Ava Group (AVA), a provider of security risk management services and technology will be showcasing its portfolio of security solutions at Intersec Dubai 2019, stand S3-C48. Intersec Dubai features a rich selection of exhibitors in Security, Safety & Fire Protection, attracting visitors from the Middle East, Africa, the Indian subcontinent and well beyond. Ava Group will be presenting the latest exciting solutions from its technology division - which incorporates Future Fibre Technologies (F...
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all o...
Milestone Systems, globally-renowned open platform company in networked VMS, released its Device Pack 10.0a in October this year and now supports the MOBOTIX MOVE camera series. MOBOTIX MOVE is an independent product line providing customers everything from a single source. “MOVE” stands for the use of mechanically moving parts in the cameras, meaning that MOBOTIX have parted with their previous product policy of only offering decentralized video systems on the market. The MOBOTIX M...
Terrorism by unmanned aircraft is a growing threat. Using drones to smuggle contraband into prisons is a current trend. While many countries are deploying UAVs in combat, the UAS technology is getting easier and easier to acquire by the general public and ill-intentioned groups. Most of current security systems set up in critical infrastructures are not sufficient to guarantee an appropriate level of protection. Over the past several months, more and more drones have been flying over Florida's p...
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this p...
Live Earth, an advanced data visualization platform for directing and monitoring complex business and security operations, has partnered with HERE, the Open Location Platform that provides advanced location intelligence, to improve operations and safety measures across indoor venues. Through this partnership, organizations will be able to integrate HERE Venue’s detailed floor plans with a variety of assets that include sensors, door access controls and security cameras. The ability to mar...
Check Point announces a technology integration with Amazon Web Services (AWS) Security Hub, a unified security service, which centralises view and management for security alerts. This integration, together with the addition of Dome9 to the CloudGuard portfolio, following its recent acquisition by Check Point, allows enterprises to access multi-layered security and nearly continuous compliance capabilities from the central console of AWS Security Hub. By leveraging AWS Security Hub, Check Point can provide a nearly seamless experience to customers in providing additional protection to their AWS environments against advanced cyber-threats in real time and mitigating compliance risks at any scale. Enhanced Threat Prevention CloudGuard IaaS adds contextual information such as asset tags, security groups and availability zones to dynamically update security policies AWS Security Hub provides users with a comprehensive view of their high-priority security alerts and compliance status by aggregating, organizing, and prioritising alerts, or findings, from multiple AWS services, such as Amazon GuardDuty, Amazon Inspector, and Amazon Macie as well as from AWS Partner Network (APN) security solutions. The findings are then visually summarised on integrated dashboards with actionable graphs and tables. The Check Point CloudGuard solution natively integrates with AWS Security Hub to provide customers with better visibility into gaps in their security and compliance posture, and context-rich security intelligence for enhanced threat prevention. CloudGuard IaaS adds contextual information such as asset tags, security groups and availability zones to dynamically update security policies and provide AWS Security Hub with visibility into threat alerts based on deep event correlation and rule-based cloud intrusion detection. To complete the picture, customers leveraging the CloudGuard Dome9 solution can analyze and respond to events triggered by its sophisticated nearly continuous compliance and governance framework. Continuous Network Monitoring Enterprises using it benefit from powerful features that prevent 5th generation cyber-attacks in their hybrid environments. These features include: Threat prevention of both North-South and East-West cyber-attacks based on contextual awareness and attribution of network traffic to cloud-native ephemeral services Real-time alerts on network vulnerabilities, with nearly continuous network monitoring and alerting based on easily customisable policies Comprehensive visibility into cloud assets and security configurations Nearly continuous compliance monitoring and enforcement of security posture Fully integrated security capabilities, including firewall, IPS, application control, IPsec VPN, antivirus, anti-bot and more Unified management of security policies across hybrid environments (datacenter, private and public clouds) Manage Cloud Environments Check Point has been at the forefront of cloud security automation solutions that have built deep integrations with a broad range of AWS security services" “AWS is a leader among cloud services providers, delivering powerful security capabilities that help enterprises deploy and manage cloud environments with enhanced security features at scale,” says Itai Greenberg, Vice President of Product Management at Check Point Security. “Check Point has been at the forefront of cloud security automation solutions that have built deep integrations with a broad range of AWS security services. We are privileged to offer integration with AWS Security Hub to deliver comprehensive visibility into ongoing security and compliance risks, and end-to-end workflows to mitigate risks.” “We are happy to have Check Point as a launch APN Partner integrating the CloudGuard IaaS solution with AWS Security Hub,” said Dan Plastina, Vice President, Security Services, Amazon Web Services, Inc. “Check Point offers advanced threat prevention capabilities to AWS customers. The integration with support for AWS Security Hub makes it even easier for our shared customers to access and act on their cloud security insights.”
Moxa Inc., a provider of industrial communications and networking, and Trend Micro Incorporated, a provider cybersecurity solutions, announce they have executed a letter of intent relating to the formation of a joint-venture corporation-TXOne Networks, which will focus on the security needs present in the Industrial Internet of Things (IIoT) environments, including smart manufacturing, smart city, smart energy and more. Historically, Information Technology (IT) and Operations Technology (OT) have operated within industrial organizations as isolated and independent networks with different teams, objectives and requirements. Securing The Entire Ecosystem TXOne Networks combines these strengths and responds to the growing security needs of industry Organizations are teeming with machinery and devices that were not originally designed for connectivity to the corporate network, which means they often lack the ability to be easily updated or patched for security measures. There is a critical need to secure these devices, identify clear ongoing ownership, and to provide a holistic view across the broadening attack surface within enterprises. Trend Micro, majority owner in TXOne Networks, identified the potential challenges faced by IIoT stakeholders early on and has been working on several fronts to secure the entire ecosystem, from data center to device. Moxa Inc. brings more than 30 years of experience in industrial networking and protocol expertise. TXOne Networks combines these strengths and responds to the growing security needs of industry, such as smart factories that require a unified solution for delivering deeper visibility into both devices and protocols. Partnering With Moxa These complicated environments are made up of multiple layers requiring protection that sits in and between IT and OT. The responsibility for the security of these combined layers is traditionally unclear. "I'm excited about this venture and how Trend Micro continues to take diverse yet focused growth steps that allow our teams to remain concentrated on core strengths while giving room to better serve customers and advance into new markets," said Eva Chen, Chief Executive Officer for Trend Micro. "Partnering with Moxa will combine more than 60 years of expertise to accelerate our ability to view and secure the extended enterprise including these important but often overlooked OT environments." Reinforced Business Model Trend Micro brings IT channel partner strength while Moxa brings OT channel partner strength TXOne Networks will build security gateways, endpoint agents and network segmentation to secure, control, and provide visibility of operational technology and equipment. Unlike some solutions focused solely on protecting assets nearest to the IT layer via detection, TXOne Networks has expertise closest to the OT layer and will provide proactive, timely and easily implemented solutions to secure the Industrial Control Systems (ICS) world. In addition to investing intellectual capital, funds and dedicated headcount, each parent company lends complementary channel expertise. For its part, Trend Micro brings IT channel partner strength while Moxa brings OT channel partner strength. Together these reinforce the business model and geographic territory targets. Reducing Operational Risk TXOne Networks will be led by Dr. Terence Liu, Trend Micro Vice President and former CEO of Broadweb. With experience building both products and teams, Dr. Liu will bring nearly 20 years of security product expertise to this new team. "With this joint venture, Moxa and Trend Micro will position TXOne Networks as a global leader in the industry to create effective IIoT security solutions that help ensure that IIoT applications and critical infrastructures are secure," said Andy Cheng, Strategic Business Unit President for Moxa Inc. "Industrial automation customers around the globe will be able to reap the benefits of having a holistic OT/IT security solution to protect assets and reduce operational risk." Raising Security Levels TXOne solutions also will enable OT customers to optimize network infrastructure for more IIoT opportunities TXOne solutions also will enable OT customers to optimize network infrastructure for more IIoT opportunities. They will benefit from Moxa's expertise in building reliable networks to bring more legacy and disparate networks into on industry-grade Ethernet backbone and raising the security level of the entire network's communication to help drive nonstop productivity and cost reduction. Professional services will also be provided including security risk assessment, security breach response, and access to threat intelligence from Trend Micro Research and its Zero Day Initiative (ZDI). "In a world where attacks are getting more persistent and sophisticated, while organizations are struggling with skills shortage and alert fatigue, these two groups are joining forces to successfully secure enterprises around the globe," said Dr. Terence Liu, General Manager, TXOne Networks. "I am eager to pursue the opportunities and challenges this team will tackle in the months and years to come."
Reading-based IT security company, VoiceVault Ltd. specializing in voice biometrics has entered administration after experiencing future funding issues. Its business and assets are now up for sale. Voice Biometrics Specialist Firm VoiceAuth - Complete Voice Biometric SaaS platform supporting both cloud and on-premise deployment Voicevault Limited entered administration on 8 October 2018, with Andrew Stephen McGill & Gilbert John Lemon of Smith & Williamson appointed joint administrators. The company has developed and operates a full suite of IT security products to include: VoiceAuth - Complete Voice Biometric SaaS platform supporting both cloud and on-premise deployment; VoiceSign – Custom IVR-based e-signature product designed for healthcare / insurance applications; VIM – Identity management system consisting of voice authorized password reset, out-of-bound authorization and time & attendance tracking; and ViGo – Mobile authentication system supporting iOS and Android The company has a portfolio of ongoing service contracts and worldwide patents and trademarks. Fulfilling Growth Aspirations Andrew McGill said, "The company has been historically funded by significant equity investment and now requires further working capital to move to the next stage of its development and fulfill its growth aspirations. Existing shareholders were unwilling to provide the future funding required without additional third-party investment, which was not forthcoming, and the director has taken steps to place the company into administration to protect the underlying business. We have retained the small team of three employees to maintain the platform and allow the business to continue operating while we seek interested parties to acquire the business and assets of the company.” He adds, "We have already identified a list of potential interested parties in the sector and we are directly approaching possible buyers, advertising on a business sale platform plus using word-of-mouth marketing through our contacts in the technology sector."
ESA is proud to recognize the distinguished group of companies supporting the industry in 2018 through its Executive Strategic Partners program. Executive Strategic Partners Program This program allows us to partner with key manufacturers and service providers that are looking to make a significant impact on the industry" “This program allows us to partner with key manufacturers and service providers that are looking to make a significant impact on the industry,” says Merlin Guilbeau, CEO of ESA. “There are key factors we look for in our strategic partners: They must deliver a quality, reputable product that allows our members to better run and grow their businesses. Each one of these players not only check that box, but they also make a significant impact on the installation, integration and monitoring channel — by investing in the association to support vital programming.” As a non-profit organization, ESA invests in and constantly seeks new ways to benefit the association’s members and the industry. The Executive Strategic Partners program is one way for vendor companies to give back and demonstrate their alignment with ESA’s core values by supporting its efforts to move the industry forward. Interlogix, Diamond Level Sponsor For ESA Leading the way as the exclusive 2018 Diamond Level sponsor is Interlogix. “Interlogix is proud to be a long-standing sponsor of ESA’s Executive Strategic Partners program. As a Diamond sponsor of this initiative, we are committed to investing in the evolution and growth of the security industry,” said Warren Hill, Vice President of Partner Solutions, Interlogix. Honeywell, Platinum Level Sponsor For ESA From education to advocacy programs, the ESA is helping to strengthen and advance the security industry" The ESP program’s sole 2018 Platinum Level sponsor is Honeywell. “As our business prepares to spin off from Honeywell into an independent security, smart home and distribution company, we’re excited about the future and the opportunity to deliver solutions our customers want through our unparalleled global network of 100,000 professional dealers,” said Alice DeBiasio, vice president and general manager, Honeywell Homes. “As a strategic partner with the ESA for more than 10 years, we appreciate the work they do to support our industry. From education to advocacy programs, the ESA is helping to strengthen and advance the security industry.” Axis And Telguard, Gold Level Sponsors The 2018 Gold Level sponsors are Axis Communications and Telguard. “2018 marks our seventh year as a Gold Level Executive Strategic Partner with ESA. We are just as excited to show our support of ESA’s commitment to investing in the future of our industry today as we were back in 2011,” said Shawn Welsh, SVP, Product Line Management and Marketing, Telguard. “We’re proud to support ESA and help their members expand their business potential,” said Mike King, Hosted Video Manager, Axis Communications, Inc. “The complexities of protecting people, property and assets require security integrators to offer innovative and comprehensive solutions, from video surveillance to access control to managed services. We look forward to continued collaboration with ESA and supporting the industry’s advancement.” Altronix, Anixter And SARPG, Silver Level Sponsors The 2018 Silver Level sponsors are Altronix, Anixter and Security America Risk Purchasing Group (SARPG) The 2018 Silver Level sponsors are Altronix, Anixter and Security America Risk Purchasing Group (SARPG). "We chose to partner with ESA for some of our marketing initiatives, because we know our investment will continue to support our industry into the future,” said Alan Forman, President, Altronix. “The association brings great value and professionalism to our industry and its members through fostering education, improving government relations and driving industry standards." “We understand that our insurance is designed specifically to fit the needs of this industry,” says Michael Keegan, president of SARPG. “As such, we always look for ways to support those dealers and integrators that comprise the industry — our executive strategic partnership with ESA is one way we accomplish this.” Talent Acquisition In Electronic Security Industry The significant financial investment of these companies helps further ESA initiatives to recruit new talent for the industry, provide legislative updates, conduct research and be the voice of the electronic security and life safety industry. In return for their financial support, Executive Strategic Partners gain access to various marketing opportunities and a platform for connecting with members, prospects and decision makers through ESA's extensive network of highly qualified installers, dealers and integrators.
ExtraHop, global provider of analytics for security and performance management, has announced the availability of Reveal(x) for Microsoft Azure. With Reveal(x) for Microsoft Azure, enterprise security and cloud operations teams now have enterprise-grade network traffic analysis (NTA) that uses advanced machine learning to instantly surface high-risk threats and automate response across the entire hybrid enterprise. With this latest release, Reveal(x) is also available for remote site deployments, extending visibility from the data center to the branch office to the cloud. Reveal(x) Network Traffic Analysis (NTA) Solution Reveal(x) for Microsoft Azure is available immediately in the Microsoft Azure Marketplace, an online store providing applications and services for use on Azure. While cloud platforms offer incredible scale and agility, they also expand the enterprise attack surface, creating new opportunities for malicious actors to exploit misconfigurations, access sensitive data, and compromise applications. Reveal(x) for Microsoft Azure provides an enterprise-grade NTA solution that delivers threat detection and investigation purpose-built for the cloud, extending the visibility and response capabilities of the enterprise security operations center (SOC) to encompass cloud infrastructure. Reveal(x) automatically discovers and classifies everything traversing the Azure environment, including rogue compute instances, to deliver complete real-time visibility at cloud scale. That data is correlated with event data from Azure Security Center to create a unified analytics and investigation source for SOC teams that provides always-on, always-everywhere visibility across the hybrid attack surface. Microsoft Azure Virtual Network Tap (Azure vTAP) The Reveal(x) network traffic analysis platform integrates with the Microsoft Azure Virtual Network Tap to analyze cloud-based application payloads at scale The Reveal(x) network traffic analysis platform integrates with the Microsoft Azure Virtual Network Tap to analyze cloud-based application payloads at scale. Announced at Microsoft Ignite, the Azure Virtual Network Tap (Azure vTAP) is the industry’s first virtual network tap offered by a public cloud provider that enables out-of-band monitoring of all network traffic. ExtraHop has partnered with Microsoft Azure to natively integrate Reveal(x) with the Azure Virtual Network Tap to deliver a completely passive, agentless approach to network traffic analysis in the cloud. With the introduction of Reveal(x) for Microsoft Azure, enterprises can effectively address shared responsibility models and prioritize use of security resources based on critical assets and risk, delivering complete visibility across each dimension of enterprise responsibility including: Applications & Content: Integration with Azure Security Center events enriches network-based threat detection with system-level activity (disabled logging, suspicious processes, suspect file execution), while real-time TLS 1.3 decode and transaction payload analysis spots threats and evaluates risk, even within PFS deployments. Inventory & Configuration: Automatic discovery and classification of all cloud assets gives cloud and security teams up-to-the-second understanding of the attack surface, including the ability to track rogue instances – even when logging is disabled - and instantly flag exposed resources. Data Access: Full support for Azure SQL Database and Azure Blob Storage protocols means visibility into behavior, not just activity, while machine learning at the application layer provides immediate detection of exfiltration activity. Identity & Access Management: Integration with Azure Activity Monitoring allows granular tracking of privilege manipulation, while analysis and machine learning performed on Microsoft Active Directory payloads surfaces and flags suspicious behavior like credential harvesting and brute force login attempts. Network Traffic Access From The Cloud The Microsoft Azure Virtual Network Tap is the first of its kind, allowing us to access network traffic from the cloud"“The Microsoft Azure Virtual Network Tap is the first of its kind, allowing us to access network traffic from the cloud as easily and passively as we do from our data center,” said Daniel Howard, VP of Information Technology at International Cruise & Excursions. “This integration immediately transforms that data into a powerful source of threat detection and investigation. We now have the power to secure our cloud workloads exactly as we do our on-premises applications.” “The enterprise attack surface is no longer confined to the data center. Enterprise IT assets exist everywhere the enterprise operates, from the branch office to the data center or the cloud," said Jesse Rothstein, CTO and co-founder, ExtraHop. "With Reveal(x) for Microsoft Azure, we're enabling SecOps to detect and investigate threats across the entire hybrid enterprise while focusing on the most critical assets first so business functions can continue uninterrupted and customer data remains protected.” Threat Analysis And Incident Management Adwait Joshi, Director, Product Marketing, Azure Security, Microsoft Corp. said, "ExtraHop Reveal(x) offers comprehensive threat visibility across the hybrid enterprise allowing SecOps teams to detect threats immediately and act decisively to eliminate them. The solution works with Microsoft Azure, enabling monitoring and incident response from cloud infrastructure to the data center.”
Everbridge, Inc., a provider in critical event management and enterprise safety software applications to help keep people safe and businesses running, announced the next generation of its Critical Event Management (CEM) Platform. Unveiling a single, turnkey operating environment for managing critical events, Everbridge customers can now leverage the company’s powerful visualization and orchestration capabilities built natively into its market-leading CEM platform. Everbridge’s next generation SaaS platform also features the ability to dynamically locate employees at risk and provide organizations with enhanced and actionable risk intelligence. Challenges In A Mobile World In today’s increasingly mobile world, organizations are challenged with managing critical incident preparedness, communications and response. Everbridge transcends this challenge by enabling any organization to leverage a single, integrated view for managing and responding to enterprise risk across business continuity, employee/asset safety, supply chain and business resiliency. Unifying its Visual Command Centre (VCC) software with its entire suite of CEM applications provides organizations with an end-to-end operating environment to take an ‘Assess, Locate, Act and Analyze’ closed loop approach to managing critical events. This unified solution enables organizations to: Assess – detect and gain situational clarity about a threat and its potential impact to people and assets Locate – pinpoint key stakeholders including responders and resolvers, those in an impact location, and others that need to know, i.e. government officials and business executive teams Act – initiate and manage automatic incident communications workflows to quickly and decisively mitigate or eliminate the impact of a threat Analyze – conduct analysis on actions taken to understand patterns and improve outcomes and preparation for the next critical event. This end-to-end approach enhances an organization’s ability to proactively anticipate threats to their people and assets and take actions such as adjusting supply chains and travel schedules to avoid risks. It also enables an organization to reduce cycle times in identifying threats, initiating response, and confirming that their people and assets are safe. Everbridge’s next generation SaaS platform also features the ability to dynamically locate employees at risk Visual Command Centre Key Goals “Our goal is to provide security and risk professionals with an end-to-end operating environment to mitigate or eliminate the impact of critical events to their organization,” said Imad Mouline, CTO at Everbridge. “The next generation of our CEM platform unifies real-time threat intelligence and situational awareness with the ability to dynamically locate people and assets, automate incident response workflows, and generate the metrics to measure the performance and impact of actions and outcomes.” This end-to-end approach enhances an organization’s ability to proactively anticipate threats to their people With Visual Command Centre software unified as a core component of the CEM Platform, organizations can receive immediately actionable data to easily visualise, assess, and predict which events could hamper or severely threaten their most valuable assets or continuity of operations. Providing a wide array of risk data that includes threat, reference, and contextual feeds from a variety of public, partner and proprietary sources, Everbridge provides customers with award-winning visualisations and user experiences including: A full complement of integrated risk event data sources including general safety and security, terrorism, Everbridge Nixle®, transportation-related, civil unrest, crime, weather, earthquakes, wildfires, and more. Contextual data sources to assist operators with workflow including weather overlays, live traffic cameras, traffic flow conditions, and geo-tagged social media feeds. Reference data sources including airport locations, critical infrastructure, and geo-political borders. Time, search, and spatial queries and filtering with Export to Excel for ease of use. As a result, organizations will be able to: Feed dynamic location data from access control systems, travel management solutions, Wi-Fi access points and other sources using Everbridge’s Safety Connection solution directly into VCC to enable location-aware intelligence for employees and other stakeholders. Automatically alert and stream live video to VCC when Everbridge cellphone app users signal SOS or miss a Safe Corridor check-in Embed Everbridge’s Incident Communications solution to provide seamless multi-modal communication and summarization of response to contacts affected by critical events. Incidents can be initiated using the company’s Crisis Commander® product workflow. As part of its next generation platform, Everbridge is also providing a new Admin Console, where customers can upload and manage their asset data, configure Visual Command Center data feeds, set Alert rules and permissions to manage access to data, and set Incident Communications integration preferences. The Admin Console provides full self-service capabilities for the customer.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Live events at large venues like arenas, stadiums or convention halls – whether they involve wrestlers breaking chairs over each other’s heads, Axl and Slash letting bygones be bygones and reuniting Guns ‘n’ Roses, your favorite NFL team annihilating the opposition 62-3, or a convention involving anything from politics to food to Star Trek – are exciting affairs that channel the camaraderie of the crowd into a powerful collective energy. But they also are vulnerable to threats. Physical Security Solutions Terrorists and other malefactors have known for centuries that any large gathering of people has inherent vulnerabilities on which they can prey: Crowds make it hard for security to keep track of any single person or spot unusual behavior, and the number of people congregated in one space amplifies the impact of any attack. In recent years, organizers of large events have augmented the security methods they use to protect a venue, using both walk-through metal detectors and hand wands, and deploying K9 and police units to patrol the lines to enter security. But these current methods share a universal flaw: to be caught, evil-doers have to be on the verge of actually entering the venue with hundreds of other people, which means they can still cause a massive amount of destruction. In a survey conducted by Brivo, 50 percent of business security leaders felt they lack adequate budget and financial resources to invest in physical security solutions. Augmented Security Measures Organisers of large events have augmented the security methods they use to protect a venue, using both walk-through metal detectors and hand wands Security professionals and event organizers are constantly on the verge of finding new methods to implement in order to add an extra layer of security at venues and large facilities. For example, at this year’s Coachella Music Festival in Indio, California, which attracts over 100,000 attendees each year, organizers boosted their security initiatives by adding drones, armed guards, magnetometers and dog patrols. Unfortunately, large entertainment festivals have been a target for ill-intended individuals. Last year, the 91 Route Festival in Las Vegas, Nevada took the lives of more than 50 people and injured over 500. In the United Kingdom, 22 people lost their lives to a suicide bomber at an Arianna Grande concert in the Manchester Arena. Yet, concerts aren’t the only place new security initiatives and technology need to be implemented in, but also sports arena and large facilities. Metrasens partnered with Villa Park, the football grounds for Aston Villa Football Club in the UK, to conduct a trial using FMDS technology, Proscreen 900, to screen fans Current Screening Methods Conventional walk-through metal detectors are a compromise between effective screening and high throughput, as they successfully detect metal objects, but only can screen about five or six people each minute. They are generally placed 10 to 20 yards from a venue’s front façade, either just outside or just inside, to screen people as they enter the facility. Hand wands are used for anyone that sets off the walk-through detector as a secondary screening method for confirmation. Many facilities also use observational methods to screen, such as drones, surveillance cameras, security officers or police walking the crowd and looking for suspicious behavior, or explosives-sniffing K9 units patrolling the area. Security personnel are aware of these pre-security-screening vulnerabilities around the perimeter of the venue Security Method Limitations Each of these methods has intrinsic limitations. Observational security methods are just that – observation-based, not detection-based. They rely much more heavily on human factors that introduce greater degrees of error and chance, and positive visual identification of a suspicious threat requires a relatively close proximity to observe the threat. They’re also slow and laborious. Walk-through detectors and wands will catch someone trying to enter a facility with a weapon, but by the time they do, it may be too late – a terrorist will already be well within proximity to do a lot of damage. Bad guys don’t need to actually enter the venue; they just need to get close enough to injure or kill a large number of people. That can happen – and has happened, such as with Manchester Arena bombing in 2017 – right at the security point, where a terrorist will be surrounded by dozens or hundreds of people and 10 to 20 yards away from the critical asset: the interior of the venue. Security personnel are aware of these pre-security-screening vulnerabilities around the perimeter of the venue. What they haven’t had until recently is a way to screen mass amounts of people for weapons of mass casualty as far away from the critical asset as they can, and as far away from densely populated areas as they can, all while not impeding throughput resulting from the requirement for patrons to divest their possessions. Expanding Security Reach With FMDS The far perimeter of a venue is an ideal place to screen for weapons of mass casualty. Most of the time, a terrorist is trying to get closer to the immediate perimeter of the venue, to inflict the most damage to large groups of people waiting to get in; farther away, event attendees are walking toward the entrance and thus are more dispersed, not standing in clusters or lines. This advance screening is possible using ferromagnetic detection systems (FMDS). The FMDS systems in the trial, Proscreen 900, were placed outside, where individuals were screened for large weapons before they even entered the football stadium Metrasens recently partnered with a football stadium in Birmingham, UK to conduct a trial using FMDS technology to screen fans. The trial took place in March at Villa Park, the football grounds for Aston Villa Football Club. The stadium can hold over 42,000 people. The FMDS systems in the trial, Proscreen 900, were placed outside, where individuals were screened for large weapons before they even entered the football stadium, adding an extra layer of security. FMDS is highly accurate – there is no false alarm rate, because it is programmed to find only what security personnel need to find In the most basic terms, FMDS uses passive sensors that evaluate disturbances in the earth’s magnetic field made by something magnetic moving through its detection zone. Everything else is invisible to it; it doesn’t see people, clothing, backpacks, purses, etc. Nothing can be used to shield the threat, because FMDS doesn’t detect metallic mass; it detects a magnetic signature, down to a millionth of the earth’s magnetic field. It is also highly accurate – there is no false alarm rate, because it is programmed to find only what security personnel need to find (e.g., a weapon). Although it is a passive technology, it is more effective and reliable than using observational security methods to screen a perimeter, because the technology will never miss something the way a human would. Recognizing Moving Magnetic Signatures An important point is that the system only works on moving objects. This makes it immune to environmental conflicts such as rebar that would trip up conventional metal detectors and allowing people to be screened quickly and unobtrusively without stopping to divest their possessions as they walk toward a venue – up to 50 or 60 people a minute. FMDS does not need people to be organized into lines or groups; it simply detects a magnetic signature on anything that passes. It runs on batteries – there is no need for an electricity source, as with a walk-through detector – and can be placed on just about any form factor (a pole, a stand, etc.). This gives security personnel flexibility when deploying FMDS, allowing them to create a wide perimeter around a venue without worrying about portability or a power source. Screening can be as obvious or as concealed as personnel prefer for a particular situation, based on the form factor they select. FMDS simply gives the opportunity to add a layer of security where there currently is not an effective solution All of these combine into a solution that creates a way to close a gap in mass screenings at large events, by expanding the secure perimeter and creating a highly accurate way to detect weapons of mass casualty farther away from a critical asset and large crowds. It does not replace screening for smaller items necessarily, and all large venues should use a layered security solution that also deploys tactics like roving security guards, walk-through metal detectors and hand wands. FMDS simply gives the opportunity to add a layer of security where there currently is not an effective solution. Effective Mass Screening Solution Pessimists sometimes muse the world is getting more dangerous with each passing year, and that technology is at least partially responsible for both the breadth and depth of the increasingly creative ways bad guys harm people. But some technologies also are responsible for helping to fight against those threats and make the world safer, and FMDS is one of those. By providing a foolproof method of detecting weapons of mass casualty before terrorists get too close to an event venue, FMDS gives event security personnel a way to better protect large events, making them less dangerous and keeping people safe. Images source: Metrasens
Security teams at casinos and gaming facilities are challenged daily to balance a welcoming and guest-focused attitude with a firm and capable presence to prevent and handle security issues, manage surveillance and security systems, and protect employees, guests, and assets. And all of this needs to be accomplished while complying with strict gaming regulations. An experienced security systems integrator can assist you with many of those challenges, including the very important job of ensuring that the correct security technologies are integrated and installed correctly to avoid downtime and maintain regulatory compliance. On the flip side, partnering with the wrong security integrator can be an expensive lesson with disastrous financial consequences due to system interruptions that can shut down gaming operations. However, selecting the right security systems integrator is not always an easy task. To get the answers you need, you need to ask the right questions. Here’s a list of criteria to help get the search process started. It’s vital to hire a systems integrator who has significant experience in the gaming and casino industry 1. Relevant And Proven Industry Experience This may be one of the most important factors for you to research. It’s vital to hire a systems integrator who has significant experience in the gaming and casino industry. You wouldn’t hire a plumber to fix your roof or a chef to repair your car, so why consider hiring an integrator without relevant work experience in your specific industry? Does the integrator have experience working with security solutions for casinos and gaming facilities similar to your facility? Have they worked with gaming commissions in your state? Do they have the gaming certifications necessary to ensure your new system is in compliance? And what specific projects have they done – with references you can contact? Even more, look for a systems integrator who has strong relationships with contractors, suppliers, unions and equipment suppliers, as they may need to call on them for assistance during the course of your installation. 2. Security Systems Knowledge Security technologies are evolving at an unprecedented pace which presents obvious advantages and some hidden dangers. It’s important that you select a systems integrator who not only installs products well – but also works very closely with equipment and software manufacturers to develop new and innovative solutions for the most challenging installations.It’s also important to ask about their procedures and processes for after-hours emergency situations Look for systems integrators that utilize integration and testing facilities to evaluate which system configuration and specific components meet your functionality needs, lighting challenges, resolution and frame rate requirements, and recording accuracy demands to ensure your system provides you with the highest levels of identification while maintaining regulatory compliance. Since no two systems are ever alike, it’s also important to look for custom integration capabilities employing solutions from different manufacturers to ensure you are getting the best possible solution on an application by application basis. 3. Brand Loyalty Versus Conflicts Of Interest There’s no doubt that security professionals have their preferred brands. This can be based on prior experience, proven reliability, superior customer support, or even personal relationships. But it’s also no secret that price and sometimes spiffs can play a deciding role on which products a reseller recommends. Be specific to ask questions about the systems integrator’s line card – which manufacturers’ products do they actually represent and why? And how do they select specific products for specific applications? If the answers to these simple questions seem vague, there may be more at play than meets the eye. The more choices a system integrator has at their disposal, the higher the probability they are providing the best system products and configurations for your specific installation. 4. Accelerating Resolutions How is the integrator’s firm structured? How long have they been in business? Who will be your daily contact? How long have members of the integrator’s team been with the firm? What experience do they have? It’s also important to ask about their procedures and processes for after-hours emergency situations, as you will likely need service after normal business hours. Find out if they offer on-demand remote system support to address problems immediately, and to accelerate resolutions if and when there is a failure. The more choices a system integrator has at their disposal, the higher the probability they are providing the best system products and configurations for your specific installation Most importantly, verify that they have technicians who can get to your physical location quickly in the event problems need to be addressed physically in order to keep your property in compliance. Even though it can be overlooked, it’s important to assure the system integrator’s organizational structure meshes well with your general requirements before starting a relationship. 5. Pricing Structure Of course, price is important, but while an integrator’s pricing should be competitive, it should be viewed as one of many selection criteria.An experienced systems integrator with casinos and gaming facilities will understand local, state, federal, and tribal regulations A security systems integrator with a proven track record of successfully configuring, installing, and servicing projects like yours, on time and on budget, is worth more than the small amount of money you might save by going with a low-cost integrator. 6. Knowledge Of Gaming Regulations A systems integrator who has experience working with casinos and gaming facilities will understand local, state, federal, and tribal regulations, and will provide you with a gaming surveillance and security solution that minimizes disruptions to your operations during its installation and after your new system has been implemented. Along with the requirement standards of performance, quality and reliability, compliance is critical to ensure fluid gaming operations. 7. Adding Value With Industry References Industry references are invaluable in determining your ideal choice. First, ask them to provide client contacts from their reference list, and contact those individuals. Questions to ask include: Did the integrator clearly understand the reference’s requirements? How did they contribute to the solution? What challenges did they need to overcome? Did the company deliver on time and on budget? How has the system(s) been operating since implemented? How has their support been? Why would you recommend them? A good security systems integrator will take extra steps to ensure your security solution is always working 8. Asking The Right Questions There are very few security systems integrators who can address all of a casino’s or gaming facility’s needs, but they do exist, and you’ll find them if you do your homework. Look for an integrator that can add value and not just take direction. A good security systems integrator will volunteer ideas to reduce maintenance costs, take extra steps to ensure your security solution is always working, and help save your casino money. Their success will be determined by their initial ability to understand your challenges and deliver the best possible solution to resolve them. And it all starts with choosing the right partner by asking the right questions.
Add March Networks to the growing list of companies in the physical security market that are addressing the possibility of cyber-threats. Cybersecurity is especially relevant to two of March Networks’ primary vertical markets – banking, whose focus on money requires stringent cybersecurity; and retail, which has been the target of recent cybersecurity attacks. “People just don’t know what to do with cybersecurity,” says Dan Cremins, Global Leader, Product Management at March Networks. “The thing is, you have to figure out how to make your products, solutions and networks more secure, and then let them know what you are doing about it.” Cybersecurity Mobile App As the profile of cybersecurity has increased in the physical security market, March Networks has added cybersecurity features to its GURU app. GURU is a mobile app for integrators to use when installing and diagnosing equipment in the field. Using a wireless dongle, the system can read the QR (Quick Response) code on a camera, for example, and provide installation information specific to that camera. As the profile of cybersecurityhas increased in the physicalsecurity market, March Networkshas added cybersecurity featuresto GURU GURU’s new Security Audit tool enables the app to scan a unit and check to make sure it is cybersecure; that is, the right ports have been closed and default passwords have been changed. Simple green, yellow and red coding communicates the cybersecurity status of equipment as it is being installed – and it takes less than five minutes. After installation, the GURU app can be used to conduct an extra check to ensure cybersecurity. There is also a section on the March Networks web site identifying security vulnerabilities (listed by CVE [Common Vulnerabilities and Exposures] number), explaining whether they affect March Networks equipment, and the availability of any patches. “Cybersecurity is the number one threat to any industry, including ours,” says Cremins. “We offer a tool to help people address it. We are trying to be as proactive as possible, and stay ahead of it.” Integrating Inventory Tracking & Video There are other developments at March Networks, too, including a new integration partner in the retail sector. Tracking inventory is critical to retail loss management, and March Networks has integrated its video system with the Zebra RFID system for inventory tracking. Zebra uses radio frequency identification (RFID). Asset tags are used in combination with sensors mounted throughout a facility to keep track of where goods are transported in a retail store, warehouse or other location. If something goes missing,video of that item, tied to trackinginformation from the RFID system,is available instantly to aid withan investigation The Zebra RFID system generates inventory tracking information that is integrated with March Networks video in much the same way that point-of-sale (POS) information has been used with video. Information from inventory tracking is associated directly with each frame of video. The integration allows video cameras to watch equipment as it moves around a warehouse or retail space. If something goes missing, video of that item, tied to tracking information from the RFID system, is available instantly to aid with an investigation. In addition to retail, there are also applications of RFID inventory tracking in medical environments, where expensive equipment is used throughout a hospital, for example. Integration of video with inventory control would allow video cameras to watch medical equipment as it travels from floor to floor and room to room. Video provides a valuable investigation tool if a medical device goes missing. “They can review the video to see where it was and see what happened with it,” says Cremins. HDR Cameras For Banking Applications At the recent ASIS show in Orlando, March Networks introduced the new ME4 series of multi-exposure, 4 megapixel cameras. The cameras are aimed at improving video image performance in situations with varied light, such as a glass-enclosed ATM enclosure, bank branch, or a retail location where bright windows can cause backlighting and other problems. In addition to better image quality and resolution, the cameras have been designed very economically, says Cremins. They strike a balance between video clarity and bandwidth and storage efficiency. The cameras use HDR (high dynamic range) technology designed for the most extreme lighting conditions. Even in an environment surrounded completely by glass, the cameras can still see the person in the foreground and details in the background. Facial details are critical in applications at banks and financial institutions.
Premier League football club Everton FC has deployed SureCloud’s GDPR suite to manage and monitor its data and GDPR compliance, enabling the club to work towards GDPR compliance, optimize internal processes and position it strategically for the future. The solution replaced Everton FC’s manual data mapping and processing methods. Manual Data Mapping And Processing Everton FC’s databases are extensive, containing details on over 32,000 season ticket holders and over 600,000 registered fans, with details on around 360 employees, players, agents, suppliers, and individuals associated with the club’s community charity and partner school. Much of this information is sensitive. This data and all of the processes associated with it were being manually managed and tracked in a series of Excel spreadsheets. With multiple requests and queries to respond to every day, the club’s Data Protection Officer was struggling to record and manage smaller ad hoc queries, incidents, and tasks. With GDPR due to place much tighter restrictions on how the club processed, managed and shared its data – as well as on the reporting of any incidents that did occur – the club needed a more comprehensive and reliable tool in place before 25th May 2018. SureCloud Platform The club approached its long-standing IT support provider NCC to find a solution. NCC recommended the SureCloud GDPR Suite, delivered on the SureCloud platform. After SureCloud had successfully demonstrated the ability to provide full visibility for management and automation of GDPR processes across the organization, Everton FC selected its cloud-based suite of solutions. Two dashboards were created according to Everton FC’s specific needs Two dashboards were created according to Everton FC’s specific needs: one to show all data mapping and transfers, including where data is being held and who it is being shared with; and one showing incidents and requests, including a subject request register and incident tracker path. This gives an immediate overview of which requests are still outstanding, such as a request for an individual’s personal information to be erased from the database. SureCloud GDPR Suite The five applications Everton FC chose to deploy from the SureCloud GDPR Suite were: GDPR Program Tracker - to enable the club to map all its disparate data and workflows using intelligent risk-based questions GDPR Management – to provide all mandatory GDPR business-as-usual processes Information Asset Management - to record and maintain the club’s entire data inventory Compliance Management for GDPR - to help Everton FC speed up their process of attaining compliance and on-going real-time risk remediation Incident Management for GDPR – to meet the GDPR requirement to log, track and notify the ICO of any data breaches, should an incident arise Ian Garratt, Data Protection Officer at Everton FC said: “The penalties for not achieving GDPR compliance are severe – up to 4% of our revenues, or €20 million. It was imperative that we got a solution in place that could not only help us achieve GDPR compliance but would also make it quick and easy for us to demonstrate that compliance at any point, on request. SureCloud’s GDPR Suite fit the bill.” Centralized Data Management Now, all of Everton FC’s disparate data are mapped, risk-assessed and tracked in a single centralized system “We are now tracking and recording every single data request in a centralized way. With NCC’s support, SureCloud’s solution has brought a comprehensive clarity to our data processing that was impossible to achieve with manual spreadsheets. The system is so intuitive; it has helped us streamline multiple processes and undertake impact assessments that we couldn’t handle before.” Now, all of Everton FC’s disparate data are mapped, risk-assessed and tracked in a single centralized system. All changes and requests are automatically tracked so that activity records and data audits can be produced at the click of a button. Should an incident like a suspected data breach occur, it is identified and reported immediately and automatically. The club’s data protection team can select which asset has been affected and immediately determine the severity of the incident and whether it needs to be reported to the ICO. Should it need to be escalated, the report is available instantly. Data Processing, Documentation And Risk Management Ian Garratt added: “The SureCloud GDPR Suite isn’t just a compliance tool; it’s a comprehensive management tool. We now have a continuous, real-time status of where we are and what we need to be doing in terms of data processing, documentation and risk management. It would have simply been impossible to achieve this manually. SureCloud has not only helped us to work towards GDPR compliance they have optimized our internal processes and positioned us strategically for the future.” In addition to deploying five applications within the GDPR suite, SureCloud is currently adapting its Incident Assessment tool to meet Everton FC’s specific requirements.
Above the Line Security have improved the safety of their at-risk employees by switching from a manual call-in system to the user-friendly StaySafe lone worker solution. Employees at Above the Line Security are responsible for guarding individuals and high-value equipment on busy film sites. Ensuring Employee Safety StaySafe allows workers on site to send an alert in an emergency while providing the employee with an accurate location via a real-time map Prone to theft and coming into contact with potentially volatile paparazzi and members of the public, the company required a more reliable way of monitoring the safety of their guards. StaySafe allows workers on site to send an alert in an emergency while providing the employee with an accurate location via a real-time map. Monitors are alerted if an employee triggers an alert or fails to check-in on the app during their shift. StaySafe StaySafe also provides the ability for an alert to be raised even during difficult situations. If engaged in a confrontation, a panic can be sent discreetly, or a duress PIN entered if the app is discovered by the aggressor. Missed check-in alerts will also alert a monitor in cases where the lone worker may be unable to send a panic themselves. “Having used an app for the first time to protect our lone workers, we were incredibly impressed by the ease and agility of set up and usability. Our employees have adapted quickly to using the app whenever they work and as they do not always come to the office, it allows them to set up for the day quickly and independently.” Lone Workers’ Safety Security Personnel are often targets for verbal and physical abuse due to the nature of the work they carry out" Adele O’ Toole at Above the Line, continues; “Previously, we had to rely on night supervisors based in external locations to take check-in and emergency calls manually. This proved expensive and disconnected, particularly if our lone workers were situated in areas of low signal where making contact to ensure their safety was infrequent and unreliable. With StaySafe, we are able to instantly locate our workers on a map once they have checked-in, even in areas of low signal, saving us a lot of time and human resources.” Don Cameron, CEO at StaySafe adds; “Security Personnel are often targets for verbal and physical abuse due to the nature of the work they carry out. They often protect valuable assets which leads to the potential risk of theft and aggression. StaySafe provides peace of mind for the lone workers and the business by providing an effective and reliable solution for a range of volatile situations. Organizations can see exactly where their staff are in the case of an emergency and can send assistance directly to them – all with the added bonus of being user-friendly and cost-effective, only requiring a mobile phone.”
Traka has been specified at a main UK international Airport to deliver bespoke solutions for the safe management of replica improvised explosive devices (IEDs), alongside intelligent key management systems. The UK airport, which cannot be named for security reasons, uses replica IEDs for training purposes across its security network, to ensure correct procedures are being followed in the unfortunate event of a real threat. Security Management Using Replica IEDs The importance of secure management of replica IEDs is integral, with recent well-publicized events having shown the major disruption caused by any unaccounted items, including an abandonment of the last game of the season for Manchester United in 2016. Traka, which already provides the airport with essential intelligent key management units, created a bespoke management locker solution for the safe storage of replica IEDs on site, to ensure they could only be operated by authorized personnel. The units present audit control capability and reporting on an instant basis with any units that do not get returned being instantly accountable. To have any replica IED device unaccounted for would have serious security implications for the Airport as a whole" Intelligent Key Management Says a Security Manager at the Airport, “To have any replica IED device unaccounted for would have serious security implications for the Airport as a whole, with a real possibility of closure and consequential mass disruption.” “With increasing numbers of passengers and noted global security threats, we cannot afford to take the risk and knew Traka could be called upon as the experts to provide a solution. The lockers not only provide an extra security dimension, but also ensure the smooth running of the Airport security. They enhance our training objectives as the audit control capability allows replica IEDs to be used across terminal staff, safe in the knowledge they will always be accounted for and returned.” The lockers support the Airport’s use of Traka solutions for intelligent key management Asset And Vehicle Tracking The lockers support the Airport’s use of Traka solutions for intelligent key management for security and engineering keys, alongside asset and vehicle control. Ben Farrar, Traka Market Development Manager added, “It is the focus of every Airport to deliver the best possible experience for passengers, while ensuring their absolute safety and security at all times. And in doing so, ensure staff can present all processes in a smooth and stress-free environment.” “Traka’s provision of bespoke locker solutions for the safekeeping of replica IEDs, alongside our intelligent key management systems as used by this Airport may only seem like smaller details in a complex security matrix. But they work together for the benefit of security teams to ensure effective management and automation, decreasing the likelihood of causing delays and disrupting the airport flow unnecessarily.”
The saying goes that “business is business,” but many experienced executives in this industry have come to learn that a few ounces of compassion and understanding can sometimes be both necessary and appreciated. Operations don't always go as planned; we know that uncontrollable, tragic incidents may occur, and we want to be sure we're there for our customers and partners when they need it the most. This time of need often presents itself during a significant crisis, such as the one Puerto Rico experienced and continues to face from the devastation of two major hurricanes in September 2017. Hurricane Maria, which made landfall on Sept. 20, and was considered a “catastrophic event,” brought intense rain and wind to the island for longer than 30 hours, leaving residents without power, communication and water. TimeQuest Reconfigures Access Control Solutions Vanderbilt dealer TimeQuest Technologies, located in San Juan, was forced to suspend active projects and focus all resources on recovery The destruction and damage to roads, communities and businesses changed the lives of almost everyone involved — with the inability to access supermarkets, banks and gas stations, daily tasks were severely interrupted, and so too were security activities. Vanderbilt dealer TimeQuest Technologies, located in San Juan, was forced to suspend active projects and focus all resources on recovery. With its customers' having lost everything and their buildings destroyed, TimeQuest Technologies Vice President Alberto Cupeles took his team to visit each in person, surveying the need for basic necessities and offering their assistance. As its customers started to begin construction in the aftermath, TimeQuest Technologies was forced to reconfigure and reconstruct its access control systems, software and solutions, while trying to adjust to a shift in electricity and combatting inconsistent power from day to day. Vanderbilt-TimeQuest Collaborate On Disaster Relief Having known Vanderbilt for more than 20 years, Cupeles was grateful for the trustworthy and sympathetic relationship that had developed over time, extending far beyond daily business operations. Both companies worked together to ensure overarching support and commitment to restoration, allowing TimeQuest Technologies to spend its time and effort where it was needed most. “The help we received helped not just our customers but also our families,” Cupeles said. “This wasn't just a business-only situation. There were people in the middle.” Collaborations in the security industry often run deeper than what's seen on the surface; when dealing with an unexpected occurrence, at the end of the day, providing comfort and consideration should always take precedence.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announced that Panda Restaurant Group, Inc. (parent of Panda Express, Panda Inn, and Hibachi-San) has completed deployment of 3xLOGIC’s VIGIL Trends Business Intelligence software to all of its North American locations. Interface Security Systems, headquartered in St. Louis, Missouri, is the integrator and overall project manager for this ambitious endeavor. Panda Express is the largest family-owned restaurant in America, with more than 2,000 stores globally, 35,000 associates and $3 billion in sales. Since it was established in 1983, Panda has steadily grown with roughly 125 stores opening each year. Privately owned and operated, the restaurant is guided by the core values of its co-founders and co-CEO, Andrew and Peggy Cherng and is dedicated to developing its team members and giving back to the community. As of today, Trends is deployed at 1,960 locations and has been integrated with existing Interface video surveillance and alarm systems Business Intelligence Solution “As an industry leader, Panda Express’s culture sets an expectation of best-in-class results,” explained Lyle Forcum, executive director of asset protection at Panda Express. “Accordingly, we needed a state-of-the-art business intelligence solution to provide us with truly actionable information. Intelligence we can act on is central to Panda’s business strategy, which focuses on meeting high standards through continuous operational improvement.” Starting in August 2017, 3xLOGIC and Interface Systems worked with Panda Express to customize Trends to meet the company’s unique, comprehensive needs. Interface began system deployment in QI 2018 with the first location going live in March 2018. As of today, Trends is deployed at 1,960 locations and has been integrated with existing Interface video surveillance and alarm systems. Integration With Intrusion And Video Systems “It was impressive that we were able to integrate Trends so seamlessly with existing intrusion and video systems,” said Sean Foley, senior vice president of national accounts at Interface Systems, “and the entire solution was rolled out without a single technician visiting any store.” Unlike many retail BI implementations, the focus at Panda Restaurant Group is not solely on loss prevention, but also on tracking and improving all operations at every store. Here are some of the key elements of store operations that Trends enables Panda to monitor, track, and improve: Trends provides intrusion data, which shows when stores are opened and closed, deliveries are made, and whether the store is being remotely armed and disarmed People Development. To set its people up for success, store managers are able to review all transactional behavior and address opportunity areas with employees within two days. Comparing Store Performance. The store managers’ Trends dashboard shows very clearly how the restaurant is performing compared to other stores in the region and to their prior month’s performance. Optimising Store Efficiency. Trends visually displays how many people are working per hour, what job they are facilitating, and the revenue generated per hour. Monitoring Intrusion Data. Trends provides intrusion data, which shows in a very simple display when stores are opened and closed, deliveries are made, cleaning is done, and whether the store is being remotely armed and disarmed. Tracking Cash. Panda Express can track currency, how much is in the safe and when it was last counted, as well as petty cash spend along with scanned receipts for purchases. Custom Dashboards. The system provides an array of dashboards for all levels in the organization that give an at-a-glance or drilled-down overview of an employee’s priorities and responsibilities. “At Panda, safety and loss prevention are key priorities in executing great operations,” said Lyle Forcum, executive director of asset protection at Panda Express. “We worked with 3xLOGIC and Interface for over a year to implement a highly-customized solution to meet these priorities. Now, we have a cutting-edge tool deployed across the entire enterprise that we can all be proud of.”
One of the UK’s largest video surveillance projects in recent years involving the deployment of 845 Wisenet cameras manufactured by Hanwha Techwin, is nearing completion. The video surveillance system, which is designed to play an important role in helping ensure the safe and reliable delivery of public transport across the West Midlands, is being used to monitor activity at over 50 railway stations, 11 bus stations, 3 Midland Metro park and ride sites, as well as the main Number 11 bus route around the City of Birmingham. Live and recorded images from all cameras are being monitored at an advanced control room, located in central Birmingham Wisenet HD IP camera integration The project which is targeted for completion in July 2018 has so far seen approximately 845 Wisenet cameras installed by Total Integrated Solutions Ltd. (TIS) on behalf of Transport for West Midlands which was set up by the West Midlands Combined Authority (WMCA) to co-ordinate investment needed to improve the region’s transport infrastructure. The remaining work includes the deployment of the latest generation of Wisenet high definition IP cameras at a number of car parks, together with significant camera upgrades in Walsall and Solihull, two of four Local Authority public space CCTV systems are already monitored by WMCA. Live and recorded images from all the cameras are being monitored at a £1.2M state-of-the-art control room located in central Birmingham. “Our approach to this very large, complex project was not simply one of agreeing to meet exacting KPI’s from a performance perspective,” said Eamonn Murphy, Coleshill based TIS’s key account manager. “We felt the route to success would be to adopt a more partnership type approach, where we were not only the provider of technical solutions but were also involved at a strategic level in identifying with Transport for West Midlands a pathway of system upgrade, improved efficiency, cost reduction, innovation and utilising latest technology such as video analytics to the best advantage.” TIS is assured seamless integration between Wisenet cameras and Veracity Coldstore ‘direct to storage’ solution Wisenet cameras & Veracity Coldstore solutions Transport for West Midlands evaluated cameras available from 9 different manufacturers. The subsequent decision to source all the cameras from Hanwha Techwin, (previously known as Samsung Techwin), was partly due to the price/performance ratio of its cameras, but there were two other important factors which were taken into consideration. Firstly, Hanwha Techwin has a close working relationship with its technology partner, Veracity. This meant TIS could be assured that there would be seamless integration between Wisenet cameras and the Veracity Coldstore ‘direct to storage’ solution. This negates the need for Network Video Recorders (NVRs) and thereby substantially reduces capital costs, as well as minimising setup and maintenance requirements. Open Platform cameras The Veracity Coldstore recording solution is unique in the linear way that data is written to the hard drives. Only 2 hard drives are spinning at any one time, meaning a significant reduction in power consumption, lower heat generation and greater longevity of the hard drives, reducing the overall cost of ownership. When drive failures do occur, the faulty drive can be swapped with a new drive allowing uninterrupted use. The second important factor was the capability of the Wisenet open platform cameras to accommodate a variety of edge-based analytics such as ANPR and heat mapping, should Transport for West Midlands wish to deploy these at some point in the future. Trials of the Wisenet People Counting application are currently being carried out. This utilises the analytics software developed by Facit Data Systems, another Hanwha Techwin technology partner. Wisenet SNP-6320H cameras are configured for the transmission of 25 images per second (ips) at 1080p resolution Intelligent Day/Night cameras A large percentage of the cameras installed are Wisenet SNP-6320H 2 Megapixel Full HD network PTZ dome cameras. In addition to being a true Day/Night camera which is able to capture high quality images in low light, the SNP-6320H’s powerful 32 x zoom capability enables operators to observe the close-up detail of any activity. Trials were conducted where the cameras were capped at 2 Mbps and configured for the transmission of 25 images per second (ips) at 1080p resolution. The performance at this low bandwidth level was impressive and further contributed to the selection of the Wisenet SNP-6320H, which are also equipped with intelligent auto-tracking capability to ensure a greater level of detail can be captured when no operator is present. Other Wisenet cameras deployed as part of the project include the SNV-6084R vandal-resistant IR dome and the SNB-6004 fixed camera, both of which are able to capture Full HD 2 Megapixel images. Video Surveillance Technology “Working on rail, Metro and bus station sites spread across the wider West Midlands area is a complex and challenging operation and the TIS team deserve recognition for its expertise and diligence,” said Mark Babington, Safety & Security Manager for Transport for West Midlands. Suppliers such as Hanwha Techwin and Veracity have also worked extremely well in partnership with us to ensure we could achieve maximum benefit from this substantial investment" “TIS’s engineers were qualified to the highest degree to support the latest video surveillance technology, as well as being experienced to cope with older legacy systems. Both were needed within the unique environment of a busy integrated transportation network which brings its own exceptional requirements of compliance with bespoke health and safety legislation.” “Suppliers such as Hanwha Techwin and Veracity have also worked extremely well in partnership with us to ensure we could achieve maximum benefit from this substantial investment in the West Midlands transport infrastructure.” Commenting on the success of the project, Bob (H.Y.) Hwang Ph.D., Managing Director, Hanwha Techwin Europe, said: “We greatly value the opportunity to have been involved in this project. It is a excellent example of the benefit of all stakeholders interacting with each other in partnership at an early stage of a project to ensure the most suitable products are specified and subsequently installed to the client’s satisfaction.”