Airports & Ports Security Applications
When you’re securing premises in Iceland, you need a reliable system that can cope with both plummeting temperatures and low-light levels. Hikvision cameras were used in such a solution – chosen by Securitas Iceland to secure a harbor for customer Samskip in Reykjavik. Global logistics company Samskip is one of the larger transport companies in Europe with offices in 24 countries in Europe, North and South America, Asia and Australia. They operate an extensive network of container s...
A video surveillance system with around 40 IP and thermal cameras from Dahua Technology has been installed at Yarmouth Harbor on the Isle of Wight. The harbor consists of a large marina, docks for the Wightlink Ferry terminal, and pontoons and boat moorings upstream. The previous system was becoming outdated, with poor picture quality and cabling issues. Following a number of thefts from boats and boat fires in neighboring harbors, a new solution – including a thermal imaging capability &...
Thermal imaging is a technology that can provide many benefits in a wide range of applications. In particular, thermal imaging cameras have been deployed successfully as highly affordable solutions in the security industry. Accepted throughout the industry as the best 24-hour visual surveillance imaging solutions available, thermal security cameras are vital tools in securing borders, airports, sea ports, nuclear facilities, and other critical infrastructure. Today these affordable solutions ar...
Dallmeier offers comprehensive security solutions for all areas of application around airports. Specifically, in the area of cameras a wide range of systems allow customers to tackle all of their safety and security challenges and be able to comply fully with operational and regulatory requirements. On top of that, Dallmeier supplies video management solutions that not only give operators an exhaustive overview of security-relevant events, but also allow the video data to be analyzed with a vi...
LAN airline, one of the most important airline companies in Latin America, is based in Lima, Peru. The airline company operates scheduled domestic and international services, controlling over seventy percent of the domestic market. Its main base and maintenance center are located in Jorge Chávez International Airport, Lima, which is a significant transfer hub and aviation infrastructure of South America. The LAN airline deploys its surveillance system with Dahua solutions for its office...
Though it has been statistically proven that taking a plane is no riskier than taking a bus, people do have reasons to put extra caution on air travel safety, especially in a time replete with terrorist threats. A major line of defense must be the various sections of the airports, which, as a gateway to the outside world and transportation hub of the city, has always been on the top of the safety list of the government and all related authorities. Dahua’s Airport Solution is an intelligen...
Motorola Solutions has agreed to acquire IndigoVision, a U.K.-based provider of end-to-end video security solutions. The boards of Motorola Solutions, its holding company and IndigoVision have reached an agreement on the terms of a recommended cash acquisition for approximately $37.2 million, representing a premium of approximately 116 percent based on the average share price over the most recent 12-month period. The acquisition will be funded by existing cash resources of Motorola Solutions and become final in May 2020. Motorola Solutions has a strong presence in the large and expanding area of video security since acquiring Avigilon in March 2018. Their product offerings include high-definition cameras, advanced video analytics, network video management hardware and software and access control solutions. IndigoVision is a developer of complete, end-to-end video security solutions from cameras to video recorders to body worn cameras to security management software. Motorola Solutions says the IndigoVision range of products, global presence and customer base are "highly complementary" to Motorola Solutions' existing presence in video security. Among the benefits is enhanced geographical reach across a wider customer base. "The access we will now have to Motorola Solutions' range of innovative technologies will create new opportunities for IndigoVision and enable us to bring an exciting proposition to the market that allows us to further deliver on our goal of delivering safety, security and business intelligence," says Pedro Vasco Simoes, Chief Executive Officer of IndigoVision. "We share IndigoVision's commitment to providing next-generation, end-to-end video security solutions that enhance safety, security and efficiency," says John Kedzierski, Senior Vice President, Video Security Solutions, Motorola Solutions.
With just days left until the planned industry trade show, Reed Exhibitions has canceled ISC West over concerns about the COVID-19 coronavirus. Here is the statement on the decision: 'We at ISC West want to express our concern for everyone impacted by the COVID-19 coronavirus. Based on our close monitoring of ongoing developments with the virus, recent reports from public health officials and extensive consultation with our partners in the global security community, ISC West, scheduled to be held March 17-20, will now occur in July at the Sands Expo Center in Las Vegas. We take pride in offering vital business opportunities to our customers, including networking, education and access to new products and technologies, and commit ourselves to making July’s ISC West 2020 event live up to high standards. Over the coming weeks, along with ISC West’s Premier Sponsor SIA - we will continue to serve the industry, creating ways to connect, collaborate and keep our world moving during this difficult period.'
With growing concerns over the COVID-19 coronavirus, Motorola Solutions and its Avigilon brand have released a statement on their decision to pull out of this year's ISC West. The trade show, one of the biggest in the security industry, hosts over 30,000 security professionals and over 1000 exhibitors each year. The company states: "After careful consideration, we have withdrawn from this year’s ISC West trade show due to the widespread impact of the coronavirus." Official sources of updates "While ISC West is one important opportunity to demonstrate the power of Motorola Solutions' video security and analytics portfolio, the safety and well-being of our employees, customers and partners is our top priority. We are grateful to the ISC West organizers for their understanding and look forward to attending and supporting future ISC West events." ISC West will occur as scheduled March 17th through 20th, 2020, says Reed Exhibitions, despite the concerns. A statement from the show organizers is as follows: "While we regret that some companies have made the decision not to take part in ISC West 2020, we are focused on making ISC West 2020 a successful, safe, and enjoyable event for all attendees and exhibitors."
ISC West will occur as scheduled March 17th through 20th, 2020, says Reed Exhibitions. Following is a statement from show organizers: We take pride in offering vital business opportunities to our customers, including networking, education and access to new products and technologies and are working diligently to ensure ISC West 2020 and our other events live up to our high standards. While we regret that some companies have made the decision not to take part in ISC West 2020, we are focused on making ISC West 2020 a successful, safe, and enjoyable event for all attendees and exhibitors. Close Monitoring Over the last few weeks, Reed Exhibitions and our partners in ISC West have been closely monitoring the COVID-19 virus and its impact on members of the global security community. We are collaborating closely with the Sands Expo Center and local public health authorities and following local, state and federal public health guidelines, including those issued by the CDC. We have additional precautionary measures in place, including enhanced cleaning and sanitization across all public areas and customer touchpoints in the show and we are constantly reviewing our health protection activities, public health messaging, hygiene and medical control measures with the aim of strengthening our COVID-19 response further in line with up to date public health advice and guidance, including that of the CDC. Health and Safety We will continue to provide updates on our website as we get closer to ISC West. The health and safety of our team members and guests is our utmost priority. Our policies and best practices are in close collaboration with our venue partner, Sands Expo Center. The Sands Emergency Management Team works closely with local officials and are taking appropriate steps to protect team members and guests as outlined by the Centers for Disease Control and Prevention (CDC) and the Southern Nevada Health District (SNHD). Sands is prepared to follow any additional protocols or guidance, as they are made available by the CDC or SNHD.
Rapiscan Systems RTT 110 is the first high-speed Computed Tomography Explosive Detection System (EDS) to be approved on TSA's Air Cargo Screening Technology List (ACSTL). This was achieved last month after a thorough testing process with the TSA and means that the RTT 110 will now undergo further field test activities which it must pass before it can be formally qualified. The RTT 110 has revolutionized the EDS market by providing exceptional performance at significantly lower cost of ownership. With its unique stationary gantry design and belt speed of 0.5m/s, the RTT 110 produces industry-leading high-resolution full volumetric 3D images at high speed, giving excellent security. Reliable and effective high-Speed screening “We are very excited to be included on the ACSTL and the only approved CT EDS on the list”, said Mal Maginnis, President, Rapiscan Systems. “Our teams have worked extremely hard to create an exceptional product which we are all proud of. The technology has been designed to the highest quality to provide reliable and effective high-speed screening with many features ideally suited for the fast parcel industry and we are really pleased that our hard work is now being recognized”. By February 2021, all cargo shipments leaving, entering or traveling within the USA must be screened by a product included on the latest TSA’s Air Cargo Screening Technology List (ACSTL). The RTT 110 is the only EDS to be approved by the TSA and to be included on the ACSTL.
Cybersecurity services and Integrated Risk Management solutions provider SureCloud has announced that it has been accredited to provide Simulated Target Attack and Response (STAR) Intelligence-Led Penetration Testing services by the not-for-profit accreditation and certification body, CREST that represents the technical information security market. CREST developed the STAR framework to deliver intelligence-led cybersecurity testing, incorporating advanced penetration testing and threat intelligence services to more accurately replicate cybersecurity threats to critical assets. To meet CREST’s stringent requirements to secure STAR service provider status, SureCloud had to demonstrate its robust methodologies and sophisticated capabilities relating to the latest vulnerabilities and cybercrime techniques, as well as meeting government and risk management requirements. We have recognized their high professional service standards and the rigorous approach" Mitigating risks President of CREST, Ian Glover said, “SureCloud has been successfully assessed against our strict criteria for the supply of Simulated Target Attack and Response (STAR) Intelligence-Led Penetration Testing services. In accrediting SureCloud, we have recognized their high professional service standards and the rigorous approach they take in helping their customers mitigate risks and safeguard against advanced cyber-attacks. We congratulate them on this excellent achievement.” SureCloud’s VP of Cybersecurity, Mike Harrison, said, “The CREST STAR accreditation is a real testament to our capabilities as a business and it’s an important industry benchmark for delivering STAR intelligence-led penetration testing services. We’re proud to be amongst only 5% of UK penetration testing vendors that have been awarded this accreditation and are therefore able to offer STAR services in line with the high standards set by CREST. The fact we can deliver this excellent service through our vulnerability management platform means further value for our clients.” This accreditation reinforces the strong performance of the SureCloud team in undertaking Red-Team simulated Cyber Attack services for their clients. Techniques used are typically a blend of penetration testing, social engineering and physical breach attempts, with the overall aim being that organizations can prevent, detect and respond to the attack as if it were real. Crucially, this gives them a realistic overview for testing crisis management procedures, and how they might need to improve. SureCloud’s Penetration Testing services have been CHECK approved since 2009 Minimizing risks of potential data breaches Given the complexity of these engagements, the standards you need to achieve a STAR accreditation are set exceptionally high, as it is imperative that the increasing number of organizations looking to undertake these engagements can understand who has the capability to deliver the highest quality service to them. SureCloud’s Penetration Testing services have been CHECK approved since 2009, and has been re-certified by the Payment Card Industry Security Standards Council (PCI SSC) as a PCI Approved Scanning Vendor (PCI ASV) for more than 10 years running. SureCloud is certified by internationally recognized ISO/ IEC 27001 for achieving operational excellence, minimizing the risks of potential data breaches. SureCloud is also certified by Cyber Essentials Plus, complying with the requirements of the scheme, which focuses on technical control themes such as firewalls, secure configuration, user access control, malware protection and patch management.
Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data center, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. CV-19 means that huge numbers of people are getting access to the same desktop and files, and collaborative communication toolsBut as we know, CV-19 means that huge numbers of people are getting access to the same desktop and files, applications and collaborative communication tools that they do on a regular basis from the office or on the train. Indeed, the new generation of video conferencing technologies come very close to providing an “almost there” feeling. Hackers lie in wait Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical servers. Less than a month ago, we emerged from a period of chaos. For months hackers had been exploiting a vulnerability in VPN products from Pulse Secure, Fortinet, Palo Alto Networks, and Citrix. Patches were provided by vendors, and either companies applied the patch or withdrew remote access. As a result, the problem of attacks died back. But as companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on. That’s because remote desktop protocol (RDP) has been for the most part of 2019, and continues to be, the most important attack vector for ransomware. Managing a ransomware attack on top of everything else would certainly give you sleepless nights. As companies race to get people working from home, they must ensure special care is taken to ensure the patches are done before switching VPNs on Hackers are waiting for a wrong move amongst the panic, and they will look for ways to compromise critical serversExposing new services makes them also susceptible to denial of service attacks. Such attacks create large volumes of fake traffic to saturate the available capacity of the internet connection. They can also be used to attack the intricacies of the VPN protocol. A flow as little as 1Mbps can perturbate the VPN service and knock it offline. CIOs, therefore, need to acknowledge that introducing or extending home working broadens the attack surface. So now more than ever it’s vital to adapt risk models. You can’t roll out new services with an emphasis on access and usability and not consider security. You simply won’t survive otherwise. Social engineering Aside from securing VPNs, what else should CIO and CTOs be doing to ensure security? The first thing to do is to look at employee behavior, starting with passwords. It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposed. Best practice would be to get all employees to reset their passwords as they connect remotely and force them to choose a new password that complies with strong password complexity guidelines. As we know, people have a habit of reusing their passwords for one or more online services – services that might have fallen victim to a breach. Hackers will happily It’s highly recommended that strong password hygiene or some form of multi-factor authentication (MFA) is imposedleverage these breaches because it is such easy and rich pickings. Secondly, the inherent fear of the virus makes for perfect conditions for hackers. Sadly, a lot of phishing campaigns are already luring people in with the promise of important or breaking information on COVID-19. In the UK alone, coronavirus scams cost victims over £800,000 in February 2020. A staggering number that can only go up. That’s why CIOs need to remind everyone in the company of the risks of clickbait and comment spamming - the most popular and obvious bot techniques for infiltrating a network. Notorious hacking attempts And as any security specialist will tell you, some people have no ethics and will exploit the horrendous repercussions of CV-19. In January we saw just how unscrupulous hackers are when they started leveraging public fear of the virus to spread the notorious Emotet malware. Emotet, first detected in 2014, is a banking trojan that primarily spreads through ‘malspam’ and attempts to sneak into computers to steal sensitive and private information. In addition, in early February the Maze ransomware crippled more than 230 workstations of the New Jersey Medical Diagnostics Lab and when they refused to pay, the vicious attackers leaked 9.5GB or research data in an attempt to force negotiations. And in March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHO and healthcare organizations in general since the pandemic broke. We’ll see lots more opportunist attacks like this in the coming months. More speed less haste In March, an elite hacking group tried to breach the World Health Organization (WHO). It was just one of the many attempts on WHOFinally, we also have bots to contend with. We’ve yet to see reports of fake news content generated by machines, but we know there’s a high probability it will happen. Spambots are already creating pharmaceutical spam campaigns thriving on the buying behavior of people in times of fear from infection. Using comment spamming – where comments are tactically placed in the comments following an update or news story - the bots take advantage of the popularity of the Google search term ‘Coronavirus’ to increase the visibility and ranking of sites and products in search results. There is clearly much for CIOs to think about, but it is possible to secure a network by applying some well thought through tactics. I believe it comes down to having a ‘more speed, less haste’ approach to rolling out, scaling up and integrating technologies for home working, but above all, it should be mixed with an employee education program. As in reality, great technology and a coherent security strategy will never work if it is undermined by the poor practices
Though they may sometimes elicit a hectic and fast-paced experience, airports are a necessary cornerstone of traveling for many people around the world. Whether they represent the ability to see family, the need to attend a business event, or the chance to get away on a relaxing vacation, airports are central to allowing travelers to get from one destination to the next. In 2019, more than four billion scheduled travelers passed through the world’s airports, and that number is projected to grow. As the flow of travelers increases, airports are facing many new challenges. Passengers, by nature, are highly diverse, transient and in continual motion. As a result, airports are taking on greater responsibility of ensuring that people arrive and depart in a timely — and safe — manner. Effective security operations Effective security operations are therefore critically important to allowing these entities to protect what matters most. Unfortunately, this is not an easy task, as airports have evolved from traditional ports-of-call to highly complex environments. With the introduction of shopping, dining, interconnected rail and more amenities, they are seeing many of the same challenges facing cities. That includes theft, fraud, medical concerns and even domestic violence spilling over into facilities that are already popular targets for bad actors. They are seeing many of the same challenges facing cities The various threats that airports face on a daily basis present the potential for extreme damage. Any type of incident can carry significant risk to people, assets, passenger traffic, and brand reputation. Traditional security risks in the airport ecosystem, such as theft, violence, terrorism, and insider threats, continue to evolve, while overarching cyber attacks targeting physical security systems have also become more prevalent. Airport Industry Demands Aside from the constantly shifting risk landscape airports face, they also maintain a unique set of needs due to the high-level nature of the overall operation, such as: Constant surveillance. Airports, like many other transit hubs, utilize systems and technologies that must function constantly in order to keep passengers, employees, and environments safe 24 hours a day, 7 days a week, and 365 days a year. The ability to monitor device health is instrumental in preventing equipment failures as well as ensuring that no suspicious behavior goes unnoticed. As airports grow and change with the addition of new shops, terminals, or runways, they also need a set of security solutions that can easily adapt and incorporate new protective infrastructures. Coordinated security.The societal growth of at-your-fingertips accessibility and mobile capabilities increases convenience, but with this connectivity comes an expanded risk for threats and breaches. Security is no longer limited to just physical assets; network elements must also be considered to ensure comprehensive coverage throughout an airport’s infrastructure. Data collection.Data that is derived from internal and external threat intelligence efforts plays a significant role in mitigating threats, but the sheer amount of data far outweighs the ability of many airports to organize what’s collected and make it actionable. The Answer: Intelligence-Powered Solutions The complex risks, demands, and challenges that airports must contend with call for exceptionally sophisticated and coordinated security strategies that leverage intelligence-based solutions. A traditional security system is not enough for such a high-leverage atmosphere; airport security operators require the greatest level of insight and information possible to ensure protection for travelers and staff at all times. Airport security operators require the greatest level of insight and information At the core of an intelligent airport security system must exist a video-based security operations center (SOC). Operators need to be able to track incoming data and identify relevant information on a daily basis, but this can become challenging given the number of security systems and sensors that are typically integrated within an SOC, such as video surveillance, access control, perimeter detection, PSIM software, and more. Operators require solutions that integrate the existing controls of a security operation into a single view, assimilate analytical data, and provide critical insights to empower personnel to manage and respond to situations efficiently and effectively. This can be achieved through an intelligent SOC, giving operators real-time visibility into security system information and analytics that facilitates a proactive approach to security rather than reacting after the fact. Operators therefore benefit greatly from increased insight and the ability to see both the security and business sides of airport operations, from passenger and employee identification to cargo handling and flight coordination. Essential Intelligent SOC Components Because airports are such vast, fast-paced environments with several elements to consider when it comes to safety, an intelligent SOC in these facilities must incorporate various levels of intelligent technology, such as: Video management software (VMS). A data-driven security management and response system that leverages advanced artificial intelligence (AI) and predictive analytics is critical for viewing airport operations and investigating potential vulnerabilities or threats. When integrated with components such as dynamic GIS maps and event management, airport security teams can gain full situational awareness and control with the intelligence to act as needed. Emergency dispatch and response. In the event of a security incident, airports need to share insights in real time between dispatchers, first responders, and other aligned stakeholders. Next-generation mobile technologies within an intelligent SOC can enable operators to see the full picture of both the situation and the organization’s response team, helping to facilitate immediate action and informed decisions. Integrated security operations. As mentioned previously, today’s airports are forced to look beyond the traditional physical security threats of the past and incorporate the element of cyber risk. This means that an intelligent SOC must also consider web-based vulnerabilities, such as through social media monitoring and geo-fenced surveillance and integrate this information within the guidelines and techniques that are being used to secure the airport in a physical sense. The deployment of intelligent security solutions in airport environments helps streamline all aspects of security management while enabling data analysis to ensure day-to-day airport operations run smoothly. In the end, these facilities become more prepared to deal with incidents proactively while providing a positive experience for travelers. As airports look to draw more passenger traffic and expand in scale, selecting security solutions powered by sophisticated intelligence and analytics helps protect what matters most: people, property, and the continuity of operations.
Artificial Intelligence. You’ve heard the words in just about every facet of our lives, just two words, and they’re quite possibly the most moving, life-changing words employed in everyday conversations. So what exactly is AI, who currently uses it and should be using it? What is AI? AI is a powerful way of collecting, qualifying and quantifying data toward a meaningful conclusion to help us reach decisions more quickly or automate processes which could be considered mundane or repetitive. AI in its previous state was known as “machine learning” or “machine processing” which has evolved into “deep learning” or, here in the present, Artificial Intelligence. AI as it applies to the security and surveillance industry provides us the ability to discover and process meaningful information more quickly than at any other time in modern history. Flashback - VCR tapes, blurred images, fast-forward, rewind and repeat. This process became digital, though continued to be very time-consuming. Today’s surveillance video management systems have automated many of these processes with features like “museum search” seeking an object removed from a camera view or “motion detection” to create alerts when objects move through a selected viewpoint. These features are often confused with AI, and are really supportive analytics of the Artificial Intelligence, not AI themselves. Machine Learning Fully appreciating AI means employment of a machine or series of machines to collect, process and produce information obtained from basic video features or analytics. What the machines learn depends on what is asked of them. The truth is, the only way the AI can become meaningful is if there is enough information learned to provide the results desired. If there isn’t enough info, then we must dig deeper for information or learn more, properly described as “deep-learning” AI. Translated, this means that we need to learn more on a deeper level in order to obtain the collaborative combined information necessary to produce the desired result. Deep learning AI Deep learning AI can afford us the ability to understand more about person characteristic traits & behaviors. Applying this information can then further be applied to understand how to interpret patterns of behavior with the end goal of predictable behavior. This prediction requires some degree of human interpretation so that we are able to position ourselves to disrupt patterns of negative behavior or simply look for persons of interest based on these patterns of behavior. These same patterns evolve into intelligence which over time increases the machine’s ability to more accurately predict patterns that could allow for actions to be taken as a result. This intelligence which is now actionable could translate to life safety such as stopping a production manufacturing process, if a person were to move into an area where they shouldn’t be which might put them in danger. Useful applications of intelligence Informative knowledge or intelligence gathered could be useful in retail applications as well by simply collecting traffic patterns as patrons enter a showroom. This is often displayed in the form of heat mapping of the most commonly traveled paths or determining choke points that detract from a shopper’s experience within the retail establishment. It could also mean relocating signage to more heavily traveled foot-paths to gain the highest possible exposure to communicating a sale or similar notice, perhaps lending itself to driving higher interest to a sale or product capability. Some of this signage or direction could even translate to increased revenues by realigning the customer engagement and purchasing points. Actionable Intelligence From a surveillance perspective, AI could be retranslated to actionable intelligence by providing behavioral data to allow law enforcement to engage individuals with malicious intent earlier, thus preventing crimes in whole or in part based on previously learned data. The data collection points now begin to depart from a more benign, passive role into an actionable role. As a result, new questions are being asked regarding the cameras intended purpose or role of its viewpoint such as detection, observation, recognition or identification. Detecting human presence By way of example, a camera or data collector may need to detect human presence, as well as positively identify who the person is. So the analytic trip line is crossed or motion box activated or counter-flow is detected which then creates an alert for a guard or observer to take action. Further up the food chain, a supervisor is also notified and the facial characteristics are captured. These remain camera analytics, but now we feed this collected facial information to a graphic processing unit (GPU) which could be employed to compare captured characteristics with pre-loaded facial characteristics. When the two sources are compared and a match produced, an alert could be generated which results in an intervention or other similar action with the effort of preventing a further action. This process- detect, disrupt, deter or detain could be considered life-saving by predictably displaying possible outcomes in advance of the intended actions. The next level is deep-learning AI which employs the same characteristics to determine where else within the CCTV ecosystem the individual may have been previously by comparatively analyzing other collected video data. This becomes deep-learning AI when the GPU machine is able to learn from user-tagged positive identification, which the machine learns and begins to further reprocess its own data to further understand where else the person of interest (POI) may have existed on the ecosystem and more correctly improve its own predictive capabilities, thus becoming faster at displaying alerts and better at the discovery of previously archived video data. The future In conclusion, the future of these “predictables” wholly rests in the hands of the purchasing end-user. Our job is to help everyone understand the capabilities and theirs is to continue to make the investment so that the research perpetuates upon itself. Just think where we’d be if purchasers didn’t invest in the smartphone?
Even though ISC West 2020 was canceled, many of the product introductions planned for the trade show still happened. For example, physical security and secure identification company Identiv introduced the Hirsch Velocity Cirrus and MobilisID. Hirsch Velocity Cirrus is a cloud-based Access Control as a Service (ACaaS) solution. It is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. Smart mobile physical access control solution Identiv’s MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. We caught up with Jason Spielfogel, Identiv’s Director of Product Management, to discuss the new products and other topics. Q: How is Identiv positioned in the market as a whole? What philosophy drives your product offerings? What vertical markets do you target? Every customer needs every one of these components Spielfogel: Identiv provides a total solution. Our platforms provide access control hardware and software, video surveillance and analytics, door access readers, and ID credentials, both cards and mobile, for a variety of vertical markets: Federal government, state, local and education government agencies (SLED), healthcare, schools, banks/financial services, retail, airports and transportation, and infrastructure. Every customer needs every one of these components in every physical security deployment, and we ensure that all parts are working together at all times, even as technology continues to evolve. With that said, our philosophy is very customer-centric, and we position ourselves as a trusted partner. Our products and technology platform always strive to reflect and anticipate the environment our customers are facing, both in terms of technical requirements and functional capabilities. Q: How does the MobilisID system eliminate "friction?" Spielfogel: Identiv’s MobilisID eliminates the “friction” of access control by forgiving the user from presenting a physical credential to the reader. A simple wave of their hand over the MobilisID reader establishes a connection, and the reader reads their mobile device’s credential from the MobilisID app. No badge or access card to read, and no contact with the reader, makes this a frictionless access control experience. Administrative friction is also eliminated because there is no physical credential to issue or withdraw; it’s all done via the MobilisID Manager. Q: Discuss the advantages of Bluetooth over competing technologies. Bluetooth offers a blend of reliability and specificity Spielfogel: There are two primary competing technologies: WiFi and Near Field Communication (NFC). The problem with WiFi is that it’s not location-specific. In other words, the WiFi router can’t tell which door the user is near. NFC has the opposite problem in that it’s impossible to get credential reads unless the phone is presented within an inch or two of the reader. Bluetooth offers a blend of reliability and specificity to create frictionless access. Q: "Touchless" has always been a big selling point. Doesn't the coronavirus improve the outlook for these systems even more? Spielfogel: The coronavirus certainly highlights the value of frictionless access. But the vast majority of access systems today use proximity which was already touchless. But for systems using touchpads or contact-based credentialing, certainly frictionless is offering some alternatives that would help keep employees and visitors safer in the current climate. Q: How else might the current pandemic change the security market forever (i.e., more teleworking?) Spielfogel: Permanent changes are not likely, but it does force security directors to rethink how their employees interact physically with systems for both physical and logical access. As a result, we might see accelerated adoption of some emerging technologies, such as greater use of mobile logical access solutions, as well as frictionless physical access control. We’ve already seen an uptick in our smart card reader and token line and our Thursby enterprise and personal mobility offering during the coronavirus pandemic. Q: There are a lot of cloud systems in the access control space. How is your Cirrus cloud product different? Velocity already has all those features Spielfogel: Cirrus is different from many others in that it’s built on one of the most mature, feature-rich, secure physical access solutions available today – Hirsch hardware and Velocity Software. While many competitors are scrambling to add features to their relatively new ACaaS platforms, Velocity already has all those features. While they are building up their encryption capabilities and cybersecurity testing, we’ve already been doing that for two decades. We certainly have some more development ahead of us for Cirrus, but most of it is just surfacing features we already have into the Cirrus interface. Q: How do you guide customers as their needs change? Spielfogel: Whether users want solutions that are on-prem, in the cloud, or anything in between, Identiv’s full architecture ensures that customers can adopt and migrate to new solutions as they see fit. No two customers are alike, so providing the flexibility to gradually update or change systems is a real differentiator. Our competitors either want customers to jump all at once to the cloud or push to keep everything on-prem/legacy. CSOs and CISOs live in a different world: They've got it all to deal with. We're there with them across all of it, because that's the true reality.
