Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials...
Alarm.com has developed the first cellular sensor with virtually no range limitations for monitoring valuable property and assets. The Alarm.com Flex IO™, a battery-powered device that is weatherproofed for outdoor durability, uses the latest LTE-M technology to operate anywhere there is LTE coverage and without a panel, hub or even Wi-Fi. The one-of-a-kind sensor works as a standalone solution or as an expansion of a person’s existing Alarm.com-powered system. The Flex IO™ se...
The Protege Group, a prominent securities transportation specialist in Brazil, has specified its first fully automatic transmission as part of a pilot project to evaluate new armored cash transport trucks. Two armored high-value cargo light trucks, a Volkswagen 9.160CE and a Mercedes-Benz 915 E, have been equipped with an Allison 2000 Series™ transmissions. The trial of fully automatic transmissions is designed to make the company’s operations more efficient and productive by impro...
BlueVoyant, a cybersecurity services company, announces a strategic partnership with UK-based third-party risk management consultancy, DVV Solutions, to deliver BlueVoyant’s Cyber Risk Management (CRx) services to DVV Solutions’ global customer base. This will be delivered primarily through BlueVoyant’s Vendor Risk Management (CR3) solution, which provides risk identification, analysis and threat remediation. Through DVV Solutions, BlueVoyant will generate, triage, prioritize...
ADT Commercial announces that it has purchased premier fire, life safety and security provider and integrator, CLS Technology, Inc., based out of Katy, Texas. The purchase of CLS Technology further deepens ADT Commercial’s capabilities to serve mid-market, national and large-scale commercial customers in the Houston, Texas area. This marks the organization’s 24th acquisition. CLS Technology, Inc. has been a high-quality commercial integrator serving the metropolitan Houston area and...
As the new Chief Executive Officer of Milestone Systems, Thomas Jensen pledges to continue the company’s focus on protecting people and assets and to help organizations gain insight and optimize their business processes. Seeking to fulfill Milestone’s mission to ‘Make the World See,’ Jensen will maintain Milestone’s approach of being an open video management system (VMS) platform and having an open company culture. End-User communities “I will also be work...
The time needed to plan, design and accurately evaluate the efficiency of a video surveillance system has been significantly reduced with the news that JVSG’s highly acclaimed IP Video System Design Tool now supports all Wisenet IP Network cameras from Hanwha Techwin. Visualization of Security system System designers and system integrators simply need to import 2D or 3D models of the end user’s building or site, and then enter in some parameters specific to the project, such as the proposed installation height of each camera and the required field of view. JVSG System Design Tool produces an accurate visualization of the planned video surveillance system With this information, the JVSG System Design Tool produces an accurate visualization of the planned video surveillance system which, for example, will help identify any blind spots. JVSG System Design Tool The JVSG System Design Tool, which is able to calculate precise camera lens focal lengths, viewing angles and pixel density requirements within seconds, helps choose the best model for each camera location. This is because key features of Wisenet cameras, such as camera resolution and IR Illumination distance have been integrated into the program. Depending on whether there is a requirement to simply detect and monitor activity in an area or if there is a need to capture evidence grade images, the JVSG System Design Tool will indicate if the specified cameras will be able to match an end-user’s operational requirements. It can also be used to calculate the bandwidth usage of the cameras and corresponding video storage requirements. Wisenet IP cameras and JVSG System Design Tool integration “We are delighted to have successfully completed our integration with JVSG’s powerful design tool, which efficiently replaces the need to produce CAD drawings and minimizes the time needed to make complex calculations,” said Uri Guterman, Head of Product & Marketing for Hanwha Techwin Europe. He adds, “Consultants, system designers, product specifiers and systems integrators will all benefit from the reduction in the time it takes to manually search for camera specifications and build these into system designer proposals.” Adding value to Wisenet brand JVSG's IP Video System Design Tool will, without doubt, greatly contribute to our ability to achieve this objective" Uri Guterman stated, “At Hanwha Techwin, we fully understand that having best in class and high performance products is not enough. We also need to add value to the Wisenet brand by continually looking at ways to make it as easy as possible for our cameras to be specified, installed, commissioned and maintained.” He further commented, “Alongside our own proprietary tools, such as Device Manager, Wisenet ToolBox Plus and the Wisenet QR Scanner App, the JVSG’s IP Video System Design Tool will, without doubt, greatly contribute to our ability to achieve this objective.” Technology partnership Max Shumeyko, Founder of JVSG, while commenting on the success of the integration said, “We are delighted to have formed a technology partnership with Hanwha Techwin, a globally renowned manufacturer of video surveillance products, which also has a formidable reputation for leading the market with feature rich cameras that capitalize on the very latest advances in technology.” Max adds, “The integration of the comprehensive Wisenet camera range with our Design Tool, will save users considerable time and remove the ‘headache’ normally associated with designing an IP network video surveillance camera.”
Tavcom Training, the world’s renowned provider of accredited security systems training courses and part of the Linx International Group, has announced that the organization is supporting the Naomi House & Jacksplace hospices by making a donation for every classroom and online course booked. Naomi House & Jacksplace Naomi House & Jacksplace provide expert hospice care to more than 525 life-limited and life-threatened children, young adults and their extended families from the regions of Hampshire, Wiltshire, Dorset, Berkshire, West Sussex, Surrey and the Isle of Wight in the United Kingdom. Lisa Congdon, Corporate Fundraiser at Naomi House & Jacksplace, stated “We are so grateful for the support of Tavcom Training. This year has been particularly difficult and presented challenges unlike anything we have ever had to face in the past. Therefore, the support of our community is appreciated more than ever now.” Fundraising for NGO Naomi House & Jacksplace have long been jewels in our community and is close to the heart of the Tavcom Training" First launched in 1995, this year Tavcom Training is marking its 25th anniversary, while Naomi House & Jacksplace opened its doors to the public in 1997. “Naomi House & Jacksplace have long been jewels in our community and is close to the heart of the Tavcom Training team, as well as the many security professionals from the surrounding areas that attend our courses,” explains Kevin Matthew, the Operations Director at Tavcom Training. Corporate Social Responsibility Kevin adds, “Making a donation for every course booked, as well as running other fun fundraising initiatives throughout the forthcoming year, is something we are proud to do, to help this fantastic and inspiring charity to support our local children.” For individuals looking to book a course online or to get more information about Naomi House & Jacksplace, including how to make a donation to its Christmas Appeal 2020, so as to give the gift of a magical Christmas Journey to a child at a children’s hospice, can log onto to the official website.
Globally renowned security manufacturer, Gallagher Security has announced that they will be returning to Facilities Integrate 2020 event, where they will be unveiling their new security solution for small and medium businesses, Gallagher SMB solution. Gallagher SMB solution The Gallagher SMB solution is a simplified, cloud-based security solution that gives business owners the freedom and control to manage their security with an easy-to-use app. Gallagher SMB offers an integrated security system with intruder alarm, access control, user management, and video integration, as well as an optional guarding service that is managed through the app. The Gallagher SMB solution is a simplified, cloud-based security solution “It’s exciting to return to the trade show scene – something we haven’t been able to do since before COVID-19,” said Meredith Palmer, Chief Product Officer at Gallagher Security, adding “We’re looking forward to introducing our SMB solution, which expands our range of security offerings to protect businesses of all sizes.” Command Centre v8.40 Gallagher Security will also be showcasing Command Centre v8.40, the latest version of their high performance security software, as well as their perimeter security and visitor management solutions. Gallagher SMB solution is currently available in New Zealand only, with plans to expand into Australia in late 2021. Facilities Integrate 2020 takes place from 25th to 26th November, 2020 at the ASB Showgrounds in Auckland, New Zealand.
IDIS, a global security company that designs, develops, manufactures, and delivers surveillance solutions for a wide range of commercial and public sector markets, is proud to be sponsoring and participating in Canadian Security Association’s Security Canada Virtual Trade Show, slated to be held on December 2nd and 3rd, 2020. Security Canada 2020 Visitors to the Security Canada virtual trade show can learn how IDIS’s flagship plug-and-play DirectIP solution offering can significantly benefit both end users and systems integrators. DirectIP encompasses a comprehensive line up of powerful network video recorders (NVRs), network cameras, software, monitors, and accessories that seamlessly connect. It packs a strong punch of everything needed to build a complete video surveillance solution. IDIS DirectIP solution IDIS DirectIP solution delivers rich functionality while eliminating complex and time consuming configuration IDIS DirectIP solution delivers rich functionality while eliminating complex and time consuming configuration. Users love that its network throughput delivers high-definition simultaneous recording and real-time monitoring with no visible latency and that cameras and recorders come with the assurance of industry-renowned warranties. From the security integrator’s perspective, the DirectIP solution makes installation a snap by mutually authenticating devices, thereby ensuring that engineers don’t need to manage passwords, use port forwarding, or have a deep knowledge of IP networking, even for multi-site deployments. In turn, this eliminates the potential for cyber loopholes and combined with dealing with a single vendor for sales and tech support, also ensures a low cost of service. IDIS Center VMS and ISS solutions Attendees to the Security Canada virtual event will be able to see first-hand how IDIS’s totally cost and license free IDIS Center VMS (Video Management Software) allows customers to implement surveillance solutions that encompasses up to 1024 devices, so as to enable a centralized management and control environment for customers with multiple sites, at a considerably lower cost than a server-based system. For larger organizations, IDIS Solution Suite (ISS) delivers enterprise-level VMS functionality without the associated price tag. This allows users to choose the powerful modules and functionality they need with a choice of federation service, IDIS Critical Failover which protects against a range of fault conditions, video wall services, and much more. ISS also gives customers the flexibility to add an unlimited number of sites at no additional cost. AI Box for COVID solution IDIS will also unveil its AI Box for COVID at Security Canada 2020 virtual trade show IDIS will also unveil its AI Box for COVID at Security Canada 2020 virtual trade show. This simple add on appliance includes functions that help adherence to government guideless and hygiene best practices to support reopening, and safe return to work strategies to help prevent the spread of infection. The new IDIS Mobile Plus app will also be showcased, which is supporting users to remotely monitor single and multiple sites by putting powerful VMS functionality at their fingertips. With the ability to view 4K and multiple streams and configure alarms and notifications, it’s enabling the management of day-to-day operations and the ability to respond to incidents and events on the move. IDIS dome and bullet cameras IDIS will also present an end-to-end solutions specific to retail that includes high-performance 5 MP dome and bullet cameras, a compact 5 MP fisheye camera, and the anti-IR reflection 2 MP micro dome camera, which are all popular choices for indoor and outdoor video surveillance and coverage in all lighting conditions. At the Security Canada virtual event, attendees representing the logistics and warehousing sector will learn how IDIS solutions are helping improve operations by tracking goods in and out, mitigating internal shrinkage, and ensuring health and safety compliance with its high performance 12 MP IR Super Fisheye cameras that can cost-effectively replace 3-4 fixed lens cameras.
Ping Identity, the intelligent identity solution for the enterprise, was recognized as one of the 25 Highest Rated Public Cloud Computing Companies To Work For During the COVID Crisis in a list released by Battery Ventures, a global investment firm and cloud investor, with data specifically provided by Glassdoor, the provider of insights about jobs and companies. The list highlights 25 publicly traded companies—all business-to-business, cloud-computing companies--where employees reported the highest levels of satisfaction at work during the first six months of the pandemic, according to employee feedback shared on Glassdoor. Critical technology systems The distinction placed Ping Identity at number 18 with an overall company rating of 4.4. The broader average across Glassdoor is 3.5. Ping Identity’s senior-leadership rating was 4.5, compared to the Glassdoor average of 3.2, while its positive business-outlook rating—indicating the percentage of employees who believe their employer’s business will get better in the next six months—was 80%. That compared to an average across Glassdoor of 51%. This is the fourth year Battery has issued a version of its highest-rated cloud companies list This is the fourth year Battery has issued a version of its highest-rated cloud companies list, along with a related ranking of the 25 Highest Rated Private Cloud Computing Companies to Work For. The rankings—which this year hinged on how companies are handling issues like remote workforces and the broader economic downturn--highlight the global trend of businesses increasingly turning to the cloud to run critical technology systems and software, instead of using on-premise systems. Digitizing customer businesses “Cloud CEOs have had to stay unbelievably focused, resilient and nimble over the last eight months, working in conditions they likely never expected,” said Neeraj Agrawal, a Battery general partner who specializes in cloud investing. “The best CEOs are listening to employees and making tough decisions that will continue to move their companies forward. We’re heartened that so many of these B2B companies are surviving and even thriving during COVID, as they’re providing technologies to serve the new, pandemic workforce, as well as solutions that are digitizing customer businesses faster than ever. Every company that made the list this year should view it as an honor to be included.” Widespread employee network Companies with high employee satisfaction often post stronger financial performance A Glassdoor economic research study, as well as other third party studies, show that companies with high employee satisfaction often post stronger financial performance. “At Ping, we take pride in fostering a culture of transparency and trust,” said Andre Durand, CEO, Ping Identity. “Over the years the team has grown in size, yet, the values and supportive ethos remains unchanged. It’s meaningful to have our achievements in shaping an employee-first culture recognized, but particularly impactful to receive the positive feedback from our widespread employee network.” Highly rated companies Glassdoor noted that employees at these highly rated companies commonly mention in online reviews that they enjoy working for mission-driven companies with strong and unique company cultures; employers that promote transparency; and companies with experienced senior leaders who regularly and clearly communicate with employees. For instance, according to one anonymous employee review of Ping Identity on Glassdoor. Ping identity is a great company to work for with great office culture. A wide range of different products, both on-prem and SaaS offerings, provides a lot of opportunities and interests, and outstanding, transparent, and open minded leadership allows everyone at every level to express themselves, bring in their work/management styles, and contribute.
Briefcam, the industry’s renowned provider of Video Content Analytics and Video Synopsis solutions, has announced that its advanced video analytics software platform will serve as the analytics engine for Verizon’s Intelligent Video solution. Intelligent Video solution The comprehensive monitoring service from Verizon helps law enforcement and security teams keep public and private facilities secure with near real-time, actionable data from video content. The combined solution enhances the ability for these organizations to protect lives and property in remote locations and in the city centers - equally. This includes critical infrastructure from dams and power plants to oil refineries and transportation systems. Advanced video analytics The full solution leveraging BriefCam provides advanced video analytics, including near real-time and forensic video analysis, and trends in data through dashboard visualization, enabling rapid acceleration of video investigations. “Leveraging its renowned network, Verizon is creating a best-in-class solution to enable the protection of all facilities in a community whether in the city center or on the edge of town,” said Gili Rom, Vice President of Strategic Initiatives, BriefCam. Gili adds, “Bringing together Verizon’s wireless infrastructure with our advanced video analytics and other industry leading technologies allows security professionals to remotely optimize situational awareness while reducing time and resource investments.” Leveraging robust analytics software The solution was built to provide advanced analytics and benefits for an improved experience Verizon Intelligent Video leveraging BriefCam’s robust analytics software offers a comprehensive, bundled video management solution for cloud or wireless access that includes software licensing, installation, administration, training, and support. The solution was built to provide advanced analytics and benefits for an improved experience. BriefCam delivers the ability to monitor and analyze multiple sites remotely from a single interface and the insights needed to fully prevent or investigate and resolve issues. Automated video analysis Verizon Intelligent Video automates video analysis with an easy-to-use interface so that users can quickly drill down, and filter objects based on a wide range of object classifications, attributes, and behaviors. This accelerates investigations and helps users attain situational awareness sooner, to derive operational intelligence from video. The powerful solution makes it possible to do more with fewer monitoring, intelligence, and investigative resources.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorized persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Center access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
Kumbh Mela is one of the most sacred pilgrimage festivals of India and is organized at a grand scale at Nashik, Haridwar, Ujjain, and Prayag. As Kumbh Mela is being celebrated after a period of 12 years in Nashik, 100 million people are expected to visit, security is a major concern for the Government bodies. Nashik will be getting an opportunity to host these guests from July 14 to September 25 and no stone will be left unturned in hosting the massive gathering. Challenges Nashik Railway Station authorities wanted video surveillance devices that would not consume larger areas when it comes to installing them as the railway station had congested platforms. Moreover, they wanted a surveillance solution that gave them superior image quality and at the same time did not consume heavily on the bandwidth. Furthermore, the authorities wanted to monitor the whole place centrally and gain central control of the entire place. Installing devices and control room in the congested platforms Restricted allotted bandwidth for the video surveillance solution Requirement Prompt and smooth installations of cameras and hybrid video recorders within 30 days Setting up the control room for monitoring railway station entrance, platforms, and connecting bridges High reliability of the solution for utmost security Storage of the entire 4-month period as evidential proof Matrix offering Installation was completed within 20 days with highly skilled manpower. Cascading of all the connected devices with sequencing for central monitoring on TVs in the control room to reduce the overall solution cost. 4 months scheduled backup of all cameras is configured centrally for storing all the streams. Matrix being an Indian brand, efficient pre-and post-sales support is a part of the solution. Results Secured entry and exit from the city with 24x7 video surveillance of the railway station Installation of the solution done within the defined time frame Products offered SATATYA HVR1624P SATATYA CIBR13FL40CW SATATYA CIDR13FL40CW SATATYA CIDRP20VL130CW SATATYA Centralized Monitoring Software (CMS)
Two museums, a single security environment. As a result, access management was eating up significant time and budget for the museums’ Technical and Security Manager. The solution for simpler access management was eCLIQ, an electronic locking system built around easy-to-fit cylinders and programmable, battery-powered keys. The Thiepval Museums, in northern France, needed trusted, secure entry and exit control to reduce theft from their premises. User-friendly management of access rights was essential — for both internal and external users. They needed a system able to cope easily with changes, site extensions and two-site operation; a solution which would remove the need to change all cylinders when an employee loses a key. Simplified access management Now the Historial and Thiepval Museums are equipped with 52 eCLIQ locking cylinders across the two sites. The eCLIQ key-operated solution offers them simplified access management, incorporating easy activation and deactivation of keys and simpler administration of access rights and schedules for external providers and contractors. A unified system manages access to both locations. Every authorized key-holder carries one battery-powered key programmed with only their tailored access permissions. With eCLIQ, missing keys are quickly de-authorized, cutting risks associated with key loss or theft. At any time, facility managers can generate an audit trail to verify who has accessed which locks. Monitoring service providers Installing an eCLIQ system has allowed security teams to better monitor service providers Across the two sites, the museums have 40 durable, compact and waterproof eCLIQ keys, of which 19 are already allocated to regular users. These Bluetooth-enabled keys are available to both employees and contractors, helping the latter to improve their responsiveness when they are needed on-site. Installing an eCLIQ system has allowed security teams to better monitor service providers — and their movements around and between the two sites. It is straightforward for museum managers to limit contractors’ access rights to the duration of a task, whether recurring or one-off. Fitting eCLIQ locking was simple and wire-free: museum staff performed the installation themselves. One training session with the admin software was sufficient to put them at ease with their new system. Efficient energy management Looking after eCLIQ components is also easy: an integrated lubricant reservoir ensures cylinders remain maintenance-free for up to 200,000 cycles. AES encryption, rapid processing and efficient energy management is built into the eCLIQ chip. When a key’s battery runs out, it is easily replaced without tools. “I am very happy with the eCLIQ solution,” says M. Guyot, Technical and Security Manager at the Historial and Thiepval Museums. “Today, I promote the solution to those around me. I have also given a demonstration to the Somme General Council to show the effectiveness and simplicity of the eCLIQ solution. Normally, as a user client, we try to help you improve your products, but there was nothing to say in this case!”
Leonardo delivered the first two M-345 jet trainer aircraft to the Italian Air Force, which to-date has ordered 18 units from a total requirement for up to 45 aircraft. The new type of jet trainer aircraft, designated T-345A by the Italian Air Force, will gradually replace the 137 MB-339s which have been in service since 1982. M-345 jet trainer aircraft Marco Zoff, Leonardo Aircraft Managing Director, said “Building on our heritage and expertise in jet trainers, the M-345 will allow our customers to achieve a significant improvement in training effectiveness while at the same time reducing operating costs. This first delivery to the Italian Air Force is a key milestone, the result of a longstanding and productive team working closely together with the operator.” The new M-345 jet trainer aircraft, designed to meet basic and basic-advanced training requirements, will complement the in-service M-346, which is used for advanced pilot training. Integrated training system Leonardo’s integrated training system developed around the M-345 platform is representative of the company’s technological leadership in training pilots to fly current and future generation aircraft. The system benefits from experience with, and technology developed for, the M-346, which includes a ‘Live Virtual Constructive’ capability. This allows aircraft which are flying live training missions to incorporate simulated ‘friend’ or ‘foe’ elements into scenarios, allowing the pilot to be exposed to the full range of possible operational situations. M-345 HET (High Efficiency Trainer) The new M-345 HET (High Efficiency Trainer) reduces the time required for air forces to train pilots The M-345 is a high-performance aircraft which supports a pilot’s transition from basic trainers to latest-generation fighters. The Italian Air Force’s acquisition of the new aircraft is an important step forward in the modernization of its fleet, with the M-345 replacing the MB-339A in Air Force’s second and third military pilot training phases. The M-345 has also been chosen as the new aircraft of the Italian Air Force’s acrobatic team, the ‘Frecce Tricolori’. The new M-345 HET (High Efficiency Trainer) reduces the time required for air forces to train pilots. It also gives trainees the chance to fly an aircraft that features higher performance characteristics than other basic/advanced trainer aircraft currently in service around the world. Delivering high quality training at low cost The performance of the M-345 allows it to carry out the most demanding mission types found in a training syllabus, delivering high quality training at significantly lower cost. The M-345 cockpit architecture is the same as that of frontline fighters. The aircraft is also able to perform operational roles, thanks to an extended flight envelope, with a high-speed maneuvering capability even at high altitudes, modern avionics systems, high load capacity and performance. Health and Monitoring Usage System The M-345 is designed with a long life-cycle and a two-level approach to maintenance The M-345 is designed with a long life-cycle and a two-level approach to maintenance, eliminating the need for expensive general overhauls. The aircraft’s Health and Monitoring Usage System (HUMS) also contributes to a lower cost of ownership. A sophisticated on-board training simulator confers a number of benefits. For instance, M-345 pilots are able to plan maneuvers before live training, allowing for higher efficiency during flight. Mission Planning and Debriefing Station Trainees are also able to fly in formation with other pilots in the air and those training on the ground in simulators, via a real-time data-link. The aircraft’s Mission Planning and Debriefing Station (MPDS) allow trainees to analyze the missions they have just flown. The M-345’s engine is a Williams FJ44-4M-34 turbo fan optimized for military and aerobatic use. The cockpit is based on HOTAS (Hands-On-Throttle-And-Stick) controls and features a glass cockpit with a three-color MFD (Multi-function Display) touch screen. The aircraft’s heads-up display is mirrored on a fourth screen in the rear seat.
Contracts for two additional COSMO-SKyMed Second Generation (CSG) satellites have been signed with the Italian Space Agency (ASI) and the Italian Ministry of Defense. Satellites 3 and 4 will complete the second generation of the Italian earth observation program, ensuring continuity and high performance of the planet's monitoring services. Continuous technological research Alessandro Profumo, Leonardo CEO commented: “COSMO-SkyMed is one of Italy’s great success stories, a driver of technological research, new applications, industrial competitiveness and employment, as well as fundamental infrastructure for the protection and security of Italy and Europe.” As Leonardo, we are proud of the contribution provided in all phases of the COSMO-SkyMed program" “Thanks to the capabilities demonstrated in the management of emergency situations linked to sudden events, the systems potential in terms of reliability, precision and flexibility are known internationally. In addition, its capabilities are now further enhanced by the second generation, with continuous technological research. As Leonardo, we are proud of the contribution provided in all phases of the COSMO-SkyMed program, a role that gives us credibility and prestige with our customers all over the world.” SAR satellite system COSMO-SkyMed is an Earth observation satellite system of ASI and the Ministry of Defense, a flagship of Italian technology and innovation, built by Leonardo and its joint ventures Thales Alenia Space and Telespazio. It is a dual-use constellation, with SAR ‘eyes’ (Synthetic Aperture Radar) capable of monitoring the phenomena of the Earth in any weather condition. COSMO-SkyMed has changed the way of observing the planet, ensuring fundamental information for the security and the understanding of phenomena that affect everyday life. With the innovative updates built into the second generation COSMO-SkyMed is the first SAR satellite system in the world capable of simultaneously acquiring two images of two areas hundreds of kilometers apart and thus serving two requests that would have been in conflict for any other satellite system. Medium-Sized enterprises COSMO-SkyMed images are used to support populations affected by natural disasters such as earthquakes and fires, but also for the control of cultural and artistic heritage, of critical infrastructures, for monitoring the receding of glaciers, that of oil spills in the seas and for the optimization of agricultural techniques. The constellation will be completed with the additional two satellites just announced which will join the first two The first Second Generation satellite was launched a year ago. The second satellite will be launched on a VEGA-C launcher. The constellation will be completed with the additional two satellites just announced which will join the first two. The COSMO-SkyMed system, of the Italian Space Agency and the Ministry of Defense, is the result and expression of the best skills of the Italian space industry, with Leonardo and its joint ventures Thales Alenia Space and Telespazio, assisted by a significant number of small and medium-sized enterprises. Providing star trackers In particular, Thales Alenia Space, a joint venture between Thales (67%) and Leonardo (33%), is responsible for the entire radar system and satellites, while Telespazio, a joint venture between Leonardo (67%) and Thales (33%), is responsible of the ground segment and hosts the command and control center of the constellation at the Fucino Space Center. Leonardo also contributes to the program by providing the star trackers (A-STR) for the orientation of the satellite, photovoltaic panels (PVA) and electronic units for the management of the electrical power. The first generation has four satellites launched between 2007 and 2010, while the first satellite of the new generation was launched in December 2019. The COSMO-SkyMed constellation is able to acquire up to 1800 images per day that Leonardo, through e-GEOS (Telespazio 80%, ASI 20%) receives, processes and markets all over the world.
One of the key problems in airport security is the sheer size of the perimeter and a large number of incidents are in fact linked to unauthorized access onto the airfield, either runways or where aircrafts are being loaded or refueled posing an extremely high risk. Most airports will combine multiple sensors and technologies to protect the actual perimeter fence and even beyond the perimeter fence, to warn of potential threats. OPTEX LiDAR sensor integration with RSA module Some airports have found the level of information generated by the perimeter security systems quite challenging to deal with and they wanted to decrease the number of events so operators could focus on what was critical. The Airport development team at Genetec integrated the OPTEX LiDAR sensor into their Restricted Security Area (RSA) Surveillance module, an extension of the Genetec Security Center platform with the purpose to unify data from the sensor and camera to present more meaningful information to the operators. Restricted Security Area Surveillance module The RSA module has been designed specifically with a view to providing wide area protection The RSA module has been designed specifically with a view to providing wide area protection and integrating with wide area surveillance technology, including radar, fiber optic and laser detection devices. The solution allows security staff to determine the level of threat for each area, map them, and utilize OPTEX technologies to identify and locate quickly and precisely the point of intrusion. For instance, with Fiber optic fence sensor, zones can be 100m-200m long and will identify people cutting through a fence, crawling under or climbing over. Newer fiber technologies provide point location. Another way to pin-point exact intruder location is with OPTEX LiDAR technologies or with Radar. ‘Fuse’ data into a single event A particularly intelligent feature of the system is its ability to ‘fuse’ data (known as ‘target fusion’) coming from multiple sources and confirm an event as a single (i.e. the same) activity rather than a multiple threat. For instance, using the X&Y coordinates provided by OPTEX REDSCAN sensors, RSA allows to map exactly the path of the intruders or moving vehicles, fuses the path from one camera to the other and considers it as one event, one target and tracks it precisely on the map. Intelligent Tracking and event categorization This gives a more meaningful picture to the operator and presents events in a unified and intelligent way. This helps support the security team in making the right decisions. The deeper integration of OPTEX’s technologies into Genetec’s RSA platform enables intelligent tracking and event categorization, making it a very precise security system for airports.
Calipsa, a provider of deep-learning powered video analytics for false alarm reduction, announces that its false alarm filtering platform is being used by Richmond, British Columbia-based Radius Security. Radius Security is the security systems and monitoring branch of Vancouver Fire and Security and the first Canadian monitoring center to adopt the cloud-based Calipsa technology. Calipsa’s false alarm reduction technology uses artificial intelligence with deep learning technology to filter out false alarms with a 99.5% accuracy rate. Recognizing genuine alarms Calipsa’s technology recognizes genuine alarms caused by human or vehicle movement, while filtering out notifications resulting from nuisance factors such as animals, lighting, weather or foliage. With our Redhanded Human Detection solution, our focus is on catching criminals in the act" Aleksei Bulavko, research, development and production manager at Radius Security, said the Calipsa technology would further enhance his company’s reputation as a top-tier monitoring station. “With our Redhanded Human Detection solution, our focus is on catching criminals in the act,” he said. “Calipsa enables us to do this at a greater capacity, meaning an even faster police response time for our customers.” False alarm filtering platform Brian Baker, vice president, Americas, Calipsa, said the false alarm filtering platform will enhance Radius Security operators' efficiency by enabling them to concentrate on genuine alarms. “Also, Calipsa’s cloud-based technology requires Radius Security to install no hardware devices,” he said. “Initial installation and future upgrades are quickly and remotely integrated with station operating software and customer cameras without incurring on-site installation costs.” Calipsa’s false alarm reduction software is easily scalable, making it ideal for any growing monitoring station and customer business. A platform dashboard enables station managers to monitor the software’s performance, including detecting idle cameras that may need replacement or repositioning.
Round table discussion
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
You could say concerns about privacy are “trending” in our increasingly data-driven world. Unease about how Facebook and other high-tech companies use and share data dominates the news, and the full impact of new European Union (EU) regulations is about to be felt around the world. By May 25, companies that collect data on EU citizens will need to comply with strict new rules around protecting customer data, as enumerated in the General Data Protection Regulation (GDPR). But how do the new regulations, and broader concerns about privacy, affect the physical security market? We asked this week’s Expert Panel Roundtable: How do privacy issues and regulations, such as GDPR, impact physical security systems and how they are managed?