IDIS has further enhanced its IDIS Center VMS, adding new features and functions targeted at small to mid-sized enterprises and multi-site customers. Organizations can build powerful centralized monitoring solutions, quickly and easily, when implementing IDIS Center together with the wide selection of IDIS DirectIP cameras and powerful NVRs. These deliver customer lifecycle savings of 50% or more compared with server-based solutions, thanks to reduced installation time, no upfront or ongoing li...
Videalert, one of the UK’s suppliers of intelligent traffic enforcement and management solutions, announces the immediate availability of Stingray, a new modular ANPR camera solution. Designed for use with Videalert’s expanding range of multi-purpose Mobile Enforcement Vehicles (MEV), this modular solution features the latest generation of HD cameras with upgraded infra-red lighting to deliver enhanced capture rates and increased productivity in all parking and traffic management ap...
Senstar, globally renowned provider of video management and perimeter intrusion detection solutions, is pleased to announce the release of Senstar Thin Client 3.9. When paired with Senstar Symphony Video Management Software (VMS), the Thin Client now features dynamic privacy masking, which allows it to obscure the identifying features of individuals or vehicles that may appear within a camera’s field of view. Unlike the more common static masking which is configuration-driven and can be u...
Brivo, the global provider of cloud-based physical security, has acquired Parakeet Technologies, a provider of smart building solutions which include sensors, thermostats, wireless locks, and lighting controls. The acquisition accelerates Brivo’s ongoing push to enhance its in-building capabilities beyond its current access control, video, and security. The companies had already been working together as partners, and now plan a deeper integration between their products, including a common...
Drones are commonly known for flying in the sky, but a new breed is rolling around on the ground and swimming in the ocean. Now, in an alliance straight out of science fiction, two CT-based drone companies are joining forces to take on the task of protecting our planet using both airborne and amphibious drones by automating operations in security, environmental and even military fronts, globally. Harford based Aquiline Drones (AD), a premiere Cloud and drone solutions company,...
Mobile security provider Trustonic announces that it has joined the Car Connectivity Consortium (CCC) to contribute to the development of technical specifications for secure connected car technologies. The CCC is a cross-industry organization advancing global technologies for smartphone-to-car connectivity solutions. Key-sharing smartphone apps Its current priorities include Digital Key, an exciting new open standard to allow smart devices to act as a vehicle key, and Car Data which will conne...
SALTO Systems, a manufacturer of electronic access control solutions, will showcase the latest in technologically-advanced electronic locks and access control management – including a new line of residential smart lock solutions–at ISC West this March in Las Vegas. “SALTO is always excited to share the latest electronic access control innovations with our peers in the security industry at ISC West. We have some great products to highlight this year including residential smart lock solutions that meet the growing demand in that market segment,” said Michael J. Mahon, SALTO Systems Senior Vice President Commercial Sales. “We hope those needing secure, reliable, and easy-to-install and use electronic access control will stop by Booth 25071 at this year’s show to see our solutions.” Access control management software ISC West is the largest converged security industry trade show in the United States, hosting more than 30,000 global security product manufacturers and professionals. This year, ISC West will be held at the Sands Expo Center, March 17-20. Highlights at SALTO Systems Booth 25071 will include: ProAccess SPACE 6.0 – The latest version of SALTO ProAccess SPACE 6.0 access control management software allows systems administrators to utilize the latest SALTO SPACE features and security enhancements on SALTO BLUEnet smart locks. Other new features include time tracking of employee hours, capacity management, and more user-friendly event monitoring. SALTO KS – The latest version of SALTO KS Keys as a Service cloud-based access control management software includes cellphone check-in capability and PIN entry mode. Secure real-time management SALTO NEO Cylinder – The SALTO NEO Cylinder is an electronic lock that offers more features and better functionality than any other cylinder on the market. The re-engineered clutch system design makes efficient use of energy, dropping consumption to impressively low levels resulting in 110,000 cycles with just one set of batteries. It’s compatible with SALTO SVN, SALTO BLUEnet Wireless, and SALTO KS Keys as a Service cloud-based technology. The NEO can be switched to any of SALTO’s technology platforms at any time without changing the hardware. SALTO BLUEnet Wireless - It offers easy and secure real-time management that is networked through Bluetooth RF and is especially designed for doors where real-time control is required. BLUEnet can be installed as an independent system or can complement SALTO Virtual Network (SVN-Flex). One gateway can communicate with 7 nodes. Each node can operate up to 16 doors with a maximum distance of 15 feet between the lock and the node (with just one IP address). SALTO BLUnet Wireless has three peripherals for wireless connection: gateway, node, and repeater. This provides greater flexibility to a project without the need for cables. Electronic access control XS4 MINI – The XS4 Mini escutcheon is easy-to-install on new or retrofit doors which makes it simple for security professionals to upgrade and replace mechanical key-operated locks with the latest in electronic access control. With SVN-Flex (based on SALTO’s BLUEnet wireless technology), you can extend and increase the number of updating points directly to the battery-operated door. This results in an exponential increase in security, control, effectiveness, and convenience for users and system managers as the communication between devices flow in real-time on wireless online access points and much faster on offline points. The XS4 MINI is now available for SALTO SPACE on-premises smart technology and with the SALTO KS Keys as a Service cloud technology platform. SALTO NCoder – The new NCoder has a new modern black design that follows SALTO’s line of stylish products. The SALTO NCoder integrates encoding capabilities of a powerful updated design with a built-in desktop reader function and is compatible with BLE cellphone keys. The new NCoder 3G device has been added to the SVN platform and provides increased security for keys and access. Additionally, the NCoder records information from the Portable Programming Device (PPD) in the NCoder itself.
Mitsubishi Electric will launch the latest version of its high-end LCD video wall system at ISE 2020. The LM55P4 is the latest iteration of Mitsubishi Electric’s flagship 55” professional-grade LCD monitor, which has been successfully employed in a wide variety of mission-critical control room installations around the world. The LM55P4 offers a significantly improved visual experience when used in video wall applications thanks to the greatly reduced bezel width compared to earlier versions. At just 0.44mm, the obtrusive gaps between individual LCD tiles are virtually eliminated to create a near-seamless display. LM55P4 provides an attractive, high-specification and cost-effective alternative to DLP video walls where installation space is limited. Designed and built in Japan to the same exacting standards as its DLP rear projection systems, the LM55P4 is aimed at the most demanding applications where long-term reliability and low maintenance are key considerations. Built-in dynamic brightness controls The LM55P4 offers Full HD (1920x1080 pixel) performance and is rated for 100,000 hours operation. High brightness and contrast, together with an anti-glare screen surface makes it an excellent choice for small control rooms, breakout suites or meeting rooms. Built-in dynamic brightness controls ensure screens are always perfectly colour-balanced and tiling compensation ensures accurate screen geometry is maintained. LM55P4 is equipped with an OPS slot for extended functionality and features DisplayPort (1.2a), HDMI (HDR supported), DVID (with HDCP) and analog video inputs. Monitors can be daisy-chained together via DisplayPort to create simple video wall applications with no external controller required. Visitors to ISE 2020 will be able to see the new LM55P4 along with an extensive range of rear projection and flat panel displays, including a new 1.25mm direct view LED screen designed specifically for control room use.
How does one improve an already mature and reliable offering? For Airbus Cybersecurity, the answer was to enrich the threat intelligence service it had been offering customers since 2011 with contextual information at scale. “Since 2011, our threat intelligence service has worked very closely with our incident response teams. Among other things, this has allowed us to be very relevant and responsive when it comes to tracking attackers,” explains Julien Menissez, Product Manager for Managed Services in Europe at Airbus Cybersecurity. Other indicators of compromise This proximity has paid off, enabling the service to better contextualize alerts that would otherwise remain purely technical, such as lists of IP addresses and other indicators of compromise (IoCs). Technical alerts are effective in blocking specific attacks, often in an automated way. However, when they are enriched with relevant, contextual information they can become real decision-making tools allowing security analysts to answer questions, such as: What do we know about the attacker’s current targets and campaigns? Are we a potential target for this group in particular? We first worked with flat files, and then we deployed MISP interfaces for our customers" In theory this is attractive, but to deliver this in practice Airbus Cybersecurity needed to be equipped to offer a robust, industry-ready service. “In 2015, we decided to create a dissemination offering that would allow customers operating their own SOC to benefit from this increased information. We first worked with flat files, and then we deployed MISP interfaces for our customers,” continues Julien. Malware Information Sharing Platform MISP (Malware Information Sharing Platform) is a must in the world of threat intelligence. Available as a free solution, MISP facilitates the sharing of IoCs between researchers. But before IoCs can be shared, they must be acquired and consolidated. This is where things get complicated. Julien recalls, "MISP is very good for dissemination, but ingestion is not simple! We were forced to use many other open source tools in parallel, requiring a lot of scripting and manual operations before delivering the information to our customers, while remaining within the timeframes allowed by our SLAs.” The dissemination service became so successful, that the load on the Airbus Threat Intelligence team increased dramatically. As customers demanded more and more context and richer information, beyond what MISP can do with its tagging and commenting functionalities, it quickly became clear that a manual approach could not be scaled up. Fewer technical manipulations The Airbus Cybersecurity team then decided to research a new "cyber-intelligence back office" -- a tool capable of natively managing concepts such as the freshness of information, reliability, context, and related data. "We quickly saw in ThreatQuotient the vendor best suited to our needs. We shared the same vocabulary (coming from the defense sector). The ThreatQ platform met our criteria, and the technical level of the ThreatQuotient subject matter experts was excellent,” explains Julien. Airbus has gone from weekly information delivery to continuous information delivery" The deployment of ThreatQ allows Airbus Cybersecurity to meet their goals. “We can now deliver the same service and the same knowledge, with the same quality as before, but much more quickly and with far fewer technical manipulations,” details Julien. “And, obviously, it’s our customers who benefit. Airbus has gone from weekly information delivery to continuous information delivery.” Threat intelligence feeds Better still, for slightly more mature customers, who do not yet operate their own SOC, but still have an internal CSIRT team, the Airbus team can now offer an optional tool capable of helping them capitalize on their knowledge. The knowledge acquired during the customer’s internal investigations is seamlessly integrated into the ThreatQ platform to enrich the information delivered back to the customer via the Airbus service. The ThreatQ platform is completely complementary to an existing MISP solution, allowing the customer to build up their own knowledge base adapted with their context. Customers also have the freedom to change their threat intelligence feeds and sources at any time, since they will keep all of their data within the ThreatQ Threat Library and therefore all the knowledge acquired by their CSIRT. Better responsiveness in times of crisis ThreatQ allows us to offer a richer threat intelligence service, with more context, but also faster" The ThreatQuotient solution allows Airbus Cybersecurity analysts to respond better and faster to customer requests. “Most SOCs work with a workflow system to investigate IoCs collected during an incident. It is often a manual process but since the ThreatQ platform can be integrated with a SIEM to do the research and automatically identify patterns and linkages and how to pivot from a given IoC, we have even been able to reduce our response time to our customers,” says Julien. “And obviously, in an incident, quickly identifying the pivots and monitoring malicious activities as closely as possible is a major advantage.” Julien adds “ThreatQ allows us to offer a richer threat intelligence service, with more context, but also faster. We are now able to continuously deliver cyber intelligence flows tailored to the needs of our customers.” Strategic approach to mitigate risk Finally, the choice of the ThreatQuotient solution allowed Airbus Cybersecurity to refine the information delivered to customers in order to better manage their security posture. The ThreatQ platform makes it possible to automatically “package” the most relevant flows according to the exposure of the client to specific risks, and thus take a strategic approach to mitigate risk.
DICE Corporation is proud to announce and welcome Avi Lupo as the company’s Executive Vice President. Lupo will play a leading role in the company, contributing to high-level organizational decisions, product development and new business opportunities. He will also be integral in establishing new sales and marketing expansion strategies for the company’s growing cloud video recording technology, CloudEye. “We are very happy to have Avi on our team,” said President and CEO Cliff Dice. “As one of the leaders in research and development for the security industry, we continue to experience tremendous demand for our products and solutions. Avi’s background in video and commitment to broadening industry expectations will bring a fresh perspective and approach to what we do at DICE Corporation.” Interactive security technology Lupo formed strategic alliances that introduced Video as a Service (VaaS) to the security industry With over 30 years of management experience in the security industry, Lupo comes to DICE Corporation from Kent Technologies in Miami, Florida, where he served as the company’s President and CEO. As a provider of video and security services for a wide range of industries, Lupo led the organization in developing robust preventive and interactive security technology, including camera, surveillance, facial recognition and remote guarding services throughout North America. Prior to his time at Kent Technologies, Lupo served as the CEO of FST21 America, a security technology company with offices in Israel and the U.S. and served as Co-Founder and President of OzVision Global, a developer of advanced video solutions in the international security monitoring market. Video as a Service Among his many accomplishments, Lupo formed strategic alliances that introduced Video as a Service (VaaS) to the security industry, establishing industry standards. “I am honored to be part of such an innovative company and growing team of professionals,” Lupo said. “I see DICE as a leader in the future of the security industry, and I look forward to contributing to the vision and expansion of the company.”
Dahua Technology, a world renowned video-centric smart IoT solution and service provider, unveils its 2020 core product launch in Intersec Dubai, enabling and accelerating the AIoT transformation. The launch includes the main over-coax technology advancement HDCVI 6.0, AI (WizSense/WizMind) as well as Full-color technology which enables outstanding performance under extreme low light conditions. Advanced AI capabilities A longtime pioneer in the realm of HDCVI that seeks to offer great convenience, best quality and least cost, Dahua Technology launches HDCVI 6.0, boasting industry's first 4K real-time and advanced AI capabilities. 4K Real-time While traditional 4K HD over-coax products only allow 15fps, Dahua Technology’s 4K real-time doubles it, making 30fps a reality in live view. 4K real-time provides a superior visual experience in which tiny details are captured in better clarity within a large monitoring coverage. Moreover, with the help of AI Coding, users won’t have to worry about the storage cost incurred from the clarity enhancement. AI Coding Dahua AI Coding takes video compression to a new level of content-awareness. It puts emphasis on human and vehicle while encoding, significantly improving the streaming quality compared with H.265. At the same time, AI Coding also reduces the bit rate when there is no real target in sight, allowing efficient handling of videos to save HDD storage cost. Two-way Talk In addition, HDCVI 6.0 supports Two-way Talk, which allows real-time communication between camera and recorder with a broadcast-quality audio. A breakthrough innovation in Audio-Over-Coax technology, the Two-way Talk feature does not just satisfy users' demand for auxiliary audio information, it also enables bi-directional audio intercom that can be used to warn off intruders and to verify the actual situation when an incident occurs. Enhanced AI Endowed with Enhanced AI (see section 3 below for more information), HDCVI 6.0 is bringing fresh ideas and new possibilities to the industry and will always provide more economical and convenient solutions to customers. Advanced low light functionality Dahua Technology provides two series of full-color cameras – LED series and Non IR series The demand for cameras to perform in low light environment is on the rise. According to the 2019 IHS video surveillance report regarding global low illumination trend, cameras with advanced low light functionality grows at 20.6% CAGR 2018-2023. In response to this increasing demand, Dahua Technology developed its Full-color Camera, which captures vivid colorful information even in low-light conditions. In places with high crime rate like a park at night or a dark alley, it effectively extracts the color features of the scenes, such as human, vehicle or other objects, providing great help to police officers during the evidence obtaining procedure. Dahua Technology provides two series of full-color cameras – LED series and Non IR series – both adopt large aperture lens that collect higher amount of absorbed light and present a more vivid and colorful image under dark environment. Low light conditions These cameras are capable of 24/7 colorful monitoring that can accurately identify people and objects in low light conditions. Cameras of LED series are equipped with LED that serves as a supplementary light in dark environment. The LED also serves another purpose – to deter intruders – that can significantly reduce crimes. Cameras of Non IR series have no complementary light device, which will not emit light like infrared camera at night. This means that this type of camera does not interfere with ongoing activities and does not contribute to light pollution in the environment. Also, it prevents reflections in rainy days and attraction of small insects, making it an ideal silent security guard in dim places like stores, parking lots and casinos. In addition, the full-color camera can work with AI functions to further enhance the probability and accuracy of target recognition and feature extraction. AI (WizSense/WizMind) WizSense, being easy to use and not pricy to own, is competent enough to meet the needs of most ordinary users To accelerate the AI adoption, Dahua Technology is proud to release WizSense, a series of AI products and complete end-to-end solutions based on deep learning that focus on human and vehicle, providing intelligence, simplicity and inclusivity to users. WizSense, being easy to use and not pricy to own, is competent enough to meet the needs of most ordinary users. Its benefits include: accurate prediction before an event; instant deterrence during an event; quick target search after an event; storage saving while ensuring target details, and privacy protection and defense against attacks. Accurate prediction can be realized through SMD Plus, which analyzes human and vehicle shapes based on motion detection that adopts deep-learning algorithm. It effectively filters out false alarms triggered by raindrops, leaves, pets, insects and light, allowing users to focus on real threats. Face Detection and Face Recognition WizSense also supports Perimeter Protection, which functions in a similar way as SMD Plus in terms of its accurate prediction capability. It allows users to set more flexible rules for different scenarios. While SMD Plus applies to the whole scene by default, Perimeter Protection could be applied to a specific area, especially where the direction of the movement needs to be detected. Aside from recognizing whether the target is a person or a vehicle, WizSense is also equipped with Face Detection and Face Recognition features to aid further identification of targets. By comparing face images with those recorded in the customized database, more business values can be generated through VIP recognition, Black List alarm, etc. Intelligent video analysis Real-time push notifications with trigger type of human or vehicle will be sent to users Moreover, based on intelligent video analysis, WizSense also provides instant deterrence functions. When intrusion has been detected, these features will enable the camera to flash and make alarm sound to warn off intruders and avoid possible crime. At the same time, real-time push notifications with trigger type of human or vehicle will be sent to users, alerting them to verify the situation using video. After an event, WizSense makes it easy for users to do quick and reliable search based on SMD Plus and Perimeter Protection. Features like face image search and face attribute search can effectively improve the efficiency of target searching. It is worth noting that the data storage is ensured with AI Coding as well, which intelligently saves data space while maintaining the image quality of key targets. System integrators and installers While offering abundant functionalities, WizSense also ensures high-level of cybersecurity using encryption algorithms that are certified by TÜV Rheinland, UL (Underwriters Laboratories), etc. Users can rest assured that their privacy will be properly protected using WizSense series products. Furthermore, WizMind is a high-end AI series to be released in Q1 of 2020. While supporting all functions of WizSense, WizMind is also capable of other intelligent functions such as people counting, video structure, ANPR, human face/body privacy protection, large scene monitoring, etc. Designed to create more commercial values for system integrators and installers, WizMind series offers users with end-to-end solutions that can be tailored case by case to satisfy demands of clients. The aforementioned three key technologies work in trinity, resulting in surveillance solutions that can be applied to many situations. Dahua smart solutions You can use this guard to verify a visitor’s identity and warn off intrudersFor example, these products are suitable in dark places where theft and other sorts of crimes are likely to occur, such as a dark street corner or a dimly lit bar. They are also useful in places where it is impossible for security guards to accurately remember various features of people and vehicle, such as crossroads, schools, or entrances of residential areas where people and vehicles frequently come and go. They are also applicable to any place where you want to set specific rules, such as vaults of banks or casinos, entrance of a luxury store, or fence of a zoo. In these situations, Dahua smart solutions serve not only as a sharp eye that diligently monitors 24/7 and clearly records every little colorful details regardless of light condition, but also as a smart guard that can recognize features of each and every people or vehicle in sight. Verify visitor’s identity You can create your own black/white list and your guard will treat the visitor accordingly, triggering the alarm, for example, in a spontaneous manner. You can use this guard to verify a visitor’s identity and warn off intruders. If you are looking for a particular person or plate number when collecting evidence, this guard will take care of it. Overall, Dahua Smart Solutions offers users comprehensive protection as well as personal options to satisfy more diversified needs. For 2020, Dahua Technology is fully loaded with cutting edge technologies and products to provide upgraded services to more users across the globe. With its mission of “Enabling a safer society and smarter living”, Dahua Technology will continue to focus on “Innovation, Quality and Service” to serve its partners and customers around the world.
Infusion Direct Marketing, a public relations firm specializing in the security industry, announced that the company has kicked off 2020 with a new sales representative agreement in the Florida territory with Security Network Associates (SNA) of Colorado. In this new sales role, Infusion Direct will be responsible for supporting SNA’s sales efforts for IPVideo Corporation’s HALO IOT Smart Sensor in the state of Florida. HALO has taken off this year in response to the nationwide youth vaping epidemic. It is the only product to detect vaping with Nicotine or Marijuana (THC oil). Vape and smoke detection In addition to vape and smoke detection, HALO offers several safety features including abnormal sound detection, chemical detection and air quality monitoring. The product has been exceptional at helping schools across the country combat vaping with sales in over 1000 schools in the US and has recently expanded into international markets. Over the past twelve years, Infusion Direct has made a huge impact on the security industry by handling public relations and media planning for a wide variety of clients nationwide ranging from high profile security manufacturers to security system integrators. Infusion Direct has represented IPVideo Corp as its public relations arm for many years" “Infusion Direct has represented IPVideo Corp as its public relations arm for many years. They know the security industry well and we are looking forward to them leveraging that knowledge to support the dealers in Florida,” states Rick Cadiz, IPVideo’s VP of Sales & Marketing. Extensive industry knowledge With its corporate office located at the W Executive Suites in Port St. Lucie, Florida and extensive industry knowledge, Infusion Direct was the perfect choice to help increase HALO’s brand exposure in the Florida territory. “As managing director for Security Network Associates (SNA), I am pleased to announce a new partnership with Monique Merhige and Infusion Direct to support our growing sales efforts in the state of Florida,” states Michael Davis, SNA’s Managing Director. “We are all well aware of the exceptional track record Infusion has had partnering with industry leading technology manufacturers”, says Davis. Now we are happy to bring that same drive and excellence to help us support sales of IP Video's HALO Smart Sensor in the Florida market.” Improve school safety Infusion Direct continues to stand out from the “typical” public relations firms out there and offers clients an expertise in the security industry that is second to none. “We are proud to join forces with such prestigious companies as SNA and IPVideo Corporation to help facilitate the growth of HALO in the Florida market,” states Monique Merhige, Infusion’s President. “Our goal is to help schools across Florida combat the vaping epidemic and also improve school safety with this innovative security technology.”
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
All schools and colleges need to address three different levels of security when considering access control. The first level is the least vulnerable of the three and concerns the perimeter entry and exit points. Here, incorporating some level of electronic access control should be a consideration, whether that is a combination of electronic and mechanical door hardware, or a complete electronic solution. An electromechanical solution, such as electric strikes, can be beneficial in the effectiveness of perimeter security as they provide greater visitor management and traffic control. Data capture form to appear here! Facilitating visitor entry Electric strikes are able to control access via keypads, cards and proximity readers Electric strikes are able to control access via keypads, cards and proximity readers. When combined with mechanical locks, they provide the benefits of unrestricted egress. The second level is more vulnerable than the first and relates to the point at which people are screened before entering the interior of the school. As this area will be designed primarily to facilitate visitor entry, it will require adequate monitoring of access control. To do this, the latches used on access-controlled egress doors can be electronically controlled from the reception area or school office. Exit or entry doors can be opened by a push from the inside and, if the entry area is also an emergency exit, electronically-powered panic bars can also provide an effective solution. More and more schools are installing visitor management systems to control who can and cannot get into the building. Access control solutions Finally, the third level – and the most vulnerable – refers to the core of the school that both students and staff occupy. These are internal hallways, corridors, stairwells, entry points and restricted areas (such as staff lounges and science laboratories). These are the areas where a school must foster the safest environments for pupils, while also providing protection as they often contain confidential information, expensive equipment or chemicals. The access control system is linked to all doors within the school building A number of different access control solutions are beneficial, whether electronic, mechanical or a combination of the two. For electronic solutions, there are two options available: remote or centralized systems. With remote lockdown systems, individual locks are activated by remote control within proximity to the door. With integrated centralized systems, the access control system is linked to all doors within the school building and locked at the touch of a button. Prevent unauthorized persons Mechanical solutions, which include a cylinder lock and key, are also suitable for places such as classrooms, as doors can be locked externally with a key or internally with a thumbturn, to prevent unauthorized persons from entering. At one university in the United States, a smart RFID wire-free access control solution has been installed At one university in the United States, a smart RFID wire-free access control solution has been installed. The SALTO Virtual Network (SVN) wire-free system pushes and pulls data from the university’s ‘hot spot’ entry points to all their offline locks. By choosing a wire-free solution, the university only had to run wires to their exterior doors. The interior doors do not require wiring as these locks are stand-alone wire-free locks. Student accommodation block Securing access to student accommodates is another concern among colleges. One university in the United Kingdom wanted a security system to protect their student accommodation; in particular, a keyless system that would grant 24/7 access to its students while also enabling campus security to monitor these activities remotely. They chose Vanderbilt’s ACT365, which keeps audit trails by monitoring and recording fob activity. When another English university sought electronic locks for its newest student accommodation block, it turned to Aperio wireless locking technology from ASSA ABLOY. They used the wireless locks to extend the Gallagher Command Center access control system to a student residence with 231 en suite rooms separated into flats for between 8 and 13 postgraduates. Aperio wireless locks are battery-powered and use less energy than wired magnetic security locks.
Many organizations use hundreds and even thousands of surveillance cameras on their premises. They are used for crime or loss prevention, to have supporting evidence after the fact, to reduce liability, and to protect their reputation. The public generally expects that surveillance footage will be available after an incident and therefore it is almost a must to have a camera system. The US alone has over 200 million security cameras already installed with substantial growth anticipated over coming years. Most expensive camera A simple answer to this problem would just be to check every camera at least once a day, every day At any time and without warning, it is possible for problems to arise that affect the view of a camera. Examples include a branch of a tree growing in front of a camera’s view, bugs creating a nest inside a camera dome, condensation accumulating on and around the lens, wind knocking a camera off its axis, malicious tampering with the camera, dirt or mud sticking to the camera, among many others. When that happens, even the highest quality and most expensive camera will not capture the desired field of view and crucial evidence will be missing. Our survey effort of over 100,000 cameras indicates that at least 50% of cameras in a camera system will have a view problem each year. Theoretically at least, a simple answer to this problem would just be to check every camera at least once a day, every day. Artificial intelligence software But for an institution with hundreds or even thousands of cameras, this task is laborious and subject to human error. That’s where Ai-RGUS comes in. Named after the all-seeing giant from Greek mythology, Argus, Ai-RGUS is artificial intelligence software that monitors security cameras and makes sure that they are all working according to a reference image. The ‘i’ in Ai-RGUS is silent, and it indicates that the technology uses AI. Because the CIO of Duke couldn’t find any software on the market that would solve the problem It was designed by CEO Daniël Reichman, PhD, and is the continuation of a project that Duke University requested to be developed from Daniël’s lab at Duke while he was completing his Ph.D. in electrical and computer engineering at Duke, in order to help the university keep its then-1,100 cameras in working order. They requested it from their own lab, because the CIO of Duke couldn’t find any software on the market that would solve the problem of verifying the camera views. Consistent level of verification Although Duke was conducting regular manual inspections of their cameras, this process was onerous, costly and time-consuming for the team members. Furthermore, it was very burdensome to verify and audit manual inspections to ensure that both a consistent level of verification and to be sure it was regularly done. The goal was to avoid the situation of finding out a camera was not aimed right or was not recording until they went to access the video for evidentiary purposes… exactly the time you don’t want to find that out! “It’s a huge investment to put up 1,100 cameras,” Daniël Reichman, Ph.D., said, “so they want to make sure that once they have them, they can actually count on having the images from the cameras.” Camera inspection results Thanks in part to Ai-RGUS, Duke was able to nearly double its camera system in 2 years Since 2017, the software is operating successfully at Duke University. Thanks in part to Ai-RGUS, Duke was able to nearly double its camera system in 2 years. Duke’s Office of Information Technology reports that “We spend on average 5 minutes a day to inspect 2,000+ cameras thanks to Ai-RGUS.” A company spun out of this effort, called Ai-RGUS, with the University as a stakeholder. Ai-RGUS comes with a web dashboard that will allow you to see camera inspection results as well as historical analytics about your cameras system. It has an easy and automated install process and is agnostic to camera system size. It also comes with an API to integrate with your ticketing system. Ai-RGUS keeps security cameras in check by first requiring users to take a reference image that the software will use as the basis for comparison to the current image it sees. Identifying faulty cameras Potential problems that Ai-RGUS could identify in an image are blur, tilt, tamper, obstruction, glare, low light and a blank/black screen or feed down. If Ai-RGUS identifies a problem in a camera it will mark it as ‘unwell,’ so its owner can fix it. Ai-RGUS also keeps track of when cameras are habitually ‘unwell’ to help owners to identify faulty cameras for potential replacement. For security camera owners, it was such a headache to install the cameras" “It’s the kind of thing where you can set it and forget it,” Daniël said. “Ai-RGUS sends you emails when it needs to, it also has an API that can connect to an already existing ticketing system. Otherwise, don’t bother looking at the camera views. The surveillance camera hardware and software space is so complicated and fractured, we’re trying to make it as simple as possible. For security camera owners, it was such a headache to install the cameras. Now we want to make sure the system works as intended.” Video management software Ai-RGUS started its commercial efforts in May 2019 and have gained much traction since. The headquarters are still located in Durham, NC, and commercialization efforts are done from Las Vegas, NV. Among the many partners who signed up and utilize Ai-RGUS are Duke University, the City of Las Vegas, Thomas and Mack, Green Valley Grocery, Temple Beth Sholom, among others; to show that Ai-RGUS is suitable for deployment in many vertical markets. Now, Ai-RGUS is focusing more on further discussing partnerships with system integrators, distributors, and camera installation services, along with Video Management Software companies, which can include Ai-RGUS at the time of installation or for legacy systems to existing clients as a bonus service.
Navata Road Transport, a road logistics service provider, established in the year 1982, by founder Late Parvataneni Subhas Chandra Bose, now occupies a place of pride among the leading Road Transport Organizations in South India. Navata is spread across a network of 672 branches across India. Warehouses and distribution centers are an integral part of a hub and spoke operations at Navata. HR people at the Navata Road Transport had to manage and do manual work for time-attendance and overtime data. With manual work, data are prone to error. With error-prone data, it was difficult for them to proceed for salary payment. Not only this, but centralized monitoring of time-attendance data of employees of 20 locations across Andhra Pradesh was a difficult task for them. Time-Attendance systems As they already had their inhouse application, communication/integration of the time-attendance devices with that inhouse application was the biggest question for them. To communicate with the Linux Server and devices, they required a third party application interface which was not feasible. Established in 1991, Matrix is a provider of Security and Telecom solutions for modern businesses and enterprises. Matrix Door Controller comes with built-in API for system integration As an innovative, technology driven and customer focused organization, the company is committed to keeping pace with the revolutions in the Security and Telecom industries. With around 40% of its human resources dedicated to the development of new products, Matrix has launched cutting-edge products like Video Surveillance Systems - Video Management System, Network Video Recorder and IP Camera, Access Control and Time-Attendance systems as well as Telecom solutions such as Unified Communications, IP-PBX, Universal Gateways, VoIP and GSM Gateways and Communication Endpoints. Built-In API for system integration These solutions are feature-rich, reliable and conform to international standards. Having global footprints in Asia, Europe, North America, South America, and Africa through an extensive network of more than 2,500 channel partners, Matrix ensures that the products serve the needs of its customers faster and longer. Matrix has gained trust and admiration of customers representing the entire spectrum of industries. Matrix has won many international awards for its innovative products. With extensive analysis of the existing system and Navata’s requirements, Matrix came up with the solution to provide Door Controllers. Matrix Door Controller comes with built-in API for system integration. It directly pushes all the entry and exit records to the company’s Linux server. In addition to that, the customer can command and control the devices now through the inhouse Attendance Management and Payroll Application which was not possible earlier. Additional dedicated server Elimination of the errors has been possible in the data of Time-Attendance and overtime So, there is no requirement of any additional dedicated server for the interface with Matrix’s Door Controllers. Ultimately, these Door Controllers have overcome the challenge of communication with the company’s Linux server. By overcoming the challenges of the entire system, the customer enhanced the productivity of the employees and can effectively use the resources. After acquiring the solution from Matrix Comsec, Navata got the efficiency in Time-Attendance management. Elimination of the errors has been possible in the data of Time-Attendance and overtime. Now, employees get an accurate and timely salary at Navata Road Transport after the atomization of Time-Attendance record and calculation. This increased the productivity of the employees because of the accurate data. This also made the HR work smooth and hassle free. Through live monitoring, centralized control of all the 20 sites has been taken. Reduces installation and maintenance cost Product Offered: COSEC DOOR FOT A Door Controller with higher storage capacity and touch sense keypad. It identifies the user in less than one second. With multiple connectivity options like 3G/4G/LTE it gives flexibilities with the customer’s existing system and therefore, reduces installation and maintenance cost.
Recently, Planet Fitness, with the help of their preferred system integrator Adirondack Direct, incorporated a video surveillance solution from Hanwha Techwin and Genetec that not only enhances security, but also improves operations. When leadership evaluated security at their 70-plus corporate run locations a few years ago, they chose to incorporate a video surveillance solution that would address security needs and would be advanced enough to help with management and operations. Each of Planet Fitness’ corporate-owned clubs throughout North America is outfitted with approximately eight to 15 video cameras that provide around the clock coverage of the parking lot, lobby, break room, the fitness area where members workout and other key areas – without invading private areas, such as locker rooms and other intimate spaces. After issuing a Request for Proposal, Planet Fitness Senior Vice President of Corporate Club Operations Jim Esposito said they tested several of the leading camera and video management software (VMS) solutions, but ultimately decided on Hanwha video surveillance cameras managed by the Genetec Security Center platform. Esposito said they wanted to use Hanwha’s 360-degree cameras in particular because they provide more coverage, yet they save in hardware expenses because fewer cameras are needed. 360-degree fisheye camera Hanwha’s SNF-8010 5 MP 360-degree fisheye camera provides 5MP at 20FPS which captures smoother video at a higher framerate with true day and night function. Built-in on-camera de-warping allows instant access to PTZ, quad view, and panorama views. Alarm triggers for the Hanwha SNF-8010 include intelligent motion detection, audio detection, tampering detection, alarm input and network disconnection.Adirondack Direct also offers a 24-hour monitoring service and liaisons with law enforcement when needed A typical system setup at Planet Fitness includes placing cameras 25 feet from the wall and 50 feet apart which provides almost 2,000 square feet of coverage per camera. Club managers, regional managers and corporate employees manage the system via the Genetec Security Center which provides convenient bookmarks of recorded incidents so that – instead of time spent searching through video – events are already tagged. Adirondack Direct also offers a 24-hour monitoring service and liaisons with law enforcement when needed. “We knew that Planet Fitness would need thousands of video surveillance cameras for this project and it’s very important to consider reliability and functionality as well as durability,” said Adirondack Direct Director of Security and Technology, Tim Collins. “Hanwha has the lowest customer return number and that means that they manufacture products that aren’t sidelined by constant replacement and repairs.” Collins said Adirondack Direct has long recommended Genetec’s Security Center for video surveillance management because it provides the best open-architecture platform, robust features and is easy to use. Security Center blends IP security systems within a single intuitive interface to simplify operations and empowers organizations through enhanced situational awareness, unified command and control and connectivity to the cloud. When a Lunk Alarm is pressed, Genetec’s Security Center creates a bookmark of the event which provides video evidence of what preceded the alarm and how it was managed Business intelligence While the Hanwha-Genetec solution has provided an excellent security system – as well as protection against liability for slip and fall incidents – it’s also improved operations in multiple ways by providing invaluable business intelligence, said Esposito. Planet Fitness has a judgement-free environment for individuals who want to work out, but don’t want to have to endure the negatives so often found in gyms: loud grunts, the clanging of dropped weights and aggressive behavior. Anyone engaging in obnoxious behavior will likely be the recipient of a Lunk Alarm and the flashing lights, sirens and unwanted attention that accompanies it.Use of the Lunk Alarm – or lack of use – can be an indicator of how the club is operating Use of the Lunk Alarm – or lack of use – can be an indicator of how the club is operating. In order to monitor and evaluate use of the Lunk Alarms, Adirondack Direct has integrated the Lunk Alarm into the Hanwha-Gentec video solution. When a Lunk Alarm is pressed, Genetec’s Security Center creates a bookmark of the event which provides video evidence of what preceded the alarm and how it was managed. Potential medical emergencies Gyms typically have automated external defibrillators (AEDs) in the event a member suffers a medical emergency. At Planet Fitness facilities outfitted with the Hanwha-Genetec solution, once an AED is removed from its cabinet, a sensor is activated to shut off the music in the club to provide a calmer atmosphere. The system also creates a bookmark in the VMS and notifies managers and regional managers that an AED has been deployed. The Hanwha-Genetec Planet Fitness solution also provides key employee analysis that can help managers identify areas of improvement. Each facility has rubber floors that must be cleaned daily and Adirondack Direct has placed a sensor on a floor scrubber that creates a bookmark and recording in Security Center when the device is moved. Video evidence verifies whether the floor was actually cleaned or if the scrubber was just relocated. Break room sensors Each break room is outfitted with a sensor that creates a video bookmark every time the door is opened. If an employee visits too often, Planet Fitness management can reorient that employee on the proper policies and procedures. For day to day efficiencies, video analytics can be a valuable tool. If an employee is constantly leaving the front desk to go to a storage closet for a particular item, they can make changes including moving the item closer to the front desk. “If during an overnight shift the camera indicates that there was no motion at the front desk for a prolonged period of time, then that’s a problem,” said Esposito. “We expect someone to be in that position greeting and welcoming members so if someone isn’t there, the video can help us understand why.”If an employee visits the break room too often, Planet Fitness management can reorient that employee on the proper policies and procedures A big question for Planet Fitness – that can be answered via video analytics – is have they been losing sales opportunities without realizing it? “What we’re exploring now is a virtual line that counts the number of people that come and go in the club,” said Esposito. “We know how many people check in. So, if a club checks in 500 people in a day, but there are 600 people that enter the door, that can be lost revenue.” Esposito said they chose Hanwha cameras and the Genetec platform because they knew that they needed a solution that was at the forefront of technology, with the flexibility to grow with them and meet their future needs. He added the solution delivers a safe environment that is appreciate by everyone. “It’s somewhat of a security blanket for our members and employees,” he said. “They appreciate our no intimidation mantra and the fact that we have created this safe and secure environment that offers a judgement free zone where people can do their own thing.”
The Smart Cities Mission is an innovative initiative by the Government of India to drive economic growth and improve the quality of life of people. It aims to achieve this by enabling local development and harnessing technology as a means to create smart outcomes for citizens. A hundred cities across the country were shortlisted by the government, which were to be promoted as ‘Smart Cities’. Vadodara was selected among those 100 cities to be developed as a smart city in India, to enhance economic growth, and improve the quality of life of people by enabling local area development, deploying smart solutions and harnessing technology. Optimizing city traffic management Vadodara Smart City Limited wanted to heighten safety for its citizens and visitors, along with optimising traffic management With a population of approximately 2.39 million, Vadodara is the third largest city of Gujarat, and a major industrial, cultural and educational hub of western India. The city is compact and crowded, with a vibrant cultural life that draws a lot of traffic. It is vulnerable to situations of overcrowding, road accidents, criminal activity, and natural disasters. Vadodara Smart City Limited wanted to heighten safety for its citizens and visitors, along with optimizing traffic management, without disrupting daily lives. To this end, they sought a state-of-the-art, open platform that could expand in phases, in sync with the city’s growth. Unified Video Computing Platform As Vadodara’s expansion plans are underway, so too are discussions about growing the city-wide surveillance system. As part of the initial process, a project team comprising Smart City officials, Videonetics, and technology partners did an extensive research to mark out key areas and traffic junctions across the city. Going a step further, Videonetics developed a solution based on its Unified Video Computing Platform (UVCP) for the entire city, so that its people, property, and assets remain secure. State-of-the-art AI & DL powered Intelligent VMS and Video Analytics to provide continuous viewing and recording, enabling security operators and law enforcement to proactively identify, and effectively respond to, events to mitigate their impact. Specifically, now the law enforcement authorities can automatically detect overcrowding, unattended baggage, and perimeter intrusions, even under the cover of darkness. Automatic Number Plate Recognition (ANPR) system across 15 traffic junctions in Vadodara, to identify suspected/ unwanted vehicles and non-standardized number plates, as well as to generate detailed reports on vehicle movements, and much more. Command Control Centre, to provide a bird’s eye view to operators, about what is happening across the city. From traffic control to citizen security, operators remain alert and ready. With greater situational awareness, municipality officials are proactively responding to incidents such as garbage overfill, incidents of water-logging, traffic congestions, hazardous debris on roadways, illegal parking, and more. Video surveillance systems Videonetics’s solution manages over 550 IP cameras throughout the city of Vadodara Under the project, video surveillance was deployed along public ways, in urban passenger transport stations, municipal buildings, traffic junctions, entry and exit connecting roads to city, and more. To date, Videonetics’s solution not only manages over 550 IP cameras throughout the city of Vadodara, but also proactively identifies and effectively responds to events, to mitigate their impact. Furthermore, the video surveillance system helps in the maintenance of peace in the city, in upholding law and order, and providing better policing services. The key results are: 1. Increased safety and security with 24x7 monitoring of city area, 2. Faster crime investigations, 3. Traffic police having in-depth knowledge on vehicle count and movement, and 4. Swift action by on-site traffic police, as they get alerts on traffic congestion, unwanted/ hot-listed vehicles, and so on. City surveillance Moreover, Videonetics’s solution has also been able to help the police in monitoring celebration of festivals and VIP movement in the city, and building a security net for its citizens. Overall, it has been successful in ensuring the safety and security in the city of Vadodara, and has played an important role in becoming a smart and connected city.
BI-City Tokyo is located in Nur-Sultan (Astana), the capital city of Kazakhstan. It is a high-end residential complex of BI Group – a construction holding company in the Kazakhstan real estate market. At present, three apartment buildings with public areas and more than 400 apartment units have been completed. Aiming to create modern high-end intelligent buildings and residential areas, the BI Group wanted to upgrade the existing analog video intercom system of BI-City Tokyo. Analog intercom system The original analog intercom system in this community is outdated and cannot meet the diverse security requirements of high-end residential areas. First, the original analog intercom does not support retaining images and leaving messages. Second, this system only supports access cards to open doors, which is inconvenient for residents in case they forgot their card. Third, the original system cannot add IP cameras to monitor public areas such as children's playground, fitness areas, etc. Fourth, the cold winter temperature in Nur-Sultan requires high-performance equipment capable of operating in extreme environments. Cold winter temperature requires high-performance equipment capable of operating in extreme environments Faced with the abovementioned challenges, BI Group was also looking for a trustworthy brand that can provide not only modern smart system but also technical support and reliable after-sales service. Meeting all the above requirements, Dahua smart residential solution was chosen to be the security solution provider of BI-City Tokyo. Access ANPR Camera The complete solution deployed more than 300 pieces of Dahua equipment, including Indoor Monitor, Apartment Outdoor Station, IP Camera, Access ANPR Camera, Video Recorder, etc. The solution supports two-way audio intercom, real-time video and messaging feature. In addition, a variety of door opening methods were also implemented: door opening via remote calling, door opening using access card, and remote door opening via APP. Additionally, all the equipment can be visualized and integrated in the Dahua DSS platform for centralized management, operation and maintenance. Moreover, the temperature in Nur-Sultan can reach up to negative 40 degrees in winter season. This requires high-performance outdoor devices featuring dust and water resistance, and explosion-roof capability. In response to this pressing challenge, Dahua apartment outdoor station VTO1210C-X-S1 and access ANPR camera ITC237-PW1B-IRZ that support wide working temperature were installed at the entrance of the apartment building for a more effective visitor and vehicle management. Built-in intelligent video analytics When a visitor arrives at the entrance of the apartment building and dials a resident’s room number through the Dahua apartment outdoor station, the camera installed at the entrance will synchronize the video with the visitor’s image captured in the resident’s indoor monitor. Once the visitor’s identity is confirmed, the resident just needs to press the button on the indoor monitor to open the door remotely. With Dahua app, users can even answer calls and open doors remotely when they are out for work or traveling. As for vehicles, Dahua access ANPR camera ITC237-PW1B-IRZ is designed for extreme temperature environments (temperature range of -40°C to +60°C). With built-in intelligent video analytics, the camera has the ability to detect and recognize moving vehicle's plate number within low speed. IR Mini-Bullet Network Camera The camera uses a set of optical features to balance light throughout the sceneFor both approaching and departing vehicles, the access ANPR camera takes a snapshot of the license plate and vehicle overview picture, as well as records corresponding surveillance videos. By setting a whitelist, the camera can automatically control the barrier or gate to open if a plate number recorded in the whitelist has been recognized. The public areas including children's playground, fitness areas, as well as the lobby are covered by 2MP IR Mini Dome Network Camera IPC-HDBW4231E-ASE, 2MP and 3MP IR Mini-Bullet Network Camera. The Starlight Ultra-low Light Technology of IPC-HDBW4231E-ASE offers light sensitivity, capturing color details under low light condition up to 0.002lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. Smart residential solution Dahua smart residential solution provides an integrated management platform for the management personnel of BI-City Tokyo. It assists in the remote and visual management of the property and improves the services and facilities they offer. Security guard at the entrance is not needed anymore to manage entering and exiting vehicles, which saves labor costs, reduces the waiting time of vehicles and improves traffic efficiency. In addition, the all-round monitoring of the public areas within BI-City Tokyo greatly improves the safety level of the entire community. The video intercom system of the building provides a variety of convenient door opening methods, enhancing the resident’s living experience. "We adopted analog solution in the first phase. From the second phase, we replaced all of analog system with Dahua’s IP video intercom solution. We hope that Dahua will help us complete the solution planning of the three, four, five, and six phases”, said Arman, General Manager of BI Group.
Kumbh Mela is one of the most sacred pilgrimage festivals of India and is organized at a grand scale at Nasik, Haridwar, Ujjain and Prayag. As Kumbh Mela is celebrated after a period of 12 years in Nashik, 100 million people visit and therefore security is a major concern for the Government bodies. Railway stations are highly congested areas. So, one of Matrix Comsec's biggest challenges was to install devices and set up a control room for monitoring railway station entrances, platforms and connecting bridges at the busy Nashik railway station. Moreover, a restricted bandwidth for the video surveillance solution made the entire process all the more challenging. And lastly, the authorities also wanted the storage of the entire 4 month period as evidential proof. 24*7 video surveillance solution Matrix’s complete Video Surveillance solution was a highly efficient and cost-effective one Matrix used its unique Cascading feature to connect all the devices with sequencing for central monitoring on TVs in the control room to reduce the overall solution cost. Also, Matrix Comsec provided 4-months scheduled backup of all cameras configured centrally for storing all the streams. Moreover, we completed the entire installation within 20 days with the help of highly skilled manpower. Being an Indian brand, efficient pre-sales and post-sales support was already a part of the solution. Matrix left no stone unturned in making sure that the visitors suffered no hassles during their Kumbh Mela visit. To facilitate this, we secured the Entry & Exit from the city with our 24*7 Video Surveillance solution. centralized monitoring software This led to enhanced security and smooth execution of the event. Moreover, the solution was highly cost-effective as the need of security manpower was replaced with centralized monitoring of all locations. Also, due to the use of IP cameras, the wiring cost of such an extensive installation was also reduced. So, all in all, Matrix’s complete Video Surveillance solution was a highly efficient and cost-effective one. Products Offered: SATATYA HVR1624P SATATYA CIBR13FL40CW SATATYA CIDR13FL40CW SATATYA CIDRP20VL130CW SATATYA Centralized Monitoring Software (CMS)
Round table discussion
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
You could say concerns about privacy are “trending” in our increasingly data-driven world. Unease about how Facebook and other high-tech companies use and share data dominates the news, and the full impact of new European Union (EU) regulations is about to be felt around the world. By May 25, companies that collect data on EU citizens will need to comply with strict new rules around protecting customer data, as enumerated in the General Data Protection Regulation (GDPR). But how do the new regulations, and broader concerns about privacy, affect the physical security market? We asked this week’s Expert Panel Roundtable: How do privacy issues and regulations, such as GDPR, impact physical security systems and how they are managed?
Reducing The Cost of Video Surveillance System Deployment and OperationDownload
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals