Honeywell announced the release of Pro-Watch® Integrated Security Suite, a software platform designed to help protect people and property, optimize productivity and ensure compliance with industry regulations. The platform provides complete visibility of all connected systems and the scalability of the software makes it easy to grow with the changing needs of a business. Pro-Watch Intelligent Command is a web-based user interface that provides organizations complete situational awareness of...
Hanwha Techwin’s position as global in video surveillance has been reaffirmed with the announcement that Wisenet7, the company’s next generation proprietary camera chipset, has achieved UL Cybersecurity Assurance Program (UL CAP) certification. With cybersecurity being a top priority for the electronic security industry, the certification enables Hanwha Techwin to validate that its latest generation of Wisenet cameras are equipped with the highest possible levels of protection from...
People have always had an innate need to feel secure, from building fires at the front of caves that ward off predators in prehistoric times, to today’s efforts of locking your front door. This need for security extends to venturing further afield from the home and is critical for communities to thrive and survive. More than ever, people want to be and feel safe; protected against physical and now biological threats. When it comes to staying safe, populations around the world have recentl...
As the media often reports, the world of cybersecurity can be seen like the ‘Wild West’. There’s now a wide range of Internet of Things (IoT) devices connected to the web, making this a hot topic. Among these devices are security cameras. IoT devices are computers that use software that makes them vulnerable. As the famous cybersecurity evangelist Mikko Hypponen says, "If a device is smart, it's vulnerable!" Hypponen is right. On a daily basis, new vulnerabilities are found in...
SecureBI, a strategic advisory firm delivering business intelligence to the security industry, and the American Crime Prevention Institute (ACPI) have established a partnership to bring online crime prevention training and certification courses to law enforcement agencies and security professionals across the country. ACPI has pioneered the development and delivery of in-person crime prevention training and certification programs for law enforcement since 1998. With the new online educational o...
Johnson Controls will showcase solutions and thought leadership critical to safe building reopening during the virtual Global Security Exchange Plus (GSX+) conference. From Sept. 21 to Sept. 25, 2020, Johnson Controls experts will demonstrate and discuss the latest security innovations that have become integral to intelligent security during the COVID-19 crisis and beyond. Attendees can interact with Johnson Controls leaders during keynote event sessions, technology demos and a thought leader i...
ADT Inc. announced that, via its commercial channel (“ADT Commercial”), it is investing in Percepta Labs, an artificial-intelligence technology startup out of Philadelphia. ADT Commercial is a premier provider of commercial security, fire, life safety, and risk consulting services in the U.S., and through its investment will fund the commercialisation and application of the startup’s cutting-edge AI technology to help detect and deter shoplifting. ADT Commercial will work directly with Percepta to further test and develop the application of Percepta’s proprietary, socially responsible AI technology in commercial environments and facilitate the launch when the solution is market-ready. Response to facial recognition challenges Founded by Philippe Sawaya, Neil Gramopadhye, and Jonathan Mak while pursuing their undergraduate degrees at the University of Pennsylvania, Percepta’s proprietary "ethical AI" technology responds to emerging concerns surrounding the use of facial recognition technologies and is designed to anonymize individuals’ demographic features—including race, gender, and age—by analyzing existing security camera feeds to detect shoplifting incidents in real-time. Using advanced action recognition techniques, Percepta’s AI technology tracks individuals’ movements, scanning for probable shoplifting or precursory shoplifting behavior and assesses theft probability. Loss prevention accuracy “We’re so proud to place our support in forward-thinking organizations like Percepta, who are aiming to truly revolutionize the industry,” said Dan Bresingham, Executive Vice President for ADT. “We pride ourselves on being at the forefront of change in our industry. We believe Percepta could signal a tidal shift in how we approach AI, facial recognition, and data collection, and we look forward to seeing how their technology continues to develop.” In addition to taking a socially responsible approach to AI, Percepta’s technology shows tremendous promise when it comes to loss prevention accuracy. Early tests by Percepta indicate the technology could be more than two times more accurate than human loss prevention personnel in detecting shoplifting behaviors, translating into improved margins, decreased shrink, and a better experience for customers, while eliminating biases based on race, gender, and age. Ethical AI technology “AI’s presence in our lives has skyrocketed, yet it poses ethical concerns that have not been sufficiently addressed. We’ve made these concerns a key priority and are proud to have developed an ethical AI technology that counteracts these biases in the world of retail and beyond,” said Sawaya, CEO of Percepta. “We look forward to seeing how ADT Commercial’s vast experience and commercial network will accelerate Percepta’s growth. We’re excited to partner with them in our shared mission to support socially responsible AI security solutions.”
ASIS International, the world's association for security management professionals, opens their annual conference on an entirely new virtual platform to provide maximum value for association members during the unprecedented global pandemic. The new virtual experience, branded GSX+, builds on the annual Global Security Exchange (GSX) event and promises to be a large virtual gathering of global security professionals. GSX+ is delivering a fully virtual experience that includes CPE-eligible education sessions, a robust Marketplace (virtual exhibit hall), and lively peer-to-peer networking. Extensive program with education sessions GSX+ is truly a virtual experience unlike anything the security industry has experienced before" The event will continue through 25 September, featuring an extensive program with 140+ education sessions and daily keynote presentations. The show kicks off with a General Session presentation by Juan Manuel Santos, two-term President of Columbia and recipient of the 2016 Nobel Peace Prize. “GSX+ is truly a virtual experience unlike anything the security industry has experienced before,” says Godfried Hendriks, CPP, 2020 President, ASIS International Global Board of Directors. “The global pandemic challenged us, so we responded by seizing the opportunity to provide new value. For example, every educational session will be recorded and made available for attendees on-demand 24/7. Unlike previous in-person events, this change means that every attendee, no matter their travel restrictions or time zone, will be able to see and learn from every offered session. We are excited about every element of this new virtual event, and we hope that attendees will also seize this opportunity to experience all the possibilities. Only ASIS has the experience, global reach, and expertise of its members to convene a virtual event of this magnitude and quality.” Keynote presentations The following keynote presentations are scheduled for Tuesday, Wednesday, and Thursday at GSX+ in the week: + 22 SeptemberEmbracing the Future: Strategies for Building Resilience and Innovation Presented by Dr. Ilham Kadri, CEO of Solvay, and Werner Cooreman, CPP, PSP, Senior Vice President – Group Security Director of Solvay + 23 SeptemberLeading in Turbulent Times Presented by General Stanley McChrystal, 4-star General and former Commander of U.S. and International forces in Afghanistan + 24 SeptemberThe Future of Cybersecurity Presented by Keren Elazari, CISSP, Security Analyst, Researcher, and Public Speaker GSX+ educational lineup All-Access attendees can earn up to 25 CPEs and will be able to access education sessions through 31 December The GSX+ educational lineup includes 140+ scheduled and on-demand sessions across five tracks: National Security, Physical and Operational Security, Risk Management, Digital Transformation/ Information Security, and Leadership and Managing within Organizations. All-Access attendees can earn up to 25 CPEs and will be able to access education sessions through 31 December. GSX+ also offers numerous opportunities for peer networking, including virtual receptions, awards celebrations, and even the famous ASIS Break Room. Planned events list for GSX+ attendees Here are a few of the planned events: + 21 September, 3:30 pm ET: Join the Welcome Reception, which will feature a Rock & Roll Game Show for GSX+ attendees where music is central. Join the fun with renowned musician-MCs – they’ll keep the entertainment going so one can focus on relaxing and connecting. + 22 September, 3:30 pm ET: ASIS Women in Security and Young Professionals Happy Hour + 23 September, 3:30 pm ET: GSX+ Military and Law Enforcement Appreciation Day + 24 September, 3:30 pm ET: President’s Reception + 25 September, 12:25 pm ET: Awards Celebration + 24/7: The ASIS Break Room
