceded the alarm and how it was managed. Potential medical emergencies Gyms typically have automated external defibrillators (AEDs) in the event a member suffers a medical emergency. At Planet Fitness facilities outfitted with the Hanwha-Genetec solution, once an AED is removed from its cabinet, a sensor is activated to shut off the music in the club to provide a calmer atmosphere. The system also creates a bookmark in the VMS and notifies managers and regional managers that an AED has been deployed. The Hanwha-Genetec Planet Fitness solution also provides key employee analysis that can help managers identify areas of improvement. Each facility has rubber floors that must be cleaned daily and Adirondack Direct has placed a sensor on a floor scrubber that creates a bookmark and recording in Security Center when the device is moved. Video evidence verifies whether the floor was actually cleaned or if the scrubber was just relocated. Break room sensors Each break room is outfitted with a sensor that creates a video bookmark every time the door is opened. If an employee visits too often, Planet Fitness management can reorient that employee on the proper policies and procedures. For day to day efficiencies, video analytics can be a valuable tool. If an employee is constantly leaving the front desk to go to a storage closet for a particular item, they can make changes including moving the item closer to the front desk. “If during an overnight shift the camera indicates that there was no motion at the front desk for a prolonged period of time, then that’s a problem,” said Esposito. “We expect someone to be in that position greeting and welcoming members so if someone isn’t there, the video can help us understand why.”If an employee visits the break room too often, Planet Fitness management can reorient that employee on the proper policies and procedures A big question for Planet Fitness – that can be answered via video analytics – is have they been losing sales opportunities without realizing it? “What we’re exploring now is a virtual line that counts the number of people that come and go in the club,” said Esposito. “We know how many people check in. So, if a club checks in 500 people in a day, but there are 600 people that enter the door, that can be lost revenue.” Esposito said they chose Hanwha cameras and the Genetec platform because they knew that they needed a solution that was at the forefront of technology, with the flexibility to grow with them and meet their future needs. He added the solution delivers a safe environment that is appreciate by everyone. “It’s somewhat of a security blanket for our members and employees,” he said. “They appreciate our no intimidation mantra and the fact that we have created this safe and secure environment that offers a judgement free zone where people can do their own thing.”
When you’re securing premises in Iceland, you need a reliable system that can cope with both plummeting temperatures and low-light levels. Hikvision cameras were used in such a solution – chosen by Securitas Iceland to secure a harbor for customer Samskip in Reykjavik. Global logistics company Samskip is one of the larger transport companies in Europe with offices in 24 countries in Europe, North and South America, Asia and Australia. They operate an extensive network of container services to and from Iceland, along with refrigerated cargo logistics and international forwarding around the world. Special kind of surveillance system One of their locations is a harbor in Reykjavik, which includes warehouses. Operating in sub-zero temperatures and with low-light even in daytime for some of the year, Samskip needs a special kind of surveillance system. When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely When temperatures are as low as -30˚C, electronics can become unresponsive, or stop working completely. These are also the temperatures where maintenance is more challenging – these are not ideal environments for technicians to be working outside. The biggest snow depth ever recorded in Iceland was 279cm in North Iceland in March 1995, for example. Although this was the worst winter ever recorded, it gives an idea of the potential extremes. There are also snow storms and the high wind chill factor to contend with. Providing clear images in failing light Low light in the winter months means that solutions in Iceland need to be better able to provide clear images in failing light. During winter, Iceland’s high latitude means shorter days - the longest day in the middle of December has only 5 hours of light, for example, with the sunrise at around 11am and sunset between 3 and 4pm. Despite these unique conditions, Samskip needed to have a good overview over all that is happening around the harbor complex, both inside and outside. Specifically, they needed to be able to trace products and goods in the warehouse. Iceland’s security provider, Securitas, rose to the challenge, providing a solution using more than 150 Hikvision products, including PanoVu and DarkFighter® cameras. All these cameras can operate to a temperature of -30˚C. Identifying potential issues The PanoVu cameras provide excellent wide angle surveillance to cover as much of the area as possible. DarkFighter technology is a popular choice in Iceland because it gives clear, useful images even in the lowest of light scenarios. The smart function on the cameras means that operators are able to identify potential issues by analyzing people's behavior. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications They can also trace a product between locations and see its condition at receipt and delivery, enhancing both security and business efficiency. To complement the Hikvision solutions, Securitas chose Seagate as their preferred storage vendor with their Skyhawk. The solution included Seagate’s high-stability Skyhawk drives, especially developed for surveillance applications. Providing reliable security Skyhawk surveillance drives are equipped with enhanced ImagePerfect™ firmware to deliver ultimate reliability and zero dropped frames, and SkyHawk Health Management, a software designed for prevention, intervention and recovery. Bergvin Þórðarson, Samskip’s Security Manager, says: “The cameras meet the requirements for analysis of people and merchandise. We are confident with both Hikvision and Securitas – in both their product and people. We know that they will fix any issues and react quickly if there’s a problem.” Securing large areas can be a challenge all on its own, but the addition of potentially crippling weather conditions means a security solution needs to be robust. Hikvision cameras were up to the challenge and provided reliable security for the entire operation.
