Sadly, active shooter incidents have become so common that they no longer grab big headlines or dominate the news cycle. A near-constant cascade of active shooter events persists in the background of our collective consciousness, a familiar drumbeat that is no less tragic because it is continuous. As more active shooter incidents occur, the security marketplace continues to implement solutions to minimize the impact, including gunshot detection. We asked this week's Expert Panel Roundtable: What...
Canadian-based video surveillance and business intelligence front-runner March Networks® announced the completion of its acquisition by Delta, a global pioneer in power and thermal management solutions. Through its subsidiary Delta International Holding Limited B.V., Delta acquired 100% of the shares in Infinova (Canada) Ltd., owner of March Networks, from Infinova International Ltd. About March Networks Headquartered in Ottawa, Ontario, Canada, March Networks is a global pioneer in enter...
Irisity AB (publ), an AI video analytics provider, continues its international expansion with the appointment of Marc Sanders as Sales Director for GCC, based in Abu-Dhabi, UAE. It continues its international expansion, opening a new sales office in the United Arab Emirates. The office, based in Abu-Dhabi, will be headed by Marc Sanders who will be responsible for managing the company’s sales activities in the Gulf Cooperation Council (GCC) countries – Bahrain, Kuwait, Oman, Qatar,...
Traffic congestion and road accidents are the toughest challenges faced by traffic management agencies across the world. With rapid global urbanization, the growing amount and type of vehicles has led to more road-related issues every year. According to a MarketsandMarkets report, the global number of cars and commercial vehicles on the road will nearly double by 2040, putting tremendous pressure on the existing urban infrastructure. Traffic management strategies Various countries have formul...
Despite the challenges resulting from the COVID-19 pandemic, nearly four in five video security systems-related businesses reported growth in the past 12 months, according to a 23-nation survey conducted by Calipsa, the market renowned provider of Deep Learning-powered video analytics. Slightly less than half of the businesses reported growth in a 2020 report. Calipsa 2021 Video Monitoring Report The Calipsa 2021 Video Monitoring Report is a look inside the industry and its biggest trends. The...
Simon Shawley, Business Development Manager at Smart R Distribution, explains “How recent advances in video recording technology means that installers can help end-user clients to extend the life of their existing analog CCTV systems, while enabling them to migrate to a full IP network based video surveillance system, at their own pace.” IP network-based video surveillance solutions offer users significant advantages over traditional analog CCTV systems. These include the ability to...
SALTO Systems (SALTO) has introduced the XS4 Original+, the next generation of the world’s most flexible and reliable smart locking solution that features a beautiful design, with a sleek flat reader in two new colors. SALTO XS4 Original+ The new SALTO XS4 Original+ takes the trusted and proven flagship XS4 Original electronic lock product family and incorporates the latest technology, to accommodate access control needs of both today and tomorrow. Our customers, partners and users rely on the XS4 every day, which is why we’ve made XS4 Original+ more powerful" “Our customers, partners and users rely on the XS4 every day, which is why we’ve made XS4 Original+ more powerful, capable, and redefined to elevate any door’s security, and management,” said Marc Handels, SALTO Systems’ Chief Technology Officer (CTO). Marc Handels adds, “When you have an excellent product like the SALTO XS4 Original electronic lock that has withstood both the test of time and technology, it makes sense to improve upon what is already working very well.” Embedded with BLUEnet functionality The SALTO XS4 Original+ design is based on the same proven housing and mechanical mechanisms of the XS4 Original. The XS4 Original+, however, is embedded with SALTO’s BLUEnet real-time functionality and SVN-Flex capability, which enables SALTO stand-alone smart XS4 Original+ locks to update user credentials directly at the door. The SALTO XS4 Original+ is compatible with the array of SALTO platform solutions, including SALTO Space data-on-card, SALTO KS Keys as a Service cloud-based access solution and SALTO’s JustIn Mobile technology for digital keys. The XS4 Original+ also includes RFID Mifare DESFire, Bluetooth LE, and NFC technology functionality. “By incorporating the latest in technology into the XS4 Original+ locking range, SALTO has delivered a product that extends up-to-date and comprehensive electronic access control to any door,” said Handels. Engine of XS4 Original+ XS4 Original+ is much faster than the XS4 Original, delivering more performance, new security architecture" The XS4 Original+ is much faster than the XS4 Original, delivering more performance, new security architecture, and the same electronic functionalities, which is based on BLUEnet connectivity, and better power efficiency. The feature rich new security architecture, which is protected against internal and external attacks, makes everything more fluid, transforming the way users’ access, operators manage, and installers’ set-up the electronic lock. Catering to a range of access and customer needs There is an XS4 Original+ model for every type of access and customer need. The existing XS4 Original models are fully available in the XS4 Original+ product range, from the key override option to mechanical or electronic privacy models. Just as with the original version, the SALTO XS4 Original+ is suitable for a wide range of customer applications, including interior doors in educational or commercial buildings or tailored solutions for other specific building requirements. Easy to install and retrofit Easy to install and retrofit, the SALTO XS4 Original+ works with ANSI, Euro, DIN, and Scandinavian door industry standards. Universally compatible, it can replace the existing door hardware and fits any door with unlimited model options. XS4 Original+ wide reader models are slightly wider and the reader is now flatter. “SALTO has long sought feedback from our end-users and partners on what they desire in an upgrade and, taking their input into account, we have developed the XS4 Original+ which delivers everything needed for current and future smart lock solutions,” said Aznar Sethna, SALTO Systems’ Chief Sales & Marketing Officer (CSMO). Aznar Sethna adds, “With restyle designs, industry-leading performance and advanced access control features, with impressive communication capabilities, all with incredible durability, the XS4 Original+ ensures customers get secure and safe access, when they need it.” Redefined and stylish design The XS4 Original+ works with existing XS4 Original door hardware. A broad range of different models and functions make smart access to any door possible, in order to cover all needs of any type of building. Visually, the XS4 Original+ differs from the conventional XS4 Original only in a few details, with improved reader aesthetics. Thanks to a sleek design update, the XS4 Original+ looks better than ever Thanks to a sleek design update, the XS4 Original+ looks better than ever. The reader is now flatter and available in black and white color options, for a simplified, modernized front. The ANSI, Euro Wide, and Scandinavian Wide standard reader models are a little wider, thereby creating a more harmonious version. The XS4 Original+ can be tailored to varying building and door needs, with a wide variety of colors and finishes, including the new Dark Bronze finish, and black or white reader options. These can be visualized on a wide range of door styles, by using the SALTO MyLock Configuration tool. Environment friendly access control solution The XS4 Original+ is designed to minimize its impact on the environment. Today, SALTO Systems is carbon neutral for corporate factory operations and is committed to having net-zero climate impact, across the entire business, which includes manufacturing supply chains and all product life cycles. The XS4 Original+ is the latest model from SALTO to be delivered to customers as a net CO2-neutral access control solution. This concept involves offsetting the CO2 emissions generated during the manufacturing process and the logistics until it is delivered to the customer.
Intersec, the globally renowned emergency services, security, and safety event, has announced that ex-MI6 Chief, Sir Alex Younger is one of the first announced international headliners, speaking for the first time in the UAE, as a guest speaker. Ex-MI6 Chief, Sir Alex Younger Alex Younger joined the United Kingdom’s Secret Intelligence Service (SIS), also known as MI6, in 1991 and served as a Diplomat and Undercover Operative. He was appointed Chief or ‘C’ of MI6 in 2014 and retired in 2020, making him the longest-serving Chief in 50 years. Throughout his career, Alex was posted to the Middle East in highly sensitive roles Throughout his career, Alex was posted to the Middle East in highly sensitive roles. He also acted as the Senior SIS Officer in Afghanistan, a position that marks him out as one of the world’s top authorities, on matters related to human rights in the country. Intersec’s Global Security Leaders’ Summit He will be sharing his unique insights, as the best minds in the industry gather, between January 16-18, 2022, at Intersec’s Global Security Leaders’ Summit, one of six conferences at the event, with hard-hitting discussions featuring global leaders debating and exchanging perspectives on challenges, strategic initiatives, and cooperation, to foster safety and security of all. The full program features over 500 speakers, the largest conference platform for the sector on a world-class stage. Commenting on his participation at the event, Sir Alex Younger said, “I am delighted to be speaking for the first time in the UAE at Intersec, and at a time when conversations for the Security and Safety industry has been thrust into the spotlight from recent global events.” He adds, “The Middle East has always fascinated me - the ever-shifting intricate dynamics of geopolitical relationships in the region and the impact they have internationally create a complex security landscape that I have been immersed in for much of my career.” Intersec 2022 For this industry, Intersec offers the most valuable platform for knowledge exchange" Alex Younger stated, “For this industry, Intersec offers the most valuable platform for knowledge exchange, on the protection of citizens from existing and future threats, and I look forward to sharing my perspective on a topic, which remains a global priority.” Sir Alex Younger is recognized for his unrivaled understanding of the region and has also spoken widely on matters pertaining to human rights in Afghanistan, academic freedom, and the geopolitical nature of China’s digital and technological interests in western infrastructure. Intelligence and security community veteran Alex Nicholl, Messe Frankfurt Middle East’s Head of Intersec, said “Intersec’s commitment to bringing the brightest, most qualified experts to the stage in 2022 is at the forefront of our strategy, to deliver the most relevant content for our audience. Sir Alex Younger is undoubtedly a legend in the intelligence and security community, and his storied career in the Middle East makes him the perfect addition to our conference line-up.” Alex adds, “This is Mr. Younger’s first time speaking publicly in the UAE and his participation underscores the value Intersec is bringing to its visitors, with exclusive opportunities, to engage with and learn from the very best in the industry. We are delighted to have Sir Alex onboard and look forward to welcoming him at the show.” Safety and security of future generations The 23rd edition of the flagship event is being held under the patronage of His Highness Sheikh Mansoor Bin Mohammed Bin Rashid Al Maktoum, at the Dubai World Trade Center, in Dubai, UAE, and will be focused on the theme of ‘Uniting the world’s leading industry specialists for the safety & security of future generations.’ Demonstrating Intersec’s strategic importance to the UAE, Official Supporters include Dubai Police, Dubai Civil Defense, Security Industry Regulatory Agency (SIRA), the UAE Cyber Security Council, and Dubai Municipality.
The new IDIS Intelligent Video Wall Station, designed as a simple plug-in for the cost and license-free IDIS Center VMS, brings the benefits of video wall services to a wider market, including smaller and mid-sized customers. The new offering makes it easier for businesses to plan, design, configure, and use dynamic video walls. It lets them optimize safety and security, with centralized monitoring for single or multiple-sites, without the traditional price tag. IDIS Intelligent Video Wall Station Integrating seamlessly with IDIS’ full line-up of network and analog cameras and devices, as well as third-party technologies, the IDIS Intelligent Video Wall Station uses a single server and network wall controller, to manage up to 12 UHD monitors as standard. The station connects up to 4,096 cameras and lets operators monitor 64 panes simultaneously, including de-warped 360-degree fish-eye video. Now, users can easily customize their monitors to display the most critical video streams and event data, to provide a real-time visual overview. Fast and efficient incident response The new solution combines remote and straightforward configuration with batch firmware updates Advanced features enable a quicker and more efficient incident response, paired with smoother and more dynamic video search, playback, and forensic export. The new solution combines remote and straightforward configuration with batch firmware updates, simple role-based access management, audit trails, and device health monitoring. For customers, this results in increased efficiency and minimal maintenance, delivering on the IDIS promise of a low total cost of ownership (TCO). Designed for 24/7 video surveillance operations And with H.264 and H.265 dual codec fully supported, users can retain their existing and third-party screens, reducing waste and saving budgets, or for upgrades, they can also choose from the IDIS range of reliable, low power consumption monitors, designed for powerful, but economical 24/7 surveillance operations. The IDIS Intelligent Video Wall Station also integrates seamlessly with the enterprise-level IDIS Solution Suite VMS, making it easy to expand or adapt the system, as operational requirements change, giving customers the assurance of a future-proof investment. Dynamic video wall monitoring solution “It’s more important than ever for organizations to enhance situational awareness, while increasing efficiency,” said Andrew Myung, the President at IDIS America. He adds, “The addition of the IDIS Intelligent Video Wall Station delivers the benefits of advanced and dynamic video wall monitoring, without the need to design and build dedicated control rooms, or incur the costs of traditional VMS recurring maintenance agreements, or ongoing device connection fees.”
RaySecur, a security imaging technology company with the world’s first DHS Safety Act-designated millimeter wave (mmWave) desktop scanner, for mail and package threat detection, announced that former Boston Police Commissioner, Ed Davis has joined the company’s Advisory Board. Ed Davis will leverage his decades of law enforcement experience, in order to help RaySecur accelerate adoption of its flagship MailSecur mail and package threat detection solutions. MailSecur scanners MailSecur scanners use safe mmWaves to see inside of objects. They can detect more and smaller threats than X-ray scanners, including explosives, weapons, radiation, and other suspicious contents, as well as liquids and powders at 300x the sensitivity of X-rays. Unlike X-ray scanners, there are no safety concerns or need for specialized training. Mail threat incidents have been increasing, with the United States Postal Inspection Service (USPIS) and the Bureau of Alcohol, Tobacco, Firearms and Explosives (ATF), responding to an average of more than 10 dangerous mail or package incidents each day, for the last three years. In the last 16 months, AstraZeneca’s COVID-19 vaccine plant, Subway Sandwiches’ corporate headquarters, and Dr. Anthony Fauci have all been victims of dangerous mail threats. Mail and package threat detection Mail and package threat detection is an underestimated and vitally important component of public safety" Ed Davis stated, “Mail and package threat detection is an underestimated and vitally important component of public safety, and I’m excited to join the Advisory Board of a company that offers the only safe and scalable solution for organizations and individuals, to combat this problem.” He adds, “It’s crucial that law enforcement, enterprises, correctional facilities and government institutions have access to this technology, and ensure they can seamlessly scan every package, in a quick and efficient manner. I look forward to working with RaySecur, to help meet this important security need.” RaySecur's Advisory Board Ed Davis is the latest addition to a world-class team comprising technology, military, security and law enforcement professionals. He has a 35-year proven track record and is the President and Chief Executive Officer (CEO) of business strategy and security services firm, Edward Davis Company. Ed Davis served as the Boston Police Commissioner from December 2006 to October 2013, where he led the highly successful response to the Boston Marathon bombing. Prior to that, he was the Superintendent of the Lowell, Massachusetts Police Department for 12 years. Davis also serves on AT&T’s Advisory Board and was a former Safety Advisory Board Member at Uber. Enhancing mail security “We are honored to have an esteemed law enforcement figure, such as Ed Davis join our Advisory Board and help us continue closing the mail security gap,” said Alex Sappok, Ph.D., the Chief Executive Officer (CEO) of RaySecur. Alex adds, “Ed’s strong interest in RaySecur not only highlights the importance of improving mail security across industry and government, but also our solutions, which can easily address the problem at scale.”
Sepura’s CEO Steve Barber has been elected to the TETRA and Critical Communications Association (TCCA) Board, adding considerable experience to the leadership team of the industry body. Steve Barber brings to the TCCA Board, a thorough understanding of global critical communications’ user requirements, as well as extensive experience in supplying and manufacturing fit for purpose devices, and managing technology evolution. open critical communications standards His election pledge to commit to the development of open critical communications standards and interoperability is reinforced by Sepura’s long standing commitment to driving mission critical technology standardization and innovation. Steve Barber stated, “As a network agnostic company, focused on our customers’ needs, we have led multi-vendor interoperability for many years. This has been of significant benefit to users, giving them choice and flexibility, when selecting their communications solution and minimizing proprietary implementations that restrict the market, and slow down innovation.” Support for narrowband and broadband solutions Steve Barber plans to focus on supporting the ongoing development of both narrowband and broadband solutions Alongside his support for open standards, Steve Barber plans to focus on supporting the ongoing development of both narrowband and broadband solutions, and the evolution of 3GPP standards for mission critical markets. “TCCA is an industry-wide body and I am committed to representing all association members, rather than the interests of an individual organization,” said Steve Barber, adding “I look forward to working within TCCA and with the wider critical communications community, in the coming years.” Trusted supplier voice in the TCCA Steve Barber’s election to the TCCA Board opens a space on the TETRA Industry Working Group, which will be taken by Sepura’s Chief Technology Officer (CTO), Peter Hudson. This ensures that both current and future mission critical users have a trusted supplier voice, representing their views across the TCCA. TCCA Members who wish to discuss relevant issues with Steve Barber can contact him via the Sepura website, on LinkedIn or at the Sepura stand at major trade shows.
Kwikset, brand of Spectrum Brands, Inc. - Hardware & Home Improvement division, the globally renowned company in residential security solutions, announced the availability of the Home Connect 620, the company’s newest Z-Wave connected smart lock. Home Connect 620 smart lock The Home Connect 620, which offers a 10-button keypad with one-touch locking, is Kwikset’s first smart lock in the ‘Home Connect’ line. It is also the company’s first lock, featuring the latest Z-Wave 700 chip technology, which includes the convenience of Z-Wave SmartStart and the security of the S2 framework. The incorporation of the new Z-Wave 700 Series smart lock provides a number of significant enhancements, including wireless security features that reduce the vulnerability of the network during enrollment, as well as increased battery life. This is due to the fact that 700-Series devices consume 64% less power for wireless communication and the fact that the technology allows for resting, when the device is not being used. Furthermore, the 700-Series smart lock is expected to allow for communication that is 250% further than the Z-Wave Plus 500-Series locks, a major increase in wireless range. Featuring Z-Wave SmartStart With Z-Wave SmartStart, users can enroll devices by scanning a QR code, even before beginning installation, providing an easier and faster way to gain instant interoperability, and control of the Home Connect 620 device. The S2 framework provides an additional layer of AES 128-bit encryption of wireless signals, for increased device security. Featuring a sleek, all-metal design, choice of traditional or contemporary styling, the Home Connect 620 connected smart lock is designed to integrate with a variety of smart home systems and serves as an ideal ‘entry-level’ smart lock. Remote locking/unlocking via smartphones and tablets The Home Connect 620 delivers convenience and peace of mind to home owners The Home Connect 620 delivers convenience and peace of mind to home owners, with complete remote locking/unlocking via smartphones and tablets, as well as total home control. The Home Connect 620 can hold up to 250 user access codes and receive notifications from anywhere there is an internet connection, through a home automation system. Home owners can quickly send personalized access codes to family and guests. Mastercode feature offers enhanced security The Mastercode feature of the Home Connect 620 protects commands and settings, to prevent lock tampering and can be managed wirelessly, for additional security and lock management. “We’re looking forward to introducing the first lock in our new Home Connect line,” said Matt Zimmer, the Vice President of Marketing - Spectrum Brands HHI Security Hardware. Incorporated with Z-Wave 700 Series chip Matt Zimmer adds, “We believe dealers will be excited, because it gives home owners the opportunity to experience the comfort, convenience and safety of electronic security, and total home control, at a very cost-effective price point, as well as the technological advantages that the Z-Wave 700 chip offers.”
In the field of access control, face recognition has come a long way. Once considered too slow to authenticate people's identities and credentials in high traffic conditions, face recognition technology has evolved to become one of the quickest, most effective access control identity authentication solutions across all industries. Advancements in artificial intelligence and advanced neural network (ANN) technology from industry leaders like Intel have improved the accuracy and efficiency of face recognition. However, another reason the technology is gaining traction is due to the swiftly rising demand for touchless access control solutions that can help mitigate the spread of disease in public spaces. Effective for high volumes Face recognition eliminates security risks and is also virtually impossible to counterfeit Modern face recognition technology meets all the criteria for becoming the go-to solution for frictionless access control. It provides an accurate, non-invasive means of authenticating people's identities in high-traffic areas, including multi-tenant office buildings, industrial sites, and factories where multiple shifts per day are common. Typical electronic access control systems rely on people providing physical credentials, such as proximity cards, key fobs, or Bluetooth-enabled mobile phones, all of which can be misplaced, lost, or stolen. Face recognition eliminates these security risks and is also virtually impossible to counterfeit. Affordable biometric option Although there are other biometric tools available, face recognition offers significant advantages. Some technologies use hand geometry or iris scans, for example, but these options are generally slower and more expensive. This makes face recognition a natural application for day-to-day access control activities, including chronicling time and attendance for large workforces at construction sites, warehouses, and agricultural and mining operations. In addition to verifying personal credentials, face recognition can also identify whether an individual is wearing a facial covering in compliance with government or corporate mandates regarding health safety protocols. Beyond securing physical locations, face recognition can also be used to manage access to computers, as well as specialized equipment and devices. Overcoming challenges with AI So how did face recognition become so reliable when the technology was once dogged by many challenges, including difficulties with camera angles, certain types of facial expressions, and diverse lighting conditions? Thanks to the emergence of so-called "convolutional" neural network-based algorithms, engineers have been able to overcome these roadblocks. SecurOS FaceX face recognition solution FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces One joint effort between New Jersey-based Intelligent Security Systems (ISS) and tech giant Intel has created the SecurOS FaceX face recognition solution. FaceX is powered by neural networks and machine learning which makes it capable of authenticating a wide range of faces and facial expressions, including those captured under changing light, at different resolution levels, and varying distances from the video camera. Secure video management system A common face recognition system deployment begins with IP video cameras that feed footage into a secure video management system connected to a video archive. When the software initially enrolls a person’s face, it creates a "digital descriptor" that is stored as a numeric code that will forever be associated with one identity. The system encrypts and stores these numeric codes in a SQL database. For the sake of convenience and cost savings, the video server CPU performs all neural network processes without requiring any special GPU cards. Unique digital identifiers The next step involves correlating faces captured in a video recording with their unique digital descriptors on file. The system can compare newly captured images against large databases of known individuals or faces captured from video streams. Face recognition technology can provide multi-factor authentication, searching watchlists for specific types of features, such as age, hair color, gender, ethnicity, facial hair, glasses, headwear, and other identifying characteristics including bald spots. Robust encryption SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 To support privacy concerns, the entire system features an encrypted and secure login process that prevents unauthorized access to both the database and the archive. An additional layer of encryption is available through the use of Self-Encrypting Drives (SEDs) that hold video recordings and metadata. SED-compatible drives rely on dedicated chips that encrypt data with AES-128 or AES-256 (short for Advanced Encryption Standard). Anti-spoofing safeguards How do face recognition systems handle people who try to trick the system by wearing a costume mask or holding up a picture to hide their faces? FaceX from ISS, for example, includes anti-spoofing capabilities that essentially check for the "liveliness" of a given face. The algorithm can easily flag the flat, two-dimensional nature of a face mask, printed photo, or image on a mobile phone and issue a "spoof" alarm. Increased speed of entry Incorporating facial recognition into existing access control systems is straightforward and cost-effective Incorporating facial recognition into existing access control systems is straightforward and cost-effective. Systems can operate with off-the-shelf security cameras and computers. Users can also leverage existing infrastructure to maintain building aesthetics. A face recognition system can complete the process of detection and recognition in an instant, opening a door or turnstile in less than 500ms. Such efficiency can eliminate hours associated with security personnel checking and managing credentials manually. A vital tool Modern face recognition solutions are infinitely scalable to accommodate global enterprises. As a result, face recognition as a credential is increasingly being implemented for a wide range of applications that transcend traditional access control and physical security to include health safety and workforce management. All these capabilities make face recognition a natural, frictionless solution for managing access control, both in terms of performance and cost.
Recent cyber-attacks have disabled and even shut down physical assets. Robust foundational security and training staff, able to recognize an attack can help mitigate the threat, as ABB’s Rob Putman explains. Edge devices and data analytics As cyber security specialists, we must navigate an ever-changing threat landscape, one that is made even more complex by the increased interconnectivity between Operational Technology (OT) and Information Technology (IT), as companies look to leverage edge devices and data analytics, as well as remote connectivity, in the wake of the COVID-19 pandemic. As the threat surface evolves, the industry must guard against attacks on key physical infrastructure, carried out by a range of malicious actors, including nation states and criminals intent on blackmail. The chemicals sector, a high-value target for cyber-criminals Cyber-criminals view the chemicals sector, as a high-value target, because of the potential cost In 2017, not long after a ransomware attack that targeted Maersk, the world’s largest shipping firm, made the news around the world. Another cyber-attack, this time targeting physical industrial assets, generated fewer headlines, and yet could have resulted in both real, as well as financial, damage. Cyber-criminals view the chemicals sector, as a high-value target, because of the potential cost, both financial and reputational, to the operator, should production be interrupted or stopped entirely. Cyber security vulnerabilities put physical assets at risk The attack in question, a ‘Triton’ custom malware attack on a petro-chemical facility in Saudi Arabia, targeted a safety system, taking over system controllers. Bugs in the code triggered an emergency shutdown, but could have led to the release of toxic and explosive gases. It was a vivid reminder of how cyber security vulnerabilities are increasingly putting companies’ key physical assets at risk. Two more-recent high-profile incidents illustrate my point. In February, a Florida water treatment plant was hacked. The malicious actor remotely accessed the system for three to five minutes, during which time they opened various functions on the screen, including one that controls the amount of sodium hydroxide (NaOH) in the water. The hacker changed the NaOH from about 100 parts per million to 11,100 parts per million, which could have resulted in a mass poisoning event. Colonial Pipeline cyber-attack incident Then, in May, the Colonial Pipeline system that originates in Houston, Texas and carries gasoline, and jet fuel, suffered a ransomware attack. Using a VPN, hackers targeted back-office IT systems, forcing Colonial to shut down IT hosts and network infrastructure, severing communication with those OT systems that are responsible for communicating ‘transactional data’ associated with fuel delivery. In this instance, a single compromised password disrupted Colonial’s ability to invoice its customers. This dependency on OT data stopped pipeline and business operations, and the company was elected to pay the hackers an initial ransom of US$ 4.4 million, in order to restore operations. The Colonial attack was multi-dimensional, in that it not only impacted Colonial’s business, but also the wider US economy and national security, since the pipeline transports nearly half of the east coast's fuel supplies. Outdated IT system elevates physical risk The increased interconnectivity between IT and OT can also create vulnerabilit Attacks such as these prove that, armed with little more than a laptop, an email account and access to the dark web, determined hackers can cause disproportionate damage to physical infrastructure. As mentioned at the outset, the increased interconnectivity between IT and OT can also create vulnerability. Producers often want to know: Is it risky to connect a production asset or their operational environment to the Cloud? My answer is, if you do so without having done any risk audits around people, processes and technology, or without enhancing and maintaining that environment, then yes, that is risky. For example, we often observe that the life cycle of a production asset far outlasts the IT systems that are used to run it. Take a cement kiln. Several generations of plant operators may have come and gone, but that asset may still run, using legacy software, such as Windows XP and why not? Need to replace aging distributed control systems Well, that’s fine, if you are not concerned about having that asset compromised, and all that entails. A ‘flat’ IT network, an aging distributed control system, and machines with legacy versions of Microsoft Windows, all these elements, which are still commonplace in many industries, make it much easier for attackers to find and infiltrate a company, without needing sophisticated tools. The age-old mantra of not interfering with a piece of equipment or software that appears to be working, often applies to the individual assets. For example that cement kiln that are still controlled by the same Windows XP-based control software. However, if we’re honest, things have changed quite a bit, not because something was broken, but because innovation came in. That same kiln control system is most likely connected to other systems, than when first commissioned and that opens it to exposure to threats that it was never designed for. The human element There is a misconception that IoT-connected devices can open companies to risk There is a misconception that IoT-connected devices can open companies to risk, but many recent, high-profile cyber-attacks have been conducted from a laptop, by hacking someone’s VPN, or are a simple phishing/malware attack. In all these cases, the human element is partly to blame. Take the Florida attack. The compromised computer at the water treatment facility was reportedly running an outdated Windows 7 operating system and staff all used the same password, in order to gain remote access via the Teamviewer app, which the hacker was then able to use. Physical and human assets, key to robust cyber security Discussion on the best way to mitigate the threat is often framed solely around specific technical solutions and ignores the fact that robust foundational cyber security is really driven by two very different, but equally important, types of capital: physical assets (e.g. production machinery), and human assets. The truth is that smart digital software and industry-renowned cyber security applications, while critical, are in many cases, only as good as the weakest human link in the chain. Industry would, therefore, do well to ask itself the following question: Do we have a security problem, or a complacency problem? At this juncture, it is important to point out that the majority of companies that ABB works with, are at least aware of the threat posed by cyber attackers, and the potential impact of an attack, on their revenues, reputation and bottom line. User error and human-generated exposures Making sure staff are aware of the threat and training them to respond properly, if they are targeted, is vital However, user error and human-generated exposures are where most of these attacks occur. Those human failures are mostly not due to malicious intent from employees, but to the lack of training of the employees on secure behavior. Making sure staff are aware of the threat and training them to respond properly, if they are targeted, is vital. However, there are also age demographics at play here. Much of the operations employee base is heading towards retirement and often, there is no plan or ability to backfill these people. Need to invest in new digital and automated technologies If you think you don't have enough people now, in order to stay on top of basic care and feeding of the OT environment, with regards to security, what is that going to be like in 20 years? For this reason, there must be a major industry reset, when it comes to its workforce. Companies must invest in new digital and automated technologies, not only to ensure that they stay ahead of the curve and mitigate risk, but also to attract the next generation of digitally literate talent. Robust cyber security is built on solid foundations When we talk about foundational cyber security, we mean fundamentals, such as patching, malware protection, high-fidelity system backups, an up-to-date anti-virus system, and other options, such as application allow-listing and asset inventory. These basic controls can help companies understand their system setup and the potential threats, identify vulnerabilities, and assess their risk exposure. The Pareto principle states that around 80% of consequences come from 20% of the causes. In the context of cyber security, that means 80% of exposure to risk comes from 20% of the lack of security. If companies do the foundational things right, they can manage out a significant amount of this risk. Importance of maintaining and upgrading security controls However, having basic security controls, such as anti-virus software in place, is just the first step on that journey. Equally important is having someone within the organization, with the requisite skill set, or the extra labor bandwidth, to operate, maintain and update those security controls, as they evolve. Educating, training and recruiting existing employees, and the next generation of talent, along with forging partnerships with trusted technology providers, will ensure that industry can leverage the latest digital technologies, in order to drive business value, and secure physical assets against cyber-attacks.
It’s been almost exactly a decade since HID Global launched the world's first university pilot of smartphones carrying secure mobile IDs. A lot has changed in the following 10 years. Today’s technology has matured, advanced, and proliferated across a variety of high-value use cases. To catch up on the latest developments in mobile access, we contacted Luc Merredew, Product Marketing Director, Physical Access Control, at HID Global. Q: What has changed since the first pilot implementation of smartphones used for secure mobile identification? Merredew: One of the biggest milestones several years ago was when mobile access solutions achieved certification to the ISO 27001:2013 Information Security Management System (ISMS) standard. With increasing awareness of cloud-based security threats and resulting high expectations from a solution, today’s system owners, operators, and users insist on companies being able to demonstrate that they have had their services vetted by independent laboratories and/or agencies. When adopting mobile access solutions that maximize convenience and efficiency, and deliver dramatically improved user experiences, it is neither necessary nor acceptable to compromise security in either the physical or digital domains. Q: Do universities continue to be the biggest users? Mobile IDs on devices eliminate person-to-person credentials when accessing secured areas Merredew: The use cases have grown dramatically, spread evenly across all types of organizations in locations ranging from high-rise buildings to multi-campus global enterprises. But yes, universities continue to be big adopters, and they were among those most eager to leverage the technology so they could bring people back to campus in person during the pandemic. In this environment, mobile IDs on smartphones and other devices eliminate person-to-person credential (e.g., badge or ID card) issuance or revocation, as well as the need to physically touch cards, readers, or keypads when accessing secured areas. Q: How were mobile IDs employed by your customers as they brought people back to physical locations after the pandemic shutdown? Merredew: One example is Vanderbilt University, where the challenges of COVID-19 brought renewed attention to the importance of a modern system for identity management and access control that was compatible with Near Field Communication (NFC) and Bluetooth technologies. Members of the campus community could more conveniently access buildings and services with their mobile devices, and the university could efficiently provision and de-provision credentials remotely without person-to-person contact. More recently, Vanderbilt leveraged HID Mobile Access® to deploy campus IDs on iPhone and Apple Watch through Apple Wallet. Q: Is there another example outside the university vertical? Merredew: Another example is the iconic tower Arcos Bosques Torre 1 in Mexico City, where the owners and tenants enjoy the simplicity of using their trusted mobile devices to seamlessly access their spaces. As with the Vanderbilt deployment, the drive for operational efficiency and convenience in the tower was combined with a desire to minimize the need for users to come in physical contact with the system. Having a solution like HID Mobile Access that delivers touchless entry and increased safety and security is important. Q: What have been the biggest mobile access advancements? The mobile credential provides contactless, seamless access to a wide range of devices and services Merredew: One of the most important advancements was simplifying upgrade paths to mobile access. In the Vanderbilt example, our HID Reader Manager was used to upgrade the firmware on the university’s physical access control readers and extend support for NFC-based credentials in Apple Wallet. The university uses the HID Origo™ Mobile Identities API integrated with CS Gold®, a higher education transaction system from CBORD, for credential lifecycle management. Another significant enhancement has been the expanded range of uses cases for the mobile credential, going beyond simply opening doors to include providing contactless, seamless access to a wide range of devices and services such as time-and-attendance terminals, cashless vending machines, printers, computers, workstations, and many other applications. Q: Wearables are also having an impact. Merredew: Contactless mobile experiences are also delivered through wearable wristbands. One example is the Nymi band which, once authenticated, continuously authenticates the identity of the user until it’s removed from the wrist. This delivers zero-trust security principles and access control using convenient fingerprint and heartbeat biometrics to users seeking touchless authentication. Q: What is the impact of the cloud? Merredew: The move to a cloud-based system to issue and manage mobile identity credentials has unified, automated, and simplified identity issuance at a single facility or across any number of distributed office or remote work locations. Q: What should end users look for in a mobile access solution? Look for solutions that use a secure element in the reader as well as cloud certificates, to ensure security and data privacy Merredew: Solutions should support the largest possible number of popular mobile devices – in HID’s case, this includes more than 250. Look for solutions that use a secure element in the reader, and a secure key management process, as well as cloud certificates, to ensure both security and data privacy. Make sure the solution supports Bluetooth Low Energy (BLE), Near Field Communication (NFC), and both iOS and Android operating systems. Solutions that provide Application Programming Interface (API) and Software Development Kit (SDK) support offer direct access to the solution’s access control hardware, speeding deployment while enabling integration partners to continue innovating products that deliver even better user experiences. Q: Wonder what this market will look like in 10 more years. What’s next for mobile access? Merredew: Future innovations are on the horizon with technologies such as Ultra-Wideband (UWB) wireless connectivity, which HID expects will become ubiquitous on mobile devices. It provides unprecedented accuracy and security when measuring the distance or determining the relative position of a target. It is not HID’s expectation that UWB will replace Near Field Communication (NFC) or Bluetooth, but rather supplement Bluetooth and other technologies to provide the assurance, reliability, and granularity of device position that enables truly seamless experiences.
A new generation of video cameras is poised to boost capabilities dramatically at the edge of the IP network, including more powerful artificial intelligence (AI) and higher resolutions, and paving the way for new applications that would have previously been too expensive or complex. Technologies at the heart of the coming new generation of video cameras are Ambarella’s newest systems on chips (SoCs). Ambarella’s CV5S and CV52S product families are bringing a new level of on-camera AI performance and integration to multi-imager and single-imager IP cameras. Both of these SoCs are manufactured in the ‘5 nm’ manufacturing process, bringing performance improvements and power savings, compared to the previous generation of SoCs manufactured at ‘10nm’. CV5S and CV52S AI-powered SoCs The CV5S, designed for multi-imager cameras, is able to process, encode and perform advanced AI on up to four imagers at 4Kp30 resolution, simultaneously and at less than 5 watts. This enables multi-headed camera designs with up to four 4K imagers looking at different portions of a scene, as well as very high-resolution, single-imager cameras of up to 32 MP resolution and beyond. The CV52S, designed for single-imager cameras with very powerful onboard AI, is the next-generation of the company’s successful CV22S mainstream 4K camera AI chip. This new SoC family quadruples the AI processing performance, while keeping the same low power consumption of less than 3 watts for 4Kp60 encoding with advanced AI processing. Faster and ubiquitous AI capabilities Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions" “Security system designers desire higher resolutions, increasing channel counts, and ever faster and more ubiquitous AI capabilities,” explains John Lorenz, Senior Technology and Market Analyst, Computing, at Yole Développement (Yole), a French market research firm. John Lorenz adds, “Ambarella’s newest AI vision SoCs for security, the CV5S and CV52S, are competitive solutions for meeting the growing demands of the security IC (integrated circuit) sector, which our latest report forecasts to exceed US$ 4 billion by 2025, with two-thirds of that being chips with AI capabilities.” Edge AI vision processors Ambarella’s new CV5S and CV52S edge AI vision processors enable new classes of cameras that would not have been possible in the past, with a single SoC architecture. For example, implementing a 4x 4K multi-imager with AI would have traditionally required at least two SoCs (at least one for encoding and one for AI), and the overall power consumption would have made those designs bulky and prohibitively expensive. By reducing the number of required SoCs, the CV5S enables advanced camera designs such as AI-enabled 4x 4K imagers at price points much lower than would have previously been possible. “What we are usually trying to do with our SoCs is to keep the price points similar to the previous generations, given that camera retail prices tend to be fairly fixed,” said Jerome Gigot, Ambarella's Senior Director of Marketing. 4K multi-imager cameras “However, higher-end 4K multi-imager cameras tend to retail for thousands of dollars, and so even though there will be a small premium on the SoC for the 2X improvement in performance, this will not make a significant impact to the final MSRP of the camera,” adds Jerome Gigot. In addition, the overall system cost might go down, Gigot notes, compared to what could be built today because there is no longer a need for external chips to perform AI, or extra components for power dissipation. The new chips will be available in the second half of 2021, and it typically takes about 12 to 18 months for Ambarella’s customers (camera manufacturers) to produce final cameras. Therefore, the first cameras, based on these new SoCs, should hit the market sometime in the second half of 2022. Reference boards for camera manufacturers The software on these new SoCs is an evolution of our unified Linux SDK" As with Ambarella’s previous generations of edge AI vision SoCs for security, the company will make available reference boards to camera manufacturers soon, allowing them to develop their cameras based on the new CV5S and CV52S SoC families. “The software on these new SoCs is an evolution of our unified Linux SDK that is already available on our previous generations SoCs, which makes the transition easy for our customers,” said Jerome Gigot. Better crime detection Detecting criminals in a crowd, using face recognition and/or license plate recognition, has been a daunting challenge for security, and one the new chips will help to address. “Actually, these applications are one of the main reasons why Ambarella is introducing these two new SoC families,” said Jerome Gigot. Typically, resolutions of 4K and higher have been a smaller portion of the security market, given that they came at a premium price tag for the high-end optics, image sensor and SoC. Also, the cost and extra bandwidth of storing and streaming 4K video were not always worth it for the benefit of just viewing video at higher resolution. 4K AI processing on-camera The advent of on-camera AI at 4K changes the paradigm. By enabling 4K AI processing on-camera, smaller objects at longer distances can now be detected and analyzed without having to go to a server, and with much higher detail and accuracy compared to what can be done on a 2 MP or 5 MP cameras. This means that fewer false alarms will be generated, and each camera will now be able to cover a longer distance and wider area, offering more meaningful insights without necessarily having to stream and store that 4K video to a back-end server. “This is valuable, for example, for traffic cameras mounted on top of high poles, which need to be able to see very far out and identify cars and license plates that are hundreds of meters away,” said Jerome Gigot. The advent of on-camera AI at 4K changes the paradigm Enhanced video analytics and wider coverage “Ambarella’s new CV5S and CV52S SoCs truly allow the industry to take advantage of higher resolution on-camera for better analytics and wider coverage, but without all the costs typically incurred by having to stream high-quality 4K video out 24/7 to a remote server for offline analytics,” said Jerome Gigot. He adds, “So, next-generation cameras will now be able to identify more criminals, faces and license plates, at longer distances, for an overall lower cost and with faster response times by doing it all locally on-camera.” Deployment in retail applications Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once Retail applications are another big selling point. Retail environments can be some of the toughest, as the cameras may be looking at hundreds of people at once (e.g., in a mall), to provide not only security features, but also other business analytics, such as foot traffic and occupancy maps that can be used later to improve product placement. The higher resolution and higher AI performance, enabled by the new Ambarella SoCs, provide a leap forward in addressing those scenarios. In a store setup, a ceiling-mounted camera with four 4K imagers can simultaneously look at the cashier line on one side of the store, sending alerts when a line is getting too long and a new cashier needs to be deployed, while at the same time looking at the entrance on the other side of the store, to count the people coming in and out. This leaves two additional 4K imagers for monitoring specific product aisles and generating real-time business analytics. Use in cashier-less stores Another retail application is a cashier-less store. Here, a CV5S or CV52S-based camera mounted on the ceiling will have enough resolution and AI performance to track goods, while the customer grabs them and puts them in their cart, as well as to automatically track which customer is purchasing which item. In a warehouse scenario, items and boxes moving across the floor could also be followed locally, on a single ceiling-mounted camera that covers a wide area of the warehouse. Additionally, these items and boxes could be tracked across the different imagers in a multi-headed camera setup, without the video having to be sent to a server to perform the tracking. Updating on-camera AI networks Another feature of Ambarella’s SoCs is that their on-camera AI networks can be updated on-the-fly, without having to stop the video recording and without losing any video frames. So, for example in the case of a search for a missing vehicle, the characteristics of that missing vehicle (make, model, color, license plate) can be sent to a cluster of cameras in the general area, where the vehicle is thought to be missing, and all those cameras can be automatically updated to run a live search on that specific vehicle. If any of the cameras gets a match, a remote operator can be notified and receive a picture, or even a live video feed of the scene. Efficient traffic management With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself Relating to traffic congestion, most big cities have thousands of intersections that they need to monitor and manage. Trying to do this from one central location is costly and difficult, as there is so much video data to process and analyze, in order to make those traffic decisions (to control the traffic lights, reverse lanes, etc.). With the CV52S edge AI vision SoC, those decisions can be made locally at each intersection by the camera itself. The camera would then take actions autonomously (for example, adjust traffic-light timing) and only report a status update to the main traffic control center. So now, instead of having one central location trying to manage 1,000 intersections, a city can have 1,000 smart AI cameras, each managing its own location and providing updates and metadata to a central server. Superior privacy Privacy is always a concern with video. In this case, doing AI on-camera is inherently more private than streaming the video to a server for analysis. Less data transmission means fewer points of entry for a hacker trying to access the video. On Ambarella’s CV5S and CV52S SoCs, the video can be analyzed locally and then discarded, with just a signature or metadata of the face being used to find a match. No actual video needs to be stored or transmitted, which ensures total privacy. In addition, the chips contain a very secure hardware cyber security block, including OTP memory, Arm TrustZones, DRAM scrambling and I/O virtualization. This makes it very difficult for a hacker to replace the firmware on the camera, providing another level of security and privacy at the system level. Privacy Masking Another privacy feature is the concept of privacy masking. This feature enables portions of the video (say a door or a window) to be blocked out, before being encoded in the video stream. The blocked portions of the scene are not present in the recorded video, thus providing a privacy option for cameras that are facing private areas. “With on-camera AI, each device becomes its own smart endpoint, and can be reconfigured at will to serve the specific physical security needs of its installation,” said Jerome Gigot, adding “The possibilities are endless, and our mission as an SoC maker is really to provide a powerful and easy-to-use platform, complete with computer-vision tools, that enable our customers and their partners to easily deploy their own AI software on-camera.” Physical security in parking lots With a CV5S or CV52S AI-enabled camera, the camera will be able to cover a much wider portion of the parking lot One example is physical security in a parking lot. A camera today might be used to just record part of the parking lot, so that an operator can go back and look at the video if a car were broken into or some other incident occurred. With a CV5S or CV52S AI-enabled camera, first of all, the camera will be able to cover a much wider portion of the parking lot. Additionally, it will be able to detect the license plates of all the cars going in and out, to automatically bill the owners. If there is a special event, the camera can be reprogrammed to identify VIP vehicles and automatically redirect them to the VIP portion of the lot, while reporting to the entrance station or sign how many parking spots are available. It can even tell the cars approaching the lot where to go. Advantages of using edge AI vision SoCs Jerome Gigot said, “The possibilities are endless and they span across many verticals. The market is primed to embrace these new capabilities. Recent advances in edge AI vision SoCs have brought about a period of change in the physical security space. Companies that would have, historically, only provided security cameras, are now getting into adjacent verticals such as smart retail, smart cities and smart buildings.” He adds, “These changes are providing a great opportunity for all the camera makers and software providers to really differentiate themselves by providing full systems that offer a new level of insights and efficiencies to, not only the physical security manager, but now also the store owner and the building manager.” He adds, “All of these new applications are extremely healthy for the industry, as they are growing the available market for cameras, while also increasing their value and the economies of scale they can provide. Ambarella is looking forward to seeing all the innovative products that our customers will build with this new generation of SoCs.”
BIM (building information modeling) provides a process for creating and managing information during the building lifecycle and beyond. BIM is often equated with 3D modeling of construction projects, but the visual component is just part of the value of BIM. Additional data, such as specifications and other documentation, is also part of the process, underlying the visual aspects, helping to drive decision making and providing immediate access to detailed information about all facets of the building process. Incorporating BIM systems For the last six years, ASSA ABLOY Opening Solutions has worked with specification writers and architects in Europe, the Middle East, and Africa (EMEA) to make it easy to incorporate ASSA ABLOY Opening Solutions doors, hardware, and security solutions into BIM systems. Everyone on a project can work together in the interactive and information-rich BIM environment. BIM tools are also used by contractors, distributors, facility owners, and security consultants. BIM software BIM information relating to doors, hardware, and security solutions is available in the cloud BIM information relating to doors, hardware, and security solutions is available in the cloud with the company’s Openings Studio BIM software. This improves the process of door scheduling and visualization and enables customers to focus on the design, installation, and management of openings. “If you have up-to-date information inside the BIM model, you can reduce mistakes and misunderstanding in the building industry,” says Marc Ameryckx, ASSA ABLOY Opening Solutions’ BIM Manager for the EMEIA region. “It helps to eliminate mistakes before they happen or as early as possible in the building process. The earlier, the less it costs. We provide data as soon as possible in the process.” (ASSA ABLOY Opening Solutions also has comparable systems available in other regions of the global company.) Centralized data in BIM 3D model Expanding the data available in BIM provides additional value compared to merely providing “BIM objects” that can be incorporated into a BIM 3D model. The combination of BIM modeling and the underlying specifications boosts the quality of the project and its key to success, says Marc Ameryckx. Even after the building is complete, the BIM model is still valuable, providing a repository of “as-built” information that can be used by building managers and security professionals tasked with operating and maintaining the building. For example, if a lock needs to be replaced, retrofitting is simpler because all the information about the lock and existing installation is available in a centralized data file. Revit and ArchiCAD A widely used BIM software is Revit from Autodesk, a program that brings architecture, engineering, and construction disciplines into a unified modeling environment to drive more efficient and cost-effective projects. Another BIM software program is ArchiCAD, developed by the Hungarian company Graphisoft. Openings Studio™ added a plugin for ArchiCAD this year, in addition to Revit. Tailor-made information security solutions We provide tailor-made information security solutions with various hardware on projects with more doors" “We can provide tailor-made information security solutions with various hardware on projects with more doors, adding more flexibility,” says Marc Ameryckx. “Customers do not need to be the experts on the products because we provide expertise as part of our specifications.” For example, how often do building mistakes occur because of a misunderstanding about the electrical needs of a lock and the wrong cabling is installed? The problem is especially expensive if it is discovered only after the walls are complete. Providing complete data about the electrical lock as part of a BIM system avoids the snafu. Another example is the specification of a deadbolt lock on a door that operates with an electric strike. The deadbolt undermines the intended operation of the electric strike and can interfere with escape routes in case of an emergency. The mistake becomes obvious in the BIM environment and can be rectified before consequences impact the real world. Data addition to Opening Suites site ASSA ABLOY Opening Solutions is continuously expanding the data it provides at the Opening Suites site, covering additional functionality and more components including the door, cabling, and electrical connections. Hardware sets are linked to specific doors in the BIM models, including all the details of various components, including article numbers, technical sheets, electrical requirements, all depending on customer expectations. Physical equipment includes QR codes that can be scanned by a smartphone to provide information on the door (A cellphone app is in development). More details and more data Experienced BIM consultants work with the Openings Studio software on projects ranging from single doors to large buildings with many doors. Data will be more and more important, and there will be more data inside BIM models Adding more data and detail to the BIM process at the level of each door expands the usefulness of BIM, which has historically been focused on broader issues such as structural work and HVAC. “Openings Studio™ provides all the data to integrate doors and security in the BIM process,” says Marc Ameryckx. The higher level of detail may be a new aspect even for customers who already use BIM software. “Data will be more and more important, and there will be more data inside BIM models,” says Marc Ameryckx. In the future, the use of “digital twins” could expand the capabilities even further; for example, the software could simulate escape routes in case of fire. More data makes more things possible.
Following a change in employment practices, created by the COVID-19 pandemic, many office-based employees now follow a hybrid schedule, working where they are needed or find convenient. The fast-growing use of flexible offices and co-working spaces is a testament to this emerging trend. With employees coming and going as they please, a change in how security and access control are managed is an urgent, but overlooked aspect that many firms are just waking up to now. Clockwise, renowned office space provider Clockwise is the UK and European provider of flexible office space for entrepreneurs and established businesses. The company’s expanding offering includes contemporary offices, meeting rooms, and shared workspaces, across multiple cities. Any business, which relies on flexibility, places high demands on door security and access control. Clockwise needs a broad choice of electronic devices to secure meeting rooms, private offices, communal spaces, and main entrances, which may not all require the same lock type. Access management should adapt to changing needs Access management must be able to adapt and change, as fast as Clockwise clients’ needs The office space demands of a start-up, freelance co-worker, or growing SMB can change at any time, so Clockwise offer a range of membership levels and packages. Access management must be able to adapt and change, as fast as Clockwise clients’ needs. Because tenants come and go frequently, Clockwise facility managers need tailoring of user access rights, to be as easy as possible. Clockwise’s own spaces and a portfolio may also evolve, so any access system must be able to scale instantly up or down. How flexibly Clockwise can deliver for their clients is essential to growing in such a competitive market. Incedo Business offers versatile access control The range of Incedo-enabled devices and door hardware, managed by simple cloud-based software, convinced Clockwise to choose ASSA ABLOY Opening Solutions’ Incedo Business, for all their premises. This platform-based access solution connects security software and hardware within a single, future-proofed ecosystem. The diversity of Incedo-enabled devices enables Clockwise to select the ideal electronic lock for every opening in their properties. Internal private office doors, ‘Zoom rooms’ and meeting rooms, as well as communal area doors, and entrance/exits, are now secured with wireless access control devices from the Incedo Business range. Flexible system management options Incedo’s flexible system management options help Clockwise to operate access control with maximum efficiency. Administrators quickly create groups with tailored access for specific doors. Access permissions may also be time-limited, which is perfect for meeting room bookings or for facilitating access hours for different membership options. Private desk members get 24/7 admission, whereas hot-desk membership is only allowed entry during office hours. According to Clockwise, the flexibility to create groups and the ability to remotely update cards, both work really well for their business.
Being isolated on the edge of wilderness means there’s a need for a video system that is both reliable and flexible. For that reason, the team at Jackson Hole Airport (JAC), since 2009, has relied on video management software (VMS) from Milestone Systems, to enhance security, safety, and efficiency at the airport. Milestone XProtect VMS installed At the edge of the frontier, Jackson Hole Airport has experienced considerable growth over the years. Significant capital investments in expansions have made new video system integrations possible several times and Milestone XProtect VMS has supported the airport’s needs along the way. As of 2020, over 220 cameras are in use, but the airport shows no signs of slowing down As of 2020, over 220 cameras are in use, but the airport shows no signs of slowing down. New projects will include building a fuel farm, a car wash, and expanded parking facilities. As the need to increase security continues, XProtect open platform software will enable IT team growth and the seamless integration of new cameras, and data storage capabilities. Enhanced situational awareness All video is kept for up to a full year, with most of the system’s cameras set for motion recording, around the clock. As a result, administrators achieve greater situational awareness and better security. The video system has enabled improvements throughout the entire airport. For example, Jackson Hole Airport contends with a great deal of plane de-icing, for several months each year. The process occurs at a distance from the main buildings. Thanks to the video expansion, each airline is now able to monitor the de-icing of their planes. Allowing airline personnel to monitor progress on their own has saved airport staff time and resources. Monitoring security In addition, the airport uses the system to closely monitor the security checkpoint, to capture video documentation, in case of an incident. By monitoring baggage areas, it’s possible to investigate lost bags and left-behind items, by reviewing recorded video. New 4K multi-sensor cameras support an investigatory system, helping staff see previously uncovered areas. The cameras capture high-resolution video and provide enough data to zoom in, after the fact. Deployed Agent Vi’s video analytics Milestone Systems’ XProtect Smart Client has improved general situational awareness in the airport Additionally, the team has deployed video analytics from Agent Vi, to provide a layer of automated alarms, for flagging abnormal occurrences. For example, video analytics can detect travelers moving against the foot traffic flow and crossing into restricted areas. Milestone Systems’ XProtect Smart Client has improved general situational awareness in the airport. Authorized users now have a new standard for accessing surveillance remotely. It provides seamless viewing of live and recorded video, instant control of cameras and connected security devices, and a comprehensive activity overview. Force multiplication using advanced technology The ongoing use of Milestone’s VMS makes it possible to maintain the independence and efficiency of a small team of personnel, delivering maximum security at the edge of a wild frontier. Andrew Wells, IT Manager for the Jackson Hole Airport, said “Situational awareness for our team and our clients allow us to be as secure and efficient as possible, with our small team. The flexibility of the open platform VMS allows us to scale our system and add the features we need now and in the future.” Jackson Hole Airport Jackson Hole Airport lies seven miles north of Jackson, Wyoming, at the base of the Teton Mountains, in the USA. It is unique for being entirely within the Grand Teton National Park limits. It is the busiest airport in the state of Wyoming, with nearly 500,000 in-bound passengers welcomed annually. The Jackson Hole Airport covers over 500 acres of land area and has one runway, nine boarding gates, and three baggage carousels.
Dahua Technology is a globally renowned video-centric smart IoT solutions and services provider. Based on technological innovations, Dahua Technology offers end-to-end security solutions, systems, and services, in order to create value for city operations, corporate management, and consumers. Dahua Technology has designed a video surveillance and control solution for a popular Panamanian Food Company - Empresa Panamena de Alimentos (EPA). Dahua’s Security solution Empresa Panamena de Alimentos is a renowned company in the processed food industry in Panama, Central America. It was founded in 2012 and owns production plants and warehouses in the capital city, as well as agencies around the country. EPA’s products, including all kinds of cookies, coffee, and pasta, are already important parts of consumers’ day-to-day life. With the prevailing COVID-19 pandemic risks, EPA needed a system to sustain efficient management and operation, over their staff and facilities. Implementing multiple access controls in the facilities As a food company, the operations of the company need to be under caution, especially during the pandemic As a food company, the operations of the company need to be under caution, especially during the pandemic. It was necessary to implement multiple access controls in the facilities. With multiple plants located around the nation and accelerated growth, a centralized monitoring system for all equipment, alert management and user reports was needed. The solution, applied at EPA’s facilities, integrates various electronic security systems under a single platform and was evaluated based on the company’s needs. ANPR, AI-based cameras and access control systems “Currently, 480 Dahua devices have been arranged. Among them are different models of cameras, access control systems, and automatic number plate recognition products. AI-based cameras enhance the level of personnel protection. Everything is monitored by a DSS Express server in the main plant,” said Luis Araujo, the Manager of Infrastructure and Telecommunications of the Secutec Panama. Every day, more than 800 employees enter EPA facilities nationwide, the access control system allows a faster and safer automated entry of the staff and their cars. access controllers and Pro Network Video Recorders Besides, three Pro Network Video Recorders (NVR5864-4KS2) were also adopted Apart from automatic number plate recognition (ANPR) devices, more than 20 access controllers (ASI7213X-T1) were installed in main offices for temperature monitoring and attendance management. Besides, three Pro Network Video Recorders (NVR5864-4KS2) were also adopted. With a powerful processor, they have the capability of 4K resolution processing and high definition recording quality. Perimeter protection and access control In Dahua Technology’s security solution, perimeter protection and access control are both realized. “We have had Dahua equipment for 7 years. It is a brand that has been of great help to our safety. It has contributed to continuous and steady operations throughout the COVID-19 pandemic,” said Guillermo Figueroa, EPA’s Safety and Control Manager. Javier Rodríguez, Secutec Panama’s Operations Manager, valued the quality and technology of Dahua’s solution, which has been ‘key’ for the development of their projects, the support and accompaniment to the brands that are planned to be developed. Trust in Dahua Technology’s solution “We are very proud that our teams are here for EPA and that companies, like EPA and Secutec, trust Dahua Technology. We continue to innovate to offer solutions that help companies to work in a safer and smarter way,” said Fermín Osorio, an Engineer at Dahua Technology Ltd.
The Prague city administration together with the Criminal Investigation Department relies on security technology from Germany-based Dallmeier in Prague's Wenceslas Square, one of the largest city squares in Europe with an area of 45,000 square meters, and the Old Town Square. Wenceslas Square and Old Town Square in Prague are both steeped in history, and now as ever before remaining important hubs for tourism and traffic. To ensure the safety of the streams of people and vehicles in these places, when it comes to security equipment the Prague city administration relies on a combination of conventional cameras and a solution from the Regensburg company Dallmeier. From horse market to commercial thoroughfare Wenceslas Square in Prague was created in the 14th century and originally served as a horse market, as was reflected in its name. It was renamed "Wenceslas Square" in 1848 in tribute to Saint Wenceslas of Bohemia. Since the 19th century, the function of the square has evolved from that of a place for trading horses to a busy commercial district. The function of the square has evolved from that of a place for trading horses to a busy commercial district It is used by pedestrians, cyclists, motor vehicles, and local public transport alike, and so constitutes a major confluence point in Prague's New City. The city administration attaches great importance to ensuring that all these traffic elements can coexist in harmony, and to have a general overview of what is happening, the administration together with the police criminal investigation department rely on the sharp "eyes" of the Panomera®. Tourist magnet Old Town Square Panomera® also provides security in the 9000 square meter Prague Old Town Square. The Old Town Square is the historic heart of the city and attracts thousands of tourists every year with its atmosphere, sights, and markets. Its history dates to the 11th century, and it has always been a crossroads for commerce and a marketplace. It is a magnet for tourists and its borders abound with restaurants, museums, galleries, and shops. The astronomical clock on the tower of the Old Town Hall is one of the most well-known sights in Europe. Advantages of Panomera® technology for monitoring The solution for both Wenceslas Square and Old Town Square consists of Panomera® models from the Topline series. The Panomera® multifocal sensor system can provide coverage for vast expanses and areas. Infrastructure costs are also lower since a single Panomera® captures a much larger area and fewer installation points The combination of general overview with the highest possible resolution of details is very important, particularly for large squares, and with this camera technology more remote objects can also be displayed with the same resolution as objects in the image foreground. Several operators can zoom into the same image at the same time. Even then, the overall scene always remains in view and the recording continues. Where previously several megapixel cameras would have been needed, the users' workload has been reduced significantly, because fewer images must be captured. Infrastructure costs are also lower since a single Panomera® captures a much larger area and fewer installation points are needed. For customers, this means savings not only in terms of infrastructure but also regarding operation and management, so total operating costs are reduced. Planning that delivers In the project planning phase, the Dallmeier 3D specialist team consisting of engineers and graphic designers created a three-dimensional simulation of the customer's environment. In the 3D model, the team simulated the real camera models and locations/installation sites, and thus also angles of vision and ranges. The completed 3D model was presented to the customer jointly with integration partner KH Servis in Prague and comprised the entire solution including the cameras and other essential components. The city administration and police authorities were delighted by this manner of project visualization because this approach also allowed an accurate calculation of costs to be made, giving the customer certainty regarding the cost and scope of the project. "What we plan is what you get" 3D planning also guarantees that there are no surprises either on the technical or financial level 3D planning also guarantees that there are no surprises either on the technical or financial level during or after the installation. Dallmeier calls this approach "What we plan is what you get". Besides the technical advantages delivered by Panomera®, the customers were also impressed by the planning certainty they were given by the 3D visualization, and, at the end of 2017, Dallmeier won the order to put the project into practice. Test run at the Dallmeier FAT Centre Before it was installed, the planned solution underwent a Dallmeier Factory Acceptance Test at the FAT Centre in Regensburg. All components were assembled there, and the final environment was tested in live operation. While testing was proceeding in the FAT Centre, KH Servis was also attending training in Regensburg so they would be ready for the on-site installation and so they could see the system operating flawlessly for themselves. Observation and intervention With the installation of the multifocal sensor systems, the desire for increased security and more effective intervention capabilities was realized. The cameras are used to observe situations and when necessary, enable rapid countermeasures or also a rapid investigation of incidents. In the event of criminal offenses, the video material can be stored separately as evidence. Special challenge: Protection of historic monuments Permission had to be obtained from the building owners before the cameras could be mounted Both squares are bordered by buildings with historic monument status, the Panomera® cameras could not always be mounted where single sensor cameras had hung previously, enabling the "old" installation points to be used. Permission had to be obtained from the building owners before the cameras could be mounted, but this was managed successfully for all the new installation points. Conclusion The conclusion by KH Servis, Dallmeier's integration partner in Prague, "We worked together with extreme professionalism, the city administration and police authorities were ultimately convinced, not only by the quality of the systems and the image material but also the impressive planning phase and planning certainty it gave them."
Gindi TLV, a residential complex in the heart of Tel Aviv, Israel, maintains the safety of its community, by using Oosto’s face and object recognition, to reduce contact with surfaces and enforce a policy of density, distance and wearing masks in public areas. Securing Gindi TLV complex Gindi TLV is an innovative residential complex, located in the heart of Tel Aviv, which includes 4 towers, restaurants, cafes, a country club and a mall. The complex has been planned and designed to allow community life for families and individuals, who have chosen to live in the beating heart of Tel Aviv, located within walking distance of the city’s business and entertainment areas. Gindi TLV residents use a dedicated app for convenient booking of the complex’s facilities Gindi TLV residents use a dedicated app for convenient booking of the complex’s facilities, parking, guest invitation and as a social network that is the basis for community life in the complex. Gindi TLV is also equipped with advanced and interconnected technological systems that enable efficient and cost-effective management of infrastructure and service for tenants. Oosto’s facial recognition technology The Prop-tech technology in the complex was developed and managed by the start-up, MyTower, which serves as a design partner in the project and is responsible for making it the first smart residential neighborhood in Israel. Gindi TLV uses Oosto’s facial recognition technology, in order to provide tenants with touchless and secure entry. Dan Stern, the Vice President (VP) – Digital, at Gindi TLV, explains “On the one hand, the tenants in the complex are highly sensitive to personal security and privacy, and on the other hand, because it is their home, we did everything to avoid using cards, chips or fingerprints, and allow easy access control for tenants, and their guests, using Oosto’s advanced facial recognition technology.” Visual AI and touchless access control Dan Stern adds, “Following the ongoing COVID-19 epidemic, there has been a need to expand the use of visual AI, to maintain community safety, by reducing contact with surfaces, monitoring density in facilities and public areas in the complex.” Ofer Schmidt, Sales Director of Central Europe & Israel, Oosto, said “Pre-COVID-19, maintaining tenant safety was primarily about security - letting tenants and their guests in and keeping unauthorized people out, in a transparent and smooth manner. Deployment of facial and object recognition solutions These days, we are seeing more and more prestigious residence complexes using face and object recognition" Ofer Schmidt adds, “These days, we are seeing more and more prestigious residence complexes using face and object recognition, to maintain the health of the tenant and staff, for example by enforcing a policy of on distance, density, wearing masks and allowing only vaccinated, or those with a negative test, access to common facilities, such as the gym.” He further stated, “The high accuracy of the computer vision algorithms, operating in Gindi TLV, enables the maintenance of the health of those who live or visit the complex, while minimally interfering with their daily routine. “ Video analytics using AI Video analytics using artificial intelligence (AI) to reduce COVID-19-related risks is not unique to residential complexes. According to a recent survey, 82% of academic institutions in the US and Western Europe will adopt face and object recognition technologies, in order to maintain safety through enforcing mask wearing, social distancing and reducing contact with surfaces to a minimum.
Abloy UK has been awarded a 5-year contract with UK Power Networks valued at £2.5m to upgrade the current mechanical locking systems to a combined electromechanical and mechanical locking solution, for its high and low voltage distribution networks. Rob Bennett, Senior Business Development Manager at Abloy UK, has facilitated the partnership between Abloy UK and UK Power Networks. UK Power Networks own and maintain the electricity distribution network across South East England, the East of England, and London. Supporting complex workflow Products specified include a mix of Abloy PROTEC2 CLIQ® electromechanical and PROTEC2 mechanical padlocks and cylinders, which will be controlled and administered using the new CIPE Manager operating system. CLIQ® offers high security and flexibility that supports the complex workflow of organizations It is estimated that Abloy will supply around 9,500 padlocks per annum, together with programmable PROTEC2 CLIQ Bluetooth Low Energy keys, enabling UK Power Network’s system to be expanded conveniently in the future. CLIQ® offers high security and flexibility that supports the complex workflow of organizations in the energy sector by enabling audit trails to be generated for individual cylinders, padlocks, keys and system users. Major security risk If a key is lost or stolen this no longer creates a major security risk, because each individual key can be deactivated if required and have access rights changed or removed using the CLIQ® web manager software, providing a truly dynamic secure system. The battery powered CLIQ® keys are programmable, so a temporary contractor can be issued with a key that permits entry to specific sites for a limited time period. After the authorization period ends, the key cannot open the lock.
Round table discussion
The death of Michael Brown at the hands of police in Ferguson, Missouri, in August 2014, highlighted to the public, the importance of body-worn cameras. There was no bodycam footage of the Ferguson tragedy. Arguably, it would have shed additional light on the shooting. Since then, body cameras have become a tangible legacy of Ferguson, Missouri. Bodycam footage is seen as providing greater accountability and ensuring an impartial record that can support, or debunk, any claims of police misconduct. Body-worn cameras are also finding their way into broader usage, even including customer service applications. We asked this week’s Expert Panel Roundtable: How important will body-worn cameras be moving forward?
A new generation of security professional is waiting in the wings. They will be faced with unprecedented challenges, as they seek to transform the security marketplace to the ‘next level’. Technology changes ensure the market will be very different 10 years from now and the fresh labor pool will need to be able to meet the host of new challenges. We asked our Expert Panel Roundtable: What exciting career opportunities in the security industry await the next generation?
Residential security and smart homes are rapidly changing facets of the larger physical security marketplace, driven by advances in consumer technology and concerns about rising crime rates. During the COVID-19 pandemic, many people spent more time at home and became more aware of the need for greater security. As workplaces opened back up, returning workers turned to technology to help them keep watch over their homes from afar. We asked this week’s Expert Panel Roundtable: What are the trends in residential security in 2021?
14 Success Stories About How Video Technology Is Improving City LifeDownload
Empowering Cameras With AIDownload
The Rise of Ethical Facial RecognitionDownload
Providing Frictionless Cloud Video Storage as a Service (VSaaS)Download