Cyan Forensics is announcing a new partnership with Susteen. This partnership joins together Cyan Forensics scanning technology software with Susteen’s DataPilot DP10 platform, creating a triage capability for smartphones, meaning that police forces will be able to scan portable devices for illicit materials, such as child sexual abuse, swiftly and accurately. Evidence collection Partnership will allow investigators to use Cyan Forensics’ scanning technology with Datapilot DP10 to scan smartphones in the field faster than ever before Susteen’s Datapilot DP10 device is used extensively for evidence collection by police forces and governments around the world Cyan Forensics’ rapid triage technology is currently used by UK and European police to scan computers and hard drives for child abuse and terrorist content in minutes Cyan Forensics’ existing solution for laptop and hard drives is already used by the Home Office and counter terrorism policing in the UK Police and counter terrorism officials will now be able to scan smartphones quickly in the field to combat child sex abuse images and extremist material Importance of the investigation As 78% of adults use smartphones, new mobile capability will help UK and international law enforcement keep up with the overwhelming number of devices. In 2019 alone, there were over 3.2 billion smartphone users globally, creating an uphill battle for police forces Policing is experiencing a huge increase in the number of smartphones being examined for evidence. Online sex abuse of children in the European Union has increased during the COVID-19 pandemic, according to Europol
ConnectWise, the provider of intelligent software and expert services for technology solution providers (TSPs), has released the findings of the second annual ConnectWise SMB State of Cybersecurity report. The year 2020’s study was conducted between June and July 2020 and surveyed over 700 IT and business decision makers in the US, the UK, Canada, Australia and New Zealand. A few major findings from the report include: 91% of SMBs said they would consider using or moving to a new IT service provider if it offered the “right” cybersecurity solution 68% of respondents said the “right” offering means having confidence in an MSP’s ability to respond to security incidents, while 58% stated it’s having confidence in an MSP’s ability to minimize damage or loss Three-quarters of the respondents worried they will be the target of an attack in the next six months Cybersecurity expertise Over half of SMBs surveyed (52%) agree they lack the in-house skills necessary to properly deal with security issues, and 49% of SMBs find more cybersecurity expertise as an added benefit of working with an MSP Only 13% of SMBs are having regular cybersecurity-related conversations with their MSP and 29% of SMBs talk to their MSP about cybersecurity only after they have suffered an incident Although COVID-19 did not significantly impact respondents’ views on cybersecurity, the pandemic has raised new concerns for SMBs, with 79% of respondents worrying about their remote devices or remote employees being breached.
Alcatraz, a developer of autonomous access control products, announced it has joined the NVIDIA Metropolis Software Partner program and is leveraging the NVIDIA Jetson Edge AI platform to create a real-time machine learning and computer vision multi-sensor embedded system. Alcatraz offers the Rock, a touchless and secure physical access control platform that works with any access control system, delivering an autonomous solution on the edge. It replaces or augments badging as a credential with opt-in identity management, 3D sensing, and artificial intelligence to enable highly secure and frictionless entry into physical locations. Increased security The Rock uses passive 3D sensing, machine learning for increased security, and accurate tailgating detection while intelligently enrolling employees as they are badging in, eliminating the headaches associated with traditional enrolment. A newly added mask enforcer feature offers businesses the ability to comply with increasing state-mandated pandemic-related mask orders. “We’re innovating the physical security space with the creation of autonomous access control that works with any existing provider,” said Alcatraz Chief Revenue Officer Tina D’Agostin. “Joining the NVIDIA Metropolis Software Partner Program will enrich our machine learning and computer vision multi-sensor embedded system, allowing us to develop and deliver one of the most technologically advanced solutions on the market.” NVIDIA Metropolis With cutting-edge technology and an extensive developer ecosystem, NVIDIA Metropolis helps businesses create, deploy, and scale AI and IoT applications – from edge to cloud. The partner certification program offers system design tools and turnkey software packages enabling pre-validated, enterprise-ready intelligent video analytics (IVA) solutions that can be deployed to build smarter and safer cities worldwide. The certified software, once deployed in the field, makes it hassle-free for companies to manage and upgrade software easily and scale out their IVA solutions everywhere.
InfoSaaS and Axora have concluded a partnership agreement intended to transform the processes and costs of achieving and retaining information security, data protection and business compliance ISO management system certifications for companies operating in the oil, gas and mining sectors. Companies in these sectors are subject to the same compliance requirements as other organizations, but the very nature of their business activities means their sites are frequently in difficult-to-reach and/or inhospitable locations. As a result it can be both difficult and/or expensive to: Bring and keep compliance managers on-site to implement procedures and processes, collaborate with local teams, and generally prepare for certification or surveillance audits Bring auditors from Certification Bodies on-site to conduct the initial audits necessary for the awarding of certifications or to carry out the annual surveillance audits required for organizations to retain those certifications. SaaS software solutions InfoSaaS provides SaaS software solutions for achieving and retaining multiple ISO management system certifications. By virtue of being platform-based, these solutions enable: Compliance managers (or whoever is responsible for ISO compliance within their organization) to collaborate with colleagues on-site, and to conduct "internal audits" to ensure that standards are met ahead of any external audit; and Certification Bodies to conduct surveillance audits remotely – eliminating the need for auditors to travel to difficult-to-reach locations. Axora and InfoSaaS collaboration Axora works specifically with companies in the oil, gas and mining sectorsAxora works specifically with companies in the oil, gas and mining sectors, identifying technologies with the potential to shape the future of such businesses, helping them understand the key opportunity areas that sit across the value chain, and connecting them to the innovators. Several InfoSaaS solutions are available on Axora’s platform, supporting: ISO27001 (information security management), ISO9001 (quality management), ISO14001 (environmental management) and ISO18001/ISO45001 (health and safety management). ISO certifications costs and challenges InfoSaaS and Axora intend to leverage each other’s expertise in information security, data protection solutions"Peter Rossi, co-founder of InfoSaaS, said: “ISO certifications are valuable for any business to earn. But, for otherwise similar companies that happen to be in different industries, there can be huge disparities in the costs of doing so. InfoSaaS and Axora intend to leverage each other’s expertise – in information security, data protection and business compliance solutions, and the oil/gas/mining industries respectively – to transform the processes and associated costs of certification and surveillance audit for companies operating in those sectors, where simple ‘geography’ may currently make it expensive and difficult.” Energy and mining sectors The energy and mining sectors are under increasing pressure to adhere to the ever-changing compliance certification criteria"Dr. Nick Mayhew, Chief Commercial Officer for Axora said: “The energy and mining sectors are under increasing pressure to adhere to the ever-changing compliance certification criteria and improve their strategies. With this comes additional overhead in terms of resource, time and effort required to obtain and maintain these standards. We are excited to help organizations leverage the InfoSaaS platform to drastically simplify and manage their compliance operations in key business areas including environmental, security, health and safety.” Demand for remote audits ISO management system certifications have grown in importance to organizations operating in increasingly competitive markets around the world, clearly communicating relevant or important competencies to potential customers. Demonstrating certification against industry standards and evidencing a mature approach to the protection of sensitive information and personal data have become baseline requirements in many markets and for some customers. The global coronavirus pandemic has driven a surge in demand for remote audits generally, requiring businesses to adopt new approaches and solutions that allow teams, compliance managers and auditors to collaborate effectively to achieve and retain certifications.
Security experts have discussed the demise of the passwords for years. As early as 2004, Bill Gates told the RSA Security Conference that passwords “just don’t meet the challenge for anything you really want to secure.” Change has been slow, but the sudden increase in remote working and the need for enterprises to become touchless as they try to encourage teams back to the office is increasing traction. Here we look at the future of passwordless authentication - using the example of trusted digital identities - and share tips on choosing a solution that works for your organisation. The move away from passwords was beginning to gain momentum pre-pandemic. Gartner reported an increase in clients asking for information on ‘passwordless’ solutions in 2019. Now Gartner predicts that 60% of large and global enterprises, and 90% of midsize enterprises, will put in place passwordless methods by 2022. This is up from 5% in 2018. The many limitations of passwords are well-documented, but the cost of data breaches may be the reason behind this sharp upswing. Stolen credentials – usually passwords – and phishing are the top two causes of data breaches according to the 2019 Verizon Data Breach Incident Report. Each breach costs businesses an average of anywhere between £4M to £8M depending on which studies you read. A catalyst for change As in so many other areas, the pandemic has been a catalyst for change. Newly remote workers using BYOD devices and home networks, sharing devices with other family members, and writing down passwords at home all make breaches more likely. And seasoned home workers represent a risk too. It also means that enterprises are developing new procedures to mitigate the spread of disease. This includes a thorough examination of any activity that requires workers to touch surfaces. Entering passwords on shared keyboards or touchscreens falls squarely in this area of risk. As does handling physical smart cards or key fobs. Enterprises are expanding their searches from “passwordless” to “passwordless and touchless,” looking to replace physical authenticators. In the quest to go touchless these are items that can be easily eliminated. The future of passwordless authentication Using fingerprint or facial recognition often only provides a new front-end way to activate passwords Common alternatives to passwords are biometrics. But, using fingerprint or facial recognition often only provides a new front-end way to activate passwords. Passwords are still required for authentication after the biometric scan and these live in a central repository vulnerable to hackers. With one successful hack of the central repository, cyber-criminals can swipe thousands of details. In other words, biometrics on their own are not an improvement in security, only a better user experience. They need to be combined with a different approach that adds another layer of security. A more secure option is to move away from the centralised credential repository to a decentralised model. For example, one based on trusted digital identities. This is where digital certificates are stored on users’ phones. Think of encrypted digital certificates as virtual passports or ID cards that live on a worker’s device. Because they are stored on many separate phones, you are able to build a highly secure decentralised credential infrastructure. A solution that uses people’s phones is also compatible with touchless authentication systems. You can replace smart cards and key fobs with a phone-based security model and reduce the number of surfaces and items that people touch. This is especially beneficial for workplaces where people have to visit different sites, or for example in healthcare facilities. Replacing smartcards with a phone in a pocket reduces the number of items that clinicians need to take out and use a smartcard between and in different areas, which may have different contamination levels or disease control procedures. How do trusted digital identities work? Workers unlock their mobile devices and access their trusted identity using fingerprint or facial recognition Here’s an example installation. You install a unique digital certificate on each user’s mobile device — this is their personal virtual ID card. Authorised users register themselves on their phones using automated onboarding tools. Workers unlock their mobile devices and access their trusted identity using fingerprint or facial recognition. Once they are authenticated, their device connects to their work computer via Bluetooth and automatically gives them access to the network and their applications with single sign on (SSO). This continues while their phone is in Bluetooth range of their workstation, a distance set by IT. When they leave their desk with their phone, they go out of range and they are automatically logged out of everything. Five tips on choosing a passwordless solution More automation means less disruption Consider how you can predict and eliminate unnecessary changeover disruptions. The task of onboarding large or widely dispersed employee populations can be a serious roadblock for many enterprises. Look for a solution that automates this process as much as possible. Scalability and your digital roadmap Will you maintain remote working? Having a high proportion of your team working remotely means that passwordless solutions will become more of a necessity. Are you expecting to grow or to add new cloud apps and broader connectivity with outside ecosystems? If so, you need password authentication that will scale easily. Encryption needs and regulatory requirements If your workers are accessing or sharing highly sensitive information or conducting high-value transactions, check that a solution meets all necessary regulatory requirements. The most secure passwordless platforms are from vendors whose solutions are approved for use by government authorities and are FIDO2-compliant. Prioritise decentralization Common hacker strategies like credential stuffing and exploitation of re-used credentials rely on stealing centralised repositories of password and log-in data. If you decentralise your credentials, then these strategies aren’t viable. Make sure that your passwordless solution goes beyond the front-end, or the initial user log-in and gets rid of your central password repository entirely. Make it about productivity too Look for a solution that offers single sign on to streamline login processes and simplify omnichannel workflows. For workers, this means less friction, for the enterprise, it means optimal productivity. Security improvements, productivity gains and user goodwill all combine to form a compelling case for going passwordless. The additional consideration of mitigating disease transmission and bringing peace of mind to employees only strengthens the passwordless argument. The new end goal is to do more than simply replace the passwords with another authenticator. Ideally, enterprises should aspire to touchless workplace experiences that create a safer, more secure and productive workforce.
Today, 55% of the world’s population lives in urban areas. According to estimates from the UN, this number is expected to increase to 68% by 2050. As urban areas become more densely populated, the ability of law enforcement to uphold law and order becomes ever more critical to public security. It’s a challenge that must be constantly reviewed, and issues addressed where needed. One such area is the detection, identification and interception of physical threats, which has traditionally included guns, knives and explosives. Over the last six months, however, this has now evolved into the detection and identification of new, invisible microbiological threats, such as COVID-19. A new approach to physical security Since reports began on COVID-19 in Wuhan, China, in December 2019, the virus has spread to over 188 countries, killing over 790,000 people. When this is set against the unrelenting backdrop of rising terrorist threats, a new approach to today’s physical security is needed to create safer public and private spaces. Globally, tensions are running high. An international health crisis, political tumult and unstable economic environments are creating the potential for a perfect storm for extreme behavior. Now, more than ever, governments must coordinate with healthcare, security services, and technology providers to pool the expertise needed to deploy innovative detection platforms to address these growing threats. In smart cities, in particular, technology will play a crucial role in addressing both physical and biological/viral threats in order to keep their citizens safe. Technology will play a crucial role in addressing both physical and biological/viral threats Collaborating to advance security systems in smart cities To date, we’ve seen an increase in the number of smart city programmes around the globe; cities that are beginning to deploy innovative technologies for the management and ease of life services. Global spending on smart city initiatives has now reached a total of nearly $124 billion this year alone, an increase of 18.9% over 2019, according to the International Data Corporation’s (IDC) latest Worldwide Smart Cities Spending Guide. However, the growth of urban populations is impacting overall infrastructure and resources and many towns and cities are struggling to keep pace. According to research from Deloitte, just 16% of cities can self-fund required infrastructure projects. As a result, cities are enlisting the support of private partners and governments to advance their smart city agendas. Public-private collaboration is a lifeline for developing effective security systems in smart cities. Decision-makers must coordinate and collaborate with security experts and operators to arm themselves with a comprehensive understanding of how to best implement and integrate innovative, agile, data-driven security systems. They need to work together, with a clear strategy in place, to respond to these growing threats, while improving public safety. Using smart technology for public security and safety The challenge of identifying both physical and invisible threats to meet urban citizens’ needs will demand a security response that is proactive, adaptable and dynamic. As we look ahead to the future of public safety, it’s clear that new technologies, driven by artificial intelligence (AI), can dramatically improve the effectiveness of today’s physical security space. For smart cities, the use of innovative AI and machine learning technologies have already started to help optimize security solutions. Demand a security response that is proactive, adaptable and dynamic Computer vision technology is one such solution that incorporates AI and machine learning into existing video monitoring security (VMS) systems. This computer vision technology enables the detection of visible weapons, such as guns or knives, helping to identify potential threats before an attack occurs. After identifying the weapon, the AI-driven security system can immediately alert onsite security, in real-time, to the location and nature of the incident or potential attack. This allows security and first responders to intervene, possibly before a weapon is drawn and/or used. AI-driven software has also demonstrated great potential for identifying those displaying symptoms of viral or infectious diseases, without requiring physical human contact. By using AI-powered video analytic software with a common ‘off the shelf’ thermal video camera, this new security solution can become a remote video health safety screening tool for the identification of elevated body temperature, as well as face mask and social distancing detection for compliance. Now, with the power of real-time AI software, integrated with current VMS systems, threat objects held by an assailant, whether visible or not, can be identified for immediate security response. This can be done in an effective, unobtrusive way that does not interrupt people’s day-to-day routine, as has been the case with other larger or more overt security solutions; including queueing for physical temperature checks or walking through a metal or millimetre wave detector. While individuals and communities are willing to accept some inconvenience as a result of this new normal, privacy and civil liberties must be maintained, until a potential threat is detected. The future of smart cities in a post-COVID world Look ahead to the future of public security We look ahead to the future of public security in a world where physical and microbiological threats are continually evolving. It is only by adopting a new approach to threat detection that such a wide spectrum of the active assailant attacks can be mitigated. Today’s communities are working this into their smart, connected and safe city models. With AI-driven technology that optimizes the efficiency and safety of city operations and public services, its citizens will not only stay connected but will also stay safe. Governments must coordinate with security services, as well as technology providers, to pool the expertise needed to best implement and integrate these innovative technologies for the public good. They need to work collaboratively to ensure smart city projects include solutions to address physical security technologies that addresses theft, civic disturbance, terrorist activities and infectious disease. This, in turn, will make these cities not only smarter, but safer as well.
IP cameras for video surveillance has been a trending topic amongst enterprises across the world due to rising concerns for security and safety. IP CCTV cameras are revolutionizing security measures, and technology has evolved to allow for a more diverse security monitoring system through high resolution, larger digital storage options and compatibility for integrated analytical software. According to Global CCTV Market Forecast 2022, analysts expect the market for global CCTV to grow at a CAGR of around 11% during 2018-2022. Clearly, a successful hack of an enterprise security camera system could lead to a range of implications. Amongst the main ones is unauthorized access to video and audio streams of data, as well as to the archive, violation of confidentiality, HIPPA, PII and potential leaks of personal and corporate information, possible copying, unauthorized distribution and duplication of such data. “Most Enterprise video surveillance systems are vulnerable to hackers. According to our studies, more than half of companies and organizations, both large and small, do not take sufficient precautions when it comes to preventing their security cameras from being hacked. Be it ignorance or just careless approach to security of their network in general, the results of hacking can be disastrous,” says Chris Ciabarra, the CTO and co-founder of Athena Security. With the increasing number of surveillance cameras installed in homes, offices and public places, hacking incidents related to these devices happen more and more often. The ease of hacking surveillance cameras It’s not a secret that surveillance cameras, like many other Internet of things (IoT) devices, are full of vulnerabilities that can be exploited by hackers. A hacker can find hundreds of potentially vulnerable IoT devices to hack into Cameras, just like all other devices connected to the Internet, have IP addresses that are easy to find using Shodan, a search engine for Internet-connected devices. With this simple tool, a hacker can find hundreds of potentially vulnerable IoT devices to hack into, including cameras, especially when most companies use default passwords. The solution Below are basic recommendations on how to protect your camera network, and what actions you should take to minimize the chance of hacking. Change the default username and password You should start by changing the default password and username of your camera network. Even though this may seem obvious, not everyone does it, practically leaving the door for hackers wide open. Use a strong password that is hard to guess. When setting up the password use numbers, symbols, both uppercase and lowercase letters. Do not use simple and commonly used passwords, such as the ones in SplashData's list of 100 worst passwords of the year. Do not use the same password you are already using for other online accounts. According to a recent survey on data privacy conducted in May 2019, 13% of respondents with at least one online account say they use the same password for all their accounts. Using a password manager to generate a strong random password may be a good idea. Update your camera firmware regularly Keeping cameras firmware up-to-date is very important as it allows you to prevent hackers from exploiting vulnerabilities and bugs that are already patched by manufacturers in a new firmware update. Despite the fact that most modern cameras will automatically download and install firmware updates, some require the user to check for updates and install them. Set up two-factor authentication Set up the two-factor authentication if your cameras support it. With two-factor authentication on, the camera manufacturer will send you a randomly generated passcode via text message or phone call, as an addition to username and password, during each log in to the account. Two-factor authentication prevents hackers from accessing the camera system even if they were able to crack username and password. Not all surveillance camera systems support two-factor authentication, though. Technical recommendations Prevent cameras from sending information to third parties Companies that use surveillance cameras very often do not put enough effort into protecting their cameras and the data they transmit, despite the fact that this footage is of great importance to many people. The firmware of most cameras from different manufacturers is programmed in a way to keep a connection with the manufacturer’s server without knowledge of the end-user. Most users, both private and corporate, are not aware of this and therefore do not take any steps to protect themselves from this potential vulnerability, which could result in footage leak to a third party or a successful hacker attack. To prevent your camera network from transmitting, the following steps should be taken. Step 1: Statically assign an IP address Statically assign IP address for each camera, subnet mask and leave gateway blank or 127.0.0.1, if this is allowed in gateway fields to be entered. If the firmware does not allow blank or 127 subnets, just point gateway to an unused dedicated IP address. This way, cameras will not be able to send the information off the local company network. Step 2: Assign DNS servers Assign DNS servers that are local to cameras and force only your domain to be present with zero forwarding DNS servers. This way, if a camera tries to do name resolution, it will come up blank. Not being able to find the IP address of the main server (mother ship), cameras won’t be able to connect to it. To stay safe you can order your own DNS servers, locked down to your addresses only. Block your camera network’s access to the Internet Blocking your camera network’s access to the Internet is a good way to make sure hackers won’t be able to get access to the footage and other confidential data. Any dual-homed system touching your camera network should be blocked from Internet access. This way all systems in the same subnet won’t have access to the Internet from that box. Always use DNS because firewall rules tend to be easy to hack, while DNS that is internal is not expected and stops systems from resolving names you do not wish to be translated, like talking back to the mothership of a bad program. Monitor your system for traffic spikes One of the tricky things about hacker attacks is that there are no warnings. In most cases hackers would penetrate your system without any signs or symptoms of an attack, and it isn’t until you face consequences (like leaked footage or hackers manipulating cameras) when you realize something is wrong. It may be days or even months between the hacker attack and the time you realize the system has been compromised. Monitoring dual-homed systems for bandwidth spikes could be a good way to spot a hack resulting in the leakage of confidential data like images or video. There are a number of traffic monitoring tools available to private and corporate users that can manage and sniff the network or just monitor them. Facial blur in archived footage Blurring people’s faces when archiving in surveillance camera video streams is a great tool, allowing you to comply with privacy laws and make the footage useless to hackers even if they manage to successfully hack your system. These recommendations will allow you to lower the risk of hackers breaking into your security camera network, detect the hack if it has occurred already, and to protect yourself from possible consequences if camera footage was stolen.
The global pandemic caused by the novel coronavirus is changing work environments to an unprecedented degree. More employees than ever are being asked to work remotely from home. Along with the new work practices comes a variety of security challenges. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Covid-19 concerns Concerns about the coronavirus have increased the business world’s dependence on teleworking. According to Cisco Systems, WebEx meeting traffic connecting Chinese users to global workplaces has increased by a factor of 22 since the outbreak began. Traffic in other countries is up 400% or more, and specialist video conferencing businesses have seen a near doubling in share value (as the rest of the stock market shrinks). Basic email security has remained unchanged for 30 years Email is a core element of business communications, yet basic email security has remained unchanged for 30 years. Many smaller businesses are likely to still be using outdated Simple Mail Transfer Protocol (SMTP) when sending and receiving email. “The default state of all email services is unencrypted, unsecure and open to attack, putting crucial information at risk,” says Paul Holland, CEO of secure email systems provider Beyond Encryption. “With remote working a likely outcome for many of us in the coming weeks, the security and reliability of our electronic communication will be a high priority,” says Holland. The company’s Mailock system allows employees to work from any device at home or in the office without concerns about data compromise or cybersecurity issues. Acting quickly and effectively As the virus spreads, businesses and organizations will need to act quickly to establish relevant communication with their employees, partners and customers surrounding key coronavirus messages, says Heinan Landa, CEO and Founder of IT services firm Optimal Networks. Employers should also enact proper security training to make sure everyone is up to speed with what’s happening and can report any suspicious online activity. Reviewing and updating telework policies to allow people to work from home will also provide flexibility for medical care for employees and their families as needed. Scammers, phishing, and fraud An additional factor in the confusing environment created by the coronavirus is growth in phishing emails and creation of domains for fraud. Phishing is an attempt to fraudulently obtain sensitive information such as passwords or credit card information by disguising oneself as a trusted entity. Landa says homebound workers should understand that phishing can come from a text, a phone call, or an email. “Be wary of any form of communication that requires you to click on a link, download an attachment, or provide any kind of personal information,” says Landa. Homebound workers should understand that phishing can come from a text, a phone call, or an email Email scammers often try to elicit a sense of fear and urgency in their victims – emotions that are more common in the climate of a global pandemic. Attackers may disseminate malicious links and PDFs that claim to contain information on how to protect oneself from the spread of the disease, says Landa. Ron Culler, Senior Director of Technology and Solutions at ADT Cybersecurity, offers some cyber and home security tips for remote workers and their employers: When working from home, workers should treat their home security just as they would if working from the office. This includes arming their home security system and leveraging smart home devices such as outdoor and doorbell cameras and motion detectors. More than 88% of burglaries happen in residential areas. When possible, it’s best to use work laptops instead of personal equipment, which may not have adequate antivirus software and monitoring systems in place. Workers should adhere to corporate-approved protocols, hardware and software, from firewalls to VPNs. Keep data on corporate systems and channels, whether it’s over email or in the cloud. The cyber-protections that employees depended on in the office might not carry over to an at-home work environment. Schedule more video conferences to keep communication flowing in a controlled, private environment. Avoid public WiFi networks, which are not secure and run the risk of remote eavesdropping and hacking by third parties. In addition to work-from-home strategies, companies should consider ways to ensure business cyber-resilience and continuity, says Tim Rawlins, Director and Senior Adviser for risk mitigation firm NCC Group. “Given that cyber-resilience always relies on people, process and technology, you really need to consider these three elements,” he says. “And your plan will need to be adaptable as the situation can change very quickly.” Employees and their employers Self-isolation and enforced quarantine can impact both office staff and business travelers Self-isolation and enforced quarantine can impact both office staff and business travelers, and the situation can change rapidly as the virus spreads, says Rawlins. Employees should be cautious about being overseen or overheard outside of work environments when working on sensitive matters. The physical security of a laptop or other equipment is paramount. “It’s also important to look at how material is going to be backed up if it’s not connected to the office network while working offline,” says Rawlins. It’s also a good time to test the internal contact plan or “call tree” to ensure messages get through to everyone at the right time, he adds.
At a major music festival, a fan in the crowd aggressively leapt over a barricade to approach a famous artist. Personnel from Force Protection Agency immediately implemented extrication protocol to shield the artist from physical harm, quickly reversed course and calmly led the client away from the threat. Force Protection Agency (FPA) personnel intentionally did not engage the threatening fan in any way, as local venue security personnel were present and tasked with apprehending the rogue fan. FPA’s efforts were directed expressly toward the protection of the client, avoiding unnecessary escalation or complications and minimizing physical, visual, and legal exposure. Dedicated to the safety of clients Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation Specializing in protecting celebrities and high-net-worth individuals, Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation, and dedicated to the safety and success of clients. The agency was formed in 2017 by Russell Stuart, a California State Guard officer and security and entertainment industry veteran. The agency is the culmination of 20 years of experience in the fields of security, military, emergency management, logistics and technology, media and entertainment, and celebrity management. We interviewed Russell Stuart, Founder and CEO of Force Protection Agency (FPA), which has been called “the Secret Service of Hollywood,” for his insights into providing security for celebrities. Q: What unique need in the marketplace do you seek to serve, and how are you qualified to serve it? Stuart: The needs of celebrity and high-net-worth clients are complex and constantly changing. When dealing with a high-profile individual, discretion is paramount, extensive communication is required, and adaptation is ongoing. A critical objective is anticipating and planning for all types of potential negative scenarios and preventing them from even starting, all while not disrupting the normal course of operation of the client's day or their business. Force Protection Agency is poised to serve these needs by innovating and intelligently managing the planning, procedures, and personnel used in every facet of protecting the client’s interests and achieving their objectives. Q: What is the typical level of "professionalism" among bodyguards and security professionals that protect celebrities? Why does professionalism matter, and how do you differentiate yourself on this point? Stuart: Professionalism is an overall way of approaching everything to do with the business, from recruiting, to training, to making sure the right agent is with the right client. Nothing matters more; polish and precision are not only critical to mission success, but also support the comprehensive best interest of the client while preventing costly collateral damage and additional negative consequences. True “professional protective services" is intelligent strength and proper execution, not emotional or reactionary violence. Unfortunately, the latter is frequent among many celebrity bodyguards, and often incurs extremely expensive and even dangerous repercussions. Q: Your company has been described as "the Secret Service of Hollywood." How true is that comparison, and how does your work differ from (e.g.) protecting the President? Force Protection Agency prides itself on providing its services with discretion, precision, and poise Stuart: Totally true, and for this reason: the keys to success in protection are prioritization, and planning. Most people fail to even recognize the first, negating any level of effort given to the second. Establishing the true needs and the correct priority of objectives for each individual client and situation, and firmly committing to these without deviation, are what distinguishes both government secret services and Force Protection Agency from the vast majority of general security firms. Also, the term “secret service” implies an inconspicuous yet professional approach, and Force Protection Agency prides itself on providing its services with discretion, precision, and poise. Q: What is the biggest challenge of protecting celebrities? Stuart: The very nature of celebrity is visibility and access, which always increases risk. The challenge of protecting a high-profile individual is facilitating that accessibility in a strategic and controlled manner while mitigating risk factors. A client’s personal desires and preferences can often conflict with a lowest risk scenario, so careful consideration and thorough preparation are essential, along with continual communication. Q: How does the approach to protection change from one celebrity (client) to another? What variables impact how you do your job? Stuart: The approach is largely determined by the client’s specific needs, requests and objectives. The circumstances of a client's activities, location, and other associated entities can vastly disrupt operation activities. A client may prefer a more or less obvious security presence, which can impact the quantity and proximity of personnel. Force Protection Agency coordinates extensively with numerous federal, state, and municipal government agencies, which also have a variety of influence depending on the particular locations involved and the specific client activities being engaged in. Q: Are all your clients celebrities or what other types of "executives" do you protect – and, if so, how are those jobs different? Stuart: Force Protection Agency provides protective services for a wide range of clients, from the world’s most notable superstars to corporate executives and government representatives. We also provide private investigation services for a vast variety of clientele. Force Protection Agency creates customized solutions that surpass each individual client’s needs and circumstances. The differences between protecting a major celebrity or top business executive can be quite different or exactly the same. Although potentially not as well known in popular culture, some top CEOs have a net worth well above many famous celebrities and their security needs must reflect their success. Q: What is the role of technology in protecting famous people (including drones)? Technology is crucial to the success of security operations Stuart: Technology is crucial to the success of security operations and brings a tremendous advantage to those equipped with the best technological resources and the skills required to maximize their capabilities. It affects equipment such as communication and surveillance devices like drones, cameras, radios, detection/tracking devices, GPS, defensive weapons, protective equipment, and more. Technology also brings immense capabilities to strategic planning and logistical operations through the power of data management and is another aspect of Force Protection Agency operation that sets us apart from the competition. Q: What additional technology tools would be helpful in your work (i.e., a “technology wish list”)? Stuart: The rapidly growing and evolving realm of social media is a massive digital battlefield littered with current and potential future threats and adversaries. Most mass shooters as of late have left a trail of disturbing posts and comments across social media platforms and chat rooms that telegraphed their disturbing mindset and future attacks. A tool that could manage an intelligent search for such threats and generate additional intel through a continuous scan of all available relevant data from social media sources would be extremely useful and could potentially save many lives. Q: Anything you wish to add? Stuart: Delivering consistent excellence in protection and security is both a vital need and a tremendous responsibility. Force Protection Agency is proud of their unwavering commitment to “Defend, Enforce, Assist” and stands ready to secure and satisfy each and every client, and to preserve the life and liberty of our nation and the world.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centers on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximizing benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximizing the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
Genetec Inc., a globally renowned technology provider of unified security, public safety, operations, and business intelligence solutions, has announced that City Council District E in New Orleans has taken an innovative approach to address illegal dumping using Security Center, the unified security platform from Genetec. Countering illegal dumping menace Illegal dumping is a problem in most cities around the world, but enforcing laws to prevent it can be quite difficult and resource-intensive. To catch culprits in the act, law enforcement and other city staff have to physically watch known sites and wait to spot illegal dumping activity. Most city officials know that's an impossible task, as officers can't be everywhere all the time, and offenders take full advantage of that reality. New Orleans’ RTCC and Sanitation Department has begun installing a network of cameras at known dumping sites In response, New Orleans City Council District E Councilwoman, Cyndi Nguyen, has taken a hands-on approach tackling illegal dumping head-on as a part of a larger push toward revitalising the community she serves. Nguyen’s team, working in partnership with New Orleans’ Real Time Crime Center (RTCC) and Sanitation Department has begun installing a network of cameras at known dumping sites. All cameras are portable so they can be moved to new dumping hotspots as needed. Genetec security technology platform deployed “This security technology from Genetec certainly helps re-enforce the message I’m putting out there, that we can and will enforce illegal dumping offenses in District E. We also have this great partnership with the Sanitation Department, our local Police Department, and the RTCC, and that’s extending out into our community as well,” said New Orleans City Councilwoman, Cyndi Nguyen. She adds, “I am working hard to get more residents and businesses involved in supporting these initiatives, because keeping our city safe and clean is a shared responsibility.” Real Time Crime Center (RTCC) The Real Time Crime Center (RTCC) already uses Security Center to manage its citywide public safety improvement initiatives. To help monitor illegal dumping activities, the Crime Center’s IT department also set up an event-to-action rule in the Security Center platform to processes motion detection in a defined zone of the camera’s field of view. As soon as motion is detected, the security system bookmarks it and notifies IT staff As soon as motion is detected, the security system bookmarks it and notifies IT staff so that they can evaluate the situation and determine if collection of the debris is warranted. The system also takes a snapshot of the video and emails it to designated personnel on the team, so as to enable them to identify and investigate any potential dumping perpetrators, and take appropriate action. Crime detection with video evidence In an example of a recent case, this event-to-action led to the arrest of a repeat offender who had previously been convicted and sentenced for dumping 14,000 tires. All snapshots and video evidence were securely shared with the New Orleans Police Department so as to enable them to quickly identify the perpetrator, apprehend him and complete their investigation. “Without this technology, finding these offenders comes down to chance or it could take a police officer hours and hours of investigative work. Instead, it took us minutes to set up the event-to-action in Security Center, and just about two days from the time we were notified about this offender to the time we were able to apprehend him,” said Bill Wood, IT Supervisor at New Orleans’ Real Time Crime Center (RTCC). Bill adds, “We love working with the Genetec Security Center security platform. It’s very user friendly and helps us cut down that investigation time exponentially.”
Verkada, the provider in cloud-managed enterprise building security, announced the release of its environmental sensor product line and its initial product, the SV11. The announcement comes on the heels of Verkada’s recent Series C funding and successful launch of its access control line, further establishing the company as the provider of the operating system for modern, integrated buildings. Monitoring “Our customers are responsible for the systems that keep facilities online, and our mission is to give those administrators the best possible tools to do their jobs,” said Filip Kaliszan, CEO and co-founder of Verkada. “Whether it be monitoring the status of a server room, the temperature of a patient room in a hospital, or the air quality of a school, the SV11 gives facilities and staff unprecedented visibility and control over the sites they’re responsible for keeping safe and secure.” The SV11 is a simple-to-deploy, powerful sensing device that provides enhanced visibility into what is happening in a physical space. The cloud-managed device seamlessly integrates with Verkada’s enterprise video security solution, allowing organizations to review context and quickly associate sensor events with relevant video footage. Real-time insights and proactive alerts The interface delivers real-time insights and makes it easy to respond to proactive alerts or conduct investigations into past incidents. Customers across a range of industries, including healthcare, manufacturing, education, retail, and hospitality, have already deployed the SV11 to monitor: Air quality: Protect one's environment from invisible threats like gas and chemical leaks, or detect illicit activities like vaping and smoking. Temperature and humidity: Monitor changes in temperature and humidity that may damage expensive infrastructure, materials, or food and medical supplies. Motion and occupancy: Detect motion or occupancy in bathrooms, locker rooms, and other private areas where cameras are not appropriate. Noise levels: Detect activity or disturbances without violating privacy. Receive and manage alert notifications remotely “The ability to deploy Verkada's sensor in our network closets has provided us with complete visibility into what’s happening in those rooms,” said Rick Palandro, Security and Facilities Operations Engineer at Fox Rothschild LLP. “With Verkada, I'm now able to receive and manage alert notifications remotely the moment temperature rises above a specific threshold. I can instantly mobilize the team to respond to HVAC issues. We’ve shifted from a reactive approach that often resulted in damaged equipment to a proactive one that ensures our equipment is always operating properly.” Monitoring preventative and predictive maintenance Verkada’s SV11 has empowered us to take a data-driven approach to food manufacturing" “Verkada’s SV11 has empowered us to take a data-driven approach to food manufacturing that helps us stay ahead of the curve on environmental improvements across our plant facility,” said Frank McKinney, COO and Plant Manager of Carolina Ingredients. “By pinpointing where we can set up both preventative and predictive maintenance, we can closely monitor and optimize air quality, efficiency of our HVAC units, and behaviors in the plant, which enables us to more effectively manage the business and deliver quality ingredients and superior blending services that support our customers.” Integration with video monitoring solution "We installed the environmental sensor across campuses in areas like bathrooms that are difficult to properly monitor and are therefore likely places for inappropriate activity such as vaping," said Marty Oliver, Director of Technology at Godley Independent School District. "Paired with Verkada's video monitoring solution, the SV11 provides a new level of visibility into what's happening in those spaces without infringing on students' privacy, giving principals, superintendents, and office administrators a more holistic understanding of student activity in school." Environmental sensor The introduction of the environmental sensor follows accelerated business growth in Q2 2020, highlighted by: Sixty-five percent quarter-over-quarter revenue growth (compared to Q1 2020), including new deployments with Holiday Inn Express and Suites, Rubrik, NextGen America International expansion with new Sales operations in Sydney and Latin America and deployments with Heinemann Australia, Lifeview Residential Care, and Transportes Canales A projection to double headcount by year-end 2020 (compared to year-end 2019) Expansion of its global channel partner program to more than 1,500 resellers The launch of its Access Control solution, which oversold in the first quarter of general availability and surpassed projected sales by more than 400 percent The release of the Bullet Series of hybrid cloud cameras as well as new features as part of a COVID-19 Response Suite, including People Heatmaps, Person of Interest Notifications, and Crowd Notifications Smart buildings The launch of the SV11 is the next step towards Verkada delivering on its vision to power the modern, integrated building. With security cameras at its core, Verkada is expanding its product offering with new applications such as access control and sensors to deliver the infrastructure that runs safer, smarter buildings.
Monitoring campuses to protect students, parents, and staff means balancing proactive measures with effective response to incidents. Ava Unified Security (previously Vaion) helps one identify unwanted events like vandalism, intrusion, loitering, parking violations, or people involved in suspicious acts so that one can focus on what truly matters: delivering positive academic experiences. Anomaly detection in real-time Powered by Spotlight™, the dynamic video view with instant notifications draws attention to the relevant video feeds with potential risks. Identify intruder break-ins, loitering, guns, or unauthorized vehicles in real-time. Operators can switch between live and playback with the click of a button. Smart Presence™ depicts people as dots on maps and live footage of persons of interest. Combine with access control to monitor hallways for a complete picture of loitering, theft, or even active shooter scenarios. Gain insights on occupancy counting in classrooms and libraries for better energy efficiency. Accurate search and integrated audio analytics Smart Search™ allows operators to search by appearance, events, objects, similarity, or image Smart Search™ allows operators to search by appearance, events, objects, similarity, or image. Recovering lost or stolen objects, such as laptops or vehicles, identifying suspicious people inside or just outside campus, locating missing students now take minutes instead of hours. With the same or fewer resources, operators can provide compelling evidence and mitigate liability risks. Ava Dome and Ava 360 perform perform exceptionally well either indoors or outdoors and in any lighting conditions making them suitable for different settings, such as classrooms, assembly halls, sports halls, or dormitories, and blend discreetly as interior fixtures. The integrated audio analytics identifies sound patterns and sends instant alerts in cases of broken glass, screaming, and gunshots. Key benefits Build from existing investment while retaining privacy Integrate with existing cameras Add access control to extend capabilities Video & metadata storage remain on-premises Full site survivability and local access Save storage and money Automatically decrease storage demands from all the recordings Reduce bandwidth consumption on critical links with AI-based optimization Pay for what one needs, when one needs it, without the hassle of complicated licensing Safe and welcoming environment Capture every detail at all times with discreet security cameras Increase situational awareness Enable preventative action through immediate response time Collaboration and flexible licencing Globally access live feeds and recordings Share video links with law enforcement authorities to facilitate ease of investigations Maintain the integrity of records with video watermarking With a simple licensing model, Ava always includes services and software upgrades. One no longer has to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.
Co-op, a large consumer co-operative in the UK and one of the largest retailers in the country, is rolling out an integrated body-worn video solution from Motorola Solutions to front-line colleagues, with a focus on further increasing safety in-store against a background of rising retail crime in the industry. The Co-op has seen in-store crime increase by more than 140% year-on-year, despite communities recognizing the critical role played by retail workers in society - true frontline workers in the days of a global pandemic. The number of violent incidents also hit record levels with 1,350 attacks having been experienced by Co-op shop workers in the first six months of 2020. Keeping colleagues safe The retailer warns of a crime and violence epidemic and its targeted deployment of a body-worn video solution forms part of an ongoing commitment to invest a further £70M over the next three years in innovative technology to keep colleagues safe. Co-op will equip front-line staff with more than 1,000 Motorola Solutions VT100 body-worn cameras in around 250 stores initially, with the ability to stream video in real-time to the Security Operations Center of Co-op security partner, Mitie. The footage is used to identify criminals and provide evidence to secure prosecution. The VT100 body-worn camera from Motorola Solutions can be worn in standby mode for up to six months, preserving battery for instances when Co-op store colleagues feel threatened by aggressive or violent behavior. The cameras are operated by a simple one-push activation, instantly recording footage to the camera itself, and streaming live video to the security operations center, allowing for a quick response from security personnel or police. Cloud-based software The cameras are supported by cloud-hosted VideoManager software The cameras are supported by cloud-hosted VideoManager software, which enables secure and efficient camera allocation, user administration and incident management. With security features such as comprehensive audit-trails, encryption, configurable retention policies and RFID camera allocation, this integrated solution ensures footage and incidents are dealt with efficiently and securely. As part of its Safer Colleagues, Safer Communities campaign, Co-op is also building awareness and support for MP Alex Norris’ “Assault on Shop Workers Bill” which has now seen its second reading in Parliament postponed until September. The Bill states that because shop workers have responsibilities to uphold the law on age-restricted products they should be afforded greater protection in carrying out those public duties. Retail crime A knife was the most commonly used weapon (43%) with axes, hammers and syringes also used to attack In its 2020 Crime Report, the Association of Convenience Stores (ACS) found that a quarter of violent incidents resulted in injury, with a weapon used in almost 20% of occurrences. A knife was the most commonly used weapon (43%) with axes, hammers and syringes also used to attack or threaten shop workers. In 2019, Co-op funded research into retail crime, with the hard-hitting findings reporting that shop workers were showing signs of Post-Traumatic Stress Disorder (PTSD). Co-op has committed a further £70M over the next three years in innovative technology to keep colleagues safer, it has introduced SmartWater Fog Cannons, the latest remote monitored iCCTV, body cameras and, communication headsets for all frontline colleagues. Protection for shop workers Cheryl Houghton, Co-op Retail Security Manager, said, “Shop workers play an essential role serving communities, yet they have to contend with unprecedented levels of violence and abuse on a daily basis. As a community retailer we see the impact of social issues in our stores. I have never seen such high levels of violence and abuse, it’s a societal issue that all retailers are concerned about and it’s having lasting effects on the lives of shop workers - both mentally and physically. It is not part of the job to be verbally abused, threatened or attacked and we’re determined to make sure it isn’t. Calling for greater protection for shop workers carrying out public duties and for the root causes of crime in communities to be addressed.” Body-worn videos in commercial organizations Richie McBride, Director of Business Operations, Video & Analytics at Motorola Solutions UK, said, “Body-worn video is becoming a critical element in commercial organizations’ strategy to keep their employees safe. As a company focused on mission-critical solutions, we provide our commercial customers with the right tools to help them enhance their operational efficiency, responsiveness and safety. We are proud to partner with one of the UK’s largest retailers in its work to further improve the shopping experience and enhance safety for both shoppers and staff,”
Marian University is a school with a mission. Having transitioned from a liberal arts college to a comprehensive university in 2009, it has become one of the private education institutions in Indiana. And that’s not all: the university has ambitious goals to grow its programs and broaden its mandate even further. Currently, the school has over 500 staff members and more than 3,500 students from across the United States and around the world. And by 2025, it aims to double its number of annual graduates. Located just ten minutes away from downtown Indianapolis, Marian University’s close proximity to a major center of American business, finance and culture is a major selling point. Managing increased traffic The city is also experiencing an influx of technology companies, making it the fifth-fastest growing municipality in the country for high-tech jobs. However, as in many booming regions, economic success isn’t evenly distributed. While some areas have experienced revitalization, others have seen social unrest and rising crime rates. As such, while Marian University’s campus has the privilege of sitting near a bustling city, these challenges aren’t far away. That fact — along with the increasing number of staff and students on the premises — motivated the university to upgrade their security systems to help keep both its people and the wider community safe. Marian University’s previous security system wasn’t up to the task of monitoring the premises, staff and students — so how would it manage increased traffic and additional properties as the school met its growth targets? High definition cameras ACC™ software is much more than a centralized source from which to review recorded video The ongoing maintenance and licensing costs were also prohibitive. Administrators were at a loss of what to do until the security integrator they were working with suggested Avigilon. With high definition cameras and built-in analytics that seamlessly integrated with Avigilon Control Center (ACC) video management software, it offered a comprehensive, intelligent and scalable solution. Additionally, the licensing fee was a one-time cost, saving the school both time and money. As the security team at Marian University found out, ACC™ software is much more than a centralized source from which to review recorded video. Not only can security operators analyze the video by zooming in and rewinding in real-time, but Avigilon Appearance Search™ technology leverages AI technology to help them instantly locate specific individuals and vehicles of interest. Advanced video analytics Furthermore, Unusual Motion Detection (UMD) technology uses advanced video analytics to flag events that may require further investigation and filter them in the recorded video timeline, allowing security operators to find and review these instances faster. All of this was made possible with the installation of intelligent Avigilon cameras and network video recorders (NVR) across the campus. “The organization is tremendous to work with,” says Ray Stanley, CIO/Vice President of Marian University. “I have never worked with a security company where I've been able to pick up the phone and have someone to help solve issues and make sure we are using the product the right way so that we see good value for our money. This was true not just in the beginning, their support exists right to this day.” Intelligent security system Avigilon coordinates with local third-party integrators to make sure the system is functioning Instead of sending Marian University setup instructions and leaving the security and IT teams to figure it out for themselves, Avigilon coordinates with local third-party integrators to make sure the system is functioning and actively helps operators learn how to utilize it to its full potential. Personnel will come onsite to work with staff and guarantee they know how to get the most from their various video analytics platforms and solutions. The main buildings at Marian University may be surrounded by quiet woodlands and wetlands, but the campus isn’t as isolated as it appears. Being a mere ten minutes away from the middle of Indianapolis, the school’s property borders several roadways, businesses and residential neighborhoods that all benefit from having an intelligent security system in the vicinity. Keeping the community safe “The great quality video has helped keep the community safe, without a doubt,” says Ray Stanley, CIO/Vice President of Marian University. “In one case, local police were able to identify a suspect involved in an incident at a nearby gas station because of our Avigilon system. Being able to help our surrounding community stay safe is absolutely an added benefit for us.” With its Avigilon solution, the Marian University campus has become an extra set of eyes for law enforcement. UMD and Avigilon Appearance Search technologies mean that criminals who make the mistake of moving across campus have a much higher chance of being detected by the authorities who can then quickly track their route to see where they have been and where they are headed. Potentially-Dangerous behavior It enables security personnel to spot and deter any potentially-dangerous behavior on a daily basis With its user-friendly interface and high-quality video, the security installation not only helps with police work and prosecution, but it enables security personnel to spot and deter any potentially-dangerous behavior on a daily basis, creating a safer environment for students and staff. "For example, we were able to see a suspect driving at a high rate of speed across campus, and with Appearance Search, we were able to see where the vehicle went and identify the suspect,” says Chief Richard Robertson, Marian University Police Department. “That helped us to save a lot of trouble and potential injuries.” Protecting local communities In the United States, Indianapolis looms large not only as the crossroads of the country — two-thirds of Americans can drive to the city in ten hours or less — but also as a hub of innovation and investment. However, safety continues to be a top-of-mind issue as crime increases in certain sections of the city. This is why Marian University chose Avigilon: as the school aims to provide a safe space for students and prepare them for the many opportunities Indianapolis has to offer, there’s also a deep-seated obligation to help protect local communities and public spaces. Avigilon allows it to do both — and even better, the solution will be able to scale with the university as it evolves and expands in the years ahead.
Staff safety and customer service will be boosted across Sydney’s rail network with the deployment of SafeZone®, the pioneering safety, security and emergency management solution from CriticalArc. The technology will enable Sydney Trains to manage a wide range of situations, including mitigating risks to staff and customers and strengthening the capacity to respond to incidents and emergencies across the network. SafeZone will put up to 2,500 of Sydney Trains’ front-line staff directly in touch with security control room teams, letting them summon immediate assistance at the touch of a button via their assigned smartphone. This capability is as valuable on crowded city platforms at rush-hour as it is on more remote suburban stations where staff may be working alone late at night. Enhancing staff safety The investment in SafeZone will cover over 175 stations across the greater Sydney area and is the latest step in a modernization drive to transform Sydney Trains’ operations, with more than a million customer journeys taken on the network every weekday. Employing proven technology such as SafeZone will help us solve day-to-day challenges" “Sydney Trains is committed to fulfilling our duty of care to all of our staff and enhancing our high safety standards in order to maintain and enrich customer service levels on station platforms,” explains Mark Edmonds, Manager of Security Capability, Network Operations. “Employing proven technology such as SafeZone will help us solve day-to-day challenges, further improving the safety of our staff and helping them work more effectively to continue to deliver world-class service.” Real-time situational awareness Across its transportation network, Sydney Trains will now have real-time situational awareness, and a more complete picture of critical events. This makes possible a wide range of security management functions, such as sending targeted alerts to specific individuals and groups. It enables control room operators to pinpoint the location of individuals needing help so they can initiate the most efficient and rapid emergency response. “This visionary deployment by Sydney Trains will have a significant impact on the safety and wellbeing of staff and thus will produce dividends with regards to customer service and satisfaction, and the potential for streamlined operations moving forward,” says Glenn Farrant, CEO, CriticalArc. “With staff safety a primary concern for all rail operators internationally, implementation of this technology by Sydney Trains represents a significant step forward for the sector and will be the blueprint for many implementations to follow.”
Round table discussion
School shootings are a high-profile reminder of the need for the highest levels of security at our schools and education facilities. Increasingly, a remedy to boost the security at schools is to use more technology. However, no technology is a panacea, and ongoing violence and other threats at our schools suggest some level of failure. We asked this week’s Expert Panel Roundtable: How have security solutions failed our schools and what is the solution?
We are all more aware than ever of the need for cybersecurity. The Internet of Things is a scary place when you think about all the potential for various cyber-attacks that can disrupt system operation and negatively impact a customer’s business. Because most physical security systems today are IP-based, the two formerly separate disciplines are more intertwined than ever. We asked this week’s Expert Panel Roundtable: How can cybersecurity challenges impact the physical security of a company (and vice versa)?
Video is widely embraced as an essential element of physical security systems. However, surveillance footage is often recorded without sound, even though many cameras are capable of capturing audio as well as video. Beyond the capabilities of cameras, there is a range of other audio products on the market that can improve system performance and/or expand capabilities (e.g., gunshot detection.) We asked this week’s Expert Panel Roundtable: How does audio enhance the performance of security and/or video systems?