HID Global is introducing a new “flagship” line of access control readers as successors to the iCLASS line. The new HID Signo readers will support 15 different credentialing formats and communicate using the latest NFC (near field communication), BLE (Bluetooth Low Energy) and OSDP (Open Supervised Device Protocol) standards. HID Global says the new readers will simplify integration to more secure and mobile credentials. HID Global has invested in a “future-proof” approach that both accommodates a variety of current market needs and can adapt to embrace new technologies as they come onto the market. The new line incorporates “all the hardware you need,” combining the capabilities of older generations of readers into a single product. Simplifying the choice of readers The new reader line seeks to simplify the choice of readers in a time when a variety of trends is complicating the access control market, from cloud systems to mobile access to identity management. “We are simplifying the way we bring our products to market, and baking it all into our readers,” says Harm Radstaak, HID Global Vice President and Managing Director. “If an installer takes a reader out of the box and mounts it on the wall, it just works.” We are simplifying the way we bring our products to market" In designing the product, HID sought feedback from channel partners, installers, consultants and end users on how the new readers would function. In addition, the company sought advice from architects on the design of the product. Aesthetics and industrial design elements were a priority because they ideally reflect the quality and “promise” of how the product will perform. Cybersecurity Cybersecurity is another emphasis. The readers store cryptographic keys and process cryptographic operations on certified EAL6+ secure element hardware, and custom authentication keys can be used for organizations who prefer that level of control. EAL6+ certification is a designation of the Evaluation Assurance Level of an IT product or system (the highest score is EAL7). Signo also includes a velocity checking feature designed to mitigate and thwart brute force attacks. “The new Signo line is a continuation of the journey we have been on,” says Radstaak. “It is the natural succession of what we have been doing for years, and it underlines our position in the market.” By natively supporting mobile credentials, the new product line reinforces HID’s commitment to mobile systems, which the company first brought to market in 2014. Signo readers also include Enhanced Contactless polling to support mobile credentials in Apple Wallet. Addressing standards Embracing the OSDP standard, which was created in 2008, also addresses the growing customer need for bi-directional, secure communications. There is built-in support for OSDP Secure Channel as well as legacy Wiegand communication for organizations seeking to transition. Signo incorporates support for most credential technologies globally, including Seos, credentials with HID’s Secure Identity Object, and a variety of 125kHz legacy technologies such as Indala and Prox. The flexibility and openness of Signo is a response to the acceleration of new technologies entering the access control market. “If you look at new technologies in general, our market has been slow in adopting them,” says Radstaak. “However, with new entrants in the market, new technologies, new device manufacturers and artificial intelligence (AI), I believe the market is adopting new technologies much faster than before. Users are much savvier.” The consumer Administrators will be able to remotely configure and diagnose readers Radstaak says he expects market adoption of the new readers will be fast. “Customers have been waiting for this platform,” he says. “This has been a tremendous investment for HID Global, and it underlines our position in the market with its open platform, simplicity and future-proofing. We are prepared for whatever comes next technology-wise.” With Signo readers, administrators will be able to remotely configure and diagnose readers as well as monitor status through a centrally managed and connected reader ecosystem. As a member of the FiRA Consortium, HID Global has advocated bringing new technology to market based on the “fine ranging” capabilities of ultra-wideband (UWB) technology, which has applications in detection of the precise location or presence of a connected device or object. It’s the kind of technology that Signo platform’s “future-proofing” approach is geared to accommodate. “As the capability unfolds, we will be there to adapt,” says Radstaak.
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilizing the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualization and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
Manchester-Boston Regional Airport opened to serve the state of New Hampshire and the surrounding New England community in 1927, a little over two decades after the Wright brother’s first powered flight. Located three miles south of central Manchester, the Manchester-Boston Regional Airport is the fourth largest passenger and third largest cargo airport in New England. The airport is also the busiest in the state, qualifying under the Federal Aviation Administration (FAA) as a “small hub primary commercial service facility.” Airport Redevelopment Project The 1990’s brought a large redevelopment project to the airport, sparking more modern facilities, increased room for aircraft, and a range of new shops and restaurants. By 2012 it had become clear that the airport and its parking areas required enhanced surveillance. Increased foot traffic, manpower, and federal safety regulations resulted in the awarding of an FAA grant for a new surveillance system. Increased foot traffic, manpower, and federal safety regulations resulted in the awarding of an FAA grant for a new surveillance system The Manchester-Boston Regional Airport faced a lengthy decision-making process when it came to security camera manufacturers, requiring products able to support the unique applications and varied environment of the airport. The security team monitored a range of spaces both in and outdoors, and required products that excelled under all of these varying situations and lighting conditions. The selected cameras needed to provide full high-definition video across multiple open areas, while also delivering detailed, close-up images within busy, crowded spaces. The airport’s FAA grant included stipulations regarding the types of products that could be purchased with the supplied funds, specifying that the selected system must qualify under the “Buy American” standard. This provision meant that all potential selections not only meet the technical requirements, but also be Made in USA. Arecont Vision: Foundation For Security System After a year of exploring the market, the client determined that Arecont Vision was the only manufacturer that not only satisfied the “Buy American” stipulation, but did so without sacrificing the airport’s fundamental security requirements by providing a wide range of high resolution megapixel cameras.Arecont Vision was open in demonstrating its Made in USA product design, manufacturing, quality control, and support as part of the selection process Arecont Vision was open in demonstrating its Made in USA product design, manufacturing, quality control, and support as part of the selection process. Securadyne Systems was selected as the systems integrator. Extensive planning determined which Arecont Vision products to install, where to do so, and how the installation process would be accomplished. Once Manchester-Boston Regional Airport chose Arecont Vision cameras as the foundation for their security system, they began to collaborate with On-Net Surveillance Systems, Inc. (OnSSI) to supply the video management system (VMS). OnSSI is an Arecont Vision Technology Partner Program member, with many joint customers around the world, demonstrating proven integration between the two company’s products and support services. Arecont Cameras Chosen By Airport Security Team The Arecont Vision SurroundVideo® multi-sensor camera series piqued the security team’s interest for its 180° panoramic capabilities. Passengers, staff, and aircraft crew move frequently and often swiftly from one location to another in varied lighting, yet all proved trackable with the SurroundVideo cameras and the OnSSI software. The placement of SurroundVideo cameras at the Manchester-Boston Regional Airport provides comprehensive coverage while reducing the number of cameras needed overall, a feat that was especially useful in large areas such as the airport’s apron. The security team chose cameras from the Arecont Vision MegaDome® series, which are equipped with a wide range of innovative features For locations that required a single coverage view, the security team chose cameras from the Arecont Vision MegaDome® series, which are equipped with a wide range of innovative features. Features such as low light capabilities and remote focus and zoom all proved crucial to the airport’s requirements. Casino Mode™ is available in the 1080p versions of the MegaDome series, a feature that proved to be as useful at the Manchester-Boston TSA checkpoints as it is in a Las Vegas casino. Casino Mode guarantees 30 frames per second to capture every detail on fast-action applications, an incredibly effective tool when investigating security situations involving many complex, small movements for both live and forensic viewing.Casino Mode guarantees 30 frames per second to capture every detail on fast-action applications for many complex, small movements in both live and forensic viewing Investigating Criminal Or Worker Concerns Manchester-Boston Regional Airport has installed over one hundred and fifty Arecont Vision cameras, and the video surveillance system is continuing to grow. The latest installation of Arecont Vision products included the lower level of a parking garage as well as a newly renovated passenger checkpoint area. When asked if there are any specific incidents in which Arecont Vision cameras proved useful, Mr. Mueller responded, “Every other day we use the cameras to investigate criminal or worker concerns. We go back and monitor them for possible safety issues on the ramps, for passenger interaction, and for worker interactions. Anytime someone expresses a concern to me, they can come in and we can watch the footage together. I try to make sure that the option to view footage is fairly transparent, which has proved very useful to everyone. "SurroundVideo 180° cameras were again utilized in the latter situation due to the client’s satisfaction with stitching together images from multiple 180°s." Paul Mueller, Manchester-Boston Regional Airport’s security manager, stated, “We were sure to go back to Arecont Vision during this process. We have had a good working relationship with them for the past five years, and they enable us to use less cameras while still maintaining full view of inspection areas.” Primary camera views are displayed and monitored all the time, while others can be pulled up and played back as issues arise Passport And Ticket Inspection Made Easy Arecont Vision cameras are monitored 24/7 in the airport’s communications center. Primary views are displayed and monitored all the time, while others can be pulled up and played back as issues arise. The system also allows for particular divisions within the Manchester-Boston Regional Airport to monitor cameras that are applicable to their work, such as in the parking garage. In terms of responsiveness, Arecont Vision makes it a top priority. “We had an issue recently with the lack of detail in some of the views for when people were having their passports and tickets inspected by TSA employees,” Paul stated, “An Arecont Vision rep came out and agreed that we could improve images, so he pulled the cameras and re-installed a newer firmware version which allowed for finer adjustments, completely and efficiently solving our problem.” Arecont Vision prides itself in its relationship with clients such as Manchester-Boston Regional Airport and to its continued design and manufacturing of quality, innovative, and industry-leading cameras within the United States for customers to use worldwide.
USS Iowa: A Naval Treasure Affectionately known as the “Battleship of Presidents” for having played host to more U.S. presidents than any other battleship, the USS Iowa is one of the most storied vessels in the history of the Navy. Originally commissioned in 1943, the Iowa saw significant action during both World War II and the Korean War. One of the battleship’s first missions was to escort President Franklin Delano Roosevelt across the Atlantic in November of that year for a critical meeting between the allies at the Tehran Conference, which was also attended by Soviet leader Josef Stalin and British Prime Minister Winston Churchill. In early 1944, the Iowa was sent to the Pacific Ocean theater where it would play a pivotal role in some of the key battles of the war. When the Empire of Japan officially surrendered aboard the USS Missouri in September 1945, the Iowa was also in Tokyo Bay broadcasting the ceremony to the world. The Iowa and her crew would continue to serve the nation for another four decades before being decommissioned for the last time in 1990. Given the ship’s rich legacy, it was eventually relocated to a permanent berth at the Port of Los Angeles in 2012 and converted into a museum. Visitors can now stroll along the decks of this American icon from a bygone age and get a firsthand look at the 16”/50 caliber guns that earned the Iowa its nickname of the “The Big Stick” as well as other historical artefacts on board the battleship. Of course, turning a vessel that stretches over 880-feet long and contains numerous rooms and compartments into a tourist attraction comes with its own set of unique security challenges. Security Challenges The job of securing the Battleship USS Iowa museum is the responsibility of Security Manager Michael Dahl, a former law enforcement officer who was asked to take over the full-time security operations for the museum following his stint as a volunteer aboard the ship. While the museum has yet to experience a major security event during its brief existence, the threat posed by trespassers after-hours or a visitor wandering off the beaten path is not lost on Dahl and the rest of the management team at the museum. However, aside from having a small number of consumer-grade, off-the-shelf security cameras placed in strategic areas, there was not any real video surveillance infrastructure to speak of on board the ship. That changed approximately one year ago when David Canfield, the museum’s vice president and CIO, who also happens to be a veteran of the high-tech industry, decided they needed to significantly upgrade the surveillance system and install a solution that would more adequately address the facility’s needs. Arteco and Arecont Vision donated the respective technology solutions for the USS Iowa project “We wanted to install cameras to monitor the exterior of the ship, particularly when we’re not open to the public, so we can monitor our gangways to see if anybody does try to access the area,” said Dahl. “Also on the inside of the ship, we wanted to make sure we didn’t have our visitors, as well as our crew members who are volunteers, getting off the designated routes and into areas where we didn’t want them. There are some sensitive areas where, if you don’t know what you’re doing, they could be hazardous.” Arteco’s VEMS Solutions After speaking with CV Reps, a local manufacturer’s representation firm, Dahl and the museum’s leadership team decided to install a system with the Arteco Next video event management software (VEMS) and a network of Arecont Vision cameras. Because the battleship museum is a non-profit organization, both Arteco and Arecont Vision donated the respective technology solutions for the project. A total of 11 high-definition IP cameras have been installed on the Iowa since the project got underway in mid-2015. At the beginning of 2016, Dahl was able to bring the Arteco software online and he has been extremely impressed with its performance. Leveraging the video analytics suite provided by Arteco Next, Dahl has been able to set up an alert within the VEMS client that notifies him when certain physical boundaries are crossed by people on board the Iowa. “With the Next software I’m able to configure alert areas after hours — so if anybody were to try to come on the ship it would alert me,” added Dahl. “We also have an alert for our cash-handling room just outside our vault that is set up so that anytime anybody goes through that door, it lets me know.” User-Intuitive Video Software Because Dahl, who has sole responsibility for running the surveillance system, is a relative novice when it comes to operating today’s surveillance technology, it was also important that the video software the museum deployed be user-intuitive so that he could bring himself up to speed quickly. After only a few hours of training on the Logic Next platform, Dahl was able to learn the basics of the software and familiarize himself with its more advanced settings. Arteco NEXT VEMS allows users to take full control of a video surveillance system from anywhere, quickly and easily. With NEXT’s specifically designed graphical interfaces, video retrieval, direct management of alarms, video analytics or access control events are made easy from the start. This enables users to focus on taking hold of the benefits delivered by the system immediately, rather than waiting for training. In the future, Dahl plans to deploy more cameras to keep the USS Iowa and its rich history secure. “I have several locations where I still want to deploy cameras; it’s just a matter of being able to procure them and deploy them as resources allow,” said Dahl.
Airports and ports are subject to a tough balancing act when it comes to security measures. On the one hand, these locations must maximize the movement of passengers and cargo to ensure a happy customer experience, while at the same time exercising security measures that will ensure their safety. Access Points In Transport Hubs Airports and ports are large areas with many access points, a necessity to facilitate the efficiency needed to handle the large volumes of traffic they generate. This accessibility is also their Achilles heel in the eyes of would-be terrorists, smugglers, and thieves. Herein lays the conundrum. People want to travel without fear of falling victim to attack, but security cannot be so invasive that it makes travel unpleasant. Vanderbilt’s solutions respond to the agility, adaptability, and dependability that this sector requires and facilitate free movement while allowing for effective safeguarding measures.Vanderbilt’s ACTpro is a PC-based access control system that eliminates the need for traditional keys, instead utilising cards and tokens to gain access Access Control Scenarios For ACTpro For instance, Vanderbilt’s ACTpro is a PC-based access control system that eliminates the need for traditional keys. Instead, it enables authorized individuals to use a card or a token to gain access to protected areas. Staff appreciate that the cards mean they need to carry fewer conventional keys and can gain prompt access to vital areas. If a tag or card is lost, it can easily be disabled by the system, ensuring a high-security level. So, what are some access control scenarios that ACTpro can provide against at airports and ports? To name a few, tailgating, hierarchy rights, and allowing for holding areas between doors. Coupled with ACT Enterprise software, ACTpro provides a vast array of integrations. Specifically, this can be used to provide unrivaled protection against ‘tailgating’ through interaction between badge systems and video surveillance cameras. Hierarchy Of Acess Privileges The access status at airports and ports can vary greatly depending. For example, flight crew require different access rights compared to terminal retail staff, maintenance staff, or emergency staff. ACTpro, coupled with ACT Enterprise, can provide this strict hierarchy of access privileges based on seniority and job function. The ACTpro system also includes the ability to execute ‘airlock’ or holding areas between pairs of doors. This means the doors cannot be opened simultaneously except in emergencies when a supervisor activates an override. This function helps defeat concerted intrusion attempts. In addition, the software provides invaluable health and safety abilities for fire mustering.
AIG, Aéroport International de Genève, is one of the most dynamic airports in Europe. In 2012 alone it handled almost 13.9 million passengers and 193.000 flights to 120 destinations, serviced by 200 different companies. Obviously, with these figures, security is an important issue and needs to be up to standard at all times. Managing Access For A Large Workforce The implemented AEOS platform controls the access of a workforce of 9,500, manages 37,500 badges, 200 organizations working at the airport’s facilities. Securing and controlling such a dynamic environment requires a flexible access control system, based on state-of-the-art technology which is able to meet present demands as well as future security requirements. Handling Multiple Access Control Technologies One of the main reasons for AIG to choose Nedap AEOS as its security management platform was its radical different architecture based on software components. AEOS software components allow the platform to support and enhance the airport’s security policy and procedures. Furthermore, changing requirements can be put into effect much more easily. Another reason to choose AEOS is its capability of simultaneously handling multiple reader and credential technologies in a single platform. Single Card Access Control Four different identification technologies are used simultaneously in AEOS access control functionality at Geneva Airport: Nedap, Mifare, Legic and Magnetic stripe, each technology serving a different purpose. The Nedap Combi card has been put into place, which combines all the required technologies, therefore increasing convenience for the users, as they do not have to carry four different cards.
Levels of security inside the Aviation industry have never been higher; mainly due to increased terrorism threat levels across the globe, combined with a worldwide rise in smuggling activity. No airport is immune from these pressures and Ghana’s ‘Kotoka International’ can now claim to meet ACC3, the highest accreditation in the aviation industry, thanks to their recent investment in the latest generation of IP CCTV systems from Hikvision. Ghana’s Kotoka International Airport Established in 1994, Aviance Ghana Ltd provides a range of ground handling services at Ghana’s Kotoka International Airport, situated just outside the capital, Accra. The airport itself is Ghana’s premier international flight center and is capable of accepting large aircrafts, such as the latest generation of Boeing 747.Aviance Ghana is one of eight companies making up the Aviance Alliance, which operates at more than 100 airport locations across 4 continents It occupies more than 650 hectares, with two large terminals for domestic/regional and international/long-haul operations that are connected by an internal walkway. Terminal 2 is the principal international departure terminal and includes restaurants, duty-free shops and two Executive lounges for First and Business Class travellers. There are also two smaller terminals dedicated solely to diplomatic flights and military operations. Aviance Ghana is one of eight companies making up the Aviance Alliance, which operates at more than 100 airport locations across 4 continents. At Kotoka, the ground services include managing all the passenger concourse facilities in Terminal 2, plus passenger check-in and baggage handling, the loading and unloading of cargo from freight flights and a cargo warehouse operation for all import and export needs. Overriding Security Objectives Given that today’s security concerns require the aviation industry to maintain very high levels of protection measures, close scrutiny of the 650 hectare site that the airport occupies and protecting passengers, aircraft and cargo were the twin key objectives for Aviance when deciding to upgrade the Airport’s CCTV system. The company also recognized that intelligently deploying the camera infrastructure would be necessary to maximize cost-effectiveness and efficiency.The new Skylink CCTV system design uses four different types of Hikvision IP camera Aviance Ghana turned to Skylinks Technical Services Ltd and tasked them with designing a solution that would enable it to meet the EU’s ACC3 accreditation, the highest accreditation in the aviation industry. In turn, Skylinks turned to Hikvision for the design of an all-IP CCTV system capable of not only meeting the current challenges facing Aviance in its operation at Kotoka International Airport, but also providing an expandable base that could rise to meet future developments. The new Skylink CCTV system design uses four different types of Hikvision IP cameras connected to a 32-channel, RAID 5 NVR over an entirely new Gigabit network infrastructure. According to Haim Atanelov, Skylinks General Manager, “The final brief for the CCTV upgrade included installation of new cameras in Aviance’s import and export cargo warehouses, both entry and exit vehicle gates, within the terminal public areas, at the biometric log-in area and associated turnstiles, and within the VIP lounge areas. “In all of these disparate areas, we were challenged by Aviance to deliver high resolution images at all times and in all lighting conditions. It is these pressures that helped us in choosing Hikvision components, with their robust build quality, excellent video quality, and quick and simple installation and operation due to the user-friendly software. It also helped that the products offer very competitive prices and are accompanied by after-sales service and technical support from a first-class team.” Clear Images In Poor Lighting Conditions Aviance is committed to phasing out the old system in favour of a totally Hikvision IP system as soon as possible" The CCTV system uses a combination of IP66-rated dome and bullet cameras with either 1.3 or 3MP resolution. A total of four DS-2CD2312-I 1.3MP Outdoor Network Mini Dome cameras were installed, two in the public areas of the terminal and two at the main gates where passengers complete the biometric log-in process and enter through the turnstiles. To complement the dome cameras, nine EXIR bullet cameras were used: five DS-2CD2212-I5 1.3 MP units for general surveillance in the warehouses together with a pair of DS-2CD2232-I5 3MP units where greater resolution was required, and two DS-2CD2632F-I 3MP Vari-focal EXIR cameras for the main vehicle entry and exit gates. “All of the cameras offer great resolution, with 3D DNR and Digital WDR as standard, together with a full complement of alarm triggers, including line crossing and motion and intrusion detection” says Haim Atanelov. “But, the true day/night capability of the EXIR infrared technology meant that they always delivered clear images, even in the warehouses where lighting conditions are not good. Both the 1.3MP and 3MP bullet cameras employed in the warehouses live up to the 50-meter IR range quoted. What’s more, the 30-meter EXIR range of the mini dome cameras deployed in the terminal building is also very useful during night time hours when the building lighting is partially shut down.The new system has already proved its worth, helping to completely seal the export warehouse in particular “We also paid particular attention to the vehicle entry and exit points, in each case choosing the 3MP Vari-focal bullet cameras for their IP66 environmental protection, high resolution, advanced night viewing capabilities and zoom.” Into The Future The new system has already proved its worth, helping to completely seal the export warehouse in particular and enabling Kotoka to meet ACC3 accreditation. Together with securing the import warehouse, which serves global airline and cargo brands such as British Airways, South African Airways, Alitalia, KLM, Virgin, DHL, Cargolux, etc., it means that the airport is well-placed to continue to attract business. “Aviance is especially pleased with the smooth integration of the Hikvision IP system with the access control system at the 4 turnstiles,” says Haim Atanelov, “something which was also carefully noted by the EU ACC3 validators. Aviance was also pleased with the integration of the new system with the existing analog CCTV system, although it did show up the difference in video quality immediately. "We have already agreed to add further IP cameras to the site and Aviance is committed to phasing out the old system in favor of a totally Hikvision IP system as soon as possible.”
Critical Infrastructure Airports, harbors and ports, railways, highways, pipelines, and bridges together make up much of the infrastructure and facilities the modern world relies upon for transportation. They are the entry and exit points for both domestic and international travel, and the critical infrastructure for the transhipment of people, freight, commodities, manufactured goods, and other cargo. Arecont Vision’s Superior Performance “Ease of installation, compatibility with our current VMS, and the new features [including] Wide Dynamic Range. Our experience has been great. Our organization requires high levels of security and with Arecont Vision’s updates to firmware we can maintain our internal network security policies.” said Safraz Samad, TPA Operations – Security Administration, Tampa International Airport. “Alberta invests a great deal of money and resources into developing and evaluating the best technological advances to provide superior performance to our customers. Arecont Vision’s megapixel cameras fit perfectly into our technology-centric approach to the market, as demonstrated by their performance in our installation at the cruise ship terminal in Valletta.” commented Karim Cassar, Technical Research Executive, Alberta. Megapixel Camera Benefits Deter and detect threats and document activities Maintain situational awareness and security Improve staff productivity Resolve security/staff and customer disputes Protect staff, travellers, customers, equipment, and goods Ability to cover more with less Increased detail equals better forensics and reduced time from police and security professionals in post event investigations Monitor daily business Forensic documentation to build cases Provide security, situational awareness, life safety Prevent fraudulent claims Application Areas Remote surveillance Facility entry/exits Loading docks Luggage and freight areas Storage areas Offices and warehouses Open spaces Parking lots/structures Roads and bridges Concourses and corridors People/vehicle counting/monitoring License plate/facial recognition
Round table discussion
Video is widely embraced as an essential element of physical security systems. However, surveillance footage is often recorded without sound, even though many cameras are capable of capturing audio as well as video. Beyond the capabilities of cameras, there is a range of other audio products on the market that can improve system performance and/or expand capabilities (e.g., gunshot detection.) We asked this week’s Expert Panel Roundtable: How does audio enhance the performance of security and/or video systems?
When a fire or other emergency occurs in a building or facility, first responders depend on every available resource to ensure a safe and orderly evacuation and response. One element in any response plan is the facility’s physical security systems, including access control, video surveillance and intrusion detection. How can these systems contribute to an orderly response to a chaotic situation? We asked this week’s Expert Panel Roundtable: What is the role of security systems in the event of a fire or other emergency evacuation?
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals