Government & public services security applications
Marriott International Inc. is a hospitality company and the Gaylord Opryland Resort and Convention Center is a Marriott property in the world. Located in Nashville, Tennessee, Gaylord Opryland offers visitors the chance to experience Music City under a single roof. The resort has a hotel with over 3000 suites and rooms and a smaller adjacent hotel with more than 300. Risk assessment Ryman Hospitality, the organization that owns Gaylord Brand Hotels, decided to embark on a risk assessment of t...
The Thiepval Museums, in northern France, needed trusted, secure entry and exit control to reduce theft from their premises. User-friendly management of access rights was essential, for both internal and external users. The museums needed a system that will be able to cope easily with changes, site extensions and two-site operation, and a solution that would remove the need to change all cylinders, when an employee loses a key. eCLIQ locking cylinders installed Now, the Historial and Thiepval...
The DSC550 was tested to the new ASTM F2656-20 standard which measures the penetration level from the foremost edge of the barrier versus the back-side of the barrier like the previous standard. This can provide a difference of (1.52 m.) and makes the negative penetration level even more impressive. Design and features The DSC550 Open Frame barrier features a shallow foundation of only 24 inches (61 cm). The open-frame design additionally provides a unique counter-balance design with no spring...
GX-DT35B Smart Care Medical Alarm comes with a brand-new case design. The battery level and the cellular signal strength will be indicated through the white bar on the top cover. In addition, the current status of the system, for example, in learning mode or alarm reporting, will be also indicated through the LED backlight of the large Help button. Users can always be informed of the system status and have peace of mind. GX-DT35B can be compatible with Bluetooth medical devices, like blood gluc...
The 100 Mount Street premium-grade office tower completed in May 2019, is the tallest (152m) building in North Sydney. With an innovative cross-braced exoskeleton structure and a soaring glass curtain wall, the tower celebrates Sydney‘s history of excellence in architecture and structural engineering. The 35-story office tower offers panoramic views of Sydney Harbor, Sydney Opera House, and Sydney Harbor Bridge, and is occupied by some of Sydney’s best-known companies. The site al...
Doncaster Culture and Leisure Trust (DCLT), The Dome, required a new solution that would protect several areas, including one of the largest gym’s in Doncaster, The Fitness Village. Vanderbilt ACT365 system DCLT had a specific brief for this project that specified enhancing the staff and customer experience, while simultaneously providing access control solutions to restricted areas from the general public, members, and staff alike. Oliver Law Security (OLS) Ltd. did not hesitate to rec...
Aiphone, an international manufacturer of intercom and security communication products, is announcing a touchless sensor that allows a way for visitors, vendors, and employees to initiate a contactless call with a simple gesture. Gesture activated calling Compatible with the IX Series door stations for easy installation, the sensor encourages users to “Wave Hello” to activate a call, reducing exposure to germs and the spread of bacteria in high-touch areas. This touchless solution can be easily included anywhere an IX Series door station is installed, offering a reliable method to call inside the facility to the master station without contacting the exterior intercom. Beneficial for high-volume environments This solution is valuable in high-volume environments: Educational facilities and daycare centers Condos, and other multi-tenant residential facilities Office buildings and high-rises Clinics, hospitals, and pharmacies Parking lots and garages Security communication Where security communication is required and lowering the spread of bacteria is critical, visitors or staff can request access by calling with a simple wave of the hand. From here, calls can be screened with crisp audio and clear video. This solution can also be used to greet employees who’ve lost their access control card or to facilitate contactless deliveries. Additionally, the sensor’s detection zone helps avoid unwanted activations from external sources, such as wind or outdoor debris. Its low-profile design and aesthetic look can complement any building exterior.
Johnson Controls, a smart, healthy, and sustainable building, and architect of the OpenBlue digital platforms has announced the introduction of eight additions to its popular Tyco Illustra Flex camera series. High performance and safety With enhanced image processing, improved low-light capability, and secure trunk protection against cyber-attacks, the new NDAA compliant Illustra Flex Gen3 cameras are designed to provide high performance, cost-effective solutions for virtually any video surveillance application. The Illustra Flex Gen3 is capable of connecting into the Johnson Controls OpenBlue platform, a complete suite of connected solutions for sustainability, new healthy occupant experiences, and safety and security solutions. Different Models of Camera With a small footprint, the aesthetically attractive Illustra Flex Gen3 cameras provide a choice of bullet, indoor mini-dome, outdoor mini-dome, and compact camera formats. The new 3MP models will supersede existing Gen2 3-MP Illustra Flex cameras. Advanced camera features The 8MP (4K) models, which feature a built-in suite of intelligent video analytics for enhanced situational awareness and faster response, as well as facilitate exception reporting, complement 4K Flex Gen2 cameras. The external cameras are equipped with built-in adaptive IR illuminators which enable them to capture crisp, clear images day or night, regardless of lighting conditions, up to a distance of 40 meters, while the compact cameras IR illuminators are effective up to 15 meters.
Pyronix launches its latest security peripheral, the MCEXTERNAL-WE outdoor wireless magnetic contact. Perimeter security This tough, tamperproof and weatherproof contact extends perimeter protection applications to secure sheds, garages, gates, and more, with remote voice push notification alerts via the smart device apps, HomeControl2.0 and ProControl+. “We’re very pleased to add this perimeter protection option to the range, as this really extends perimeter protection use case applications of the system as a whole,” Laurence Kenny, Pyronix Marketing Director, said. Easy to fit and voice recognition Featuring an IP66 rating, this highly discreet and versatile Grade 2 device is easy to fit and calibrate while delivering reliable performance with reduced false alarms, even with gaps of up to 70mm between contact and magnet. MCEXTERNAL-WE has been designed to offer maximum coverage and flexibility for multiple purposes Connect the MCEXTERNAL-WE to security cameras to provide perimeter protection with voice push notifications and instant video verification of any intrusion via ProControl+. “The MCEXTERNAL-WE has been designed to offer maximum coverage and flexibility for multiple purposes, whether securing an outbuilding or a gate,” Laurence said. Voice and video- verification He continued: “We’re delighted to add this outdoor contact to the range, as a system can now offer both volumetric coverages of an area using our outdoor XD detectors, as well as a specific outbuilding and perimeter defense with the MCEXTERNAL-WE.” “By adding this to our app-enabled systems, the user will be notified via a voice push notification to their app whenever the contact is triggered – letting them know of a break-in or to simply tell them that their gate has been opened.” “If the contact has been linked to one of our cameras, say the LightCamera, the user will also receive Full-HD video verification and active defense capabilities via ProControl+; increasing not only the level of interactivity and value our security system provides users, but also upsell opportunities for our installers.” Wireless installation Built from quality plastics for satisfying installation, the MCEXTERNAL-WE also provides a wireless range of 300m in open space and outstanding 2-year battery life. Extend perimeter protection applications with the tough, tamperproof, and weatherproof MCEXTERNAL-WE. Secure from the outside in.
The Security Industry Association (SIA) has launched a new course to help industry professionals prepare to take the Certified Security Project Manager (CSPM) exam. The new CSPM Review Course expands SIA’s CSPM offerings; it will be offered virtually and will be taught by CSPM-certified instructors with extensive experience in security project management. Course coverage The course covers the key areas of knowledge and topics tested by the CSPM exam, shares strategies on how to prepare for the exam, and gives course participants a chance to ask the instructors specific questions. Course registrants will also receive a CSPM Review Course Student Workbook that provides reference materials, a study plan worksheet, educational content on domain-specific knowledge, and insights into the test-taking experience. Industrial certification course The CSPM is a highly respected industry certification that demonstrates that the credential holder can manage complex, technical security projects. CSPM is a highly respected certification demonstrating that the credential holder can manage complex, technical security projects It is often earned by security integration professionals, consultants, security managers, and other practitioners and professionals who are regularly providing oversight and support on security projects. Preparing for CSPM exam While taking the new CSPM Review Course does not guarantee success on the exam, SIA Director of Learning and Development Dr. Elli Voorhees said the course was designed to match the needs of many SIA members who have asked for a course that prepares them for the CSPM exam. “Unlike our SPM training courses, which dive deep into explaining key concepts and best practices associated with leading technical security projects, the CSPM Review Course aligns succinctly with the certification exam blueprint,” said Voorhees. “Participants customize a plan of study based upon their own self-assessment and focus on the areas where they may need improvement using the resource guides provided.” CSPM review course The first CSPM Review Course will be offered May 18-20, 2021, from 4-6 p.m. EDT each day. Registration is $595 for SIA members, and the course will be taught by Rex Allen of Allied Universal Technology Services and Brendan McFall of Northland Controls. Full course details can be found here. The new CSPM Review Course rounds out a full complement of SIA’s Security Project Management (SPM) courses. Additional courses include the Basics of SPM Course and the full SPM Training Seminar. Basic and Full SPM The Basics of SPM Course provides 10 hours of education and teaches the fundamentals of managing security projects; it has proven especially valuable for new project managers in the security industry and those aspiring to project management roles. SIA will also be offering remote, virtual test-taking for the CSPM exam The full SPM Training Seminar is a 20-hour in-depth course that provides extensive learning on security project management and is often attended by project managers, lead technicians, and program managers at security integration firms, in addition to corporate security and government security practitioner teams. Virtual courses and tests All SPM courses are live, instructor-led courses that are offered virtually. An on-demand version of the Basics of SPM course is also available on SIA’s website, and information on all courses and a current schedule of course dates can be found on the SPM page. Nearly simultaneously with the launch of the new CSPM Review Course, SIA will also be offering remote, virtual test-taking for the CSPM exam starting May 1. For details on how the new remote CSPM exam testing works, please contact SIA Associate Director of Certification Katie Greatti.
ComplyAdvantage, a data technology company transforming financial crime detection announced a new early-stage anti-money laundering (AML) program aimed at growth-focused startups called ComplyLaunch™. The program provides qualified startups with free access to the company’s award-winning AML and Know Your Customer (KYC) tools and resources needed to uncover and reduce the threat of money-laundering activities so they can onboard new customers with lower risk and greater trust. AML training and education In addition, ComplyAdvantage has partnered with the global financial crime compliance consultancy FINTRAIL to provide AML education and ongoing training for program participants. FINTRAIL is a recognized authority on financial crime prevention in financial technology (FinTech) and the application of regulatory technology (RegTech), working with industry-leading clients across the globe to transform, build, scale, and assure AFC compliance frameworks that are relevant for digital products. Why ComplyLaunch, Why Now? The impetus for ComplyLaunch was to prepare startups to take on money laundering The impetus for the program was to prepare startups to take on one of the biggest challenges their businesses will face, which is money laundering. If transacting startups want to maximize their competitive advantage with new or expanded services, then they need intelligent AML and risk management data solutions to prevent the unintended consequences of unknowingly onboarding criminal entities. Free access to AML As a serial entrepreneur, ComplyAdvantage founder and CEO Charles Delingpole has experienced first-hand the many challenges that startup teams face and that the early-stage prevention of money-laundering shouldn’t be one of them. As such, Delingpole believes that providing free access to ComplyAdvantage’s AML tools will allow more fintech startups to reach success faster by reducing the business exposure due to unforeseen financial crimes. “At ComplyAdvantage, we believe that free early access to AML tools and education on setting up a compliance program is a benefit to our entire fintech ecosystem,” said Charles Delingpole, founder, and CEO of ComplyAdvantage. Maintaining fintech integrity “By democratizing access to best-in-class financial crime prevention tools, we are allowing fintech startups to not only match but exceed the compliance program standards of the largest, most regulated banks. ComplyLaunch is a very important program designed to maintain the integrity of Fintech insurgents by reducing the growing threat of financial crimes.” Startup collaborations The first startups to join ComplyLaunch include trustshare, a company that’s revolutionizing escrow payments, and Juno a company that delivers comprehensive solutions to integrate multi-channel payment services with ERPs and e-Commerce platforms. “Because we’re focused on simplifying bank payments between friends, family, customers, and businesses it made complete sense for our team to join the ComplyLaunch program,” said Pete Bailey, founder, and CPO of Juno. “Partnering with ComplyAdvantage to implement their gold-standard AML detection solution means that we can onboard customers with greater confidence.” Criteria for applications Those early-stage fintech startups with no institutional funding are invited to apply for the program. To apply, applicants must meet the following criteria: Less than $1M in annual revenue Pre-seed - Seed stage A company website or web profile Less than 10 years old “We’re excited to join as a launch partner for ComplyLaunch and to provide program members with access to our world-class AML training”, said James Nurse, Managing Director of FINTRAIL EMEA. “There are future fintech unicorns waiting to grow and early money-laundering and risk prevention resources will only help them to reach their success, faster.” Helping emerging start-ups As a sign of growing community interest, the ComplyLaunch program will be promoted with the support of world-class organizations including the leading talent investor Entrepreneur First and Seccl an innovative technology platform providing outsourced custody for financial services firms looking to safeguard their clients' assets. "There has never been a greater time to start a fintech company and we've seen more and more of the world's most ambitious people wanting to startup in this space,” said Jonny Clifford, of Entrepreneur First. “With the growing complexity of financial service interdependencies, ComplyLaunch is a great idea at the perfect time to help these emerging, disruptive fintech startups to scale more easily and more confidently.” Early access to AML And finally, Max Rimple a Principal at Index Ventures and a lead investor in ComplyAdvantage also shared his thoughts on the program launch, "with the staggering amount of investment capital going into fintech and related financial services, it's important that startups have early access to intelligent AML and risk management tools so they can grow with integrity and confidence." ComplyLaunch is a starting point for fintech founders to safeguard their businesses from the risks of financial crimes "The ComplyLaunch program is a great starting point for fintech founders to safeguard their businesses from the risks of financial crimes. It's also good for their investors who appreciate that early compliance practices help to set the stage for future success." Risk Management ComplyAdvantage offers a true hyperscale financial risk insight and AML data solution that leverages machine learning and natural language processing to help regulated organizations manage their risk obligations and prevent financial crime. The company’s proprietary database is derived from millions of data points that provide dynamic, real-time insights across sanctions, watchlists, politically exposed persons, and negative news. This reduces dependence on manual review processes and legacy databases by up to 80% and improves how companies screen and monitor clients and transactions.
The Boson® camera core represents the best in FLIR high-performance uncooled thermal imaging technology within a small, lightweight, and low-power package, and FLIR partners and customers will have the option to purchase radiometric versions that can capture the temperature data of every pixel in the scene. Camera configurations The new Boson radiometric camera core comes in two versions, 640 x 512 or 320 x 256 resolutions with multiple lens configurations and the ability to capture temperature data for quantitative assessment. The camera core is meant for use in systems across a variety of applications including firefighting, surveillance, security, unmanned systems, industrial inspection, and fixed-asset monitoring. Assessing temperature accuracy The Boson SDK feature provides guidance across five confidence grades offering in-the-moment assessment Featuring radiometric accuracy provides ±5 °C (±8 °F) or ±5% temperature measurement accuracy, the Boson Radiometric cameras include a Spot Meter Accuracy software feature that provides an assessment of how accurate a given temperature measurement appears in the scene. Available as telemetry data accessed through the Boson SDK or the Boson graphical user interface (GUI), this feature provides guidance across five confidence grades offering in-the-moment assessment to help improve temperature measurement confidence. Spot meter accuracy In addition, the Spot Meter Accuracy software feature gives operators the ability to account for dynamic ambient temperatures, along with the ability to configure measurements prior to operation, including adjusting emissivity and thermal gain settings. These functions are crucial for outdoor environments and the swift movements of unmanned antenna drones and automated ground vehicles. The software also offers inspection and assessment features, including spot meters and windows that pinpoint temperature measurement in the scene that the camera is focused on, and atmospheric correction capabilities during post-processing analysis. 40 years of thermal imaging expertise The Boson family of thermal imaging cores is an important part of the 40 plus years of thermal imaging expertise that FLIR offers. As a result of this expertise, the Boson thermal imaging cores utilize a high sensitivity 12-micron pixel pitch detector that provides high-resolution thermal imaging in a small, low-power, lightweight, and turnkey package. All Boson cores feature FLIR infrared video processing architecture, noise reduction filters, and local-area contrast. The imaging processing capabilities accommodate industry-standard communication interfaces, including visible CMOS and USB.
Display solutions play a key role in SOCs in providing the screens needed for individuals and teams to visualize and share the multiple data sources needed in an SOC today. Security Operation Center (SOC) Every SOC has multiple sources and inputs, both physical and virtual, all of which provide numerous data points to operators, in order to provide the highest levels of physical and cyber security, including surveillance camera feeds, access control and alarm systems for physical security, as well as dashboards and web apps for cyber security applications. Today’s advancements in technology and computing power not only have increasingly made security systems much more scalable, by adding hundreds, if not thousands, of more data points to an SOC, but the rate at which the data comes in has significantly increased as well. Accurate monitoring and surveillance This has made monitoring and surveillance much more accurate and effective, but also more challenging for operators, as they can’t realistically monitor the hundreds, even thousands of cameras, dashboards, calls, etc. in a reactive manner. Lacking situational awareness is often one of the primary factors in poor decision making In order for operators in SOC’s to be able to mitigate incidents in a less reactive way and take meaningful action, streamlined actionable data is needed. This is what will ensure operators in SOC truly have situational awareness. Situational awareness is a key foundation of effective decision making. In its simplest form, ‘It is knowing what is going on’. Lacking situational awareness is often one of the primary factors in poor decision making and in accidents attributed to human error. Achieving ‘true’ situational awareness Situational awareness isn’t just what has already happened, but what is likely to happen next and to achieve ‘true’ situational awareness, a combination of actionable data and the ability to deliver that information or data to the right people, at the right time. This is where visualization platforms (known as visual networking platforms) that provide both the situational real estate, as well as support for computer vision and AI, can help SOCs achieve true situational awareness Role of computer vision and AI technologies Proactive situational awareness is when the data coming into the SOC is analyzed in real time and then, brought forward to operators who are decision makers and key stakeholders in near real time for actionable visualization. Computer vision is a field of Artificial Intelligence that trains computers to interpret and understand digital images and videos. It is a way to automate tasks that the human visual system can also carry out, the automatic extraction, analysis and understanding of useful information from a single image or a sequence of images. There are numerous potential value adds that computer vision can provide to operation centers of different kinds. Here are some examples: Face Recognition: Face detection algorithms can be applied to filter and identify an individual. Biometric Systems: AI can be applied to biometric descriptions such as fingerprint, iris, and face matching. Surveillance: Computer vision supports IoT cameras used to monitor activities and movements of just about any kind that might be related to security and safety, whether that's on the job safety or physical security. Smart Cities: AI and computer vision can be used to improve mobility through quantitative, objective and automated management of resource use (car parks, roads, public squares, etc.) based on the analysis of CCTV data. Event Recognition: Improve the visualization and the decision-making process of human operators or existing video surveillance solutions, by integrating real-time video data analysis algorithms to understand the content of the filmed scene and to extract the relevant information from it. Monitoring: Responding to specific tasks in terms of continuous monitoring and surveillance in many different application frameworks: improved management of logistics in storage warehouses, counting of people during event gatherings, monitoring of subway stations, coastal areas, etc. Computer Vision applications When considering a Computer Vision application, it’s important to ensure that the rest of the infrastructure in the Operation Center, for example the solution that drives the displays and video walls, will connect and work well with the computer vision application. The best way to do this of course is to use a software-driven approach to displaying information and data, rather than a traditional AV hardware approach, which may present incompatibilities. Software-defined and open technology solutions Software-defined and open technology solutions provide a wider support for any type of application the SOC may need Software-defined and open technology solutions provide a wider support for any type of application the SOC may need, including computer vision. In the modern world, with everything going digital, all security services and applications have become networked, and as such, they belong to IT. AV applications and services have increasingly become an integral part of an organization’s IT infrastructure. Software-defined approach to AV IT teams responsible for data protection are more in favor of a software-defined approach to AV that allow virtualised, open technologies as opposed to traditional hardware-based solutions. Software’s flexibility allows for more efficient refreshment cycles, expansions and upgrades. The rise of AV-over-IP technologies have enabled IT teams in SOC’s to effectively integrate AV solutions into their existing stack, greatly reducing overhead costs, when it comes to technology investments, staff training, maintenance, and even physical infrastructure. AV-over-IP software platforms Moreover, with AV-over-IP, software-defined AV platforms, IT teams can more easily integrate AI and Computer Vision applications within the SOC, and have better control of the data coming in, while achieving true situational awareness. Situational awareness is all about actionable data delivered to the right people, at the right time, in order to address security incidents and challenges. Situational awareness is all about actionable data delivered to the right people Often, the people who need to know about security risks or breaches are not physically present in the operation centers, so having the data and information locked up within the four walls of the SOC does not provide true situational awareness. hyper-scalable visual platforms Instead there is a need to be able to deliver the video stream, the dashboard of the data and information to any screen anywhere, at any time — including desktops, tablets phones — for the right people to see, whether that is an executive in a different office or working from home, or security guards walking the halls or streets. New technologies are continuing to extend the reach and the benefits of security operation centers. However, interoperability plays a key role in bringing together AI, machine learning and computer vision technologies, in order to ensure data is turned into actionable data, which is delivered to the right people to provide ‘true’ situational awareness. Software-defined, AV-over-IP platforms are the perfect medium to facilitate this for any organizations with physical and cyber security needs.
Human beings have a long-standing relationship with privacy and security. For centuries, we’ve locked our doors, held close our most precious possessions, and been wary of the threats posed by thieves. As time has gone on, our relationship with security has become more complicated as we’ve now got much more to be protective of. As technological advancements in security have got smarter and stronger, so have those looking to compromise it. Cybersecurity Cybersecurity, however, is still incredibly new to humans when we look at the long relationship that we have with security in general. As much as we understand the basics, such as keeping our passwords secure and storing data in safe places, our understanding of cybersecurity as a whole is complicated and so is our understanding of the threats that it protects against. However, the relationship between physical security and cybersecurity is often interlinked. Business leaders may find themselves weighing up the different risks to the physical security of their business. As a result, they implement CCTV into the office space, and alarms are placed on doors to help repel intruders. Importance of cybersecurity But what happens when the data that is collected from such security devices is also at risk of being stolen, and you don’t have to break through the front door of an office to get it? The answer is that your physical security can lose its power to keep your business safe if your cybersecurity is weak. As a result, cybersecurity is incredibly important to empower your physical security. We’ve seen the risks posed by cybersecurity hacks in recent news. Video security company Verkada recently suffered a security breach as malicious attackers obtained access to the contents of many of its live camera feeds, and a recent report by the UK government says two in five UK firms experienced cyberattacks in 2020. Cloud computing – The solution Cloud stores information in data centres located anywhere in the world, and is maintained by a third party Cloud computing offers a solution. The cloud stores your information in data centres located anywhere in the world and is maintained by a third party, such as Claranet. As the data sits on hosted servers, it’s easily accessible while not being at risk of being stolen through your physical device. Here’s why cloud computing can help to ensure that your physical security and the data it holds aren’t compromised. Cloud anxiety It’s completely normal to speculate whether your data is safe when it’s stored within a cloud infrastructure. As we are effectively outsourcing our security by storing our important files on servers we have no control over - and, in some cases, limited understanding of - it’s natural to worry about how vulnerable this is to cyber-attacks. The reality is, the data that you save on the cloud is likely to be a lot safer than that which you store on your device. Cyber hackers can try and trick you into clicking on links that deploy malware or pose as a help desk trying to fix your machine. As a result, they can access your device and if this is where you’re storing important security data, then it is vulnerable. Cloud service providers Cloud service providers offer security that is a lot stronger than the software in the personal computer Cloud service providers offer security that is a lot stronger than the software that is likely in place on your personal computer. Hyperscalers such as Microsoft and Amazon Web Service (AWS) are able to hire countless more security experts than any individual company - save the corporate behemoth - could afford. These major platform owners have culpability for thousands of customers on their cloud and are constantly working to enhance the security of their platforms. The security provided by cloud service providers such as Claranet is an extension of these capabilities. Cloud resistance Cloud servers are located in remote locations that workers don’t have access to. They are also encrypted, which is the process of converting information or data into code to prevent unauthorized access. Additionally, cloud infrastructure providers like ourselves look to regularly update your security to protect against viruses and malware, leaving you free to get on with your work without any niggling worries about your data being at risk from hackers. Data centres Cloud providers provide sophisticated security measures and solutions in the form of firewalls and AI Additionally, cloud providers are also able to provide sophisticated security measures and solutions in the form of firewalls and artificial intelligence, as well as data redundancy, where the same piece of data is held within several separate data centres. This is effectively super-strong backup and recovery, meaning that if a server goes down, you can access your files from a backup server. Empowering physical security with cybersecurity By storing the data gathered by your physical security in the cloud, you're not just significantly reducing the risk of cyber-attacks, but also protecting it from physical threats such as damage in the event of a fire or flood. Rather than viewing your physical and cybersecurity as two different entities, treat them as part of one system: if one is compromised, the other is also at risk. They should work in tandem to keep your whole organization secure.
The transition to remote working has been a revelation for many traditional office staff, yet concerns over data security risks are rising. Mark Harper of HSM explains why businesses and their remote workers must remain vigilant when it comes to physical document security in homes. Pre-pandemic, home offices were often that neglected room in people’s homes. But now things are different. After the initial lockdown in 2020, 46.6% of UK workers did some work at home with 86% of those doing so because of the pandemic. Semi-Permanent workspaces Since then, many have found that over time, those semi-permanent workspaces have become slightly more permanent – with official hybrid working coming into effect for an assortment of businesses and their teams. The adoption of hybrid working can in fact be seen as one of the few positives to come from the pandemic, with less travel, more freedom and higher productivity top of the benefits list for businesses and their employees. The handling of sensitive documents, is a growing concern for office managers But those welcomed benefits don’t tell the whole story. The transition to remote working has undoubtedly impacted workplace security, with various touch points at risk. The handling of sensitive documents for example, is a growing concern for office managers. In simpler times, sensitive data was more or less contained in an office space, but with millions of home setups to now think about, how can businesses and their office managers control the issue of desk data? Physical document security As of January 2021, it’s said that one in three UK workers are based exclusively at home. That’s millions of individuals from a variety of sectors, all of which must continue in their efforts to remain data secure. With that, reports of cyber security fears are consistently making the news but that shouldn’t be the sole focus. There is also the underlying, but growing, issue of physical document security. The move to remote working hasn’t removed these physical forms of data – think hard drives, USBs and paper based documentation. A recent surge in demand for home printers for example, only exemplifies the use of physical documents and the potential security issues home offices are facing. Adding to that, research conducted in 2020 found that two out of three employees who printed documents at home admitted to binning those documents both in and outside of their house without shredding them. Data security concern Without the right equipment, policies and guidance, businesses are sure to be at risk Those findings present a huge data security concern, one that must be fixed immediately. The Information Commissioner’s Office (ICO) has since released guidance for those working from their bedrooms and dining tables. Designed to help overcome these challenges, the ‘security checklists’ and ‘top tips’ should be the first port of call for many. Yet throughout, the ICO make reference to ‘following your organization’s policies and guidance’ – highlighting that the onus isn’t solely on the individuals working from their makeshift offices. Office managers have a monumental task on their hands to ensure teams are well equipped within their home setups. Without the right equipment, policies and guidance, businesses are sure to be at risk. But it would be wrong to insinuate that unsecure desk data has only now become an issue for organizations. Modern office spaces Keeping clear desks has long been a battle for many office managers. In fact, clear desk policies are practiced in most modern office spaces, with it recognized as a key preventative to personal information being wrongly accessed and so falling foul of GDPR legislation. Throwing sensitive documents in the bin was never an option pre-pandemic However, the unsupervised aspect of home working has led to a potentially more lax approach to these policies, or in some cases, they can’t be followed at all. For those taking a more laid back approach, organization leaders must remind staff of their data security responsibilities and why clear desk policies have previously proven effective. Ultimately, throwing sensitive documents in the bin was never an option pre-pandemic and this must be carried through to home workspaces now. Securely destroy documents There are also concerns over the equipment people have access to at home. For example, without a reliable home shredding solution, data security suddenly becomes a tougher task. To add to that, several recommendations state that employees working from home should avoid throwing documents away by instead transporting them to the office for shredding once lockdown rules ease. While this is an option, it does pose further issues, with document security at risk of accidental loss or even theft throughout the transportation period, not to mention the time spent in storage. The best and most effective way to securely destroy documents is at the source, especially in environments where higher levels of personal data is regularly handled. Correct shredding equipment The recent findings on home office behavior represent a true security risk Only when home workers implement their own clear desk policies alongside the correct shredding equipment (at the correct security level), can both home office spaces and regular offices become data secure. Realistically, these solutions should, like the common home printer, become a staple in home office spaces moving forward. The likelihood is that many UK workers will remain in their home offices for the foreseeable future, only to emerge as hybrid workers post-pandemic. And while the current working environment is more ideal for some than others, the recent findings on home office behavior represent a true security risk to organizations. With this in mind, it’s now more key than ever for business leaders, their office managers and homeworkers to all step up and get a handle on home data security policies (as well as maintaining their standards back at the office) – starting with the implementation of clear desk policies. After all, a clear desk equals a clear mind.
When 150,000 video surveillance cameras get hacked, it’s big news. Even if the main reason for the hack was to make a point. Even if the major consequence is bad publicity for a video company (and, by extension, the entire video surveillance industry). The target of the hack was Silicon Valley startup Verkada, which has collected a massive trove of security-camera data from its 150,000 surveillance cameras inside hospitals, companies, police departments, prisons and schools. Previously, Verkada has been known for an aggressive sales approach and its intent to disrupt the traditional video market. The data breach was accomplished by an international hacker collective and was first reported by Bloomberg. The reported reasons for the hack were “lots of curiosity, fighting for freedom of information and against intellectual property, a huge dose of anti-capitalism, a hint of anarchism – and it’s also just too much fun not to do it,” according to Bloomberg. Tesla amongst those impacted The “fun” included access to a video showing the inside of a Florida hospital, where eight hospital staffers tackled a man and pinned him to the bed. Inside a Massachusetts police station, officers are seen questioning a man in handcuffsA view inside a Tesla warehouse in Shanghai, China, showed workers on an assembly line. Inside a Massachusetts police station, officers are seen questioning a man in handcuffs. There are even views from Verkada security cameras inside Sandy Hook Elementary School in Connecticut, where a gunman killed more than 20 people in 2012. In a “security update” statement, Verkada reports: “Our internal security experts are actively investigating the matter. Out of an abundance of caution, we have implemented additional security measures to restrict account access and further protect our customers.” Hacking was possible due to built-in feature The hacker group was able to obtain “root” access on the cameras, meaning they could use the cameras to execute their own code, reports Bloomberg. Obtaining this degree of access to the camera did not require any additional hackingUsing that access, they could pivot and obtain access to the broader corporate network of Verkada’s customers or hijack the cameras and use them as a platform to launch future hacks, the hackers told Bloomberg. Obtaining this degree of access to the camera did not require any additional hacking, as it was a built-in feature. Elisa Costante, VP of research for cybersecurity firm Forescout, calls the Verkada security camera hack "shocking." "Connected cameras are supposed to provide an additional layer of security to organizations that install them,” she says. “Yet, as the Verkada security camera breach has shown, the exact opposite is often true. [It is worrisome that] the attack wasn't even very sophisticated and didn't involve exploiting a known or unknown vulnerability. The bad actors simply used valid credentials to access the data stored on a cloud server.” Super Admin account had access to all cameras Hackers gained access to Verkada through a “Super Admin” account, allowing them to peer into the cameras of all of its customers. They found a username and password for an administrator account publicly exposed on the internet, according to Bloomberg. The hackers lost access to the video feeds and archives after Bloomberg contacted Verkada.Hackers lost access to the video feeds and archives after Bloomberg contacted Verkada The results could have been worse, says Costante. "In this case, the bad actors have seemingly only resorted to viewing the footage these cameras have captured. But they are likely able to cause a lot more damage if they choose to do so, as our own research team has discovered. We were able to intercept, record and replace real-time footage from smart cameras by exploiting unencrypted video streaming protocols and performing a man-in-the-middle attack. This effectively gives criminals a virtual invisibility cloak to physically access premises and wreak havoc in the real world.” Impact on broader video surveillance industry The impact of a well-publicised cyber-attack on the broader video surveillance industry is also a concern. “As an industry, and as manufacturers in physical security, we cannot take these hacks lightly,” says Christian Morin, CSO & Vice-President of Integrations & Cloud Services, Genetec. “The potential broad-reaching impact of these hacks on physical security systems, including providing a beachhead to facilitate lateral movement onto networks, resulting in data and privacy breaches or access to critical assets and infrastructure, cannot be overstated. It is our responsibility and duty to users of our technology to prioritise data privacy and cybersecurity in the development, distribution, and deployment of video surveillance systems.” Widespread government and healthcare use The Verkada cameras are in widespread use within government and healthcare, which are by far the company’s most dominant verticals. Lesser verticals for them are manufacturing, financial and retail.The Verkada website pledges to take privacy seriously Verkada’s line of hybrid cloud security cameras combines edge-based processing with the capabilities of cloud computing. Cameras analyse events in real-time, while simultaneously leveraging computer vision technology for insights that bring speed and efficiency to incidents and investigations. Command, Verakda’s centralised web-based platform, provides users with access to footage they need. Motion detection, people analytics, and vehicle analytics enable searches across an organization to find relevant footage. The Verkada website pledges to take privacy seriously: “We are passionate about developing products that enhance the security and privacy of organizations and individuals. We believe that well-built, user-friendly systems make it easier to manage and secure physical environments in ways that respect the privacy of individuals while simultaneously keeping them safe.”
A result of the COVID-19 pandemic has been fewer crowds gathering for outdoor events. However, sooner or later, crowded events will surge, as will the danger of injury or death from vehicle attacks. The threats of vehicular violence are still present even though collisions have become less frequent and traffic, in general, is at a significant low. Preparing for such instances remains a high priority, and institutions are seeking to take a preemptive stance to prevent major incidents before they happen. Vehicle security barriers Even amid the pandemic, manufacturers of vehicle barriers have not seen a major impact on their sales. “Half of the battle against aggressors perpetrating a vehicle attack is pre-planning,” says Greg Hamm, Vice President of Sales and Marketing, Delta Scientific. He says Delta is fortunate to have long-standing trust relationships with many agencies, built over the last 46 years. “We're happy to see that demand for vehicle security barriers has not changed much – customers are preparing for the future when crowds will be present again, and probably larger than ever,” adds Stuart Glen, National Sales Manager of Jackson’s Fencing. “Lots of councils are using the downtime to install or upgrade security around town and city centers, which is promising.” Physical structures such as bollards, barriers, and barricades can stop a vehicle from entering a high-foot-traffic area. Temporary venues can deploy portable barriers. "We're happy to see that demand for vehicle security barriers has not changed much" Fully automated system The first consideration is the level of security required for a particular location. A parking garage for a foreign embassy or federal courthouse will require far more serious security measures than a parking lot for a mall. Other primary factors to consider include the frequency of vehicles moving in and out and whether there will be vehicle inspections performed or a fully automated system at the entrance. “A key challenge when protecting people from vehicle attacks is trying to ensure that the public are kept safe, but do not feel worried or overly aware of any risks,” says Glen. “People should feel protected and be able to move freely. Discreet measures such as bollards are ideal as they don't restrict pedestrian flow but are very effective in the case of a hostile vehicle attack.” Sparking future assaults The use of vehicles as tools of destruction has become one of the top concerns for security specialists Events and sports venues need increased protection as they are likely targets due to the high numbers of crowds. Places of worship are sadly another target that should be given extra protection, says Glen. The use of vehicles as tools of destruction has become one of the top concerns for security specialists. This tactic has grown popular regardless of ideology and is especially alarming when coupled with cars’ accessibility. In many places, individuals only need a valid driver’s license to rent a truck. News of a particular attack encourages or inspires other individuals to perpetuate the same form of violence. Unfortunately, this creates a feedback loop as more reports emerge following these tragedies, potentially sparking future assaults. Straightforward security solutions In the case of vehicle-ramming attacks, there are straightforward security solutions to protect patrons. Delta Scientific offers over 100 product designs, emphasizing barriers that stop and destroy attacking vehicles. Delta’s barriers carry crash ratings from PU50 up to K54 and include sophisticated control systems that provide custom optimization. Control systems feature the latest, most advanced protection technology. Early warning systems enable active security measures built into Delta products plus alert features to on-site security personnel. Delta Scientific’s High Security Protection and Barricade Systems are used internationally by governments, armed forces, federal agencies, private corporations, and other industries. Jackson’s Fencing’s range of solutions includes fencing, bollards, road blockers, and gates. They have been tested to PAS 68 standards and can stop a 7.5-ton vehicle traveling at 50mph (80km/h). The products come with a 25-year guarantee. Attractive timber appearance They offer crash ratings up to M50 and include both automated barriers and passive bollards In addition, their unique Linebacker PNR system is a cable crash fence, encased within a timber post and rail fence, offering a completely discreet yet highly effective vehicle security barrier with an attractive timber appearance. Facilities that require day-to-day employee and civilian access need permanent solutions installed to thwart daily terror threats, says Hamm of Delta Scientific. Solutions include wedge barriers, bollards, beams, and sliding gates with high duty cycles and excellent reliability coupled with appropriate crash ratings. Local fairs and festivals, parades, conventions, sports, and vaccination sites utilize portable barriers that can be towed into place and set up within 30 minutes. They offer crash ratings up to M50 and include both automated barriers and passive bollards. They can be plugged into a local 120v source and provide a portable solution that allows vehicle throughput by pushing a button. Vehicle-borne attacks Both temporary and permanent barriers are extremely effective, says Glen of Jackson’s Fencing. Temporary barriers can be deployed rapidly and removed when a threat has passed (for example, an event such as the London marathon, where large crowds gather), while permanent measures are used for sites that will always be a high-risk target. Glen says temporary barriers also generally have a more dominating appearance and wider footprint. Permanent measures are used for sites that will always be a high-risk target. Temporary barriers can be used immediately after a risk assessment highlights vehicle-borne attacks as a threat to a site before permanent measures are installed. They can help to identify the ideal positioning of permanent barriers – often it's a case of trial and error before finding a solution that works well for one’s particular needs. The United States Department of Homeland Security (DHS) has provided certification according to the Support Anti-terrorism by Fostering Effective Technology Act (SAFETY Act) of 2002. Access control products This certification minimizes insurance risks for organizations that deploy authorized Delta vehicle access control products to protect against terrorists and errant drivers. All products certified are covered retroactively back to 1984 and are now authorized to carry the SAFETY Act Designated mark. By minimizing insurance risks to deploying authorized Delta vehicle access systems, this certification lets customers feel comfortable knowing that they have the full faith and backing of the Department of Homeland Security. A common planning deficiency occurs when designers choose non-certified barriers or barricades A common planning deficiency occurs when designers choose non-certified barriers or barricades. Certified equipment has been tested and proven to work under extreme conditions, thus giving planners the confidence they rely on. No area is more critical to the vehicle barrier selection process than testing. Without adequate testing, there is no assurance that the barrier will resist the threat. Independent testing company Testing is normally done by an independent testing company or government agency, such as the Department of State (DOS) and ASTM. Comprehensive reports of test results are issued and are available from the testing agency or manufacturer. A common misconception among the general public is that the barriers are ‘ugly,’ but this often comes from the appearance of temporary barriers that are installed for testing purposes before deciding on permanent measures. Temporary barriers often have a large footprint because they have no foundations and can be quite obtrusive. There are actually many discreet and attractive permanent solutions such as road blockers and stainless steel rising bollards, which allow flexible control over entry and security, and can be rapidly activated.
Following its recent acquisition, Vidsys will continue to operate, now as an ‘An ARES Security Company’. The Vidsys brand is known worldwide for its PSIM (physical security information management) solution and the acquisition will accelerate the next generation of products that incorporate Artificial Intelligence (AI) to enhance their value to Vidsys clients and the overall market. ARES Security Corporation has developed and deployed security and public safety software solutions for the past 20 years, solving complex physical security challenges. Their AVERT security software solution supports the full lifecycle of physical security operations: risk and technology assessment and design, training, and intelligent real-time incident response. AVERT security software AVERT security software helps clients by increasing security effectiveness and reducing cost AVERT security software helps clients by increasing security effectiveness and reducing cost. Clients are in many market segments including Corporate, Military, Government, Power, Data Centers, Transportation and Ports. Vidsys’ PSIM will immediately be improved by incorporating AVERT C2 (Command & Control), allowing clients access to expanded capabilities and an advanced technical roadmap. “Over time we will migrate the Vidsys technology to our state-of-the-art, multi-tenant SaaS architecture that includes secure, multi-site data sharing, an updated library of connectors, and integration to the AVERT digital twin, artificial intelligence/machine learning and automation capability,” said Ben Eazzetta, ARES Security Corporation’s Chief Executive Officer (CEO). Technical roadmap for upgrading to AI-PSIM platform “We are a client-centric company, and we will continue to support Vidsys clients,” stated Ben Eazzetta, adding “We will focus initial efforts towards closing any required and promised capability gaps and offer a significantly improved technical roadmap for the platform to be upgraded to AI-PSIM.” Additional AVERT products will be made available to Vidsys clients in a ‘cost-effective way’. They include technology for assessment and design, virtual tabletop and virtual reality training and enhanced AI and robotics capability surrounding the digital twin. A ‘digital twin’ is a digital representation of a physical object. Rapid incident response and robotic sentries interfaces ARES/Vidsys solution offers capabilities with extremely high levels of automation for rapid incident response ARES has a strong market position in several verticals that require a robust and automated next-generation AI-PSIM. The ARES/Vidsys solution offers capabilities with extremely high levels of automation that enable rapid incident response and incorporate advanced features, such as interfaces to robotic sentries. “These capabilities, along with a more automated deployment process, will allow Vidsys to scale their acquisition of customers across key verticals in which ARES is already active. This automated deployment process will also open new opportunities to work with system integrators who have shied away from PSIM projects in recent years,” stated Ben Eazzetta. Optimizing security operations ARES believes the physical security market is underserved by technology that optimizes operations. Ben Eazzetta adds, “All of our products are designed to optimize security operation, and the acquisition of Vidsys allows us to accelerate the development of the next generation PSIM that is adaptive and intelligent, powered by AVERT’s AI, and Modeling and Simulation system.” Vidsys pioneered PSIM in the security industry and created a robust library of connectors, providing an integrated real-time incident response system powered by a rules engine. Together, the AVERT/Vidsys solution seeks to transform the way security operations centers (SOCs) operate and respond to emergencies. Vidsys pioneered PSIM in the security industry and created a robust library of connectors Managing security at multiple sites Ben Eazzetta said, “There’s no denying that some in the security industry see PSIM as a four-letter word. But PSIM exists because it meets a need in the security operations center that cannot be met by either video management or incident management systems. It is critical that PSIM evolves to meet the rapidly changing demands of enterprise clients.” He adds, “Our clients need to manage security at multiple sites, each with different security plans and threats, they need adaptive rules engines to manage complex incidents and emergency responses, and they need automation to seamlessly command and control all security assets, including robotic assets.” Flexible and intelligent software Future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation “The future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation that enables very rapid incident response and incorporates advanced capabilities such as interfaces to robotic sentries,” said Ben Eazzetta. He adds, “To achieve this, we are replacing the brittle, difficult-to-configure rules engine of today’s PSIM with machine learning and AI capabilities that can produce automated/optimized responses or recommendations in near real time.” SaaS-enabled and remotely hosted system The systems will be SaaS-enabled, remotely hosted and easily configurable to reduce the cost and time of deployments for large enterprise implementations and easily supported by end-users, and system integrators. In a post-Covid-19 world, it is critical that enterprise security software solutions be adaptive, intelligent, automated and offer the ability for disparate teams to share information and collaborate in a meaningful way, while responding to incidents and emergencies in real-time. The ARES/Vidsys offering is a lifecycle solution that meets the needs of enterprise security operations. Next-generation of AI-PSIM “ARES has always pushed the needle of what is possible with our AVERT solution, ever since development of our digital twin technology began in 1999 to protect our nation’s nuclear stockpiles,” said Ben Eazzetta, adding “Today, we continue to innovate with the next generation of AI-PSIM.” So what’s ahead for ARES and Vidsys in 2021? “A lot of Zoom calls!” laughs Eazzetta, adding “We are excited to leverage the decades of hard work that both teams have put into our solutions. We all realize the fantastic opportunity we have been given to create a next-generation AI-PSIM and to open new markets for all of our products and solutions.” He adds, “Combining the two companies will lead to improved development/support capability and significantly improved roadmaps for our clients. We will provide immediate ROI for clients by lowering deployment costs and leveraging the entire suite of products to provide more immediate value while continuing to deliver as promised, like ARES always does.”
An important heritage site which played a key role in protecting the UK during World War II is itself being made safe and secure with the installation of a comprehensive and fully integrated security system, including more than 75 Dahua HD CCTV cameras. Battle of Britain Bunker The Battle of Britain Bunker is an underground operations room in Uxbridge, formerly used by No. 11 Group Fighter Command during the Second World War, most notably in the Battle of Britain and on D-Day. The operations room was one of the key parts of the world’s first integrated defense system, which linked Fighter Command with Anti-Aircraft Command, Barrage Balloon Command, the Observer Corps, radar, and the intelligence services. The site is run by Hillingdon Council as a heritage attraction with a museum and a visitor center. Fully integrated security solution DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Center VMS DSSL Group completed a full analysis of the existing CCTV and intruder alarm systems, with the aim of creating a fully integrated security solution, to enhance the security around the site, reduce manned security costs, and speed up remote security and police response times. Using the existing wireless network also designed by them across the borough, DSSL Group installed more than 75 Dahua HD CCTV cameras linked to a Genetec Security Center video management system (VMS), as well as Axis IP PA speakers externally. All cameras are viewable by management and the security team on site, and also from Hillingdon Council’s main CCTV control room. Surveillance cameras with smart analytics using AI External cameras are equipped with smart analytics using AI, to help secure the perimeter of the site. In 2018, a state-of-the-art wireless CCTV system consisting of more than 1,000 Dahua HD cameras, along with Dahua NVRs, XVRs and control and viewing equipment, was installed across the borough by DSSL Group. More recently, an additional 1,000 Dahua HD cameras have been added to the council's network making it 2,000 in total. In addition to the cameras, DSSL Group installed a Honeywell Galaxy 62-zone intruder alarm system which feeds back to a central monitoring station and is also integrated with the VMS. Dahua CCTV system installed Cllr Richard Lewis, Hillingdon Council’s Cabinet Member for Cultural Services, Culture and Heritage, said “The Battle of Britain Bunker is one of Hillingdon’s treasured heritage sites. It played a pivotal role in the Second World War, and it’s important that we keep it protected. Dahua CCTV system will help us to do that with their state-of-the-art system and high performing cameras.”
A networked surveillance system has been installed at Petwood Hotel in Lincolnshire, the former home of members of 617 Squadron, more famously known as The Dambusters, during World War 2. The hotel, situated in the village of Woodhall Spa, was originally built in 1905, as a country house for a wealthy Baroness, and after serving as a military convalescence hospital during World War 1, was converted into a hotel in 1933. Located among magnificent lawns and landscaped gardens, the Grade II-listed hotel has 53 bedrooms, a Squadron Bar filled with World War II memorabilia, a restaurant and terrace bar, and function rooms. Dahua Smart PSS viewing platform The system at the Petwood Hotel comprises 12 HFW5431-ZE bullet cameras, four HDBW5431-ZE dome cameras, and 13 HDBW2421R-ZS mini dome cameras. Images are recorded and processed on to a central server, while viewing is managed by a Dahua Smart PSS viewing platform. Some 29 Dahua bullet, dome and mini-dome network cameras have been installed by Videcom Security around the hotel. Externally, cameras monitor the car parks, where previously there were incidents of damage to vehicles. With the new system, however, the source of any damage can be quickly located, so helping with guests’ insurance claims. Other cameras are positioned so that the hotel’s management has coverage of the entire perimeter. Perimeter protection Inside, cameras are located in public areas such as reception, the bar area and function rooms Inside, cameras are located in public areas such as reception, the bar area and function rooms. They are designed to help resolve payment discrepancies and to deter any unwarranted behavior. Images from the cameras go back to a secure room in the hotel’s separate office block, while staff at reception is able to view live images. “The Dahua system delivers all the benefits we were looking for,” said George Kane, General Manager at the Petwood Hotel. It is reliable, easy to use, and provides excellent quality recorded images, which can be accessed quickly and easily. The cameras are discreet and sensitively installed in and around the listed building. Video surveillance system The technology is great and Videcom Security have handled the project well and sensitively, considering the building is more than 100 years’ old and the hotel remained open throughout the period of installation. “The new surveillance system has been brilliant. The high image quality will enable us to resolve any liability issues in the car parks, while the system reassures guests and staff about internal and external security,” said Danny Harsley, Northern Engineering Manager at Videcom Security. Danny adds, “The Dahua equipment was ideal for this project and, as we have found on many other projects, was easy to install and commission. It’s also a great system to use.”
As a multi-faceted community with several buildings, public safety services, healthcare facilities, schools, childcare, barracks, a commissary and a visitor’s center, a typical U.S. Military base is a city in itself. Beyond the protection of armed forces personnel, the base is responsible for the safety of many civilians and civil servants. With such high standards and complex needs, U.S Military bases recognize the need for intelligent security systems that enable proactive monitoring, provide fast and smart forensics and comply with NDAA Section 889. Challenges faced by the US Military Base Inadequate situational awareness - The size and diversity of the military base pose a challenge. Past security measures led to gaps in coverage, leaving the base vulnerable to both internal and external threats. In addition, the COVID-19 pandemic created the need for increased situational awareness. Without a real-time and dynamic understanding of the environment, it became increasingly difficult to enforce preventative measures to control and mitigate the risk of transmission. Slow incident response time - Speed is critical. Within the confines of the military base, the consequences of slow incident response time can be devastating and even sometimes deadly. The longer it takes for the Security Operation Center (SOC) to gather, understand, and analyze the details of the incident, the greater the threat becomes. It became clear that responding to an Active Shooter, vehicle breach, or an assault, required immediate action that wasn’t available through their existing technology. Limited real-time analytic capabilities - The base wanted to prevent incidents from occurring rather than reacting after an incident has occurred. The traditional method of receiving an emergency call and responding after the fact was too costly. The US Base needed a platform that would provide the security team with automation notifications and alerts based on anomalies and rule-violations that were captured on video. NDAA-889 compliance - All military bases must meet the NDAA-889 compliance which states that the U.S. Government has banned specific telecommunications and video surveillance equipment utilising chips manufactured in China. Government contractors must help agencies remove/ replace banned equipment by Aug 12, 2021. Why Ava? One U.S. Military Base recently turned to Ava for an end-to-end intelligent security solution that would meet its full range of needs. Their requirements were a platform that was: Proactive - When there is a need to respond to a threat, the response needed to be immediate. Precise - On a base of this size, it was critical to pinpoint the exact location and nature of a security event in seconds - not hours or days. Simple - The system needed be straightforward to implement, manage and use within the existing infrastructure and cameras. Ease of use saves time and lives. Scalable - The system needed to be able to scale to thousands of cameras. Protecting military personnel and staff at the base Using Ava, operators can add maps of all the US Military Bases’ locations to gain situational awareness and insights Ava understood that the ability to protect military personnel and civilians that run the US Military Base is of utmost importance with even seconds being critical. Ava’s wicked-fast and smart forensic searches and powerful analytics transform the manually intensive examination of massive surveillance footage into accurate and useful results within mere minutes. Security operators are using powerful appearance, event, or image search functions to narrow down and track people or objects of interest. Using Ava, security operators can add maps of all the US Military Bases’ locations to gain situational awareness and insights. Each map can be configured and includes camera views, alarm views, as well as the ability to track people and objects as they move around the campus. Only Ava could meet their challenges by providing: Advanced Situational Awareness: Powered by Ava’s Smart Presence, the company’s use of AI and machine learning allows security personnel and operators to detect anything unusual at any time. Ava Aware VMS understands perimeters and behaviours, identifies, classifies, and tracks people of interest, vehicles, or other objects to send alerts before threats escalate. Operators now receive immediate alerts on unidentified loud noises including the exact source of the sound through microphones. The US Military Base’s security teams are now able to stop threatening actions, before there is damage to property or people. Rapid Incident Response: Powered by Ava’s Spotlight, video streams change dynamically to bring only the relevant feeds to the attention of the operator. Real-time alerts and notifications show up on the video wall to describe the incident, the time, and place it occurred. Using Ava’s Smart Search, the base is able to search by event and similarity to perform appearance and image detection powered by machine learning capabilities to comb through countless hours of video within seconds. Real-time Analytics: Ava provided the US Military Base with threat detection and notifications in real-time and uses intelligent algorithms and self-learning to detect abnormal behavior. The platform will alert the base’s security operators in real-time. It will intelligently highlight what’s relevant from all of the US Base’s cameras, in real-time, all the time. NDAA Compliant - Ava’s video hardware is TAA (Trade Agreement Act) Compliant, enabling any base to be fully NDAA 889 compliant. Ava’s solution provided operational efficiencies, such as: Seamless integration with existing cameras - Whether a military base is replacing all or some of their cameras, Ava Aware VMS easily integrates into and enhances existing cameras with the same AI capabilities. Now, existing ONVIF cameras are enhanced with analytics such as object detection, people and vehicle count, similarity based searching and more. By linking all existing cameras into a larger, AI-based video analytic platform, the base can leverage these powerful analytics across ‘all the cameras, all the time’. Access Control Integration - Ava’s solution easily integrates into access control, remote monitoring, and existing infrastructure. Monitoring the entire military base can be done as part of a single video management system. Scalable - The platform can easily be clustered to meet the growing needs of a base, from hundreds to thousands of cameras. Deployment simplicity - Ava’s system is designed for overall simplicity and readiness for deployment. With security cameras that were ready to go, fully loaded with out-of-the-box Ava Aware software, the base could easily replace cameras in a phased implementation, minimizing installation time and eliminating downtime. Ava’s simplified licensing/pricing model further simplified deployment. Plug and play configuration Plug and play configuration removes the need for user names and passwords The same simplicity extends to maintaining scalable management within a base’s group configuration policies. Plug and play configuration removes the need for user names and passwords, pre-configuration steps, and default settings. And finally, the base chose the Ava system for its general ease of use. Security operators now have access to detailed camera information, activity logs, and advanced video adjustments in a single, user-friendly screen view. Set up for success with intelligent video security The US Military Base is now set up for success with an end-to-end intelligent video security system that will scale with their needs. Highlights include: Camera installation, which will put the base into full compliance with NDAA-889. The US Military Base now has the highest level of security, to protect against the vulnerabilities of the connected world. The equipment has end-to-end encryption, factory-installed certificates, and records detailed audit trails of both operators and administrators to assist with any other compliance requirements. Security operators have gone from having ‘data overload’ to easily and quickly accessing ‘actionable insights’ to drive more confident and proactive security decisions. By leveraging powerful analytics, the base’s operators are able to respond in real-time and investigate incidents faster and with fewer resources. Operators are able to act on the system’s identification of objects, events, anomalies, and similarities that detect issues as they unfold. Furthermore, operators also have full occupancy insight to manage the flow of people and traffic across the base, in support of COVID-19 rules and regulations. Ava Smart Presence includes a people and vehicle counter to track objects in real-time, allowing for historical analysis and reporting. Configurable maps of all locations provide instant situational awareness and insights. The US Military Base seamlessly integrated the new system with existing access controls and non-banned cameras to cost-effectively meet the mandate and fully leverage analytics across the entire security system. Security teams at the base can trust in a powerful security solution that doesn’t inadvertently contain technology that poses a new threat. Whether enhancing existing cameras with advanced video analytics, replacing the entire video security system to meet the NDAA mandate, or creating a solution from scratch, the U.S. Military and supporting agencies can benefit from Ava’s secure cameras and leverage Ava’s powerful analytics for the highest levels of proactive security.
G4S is the globally renowned integrated security company with operations in approximately 85 countries. At the core of the business is G4S Integrated Security, which combines expertise, security professionals, technology and data analytics. G4S Integrated security G4S delivers integrated security around the world with the last six months having brought significant change for the company. The sale of the conventional cash business has enhanced strategic, commercial and operational focus and strengthened the company’s financial position. G4S is transforming, with an intensified focus on integrated security solutions strategy. They are winning business faster and growing stronger than ever before. Through the launch of the global G4S Academy, the organization is offering an opportunity to share knowledge and work more collaboratively with customers. Sector specific solutions and a global approach to risk and investment in technology are delivering clear benefits to customers and differentiating G4S’s offering in the security market. Below are some examples of G4S Integrated Security delivered to customers around the world. G4S Americas In the United States, one of G4S Americas’ Security and Risk Operations Center helps prepare for, monitor and respond to threats from one central location. The Security and Risk Operations Center, based in Florida, provides integrated security solutions by seamlessly combining monitoring capabilities, data analytics, enterprise risk intelligence and global response services. Through actionable data and valuable insights, G4S experts are able to identify threats early and respond quickly. Their technology enabled intelligence-gathering and data analytics enable customers to know immediately when incidents occur. They also allow the organization to support customers by optimizing spend, mitigating risk and enhancing their security programs. G4S Europe & Middle East The diverse team of highly-trained security professionals has adapted to the changing security climate At a Critical National Infrastructure site in southwest England, G4S’s connected security professionals use technology and data to assess threats, manage incidents, and keep a large workforce safe. The diverse team of highly-trained security professionals has adapted to the changing security climate and conduct automated fever screening, as people enter their site. Specially trained security professionals use the best technology, including G4S’s proprietary software RISK360, on this complex, long-term project. G4S RISK360 proprietary software G4S RISK360 proprietary software allows the team to manage incidents, instantly share information, and detect patterns and trends. The training of connected security professionals is tailored to the site. They are setting the gold standard on securing critical infrastructure. In 2019, the Singapore Government asked the industry to prioritize technology over manpower through ‘Outcome Based Contracting’. G4S won an important contract to secure 62 schools using the Threat, Vulnerability, and Risk Assessment (TVRA) Solution. Threat, Vulnerability, and Risk Assessment Solution TVRA risk-based solution combines access control, biometric time and attendance with patrol and response The TVRA (Threat, Vulnerability, and Risk Assessment) risk-based solution combines access control, visitor management systems, biometric time and attendance with patrol and response, incident reporting, and remote CCTV monitoring. G4S security professionals and Security Risk Operations Center are in control of the situation, at all times, using cutting edge technology and data analytics. These are just some of the ways by which G4S is securing the world. G4S Africa In South Africa, G4S security integration of risk consulting, security professionals and technology, for a global FMCG brand, is underpinned by the organization’s data analytics. G4S security professionals protect valuable goods that are delivered all over the country. From the G4S Security and Risk Operations Center near Johannesburg, experts use G4S RISK360 proprietary software to enable secure and reliable deliveries. The security software provides critical data and analysis that is then used to monitor and deploy resources to the highest risk areas. This data is continually shared with the customer, laying the foundation for a partnership that is building a more secure future.
Places of leisure, where one spends one’s downtime, are public by design. Unlike a bank vault or power plant, they actively invite visitors. One can’t just lock them down and hope no one turns up. Equally, to ensure user and property safety, access must not be a free for all. Managing risk - separating authorized from unauthorized people and locations - is part of every site manager’s daily routine. Intelligent locking makes this workload a whole lot easier. Intelligent keys combine the powerful features of electronic access control with the convenience and familiarity of mechanical keys. In hugely diverse leisure settings across Europe, they already help managers do more with less. Everyone treasures their leisure. The right access solution can help one do it safely without putting a burden on those responsible for one’s security. We treasure our leisure. The right access solution can help us do it safely without putting a burden on those responsible for our security. Controlling access to outdoor sites and visitor attractions Obviously, for many leisure attractions, wired electronic security is not an option. Locations may be remote - far beyond the reach of mains electricity. Assets themselves may be outside. Thankfully, cabling is not essential for effective intelligent access control. Robust, battery-powered locking, backed by intuitive admin software one can access from anywhere, matches or exceeds the functionality of traditional wired access control. Padlocks built to withstand climate extremes integrate within one’s system exactly like standard interior locks. Intelligent electronic key systems are also budget friendly. Making the switch from mechanical security is not an all-or-nothing decision. The best intelligent key systems let one roll out gradually, as needs evolve and budgets allow. For example, the Llyn Brenig Reservoir and Visitor Center in Wales attracts tens of thousands of tourists every year. Both mechanical and electromechanical locking protect a site which houses critical infrastructure and watersports facilities - with disparate security needs. Here electromechanical locking brings long-term cost savings to site owners Welsh Water, because locks no longer need to be changed when keys are lost. Permissions are simply deleted from the system software. In 2015, Twycross Zoo launched a £55 million, two-decade development plan. High on the agenda was a new intelligent key solution to replace a mechanical master-key system which was labor-intensive to administer. The new system’s flexibility has put zoo security managers in full control of their site. Only staff with the necessary authority and training can access animal enclosures. Carrying one programmable key able to open doors, windows and padlocks makes the security team’s rounds easier It’s simple for system administrators to issue time-defined user keys. These can permit vets or zookeepers access to enclosures for a specific time period outside regular hours - for example, in an emergency. When the period expires, the key no longer works and site integrity is automatically restored. Access control in the museum sector When Edvard Munch’s painting “The Scream” was stolen from an Oslo museum in 1994, thieves left a note which read: “Thanks for the poor security”. Securing museums - open spaces with priceless contents - presents one of security’s biggest challenges. Around 50,000 artworks are stolen every year, according to some estimates. Adding further complexity, many museums are located within historic properties. The building itself may be integral to the attraction - and come with strict heritage protections. Any new locking installation must make minimal mess. For this reason, wireless is increasingly the preferred choice. Wireless access systems based on robust, key-operated locking, rather than cards and other keyless credentials, combine a familiar technology (the metal key) with the intelligence to keep staff and collections safe. Carrying one programmable key able to open doors, cabinets, windows and padlocks makes the security team’s rounds easier. It also minimizes the number of keys in circulation - with obvious security benefits. Companion software makes key tracking straightforward: one always knows who exactly is carrying credentials, can refine or amend those permissions quickly and order a full audit trail on demand. And these locks are discreet enough to maintain the property’s appearance. Museum access control in action London’s Design Museum needed access control designed to protect high-value assets and exhibits. Devices here protect a contemporary site with three galleries, a restaurant/café and an events space, with 100 permanent staff and hundreds (sometimes thousands) of daily visitors. The building has multiple door sizes and must meet British Standards compliance. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries Electromechanical locks now control access through 56 doors, forming part of a security ecosystem which incorporates traditional mechanical locks, too. Using intuitive management software, security managers ensure every staff member accesses only the right areas. Contractors are issued with temporary programmable keys, which saves time formerly wasted escorting them around the building. The system the Design Museum chose - CLIQ® from ASSA ABLOY - also enables integration with third-party cloud-based solutions, for control via a single, central management interface. The delicate balance between protecting a precious building and guarding its contents sets a major challenge. Security and access control must be “subtle, but ever present,” according to one former moderator of the Museum Security Network. Invasive installation, showy or inappropriately designed devices and components cannot be considered. This was the checklist facing France’s Musée Maurice Denis: the museum is inside a listed 17th-century monument, so they turned to CLIQ access control technology for a solution. Drawing on extensive experience in the heritage sector, ASSA ABLOY delivered security without disrupting the building aesthetic. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries inside every programmable key. No further power supply is needed at the door. Around 70 robust, hard-wearing cylinders and padlocks now secure doors and windows inside and outside the main building; waterproof padlocks protect CCTV camera housing on the exterior. Every employee receives access to relevant areas via a single CLIQ key, which administrators program with only the appropriate permissions. Insurance compliance is another major concern in the heritage sector. Indeed, insurers for 17th-century warship Vasa demand Sweden’s highest level of locking: Class 3. Yet the Vasamuseet’s access system must also allow 1.2 million annual visitors to move around freely, while keeping exhibits safe. To upgrade an existing mechanical system, around 700 interior door cylinders were equipped with CLIQ Remote electromechanical technology. Museum staff used to carry heavy chains with ten or more keys. Now facility managers can amend the access rights of everyone’s single CLIQ key at any time, even remotely, using the CLIQ Web Manager. It’s easy to issue contractors such as carpenters with access rights scheduled to end automatically as soon as their work is complete. Security for shopping and indoor leisure sites The electronics inside CLIQ locks are powered by the standard battery inside every key, not mains electricity According to one study completed two decades ago, one spends 87% of one’s time indoors. The number is probably higher now - and includes a huge chunk of one’s leisure time. Large retail multiplexes like Festival Place in the UK are a popular destination. Here over 170 shops, a cinema, sports center and restaurants have an ever-changing roster of permanent staff, cleaners and out-of-hours contractors. Every person requires secure entry on demand. The public also needs open access for 18 hours every day. Yet a single lost mechanical key could become a security problem for all users and tenants. Installing 100 CLIQ electromechanical cylinders drastically cut the burden of mechanical key management. Now, cleaners and maintenance workers carry an intelligent key which unlocks specific doors for a pre-defined time period. Using simple online admin software, site managers can immediately de-authorize and reissue a lost key or amend any key’s permissions. Generating a comprehensive audit trail - who accessed which lock, and when - takes a couple of mouse clicks. CLIQ also cuts Festival Place operational costs. The electronics inside CLIQ locks are powered by the standard battery inside every key, not mains electricity. Installation was wireless, a huge saving on potentially expensive electrical work. At Festival Place and wherever one gathers to enjoy leisure - indoors or outside - CLIQ enables easy access control for all openings with just a simple, single, programmable key. To learn how you can put CLIQ® intelligent key technology to work in agile, flexible, secure public services, download a free introductory guide at https://campaigns.assaabloyopeningsolutions.eu/eCLIQ
The world is constantly changing, with people, data and goods moving more fluidly than ever before. The security solution needs to move with it. New Incedo Business connects all security software and hardware within one platform. One can easily scale it up or down, based on one’s needs, to keep people moving and business growing. Together. People need different access times and entry points, and the access and security requirements change day to day – so, a static solution is no longer an option. Instead, a single, all-encompassing security platform should deliver connectivity, convenience and simplicity, keeping one’s premises secure and filtering access to manage the ever-changing movement of people. This is where Incedo Business comes in: a new solution for all types of premises, handling security while leaving one free to focus on growing the business. Incedo ensures employees, customers and goods are where they need to be. Incedo makes life and tasks easier and more efficient for everyone, from installers to end users. Facility managers enjoy more control and flexibility than they ever thought possible, maximizing return on investment, with Incedo Business able to scale quickly when needed. System administrators can do more within available budgets: initiating, cancelling or amending access profiles, and monitoring movement around their site in real time. Building users, meanwhile, get the individual access times and entry permissions they need. They can move freely without compromising the security of other people and equipment. Integrators can upgrade connected technologies and systems quickly, minimizing risk and meeting customers’ raised expectations of modern technology. Installers no longer need to wrestle with incompatible systems: easy interoperability is built into Incedo, meaning no more delays or unnecessary complexity. With Incedo’s modular platform approach, one simply chooses the security hardware and credentials one needs and the appropriate management system option. One can set exactly who can access which doors, and when, from the user-friendly Incedo Business software interface. When Incedo Business launches, one can pick the most suitable options from a growing range of Incedo-enabled security and access control hardware. Road-tested, award-winning ASSA ABLOY wireless digital locks and wired ASSA ABLOY wall readers secure all interior and exterior doors. Also already available, a choice of card and token credentials helps users enjoy safe and convenient access to, and movement around, the premises. Incedo mobile keys add the flexibility to open doors with a smartphone. Incedo’s system management options, Lite, Plus and Cloud, scale from entry level up to cloud-based administration. One can manage multiple sites and third-party integrations, including security solutions like CCTV. Scale up and down, add or remove hardware and credentials on demand, or switch system management options, all within a single environment. Migration between Lite, Plus and Cloud options is always seamless in any direction, ensuring total flexibility for the business. Incedo moves with you, today and in the future However your business moves, an Incedo system moves along. Having a flexible platform, able to adapt as the organization changes, reduces total cost of ownership: one never needs to retrain staff or start over from scratch. New Incedo-enabled hardware from ASSA ABLOY and third-party providers will continue to be connected to, and made available within, the evolving Incedo platform. One picks the hardware and software configuration one wants, and can change one’s mind as often as one likes. Incedo guarantees flexibility and scalability in every way, to meet the security needs today and in the future. And because the security and operational challenges at a university, small hotel or hospital are not the same as those faced by a public building or corporate HQ, the Incedo ecosystem will introduce new, advanced user interfaces for the specific industry. “Incedo Business transforms the experience of using and managing a building. It is also the seed from which our revolutionary Incedo ecosystem will grow in the months and years ahead,” says Stephanie Ordan, VP Digital and Access Solutions at ASSA ABLOY Opening Solutions EMEA. “A future where doors are smarter, connectivity and movement are seamless, and access management is genuinely intelligent. This is our vision for Incedo and for those who will be using it.” Incedo™ Business embodies ASSA ABLOY’s vision to create a safer and more open world, keeping everyone on the move. Together. To learn more and download a free solution guide, visit https://campaigns.assaabloyopeningsolutions.eu/Incedo-business
Round table discussion
The topic of video analytics has been talked and written about for decades, and yet is still one of the cutting-edge themes in the physical security industry. Some say yesterday’s analytics systems tended to overpromise and underdeliver, and there are still some skeptics. However, newer technologies such as artificial intelligence (AI) are reinvigorating the sector and enabling it to finally live up to its promise. We asked this week’s Expert Panel Roundtable: What new technologies and trends will shape video analytics in 2021?
During the coronavirus lockdown, employees worked from home in record numbers. But the growing trend came with a new set of security challenges. We asked this week’s Expert Panel Roundtable: What is the impact of the transition to remote working/home offices on the security market?
Contact tracing has been more than a buzzword during the coronavirus pandemic. In some cases, it has been an issue of life and death. Tracking who an infected person has been in contact with is an important tool to minimize disease spread, and technology from the physical security industry claimed a role in contact tracing early on – and continues to provide benefits as companies seek to reopen. We asked this week’s Expert Panel Roundtable: How can the security industry enhance contact tracing?
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload