Scheduled to be held from 19 - 21 January, 2020, INTERSEC 2020 in Dubai will showcase the latest products in security, safety and fire protection. Bosch Building Technologies will display its innovative security, safety and communications products on booth SA-C26 in Saeed Arena.
IP 3000i cameras with smart video
Bosch introduces another industry first with the all-new range of IP 3000i cameras. The latest portfolio includes a range of four form factors that offer high quality, 24/7 performance with reliable surveillance features for standalone installations or general surveillance.
Micro dome, mini dome, bullet and turret cameras are the available options with resolutions of up to 5 MP for indoor and outdoor use. Furthermore, they also offer something never seen before in such competitively-priced cameras, which is built-in Essential Video Analytics as standard. This new range of IP cameras offers smart solutions that were until now not available in a cost-effective video surveillance solution.
MIC 7100i IP camera
Bosch MIC IP cameras are supremely rugged, constructed from anti-corrosive metal, and can function at -40ºC to +65ºC
No matter how tough conditions get, a video security operation must always go on. That is why Bosch has taken extreme measures to develop its MIC IP family of extremely rugged moving cameras even further. MIC IP cameras are built to perform in practically any environment. The housing of the new 7100i has been enhanced with a ruggedized, corrosion-resistant design that makes it perfectly suited for challenging applications where cameras are exposed to extreme conditions.
Bosch MIC IP cameras are supremely rugged, constructed from anti-corrosive metal, and can function at -40ºC to +65ºC. Even the built-in Intelligent Video Analytics technology is tough enough to provide maximum situational awareness, even in the most demanding environments. With Camera Trainer, a machine learning functionality, MIC IP cameras can recognize user-specific target objects, such as moving and non-moving object, to alert operators of unusual scene activity. The 4K UHD versions also provide extreme high-resolution for mission critical applications such as city surveillance and congested highways. This makes them ideal for monitoring highways, bridges, tunnels, ports, airport perimeters and more.
Intelligent Video Analytics with Camera Trainer technology
The new Camera Trainer technology brings machine learning to Bosch IP cameras, enabling integrators to tailor them to detect the objects and situations that matter most. The ability to identify user-defined objects and situations can be combined with the existing alarm rules and object filters of Intelligent Video Analytics for even more flexibility and accuracy. It substantially improves the level of security for people and property and opens up new customized applications and uses.
For example, it could be used to separate vehicles clustered in front of traffic lights or to determine how long a vehicle has been parked in a bay. With Camera Trainer, video cameras can be taught to recognize and detect stationary objects or certain situations instead of being triggered by motion.
AVENAR fire alarm panel
Bosch’s new fire alarm panels AVENAR 2000 and 8000 are a competitive solution for small to large sized applications ranging from campus solutions to affiliate networked projects. It is a future-proof solution to support future market requirements and at the same time, it is compatible with the installed base. AVENAR panel is a Safety Management System providing fire detection and smart evacuation. It integrates also into 3rd party building management systems.
AVENAR all-in-one 4000 combine visual and acoustic alarm complying with EN54-3 + EN54-23 standards. More than 125 devices per loop offer high project flexibility. The new wireless system has a radio range with up to 120m in buildings with many walls and up to 180m in buildings without obstacles. It offers high connection reliability thanks to meshed topology and dual-band frequency reducing potential maintenance costs.
PRAESENSA IP public address and voice alarm system
All components of PRAESENSA are networked, thereby ensuring the highest flexibility and scalability
All components of PRAESENSA are networked, thereby ensuring the highest flexibility and scalability from small centralized to large decentralized systems. The Bosch OMNEO IP architecture supports Dante audio networking, AES67 and AES70 protocol.
The innovative multi-channel amplifier architecture with intelligent power allocation across the amplifier outputs and integrated spare channel significantly improves the effective utilization of available power, regardless of the loudspeaker load in each zone. As a result, fewer amplifiers are needed, saving up to 50 percent on space, energy and backup battery power and leading to a very competitive cost of ownership. PRAESENSA offers special features for the highest level of data security and full network link redundancy with smart integration of functions and backup facilities.
LB20 commercial loudspeakers
The LB20 series compact loudspeakers have been designed from the ground up to ensure efficient installation for the contractor and excellent results for the end-user. The series includes 4-inch, 5.25-inch, and 8-inch 2-way models with a matching dual-10-inch subwoofer, making it easy to select a suitable model a specific space. All LB20 models offer Bosch-engineered components for superior sound quality, low-profile looks and robust reliability for a wide range of indoor and outdoor applications.
These include retail environments, hospitality settings, such as bars, lounges, patios, pool areas and restaurants, conference and meeting rooms, fitness clubs, performing arts and sports venues and houses of worship. The series offers true weatherproof construction for outdoor spaces, confirmed by extensive and rigorous testing above and beyond industry norms.
IP-based DICENTIS conference system
Bosch has expanded the DICENTIS family with the DICENTIS Interpreter desk. Speaking the language of the interpreter is what the DICENTIS Interpreter desk is designed to do. By observing and interviewing expert interpreters and technicians worldwide, the desk has been optimized for the real-life needs of interpreters.
The result: An interpreter desk that complies with the latest as well as future market requirements and provides the interpreter with maximum freedom to focus on the job through intuitive operation and best-in-class user experience. The installation and configuration of the system is quick and easy. The state-of-the-art IP technology provides the highest flexibility and enables smooth third-party integration into a future-proof solution.
Vaion is proud to announce the general availability of its innovative Vaion vcore video management system at the upcoming ISC East 2019 event in New York. Designed with scalability in mind, Vaion vcore is a proactive solution that allows threats to be detected and addressed as incidents unfold. This is made possible through the use of a new neural network that mimics the human brain’s ability to recognize patterns and categorize images.
Vaion vcore is equipped with integrated machine learning capabilities that analyze all video feed from all standards-based cameras in real-time. The system monitors and understands behaviors; identifies, classifies, and tracks people, vehicles, and other objects of interest; and sends alerts before threats escalate.
Vaion vcore video management system
Vaion vcore is enhanced with a range of advanced features that make the system scalable, secure, and easy to useVaion vcore is enhanced with a range of advanced features that make the system scalable, secure, and easy to use, covering a wide range of enterprise security needs. The system can work with third-party cameras or be further optimized with the suite of specialized Vaion cameras, available in January 2020. Vaion’s complete enterprise security solution will allow organizations to leverage additional features, including directional audio analytics and advanced cybersecurity features.
Vaion vcore enables a proactive approach with the Spotlight capability that changes video feeds dynamically and sends real-time alerts and notifications based on predefined rules and detection of unusual activity. Instead of merely investigating incidents, organizations can take the necessary steps to prevent them.
Vaion Smart Search
As events occur, Vaion’s Smart Search allows operators to conduct forensic analysis and build case files in minutes versus the hours, days, weeks of traditional VMS platforms. Also, Vaion vcore’s unique Map view with Smart Presence provides people and vehicle tracking and counting, as well as camera and alarm views, giving operators detailed situational awareness and advanced operational benefits.
“Vaion’s impressive vcore software includes all the features you would expect in a legacy VMS platform. However, the embedded artificial intelligence provides immense insight with people/object/vehicle detection, anomalies, presence-based maps, and fast/scalable similarity searches. End-users will realize operational benefits of the Vaion platform beyond the improvements to security operations and focused situational awareness.” — Michael Miller, President and CTO, TWG Security
In addition to Vaion vcore’s physical security features, the system is secure from the ground up to protect data and minimize the risk of breaches. This is achieved by end-to-end encryption and digitally-signed files for secure export.
Vaion vcloud allows operators to access the system remotely, manage complex deployments in a single platform
Ease of use, simple deployment, remote access, link sharing, and license pooling is made possible with the Vaion vcloud connection. Vaion vcloud allows operators to access the system remotely, manage complex deployments in a single platform, and stay up to date with Vaion vcore upgrades and features.
Cutting-edge video analytics and surveillance
“Vaion harnesses the most advanced technologies out there to solve real problems security personnel really care about. We don’t just deliver an affordable state-of-the-art VMS based on decades of experience in the industry; we apply cutting-edge analytics on every video stream all the time to provide insightful and actionable information in real-time!” — Ran Pugach, Chief Product and Development Officer, Vaion. Come see Vaion demonstrate vcore in action with solutions to real-life scenarios at ISC East 2019, Booth #351.
As a global company with offices in New York, London, and Oslo, Vaion is changing the traditional video security landscape with AI capabilities that make it easier for businesses and organizations to monitor their assets proactively. With embedded video and audio analytics powered by machine learning algorithms, intuitive installation processes, and a range of smart cameras, Vaion offers an end-to-end surveillance solution that helps companies detect threats in their earliest stages and perform fast, effective investigations with fewer resources.
ExtraHop, global provider of cloud-native network detection and response solutions, has announced that it has joined the Microsoft Intelligent Security Association (MISA), which brings together an elite group of security-related companies partnering with Microsoft to defend against threats facing hybrid enterprises today.
ExtraHop also announced a new integration between the ExtraHop Reveal(x) platform and Microsoft Azure Sentinel enabling faster threat investigation and remediation.
ExtraHop Reveal(x) and Microsoft Azure Senitel integration
ExtraHop Reveal(x) is the first cloud network detection platform to offer in-depth integration with Azure Sentinel
ExtraHop Reveal(x) is the first cloud-native network detection and response vendor to offer in-depth integration with Azure Sentinel. Through this integration, high-fidelity alerts from Reveal(x) can be used to automate responses based on an organization’s unique security policies.
The integration also allows for the creation of customizable Jupyter Notebooks that security and development operations teams can use for threat hunting and investigation. Additionally, customers can now access Reveal(x) dashboards within Azure Sentinel for unified access to real-time threat analysis.
“Cloud has forced a reckoning in enterprise security, driving the shift from perimeter-based ‘prevent and protect’ strategies to ones that increasingly center on visibility, detection, and response,” said Raja Mukerji, Chief Customer Officer and Co-founder at ExtraHop. "Through the Microsoft Intelligent Security Association and by integrating with solutions like Reveal(x), Microsoft is enabling the next frontier of cybersecurity.”
Sarah Fender, Group Program Manager, Microsoft Cloud + AI Security said, “ExtraHop’s integration with Azure Sentinel enables our mutual customers do more. By connecting data, insights, and automation workflows with ExtraHop’s Reveal(x) network detection and response offering, Azure Sentinel customers benefit from extended visibility across their cloud networks, empower their defenders to act quickly in response to threats.”
The highly acclaimed Dubai Health, Safety & Environment Forum returns to Dubai from 24-25 November, with a stellar line-up of confirmed speakers from Ministry of Health & Prevention, UAE, Dubai Municipality, ADNOC, DEWA, Emirates Global Aluminum as well as senior executives from leading international and regional companies.
On the agenda for this year’s forum are topical health, safety and environment issues. With a raft of infrastructure and construction developments underway in the UAE in the run up to Expo 2020, safety and sustainability issues will be highlighted by speakers and delegates. Taking place from 24-25 November 2019 at Habtoor Grand Resort, Autograph Collection Dubai, the Dubai Health, Safety & Environment Forum brings together industry experts from across the region; including health and safety professionals, government regulators, policy makers and solution vendors.
Monitoring hazardous environments with IoT
The forum presents an opportunity for attendees to gain deep insights on policy, strategies and technical expertise
Advisory panellists include Raed Marzooqi, head of HSE, Dubai Municipality; Dr Rehab Al Ameri, director of National Accreditation System Emirates Authority for Standardization and Metrology; Salman Dawood Abdulla, executive vice-president of HSSEQ, Emirates Global Aluminum; Professor Janvier Gasana, chair of department of Occupational Health, Kuwait University; Nasser Al-Buhairi, head of Emergency Unit, Kuwait Oil Company; Dr. Ola Ahmed Mira, Accredited Physician, International Coach Federation.
Topics that will be discussed at The Dubai HSE Forum 2019 include wellness and prevention management, challenges to occupational health and safety, changing the construction industry safety mindset in the industry 4.0 era, human factors vs. process safety, the impact of digital transformation on workplace health and safety, mitigating work-related risks using artificial intelligence (AI) and monitoring hazardous environments with IoT (Internet of Things). These topics are crucial for major sectors such as oil and gas, construction, utilities, logistics and transportation, manufacturing, and food and beverage.
Strategies and technical expertise
The forum presents an opportunity for the attendees to gain deep insights on policy, strategies and technical expertise. Held in association with Vin Technology, Lloyds Register, Clyde &Co, Ideagen, Board of Certified Safety Professionals, JLG, Universal Site Monitoring, and Arasca, the Dubai HSE Forum builds on the success of the highly acclaimed inaugural event that was first held in September 2015.
“The forum gives a chance to step out of the daily routine and to think and reflect about the subjects that have been spoken about – to relate experiences to what is going on. It gives the visitors a platform to connect and network,” said Andrew Barker, general manager – Group Health and Safety, Rezayat Group.
AI and IoT
Soumen Chakraborthy, event producer, Dubai HSE Forum 2019 commented: “While the UAE’s vision and ambition is showcased in events such as Expo2020, there is a need to significantly strengthen the workforce by providing appropriate training in issues related to occupational health, safety and environment. The Dubai Health, Safety and Environment Forum is the perfect platform for safety professionals to explore how new technology such as AI and IoT is transforming their profession. We look forward to delivering an informative, enriching and vibrant fifth edition of the Dubai HSE Forum."
It’s hard to believe that we’re in the final quarter of 2019. It’s time to wrap up goals and make new ones that will guide us into another decade. As we look forward, we can’t help but look back at some of the key trends that emerged in the last couple of years, and their continued presence in the product road maps and plans that so many security industry leaders and manufacturers are creating.
Some of these trends have enhanced the efficacy of security systems, whereas others have the potential of having adverse impacts.
Cyber-attacks of all kinds have become, and will continue to be, a major threat, making this one of the most important initiatives that today’s businesses embrace. From a manufacturer’s perspective, building cybersecurity into the product from its inception is critical, with integrators beginning to demand this level of consideration from the products they sell. As a result of a rise in the convergence of IT applications alongside security investments, end users are now seeking out solutions designed with data security top-of-mind. All network connected devices such as DVRs/NVRs, servers, IP cameras, access controllers, intrusion alarms, smart sensors, are vulnerable, which is why this added step in developing cybersecurity protocols and applying them across the organization is critical.
Building cybersecurity into the product from its inception is critical
More connected devices
The Internet of Things (IoT) has been a major trend for the past few years in many industries, and this will continue as we integrate sensors of all kinds into the network. The collection and analysis of the data collected by these sensors is giving rise to a plethora of applications such as industrial applications, intelligent building management, event management, and much more. The physical security industry benefits by having additional intelligence for situational awareness and emergency management, as well as opportunities to provide additional value-added services and business insights. Being deployed in an increasing number of scenarios and with continued improvements in computing capabilities, video has the opportunity to become the eye of IoT.
Software manufacturers are looking toward artificial intelligence to help propel advanced analytics in an effort to deliver more situational awareness to operators, and an increased ability to proactively assess threats or anomalies. While video and data analytic capabilities have been around for quite some time, some would argue they were rudimentary in comparison to software that uses AI to make existing applications such as facial recognition much more accurate, and to create new ways to detect anomalies. In addition, AI continues to be used to make sense of the large amounts of data that are being generated by intelligent sensors and by analyzing the growing amount of video.
It’s safe to say that 5G will revolutionize the way people stay connected to the internet. Extra speed, extra bandwidth are going to make our mobile devices faster, more powerful and hyperconnected, with the same thing happening to IoT connected devices such as cameras. This is going completely change the way we think about smart cities: More powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas.
More powerful IP devices connected to one another, powered by AI, will have a massive impact on the way we move, shop and live in urban areas
In most advanced economies around the globe, citizens are increasingly concerned with privacy of their data, and many governments have put – or are in the process of doing so – stringent data protection laws in place. The EU has lead the way in using these concerns to develop privacy regulations that govern the development of data-driven applications. This trend is starting to impact the entire globe, as we shift toward more data autonomy and privacy. Since most physical security applications involve the collection of video and data about people and assets, privacy regulations will continue to have a significant impact on the industry well into the future.
Cloud and mobile capabilities
Mobility is critical for physical security and is emerging through the development and use of cloud-based services, as well as the ability to access security devices through a smart phone or Web-based browser. That’s why there’s been such an influx of mobile apps created to manage cameras, receive automatic alerts for the most diverse event, and giving users the ability to grant or restrict access to a facility. All of this demonstrates the world’s demand for mobility, connectivity and ease-of-use.
More video — everywhere
Video is the cornerstone of security, providing both real-time and forensic coverage for emerging threats and incidents, which is why it’s one of the fastest growing segments of the marketplace. The use of video for traditional applications in new markets, as well as for use in newer applications that are not necessary security related is poised to see the most movement. In some industries such as oil and gas, there is a trend towards extending video coverage into extremely harsh and hazardous environments, so manufacturers are challenged to develop appropriately certified equipment to meet a more stringent demand. Manufacturing facilities such as food processing plants are also increasing their use of video for training and compliance purposes to prevent incidents such as food recalls that can be extremely costly for the business.
It’s an exciting time to be a part of the security market, as we’re really just beginning to see that, when it comes to technology advancements, the sky is the limit. I would argue at the core of these innovations is the video data being collected, and as we work to build technologies that can harness the power of these applications, we will continue to be at the forefront of this movement toward greater intelligence and business insights.
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows.
The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilized than others: financial services were quick to recognize the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function.
Benefits of ‘Integrated access control’
The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realize is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear.
The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted.
Making the tools cost-Effective
In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved.
This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business function.
With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor.
Simple installation and removal of endpoints
What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi.
Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think.
Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting.
Tracking the movement of employees
Camera data has been used in retail to track the movement of customers in stores, helping managers to optimize displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering.
What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyze and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimization easier.
In most cases, digital transformation will fundamentally change how an organization operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise.
Enhancing business operations
We’re increasingly seeing devices become smarter and better able to communicate with each other
These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading.
We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked.
The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more.
As the data from each of these sensors is collected and analyzed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology.
Physical security systems
We can expect to see the conversations regarding data privacy and security increase as well
As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organizations are using for enhancement and improvements is comprehensively protected from unauthorized access.
Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future.
Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality
Automatic security updates
Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organizations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols.
As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible.
Hackers wishing to do harm will stop at nothing to break into IoT-connected devices
Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market.
Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept.
Providing critical insights
The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities.
Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches
Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements.
Physical security market
The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved.
Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organizations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
Securing New Ground, the security industry’s annual executive conference this week in New York, offered food for thought about current and future trends in the security marketplace. Highlights from SNG 2019 included keynote remarks from security leaders at SAP, Johnson Controls and the Consumer Technology Association, discussions on how CSOs mitigate security risks, topic-focused thought leadership roundtables and a lively networking reception.
Top trends observed at the event include cybersecurity, data privacy, facial recognition and artificial intelligence. A "View from the Top" session covered the need for companies to consider responsible use and ethics around technology; responsibility should extend throughout the organization.
A panel of security leaders emphasized the need to understand the diversity of risks that end users face. As the Internet of Things (IoT) expands connectivity, the inputs, outputs and "attack surface" also expand. It's critical to have security "baked" into products themselves, and also to undertand the mission of the organization being protected, the context and correlation.
Technologies transforming security market
Keynote speaker Gary Shapiro, President and CEO of the Consumer Technology Association, listed the many technologies that will impact the consumer electronics market – and the security market – in the near future: artificial intelligence (AI), voice recognition, the transition to 5G and self-driving cars.As the Internet of Things expands connectivity, the inputs, outputs and "attack surface" also expand
“What we're seeing today is a huge turning point in where the world is going,” said Shapiro, whose organization presents the giant CES trade show each year in Las Vegas. “It’s not just about jobs and technology, but who we are and how we address fundamental human rights.” Privacy is a component of human rights, but “in the world of AI, there is a tradeoff between innovation and privacy”.
Balance between security standards
Shapiro sees Europe as representing one extreme of privacy, epitomized by General Data Protection Regulation (GDPR), which he sees as stifling innovation. Meanwhile, China is pushing innovation using massive amounts of data with no regard to privacy. The United States, therefore, should look for a balance that acknowledges the inevitability of innovation while respecting privacy and realizing it is “always situational.”With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place"
Too much concern for privacy comes at a cost, Shapiro said. “Privacy zealots are killing facial recognition, step by step by step,” he said. “Regulators should not throw away the baby with the bathwater. Every technology in history has been used to cause evil and to do good. Throughout history any new technology could have been banned and made illegal.”
Shapiro offered encouraging words to the security marketplace, even in the wake of large tech firms such as Amazon entering the market. “With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place,” he said. “There is opportunity. There will be increasing new things people want, and always new threats. People will want what you're providing, which is physical and technology security in their facility.”
Scott Schafer, Chairman of the Board of the Security Industry Association (R), interviewed Steve Jones, CEO, Allied Universal, on stage about the importance of merging technology with security officers
Allied Universal CEO Steve Jones discussed holistic approach
Steve Jones, CEO, Allied Universal, was interviewed on stage about the importance of merging technology with security officers for a holistic approach to securing a facility.
“Today, customers are asking us to look at their facility holistically and asking: What is my best approach?” said Jones. A holistic approach includes protecting people, the facility, intellectual property (IP), and how to handle visitors.
Manguarding perspective on security
Allied Universal looks at security from a manguarding perspective and also from a technology perspective, based on their daily experience managing security for 40,000 customer sites across the United States and Canada.Allied Universal has a new handheld technology platform that uses AI
“We are in a unique position in the channel,” said Jones. “We know the stats at any customer site. We know the last time there were repairs on cameras, which card reader is malfunctioning, how long the systems company takes to respond to a call. We are at these locations 24/7 and have an intimate relationship with customer. We are a significant influencer in the decision-making process. We have an opportunity to have a voice, and to build a business around it.”
“We are looking for technology that will enhance the security of the customer,” said Jones, including situational awareness and analysis of data to predict patterns. Allied Universal has a new handheld technology platform that uses artificial intelligence (AI) to analyze data, predict outcomes, and prescribe optimum responses.
Workforce development – hiring and training new employees – is a big issue for Allied Universal, which last year interviewed more than a million applicants to find around 100,000 employees. They are targeting every demographic, and last year hired 33,000 veterans. The company is using technology to help with the massive recruiting effort, including AI to analyze applicant qualifications and a computer-generated avatar to conduct the first online interview.
Future security challenges
Jones sees the rapid increase in the homeless population in the United States as one of the biggest security challenges of coming years. The rapid increase in the US homeless population is one of the biggest security challengesMany businesses face the prospect of homeless individuals living in front of their buildings, possibly using drugs or approaching customers.
“It has become a real threat,” he said. “When they are living in front of your buildings, in many cases, there are ordinances that allow them to be there so the police will not get involved. It falls on the facility owner and private security to address the problem. Given the large homeless population we have now during good economic times, I don’t know what it will look like in an economic downturn.”
Human side of security
An SNG session on the human side of security observed that people are the biggest source of vulnerability. Companies should foster a "safety climate" in which security is integral to operations and viewed as something that helps employees rather than create hassles. Human resources is now a technology field and should work together with security to achieve shared goals.
At the consumer and small business level, cybersecurity must also be top-of-mind and built into a security companies' DNA. SNG attendees heard about opportunities to move beyond providing products and devices to providing experiences, by partnering with customers to protect what matters most to them. While a bit of inconvenience comes along with security, products should be built in a way that is easy to use, with security baked in. The results are systems people are comfortable engaging with every day.
Securing New Ground is presented by the Security Industry Association (SIA).
Honeywell Commercial Security is among the companies working to develop security systems that are more proactive than reactive. “Our biggest opportunity moving forward is the ability to have security solutions that do a better job of detecting and predicting threats,” says Tim Baker, Global Marketing Director, Honeywell Commercial Security. Greater use of analytics and intelligence can reduce human error and simplify processes by providing a more unified view for greater situational awareness.
Artificial intelligence and deep learning
"We’re reaching a maturity level in terms of algorithms and hardware to drive new capabilities in a cost-effective way,” he says. Baker sees a continuing interest in artificial intelligence (AI) and deep learning in the physical security market, used in video analytics and also for intrusion and access control. "We have challenged ourselves to move from reactive solutions to develop a set of proactive solutions that determine potential security threats before they happen,” he says.
An overarching theme is the need to focus operator attention on “what matters” rather than requiring operators to keep track of the growing number of sensors in newer systems. A remaining hurdle is to streamline the deployment of analytics systems, which can require expensive customization during the commissioning phase.
Credential-enabled access control reader
The reader can support any card format and also enables “frictionless” access control
That’s where Honeywell is investing and focusing its attention, seeking when possible to “pre-teach” algorithms based on data gleaned from a large installed base. Fortunately, there will be plenty of data from a growing variety of sites to build from. Honeywell offers a full ecosystem built around enterprise security needs and a second ecosystem built around the needs of small- and medium-sized businesses (SMBs).
In the enterprise space, the trend is toward smarter edge devices, such as Honeywell’s OmniAssure Touch, a cellphone credential-enabled access control reader. The reader can support any card format and also enables “frictionless” access control. A user can gain access by touching the reader, with no need to take his or her smart phone (which has the credential) out of their pocket. The reader is fully backwards compatible, which is a Honeywell hallmark.
Honeywell’s OmniAssure Touch can support any card format and also enables “frictionless” access control.
Designed to be cloud-enabled
On the enterprise software side, Honeywell has invested in further development of their Pro-Watch access control system and MAXPRO VMS (video management system), tying them together into a single security console, along with intrusion and other systems such as human resources (HR) data. For the SMB market, Honeywell is building and expanding their MAXPRO Cloud system. As existing hardware has evolved to be cloud-enabled, the company has also been introducing new control products that are designed from the ground up to be cloud-enabled.
Honeywell’s biggest vertical markets include banking, healthcare, gaming, energy infrastructure and airports
The new MAXPRO Intrusion system, which can be configured over the cloud, will be introduced in the first quarter. MAXPRO Access, to be introduced in late November, can be deployed using an embedded web interface, a cloud interface, or as an on-premise solution. On the NVR side, an embedded NVR works alongside Honeywell’s new 30 Series video cameras, providing secure and encrypted end-to-end connection.
Networked security system
A challenge for Honeywell is to keep up with broader trends happening in the industry, whether geopolitical (e.g., relations between China and the United States) or regulatory such as General Data Protection Regulation (GDPR). Baker acknowledges an industry-wide increase in awareness about cybersecurity, driven largely by the enterprise market. IT departments are getting more involved in the purchasing decision; indeed, the chief information officer (CIO) is often the ultimate decision-maker.
In response, Honeywell is emphasizing “cybersecurity by design” from the beginning to the end of a project. Also, they are using white-hat hackers to test products before they are released into a live environment. “We are doing everything we can to make sure products are cybersecure,” says Baker. Honeywell’s biggest vertical markets include banking, pharmaceutical, healthcare, gaming, energy infrastructure and airports.
NDAA-compliant video cameras
Compliance is a common thread throughout the verticals. Honeywell sells to the government mostly in the access control and intrusion space and built around their Vindicator networked security system. (They also introduced the line of NDAA-compliant video cameras, made in Taiwan, at the recent GSX show.)
A larger proportion of cyberattacks in the first half of 2019 can be attributed to electronic criminals (eCrime adversaries) compared to state-sponsored or unidentified attacks. CrowdStrike, a cybersecurity company that provides the CrowdStrike Falcon endpoint protection platform, observes that 61% of targeted cybersecurity campaigns in the first half of 2019 were sourced from eCrime adversaries, compared to 39% from other sources.
Technology was the top vertical market targeted by cyber-attacks in the first half of the year
CrowdStrike Falcon Overwatch platform
The eCrime portion more than doubled since 2018, reflecting an escalation of criminal players in search of more and larger payouts. The trend is among the information presented in CrowdStrike’s Overwatch 2019 Mid-Year Report: Observations from the Front Lines of Threat Hunting. Falcon OverWatch is the CrowdStrike-managed threat hunting service built on the CrowdStrike Falcon platform.
Technology was the top vertical market targeted by cyber-attacks in the first half of the year, followed by telecommunications and non-governmental organizations (including think tanks). Other targets (in decreasing order) were retail, financial, manufacturing, transportation and logistics, gaming, entertainment and engineering. Hospitality disappeared from the list so far this year, although Crowdstrike expects an increase in intrusions aimed at the hospitality industry to put it back in the top 10 by the end of the year.
In terms of intrusion adversaries, the top players so far in 2019 are Spiders (eCrime) and Pandas (China). Regarding initial access techniques, the most common remain, in order of prevalence, valid accounts, spear-phishing and exploitation of public-facing applications.
2009 is proving to be an active year with a significant increase in eCrime and the inter-relationships occurring across different groups as they strengthen their organizations, forge alliances and expand their footprint.
Need for a proactive security posture
Basic hygiene form the foundation for a strong cybersecurity program
Many of the techniques used by eCrime actors are easily defensible through strong security products and a proactive security posture, says CrowdStrike, which recommends the following measures to help maintain strong defense in 2019:
Be attentive to basic hygiene such as user awareness, asset and vulnerability management, and secure configurations, which form the foundation for a strong cybersecurity program.
User awareness programs can combat the continued threat of phishing and related social engineering techniques.
Asset management and software inventory ensures that an organization understands it footprint and exposure.
Vulnerability and patch management can verify that known vulnerabilities and insecure configurations are identified, prioritized and remediated.
Multifactor authentication (MFA) should be established for all users because today's attackers are adept at accessing and using valid credentials.
A robust privilege access management process will limit the damage adversaries can do if they get in and reduce the likelihood of later movement.
Implementing password protection prevents disabling or uninstalling endpoint protection that provides critical prevention and visibility for defenders.
Countering sophisticated cyber attacks
As sophisticated attacks continue to evolve, enterprises face more than a "malware problem"
As sophisticated attacks continue to evolve, enterprises face more than a "malware problem." Defenders should look for early warning signs that an attack may be underway, such as code execution, persistence, stealth, command control and lateral movement within a network.
Contextual and behavioral analysis, when delivered in real time via machine learning and artificial intelligence, effectively detects and prevents attacks that conventional "defense-in-depth" technologies cannot address.
"1-10-60 rule" in combating advanced cyber threats
CrowdStrike recommends that organizations pursue a "1-10-60 rule" in order to effectively combat sophisticated cyberthreats. That is, they should seek to detect intrusions in under one minute; to perform a full investigation in under 10 minutes, and to eradicate the adversary from the environment in under 60 minutes.
A source at CrowdStrike said "Meeting this challenge requires investment in deep visibility, as well as automated analysis and remediation tools across the enterprise, reducing friction and enabling responders to understand threats and take fast, decisive action."
Located in Eastern China, Hangzhou is the capital and most populous city of Zhejiang Province. It has registered population of 9,800,000, with total area of 16,596 km². Jianggan District is one of the five main urban areas of Hangzhou.
With a floating population of about 1.06 million, Jianggan District ranks first among Hangzhou's main urban areas. As the new administrative center of Hangzhou, it boasts the most important CBD and the largest train station and car hub in Hangzhou, bringing together various traffic elements such as highway junctions and bridges across the river.
The entire Jianggan District is promoting vital transformation in urban areas
Intelligent surveillance system
Covering 8 streets, 141 communities and 4 villages, the entire Jianggan District is promoting vital transformation in urban areas. Nevertheless, the non-registered population, accounted for about 40% of the total population, makes it hard for the local government to improve urban management in the district.
Every policeman needs to manage 1,700 citizens on average. The shortage of police force affected their work precision and led to difficulties in providing timely police response. In addition, insufficient surveillance coverage and limited intelligence system in the area resulted in inactive security measures, making it difficult for the police to achieve their goals
Integrating DoT, IoT and the internet
Based on the Dahua Heart of City (HOC) architecture supported by "Full Sensing, Full Intelligence, Full Computing and Full Ecosystem (4 Full) capabilities, Dahua Technology firmly focused on the construction needs of the area and built the overall plan of establishing an ‘online police’.
Integrating the Internet, DoT and IoT, Dahua Technology has successfully assisted the Hangzhou Jianggan Public Security in building a multi-dimensional network that targets customer value, and combines AI, big data, and cloud computing in order to obtain accurate real-time data and strengthen the current technology of “online police” operations.
Sensors and monitoring products
Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network
Moreover, Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network. It also set up 46 actual police investigation models to provide accurate instructions for Jianggan police, including property crimes analysis, situation analysis, vehicle management, people management, psychiatric control, online apprehension of violators, as well as missing person search, etc.
Compared with traditional police operation, Dahua HOC Safe City Solution has built an “Online Police” mechanism to obtain the most authentic real-time data through information technology, and carry out accurate computer applications for a more scientific service deployment, efficient police force and powerful security control.
Dahua HOC Safe City Solution
It ensures that the Jianggan police can perform properly at a given time. It also promotes the transformation of police affairs from passive to active, from extensive to subtle, from imprecise to accurate, and from offline to online, gradually carrying out the prediction, early-warning, and prevention measures of police operations.
Since 2016, the Dahua HOC Safe City Solution has helped Jianggan Public Security achieve outstanding results including enhanced police intelligence, reduced crime cases, increase in case closure rate and efficiency, improvement in public service, and speedy recovery of missing individuals, opening a new chapter for intelligent police operations.
The first China International Import Expo was held on November 5, 2018 in Shanghai. As the world's first import-themed national exhibition, it attracted more than 3,600 exhibitors from 172 countries, regions and international organizations, making security a top priority during the event.
As an essential force in the global security industry, Dahua Technology has performed outstandingly in assuring the security of many international events such as the Rio Olympic Games, G20 Hangzhou Summit and the 9th BRICS Summit. This time, Dahua Technology has shouldered the security responsibility again with its state-of-the-art products and solutions.
Dahua Technology provided more than 3,000 sets of cutting-edge intelligent equipment
The Expo expected a total number of 800,000 visitors, as well as tens of thousands of displayed goods, coming from more than 3,000 companies in more than 130 countries, demanding safety as the top priority in the venue. Integrating data from various departments as well as monitoring the venue and command dispatching became a huge challenge for the security and police personnel.
Dahua Technology provided more than 3,000 sets of cutting-edge intelligent equipment in the core locations of the Shanghai National Convention and Exhibition Center and its surrounding areas, using video AR, face recognition, ANPR, video structuring, intelligent analysis and other technologies to improve the venue’s level of security.
Artificial Intelligence solutions
In order to further enlarge the area security coverage, Dahua Technology set up video surveillance points in key areas of Shanghai National Convention and Exhibition Center including entrance and exit points of the outer ring, interior area, office buildings, as well the surrounding major passages, plazas, commanding points, subway entrances and exits, pedestrian bridges, etc.
In addition to the already pre-installed surveillance equipment, new monitoring devices were also added to make sure that there will be no blind spots and interruptions of the video transmission in the whole area.
Dahua panoramic cameras installed at the commanding point of the Shanghai National Convention and Exhibition Center employs AR technology in order to achieve omni-directional and no blind spot surveillance.
Additionally, the panoramic cameras deployed inside the exhibition center monitor the situation inside the exhibition hall and obtain real-time dynamic information that builds a three-dimensional platform that are visual, controllable and schedulable to facilitate an efficient security operation.
Intelligent video analysis system
Intelligent video analysis system was built in the exhibition area to classify the acquired data
Moreover, intelligent video analysis system was built in the exhibition area to classify the acquired data according to the preset rules and application requirements, such as crowd detection, behavior analysis, map search, etc. This system expands and deepens the application of video information in the efficiency of public security.
Furthermore, through the Dahua Deep Learning Series video alert camera, people who would illegally climb over the perimeter fence built within the 4-kilometer area of the exhibition hall would be identified and captured.
Dahua face recognition system
The Dahua face recognition system deployed at the entrance and exit of the exhibition center could recognize the identity of all visitors in real time by comparing their ID card’s recorded information with the face photo captured by the front-end smart camera.
This system did not just improve the traffic efficiency of the entrance and exit points, but also guaranteed the safety and accuracy of the identification of people walking in and out of the venue.
High-definition smart cameras
Dahua high-definition smart cameras were also set up at the entrance and exit around the transportation hub of the Shanghai National Convention and Exhibition Center to monitor and track high-risk vehicles and people in real-time. This effectively improved the road management and traffic control in the area.
Fully structured cameras capturing real-time videos of motor vehicles, pedestrians and non-motor vehicles were deployed in the surrounding area, which also support face and body recognition for a more comprehensive security.
Video network platform
Video network platform automatically connects the video and image data captured within the area
Additionally, a video network platform automatically connects the video and image data captured within the area to the public security command center, creating a resource sharing integration of valuable information.
China International Import Expo has facilitated countries and regions all over the world in strengthening economic cooperation and trade, and promoting global trade and world economic growth. Dahua AI solutions has greatly enhanced the prevention and control measures within the key areas around the venue, assuring security during the Expo.
Cutting-edge security solutions
After the event, Dahua Technology received letters from the Shanghai Public Security Bureau, Qingpu Public Security Bureau, Changning Public Security Bureau, Shanghai Hongqiao Integrated Transportation Hub Emergency Response Center, and other offices, thanking Dahua Technology for its strong support and contributions to the success of the security management during the event.
From the Rio Olympic Games to the G20 Hangzhou Summit, from the 9th BRICS Summit to the first China International Import Expo, Dahua Technology always accomplishes various security tasks with high quality and efficiency. With its cutting-edge products and solutions, quality operation services and professional technical team, Dahua Technology will continue to assist more major international events in the future.
Delfina Chain, Sr Associate Customer Engagement & Development at Flashpoint, discusses what resources defenders must access to in order to keep a finger on the pulse of the cybercriminal underground.
Artificial intelligence (AI) is already being applied to diverse use cases, from consumer-oriented devices - such as voice-controlled personal assistants and self-directed vacuum cleaners - to ground-breaking business applications that optimize everything from drug discovery to financial portfolio management. So naturally, there is growing interest within the information security community around how we can leverage AI - which encompasses the concepts of machine learning (ML) and deep learning (DL) - to combat cyber threats.
AI-enhanced cyber security
The effectiveness and scalability of cybersecurity-related tasks has already been enhanced by AI
The effectiveness and scalability of cybersecurity-related tasks, such as malware and spam detection, has already been enhanced by AI, and many expect ongoing AI innovations to have a transformative impact on cyber defence capabilities. However, security practitioners must also recognize that the rise of AI presents a potent opportunity for cybercriminals to optimize their malicious activities.
Much like the rise of cybercrime-as-a-service offerings in the underground economy, threat-actor adoption of AI technology is expected to lower barriers to entry for lower-skilled actors seeking to conduct advanced malicious operations. A report from the Future of Humanity Institute emphasizes the potential for AI to be used toward beneficial and harmful ends within the cyber realm, which is amplified by its efficiency, scalability, diffusibility, and potential to exceed human capabilities.
Encrypted chat services
Potential uses of AI among cybercriminals could include the development of highly evasive malware, the ability for automated systems to exhibit human-like behaviour during denial-of-service attacks, and the optimization of activities such as vulnerability discovery and target prioritization. Fortunately, defenders have a leg up over adversaries in this arms race to harness the power of AI technology, largely due to the time- and resource-intensive nature of deploying AI at its current stage in development.
The purpose of intelligence is to inform a course of action. For defenders, this course of action should be guided by the level of risk (likelihood x potential impact) posed by a threat. The best way to evaluate how likely a threat is to manifest is by monitoring threat-actor activity on the deep-and-dark-web (DDW) forums, underground marketplaces, and encrypted chat services on which they exchange resources and discuss their tactics, techniques, and procedures (TTPs).
Cobalt Strike threat-emulation software
Flashpoint analysts often observe cybercriminals abusing legitimate technologies in a number of way
Cybercriminal abuse of technology is nothing new, and by gaining visibility into adversaries’ ongoing efforts to develop more advanced TTPs, defenders can better anticipate and defend against evolving attack methods.
Flashpoint analysts often observe cybercriminals abusing legitimate technologies in a number of ways, ranging from the use of pirated versions of the Cobalt Strike threat-emulation software to elude server fingerprinting to the use of tools designed to aid visually impaired or dyslexic individuals to bypass CAPTCHA in order to deliver automated spam.
Flashpoint analysts also observe adversaries adapting their TTPs in response to evolving security technologies, such as the rise of ATM shimmers in response to EMV-chip technology. In all of these instances, Flashpoint analysts provided customers with the technical and contextual details needed take proactive action in defending their networks against these TTPs.
When adversaries’ abuse of AI technology begins to escalate, their activity within DDW and encrypted channels will be one of the earliest and most telling indicators. So by establishing access to the resources needed to keep a finger on the pulse of the cybercriminal underground, defenders can rest easy knowing they’re laying the groundwork needed to be among the first to know when threat actors develop new ways of abusing AI and other emerging technologies.
Each day, over 55,000 electrical substations in the United States funnel massive amounts of energy to homes and businesses across the country. An array of specialized equipment allows these facilities to keep up with demand, and each component must run smoothly to adequately transfer and distribute energy.
Housing mission-critical assets vital to the community means that substations must track everything—from condition monitoring to intrusion and sabotage threats. Thermal imaging cameras, video classification analytics, and radiometric measurement offer unmatched maintenance and security insight for substations and help prevent costly issues that hurt the bottom line.
AI and deep learning technologies
Advancements in artificial intelligence technologies are expanding the capability of security systems
Advancements in artificial intelligence and deep learning technologies are expanding the capability of security systems. As security solutions improve, customer expectations grow. Systems that were once limited to perimeter protection are now able to provide valuable process efficiency and maintenance information. Substations should consider integrating new technology that improves efficiency and safety as they move to satisfy NERC CIP-014 requirements.
Problematic heating and cooling connections can plague substations. Overheating and burning a transformer is a costly, potentially multimillion-dollar error that can take several months to correct. Beyond damage costs, the abrupt loss of equipment can lead to extended service interruptions and significant revenue loss. The consequences of equipment failure highlight the importance of asset monitoring, asset resiliency, and predictive maintenance for substations.
Radiometric thermal cameras
Integrating cutting-edge technologies like radiometric thermal cameras and temperature trend analysis software allows facility operators to remotely inspect equipment and quickly detect issues, preventing overheating and fires. Image quality and software compatibility are vital in planning an asset monitoring ecosystem.
To best serve both the security and condition monitoring needs of substations, thermal sensor manufacturer FLIR Systems and software developer Embedded Logix collaborated to create a multi-purpose solution.
Security and asset monitoring
For over 30 years, FLIR has developed security and asset monitoring solutions for utility providers
For over 30 years, FLIR has developed security and asset monitoring solutions for utility providers. A full lineup of fixed and pan-tilt thermal cameras allow security operators to monitor assets and perimeters in complete darkness, smoke, fog, and harsh weather conditions.
FLIR thermal cameras provide superior resolution, capturing sharp imagery and minute details for high-performance video analytics and immediate threat detection. Quick intervention during intrusions prevents escalation, and rapid detection with thermal imaging supports fast response time.
Smart-LX Sensor Gateway
Recognizing threats before they ever reach the fence line deters theft, vandalism, and assault, keeping facility personnel safe and reducing the risk of equipment repair and legal costs. As an industry leader in thermal imaging, FLIR looks to partner with other innovative solution providers to create more advanced technologies.
Embedded Logix, a Detroit, Michigan-based test and measurement solutions provider for the utility, plastic, food, and metal industries emerged as an ideal partner to integrate smart analytics software into thermal sensors. Their Smart-LX Sensor Gateway is an open-architecture platform that features Smart-LX Analytics with support for infrared cameras, programmable logic controllers, and SCADA systems. It opened the door for a complete predictive maintenance solution.
FLIR thermal cameras
Partnering with FLIR means being in the center of the infrared universe"
The Smart-LX system allows both maintenance and security personnel to leverage networked thermal imagers on a single platform. By 2012, Embedded Logix was FLIR’s exclusive smart sensor software partner for temperature trending in predictive maintenance, bringing the Smart-LX platform to FLIR thermal cameras.
“Partnering with FLIR means being in the center of the infrared universe. We can’t imagine any better product lineup to feed data into our Smart-LX Analytics,” said Deborah McLeod, president of Embedded Logix. “We have bench tested many other brands over the years, but FLIR’s products always come out on top, and that is why we recommend FLIR cameras to our customers. When you combine Smart-LX Analytics with FLIR cameras you turn an incredible sensor into an extraordinary solution.”
Embedded Logix Smart-LX Analytics read, process, analyze, and create a visualization of sensor readings, generating asset performance reports on trends and rules that can be sent to maintenance personnel for further assessment. The software adapts over time with customer input, relying on user feedback to create an expert system. The Smart-LX platform works with both legacy and new equipment, analyzing signals from all sensors and systems, and is capable of aggregating information into VMS, OSI PI, and SCADA platforms.
The FLIR FC-R fixed thermal camera leverages a radiometric sensor for noncontact temperature measurement
FLIR offers several high-performance thermal imaging solutions for Smart-LX integration, including the FLIR A310 and FLIR FC-R Series cameras. Dual thermal and optical sensors on the FLIR A310 PT offer reliable perimeter protection and automated condition monitoring while pan/tilt controls maximize coverage. The onboard radiometric thermal sensor measures slight changes in surface temperature, allowing the A310 PT to monitor hotspots on equipment and alert an operator if temperatures exceed preset levels.
FC-R fixed thermal camera
The FLIR FC-R fixed thermal camera leverages a radiometric sensor for noncontact temperature measurement. Onboard human and vehicle classification analytics offer reliable intrusion detection and work in tandem with external monitoring systems to quickly alert operators and security personnel.
“FLIR’s innovative A310F, A310PT, and FC-R radiometric thermal cameras have been paramount in substation monitoring for years,” said Michael Chaffee, director of business development at FLIR. “With the addition of Embedded Logix and its SmartLX software, our customers can take FLIR thermal cameras to the next level. When combined, FLIR cameras and Smart-LX software create a data goldmine, allowing a more frequent analysis of substation assets right from the security control room.”
FLIR and Embedded Logix systems revolve around facility security and asset monitoring
FLIR and Embedded Logix systems revolve around facility security and asset monitoring. Installing different cameras and network components throughout a substation creates an ecosystem ready to detect and prevent issues. Most security and asset monitoring systems from FLIR and Embedded Logix begin with several FLIR FC-ID cameras along the perimeter of the substation, one A310 PT mounted in the center of the substation, FC-R or A310F cameras installed around high priority assets, and several Smart-LX Sensor Gateways.
When the system detects an object of interest, FLIR FC-ID cameras trigger the A310 PT camera to track and zoom on the object for further threat assessment, allowing security personnel to quickly and safely gauge the situation. Condition monitoring thermal imagers can continuously survey any asset in their field of view.
Fixed FLIR A310F camera
Fixed FLIR A310F and FC-R cameras monitor specific equipment 24/7, while the A310 PT can focus on multiple areas, viewing transformer connections, incoming power transmission lines, switch gears, fans, and more.
Generated reports compare the performance of similar assets across all stations
Smart-LX Sensor Gateways control the A310 PT preset scanning to gather temperature information on equipment, triggering an alarm if a temperature exceeds the preset threshold. Generated reports compare the performance of similar assets across all stations, address historical temperature trends, and label each temperature reading with the substation location, asset ID, and asset class information. This reporting is vital, as temperature trends can indicate trouble even when alarms remain untriggered.
“If the temperature is rising and falling on one asset, but the temperature on the other assets are steady, it can indicate a problem,” McLeod explained. “Even if the asset doesn’t reach the temperature threshold, the temperature slowly creeping up to that threshold is valuable information.”
FLIR and Embedded Logix systems leverage remote monitoring to catch issues before they occur, preventing expensive downtime and maximizing substation efficiency. Predictive maintenance programs can identify poor-performing components, allowing operations teams to decide whether to proactively replace components or to continue monitoring. An unknown failure could cause catastrophic damage to other substation elements, causing customer outages and costing the utility millions of dollars.
Smart-LX Sensor Gateways also allow thermographers to inspect equipment remotely
“The FLIR and Embedded Logix solution allows you to qualify with more frequency,” said Chaffee. “It ultimately enables you to save money and identify failures sooner. It’s much more expensive to replace a component after failure versus pre-failure. When a failure happens, you shut down the substation and part of the grid, which costs a lot of money.”
Smart-LX Sensor Gateways also allow thermographers to inspect equipment remotely, improving efficiency during repairs. Traditionally, a thermographer would report to a substation to manually inspect equipment in need of service. Using a handheld thermal imager, the thermographer would take temperature measurements and check for load balance to determine whether equipment should be taken offline for repair. The need for a pre-work assessment and post-repair verification can make for long days. Embedded Logix Smart-LX Sensor Gateways remove this pain point.
Live data access
The Smart-LX Sensor Gateways give thermographers the ability to inspect equipment remotely and access live data from each networked FLIR thermal camera. Real-time temperature measurement and analytics allow the maintenance crew to confirm repairs or safely identify any additional issues.
Thermographers would only need to go to a site when something is critical"
“The FLIR and Embedded Logix solution enhances the role of thermographers,” Chaffee said. “Not needing to drive hundreds of miles to do a regularly scheduled thermal scan saves a lot of money. Your thermography team can scan safely, and with more frequency, from the security operations center. Thermographers would only need to go to a site when something is critical. Time is money, so being more productive as a utility and building a substation predictive maintenance program is an important element.”
Critical asset monitoring
Smart-LX Software works continuously to monitor critical equipment and uncover even small changes that can indicate impending failure. Intelligent maintenance and security systems are making substations safer and more efficient, positively impacting the bottom line. The insurance deductible of a significant substation asset can be hundreds of thousands of dollars. Detecting just one instance of equipment failure can prevent inordinate costs.
“The Smart-LX Software solution reduces the cost of an event by detecting it much earlier. Instead of detecting a fire, you’re preventing a fire,” McLeod added. “It’s important for all stakeholders that utilities monitor changes in asset health as a means of improving reliability and reducing the total cost of repairs.
Asset security and management
Utilities are moving towards proactive deterrence and away from reactive monitoring
He adds, “Stakeholders want to see that steps are being taken to reduce insurance claims from unnecessary escalations when a malfunctioning asset is not discovered until it fails and takes out expensive assets or infrastructure around it. Preventing costly downtime by repairing equipment at the first sign of trouble can reduce the number of unscheduled downtime events dramatically and create significant cost-savings.”
Leveraging radiometric thermal cameras and analytics for both security and asset monitoring represents a paradigm shift. Utilities are moving towards proactive deterrence and away from reactive monitoring.
FLIR radiometric thermal cameras and Embedded Logix Smart-LX Sensor Gateways safeguard substations and reduce the risk of critical equipment failure. Investing in stronger security keeps substations and their assets safe, and innovative, multipurpose solutions from FLIR and Embedded Logix create a win-win for utility providers throughout the country.
Video storage is an important – and expensive – aspect of almost any surveillance system. Higher camera counts equate to a need for more storage. New analytics systems make it easier for operators to manage video, but that video must be dependably stored and easy to access if and when it is needed. To keep up to date on the latest developments, we asked this week’s Expert Panel Roundtable: What’s new in video storage solutions?
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
While unpacking our bags from a trade show, it is interesting to consider the dominant themes and trends we heard and saw at the show. So it is with the recently concluded Global Security Exchange (GSX) show in Chicago, presented by ASIS International. Amid all the product promotion, training sessions, networking and tired feet at the show, what really stood out? We asked this week’s Expert Panel Roundtable: What was the big news at the GSX 2019 trade show in Chicago?