Download PDF version Contact company

Fuller, Smith & Turner plc (Fuller’s) is an independent family-owned regional brewer and premium pub operator, founded in 1845 in Chiswick, West London. It is based at the historic Griffin Brewery in Chiswick, where brewing has taken place continuously since 1654. Fuller’s is listed on the London Stock Exchange.

Renowned as the home of such famed ales as the iconic London Pride, Frontier Lager, ESB and 1845, Fuller’s produces a variety of cask and craft keg beers supported by a changing seasonal range. The company owns Cornish Orchards, a craft cider maker producing a range of award-winning ciders and premium soft drinks, and Nectar Imports, a wholesale drinks business. In February 2018, Fuller’s also acquired Dark Star Brewing, a craft cask brewer based in Sussex.

Hikvision-Maxtag Video Security System With such a wide range of locations, Fuller’s decided that the time had come to upgrade and synergise its security surveillance systems

Fuller's also owns and operates over 380 pubs, inns and hotels across the South of England. These include more than 200 Fuller’s managed pubs and hotels, and over 170 tenanted pubs, with the accommodation on offer consisting of in excess of 780 boutique rooms. The Fuller’s pub estate stretches from Brighton to Birmingham and from Bristol to the Greenwich Peninsula.

With such a wide range of locations, Fuller’s decided that the time had come to upgrade and synergize its security surveillance systems. In place across those facilities were a diverse range of analog equipment from a myriad of manufacturers. In most cases these legacy systems were offering poor, low resolution images and no remote access to onsite video.

The systems had been installed in an ad hoc fashion, and in some instances needed upgrading as they were no longer really fit for purpose,” says Glynn Gordon, managing director of retail security systems experts Maxtag, who were called in by Fuller’s to address the security issue.

IP Camera Technology

Fuller’s wanted to unify all of its locations within the estate over time,” he says. “The aim was to bring everything onto one platform, while having an upgrade path for new and refurbished sites going forward, utilizing IP camera technology.

A key consideration in the project was that while there was no doubt the existing equipment would need to be upgraded, the costs of re-cabling each site looked prohibitive – not to mention difficult to achieve in practice, given the way many of the buildings were constructed.

To overcome the challenges posed by this cabling conundrum, Maxtag proposed supplying and installing Hikvision Turbo HD systems to those Fuller’s sites where an upgrade was required for the cameras, the recorder, or both.

This would allow the group to record 1080p HD images utilizing the existing cabling,” Gordon says.

Turbo 5.0 AI-Powered Tech Since 2013, Hikvision’s Turbo HD range of products has brought high definition clarity to analog surveillance systems

Since 2013, Hikvision’s Turbo HD range of products has brought high definition clarity to analog surveillance systems. The Turbo products make the very most of legacy cabling, delivering innovations including ultra-low light recording and super-efficient bandwidth and storage usage. The very latest iteration of the Turbo HD range, Turbo 5.0, incorporates Artificial Intelligence-powered technology to boost color performance even in the lowest light conditions, and to automatically detect, identify and extract relevant images from vast video datasets, saving time and resources.

For the Fuller’s project, Maxtag would be using a variety of Turbo cameras, and initially utilizing the Turbo DS-7316 digital video recorders, which provide 16-channel HD recording and storage, and support analog, HD-TVI, and IP cameras, a key requirement of the extensive ongoing project.

Turbo DS-7316 DVRs

Maxtag’s plan was that the cameras and recorders could be upgraded in stages. “As and when cameras or recorders failed or were beyond economical repair they could be swapped out,” Gordon says. “The recorders could also be networked to HQ for remote access when recording evidence for the police if an incident occurred.

While the Turbo equipment would go into the existing sites, any new or refurbished Fuller’s pubs and hotels would have Hikvision IP cameras and NVRs installed, capable of recording images at 3 or 4-megapixel HD quality, and all networked for remote access.

Hikvision NVRs The Hikvision network video recorders are both 16 and 32-channel models and are capable of connecting to 160Mbps of incoming bandwidth

The beauty would be that both the Turbo HD and the IP systems would have the same familiar operating systems across the group,” Gordon says,” which makes it very easy for managers and staff to quickly familiarize themselves and operate as required.

The Hikvision network video recorders are both 16 and 32-channel models and are capable of connecting to 160Mbps of incoming bandwidth.

Maxtag’s plan was agreed upon and put into place, and as a result Fuller’s has now converted more than 85 pubs and hotels over the last 18 months using a combination of Turbo and IP systems.

Hikvision IP Video Surveillance Solution

The clarity of images has vastly improved and on a few occasions has been instrumental in helping the police with evidence when incidents have occurred predominantly outside the premises,” Gordon says. “The group now has a planned migration path going forward and takes advantage of the latest Hikvision developments as they are released. That means they’re on top of the benefits of the newest technology without the need to begin the whole upgrade process again.

The ongoing project has been warmly welcomed by Fuller’s. Oliver Boardman, Head of Digital & IT Operations, said: “We have been very pleased with the progress that we have made with Hikvision and Maxtag over the last 18 months. We have an increasingly standardized estate with regards to CCTV, which is helping to reduce faults and improve the service that we can provide to our pubs. With the need to protect privacy becoming more critical, we expect centralized management to become increasingly important.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

What Is The Impact Of Remote Working On Security?
What Is The Impact Of Remote Working On Security?

During the coronavirus lockdown, employees worked from home in record numbers. But the growing trend came with a new set of security challenges. We asked this week’s Expert Panel Roundtable: What is the impact of the transition to remote working/home offices on the security market?

Water Plant Attack Emphasizes Cyber’s Impact On Physical Security
Water Plant Attack Emphasizes Cyber’s Impact On Physical Security

At an Oldsmar, Fla., water treatment facility on Feb. 5, an operator watched a computer screen as someone remotely accessed the system monitoring the water supply and increased the amount of sodium hydroxide from 100 parts per million to 11,100 parts per million. The chemical, also known as lye, is used in small concentrations to control acidity in the water. In larger concentrations, the compound is poisonous – the same corrosive chemical used to eat away at clogged drains. The impact of cybersecurity attacks The incident is the latest example of how cybersecurity attacks can translate into real-world, physical security consequences – even deadly ones.Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. The computer system was set up to allow remote access only to authorized users. The source of the unauthorized access is unknown. However, the attacker was only in the system for 3 to 5 minutes, and an operator corrected the concentration back to 100 parts per million soon after. It would have taken a day or more for contaminated water to enter the system. In the end, the city’s water supply was not affected. There were other safeguards in place that would have prevented contaminated water from entering the city’s water supply, which serves around 15,000 residents. The remote access used for the attack was disabled pending an investigation by the FBI, Secret Service and Pinellas County Sheriff’s Office. On Feb. 2, a compilation of breached usernames and passwords, known as COMB for “Compilation of Many Breaches,” was leaked online. COMB contains 3.2 billion unique email/password pairs. It was later discovered that the breach included the credentials for the Oldsmar water plant. Water plant attacks feared for years Cybersecurity attacks on small municipal water systems have been a concern among security professionals for years. Florida’s Sen. Marco Rubio tweeted that the attempt to poison the water supply should be treated as a “matter of national security.” “The incident at the Oldsmar water treatment plant is a reminder that our nation’s critical infrastructure is continually at risk; not only from nation-state attackers, but also from malicious actors with unknown motives and goals,” comments Mieng Lim, VP of Product Management at Digital Defense Inc., a provider of vulnerability management and threat assessment solutions.The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online “Our dependency on critical infrastructure – power grids, utilities, water supplies, communications, financial services, emergency services, etc. – on a daily basis emphasizes the need to ensure the systems are defended against any adversary,” Mieng Lim adds. “Proactive security measures are crucial to safeguard critical infrastructure systems when perimeter defenses have been compromised or circumvented. We have to get back to the basics – re-evaluate and rebuild security protections from the ground up.” "This event reinforces the increasing need to authenticate not only users, but the devices and machine identities that are authorized to connect to an organization's network,” adds Chris Hickman, Chief Security Officer at digital identity security vendor Keyfactor. “If your only line of protection is user authentication, it will be compromised. It's not necessarily about who connects to the system, but what that user can access once they're inside. "If the network could have authenticated the validity of the device connecting to the network, the connection would have failed because hackers rarely have possession of authorized devices. This and other cases of hijacked user credentials can be limited or mitigated if devices are issued strong, crypto-derived, unique credentials like a digital certificate. In this case, it looks like the network had trust in the user credential but not in the validity of the device itself. Unfortunately, this kind of scenario is what can happen when zero trust is your end state, not your beginning point." “The attack on Oldsmar’s water treatment system shows how critical national infrastructure is increasingly becoming a target for hackers as organizations bring systems online for the first time as part of digital transformation projects,” says Gareth Williams, Vice President - Secure Communications & Information Systems, Thales UK. “While the move towards greater automation and connected switches and control systems brings unprecedented opportunities, it is not without risk, as anything that is brought online immediately becomes a target to be hacked.” Operational technology to mitigate attacks Williams advises organizations to approach Operational Technology as its own entity and put in place procedures that mitigate against the impact of an attack that could ultimately cost lives. This means understanding what is connected, who has access to it and what else might be at risk should that system be compromised, he says. “Once that is established, they can secure access through protocols like access management and fail-safe systems.”  “The cyberattack against the water supply in Oldsmar should come as a wakeup call,” says Saryu Nayyar, CEO, Gurucul.  “Cybersecurity professionals have been talking about infrastructure vulnerabilities for years, detailing the potential for attacks like this, and this is a near perfect example of what we have been warning about,” she says.  Although this attack was not successful, there is little doubt a skilled attacker could execute a similar infrastructure attack with more destructive results, says Nayyar. Organizations tasked with operating and protecting critical public infrastructure must assume the worst and take more serious measures to protect their environments, she advises. Fortunately, there were backup systems in place in Oldsmar. What could have been a tragedy instead became a cautionary tale. Both physical security and cybersecurity professionals should pay attention.

How Have Security Solutions Failed Our Schools?
How Have Security Solutions Failed Our Schools?

School shootings are a high-profile reminder of the need for the highest levels of security at our schools and education facilities. Increasingly, a remedy to boost the security at schools is to use more technology. However, no technology is a panacea, and ongoing violence and other threats at our schools suggest some level of failure. We asked this week’s Expert Panel Roundtable: How have security solutions failed our schools and what is the solution?