A video surveillance system with around 40 IP and thermal cameras from Dahua Technology has been installed at Yarmouth Harbor on the Isle of Wight. The harbor consists of a large marina, docks for the Wightlink Ferry terminal, and pontoons and boat moorings upstream. The previous system was becoming outdated, with poor picture quality and cabling issues. Following a number of thefts from boats and boat fires in neighboring harbors, a new solution – including a thermal imaging capability – was specified. Sensitive fire alarm system Automatic people-counting technology has been incorporated into the cameras to as a health and safety measure The Dahua cameras are a mix of thermal bullets, IR bullets, Ultra PTZs, IR domes and fisheye cameras. The thermal cameras are especially suited to wide area outdoor video surveillance and are ideal for the large, water-based environments at the harbor. The cameras feature Vox uncooled thermal sensor technology and high thermal sensitivity at less than 40mK, enabling them to capture more image details and temperature fluctuations. With a built-in fire detection functionality, the cameras provide an extremely sensitive fire alarm system. The IR bullet cameras feature highly efficient H.265 encoding technology, PoE and IR illumination at up to 50 meters, as well as a wide dynamic range, providing vivid images even in the most intense contrast lighting conditions and delivering powerful day/night surveillance in a compact package. At one of the moorings upriver, there is no power supply on isolated pontoons, so wind power and solar energy have been harnessed to operate the cameras. Automatic people-counting technology Images are transmitted wirelessly back to a control room at the main harbor office. When the control room is not staffed, Yarmouth Harbor can nominate individuals to receive alerts and images on their tablets and smartphones via the Dahua surveillance app. The surveillance system has transformed our ability to monitor the harbour for safety and security" As well as the harbor itself, the system also covers the adjacent Yarmouth pier, a Grade II listed structure said to be the longest wooden pier in the UK and recently refurbished. Automatic people-counting technology has been incorporated into the cameras at the pier’s entrance to monitor numbers on the pier as a health and safety measure. Straightforward use “The new surveillance system has transformed our ability to monitor the harbor for the safety and security of our customers, staff and the visiting public,” said Dave Rice of Yarmouth Harbor Commissioners. “The HD picture quality is superb and you can pick out people’s faces, so there is no comparison with the previous cameras. The system has proved straightforward to use and we are delighted with its performance to date.” “This proved an interesting project to work on, not least because parts of the installation had to be carried out by boat,” said Chris Snell, managing director of security installation firm, Central Southern Security. "The Dahua equipment has been a pleasure to work with and will provide Yarmouth Harbor with a great solution for many years to come.”
Thermal imaging is a technology that can provide many benefits in a wide range of applications. In particular, thermal imaging cameras have been deployed successfully as highly affordable solutions in the security industry. Accepted throughout the industry as the best 24-hour visual surveillance imaging solutions available, thermal security cameras are vital tools in securing borders, airports, sea ports, nuclear facilities, and other critical infrastructure. Today these affordable solutions are also protecting homes, corporate campuses, industrial facilities and retail businesses. Infrared-Illuminated cameras They can easily detect intruders and other potential hazards in any weather Thermal security cameras let people see what their eyes can’t: invisible heat radiation either emitted or reflected by all objects, regardless of lighting conditions. Because they see heat, not light, thermal cameras are effective tools in any security setting. They can easily detect intruders and other potential hazards in any weather, as well as day and night. Cameras that create images based on visible light—such as conventional CCTV or infrared-illuminated cameras— have the advantage of creating images that are familiar and easy to interpret. Unfortunately, the ability of a given detector, whether the human eye or a camera sensor, to create these images relates directly to the amount of light available. At night, for instance, when there isn’t much visible light, objects appear faint, or not at all. Thermal imaging cameras In contrast, thermal cameras make pictures from heat, not light, having nothing whatsoever to do with reflected light energy. They see the heat given off by everything under the sun. Everything we encounter in daily life creates or reflects heat energy, called a ‘heat signature,’ which thermal cameras can see clearly. Another limitation of relying on visible-light detection is visual contrast. Regular cameras that capture only visible light can be fooled by visual camouflage, or situations where similar colors or patterns blend together and, thus, obscure objects or people that need to be detected. Thermal imaging cameras don’t suffer this same problem. For example, an intruder standing under a densely-branched tree may be hard to detect using an IR-illuminated camera, but with a thermal imaging camera, the intruder would be clearly visible. Providing constant protection One of the biggest benefits of thermal imaging comes in the domain of security These advantages over visible cameras have led to the wide spread use of thermal to detect the presence of people in restricted or suspect areas, assess the tactical situation, and respond accordingly. No one within the view of a thermal camera can hide their heat. Thermal security cameras are the best tool to determine how many intruders are present, and, consequently, how many officers or agents should respond to meet the threat. One of the biggest benefits of thermal imaging comes in the domain of security. Security cameras have become a staple of protection for many (if not all) major businesses across the globe. In such a domain, the need to produce images of surrounding perimeters is critical to providing constant protection against potential intruders. False alarms experienced No matter what you need to see, or what perimeter you need to protect, thermal security cameras let you see clearly, even in total darkness, and through camouflaging foliage, smoke, dust, and light fog. Another reason why thermal imaging cameras often prove cost-effective is that they help reduce the number of false alarms experienced in a business protection scenario. Visible light cameras can be easily fooled by many naturally-occurring phenomena, such as blowing trees, shadows, insects, birds, or oncoming cars. In terms of motion detection, microwave, fence sensors, motion sensors, RAFID, and radar can all detect a possible intrusion, but they are essentially ‘blind’ technologies compared to thermal imaging. When a motion sensor is triggered, a user still needs an additional method of assessing the nature of the alarm, in order to determine the most appropriate response. For example, is it a person climbing the fence or just a harmless squirrel? CCTV security system Because of thermal security cameras’ high-contrast video output, security professionals have found that they work very well with video analytics. They can provide more reliable alarming with fewer false reports than visible-light cameras, even during the day. Thermal imaging security cameras offer both alarming capabilities and reliable images – two solutions in one. Prices for thermal imaging cameras have come down substantially in recent years Thermal imaging cameras are an affordable option for many businesses that want to ensure they have the best security and protection available. Prices for thermal imaging cameras have come down substantially in recent years, to the point where they are on par with regular visible-light cameras, while providing the superior ability to capture images that in many situations regular cameras simply cannot match. In addition, the total cost of ownership of a security system with thermal imaging cameras is, in general, much lower than a CCTV security system, for two main reasons. Monitor multiple areas First, a business would require fewer thermal imaging cameras than if deploying CCTV cameras, thanks to the excellent range performance of thermal imaging cameras. Since each camera needs only a mast for mounting, power, and a video feedback connection, fewer cameras are required. Business can keep their infrastructure simple, minimizing maintenance costs. Another area of cost savings is that thermal imaging cameras work perfectly in complete darkness and don’t require any lighting to maintain security and protection. Not only is lighting expensive to install, it also requires a great deal of electricity to keep those lights on all night. Businesses that wish to monitor multiple areas of their premises would be wise to deploy one or more thermal imaging cameras to provide the best protection against potential intruders, especially at night, when visible light is either low or non-existent. In short, any business that wants to achieve the maximum level of security and protection of their intellectual and physical property should consider deploying a thermal imaging solution.
Dallmeier offers comprehensive security solutions for all areas of application around airports. Specifically, in the area of cameras a wide range of systems allow customers to tackle all of their safety and security challenges and be able to comply fully with operational and regulatory requirements. On top of that, Dallmeier supplies video management solutions that not only give operators an exhaustive overview of security-relevant events, but also allow the video data to be analyzed with a view to optimizing business processes such as ground handling operations. One of the paramount concerns for airports is perimeter protection; an issue, which was highlighted by a number of recent incidents involving unauthorized access onto airfields. It is important to be able to use video system to track an intruder, but the ultimate goal is to prevent an intrusion in the first place. IR Cameras With Integrated IR Illumination With its range of high-performance IR cameras with integrated IR illumination, Dallmeier offers the right solution for every area of applications across airports IR cameras are a key component of any video security system that must provide around-the-clock monitoring capabilities, and the Dallmeier line of advanced IR cameras is ideally suited for that. With its range of high-performance IR cameras with integrated IR illumination, Dallmeier offers the right solution for every area of applications across airports. The IR cameras are designed specifically for applications requiring images with highest resolution in real-time at day and in the IR mode at night. Dimly lit areas on the apron or sections along the airport perimeter, which might only be lit in case lighting systems are triggered by movement, are among the many possible applications. Multi-Focal Sensor Technology Panomera Airports typically encompass wide areas and stretch over long distances, which poses particular challenges for video monitoring system. In the past, in order to adequately monitor the entire area, it was necessary to use a number of cameras installed in a whole range of locations. Dallmeier’s multifocal sensor system Panomera, however, represents an entirely new technology and a fundamentally different approach to the issue of video security. The patented multi-focal sensor technology Panomera from Dallmeier is the ideal video solution for landside and airside safety and security. It was specially developed for the all-encompassing video surveillance of expansive areas. With Panomera, huge widths, as well as areas with large distances can be displayed with a completely new resolution quality, in real time and at high frame rates of up to 30 fps. With Panomera, a huge area can be surveyed from a single location and depending on the customer’s needs, the resolution can be scaled nearly limitlessly. For example, one Panomera system equipped with eight sensors is sufficient to replace up to 35 standard megapixel cameras. Optimizing Airport Operations Panomera offers unique capabilities for optimizing airport operations, such as aircraft turnaround time, as well as monitoring airfield traffic on both aprons and runways Moreover, in conjunction with intelligently designed video management and analysis systems, Panomera offers unique capabilities for optimizing airport operations, such as aircraft turnaround time, as well as monitoring airfield traffic on both aprons and runways (e.g. ground support equipment on the way to restocking aircraft galleys). The fact security personnel are provided with a comprehensive overview of the entire airport, regardless of where their individual focus may at any given time, means that they can react quickly to any incidents. Video technology can therefore assist airports with the implementation of the Europe-wide optimization concept of Airport Collaborative Decision Making (A-CDM), which is supported by a number of organizations including the European Organizations for the Safety of Air Navigation (EUROCONTROL) and the Airport Council International Europe. The latter represents over 500 airports from 45 European countries. A-CDM specifically aims to enhance the operational efficiency of airports, which opens up various application areas for video technology. Proactive video monitoring as is enabled by the Dallmeier video information systems, instead of passive surveillance, is the way forward across different industries - including airports.
Round table discussion
The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?
During the coronavirus lockdown, employees worked from home in record numbers. But the growing trend came with a new set of security challenges. We asked this week’s Expert Panel Roundtable: What is the impact of the transition to remote working/home offices on the security market?
Contact tracing has been more than a buzzword during the coronavirus pandemic. In some cases, it has been an issue of life and death. Tracking who an infected person has been in contact with is an important tool to minimize disease spread, and technology from the physical security industry claimed a role in contact tracing early on – and continues to provide benefits as companies seek to reopen. We asked this week’s Expert Panel Roundtable: How can the security industry enhance contact tracing?
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload