The coronavirus pandemic has brought about an unprecedented crisis for businesses and individuals. It has also created a new normal, notwithstanding the disruption to our lives, ultimately changing life as we knew it. However, our resilience as humans will ensure that we survive and become better, stronger, and more determined than ever before. As I mentioned, both businesses and individuals have struggled significantly to balance the need for safety versus survival. But at AxxonSoft, we remain...
Ping Identity, the globally renowned intelligent identity solutions provider for the enterprise, has announced that Candace Worley has joined the company’s leadership team as Global Chief Poduct Officer. Worley brings over 25 years of enterprise strategy and product development experience from some of the largest names in the technology sector. At Ping Identity, Worley will be responsible for advancing the global product vision, pushing technical product innovation efforts and bringing th...
Fireblocks announces it has developed a new MPC (secure multi-party computation) algorithm that pushes digital asset transaction speeds up to 8X faster than what’s currently possible. Fireblocks’ new protocol, called ‘MPC-CMP,’ is based on and surpasses the speed of Gennaro and Goldfeder’s protocol, a current industry standard for MPC, and Lindell et al.’s protocol. Starting today, all digital asset custodians and MPC vendors can access Fireblocks’ MPC-...
PointCentral, an Alarm.com company, has acquired New York-based Doorport, Inc. With the acquisition, PointCentral will add a unique smart intercom capability to the PointCentral Smart Property Management solution. Doorport‘s innovative smart intercom solution improves building access security and convenience at multifamily properties for residents, guests, property managers, and delivery personnel. The acquisition accelerates PointCentral’s push to provide a complete IoT solution th...
TELUS acquired ADT Canada creating ADT by TELUS and is now using their new capabilities to provide much needed security support to Canada’s small business community. With many small businesses having to close their doors or look for new ways to operate during this time, they need a way to watch and protect their properties and keep important assets safe. The threat of break-ins is all too real. In Montreal, a jewelry store owner is reeling after thieves made off with his two safes during...
Advanced Mobile Lite Series is a 4G/LTE PERS locator that is equipped with Wi-Fi location tracking. Leveraging industry-certified A-GPS and Wi-Fi technology, Mobile Lite has improved location accuracy especially when users are inside the buildings. In addition to both GPS & Wi-Fi positioning technologies, Mobile Lite Series has built-in fall detection (Mobile Lite-R15/R18 only), providing comprehensive care for all seniors. The positional information can be accessed via Climax’s onlin...
Arcules, innovators in integrated video and access control cloud services, has announced a strategic partnership with RAS Watch to deliver a fully managed and outsourced global security operations center (GSOC) solution. The jointly developed Rapid Deployment Kit incorporates the Arcules cloud video management system and Axis Communications IP cameras, as well as remote monitoring, alert verification and system health monitoring from RAS Watch. During the outbreak of COVID-19, businesses are looking for solutions that help them monitor and protect their physical assets against security threats as their employees leave their things behind and work from home for the unforeseeable future. With Arcules’ secure cloud-based video surveillance service and RAS Watch’s fully managed and outsourced GSOC, business and security leaders can quickly, efficiently and cost-effectively secure assets. Short-term contracts are available immediately to help organizations navigate through the COVID-19 crisis. Alarms systems via video camera technology “Over the past few weeks, we’ve seen a majority of jurisdictions issue stay-at-home orders. These directives are necessary to limit the spread of the virus, but they are leading to theft or other problems at recently vacant buildings,” said Ryan Schonfeld, CEO and Founder, RAS Watch. “We knew we needed to come up with a solution that is cost-effective and easy to deploy and offers businesses the kind of protection they need to ensure their facilities are safe.” The Arcules and RAS Watch partnership allows for rapid deployment of both video camera technology and remote setup through the intuitive, easy-to-use Arcules cloud video surveillance interface. The Arcules service enables users to remotely manage views across all of a company’s locations, organize user and group permissions, check the status of cameras, set up alarms and notifications, and view security and business analytics. RAS Watch’s managed GSOC empowers remote response and oversight, as well as system health monitoring for security infrastructure, including video surveillance cameras, access control readers, switches and other infrastructure necessary to ensure system functionality. With RAS Watch’s tools and proven analytic methods, security is transformed from a typically reactive environment into a proactive strategy that delivers the information and guidance necessary to mitigate risks before they happen. Security and safety with cost-effective solutions “Arcules is excited to partner with RAS Watch on this Rapid Deployment Kit that enables clients to quickly establish security and remote monitoring for their sites,” said Nigel Waterton, CRO, Arcules. “The time to provide clients with quick and cost-effective options to increase security and safety is now, and both Arcules and RAS Watch are dedicated to providing services that ease complexity, reduce additional infrastructure costs and minimize the requirements for smart, effective security monitoring.”
AxxonSoft has announced the release of version 4.11 of the Intellect PSIM. The new version provides neural network–based analytics, video wall management interface, automatic object tracking with a PTZ camera, support for Intel Quick Sync Video hardware decoding, and servers for ONVIF and SIP protocols. The new release also includes updated versions of Face Intellect, POS Intellect, Auto Intellect, and Web Reporting subsystem, along with many other enhancements and improvements introduced. Video Analytics Neural Tracker The neural tracker uses DNN (deep neural network) to recognize specific types of objects, e.g., humans or vehicles. The neural tracker tracks objects in motion, which allows the application of any VMD-based detection tool: motion in an area, line crossing, appearance/disappearance of an object, etc. Detection based on the neural tracker can be applied to complex scenes with a large amount of non-relevant detail, whereas classic motion detection would be drowned out by false alarms. One neural tracker can work with several individually set-up counters, with various detection zones Object Counter A neural tracker can be linked to a counter that will periodically report the number of objects within a specified area in the FOV. One neural tracker can work with several individually set-up counters, with various detection zones, reporting intervals, etc. Neural Filter The neural filter works in parallel with the standard tracker, which allows the detection only of moving objects of a specified type or abandoned objects, while ignoring all other movement in the FOV. The results of their joint operation can be used by VMD-based detection tools in real time and recorded to a database that allows the quick location of objects of a specified type in recorded footage. Custom training of neural networks AxxonSoft offers custom training of the neural networks used by the neural tracker and neural filter To deliver high-quality video analytics, AxxonSoft offers custom training of the neural networks used by the neural tracker and neural filter. For each particular project, these AI tools are trained with the help of videos shot on site. Behavioral Analytics The neural network analyzes video and generates data on the postures of people in the FOV. This data is processed by analytical algorithms which are capable of detecting specified postures, such as crouching, lying prone, shooting, with hands up, or the appearance of an individual in any posture. Behavioral analytics detects potentially dangerous scenarios by specific postures, for example: An individual crouched down next to an ATM could be a burglar; One in a shooting position and other(s) with hands up could be an armed robbery. Enhanced and Optimized Added an option to save and recall templates for Forensic Search in Video Footage. A saved template can be re-used for further searches by using the same criteria. Updated neural algorithms for fire and smoke detection. Added Alarm Expired events for these detection tools, and an option to select processing hardware: GPU or CPU. Optimized memory consumption by the sweet-hearting neural detection tool that shows items not being swiped at the cash desk. Improved the stopped vehicle detection tool. Video Surveillance Added Tag&Track Pro feature that automatically tracks an object with a PTZ camera using coordinates obtained from the fixed camera's tracker. To start tracking a moving object, just click on its image. The PTZ camera will track it until the object leaves the fixed camera's FOV. Implemented support for the hardware decoding of H.264 streams using the Intel Quick Sync Video technology. The decoding is performed by an Intel GPU, which significantly reduces the Server's CPU load when applying video analytics, and the Client's CPU load when displaying video feeds. Added an option to hide selected portions of an archive. The availability of the options of hiding records and viewing hidden archives depends on the assigned user rights. One can now also mask faces on exported videos. To make it possible, the neural network automatically locates faces in recorded footage. These functions are required to comply with privacy and data protection requirements, such as the GDPR. Added an option to export videos from external storage, such as IP camera archives or NVRs. Added a comprehensive set of system events to audit operator's actions. Communication Protocols ONVIF Server - The ONVIF server is used for media streaming to external systems. It allows ONVIF clients to connect to an operating Intellect PSIM system, as they would to an ONVIF compatible device. Supported video streaming with synchronized audio in H.264/H.265/MPEG-4/MJPEG formats, multi-streaming, access to Video Footage, multicasting, authentication, and transmission of I/O events from devices and metadata. SIP Server - The SIP server allows the Intellect PSIM to connect to intercom devices such as IP door stations and push plates, and to create and route calls. The server supports audio and video calls, which can be recorded for further monitoring. Security system operators can now communicate via a new SIP Panel client interface. Each device and SIP Panel is assigned a calling ID number, and address books containing available call numbers are set up on SIP Panels. Other Protocols - Added support for the AMQP open messaging protocol, which allows the Intellect PSIM to receive and send RabbitMQ messages. Implemented the HTTP Server module, which is capable of sending events to an external system via HTTP polling. The User Interface Screen Manager Screen Manager is a new UI for video wall management. It enables convenient monitor layout management on selected PCs. Screen Manager can be used to: Create, edit, or delete layouts, and assign them to selected PCs; Remotely switch layouts on PCs. Operator Protocol For objects linked to a camera, they can now display a still image or recorded video of an event Operator Protocol is now completely revamped. Events list is now displayed as tiles, sortable by time and priority. Events processed by other operators are marked with a gray background, and their cells include the name of the Operator Protocol in which the processing has been completed. Users can now escalate an event to a specified operator. The parameters displayed along with the event are now selectable. For objects linked to a camera, they can now display a still image or recorded video of an event and zoom in on the alarm snapshot in a separate window. If an object is linked to multiple cameras, users can scroll between their images and can set video display in the Camera Window or ActiveX component. Set Bookmark checkbox All buttons and comments are now located on a single upper panel. An operator can now select several events, and work with them simultaneously. Another new feature added is a Set Bookmark checkbox for automatic creation of a bookmark in Video Footage when an event is processed by the operator. Operator's text comments are used for bookmark names. Incident management Additionally, a new feature added is the incident management function. If an operator selects an event, a list of required processing actions is displayed. The operator selects the required checkboxes, and information about their actions is added to text comments along with date/time stamps. In addition, the operator can now view processing instructions for events from any source object. Other new interfaces and enhancements The object context menu on the Map now includes an option to set the number of recent events to be displayed (up to 99). Introduced an option to request single frames or camera archives (also for cameras under a parent object) via the ActiveX component. The Main Control panel now includes the following information about the system - product name and version, installed subsystems' names and versions, available system objects list and the number of used objects, and license expiration date. Also added is a new graphs interface containing analog sensor data representations, and an interface allowing display of statistical data about objects' statuses as a table or a chart. User Rights Added support for Active Directory service, which enables synchronization between users and groups of the Intellect PSIM and their relevant Active Directory objects. When creating a new user rights group, operators can now import settings from an existing group. If multiple groups are selected, their combination is created. Added a setting to automatically shut down the session if the operator becomes idle. Added an option to limit the list of available actions on objects in video surveillance monitor and Map UIs. Added an option to disable frame/video export and printing a still frame from the video surveillance monitor. Auto Intellect 5.5 Introduced a module that uses the neural network to detect vehicle types. The module is capable of classifying passenger cars, vans, buses, trucks, and motorcycles. Integrated the IntLab container number recognition module. Updated the IntelliVision car number recognition module. Added support for new national license plate formats and running recognition on GPU and increased overall recognition quality. Basic virtual loop is now replaced with the IntelliVision virtual loop. The SDK for the AutoUragan LPR module is updated to version 3.7. Added new national formats and templates and increased operational stability. Updated VIT LPR module to version 2.7.2. Added new national formats and templates, increased recognition quality and stability; the GUI now includes tools for fine-tuning the module. Face Intellect 7.3 Integrated new YITU and SCT facial recognition modules. Updated VisionLabs facial recognition module to version 3.6.3. In the Tevian engine, recognition of emotion, race, and facial attributes (glasses, mustache, beard, hair color, headwear, etc.) was added to the existing age and gender guesstimation capabilities. Facial recognition now warns of faces covered with masks etc. and performs "liveness" checks to preclude identity spoofing. Operators can now use facial attributes for filtering, e.g., to find all males wearing glasses and/or with a beard. Emotion recognition allows you to evaluate the quality of personnel operations and the degree of customer satisfaction in banking, retail, and other industries. The Face Search tab now includes filters by name, department, and similarity rate, time window presets, and saving search parameters (filters) option. Operators can now launch a filtered search by double clicking a facial image in the captured/recognized faces log. Other new features: The full names of recognized persons now appear on live video under the facial bounding box; Users can now check an entire folder containing facial images against your DB; Facial recognition now has a configurable capture area; Facial DB replication across servers now allows a face to be added to all DBs by adding it to just one database. POS Intellect 5.4 Integration of the screening system allows data to be received from connected devices Integrated 5 models of POS terminals, 2 models of vehicle scales, a printer scales and the Sphinx screening management system that supports up to 5 handheld metal or metal/radiation detectors. The integration of the screening system allows data to be received from connected devices, recorded to the POS Intellect DB, used for captioning screening videos, and utilized for searching by text comments in Video Footage. The integrated solution allows one to control equipment and personnel operations for more efficient and reliable screening. In POS Intellect, existing integrations have been enhanced, and the wildcard search in captions has been introduced. Intellect Web Report System 3.4 The web report subsystem now includes new and updated reports, and new functions have been introduced. New Types of POS Reports - A "sweet-hearting" report allows one to view event video live. A canceled items report contains data filtered by specified cashiers and item names over a specified period. A canceled amount report is similar to the one previously listed and includes the total value of canceled items. New Types of Time and Attendance Reports A consolidated employees report contains data on the total number of employees in specified departments, and the number of employees staying in a specified area at the moment of reporting, or on a specified time/date. A detailed employees report contains data on the number of employees staying in a specified area during each day of a specified time period. Other New Report Types - A customer counter report contains information about the number of visitors who entered/exited a specified area over a specified period and is presented as a graph or as a table. A graphical report on events represents the number of events of a specified type for the selected types of objects over a specified time period. The exported report includes both a graph and a table. A pass card report contains information about the times of issuing pass cards for specified employees, or departments, as well as the types of cards and their expiration dates. A recognized rail car numbers report contains information about error detection with a check digit and a photo from the linked camera.
Jazz Networks, globally-renowned cybersecurity insider threat detection and response solutions firm, and Vaion, an end-to-end video security solutions provider, has announced that they have merged to create a unified security provider under the name, Ava. In response to the rise in hybrid attacks involving both physical and cybersecurity, the two companies have united to help organizations monitor, understand, and act on threats in real-time to protect people, assets and data. Both companies are privately held by Ubon Partners and employees. Integrated approach to cyber and physical security “Our vision is for organizations to take an integrated approach to physical and cybersecurity. When it comes to security gaps, attackers don’t discriminate, and the consequences are costly,” said Tormod Ree, CEO of Ava, adding “Yet security professionals aren’t able to see and investigate patterns across both physical and information assets because the data is overwhelming, tools are too complex, and security structures are compartmentalised.” Attackers are exploiting weaknesses in physical security systems to bypass network protections and manually dismantle cybersecurity or digital controls. Despite the availability of data, operators don’t have the insights needed to act. Machine learning-powered cyber and video solutions Ava’s machine learning-powered cyber and video solutions are easy to use Ava is now the only provider, under one roof, to give organizations full visibility into potential multi-faceted attacks. Ava’s machine learning-powered cyber and video solutions are easy to use, and give security professionals access to quality, timely data that can be shared across the security organization for actionable insight. Initially, the combined company will continue to offer cyber and video solutions allowing for separate analysis of data from all users, cameras, and servers. The human-centric cyber solution (formerly by Jazz Networks) will continue to employ a powerful combination of policy and machine learning sensors to prevent IP theft and sabotage, improve cyber hygiene, and accelerate threat hunting. Enhancing cyber security The end-to-end video solution (formerly by Vaion) will continue to provide proactive, video security, and insight. The offering includes integrated video and audio analytics powered by machine learning algorithms, intuitive installation processes, and a range of smart cameras. “By identifying both cyber and physical security threats before they become incidents, organizations can take a more proactive security posture,” added Tormod Ree. Cross-domain security solutions Over time, cross-domain security solutions will allow for even deeper data visibility. Ultimately, Ava will offer fully converged solutions to support organizations as they move toward joint cyber/physical security operations. Converged offerings could include features such as a unified interface and common data storage and analytics engines. “We believe Ava is uniquely positioned to address this growing security challenge,” said Fredrik Halvorsen of Ubon Partners, adding “Plus, new hybrid security gaps are emerging as a result of suddenly shuttered buildings and 100% remote workforces due to COVID 19. This is an important time to re-think security.” Threat detection and intelligent video security Identifying the patterns provides heightened visibility into the potential for threats, breaches, or policy violations Jazz Networks protects organizations from cybersecurity risks within. Vaion has been changing the traditional video security landscape with computer vision capabilities that make it easier for businesses and organizations to monitor their physical assets proactively. In both cases, organizations can detect threats in their earliest stages and perform fast, effective investigations with fewer resources. Under Ava, real-time insights from the cyber insider threat detection tools or intelligent video security solutions will enable security professionals to discover patterns across their entire security ecosystem, regardless of whether the anomaly is physical or digital. Identifying the patterns provides heightened visibility into the potential for threats, breaches, or policy violations. Data infrastructure and enterprise security “Our customers are constantly asking how to best protect their infrastructure,” added Espen Riska, Director at Atea Norge AS, globally renowned IT infrastructure for businesses and public-sector organizations in Europe’s Nordic and Baltic regions. Espen added, “As a current partner to both Jazz Networks and Vaion, we have already been beating the drum about how a unified approach will benefit every customer.”
C-suite executives will increasingly be targeted by cyber criminals looking for ways of extorting money from large corporations. According to a new report from cyber analytics provider CyberCube, organized criminals and hackers are moving away from ‘high volume, low-value’ methods of attack to, instead, carefully selecting senior managers who have access to organizations’ bank accounts and are in a position to authorize payments. Maximum degree of compliance Criminals are also predicted to use artificial intelligence to construct algorithms that will ‘hunt’ for individual targets while deciding which of their ‘buttons to press’ in order to obtain the maximum degree of compliance. The report, Understanding Ransomware Trends, predicts that criminals will more closely calibrate their ransom demands to an organization’s financial performance, data assets and other measurables. This includes appetite and ability to pay ransoms. Aggressive organized criminal groups Overall, the report contends, the nature of ransomware attacks is changing with greater focus on organizations rather than private individuals. According to figures from cyber security specialist Symantec, the volume of cyber attacks focusing on consumers has fallen from 69% in 2016 to 19% in 2018. In hand with this, payment demands are increasing, rising to millions of dollars in some instances. The nature of ransomware attacks is changing with greater focus on organizations Oliver Brew, CyberCube’s Head of Client Services and one of the report’s authors, said: “The business model for cyber crime is evolving rapidly. Threat actor groups are conducting campaigns and adjusting their models to extract greater value from a smaller number of attacks. Recently, we’ve seen some very sophisticated and aggressive organized criminal groups conduct carefully targeted ransomware attacks, which mark a move away from the traditional high volume, low-value approach.” Forward-Looking view of cyber threats Yvette Essen, CyberCube’s Head of Content, added: “Criminals are realizing that ransom demands of millions of dollars are achievable when the target becomes a corporation rather than lots of consumers. The danger now is that the Coronavirus outbreak is creating the ideal conditions for ransomware attacks to flourish. With widespread working from home, increased internet traffic, increasing use of technology for what were face-to-face transactions, corporations must increase their vigilance.” Darren Thomson, Head of Cyber Security Strategy for CyberCube, said: “Insurers need to take a forward-looking view of cyber threats like ransomware. That’s why CyberCube is investing in research and development necessary to help the insurance industry anticipate how these attacks are evolving. It’s important to remember that the amount of ransomware attacks like Travelex which have gone public are just the tip of the iceberg.”
Antaira Technologies, globally renowned developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications, is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LNX-C800 and LNX-C800G Series. LNX-C800 and LNX-C800G series Antaira Technologies’ LNX-C800 and LNX-C800G series are 8- port industrial compact unmanaged Ethernet switches embedded with 8*10/100Tx RJ45 ports (8*10/100/1000 for LNX-C800G series). The compact form of the IP30 metal casing switch is significantly smaller than our LNX-800A and LNX-800AG series, which allows for a more versatile implementation. Devices like security cameras, wireless access points, alarms, traffic controllers, sensors and tracking devices found in traffic management, oil and gas pipelines, and weather tracking could benefit from this compact version when space is limited. These compact switches also come with Antaira Technologies’ 5-year warranty.
Coronavirus (Covid19) pandemic has hit the world unprepared for its consequences on the healthcare system and economic life. As a result, the number one priority for countries and states is to flatten the infection curve and provide them with time. Essential policies adopted to achieve this are directed at changing and controlling human daily behavior. AI-Based solutions viisights has Artificial Intelligence-based solutions to help authorities enforce those policies, help prevent the virus spread and save lives while keeping their citizens' privacy intact. Covid19 is extremely contagious, recent statistics outline 1:2 ratio, plus the majority of the people that carry the virus don’t have any symptoms. Those two factors cause the virus to spread extremely quickly. The most effective way to-date to stop Covid19 from spreading is to limit and monitor people’s movement. Social distancing, key to containing Covid19 spread Guiding the public to avoid crowding, standing close to each other, shaking hands or hugging, using public transportation, sitting in restaurants or coffee shops, has played a key role in slowing down the Covid19 infection curve. However, for reducing significantly the number of infections and control the spread, citizens are required to cooperate in full with authorities’ guidelines, which include complete lock-down or other extreme measures to control people and vehicle movement. viisights can help authorities to fight the widespread of Covid19 by making sure people and individuals using vehicles viisights can help authorities to fight the widespread of Covid19 by making sure people and individuals using vehicles are acting in public according to authorities’ guidelines that are essential for controlling the virus spread. Moreover, viisights can help maintain public safety and security in the face of continued economic constraints when necessities are harder to obtain or afford, resulting in intrusion, vandalism, robbery and violence. Identifying general behavioral pattern of individuals viisights products don’t recognize a person’s identity or the car’s license plate, but rather the general behavioral pattern of that specific person or group, and as such keep high level of privacy. Product category and sample functionality Context Crowd and Group Monitoring Crowding, crowd activity Grouping, group activity Que monitoring with proximity distance between people Carpool alert - More than 2 people getting in/out of a car Suspicious Activity Recognition Person with/ without mask Person falls / lies on the ground Person in an area for more than specified time Person to Person proximity Person walking /running Person with/ without hazmat suit Violence Recognition Vandalism People Fighting Person With Weapon Perimeter Protection Person or Vehicle is entering /exiting a pre-defined area Traffic Monitoring Abnormal road situations (Vehicle Collisions, Vehicle Stops on road/junction) Data for statistics and heat maps Prediction of possible outbreak areas Crowded Areas High Traffic or person movement areas
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change program, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programs continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessaccess to valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasize the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programs. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programs.
One of the responsibilities of construction project managers is to account for risks during the initial planning for a project and mitigate them. With all the tools, construction materials, and heavy machinery during the initial stages of a project, the construction site is a dangerous place to be at. However, this is not the only risk that project managers need to protect a site from. With plenty of valuables both physical and virtual within a construction site, it is also a prime target for theft and arson. Improving the security of construction sites It is important now more than ever that construction business owners and project managers invest in improving the security of construction sites. After all, security on construction sites is for the protection not only of valuable assets but also of workers and members of the public. Investing in adequate resources for construction site security can prevent several issues, including: Theft of expensive tools and construction equipment Cybersecurity breaches leading to loss of sensitive information such as invoice data Arson resulting in loss of life and property Vandalism of construction site property Trespassing by unauthorized parties and exposure to construction site dangers Risks of injuries that can result in litigation and legal claims Identifying security issues Having a dedicated security team in place is a good first step in bolstering a construction site’s security. They will be able to prevent theft, vandalism, and deter unauthorized personnel from entering the site. They can also identify security issues that can potentially arise and even respond quickly to accidents and other calamities should they occur. Having a dedicated security team in place is a good first step in bolstering a construction site’s security For a better implementation of construction site security measures, it is critical that business owners and managers assess an assessment of the site itself. This will help identify both internal and external risks that can affect the site’s security and guide project managers in putting systems in place to address them. Construction site security checklist To guide you, here is a sample template that you can use to form your own construction site security checklist. SECURITY COORDINATION YES NO 1. Does the site have designated security coordinators? 2. Are the security coordinators available for contact during non-business hours? 3. Does the construction site provide a means to contact the police, fire department, and other relevant authorities in case of emergencies? 4. Does the construction site have a written security plan, including procedures for specific scenarios? 5. If so, are construction site employees aware of the security plan? GENERAL MACHINERY YES NO 1. Are all machinery adequately marked? (Identification number, corporate logo, tags, etc.) 2. Have all the machinery been inventoried? (Serial number, brand, model, value, etc.) 3. Does the project have a list of the names of operators handling the machinery? 4. Are all the machinery fitted with immobilizers and tracking devices when appropriate? 5. Are all the machinery stored in a secure area with a proper surveillance system? 6. Are the keys to the machinery stored in a separate, secure area? TOOLS AND OTHER EQUIPMENT YES NO 1. Are all power tools and hand equipment marked? (Identification number, corporate logo, tags, etc.) 2. Have all power tools and hand equipment been inventoried? (Serial number, brand, model, value, etc.) 3. Are tools and equipment fitted with tags and tracking devices when appropriate? 4. Are tools and equipment stored in a secure place? INVENTORY CONTROL YES NO 1. Is there a system in place to check material inventory to ensure they are not misplaced or stolen? 2. Are there procedures in place for checking materials that go in and out of the construction site? 3. Is there a set schedule for checking materials and equipment? 4. If so, do the records show that the schedule is followed strictly? 5. Are all material suppliers arriving for delivery properly identified? (e.g license plates, driver’s license, etc) CONSTRUCTION SITE PERIMETER YES NO 1. Is there a physical barrier in place to secure the site? 2. Is the number of gates kept to a minimum? 3. Are there uniformed guards at every gate to check personnel and vehicles entering and leaving the site? 4. Are security warnings displayed prominently at all entry points? 5. Are entry points adequately secured? (With industry-grade padlocks, steel chains, etc.) 6. Is there an alarm system? 7. Is the locking system integrated with the alarm? 8. Is the site perimeter regularly inspected? 9. Are “NO TRESPASSING” signs displayed prominently along the perimeter? LIGHTING AND SURVEILLANCE YES NO 1. Is there sufficient lighting on the construction site? 2. Is there a dedicated staff member assigned to check if the lighting is working properly? 3. Is the site protected by CCTV cameras? 4. Are there signs posted on site indicating the presence of security cameras? 5. Are there motion detection lights installed on-site? INTERNAL CONTROLS YES NO 1. Is there a policy on employee theft? 2. Are employees aware of the policy? 3. Are employees required to check in and check out company properties when using them? 4. Are staff members encouraged to report suspicious activity? 5. Is there a hotline employees can call to report security lapses and breaches? SITE VISITORS YES NO 1. Are visitors checking in and out? 2. Are vehicles entering and exiting the site recorded? CYBERSECURITY YES NO 1. Are the construction site’s documents and other sensitive data stored in the cloud securely? 2. Does the company have a strong password policy? 3. Are asset-tracking data accessible online? 4. Are confidential documents and data regularly backed up? 5. Are employees well-informed about current cyberattack methods such as phishing? Security is a serious business in construction. Because of the dangers already present on your construction site, a lapse in security can have devastating effects on your business’s operations. Not only do you risk losing money in a security breach, but more importantly, you also risk endangering the lives of your site’s personnel and third parties. Business owners and project managers need to make a concerted effort to educate employees about security and double down on their best practices for protecting their sites.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernize legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-Time access control security updates Furthermore, once healthcare facilities are able to digitize all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorized staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-Level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more .Missed the rest our healthcare mini series? Read part one here and part two here.
A larger proportion of cyberattacks in the first half of 2019 can be attributed to electronic criminals (eCrime adversaries) compared to state-sponsored or unidentified attacks. CrowdStrike, a cybersecurity company that provides the CrowdStrike Falcon endpoint protection platform, observes that 61% of targeted cybersecurity campaigns in the first half of 2019 were sourced from eCrime adversaries, compared to 39% from other sources. Technology was the top vertical market targeted by cyber-attacks in the first half of the year CrowdStrike Falcon Overwatch platform The eCrime portion more than doubled since 2018, reflecting an escalation of criminal players in search of more and larger payouts. The trend is among the information presented in CrowdStrike’s Overwatch 2019 Mid-Year Report: Observations from the Front Lines of Threat Hunting. Falcon OverWatch is the CrowdStrike-managed threat hunting service built on the CrowdStrike Falcon platform. Technology was the top vertical market targeted by cyber-attacks in the first half of the year, followed by telecommunications and non-governmental organizations (including think tanks). Other targets (in decreasing order) were retail, financial, manufacturing, transportation and logistics, gaming, entertainment and engineering. Hospitality disappeared from the list so far this year, although Crowdstrike expects an increase in intrusions aimed at the hospitality industry to put it back in the top 10 by the end of the year. Intrusion adversaries In terms of intrusion adversaries, the top players so far in 2019 are Spiders (eCrime) and Pandas (China). Regarding initial access techniques, the most common remain, in order of prevalence, valid accounts, spear-phishing and exploitation of public-facing applications. 2009 is proving to be an active year with a significant increase in eCrime and the inter-relationships occurring across different groups as they strengthen their organizations, forge alliances and expand their footprint. Need for a proactive security posture Basic hygiene form the foundation for a strong cybersecurity program Many of the techniques used by eCrime actors are easily defensible through strong security products and a proactive security posture, says CrowdStrike, which recommends the following measures to help maintain strong defense in 2019: Be attentive to basic hygiene such as user awareness, asset and vulnerability management, and secure configurations, which form the foundation for a strong cybersecurity program. User awareness programs can combat the continued threat of phishing and related social engineering techniques. Asset management and software inventory ensures that an organization understands it footprint and exposure. Vulnerability and patch management can verify that known vulnerabilities and insecure configurations are identified, prioritized and remediated. Multifactor authentication (MFA) should be established for all users because today's attackers are adept at accessing and using valid credentials. A robust privilege access management process will limit the damage adversaries can do if they get in and reduce the likelihood of later movement. Implementing password protection prevents disabling or uninstalling endpoint protection that provides critical prevention and visibility for defenders. Countering sophisticated cyber attacks As sophisticated attacks continue to evolve, enterprises face more than a "malware problem" As sophisticated attacks continue to evolve, enterprises face more than a "malware problem." Defenders should look for early warning signs that an attack may be underway, such as code execution, persistence, stealth, command control and lateral movement within a network. Contextual and behavioral analysis, when delivered in real time via machine learning and artificial intelligence, effectively detects and prevents attacks that conventional "defense-in-depth" technologies cannot address. "1-10-60 rule" in combating advanced cyber threats CrowdStrike recommends that organizations pursue a "1-10-60 rule" in order to effectively combat sophisticated cyberthreats. That is, they should seek to detect intrusions in under one minute; to perform a full investigation in under 10 minutes, and to eradicate the adversary from the environment in under 60 minutes. A source at CrowdStrike said "Meeting this challenge requires investment in deep visibility, as well as automated analysis and remediation tools across the enterprise, reducing friction and enabling responders to understand threats and take fast, decisive action."
3xLOGIC, Inc., a globally renowned provider of integrated, intelligent security solutions, has announced that Harvest Health & Recreation Inc. (“Harvest”) continues to roll out 3xLOGIC infinias access control to its fast-growing number of locations across the United States. Dem360, LLC has been an integral partner for this project, providing their managed IT, network engineering, and security system design expertise. Multi-state cannabis operator Headquartered in Tempe, Arizona, USA, Harvest Health & Recreation Inc. is a multi-state cannabis operator (MSO) and vertically integrated cannabis company. Subject to completion of announced acquisitions, Harvest will have one of the largest footprints in the US. Since 2011, the company has been committed to expanding its Harvest House of Cannabis retail and wholesale presence throughout the U.S., acquiring, creating, and growing brands for patients and consumers nationally and continuing toward a path of profitable growth. Enterprise access control solution Harvest is pioneering this industry and looking to scale into an enterprise environment" “We want to be able to control who goes where, regardless of the facility,” explained T.J. Buskirk, National Security Director for Harvest Health & Recreation. He adds, “For example, why might an employee be in an area they shouldn’t? Our access control allows us to track who, when, and where. I like the fact that the system grants access to someone for a particular door, and then after hours, that access is shut down—that level of control.” Gary House is an IT Architect with Dem360, who has been on the project working closely with Harvest since the beginning. “Harvest is pioneering this industry and looking to scale into an enterprise environment. Harvest has been studying and standardizing on various technologies. I did my own research of access control systems, and I love the infinias IDC controllers.” 3xLOGIC infinias access control Harvest has standardized on 3xLOGIC infinias access control and has separate video surveillance and alarm systems. Buskirk said, “In this business, we have to be sensitive to all the different state rules and regulations. I’ve got to have system interoperability from state to state, as well as personnel trackability and clear audit trails for the regulators.” Upgrade to infinias Corporate Edition To date, Dem360 has installed infinias access control in 30 facilities, controlling over 400 doors. The next big milestones in this system rollout is to convert all current facilities to the infinias Corporate Edition, install Corporate going forward, and migrate all managed doors to a scalable data center with a single database built on redundant, fault-tolerant architecture. Harvest has also adopted the badge making feature within the infinias platform to print and manage company ID cards. Security Operations Center With a growth trajectory like Harvest’s, reliability and scalability are considered as key With a growth trajectory like Harvest’s, reliability and scalability are considered as key. Eventually, Harvest’s Security Operations Center will have full visibility across every facility 24/7 throughout the year. “We have a great working relationship with Gary and Dem360, and that makes everybody’s job a lot easier,” said Buskirk. Efficient access management system He adds, “We have an incredible magnitude of the different directions we can go with this business. However, at the end of the day, we have to design our access management for our employees, patients, and customers. Whatever the facility and the need, we must ensure highly productive workflows, while staying firmly within each state’s guidelines.” He further said, “Infinias gives us what we need without impediments. We’ve never had to ‘fork lift’ anything. This system adapts and it gives us flexibility and scalability, we have one door at this facility and hundreds of doors at another.” Flexible, scalable access control Buskirk said, “From the beginning, the infinias access control system has been able to react to the Harvest environment of change and fast-paced growth. We can manage access for different groups in completely different ways, and I love that I can turn off a badge at a moment’s notice.” He concludes, “The infinias system is very user-friendly, that was one of our key demands. It’s meeting all our needs, and we are able to manage our facilities remotely. Its robust features and benefits meet the varying demands of the dynamic, high-growth Harvest environment and our vision for the future.”
Rishikul Vidyapeeth is a reputed residential school built across 43 acres of land located in Sonepat, Haryana with separate hostels facilities. It is one of the best CBSE boarding schools in Delhi/NCR with international faculty and tie-ups. Rishikul Vidyapeeth is an eco-friendly residential school, housed in well-defined infrastructure rich with architectural extras including well-furnished and well-ventilated modern buildings, smart classrooms and sophisticated labs to suffice the needs of 21st-century learners and educators. The school is big on quality teaching and on helping the students to reach their full potential. Managing attendance data Rishikul Vidyapeeth has its presence in three places - Sonepat, Jagos Bhaghpat and Alipur. Managing the attendance data of various locations from a central place was a major challenge for the organization. The system they used was inefficient to address their challenges. The officials were looking for a comprehensive time-attendance solution for efficiently tracking the movement of its staff situated at different locations from a central place. Moreover, they required an effective solution that would notify on exceptions - missing in/out punch, attendance summary, etc. Fingerprint-based time-attendance solution Matrix has installed a total of 10 fingerprint-based time-attendance terminals at three different locations After a comprehensive discussion with their team, Matrix has proposed a comprehensive time-attendance solution for managing their attendance and tracking their staff movement from a centralized location. Matrix has installed a total of 10 fingerprint-based time-attendance terminals at three different locations. These devices are connected via LAN with the COSEC CENTRA server installed at Rishikul Vidyapeeth, Sonepat. COSEC CENTRA server integrated with SMS web server Moreover, with the help of the solution, they could generate customized reports in different file formats. Matrix has integrated COSEC CENTRA server with an SMS web server for instant notification on exceptions. With that, the users were instantly updated on occurrences of such events. Results include: Efficient time-attendance management Improved accuracy in attendance calculation with SMS notification Proper user database management Centralized monitoring and control Increased productivity Customized reports as and when required Products and solutions offered: COSEC DOOR FOT - Optical fingerprint and card-based time-attendance terminal COSEC LE PLATFORM - COSEC software platform for up to 1000 users COSEC LE TAM - Time-attendance and leave management module for COSEC software platform
Haier Group, China’s renowned home appliance manufacturer, has built a new industrial park in Russia to cope with the growing demand in Europe. Covering a total area of about 124.9 hectares, the new site is located in Naberezhnye Chelny, an important industrial city in Tatarstan, Russia. Intelligent system With the gradual completion of its factories in the industrial park, Haier is looking for an intelligent system to realize multiple tasks within the whole industrial park. Firstly, the smart system should be able to prevent theft and timely detect people climbing over the perimeter fence. Secondly, the intelligent security system should provide comprehensive monitoring in the whole industrial park and inside the factory unit, which includes, monitoring of production line and employees’ smoking behavior during working hours at office areas, efficient employee attendance management, vehicle identification at the entrance and exit areas of the park, and the overall management of all the devices, data report outputs, and other facilities at the industrial park. Total smart solution The Dahua Russia team designed a complete smart solution incorporating AI cameras, perimeter cameras, ANPR system The Dahua Russia team designed a complete smart solution incorporating AI cameras, perimeter cameras, ANPR system, access control, time attendance system, face recognition barrier, DSS PRO platform and EVS storage for Haier’s industrial park. Notably, all of the devices were integrated in one central management platform, making it easier for operators to control and manage the system. In addition, the intelligent system also supports further device upgrade based on customer’s future plan for the next several years. Dahua 5MP WDR IR Bullet AI Network Cameras To help Haier solve the first problem, Dahua 5MP WDR IR Bullet AI Network Cameras were chosen to safeguard the perimeter of the Haier industrial park. Featuring active deterrence, the cameras are able to proactively warn intruders to leave before users take action. Once an intrusion is detected, a white light will turn on, accompanied by a buzzer to warn off the intruder. Additionally, its AI-powered perimeter protection function can greatly reduce false alarms caused by irrelevant objects. AI-powered perimeter protection The combination of advanced AI analytics and real-time alerts to desktop or mobile clients reduces system requirements and resources, thereby improving the efficiency of the surveillance system. The office areas and the interior of the washing machine factory are covered with Dahua 4MP WDR IR Dome Network Cameras, while public areas are monitored by 2MP 25x Starlight IR PTZ Network Cameras. As a member of Dahua Eco-savvy product family, the Dahua 4MP WDR IR Dome Network Cameras adopt upgraded H.265 encoding technology to provide starlight, Smart IR technology, as well as intelligent image analysis techniques. It saves bandwidth and storage, with energy-saving design to enhance monitoring performance of the system. Intelligent Video System analytic algorithm As for public areas, Dahua 2MP 25x Starlight IR PTZ Network Cameras have powerful optical zoom With built-in Intelligent Video System (IVS) analytic algorithm, these dome cameras also support intelligent functions to monitor a scene for tripwire violations, intrusion detection, and abandoned or missing objects. In the future, it can respond quickly and accurately to events in the monitored areas. As for public areas, Dahua 2MP 25x Starlight IR PTZ Network Cameras have powerful optical zoom and accurate pan/tilt/zoom performance that can provide a large monitoring range and rich details. Through the latest Starlight technology, the cameras can achieve excellent low-light performance. In addition, these cameras are equipped with smooth control, high quality image and good protection, which meet the requirements of most industrial parks. Dahua face recognition barriers Dahua face recognition barriers were deployed at the entrance of the Haier industrial park and its office building, allowing quick and touchless passage of registered Haier employees without using employee cards or other identification documents. The system is based on a deep learning algorithm powered by AI, which compares facial images captured by the camera with those stored in the library to verify a person’s identity and grant permission. Access will be denied for unregistered people. 2 Megapixel Full HD AI Access ANPR cameras The industrial park’s entrance and exit use 2 Megapixel Full HD AI Access ANPR cameras to identify entering and exiting vehicles. Boasting a capture rate of over 99%, the cameras can automatically recognize the number plate of a vehicle in low speed less than 40 kmph, and capture vehicle data such as vehicle direction, vehicle size and vehicle color detection (in daytime) based on deep learning algorithm. Aside from these capabilities, the cameras can also control the barrier according to the whitelist set by users and let registered vehicles pass without stopping. Dahua DSS PRO management platform The Dahua DSS PRO management platform integrates all cameras and the stated devices At the management center, all the information collected by font-end cameras will be transferred to a 16-HDD Enterprise Video Storage. With Seagate HDD, the device offers unparalleled capacity performance for users to store massive videos and obtain evidence when needed. The Dahua DSS PRO management platform integrates all cameras and the aforementioned devices, allowing operators to easily control and manage the system. Smart industrial park solution Dahua Technology’s smart industrial park solution has assisted Haier in creating a modern intelligent industrial park in Russia. The up-to-date Dahua AI equipment provides Haier a long-term smart security system with upgraded security level and enhanced management efficiency. “The traditional personnel management system requires manual registering of employee information and cards to enter and exit office areas, which is inefficient and difficult to manage, and often high in cost,” said Zhao Shengbo, Regional Director of Dahua CIS. Upgrading access verification system Zhao adds, “Upgrading the access verification system is crucial for modern companies like Haier in order to increase the security level of its industrial park and office building. We look forward to our future cooperation.” “During the requirement discussion, solution design, and engineering survey, Dahua shows professionalism and excellent communication skills. Haier is satisfied with the first step cooperation and looking forward to the second step of the project,” said Liu Wei, Overseas Regional Project Manager of Haier Group.
Synectics has secured a competitive public space contract to provide integrated surveillance solutions for a number of prestigious sites across London, the UK's capital. Comprising government properties, heritage sites, and high-profile public event venues, the contract builds on Synectics' reputation as the surveillance solution of choice for London's public space protection. The successful award can also be attributed to the company's ability to deliver tailored, open-architecture solutions incorporating integration to third-party systems such as access control and intruder detection. Control software platform Synectics, which supports more than 70% of London's boroughs, as well as major retail stores and stadiums across the city, will upgrade all sites to its Synergy 3 command and control software platform. Each of these sites falls under our specialism in public space" While the specific locations cannot be named, the sites include listed buildings, high-security 'closed-to-public' assets, and venues with high levels of public footfall. Martin Bonfield, UK Sales Manager, at Synectics commented: "Each of these sites falls under our specializm in public space, but individually they each have unique requirements. That plays to our strengths in terms of the flexible technologies we offer and the broader sector experience we hold, from gaming and critical national infrastructure to city surveillance, retail, and public transport.” Superior incident management "These credentials illustrate our capability at developing and deploying surveillance solutions for projects that must balance high levels of public access with stringent security conventions and superior incident management. Our professional services team is also highly skilled at migrating systems under live operating conditions, which was a specification of the comprehensive brief." "One of the locations included in this tender process was an existing Synectics site operating a legacy Synergy product. The trust in our Synergy solution by the customer meant that satisfaction with the system reliability and user experience was high." Multi-Site monitoring The Synergy 3 solution deployed at each site will enable the control room teams to monitor existing cameras The Synergy 3 solution deployed at each site will enable the control room teams to monitor existing cameras — totaling around 500 across the sites — alongside integrated third-party systems such as access control and intruder detection. Linking all locations for eventual multi-site monitoring was a crucial component of the project brief, ensuring the sites continue to support future needs and incorporate the latest camera technology and system features as required. Martin explained: "Synergy 3's power and scalability in terms of integrations and future system consolidation presented a powerful proposition to our customers, combined with our wider London portfolio of projects, partnerships, and supporting closer collaboration with the Metropolitan Police."
Intelligent LiDAR sensor technology from OPTEX, a globally renowned sensor manufacturer, is helping to protect the Belfast Call Centre premises and employees of a Fortune 500 company. Redscan laser sensor The Redscan laser sensor, which was installed by ZEST Fire & Security, a fire and security systems specialist, was required by the company to increase security in private areas of the facility only accessible to authorized personnel. This area, however, is only separated from the rest of the office space by partition walls which leave a gap between the wall and ceiling. OPTEX LiDAR creates a ‘virtual’ detection area that cannot be seen by the naked eye and that can be easily adjusted to the site requirement using the configuration software. In this instance, the REDSCAN RLS-2020S creates a virtual wall between the top of the partition wall and the ceiling of the building, and monitors movement or objects being thrown from one side to the other. OPTEX LiDAR technology OPTEX LiDARs work by analyzing the speed, size and distance of the objects detected OPTEX LiDARs work by analyzing the speed, size and distance of the objects detected, meaning they track the objects within the detection area and understand the ratio size/distance of the object. This provides the ability to accurately detect a specific size of object either at a distance or close up. In the event of any movement being detected, a security alarm is raised, and alerts are immediately sent to the 24-hour on-site security team. Masaya Kida, Managing Director of OPTEX EMEA, says “OPTEX’s LiDAR technology delivers the greatest accuracy of detection. We are constantly working to improve our technology to provide the highest quality sensing solutions.” REDSCAN RLS-2020 series Masaya adds, “Thanks to the high sensitivity and high-speed detection of the Redscan LiDAR sensor, it is able to detect a thrown object as small as a USB stick. The exact point of detection can also be mapped and associated with the cameras monitoring this area.” Justin Doherty, Director at Zest Fire & Security, said, “OPTEX provided us with great support and service throughout. The client was very pleased with the speed and simplicity of the installation, and is very happy with the performance of this new solution.” REDSCAN RLS-2020 series provides 95° detection and either 20x20m or 30m radius detection range and PoE connectivity.
Protecting assets and people has always been a top priority for Kirkland’s, a global home décor retailer. With over 400 stores in 37 states, Kirkland’s is a go-to spot for a broad selection of distinctive merchandise: art, mirrors, candles, lamps, frames, accent rugs, furniture and more. When they evaluated their security solutions in 2016, they determined they needed to upgrade the analog video surveillance systems in use at their existing locations and plan for new stores. Analog video surveillance cameras Management wanted a camera that provided a clear picture, while minimizing bandwidth usage Saraya Charlton, Kirkland’s Loss Prevention Investigator, said the analog video surveillance cameras they had in place were acceptable, but they desired cameras with wider coverage and better resolution. The department was also frustrated with the amount of time it took to investigate incidents for loss prevention and personal injury claims. Each time they were called to investigate an incident – vandalism, theft, employee misconduct, a slip and fall, or a cut from broken merchandise – each individual store had to extract the footage from the analog DVR at that location and send it to loss prevention at Kirkland’s headquarters. Charlton said Kirkland’s sought an IP-based solution that could be accessed remotely, that would make the loss prevention investigation process more efficient and would provide additional benefits. Management wanted a camera that provided a clear picture, while minimizing bandwidth usage and had analytics capability. IP video surveillance solution Working with several systems integrators, Kirkland’s chose to deploy an IP video surveillance solution consisting of Hanwha video surveillance cameras managed by Salient enterprise Video Management Software (VMS). The first phase of the security upgrade has included the deployment of 1,800 Hanwha Wisenet X series XNV-6011 2 megapixel HD dome cameras and Wisenet Lite vandal-resistant dome cameras at 200 Kirkland’s locations, as well as the distribution center and the e-commerce building. As new stores are built by this growing retailer, they will also include the Hanwha-Salient security solution. They expect to have a full migration to IP at all locations by 2021. Kirkland’s chose to deploy an IP video surveillance solution consisting of Hanwha video surveillance cameras managed by Salient enterprise VMS Perfect fit for The retail environment The wide-angle 2.8 mm lens captures a 112-degree horizontal field of view, for a retailer that means doing more with less Each Kirkland’s location is outfitted with approximately eight cameras that are positioned to capture the entrance, the sales floor and the back of house operations. Charlton said Hanwha’s cameras provide the most comprehensive view of the store possible. “The wide-angle capability – as well as the quality of the camera – is really what sold us on Hanwha,” said Charlton. “We are getting the best views possible and they are allowing us to see the entire sales floor which is exactly what we wanted and needed.” Hanwha’s Wisenet X series of cameras is a perfect fit for the retail environment. The wide-angle 2.8 mm lens captures a 112-degree horizontal field of view, for a retailer that means doing more with less. Pulling recorded video Charlton said the Hanwha cameras are particularly useful at store entrances because, thanks to the WDR feature, video images are not affected by the bright sunlight that often shines through the windows and they can still see faces clearly. And because many of Hanwha’s cameras offer license free analytics, Kirkland’s will begin exploring that capability in the future to gain information on people counting, heat mapping and dwell time. They also appreciate being able to use Hanwha’s Device Manager to troubleshoot The Hanwha-Salient solution has improved Kirkland’s loss prevention investigation efficiency since the team is able to pull recorded video from any camera via the Salient VMS rather than wait for information to be extracted from an analog DVR. They also appreciate being able to use Hanwha’s Device Manager to troubleshoot and resolve any camera issues remotely first rather than unnecessarily sending out a service technician. Video surveillance and security bandwidth In addition to offering quality images, improved field of view and more efficient operations, the Hanwha solution has also helped Kirkland’s conserve valuable bandwidth with Hanwha WiseStream II compression technology, said Charlton. WiseStream II dynamically controls encoding, balancing quality and compression according to movement of the image. Combined with H.265 compression, bandwidth efficiency can be improved by up to 75 percent compared to current H.264 technology. “We share our video surveillance and security bandwidth with our Point of Sale system and we don’t ever want to take away from the bandwidth of POS transactions or impact the speed at which they go through,” said Charlton. “Hanwha’s Wisestream compression technology fits our business model and along with Salient helps preserve and efficiently manage bandwidth. It’s really helpful to have a camera that’s smart enough to be able to tweak and regulate itself.”
Round table discussion
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload