Acuant, a foremost global provider of identity verification solutions, announced that the Federal Risk and Authorization Management Program (FedRAMP) has prioritized the AssureID™ Connect SaaS, Ozone® eMRTD Authentication SaaS, and Facial Recognition System, FaceID Government SaaS including Passive Liveness (COFRS) for a Moderate Provisional Authority to Operate (P-ATO) by the Joint Authorization Board (JAB). AI-powered identity platform Acuant's AI-powered Trusted Identity Platform...
BCD International released its Harmonize Conductor iDRAC plugin, which integrates with the core Genetec Security Center platform. Built on the Genetec SDK platform, the BCD Conductor leverages many advantages that are found within Security Center such as the creation of entities, event-to-actions, and role fail-over. BCD Conductor enhances the user experience by introducing virtual machine management while staying true to the Genetec platform. BCD’s Harmonize Conductor iDRAC allows all or...
Traka Automotive, one of UK’s renowned electronic key management solution provider for automotive dealers, has expanded its product portfolio by launching TrakaMEC, a mechanical key management range. TrakaMEC is an affordable new addition to Traka Automotive’s extensive range of solutions, designed to meet the needs of dealerships and services centers that are not yet requiring fully networked and integrated electronic key management systems. Presenting a highly secure mechanical ke...
The global pandemic caused by the novel coronavirus is changing work environments to an unprecedented degree. More employees than ever are being asked to work remotely from home. Along with the new work practices comes a variety of security challenges. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says....
Artificial Intelligence. You’ve heard the words in just about every facet of our lives, just two words, and they’re quite possibly the most moving, life-changing words employed in everyday conversations. So what exactly is AI, who currently uses it and should be using it? What Is AI? AI is a powerful way of collecting, qualifying and quantifying data toward a meaningful conclusion to help us reach decisions more quickly or automate processes which could be considered mundane or rep...
Palo Alto Networks, the global cybersecurity company, introduced Cortex™ XSOAR, an extended security orchestration, automation and response platform that empowers security leaders with instant capabilities against threats across their entire enterprise. Cortex XSOAR is an evolution of the Demisto® platform, which was acquired by Palo Alto Networks in March 2019. Threat intel data Palo Alto Networks is redefining the security orchestration, automation and response category by making t...
Vanderbilt is pleased to announce a new partnership with Dutch-based company, Logitime International. Logitime provides a complete and integrated solution for access control, time and attendance, and shop floor data collection. The Vanderbilt partnership centers around the integration of Vanderbilt’s VR40 OSDP Readers with Logitime’s Time and Attendance (T&A), Access Control, and Shop Floor Data Collection software solution. Logitime’s T&A software Logitime solutions' primary function is to deliver a fully customizable and interactive access control product to their customers. As such, Vanderbilt’s VR40 Readers, which are supported by OSDP, fit perfectly into this customer-first model. Using Logitime as a solution, the company in question was able to customize their access control Logitime’s T&A software is designed to be a fully integrated program. This enables Logitime to provide a tailored solution for each unique customer. An applied example of this is how Logitime’s software solved a business’ office car park problems. The car park was located near a commercial shopping center. Often employees would use the car park on their time off to go shopping. This led to employees who were scheduled to work, not being able to find parking due to the limited places available in the parking lot. Vanderbilt’s VR40 Readers Using Logitime as a solution, the company in question was able to customize their access control. Access to the parking lot was granted using the T&A work schedules instead of fixed access profiles. An incidental change of shift, an irregular shift pattern, or planned absences like holidays had a direct effect on the access control rights. Vanderbilt’s VR40 Readers fit into this mix by complementing Logitime’s goal of being interactive and customizable. This is because the VR40 Readers come with a display screen that allows Logitime to integrate and customize the messaging being displayed to their intended audiences on a customer-by-customer basis. Suitable for highly technological environments Speaking on the integration, Alexandre Prinsen, Senior Consultant at Logitime, explains: “At Logitime, our interactive technology is a crucial component for us. Therefore, being able to work with Vanderbilt’s VR40 OSDP Readers and customize our messaging in their display screens is, of course, an excellent match for us. Using the VR40 Readers, Logitime’s software can deny access to un-credentialed users “With our software solutions, we’re always thinking about solutions, and we want to be focused on being a customer-first company. You can calculate anything in our software and the VR40 Readers are a great gateway to communicate these customizable messages to the end user within one-tenth of a second. “The Vanderbilt VR Readers are very suitable for highly technological environments that need or want the feedback within their access control systems. We can even use them as T&A readers,” Prinsen concludes. High-risk security zone For example, take a high-risk security zone. If using the VR40 Readers, Logitime’s software can deny access to un-credentialed users and explain to them the reason why through the VR40 display screen with messages such as, “High-security zone – safety training needs renewal,” or “Credential needs to be validated - not allowed into high-risk area.” This is just one example of the endless applications possible. Multiple access control functionalities require interactive feedback such as: “Maximum pin code attempts,” “Anti-pass back,” “Security guards random search required,” “Maximum amount of people allowed in the area,” “Remote access granted,” etc.VR40 readers have three indicator LEDs and a multi-tone buzzer for audio verification" OLED display to simplify installation Commenting on the partnership from Vanderbilt was Nick Pegtol, Country Manager for Benelux at the company. “As well as being attractive and robust, Vanderbilt's VR40 OSDP Readers introduce dynamic features and an OLED display to simplify installation and in-service functionality. “Our VR40 readers have three indicator LEDs and a multi-tone buzzer for audio verification. A multi-color light frame enforces access status information. This can be configured to follow the indicator LEDs or any number of different options. Display brilliance is set automatically by an inbuilt light sensor. “Aesthetics aside, one of the key features of our VR40 Readers is the inclusion of the highly secure OSDP (Open Supervised Device Protocol) to help combat people hacking communications. OSDP ensures that sniffing devices cannot be installed behind the reader or along the communications path, which we also believe strongly aligns with Logitime’s goal of producing customer-oriented solutions,” Pegtol summarizes.
Ambarella, Inc., an artificial intelligence (AI) vision silicon company, announced that Ambarella and Amazon Web Services, Inc. (AWS) customers can now use Amazon SageMaker Neo to train machine learning (ML) models once and run them on any device equipped with an Ambarella CVflow-powered AI vision system on chip (SoC). Until now, developers had to manually optimize ML models for devices based on Ambarella AI vision SoCs. This step could add considerable delays and errors to the application development process. Ambarella and AWS collaborated to simplify the process by integrating the Ambarella toolchain with the Amazon SageMaker Neo cloud service. Now, developers can simply bring their trained models to Amazon SageMaker Neo and automatically optimize the model for Ambarella CVflow-powered SoCs. Neural network accelerator Customers can download the compiled model and deploy it to their fleet of Ambarella-equipped devices Customers can build an ML model using MXNet, TensorFlow, PyTorch, or XGBoost and train the model using Amazon SageMaker in the cloud or on their local machine. Then, they can upload the model to their AWS account and use Amazon SageMaker Neo to optimize the model for Ambarella SoCs. They can choose CV25, CV22, or CV2 as the compilation target. Amazon SageMaker Neo compiles the trained model into an executable that is optimized for Ambarella’s CVflow neural network accelerator. The compiler applies a series of optimization that can make the model run up to 2x faster on the Ambarella SoC. Customers can download the compiled model and deploy it to their fleet of Ambarella-equipped devices. Enterprise video security The optimized model runs in the Amazon SageMaker Neo runtime purpose-built for Ambarella SoCs and available for the Ambarella SDK.The Amazon SageMaker Neo runtime occupies less than 10x the disk and memory footprint of TensorFlow, MXNet, or PyTorch, making it much more efficient to deploy ML models on connected cameras. “Ambarella is in mass production today with CVflow AI vision processors for the home monitoring, enterprise video security, and automotive markets,” said Chris Day, vice president of marketing and business development for Ambarella. "The ability to select an Ambarella SoC and compile a trained ML model with a single click is a powerful tool that makes it possible for our customers to rapidly bring the next generation of AI-enabled products to market.” Advanced security features AWS has the deepest set of ML and AI services focused on solving some of the toughest challenges facing developers" Manufactured using an advanced 10-nanometer process, Ambarella’s CVflow SoC family enables the design of compact, high-performance vision systems with ultra-low power operation. For example, the Ambarella CV22 CVflow SoC delivers computer vision processing at full 4K or 8-megapixel resolution at 30 frames per second (fps), while its image signal processor (ISP) provides outstanding imaging in low- light conditions and high-contrast scenes, further enhancing the computer vision capabilities of the chip. The CV22 also includes a suite of advanced security features to protect against hacking including secure boot, TrustZone, I/O virtualization, and support for online upgrades over the air (OTA). Machine learning models “AWS has the broadest and deepest set of ML and AI services focused on solving some of the toughest challenges facing developers. Amazon SageMaker is a fully managed service that provides every developer and data scientist with the ability to build, train, and deploy machine learning models quickly,” said Bratin Saha, Vice President, Machine Learning & Engines, Amazon Web Services, Inc. “We’re excited that VIVOTEK is using SageMaker Neo to simplify the deployment of ML models at the edge on Ambarella CVflow-powered IP cameras.”
ASSA ABLOY has signed an agreement to acquire KEYper Systems, a supplier of electronic and mechanical key management systems in the US, with a strong presence in the automotive segment. KEYper was established in 1993, and operates from its HQ in Harrisburg, NC. KEYper Systems will become a separate business unit of Traka, which is a pioneer in key and asset management, and an operating unit of ASSA ABLOY Global Solutions. Ric Stone, President of KEYper will report to Justin Sasse, Managing Director of Traka. Expanding Traka’s Product Range Globally This acquisition will allow us to leverage Traka’s technology to further develop KEYper’s offering to its existing customers"“KEYper’s product range and expertise, especially in the US automotive and property management market segments, will complement Traka’s extensive product range and specialist solutions in key and asset management solutions globally. This acquisition will allow us to leverage Traka’s technology to further develop KEYper’s offering to its existing customers, and widen the product range globally for Traka in all of our market segments,” says Justin Sasse, MD of Traka. "This transaction provides us the opportunity to further strengthen our position in the industry, while advancing Traka’s strategy to increase its presence in core markets globally," says Danny Garrido, President of Traka Americas. "Traka and KEYper are an excellent strategic fit. We have highly complementary product and service offerings, strong sales and marketing organizations and a shared dedication to quality customer service - we expect this combination to result in an even more effective and successful Traka." Accelerating Product And Market Development “I am very pleased to be joining Traka and ASSA ABLOY. KEYper will be able to accelerate its product and market development and is looking forward to engaging with the wider Traka and ASSA ABLOY organization to share knowledge and expertise,” Ric Stone, CEO KEYper Systems. The acquisition is conditional upon satisfaction of customary legal conditions and is expected to complete during the first quarter of 2019.
GlobalPlatform, the standard for secure digital services and devices, has published two configurations to simplify and expedite the implementation of its Trusted Execution Environment Management Framework (TMF). The configurations offer guidance on the specific parts of the framework that need to be implemented to remotely manage Trusted Execution Environments (TEEs) and their trusted applications (TAs) on particular device types. “The original TMF specification is extensive, covering a wide range of use cases and business models, from basic IoT devices to rich-featured devices like smartphones,” comments Gil Bernabeu, Technical Director of GlobalPlatform. “To help manufacturers of IoT devices - like automotive equipment, gateways, and industrial devices and appliances - we have developed two configurations to define a minimum subset of remote functions that allow a consistent level of management. This will dramatically reduce the time needed to implement TEE application management on those devices.” Single Purpose And Rich-featured IoT Devices The configurations and framework will be used by service providers, application developers, device manufacturers and TEE implementers The two configurations address the needs of different use cases: Single purpose IoT devices that fulfill simple use cases like sensors for smart homes, buildings and cities. They are often controlled by a single entity, manage a single application and contain one security domain and therefore need fewer management commands. Rich-featured IoT devices like gateways, automotive in-vehicle infotainment (IVI) systems and smartphones. They require a richer management framework, that enables numerous service providers’ applications to be isolated within their own security domains in the same TEE. The configurations and framework will be used by service providers, application developers, device manufacturers and TEE implementers. They enable TEE users to securely install, update and personalize trusted applications on a TEE once it is active, providing clear and practical direction into the management requirements of trusted applications. Better Clarity And Stability To On-device Security The ongoing standardization of TEE management brings significant value and flexibility to those providing trusted services on connected devices" “The ongoing standardization of TEE management brings significant value and flexibility to those providing trusted services on connected devices. This work is bringing greater interoperability to the management of trusted applications across devices, streamlining deployments and bringing greater clarity and stability to on-device security. With the IoT world developing at pace, these configurations will be invaluable to the deployment of foundational security without impacting the pace of innovation,” adds Gil. GlobalPlatform will examine critical security technologies, such as the Trusted Execution Environment (TEE) and Secure Element (SE), and also delve into their associated business and technical use cases to explore more deeply the need for security in the connected world at their 6th annual seminar on September 19 in Beijing, China.
Quantum Corp. named AutonomouStuff LLC its primary partner for storage distribution in the automotive market, enabling them to deliver Quantum’s comprehensive end-to-end storage solutions for both in-vehicle and data center environments. Quantum’s StorNext-powered scale-out storage provides high-performance ingest of data into the data center when test vehicles return to the garage, thereby speeding time to result for sensor-generated in-vehicle data. Quantum in-vehicle storage is designed to fit the environmental and space requirements of autonomous vehicles. The combined solution enables AutonomouStuff to extend its offerings beyond in-vehicle solutions to include data center storage to support analysis and long-term data retention. Quantum has worked closely with AutonomouStuff and its customers to define and create a complete end-to-end research solution with durable in-vehicle storage for test vehicles Active Data Management StorNext solutions combine high performance storage with low cost archive storage to enable easy data integration and management for the transition between high performance analysis and long-term retention. With this type of active data management large-scale projects are substantially more economically viable, lowering data storage costs by an order of magnitude. Quantum has worked closely with AutonomouStuff and its customers to define and create a complete end-to-end research solution that includes durable in-vehicle storage for test vehicles. The resulting solution is self-protecting, self-managed data center storage where analysis and solution development takes place. Multitiered Storage Approach It also provides autonomous vehicle developers with an easy way to move data from test vehicles to the data center while achieving the lowest cost storage and delivering high-performance shared access, integrated protection and data life cycle management. Quantum’s multitiered storage approach automatically places less active data on the most cost-effective storage media while active data resides on high-performance storage. This is critical for autonomous vehicle development environments that generate petabytes of data which needs to be retained for many years to meet regulations and to validate algorithms as designs evolve. Quantum is in the vanguard of delivering storage solutions that balance performance with cost to help advance research" Scalable And Economical Solution Bobby Hambrick, founder and CEO, AutonomouStuff said “Autonomous research generates an enormous volume of data which is vital to achieving the goal of a safe autonomous vehicle. Quantum multitier data storage kits powered by StorNext offer a highly scalable and economical solution to the data dilemma researchers face.” “The promise of safer, more autonomous vehicles has captured the public imagination, and intelligent storage solutions are key to delivery of that promise. In partnership with AutonomouStuff, Quantum is in the vanguard of delivering storage solutions that balance performance with cost to help advance research of significant value to society,” said Molly Presley, vice president, global marketing, Quantum.
Through an exclusive licensing agreement, Orion Entrance Control, Inc. (Orion) is now offering a unique new entrance control system that enhances security and monitoring at any doorway within a building where access is a security concern. The new DoorGuard system, which utilizes LIDAR (light detection and ranging) technology that is a key component in autonomous motor vehicles, is being unveiled at the ISC West security conference in Las Vegas on April 11-13. Orion is renowned U.S. owned and operated manufacturer and global provider of optical speed lane turnstile solutions. Drones To Industrial Automation In drones, payload and battery runtime benefit greatly from the Quanergy's compact S3 sensorsThe core component of the DoorGuard system is the S3 sensor developed by Quanergy, a company that was the first to patent solid state LIDAR. Orion has been selected as the preferred S3 vendor for the security sector. This small solid-state sensor is ideal for applications requiring object detection at long range including drones, intelligent robotics, security, smart spaces and industrial automation. In drones, payload and battery runtime benefit greatly from these compact sensors. “We are very pleased to be the preferred vendor for Quanergy’s S3 sensor and are using this disruptive technology as a key component of our new DoorGuard system. This enabled us to build a 'better mousetrap' that is a significant upgrade from the beam-based systems currently in use." "It is the most effective, easiest to install and affordable system on the market to control access entrances and exits. We can overlay this on anyone’s system to provide a higher level of security at about 30 percent of the cost of other systems,” said Steve Caroselli, CEO of Orion. LIDAR Smart Sensing Technology DoorGuard leapfrogs existing technology for accuracy and performance and can be added into current security systems. The DoorGuard unit is mounted above a door and integrates to the access system and Orion’s proprietary Infinity software. The LIDAR smart sensing technology generates a half million data points per second with signal processors that calculate the time-of-flight (TOF) of each light pulse. The end result is significantly more accuracy that protects points of entry from unauthorized access.Today’s solutions typically feature a row of sensors secured onto a door frame and they can be very inaccurate" The solid-state technology communicates directly with Orion’s chip technology and software that links to perimeter doors and stairwells. It is designed to detect one credit per person and deter common ways other systems can be tricked to allow unauthorized access. Accurate Security It can detect people trying to enter a building by following someone very closely (tailgating) and can set off warnings if a door is open for too long or has been propped open. Additionally, in emergency situations when access points need to be open, DoorGuard can accurately count the number of authorized individuals who pass through, enabling first responders to know if people still remain in buildings or sections where there is limited access. “Accuracy in a security system is critical. Today’s solutions typically feature a row of sensors secured onto a door frame and they can be very inaccurate. Other more accurate alternatives are more cumbersome, more expensive and do not get to the level of accuracy the LIDAR technology can offer. We’re excited to roll out this disruptive technology at the ISC show,” Caroselli said.
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change program, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programs continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessaccess to valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasize the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programs. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programs.
The way we purchase services and products is changing. The traditional concept of buying and owning a product is giving way to the idea that it is possible to purchase the services it offers instead. This approach has come from the consumer realisation that it is the outcome that is important rather than the tools to achieve it. For example, this approach is evident with the rise of music streaming services as opposed to downloads or physical products. With the physical security industry becoming ever more integrated – and truly open systems now a reality – there is every reason to assume this service-lead trend will come to dominate the way our industry interacts with its clients as well. Interest In Service-Based Security There is a significant change of mindset that the security industry needs to embrace before a large-scale move to Security as a Service can take place. Like many technology sectors in the past, security providers have focussed on ‘shifting boxes’ as their definitive sales model. This approach was especially prevalent when proprietary systems were the mainstay of the security industry. Essentially, if the customer wanted more services they simply bought a new product. This was a straightforward and economic sales approach for manufacturers and installers alike.The security industry needs to embrace a change of mindset before a move to SaaS can take place The flexibility of integrated and open technology has changed the way consumers view their purchase, so it shouldn’t be any surprise that there is increased interest in a service-based approach. Customer choice equates to a change of focus and interest, with physical products being eclipsed by the benefits of the overall solution. We have already seen these changes in other technology areas, notably with smart devices and general IT systems. Cloud-based services put the onus on the result rather than which device the user chooses. This approach is even starting to manifest in areas that couldn’t have been predicted in the past, such as the car industry for example. Consumers are focusing more on the overall costs and convenience of buying a car over the specific specification of the vehicle. Equally, urban dwellers don’t necessarily want the hassle and expense of owning and parking their own vehicle anymore. If you don’t use it every day, it can make more sense to rent a vehicle only when you travel beyond public transport. For these consumers the car has become a service item for a specific journey. Benefits For End Users At the heart of this approach is the simple equation that consumers have a need and suppliers need to provide the most cost-effective, and easiest, solution. At the same time, the security operator may not necessarily want to know (or care) what specification the system has, they just want it to perform the task as required. By discussing with consumers, we can ensure we work even more closely with them to provide the expert support they need and deserve Most security buyers will identify the specific business needs and their budget to achieve this. This is where a service approach really comes into its own. Customers need expert advice on a solution for their requirements which takes away the stress of finding the right products/systems. In the past there was always a risk of purchasing an unsuitable solution, which could potentially be disastrous. The other issue was having to budget for a big capital expenditure for a large installation and then having to find further resources once an upgrade was due when systems went end of life. Most businesses find it far easier to pay a sensible monthly or annual fee that is predictable and can easily be budgeted for. A service model makes this far easier to achieve. Great Opportunities As well as the benefits for end users, there are considerable benefits for security providers too. Rather than simply ‘shifting boxes’ and enduring the inevitable sales peaks and toughs this creates; a service sales model allows manufacturers and installers to enjoy a more stable business model. You don’t have to win new business with every product, but rather sell ongoing services for a set period. Its highly likely that the whole security industry will start to take this approach over the next few years. Manufacturers are already well aware of this shift in customer expectations and are changing their approach to meet demands.There are major opportunities on offer in return for a change of perspective in the security industry With the service and leasing approach already firmly entrenched in other industries, this is well proven in a consumer market. The airline industry is a great example. Manufacturers understand that airlines need flexibility to upscale and downscale operations and therefore whole aircraft and even individual key components (such as engines or seating) can be leased as required. Using this approach, airlines can concentrate on what customers demand and not worry about the logistics of doing this. Manufacturers and leasing businesses provide assurances and guarantees of service time for aircraft and engines, taking care of the servicing and maintenance to ensure this delivery. This approach is just as well suited for the provision of security systems. Servicing The Future Security Market Undoubtedly there are major opportunities on offer in return for a change of perspective in the security industry. However, this will involve substantial changes in some quarters to ensure the business model is aligned with the market. Overall, the security industry needs to not only develop the right systems for the market, but also to deliver them in the right way as well. This will ensure we work even more closely with customers to provide the expert support they need and deserve.
Cameras capable of recording video at 60 frames per second (fps) are becoming widely available in the security industry. It’s important to understand what 60-fps brings to the table for the security industry and how to leverage the technology for particular scenarios. Capturing video at 60-fps represents a unique application. System integrators typically use much lower frame rates, ranging from 7- to up to 30-fps. The potential for an incident might only represent 1%, or less, of the time a camera is recording. However, when a significant event does occur, it’s better to record at a higher frame rate, because incidents such as a car accident, an altercation, or someone running away are usually only seconds long. Depending on the lighting environment, and the camera setup at that time, you either captured plenty of details or you didn’t. Casino And Stadium Security For example, in casinos, hands, money and chips move around quickly. If there’s a dispute, footage needs to be examined frame-by-frame at a resolution that provides exacting detail. For this reason, Las Vegas casinos require at least 30-fps for any cameras covering gaming action. Another example is a stadium; if you have a lower frame rate of 10-fps, it might look good when all the seats are empty and there is very little motion. On game day, things can look different. If there is an altercation, at that frame rate, it becomes difficult to ascertain the actual sequence of events. The quality of what is captured in those brief moments is where 60-fps recording pays off with its increased resolution and crystal-clear image detail. Casino footage needs to be examined frame-by-frame at a resolution that provides exacting detail. Can My Infrastructure Handle 60-fps? Running multiple streams of 60-fps 24/7 will consume network resources and storage space at an exponential rate, which is difficult to justify for most organizations. For 60-fps recording to be practical, H.265 encoding and other compression techniques are necessary. With H.265, there is no requirement to upgrade a network infrastructure. H.265 does require a more capable workstation to decode, view and playback video, but most VMS systems utilize GPUs for decoding, so this is a non-issue for most installations. The best way to reduce network and storage bandwidth is to teach the camera not to run at its maximum frame rate when there is no motion. The frame rate can drop to 5- to 4-fps if there is no motion or other activity, but as soon as there is a visual or audible trigger, the camera can dynamically switch to its highest frame rate. Having analytics in-camera makes this simple to setup and should be part of a camera’s profile. Performance Vs. Frame Rate A camera capable of 60-fps output is considered a high-performance camera. It might be more beneficial to put that performance to use enabling features other than pure 60-fps output. Cameras with the power to output 60-fps should also be able to process more data in parallel than regular cameras. This means that a 60-fps camera could also be used to send out multiple streams at lower frame rates. You might decide on a 30-fps stream to the recorder, with a 15-fps profile feeding a live view, and another 15-fps stream going to a cellphone app. In this way, a 60-fps camera can offer tremendous flexibility in how its power and processing are used. Shutter speeds are typically reduced at night to get more light onto a camera’s sensor WDR (wide dynamic range) has the ability to combine multiple exposures into a single image to allow us to see in the shadows while not overexposing highlights. WDR can also halve your frame rate. A typical 30-fps sensor with WDR enabled has an effective frame rate of 15-fps for motion because of the duplicate frames being used for exposures. Starting with a 60-fps camera, customers can utilize WDR and still have an impressive 30-fps frame rate for an incredible quality image. Optimising Equipment For Low-light Usage Shutter speeds are typically reduced at night to get more light onto a camera’s CMOS sensor. The sensitivity of the sensor and the lens f-stop will come into play, but in general, if you force the camera to run at 60-fps at night, it’s going to produce a darker image than a 15-fps or 30-fps camera. A camera set at 15-fps may also produce more of a ghosting effect on fast moving objects. Ultimately, it’s the customer’s individual use case that should dictate what is most important between luminance and clarity for moving objects. A powerful 60-fps camera can deliver the best tradeoff between low-light performance and frame rate, giving end users the best possible solution available for their unique requirements. Many VMS solutions can tell cameras to switch profiles at certain times of the day to capture optimal images based on the environment and time of day. Again, 60-fps cameras can offer the most flexibility across all scenarios. It’s important to remember that most cameras look good in daylight, and since 99% of installations happen in the daytime, always remember to tune cameras for nighttime use as well.
A Japan based technological enterprise is working towards the formation of a technology corporate group. The company’s technologically advanced products include a diverse range of products that are used on land, sea, air and even space. The company offers a range of environmental and recycling plants, industrial plants to automobile and infrastructure equipment. And at every step, Kawasaki pays the utmost attention to humankind and the environment. This century old company has been able to establish a firm foundation as a technological enterprise. The company’s automobile division, which makes it one of the pioneer automobile companies, is spread on a global scale. Crystal Clear Images They also wanted to monitor how the employees interacted with customers, cleanliness of the premises The company having franchise stores operated by respective owners in India was concerned about the consistency in branding and customer service across these stores. They wanted a solution that could enable them to view the stores from a central location, specially the front end where their premium vehicles were displayed. They also wanted to monitor how the employees interacted with customers, cleanliness of the premises, whether the products were displayed in the right order, branding in the store and other process compliances. But at the same time, they did not want to invest in recorders as the numbers of cameras at individual locations were very limited. Matrix installed high resolution IP cameras at each store. These cameras provided crystal clear images of every corner of the store. This enabled the company to monitor every aspect of brand management such as order of vehicles, customer service, cleanliness, behavior of employees, etc. Geographically Separated Locations A Matrix NVR was placed at the central location, and all the cameras from different locations were connected to itCameras were installed at each location based on the requirement and connected to a network switch with the help of CAT6 cables. Since there was a private connectivity between all the geographically separated locations of the company, all cameras at various locations were configured locally with VPN functionality (same class of IP address), and were viewed at a central location without port forwarding. A Matrix NVR was placed at the central location, and all the cameras from different locations were connected to it. This allowed streams from all twelve locations to be viewed on a single screen. In this way, Matrix helped the automobile giant maintain process compliance in its stores throughout the country. Centralized Control Better Brand Management Elimination of Compliance Check Costs Enhanced Security Employee Discipline Matrix products used: SATATYA CIBR13FL40CW: 1.3MP IP BULLET CAMERA SATATYA CIDR13FL40CW: 1.3MP IP DOME CAMERA SATATYA NVR24P: 24-CHANNEL NETWORK VIDEO RECORDER WITH 6TB STORAGE SUPPORT
The 9th BRICS Summit was successfully held in Xiamen, China from September 3rd-5th, 2017, where leaders of the five member-countries were in attendance. Building on its success in providing a comprehensive security solution for the G20 Hangzhou Summit in 2016, the 9th BRICS Summit was yet another accomplishment for Dahua. The 2017 BRICS Xiamen Summit demanded high-level protection for national leaders from Brazil, Russia, India, China, and South Africa. As Xiamen’s city center is located on an island, the security system required comprehensive surveillance of all roads leading into the area, also known as the “Four Bridges and One Tunnel” network.Dahua provided 1723 bullet cameras, 379 PTZ cameras, 226 vehicle checkpoint cameras, 116 Face Recognition cameras, 10 mobile 4G PTZ cameras Protection Through Dahua Technology In addition to roads leading into the city, routes to and from the airport, hotels, and the Xiamen International Conference & Exhibition Center needed to be protected as well. A solution of this proportion would also require an advanced, automated, and centralized system to ensure efficient, coordinated responses. With its cutting-edge IP camera, video cloud, network storage, and transmission technologies, Dahua was up to the task of securing Xiamen and the BRICS venues. In total, Dahua provided 1723 bullet cameras, 379 PTZ cameras, 226 vehicle checkpoint cameras, 116 Face Recognition cameras, 10 mobile 4G PTZ cameras, and many other advanced Dahua products and services used in various areas of the city. The BRICS security command center, administered by the Public Security Department of the Xiamen, was fitted with a Dahua visual emergency dispatch and command system. The center’s large display wall was stitched together with Dahua edgeless HD LED panels, enabling a complete picture of all units under command center control during the meeting, greatly simplifying control and responses. The security system surrounding the Xiamen International Conference & Exhibition Center as well as the visual emergency dispatch and command system in the security command center both adopted a full range of Dahua video surveillance and display solutions. Dahua employed advanced technologies such as intelligent analysis and big data, to increase the efficiency of emergency command and management capabilities Live Video Security On The Road A customized Dahua Mobile Solution with GPS positioning and in-vehicle wireless image transmission system was installed on 228 patrol cars and 72 special cars from the Xiamen Public Security Bureau, which was used to clear the way for Summit leaders. This provided the command center with a continuous live overview of all areas while providing support for the handling of various emergencies. Dahua contributed to the security of other key areas including the Xiamen Airport, train station, ferry piers, and police checkpoints In order to secure “Four Bridges and One Tunnel” access points, Dahua employed advanced technologies such as intelligent analysis, big data, and video analytics to significantly increase the efficiency of emergency command and information technology management capabilities, providing uninterrupted HD video surveillance and smart road event monitoring on bridges and tunnels. In addition, Dahua also contributed to the security of other key areas including the Xiamen Airport, train station, ferry piers, and police checkpoints. In surrounding Haicang and Jimei districts, Dahua constructed video surveillance on routes and sites which held key activities in the city, achieving full coverage of places such as guarded routes, main roads, key sites, as well as surrounding areas and regions of elevated risk. Dahua Securing Public Safety Dahua also played a role in safeguarding conference-related affairs such as catering, accommodation, and travel. The hotels in which leaders stayed in and surrounding areas were upgraded to HD systems in a short amount of time, making sure the leaders were secure while they rested during the Summit. The mobile law enforcement surveillance system assisted the Xiamen Market Supervision Commission in guaranteeing the provision of safe food during the Summit. The three day BRICS Summit concluded without a hitch. National leaders and their delegations were able to smoothly move about the city and attend the conference while Dahua products prevented threats through a vast network of smart video technologies. In addition, the large-scale project significantly upgraded Xiamen’s city surveillance system and provided a long-term foundation for not only public security-related operations, but also broader public projects such as the Xiamen Wireless Image Transmission System.
The Sinan Erdem Dome is the largest multi-purpose indoor venue in Turkey. Located in Istanbul, the dome has a seating capacity of up to 22,500, and hosts a number of events, including concerts, tennis matches, and basketball games. Strengthening Stadium Security Upon being chosen to host a number of games during the European Basketball Championships 2017, the chief European men’s international basketball competition held biannually, the Sinan Erdem Dome looked to strengthen their security system. The dome’s large-scale presented high-surveillance requirements such as support for 64 split-screens, hundreds of cameras, and a back-end storage and management infrastructure that could support the entire system. Dahua provided the dome with a complete, high-end monitoring system that included a total of over 600 IP, speed dome, and ANPR cameras on the front-end, and NVRs, video walls, video matrix devices, and related control accessories on the back-end. Smart Detection Technologies The dome’s surveillance system was constructed with the latest cutting-edge technology To better protect the stadium from a variety of threats, the solution employed a number of smart detection technologies such as intelligent analysis, which includes motion detection, tripwire, intrusion, and smart-tracking functionality. ANPR was also utilised, which recognises license plates numbers and checks them against a central whitelist and blacklist. Plate records are also stored on NVR devices and can be searched through by security officers. In less than a week, the local team completed installation, testing, and customer training, and the dome was fully ready to securely host international sporting events. Protecting All Corners In under a week, the dome’s surveillance system was constructed with the latest cutting-edge technology, increasing its appeal to international events seeking venues. Dahua smart technologies automated a great number of surveillance operations, such as automatic car-barrier operation enabled by ANPR camera integration, thus greatly reducing the strain on security workers. Every corner of the stadium was covered by Dahua cameras providing high definition video, ensuring zero blind spots and optimal detail collection. In addition, Dahua showcased its customer-centric philosophy through supplying high-quality customization, technical support, operation training, and after-sales service, which guaranteed the expertise of system operators as well as long-term reliability and quick issue resolution.
The Salzburg Festival is considered the world’s finest drama and classical music festival. Siemens has equipped the specially built opera houses with state-of-the-art technology with advanced systems to ensure the perfect balance of comfort, safety and security. Founded in 1920 by theater director and producer Max Reinhardt, the Salzburg Festival has grown into a cultural event of international stature. Today nearly 260,000 visitors attend the 14 performance venues where over 200 events take place each year. Cutting-edge technology ensures utmost comfort, maximum safety and security, as well as first-class acoustics. The facilities are equipped with building automation, sound systems, stage management consoles, fire detection technology, access control and evacuation systems. Advanced Fire Safety And Access Control The fire detection system delivers maximum safety. Over 1,800 detectors monitor the many different areas throughout the festival halls. Linear detectors, flame detectors and smoke extraction systems offer high level protection of the audience and stage areas. Festival managers also have the advantage of central control and an integrated guard tour system. In an emergency, everyone on site is given clear instructions via a voice alarm system on how to exit the building safely and securely. A Siport access control system ensures that only authorized personnel gain access to the secure areas of the festival halls. Approximately 7,000 photo ID cards are issued across the site every summer across the workforce to personnel such as performers, stage technicians and administrative staff. The photo ID cards cannot be counterfeited as a special security overlay with holographic printing prevents tampering. The same card is also used for time and attendance and cashless vending in the cafeteria. Cameras enable the stage manager to monitor the stage area and other key locations Monitoring And Managing Safety And Security The stage manager is in charge of the overall coordination at the festival. This includes a wide range of procedures such as monitoring the action on stage, alerting performers in their dressing room and issuing light signals. During the performance, all the threads converge on a specially designed stage manager console, complete with touch screen for maximum ease of use. Cameras enable the stage manager to monitor the stage area and other key locations. In an emergency, the stage manager can contact the relevant services and first responders as well as organize safe evacuation over the public-address system. More than 300 loudspeaker circuits were installed for these tasks in the Mozart House and the Felsenreitschule alone. The Great Festival Hall is still being modernized, however once the work is finalized, approximately 400 loudspeaker circuits will ensure smooth operations in this one venue. Digital Sound System Network A digital network was set up to improve the acoustics in the festival halls. The sound systems and all the required components for the stage and audience arena were also provided by Siemens. Fiber-optic cables transmit all the audio data and control information digitally to the three venues. The system uses a digital time division multiplex process. Each one of the base units used has an audio data bus with 256 time slots, which carry 256 signals simultaneously. Computer-controlled loudspeakers and equalizers ensure that every audience member hears the sound not only at the same time but at the same quality. The system is self-diagnostic and as soon as a malfunction occurs, it sends relevant information to the appropriate personnel. All stakeholders benefit from the new technology; the management team, employees, performers, and audiences Climate Control System Precise control of the interior temperature and humidity is particularly important in a festival hall, so that both audiences and artists can experience the performance in comfort. To achieve this objective, Siemens designed a sophisticated climate control system using natural resources. The Alm River flows under the city of Salzburg and cold water is rerouted underneath the Great Festival Hall and used for air conditioning to maintain a temperature of 23 degrees Celsius and a humidity of 55 per cent in the concert hall. This automation system also controls ventilation and delivers fresh air to the concert halls continuously and quietly. A management station monitors more than 6,000 data points and will report the slightest disruption or deviation from the specified values to ensure continuity. Integrated Technology Solutions With a unique, integrated solution that monitors room temperature, humidity, acoustics, stage manager systems, fire detection and access control, Siemens has added considerably to the safety, security and comfort of the internationally renowned Salzburg Festival. The cutting-edge technology guarantees the best acoustics, optimal room temperature and climate, reliable fire safety, controlled access and state-of-the-art evacuation. All stakeholders benefit from the new technology; the management team, employees, performers, and audiences.
The gates that give access to the campus are equipped with Nedap long range vehicle identification readersHindustan Unilever Limited (HUL), the largest Fast Moving Consumer Goods Company in India, has chosen Nedap's security management system AEOS to secure its new corporate office in Mumbai.The Indian subsidiary of Unilever recently moved its corporate office within the city of Mumbai to a new ultramodern campus, which is spread over 12.5 acres of land and will house over 1600 employees. The campus offers various facilities to employees including convenience stores, a library, a food court, an occupational health centre, a gym and a day care centre. The idea behind the move was to integrate various business processes under ‘One HUL Campus' and to concentrate the divisions of the organization in one place.Considering that a state-of-the-art campus needs a state-of-the-art security solution, HUL decided to choose Nedap AEOS as the company's security management system. To make sure that the company's intelligence is well protected, approximately 120 doors are secured with AEOS, whereas the gates that give access to the campus are equipped with Nedap long range vehicle identification readers. Furthermore, AEOS visitor management has been implemented including the pre-registration of visitors by HUL employees. The AEOS system was implemented by Nedap's business partner in Mumbai.Nancy Wanders, Business Development Manager Asia/Pacific at Nedap, says: "This project perfectly shows the extensive possibilities of the AEOS system. Thanks to its open architecture, the functionality of AEOS is freely configurable, creating a very flexible system that can be easily adjusted to changing security needs."
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?