Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data center, the IT department has complete control over network acce...
Though they may sometimes elicit a hectic and fast-paced experience, airports are a necessary cornerstone of traveling for many people around the world. Whether they represent the ability to see family, the need to attend a business event, or the chance to get away on a relaxing vacation, airports are central to allowing travelers to get from one destination to the next. In 2019, more than four billion scheduled travelers passed through the world’s airports, and that number is projected...
Cheshire, UK, based Anekanta Ltd (Anekanta) and New York, USA, based GT Digital (GT) announced that they are working together to progress GT’s patent-pending, innovative, cognitive intelligence platform MediaMaestro. Through its advanced military-grade proprietary algorithms, MediaMaestro can automatically predict emerging threats before they happen, enable fast mitigating action and provide continuous updates to a rapidly evolving scenario. In a society where the threats to the s...
Video is widely embraced as an essential element of physical security systems. However, surveillance footage is often recorded without sound, even though many cameras are capable of capturing audio as well as video. Beyond the capabilities of cameras, there is a range of other audio products on the market that can improve system performance and/or expand capabilities (e.g., gunshot detection.) We asked this week’s Expert Panel Roundtable: How does audio enhance the perf...
The Security Industry Association (SIA) has selected Efrain Pardo as the spring 2020 recipient of the Denis R. Hebert Identity Management Scholarship, a program presented in partnership with the Center for Identity at the University of Texas at Austin offering $5,000 scholarships for SIA members to help further their education in the field of identity management. This scholarship program – named after Hebert, President of Feenics Inc. and a past member of SIA’s Board of Directors wh...
The global pandemic caused by the novel coronavirus is changing work environments to an unprecedented degree. More employees than ever are being asked to work remotely from home. Along with the new work practices comes a variety of security challenges. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says....
Egress, the provider of human layer email security, has announced that its Egress Protect solution will be integrated into NHSmail to offer enhanced protection and improve user experience. NHSmail is used by up to 1.5m healthcare staff daily, and is the largest closed secure email network in the UK. The announcement comes as part of NHS Digital’s commitment to use innovative technology to transform the UK healthcare landscape. Effective communication is an integral part of the NHS, and Egress’ email encryption technology has a significant footprint in UK Government. NHSmail secure email service NHSmail is a secure email service, approved by the Department of Health and Social Care, for sharing sensitive information. NHSmail has a function for sending sensitive emails which are encrypted, to non-secure email addresses. Egress Protect improves healthcare practitioners’ experience by enabling them to use NHSmail to send encrypted emails to unsecure domains, including patients and other areas of the health and care system, as well as offering automatic decryption for inbound email. This allows those recipients of NHSmail emails that are encrypted using Egress Protect to read and reply free of charge via an easy-to-use online portal or using Egress’ free app for Outlook integration. Streamlining communications NHSmail is already a safe, secure email system, used by almost 1.5 million health and care professionals" Consequently, secure email communication is available free of charge and in a simple and accessible way, to everyone who needs it. Egress Protect is already used by many local government organizations, and major private healthcare providers in the UK and will streamline communications between these organizations and the NHS. Following an initial pilot phase, Egress is now the new provider for sending sensitive emails from NHSmail accounts encrypted to external email accounts. Chris Parsons at NHS Digital said, “NHSmail is already a safe, secure email system, used by almost 1.5 million health and care professionals, enabling them to send sensitive information and deliver effective care. The partnership with Egress will continue to build on this, delivering an effective user experience, supporting security and compliance with GDPR with detailed auditing and reporting.” Innovative email security solutions “We are delighted to be working with NHS Digital to improve the NHSmail experience for healthcare practitioners and patients throughout the UK,” commented Egress CEO Tony Pepper. “Modern and efficient healthcare requires an accessible and secure communication network built on the best data security and IT architecture available.” “At Egress, we deliver innovative email security solutions that makes it easy for users to protect data, and meet compliance requirements, and then quite simply, get on with their day-to-day work. We look forward to an ongoing relationship with NHS Digital, supporting them in the delivery of this critical communication network.”
SecureCom Wireless LLC has called on customers to know that they can now use Virtual Keypad if they ever need to trigger a system panic. The app, as well as VirtualKeypad.com can display Police, Emergency and Fire panics in the menu, and all the user needs to do is to add it to the app user in Dealer Admin. “Because most people have their phones with them, we wanted customers to be able to trigger a system panic if they needed to, even if the keypad isn’t nearby,” said Clayton Tummons, Vice President of Software for SecureCom Wireless. He adds, “If there’s a break-in, and you’re inside, calling 911 may put you at risk of being heard talking. Without saying a word, you can silently trigger a system panic and expedite the dispatch of the type of emergency personnel you need.” Dealer Admin Version 2.40.0 Dealer Admin Version 2.40.0 allows users to go to the App User section where they can select the panic options To enable customers’ System Panic feature instantly, Dealer Admin Version 2.40.0 allows users to go to the App User section where they can select the panic options available. Depending on what they need or what they want them to have, users can check the appropriate boxes. When they log in to their Virtual Keypad app or website account, they’ll see “Panic” displayed in their menu. To initiate a panic, the users have to simply tap Panic, then press and hold the desired panic option for three seconds. Virtual Keypad continues to expand, giving customers more functionality and flexibility than ever before. “The System Panic functions the exact same way as if you’d initiated the panic from the keypad,” Tummons adds, further stating “We just want to make sure customers can always have access to their systems, wherever they are.”
Allied Universal, globally renowned security and facility services company in North America, is proud to celebrate Women’s History Month, which commemorates and encourages the study, observance and celebration of the vital role of women in American history. Security is one of the fastest-growing professional careers worldwide. Today, more and more security companies are employing women. “Allied Universal celebrates the hard-working women who work for us each and every day at all career levels within the organization,” said Steve Jones, CEO, Allied Universal. “We employ many women in a wide variety of positions including security professionals, administrative and executive positions.” Honoring women security professionals While security is not traditionally a sector that most women consider to build their careers, the landscape has shifted dramatically. It has been an evolution, rather than a revolution, that has attracted the diverse population of employees who now serve as our country’s security professionals. “Every day, thousands of female security professionals put on their uniforms and ensure the safety and security of countless workplaces, schools, shopping malls, and communities,” says Caress Kennedy, Northeast Region President for Allied Universal. The Committee of 200 (C200) It is important to recognize these women for their distinguished service" She is also associated with many industry associations, including The Committee of 200 (C200) - a prestigious network of top-level women entrepreneurs and corporate innovators, New York Staffing Association, NYPD Law Enforcement Explorers, NYC Workforce Investment Board and serves on St. John's University Homeland Security Academic Program Advisory Board. Caress adds, “It is important to recognize these women for their distinguished service.” Elizabeth Core, a military veteran and Shift Advisor for Allied Universal, decided to join a security company due to the opportunity to share her military knowledge with her team such as discipline, respect and honesty. For most of her 26-year career in the military, Core was stationed at Joint Base Andrews in Washington, DC. The security industry is ever-changing and combines the evolution of technology and physical security, coupled with the opportunity for continual learning and growth. Empowering working women “We are able to not only positively impact our clients, but also our world at large,” said Liz Thomas, Vice President of Sales, Northwest Region, Allied Universal. She adds, “Having the opportunity to work at Allied Universal, who serves so many different vertical markets, has opened the door to connect with diverse groups of people and create incredible relationships and long-term friendships with customers and employees, which is the greatest benefit of all.”
Digital Monitoring Products (DMP) is releasing a line of FirstNet-certified and compatible alarm communication radios that will work directly with AT&T FirstNet. With the new communicator, DMP XR and XT Series panels are the first to be available for use on FirstNet. FirstNet is the nationwide wireless public safety broadband network that has been established by the Federal Communications Commission, which hired AT&T to deploy it with $40 billion of planned investment. Previously, first responders across the country have relied on more than 10,000 separate land mobile radio networks, which oftentimes do not interoperate with one another. Highly-secure connection Creating the designated FirstNet band ensures emergency personnel will always have the reliable and highly-secure connection they need for critical information in responding to incidents. FirstNet gives public safety devices “first-in-line” access, even when there are thousands of other requests coming into the network. “With the network’s First Priority on Band 14 and AT&T existing LTE, first responders are always on, always first in line,” says Mark Hillenburg, Vice President of Marketing at DMP. All 50 states have adopted FirstNet to use as their public safety communications network. “It’s the solution to the decades-long interoperability and communications challenges first responders have experienced,” Hillenburg adds. “With FirstNet, our critical security infrastructure won’t be impacted by a national emergency.” Benefits for the Alarm Industry The 700 MHz signals penetrate buildings and walls much more easily and cover larger geographic areas While FirstNet’s priority is to support first responders, certified alarm companies will be allowed to send alarm signals over FirstNet. And, with DMP’s 263FIRSTNET-AT&T communicator, the XR and XT Series panels will have the advantage of using the specialty 700 MHz band for alarm communications to central stations. The 700 MHz signals penetrate buildings and walls much more easily and cover larger geographic areas. In addition, as part of AT&T’s guarantee, users will have access to the cellular network over the next 25 years without a cellular sunset, according to AT&T. Eligibility to use FirstNet for the alarm industry is overseen by The Monitoring Association (TMA), which allows to apply for eligibility to use FirstNet services for alarm communications. DMP was among the first TMA certificate recipients. First responder infrastructure “We are excited to be the first panel manufacturer to release FirstNet compatible alarm communicators,” Hillenburg says. “The FirstNet network is an important step forward in our nationwide first responder infrastructure, and DMP is excited to work with TMA and AT&T to finally deliver priority alarm panel communication over FirstNet.” The use of FirstNet by the alarm industry would be for premises alarm units at government facilities, as well as businesses and homes to communicate alarm information through the network to participating central station alarm facilities. Typical signals would be burglar alarm, fire alarm, medical alarm signals and other related signals.
Adder Technology, a global provider of connectivity solutions and high performance IP KVM, has announced the launch of the new ADDERView Secure Range of KVM switches and accessories. The NIAP Protection Profile 4.0 compliant range is designed to minimize hacking and cyber-attack risks without compromising real-time data visualization and secure collaboration in mission-critical environments. Made in America, the range of secure switches combine features such as channel separation, uni-directional data paths and tamper-proof labeling to maintain high levels of security required in command and control centers. Users can control classified and non-classified network sources simultaneously and in real-time, while benefitting from pixel-perfect data visualization at video resolutions up to 4K at 60 frames per second (fps). E-Paper display The ADDERView Secure range has been designed with simplicity and usability in mind without sacrificing functionality. An E-Paper display shows user-defined status information for the selected target computer and classification level, while fully color-configurable LED buttons have been designed to give users instant and clear channel confirmation, essential in busy control room environments. ADDERView Secure range is compatible with Adder’s existing portfolio of matrix and extension product To increase efficiencies in control rooms, the ADDERView Secure range is compatible with Adder’s existing portfolio of matrix and extension products, allowing secure IT personnel to protect their initial infrastructure investment, improve scalability and IT agility. Backwards compatibility allows users to take advantage of access to a wider portfolio of connectivity solutions to improve data visualization and collaboration. ADDERView Secure range The ADDERView Secure range comprises: ADDERView Secure Desktop KVM Switches: a powerful range designed to improved usability with an intuitive E-Paper display and color-configurable LEDs. ADDERView Secure Flexi-Switch: an innovative solution designed to offer ultimate flexibility with support for video resolutions up to UHD 4K at 60 fps on single and dual-head computers. ADDERView Secure Multi-Viewer: designed to deliver instant and simultaneous access to multiple data sources in mission-critical control rooms. ADDER Secure Card Reader: a robust accessory that allows users to simultaneously authenticate with up to four isolated computers. ADDER Secure Remote Control Unit: a compact unit that provides secure push button access to any channel on the target PC directly from the user desktop. ADDER Secure Port Expander: a secure accessory used to provide an additional port for USB HID devices including touch screens. Adrian Dickens, CEO, Adder Technology, commented, “We understand that organizations accessing, processing or controlling sensitive data require numerous security features as standard, and compliance with the latest NIAP protection profile is just one of them. It was important to us that our new secure KVM products offered enhanced functionality above and beyond what is expected. I believe the ADDERView Secure range does just that, and will significantly improve user workflows in mission-critical applications. ” The new ADDERView Secure range forms part of Adder’s extensive connectivity portfolio, which is renowned for technical excellence, reliable performance and specification. Users can book a demo to experience the ADDERView Secure range for the first time on the Adder Technology booth at AUSA 2020, March 17th-March 19th at the Von Braun Center, Huntsville, AL.
Dahua Technology, a video-centric smart IoT solution and service provider, successfully launched its brand new solution for smart night surveillance, the WizSense Full-Color Series Network Camera. Unparalleled night surveillance This new camera series embraces Dahua Technology’s four major technological innovations: Large Aperture Lens - Features F1.0 super large aperture that collects 2.5 times amount of light compared with F1.6 aperture, creating brighter image. High-Performance Sensor - Offers 30% photosensitive capacity increase through its larger sensors. Advanced ISP - Dahua ISP 4.0 greatly improves Signal-to-Noise Ratio (SNR) and color reproduction. Warm Light - The weighted radiance of blue light is 40% below European Union standards, which presents lower light pollution and less harm to human eyes. With these four technological advancement, Dahua Full-Color Camera delivers unparalleled performance at night. It achieves 24/7 monitoring by capturing vivid details and presenting colored images in low light conditions. General IR Camera vs. Full-Color Camera At the same time, it provides warm and smart auxiliary light to guarantee image clarity and quality even in total darkness. Thanks to its built-in AI functions, higher monitoring accuracy at night is guaranteed. Dahua Technology delivers both SMD and Full-Color for night surveillance advantages to its customers. On one side, SMD can easily process visual information collected by Full-Color Camera. On the other side, the Full-Color Camera significantly increases the accuracy of SMD at night (see table below). SMD Accuracy In addition, Dahua SMD has the ability to effectively filter false alarms triggered by pets, leaves, branches, raindrops, lights and other irrelevant objects, and only focus on real threats, human and vehicle. SMD Accuracy at Night Product Human Accuracy Vehicle Accuracy Traditional Camera ≥90% ≥90% Full-Colour Camera ≥98% ≥98% *Figures are affected by different lab conditions. Utilizing the two advanced technologies, Dahua WizSense Full-Color Camera can accommodate a wide range of application scenarios, such as museums, cinemas, factories, villas, schools, etc. Users no longer need to worry about the high cost of patrolling or leaving their property unguarded at night. This solution is fully capable of meeting the demands of ordinary users, delivering a safer and cost-effective solution for night surveillance.
Artificial Intelligence. You’ve heard the words in just about every facet of our lives, just two words, and they’re quite possibly the most moving, life-changing words employed in everyday conversations. So what exactly is AI, who currently uses it and should be using it? What is AI? AI is a powerful way of collecting, qualifying and quantifying data toward a meaningful conclusion to help us reach decisions more quickly or automate processes which could be considered mundane or repetitive. AI in its previous state was known as “machine learning” or “machine processing” which has evolved into “deep learning” or, here in the present, Artificial Intelligence. AI as it applies to the security and surveillance industry provides us the ability to discover and process meaningful information more quickly than at any other time in modern history. Flashback - VCR tapes, blurred images, fast-forward, rewind and repeat. This process became digital, though continued to be very time-consuming. Today’s surveillance video management systems have automated many of these processes with features like “museum search” seeking an object removed from a camera view or “motion detection” to create alerts when objects move through a selected viewpoint. These features are often confused with AI, and are really supportive analytics of the Artificial Intelligence, not AI themselves. Machine Learning Fully appreciating AI means employment of a machine or series of machines to collect, process and produce information obtained from basic video features or analytics. What the machines learn depends on what is asked of them. The truth is, the only way the AI can become meaningful is if there is enough information learned to provide the results desired. If there isn’t enough info, then we must dig deeper for information or learn more, properly described as “deep-learning” AI. Translated, this means that we need to learn more on a deeper level in order to obtain the collaborative combined information necessary to produce the desired result. Deep learning AI Deep learning AI can afford us the ability to understand more about person characteristic traits & behaviors. Applying this information can then further be applied to understand how to interpret patterns of behavior with the end goal of predictable behavior. This prediction requires some degree of human interpretation so that we are able to position ourselves to disrupt patterns of negative behavior or simply look for persons of interest based on these patterns of behavior. These same patterns evolve into intelligence which over time increases the machine’s ability to more accurately predict patterns that could allow for actions to be taken as a result. This intelligence which is now actionable could translate to life safety such as stopping a production manufacturing process, if a person were to move into an area where they shouldn’t be which might put them in danger. Useful applications of intelligence Informative knowledge or intelligence gathered could be useful in retail applications as well by simply collecting traffic patterns as patrons enter a showroom. This is often displayed in the form of heat mapping of the most commonly traveled paths or determining choke points that detract from a shopper’s experience within the retail establishment. It could also mean relocating signage to more heavily traveled foot-paths to gain the highest possible exposure to communicating a sale or similar notice, perhaps lending itself to driving higher interest to a sale or product capability. Some of this signage or direction could even translate to increased revenues by realigning the customer engagement and purchasing points. Actionable Intelligence From a surveillance perspective, AI could be retranslated to actionable intelligence by providing behavioral data to allow law enforcement to engage individuals with malicious intent earlier, thus preventing crimes in whole or in part based on previously learned data. The data collection points now begin to depart from a more benign, passive role into an actionable role. As a result, new questions are being asked regarding the cameras intended purpose or role of its viewpoint such as detection, observation, recognition or identification. Detecting human presence By way of example, a camera or data collector may need to detect human presence, as well as positively identify who the person is. So the analytic trip line is crossed or motion box activated or counter-flow is detected which then creates an alert for a guard or observer to take action. Further up the food chain, a supervisor is also notified and the facial characteristics are captured. These remain camera analytics, but now we feed this collected facial information to a graphic processing unit (GPU) which could be employed to compare captured characteristics with pre-loaded facial characteristics. When the two sources are compared and a match produced, an alert could be generated which results in an intervention or other similar action with the effort of preventing a further action. This process- detect, disrupt, deter or detain could be considered life-saving by predictably displaying possible outcomes in advance of the intended actions. The next level is deep-learning AI which employs the same characteristics to determine where else within the CCTV ecosystem the individual may have been previously by comparatively analyzing other collected video data. This becomes deep-learning AI when the GPU machine is able to learn from user-tagged positive identification, which the machine learns and begins to further reprocess its own data to further understand where else the person of interest (POI) may have existed on the ecosystem and more correctly improve its own predictive capabilities, thus becoming faster at displaying alerts and better at the discovery of previously archived video data. The future In conclusion, the future of these “predictables” wholly rests in the hands of the purchasing end-user. Our job is to help everyone understand the capabilities and theirs is to continue to make the investment so that the research perpetuates upon itself. Just think where we’d be if purchasers didn’t invest in the smartphone?
With the start of the 2020s, many security industry experts are reflecting on the emerging technologies over the past decade and looking forward to what is in store in the future. Artificial Intelligence (AI) is a buzzword that has infiltrated everyday nomenclature throughout the past decade. Every industry from healthcare, to banking, to security has implemented some form of AI that is touted as the hidden key to maximizing productivity and/or security. However, AI technology is still in its infancy and is not the panacea that many cybersecurity experts claim. Why AI is more hype than reality AI is a nascent technology and has limited practical applications Today, AI is a nascent technology and has limited practical applications because it’s still difficult to understand the rational that is used by the machine learning algorithms for making their decisions. As a result of this limited understanding, these technologies are only leveraged for pinpointed functionality. For example, AI can be designed to analyze data for specific threats, such as malware, but AI technology is only as good as the data it analyzes and cannot be fully trusted to discover new threats that emerge on their own. Furthermore, even when a threat is detected by AI, humans are still needed to confirm that a real risk is present. The value of AI in security today AI undoubtedly has its place in today’s security space. Government agencies and the military use AI to comb through hundreds of hours of call data to try to isolate terrorist or criminal activity. In its current state, AI can successfully review large amounts of data and automate repetitive tasks. The results of these services are helpful as additional data points, but at this time it makes more sense to use AI as helper technology rather than fully relying on AI to ultimately make decisions for organizations. Furthermore, AI can be utilized in access management to watch the habits of individuals and identify actions that stray outside the norm. For example, if a user logs into a system outside the normal working hours, AI can identify this anomaly and utilize step-up authentication to further validate the user should be granted access. AI can also be leveraged for access certification campaigns by providing scoring that helps approvers prioritize their efforts on certifications with low scores. However, algorithms should not be trusted to make higher stake decisions. This is because AI cannot currently be taught or programmed with the intuition that humans naturally possess, making the risk of a breach or other security threat is considerably higher. As computing power rapidly grows, so will the future of AI capabilities AI will continue to grow from its infancy into a more useful and robust tool In this next decade, AI will continue to grow from its infancy into a more useful and robust tool that companies can utilize to keep their assets and people safe. There will be a point where AI reaches a mature stage where it can truly think and learn on its own; computing power has grown exponentially in the last decade and will only continue to grow more in the next. This increase in computing power opens up a limitless number of possibilities for AI usage, especially as humans perfect and refine AI’s algorithms. For now, AI has a place in today’s security industry and has already proven to be adept at identifying threats and making society safer. While this is helpful, humans remain as a critical factor in evaluating threats. I believe that the future of AI is bright, and fully expect that our capabilities around explainable AI will rapidly advance thus providing many opportunities to leverage these technologies in a fully autonomous capacity in the not-to-distant future.
Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customizable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customize devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarized, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analyzing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyze massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyze massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognize residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorized person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.
At a major music festival, a fan in the crowd aggressively leapt over a barricade to approach a famous artist. Personnel from Force Protection Agency immediately implemented extrication protocol to shield the artist from physical harm, quickly reversed course and calmly led the client away from the threat. Force Protection Agency (FPA) personnel intentionally did not engage the threatening fan in any way, as local venue security personnel were present and tasked with apprehending the rogue fan. FPA’s efforts were directed expressly toward the protection of the client, avoiding unnecessary escalation or complications and minimizing physical, visual, and legal exposure. Dedicated to the safety of clients Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation Specializing in protecting celebrities and high-net-worth individuals, Force Protection Agency is a unique, elite-level agency inspired by a vision for excellence and innovation, and dedicated to the safety and success of clients. The agency was formed in 2017 by Russell Stuart, a California State Guard officer and security and entertainment industry veteran. The agency is the culmination of 20 years of experience in the fields of security, military, emergency management, logistics and technology, media and entertainment, and celebrity management. We interviewed Russell Stuart, Founder and CEO of Force Protection Agency (FPA), which has been called “the Secret Service of Hollywood,” for his insights into providing security for celebrities. Q: What unique need in the marketplace do you seek to serve, and how are you qualified to serve it? Stuart: The needs of celebrity and high-net-worth clients are complex and constantly changing. When dealing with a high-profile individual, discretion is paramount, extensive communication is required, and adaptation is ongoing. A critical objective is anticipating and planning for all types of potential negative scenarios and preventing them from even starting, all while not disrupting the normal course of operation of the client's day or their business. Force Protection Agency is poised to serve these needs by innovating and intelligently managing the planning, procedures, and personnel used in every facet of protecting the client’s interests and achieving their objectives. Q: What is the typical level of "professionalism" among bodyguards and security professionals that protect celebrities? Why does professionalism matter, and how do you differentiate yourself on this point? Stuart: Professionalism is an overall way of approaching everything to do with the business, from recruiting, to training, to making sure the right agent is with the right client. Nothing matters more; polish and precision are not only critical to mission success, but also support the comprehensive best interest of the client while preventing costly collateral damage and additional negative consequences. True “professional protective services" is intelligent strength and proper execution, not emotional or reactionary violence. Unfortunately, the latter is frequent among many celebrity bodyguards, and often incurs extremely expensive and even dangerous repercussions. Q: Your company has been described as "the Secret Service of Hollywood." How true is that comparison, and how does your work differ from (e.g.) protecting the President? Force Protection Agency prides itself on providing its services with discretion, precision, and poise Stuart: Totally true, and for this reason: the keys to success in protection are prioritization, and planning. Most people fail to even recognize the first, negating any level of effort given to the second. Establishing the true needs and the correct priority of objectives for each individual client and situation, and firmly committing to these without deviation, are what distinguishes both government secret services and Force Protection Agency from the vast majority of general security firms. Also, the term “secret service” implies an inconspicuous yet professional approach, and Force Protection Agency prides itself on providing its services with discretion, precision, and poise. Q: What is the biggest challenge of protecting celebrities? Stuart: The very nature of celebrity is visibility and access, which always increases risk. The challenge of protecting a high-profile individual is facilitating that accessibility in a strategic and controlled manner while mitigating risk factors. A client’s personal desires and preferences can often conflict with a lowest risk scenario, so careful consideration and thorough preparation are essential, along with continual communication. Q: How does the approach to protection change from one celebrity (client) to another? What variables impact how you do your job? Stuart: The approach is largely determined by the client’s specific needs, requests and objectives. The circumstances of a client's activities, location, and other associated entities can vastly disrupt operation activities. A client may prefer a more or less obvious security presence, which can impact the quantity and proximity of personnel. Force Protection Agency coordinates extensively with numerous federal, state, and municipal government agencies, which also have a variety of influence depending on the particular locations involved and the specific client activities being engaged in. Q: Are all your clients celebrities or what other types of "executives" do you protect – and, if so, how are those jobs different? Stuart: Force Protection Agency provides protective services for a wide range of clients, from the world’s most notable superstars to corporate executives and government representatives. We also provide private investigation services for a vast variety of clientele. Force Protection Agency creates customized solutions that surpass each individual client’s needs and circumstances. The differences between protecting a major celebrity or top business executive can be quite different or exactly the same. Although potentially not as well known in popular culture, some top CEOs have a net worth well above many famous celebrities and their security needs must reflect their success. Q: What is the role of technology in protecting famous people (including drones)? Technology is crucial to the success of security operations Stuart: Technology is crucial to the success of security operations and brings a tremendous advantage to those equipped with the best technological resources and the skills required to maximize their capabilities. It affects equipment such as communication and surveillance devices like drones, cameras, radios, detection/tracking devices, GPS, defensive weapons, protective equipment, and more. Technology also brings immense capabilities to strategic planning and logistical operations through the power of data management and is another aspect of Force Protection Agency operation that sets us apart from the competition. Q: What additional technology tools would be helpful in your work (i.e., a “technology wish list”)? Stuart: The rapidly growing and evolving realm of social media is a massive digital battlefield littered with current and potential future threats and adversaries. Most mass shooters as of late have left a trail of disturbing posts and comments across social media platforms and chat rooms that telegraphed their disturbing mindset and future attacks. A tool that could manage an intelligent search for such threats and generate additional intel through a continuous scan of all available relevant data from social media sources would be extremely useful and could potentially save many lives. Q: Anything you wish to add? Stuart: Delivering consistent excellence in protection and security is both a vital need and a tremendous responsibility. Force Protection Agency is proud of their unwavering commitment to “Defend, Enforce, Assist” and stands ready to secure and satisfy each and every client, and to preserve the life and liberty of our nation and the world.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centers on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximizing benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximizing the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
The task of protecting shared spaces, such as offices and schools, has become increasingly complex, particularly with ever-rising political tensions and the difficulties of assessing threats for schools, workplaces and law enforcement. Given the randomness of when and where a violent person may strike, those who manage facilities need an emergency plan, as well as robust training, detection and awareness. To gain more insights into dealing with such threats, we interviewed John Torres, President of Security and Technology Consulting, Guidepost Solutions. Guidepost Solutions is a global team of investigators, security and technology consultants, and compliance and monitoring experts. They provide security design and consulting, investigations, and compliance and monitoring leadership for critical client needs. Torres has extensive investigative and security experience. Previously, he served as the Special Agent in Charge for Homeland Security Investigations in Washington, D.C. and Virginia. His background includes more than 27 years of experience providing investigative and security management for the U.S. Departments of Homeland Security and Justice, including serving as the Acting Director and the Deputy Director of U.S. Immigration and Customs Enforcement. Q: Why is it difficult for schools, workplaces and law enforcement to assess threats of violence? How can they differentiate between a threat and a non-threat? Torres: With mobile technology and social media, threats are more than just physical. Schools are often not screening student social media accounts and are restricted in what they can and cannot monitor due to privacy laws. Proactive business and educational institutions are working closely with law enforcement, providing training and increasing awareness of potential threats or abnormal behavior. Proactive business and educational institutions are working closely with law enforcementEmerging tools include software that allows monitoring of students’ school-issued email and file storage accounts. Communications software and apps provide real-time notification of emergency messages to students, parents, employees and the community to provide critical instructions during an emergency. The combination of training and new tools has enabled trends and threatening language to be identified and appropriate authorities notified. Q: What tools and/or insights can Guidepost Solutions add to the mix? What are the elements of a “comprehensive risk assessment?” Torres: Comprehensive risk assessments include adopting a tiered approach to assessing the school or office and the surrounding environment. A typical approach includes site perimeter review, identifying gates, fencing, vehicle barriers etc., the parking lot, building exterior, interior paths of travel and individual classroom measures. Review and observation of systems including mass notification, video surveillance, access control, intrusion and visitor management, etc. are critical to ensure that they are equipped to maintain functionality in the event of power loss etc. As an insight, always engage with people, they have the knowledge of each unique facility. Elements we can add to the mix include assessments, physical security improvements and mass notification systems, as well as emergency response training, operational policies and procedures, and behavior analysis. Q: How can the elements of a risk assessment be translated into recommendations of specific technologies or processes (such as video surveillance and/or access control)? Torres: Risk assessments often drive and identify the need for technologies to be implemented into the security programs of schools, business or places of mass gathering, such as stadiums, convention centers and houses of worship. Risk assessments often drive the need for technologies to be implemented into places of mass gatheringRisk assessments help identify weaknesses in security procedure and then often support phased security enhancement programs as funds become available for investment. Each entity is different, and stakeholders should be included. For example, video surveillance may be a priority at one location but controlling the main point of entry may be more important at another. Technology and process recommendations must meet the operational needs and support the goals of the security team and operational managers. Q: How can the risk of an incident be mitigated and lives protected? Torres: While multiple steps are helpful, all of them in combination are key to implementing a comprehensive security plan. They include: Assessments – physical, cyber and procedural Physical Security Improvements – visitor management, fencing and barriers, locks and cameras Emergency Response Training – law enforcement coordination; muscle memory response Mass Notification Systems – current software, clear concise directives, testing Operational Policies and Procedures – termination, evacuation, communication, intervention Behavioral Analysis. Q: What are the elements of behavior analysis? Torres: They include things like changes in appearance and behavior, including social media behavior, and isolation from family or friends. They also include studying or taking pictures of potential targets, and real or perceived bullying. An individual may advocate violence or hate, and/or consume violent extremist information/propaganda. He or she may talk about traveling to places that sound suspicious, and/or have an obsession with weapons. Q: What is the role of training? Torres: Training is critical regarding emergency situations in schools, be it a fire drill, earthquake, lockdown, active shooter situation, etc. Training and drills educate those present, including employees and staff, with information about actions that may save lives and reduce casualties in a real emergency. Training should hold people responsible and set standards for acceptable behavior. Training is critical regarding emergency situations in schoolsThere should be a plan that is implemented, including practice and drills. You should also provide training and communication skill building classes. Develop intervention strategies. Work with HR and legal (and others as appropriate). Finally, document everything. Q: What challenges still remain? Torres: Cultural and behavioral change remains at the forefront of schools and businesses when addressing safety and security measures. A large percentage of violent acts may be preventable if a bystander shares his/her concerns with the proper authorities. According to the FBI, perpetrators exhibited behavioral indicators in 93% of incidents. And bystanders had prior knowledge in 81% of school attack incidents and 80% of terrorist-inspired behaviors or activities before an attack. Q: What progress are you seeing? Torres: With each tragedy that occurs, leaders are engaging with safety and security head on. There is a shift in schools and businesses to engage with professionals that can help them understand what they do not know. Simple things such as improved communication and enforcement of policies and procedures can have a tremendous positive impact on an organization’s security posture. Assessments and technology upgrades are important and effective, but it all starts with acknowledging the need to provide and maintain safe and secure environments for students, employees and the community.
While HENSOLDT is a global pioneer of technologies that are designed for protecting armed forces, civilians, assets and borders, the company is also actively making a difference as a protector of endangered species. South Africa is known for its iconic wildlife and is also home to one of HENSOLDT’s largest industrial sites. As a result, it came as a natural progression to protect the country’s wildlife using state-of-the-art defense and security technologies. Rise in rhino poaching In recent years, animals such as rhinos have been under increased pressure due to rising poaching levels, threatening the future of these animals. South Africa holds nearly 80% of the world’s rhinos and has been hit the hardest by poaching, with more than 1 000 rhinos killed each year between 2013 and 2017. HENSOLDT celebrates three years of zero poaching on the world’s largest rhino conservancy HENSOLDT responded to this threat, and is now combining advanced intelligence, radar and optical surveillance systems with physical security for high-end wildlife protection. This week, HENSOLDT celebrates three years of zero poaching on the world’s largest rhino conservancy, where HENSOLDT’s technologies have been keeping a large number of rhino safe. HENSOLDT South Africa designed and installed a surveillance and security system on the farm and since then, not one animal has been lost to poaching. “Before that, we had poaching every month, sometimes every week,” says John Hume, owner of Buffalo Dream Ranch. Situational awareness In 2017, Buffalo Dream Ranch, the world’s largest rhino farm, started a partnership with HENSOLDT to secure 8000 hectares of land, where some 1800 rhinos now live peacefully, protected by state-of-the-art HENSOLDT technology. The specially developed system combines a number of advanced sensors, including optical and radar sensors, to monitor the rhinos, farm and surrounding area. Data from these sensors are fused using advanced analytics at a command and control center to provide complete situational awareness and early-warning of potential poachers approaching the area. In combination with existing physical barriers and a team of security personnel, the system augments the total security approach to create a surveillance solution, with technology that is always on guard, never fatigues and which cannot be compromised. “We are for the first time in years feeling confident, with HENSOLDT, of perfecting the protection of our rhino,” says Hume. Wildlife protection The know-how acquired through these projects can be applied for protecting other wildlife “We are honored to be part of important initiatives such as the conservation of our wildlife and we aim to expand our efforts,” says Hennie Venter, Chief Executive of the HENSOLDT South Africa GEW business unit. The know-how acquired through these projects can be applied for protecting other wildlife and national parks to safe-keep endangered species such as lions, elephants and even abalone. HENSOLDT prides itself on its relationship with its clients. “For us it’s not putting down the equipment and getting the business, for us it’s rather a journey,” says Werner Muller, GEW’s Chief Executive of Spectrum Monitoring and Security. Needs-based solutions Because of this philosophy, and because each wildlife scenario is different, with its own unique set of challenges, HENSOLDT’s experts collaborate with each client to develop a solution that addresses their specific needs. Through its business units, GEW and Optronics, HENSOLDT South Africa delivers solutions to clients across the world, and significantly contributes to South Africa’s export industry, while it is firmly grounded in its roots as a proudly South African company, operating in South Africa for South Africa. HENSOLDT is committed to continue innovating to protect the wildlife.
Revader Security has supplied a fleet of rapid redeployable CCTV cameras to Merthyr Valleys Homes, a housing association which owns and manages over 4,200 homes across Merthyr Tydfil, South Wales. The Transit range of mobile cameras are ruggedized outdoor surveillance solutions which have been proven over many years to deter crime and secure the vital video evidence necessary for prosecution. The CCTV team at Merthyr Valley Homes are able to regularly reposition each camera around the locality to respond to the movement of crime hotspots, antisocial behavior, burglary and vandalism. As the units can be installed in virtually any location within minutes, only minimal planning and notice is required. Tackling issues of crime and antisocial behavior Each unit delivers live and recorded footage to the Merthyr Valley Homes control center Each unit delivers live and recorded footage to the Merthyr Valley Homes control center over a combination of wired, wireless and mobile networks and are powered by a variety of sources, including mains and battery. The mobile CCTV products were provided through Caerphilly-based Seren Fire & Security Solutions, an established supplier and installer operating across the region. Merthyr Valley Homes has gradually expanded its stock of Transit redeployable cameras following consistently positive results in tackling long-running issues of crime and antisocial behavior within local neighborhoods. Great build quality and performance Huw Powell, Anti-Social Behavior Officer at Merthyr Valley Homes said: “We have been delighted by our new mobile CCTV capability. The redeployable cameras from Revader Security really are great in terms of build quality and performance – and they have proven to be an invaluable investment.” Revader Security continue to work in partnership with Seren Fire & Security Solutions to support Merthyr Valley Homes and a variety of other clients in the public and private sector.
Three more UK police forces have jointly upgraded to Sepura SC20 TETRA radios, significantly improving their front line officers’ ability to communicate with colleagues. Bedfordshire Police, Cambridgeshire Constabulary and Hertfordshire Constabulary made use of their joint purchasing power to equip officers from across all three forces with the new SC20 TETRA radios. In all over 1,900 radios were purchased across the three forces, to work alongside their existing fleet of Sepura radios. SC20 TETRA radios By using the SC20 TETRA radios, officers will benefit from powerful, robust radios with loud, clear audio By using the SC20 TETRA radios, officers will benefit from powerful, robust radios with loud, clear audio, ensuring that critical voice communications can be clearly heard and understood, even in noisy environments. In addition the radios are applications ready, meaning that each force can in time develop bespoke applications to enable quick, secure access to critical data. A key advantage of the Sepura solution is that their radio programming solution Radio Manager can work across different Sepura products, meaning that the transition to new devices is as smooth as possible. Intuitive user interface Andy Gregory, Business Development Director at Sepura said, “After conducting trials, the response from the forces was that the SC20 benefitted from robust design, an intuitive user interface and loud audio, making it ideally suited to the users’ operational needs. The sale is significant to Sepura of course, as Cambridgeshire are Sepura’s ‘home’ force, and many of our staff live in Bedfordshire and Hertfordshire where the new radios are now being deployed.” Gary Maughan, Regional Sales Director for the UK and Ireland at Sepura added, “Sepura radios continue to be chosen by police organizations in the UK and across Europe as the leading TETRA device available on the market today. We are proud to work with our local forces as we do with all UK police forces, ensuring that they are equipped with the best communication solution possible.”
Revader Security has supplied its Transit mobile CCTV cameras to Argoed Community Council in Flintshire, North Wales. The cameras are operated on a daily basis by the local police, primarily for the purposes of tackling antisocial behavior and street crime. The Transit range of mobile cameras are ruggedized outdoor surveillance solutions which have been proven over many years to deter crime and secure the vital video evidence necessary for prosecution. Local police forces are actively using the fleet of mobile cameras in the Argoed and surrounding area to combat long-running issues of antisocial behavior and criminality in the community. Mobile CCTV cameras combat crime Police are able to regularly reposition each camera around the locality to respond to the movement of crime hotspots, and only minimal planning is required prior to deployment, since the units can be installed in virtually any location within minutes. Rhodri Hampson-Jones, Clerk to the Council, said, “The mobile CCTV cameras supplied by Revader Security have proven to be highly effective. I would have no hesitation in recommending them to CCTV operators seeking to combat antisocial behavior and criminality in the community.” Following successful results in the local area, Argoed Council placed repeat orders to increase their stock of mobile cameras. The council is fully supported by Revader Security’s technical team throughout the life cycle of the products.
Around 7,000 people pass through the Luminy faculty’s suburban campus every day. As part of a major project to modernize two buildings, university managers sought a retrofit-ready access control solution to upgrade security. University administrators selected Aperio locks to secure doors in the new buildings. With Aperio, facilities staff deal with lost keys more efficiently. The laborious process of changing locks and reissuing keys, part of the daily workload with mechanical locking, vanishes. The Luminy campus is now equipped with 372 Aperio Electronic Cylinders and 42 Aperio Electronic Handles with built-in RFID readers. Locks are integrated seamlessly, wirelessly and online with Luminy’s ARD access control system. One key goal was to deter theft, which was becoming a problem in teaching areas, especially those with computers. “Since we installed Aperio, we have not had a break-in,” says Cedric Lopez, Maintenance Manager at Luminy. Access smart-cards In addition to theft deterrence, Aperio met broad, stringent criteria for the security upgrade. Staff and students carry individual access smart-cards. Doors and credentials are easily programmed and reprogrammed to accommodate everyone’s changing access needs. Luminy’s security team has complete control over access permissions and campus traffic, in real time. Because their new Aperio devices are integrated online, staff see a “live” overview of the campus and respond proactively to incidents. Aperio is trusted to protect the most sensitive areas of the campus. “We have critical premises, including for the storage of chemicals, some with radioactive properties,” adds Lopez. The benefits of Aperio extend beyond just enhanced campus safety and student security Real-time access control upgrades Aperio locks are built on an open platform, so they are flexible enough to integrate with the university’s room scheduling system. “Teachers are able to reserve their rooms. Students no longer have to wait for the teacher’s arrival, because they have access to the right rooms in defined time slots,” says Cedric Lopez. The credential students already carry automatically opens classroom doors, if they have pre-authorized access rights. For the facilities team, the ARD interface displays scheduling for all relevant rooms in real time. Luminy site managers have already scheduled further real-time access control upgrades built around award-winning Aperio wireless technology. As Luminy staff discovered, the benefits of Aperio extend beyond just enhanced campus safety and student security. The Aperio for Universities Solution Guide explains how you can upgrade and streamline security at your campus.
Videalert, one of the UK’s renowned suppliers of intelligent traffic enforcement and management solutions, has supplied Wiltshire Council with a new mobile enforcement vehicle (MEV) which is initially being used to enforce residential permit parking in Salisbury. The vehicle is equipped with a complete suite of Videalert software giving it the ability to be used in future for a wide range of safety-related parking applications including bus stops and the enforcement of keep clears outside schools. The council is also deploying Videalert cameras to enforce two bus gates in Devizes. According to Joanne Pattison, Parking Manager at Wiltshire Council, “Videalert has provided the council with a flexible, hosted solution that will help us to significantly increase the productivity of the whole parking team. It will also enable us to cost effectively extend enforcement to other safety-related applications as required and provide a more efficient service.” Peugeot 108 equipped with ANPR cameras Videalert supplied a Peugeot 108 equipped with two roof-mounted ANPR cameras and two color cameras Videalert supplied a Peugeot 108 equipped with two roof-mounted ANPR cameras and two color cameras to capture contextual video evidence. The ONVIF-compliant cameras accurately capture reflective number plates at distances of up to 40 metres with capture rates of up to 98%. Importantly, this can be achieved with just a single pass at normal road speeds. Used in conjunction with the latest video analytics, the system delivers the highest productivity at the lowest operating cost in any traffic environment. Wiltshire Council is also installing Videalert cameras to enforce bus gates located at two housing developments in Devizes. These locations, situated next to main arterial routes into the market town, have previously been controlled using rising bollards, which have proved to be increasingly unreliable due to water damage. The first cameras have been installed at the Newman Road bus gate and will provide uninterrupted enforcement around the clock while delivering cost savings by eliminating the ongoing maintenance liability of the rising bollards. Hosted digital video platform Images of contraventions are transmitted to Videalert’s hosted digital video platform where evidence packs can be viewed and validated prior to sending to the council’s back office system for the issuance of penalty charge notices (PCN). Videalert’s flexible hosted platform makes it a quick and cost effective process to deploy enforcement as it does not require the installation of any IT at the council’s offices. To reduce the number of appeals, PCN recipients can view still photographs and video footage of the alleged offense over the internet. Tim Daniels, Sales and Marketing Director at Videalert added, “Videalert MEVs have proved to deliver industry-leading capture rates while consistently outperforming vehicles from other suppliers. These multi-purpose MEVs give councils greater flexibility to enforce a wide range of moving traffic and parking contraventions.”
Round table discussion
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
RFID and Smartphone Readers in Physical Access ControlDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals