Hanwha Techwin America, a supplier of IP and analog video surveillance solutions, will debut its next generation Wisenet 7 SoC (System on Chip).
Built from 30 years of innovation in video surveillance solutions, the highly anticipated announcement sees the continuation of the Wisenet line of custom-built SoCs designed specifically to address the unique challenges of the security market. New key features include cybersecurity features, clear images in all lighting conditions, improved lens distortion correction and more.
High levels of protection
“Hanwha Techwin concentrated on image quality and cybersecurity when developing Wisenet 7. This enables us to make the smartest and most secure video cameras on the market today while giving us a platform for further innovation as we react to these challenging times,” said Ray Cooke, Vice President - Products, Solutions, and Integration, Hanwha Techwin America.
Hanwha Techwin established its own device certification issuing system to embed certificates
Wisenet 7 offers end-to-end cybersecurity with high levels of protection including secure boot, OS, storage, and JTAG, plus a signed firmware/open platform app and more. Hanwha Techwin established its own device certification issuing system to embed certificates and encryption keys into the product during the manufacturing process. When firmware is installed and a certificate is verified, it uses these encryption keys which can never be reprogramed.
Forensic-Level image quality
This creates a trusted platform module that separates the end-user side of the camera application from the network (Linux). This OTP (One Time Program) feature provides a unique level of cybersecurity that is secure by default and only possible when utilizing a custom chip.
Wisenet 7 offers forensic-level image quality by utilizing multiple combined technologies. Digital Overlap and Scene Analysis technology reduces motion artifacts and improves picture quality in low light conditions. Dynamic Range is maximized and noise is reduced when composing multi-frame images captured at varying exposures by processing line by line vs. each frame. This minimizes motion blur and improves edge and color definition of objects, making them easier to identify when viewing live video and during forensic review.
Hybrid motion detection
Temporal filtering removes or attenuates frequencies within the raw signal that are not of interest
XCE (eXtreme Contrast Enhancement) technology is utilized to analyze the back-light area of the image and enhance contrast by analyzing nearby pixel color values in the surrounding area. Wisenet 7 employs motion history-based temporal filtering to analyze the motion data of moving objects in low-light environments.
Temporal filtering removes or attenuates frequencies within the raw signal that are not of interest. A new Noise Adaptive Hybrid Motion Detection algorithm significantly reduces sensor noise. These clearer images improve the results for object recognition performance in low light and offer maximum performance for machine and deep learning algorithms.
Demanding security applications
Wisenet 7 corrects barrel distortion common with wide angle lenses up to 100% at all resolutions. The correction is done in-camera to provide a video output more closely representing how humans perceive images across a wide field of vision.
“The first Hanwha Techwin Wisenet SoC was released in 2010 in response to the unique requirements of security professionals. Our focused development efforts have continued as technology and business needs have evolved to where we are today. Our most powerful SoC ever, Wisenet 7, delivers a new level of quality, performance and cybersecurity to our industry,” concludes Cooke. The first Wisenet 7-based cameras (XNB-9002/8002, XND-9082RV/8082RV, XND-9082RF/8082RF, XNV-9082R/8082R, XNO-9082R/8082R) offer up to 4K high-resolution video providing clear and vivid images suitable for the most demanding security applications.
ASIS International, the world’s association of security management professionals, offers the ability for security professionals to participate in remotely proctored exams for its board certifications. Following the COVID-19 pandemic outbreak, this new option allows professionals who cannot-or would rather not-travel to their nearest Prometric test center to sit for their exams in their own home or office: anytime, anywhere, at no increased cost.
Taking exams remotely
Using Prometric’s ProProctor remote proctoring software, those who are pursuing the Certified Protection Professional (CPP), Professional Certified Investigator (PCI), Physical Security Professional (PSP), or Associate Protection Professional (APP) exams can do so anywhere there is a solid internet connection. While taking the exams remotely has different check-in procedures, the exams themselves will not change no matter where an individual chooses to take the exam.
Earning an ASIS certification shows your peers, colleagues, and supervisors that you have mastered the knowledge and skills"
“The ASIS certification programs continue to be the gold standard for anyone working in security management,” stated Joseph L. Rector, CPP, PCI, PSP, 2020 Professional Certification Board Vice Chair. “Earning an ASIS certification shows your peers, colleagues, and supervisors that you have mastered the knowledge and skills to be a successful security manager. And now we offer the convenience of taking the exam in your own home. This is a major development in certification, and we believe our members will appreciate having this option available to them.”
ASIS Approved For ProProctor Option
ASIS began investigating remote proctoring when test center availability was impacted at the start of the worldwide COVID-19 pandemic. Based on its accreditation under the ANSI/ISO 17024 Standard, the American National Standards Institute (ANSI) awarded ASIS permission to move forward with the ProProctor option in July 2020.
Places of leisure, where people spend their downtime, are public by design. Unlike a bank vault or power plant, they actively invite visitors. They can’t just lock be locked down and hope that no one turns up.
Equally, to ensure user and property safety, access must not be a free for all. Managing risk, separating authorized from unauthorized people and locations, is part of every site manager’s daily routine. Intelligent locking makes this workload a whole lot easier.
Intelligent locking solutions
Intelligent keys combine the powerful features of electronic access control with the convenience and familiarity of mechanical keys. In hugely diverse leisure settings across Europe, they already help managers do more with less.
The right access solution can help system administrators do it safely without putting a burden on those responsible for everyone’s security.
Controlling access to outdoor sites and visitor attractions
Robust, battery-powered locking, backed by intuitive admin software can enable access from anywhere
Obviously, for many leisure attractions, wired electronic security is not an option. Locations may be remote, far beyond the reach of mains electricity. Assets themselves may be outside. Thankfully, cabling is not essential for effective intelligent access control.
Robust, battery-powered locking, backed by intuitive admin software can enable access from anywhere, thereby matching or exceeding the functionality of traditional wired access control. Padlocks built to withstand climate extremes integrate within the system exactly like standard interior locks.
Intelligent electronic key systems
Intelligent electronic key systems are budget friendly. Making the switch from mechanical security is not an all-or-nothing decision. The best intelligent key systems can be rolled out gradually, as needs evolve and budgets allow. For example, the Llyn Brenig Reservoir and Visitor Center in Wales attract tens of thousands of tourists every year.
Both mechanical and electromechanical locking solutions protect a site, which houses critical infrastructure and watersports facilities, with disparate security needs. Here, electromechanical locking brings long-term cost savings to site owners Welsh Water, because locks no longer need to be changed, when keys are lost. Permissions are simply deleted from the system software.
Upgrading zoo access control system
In 2015, Twycross Zoo launched a £55 million, two-decade development plan. High on the agenda was a new intelligent key solution to replace a mechanical master-key system which was labor-intensive to administer. The new system’s flexibility has put zoo security managers in full control of their site. Only staff with the necessary authority and training can access animal enclosures.
It’s simple for system administrators to issue time-defined user keys. These can permit vets or zookeepers access to enclosures for a specific time period outside regular hours, for example, in an emergency. When the period expires, the key no longer works and site integrity is automatically restored.
Access control in the museum sector
Securing museums, open spaces with priceless contents presents one of security’s biggest challenges
When Edvard Munch’s painting ‘The Scream’, was stolen from an Oslo museum in 1994, thieves left a note which read, ‘Thanks for the poor security.’ Securing museums, open spaces with priceless contents presents one of security’s biggest challenges. Around 50,000 artworks are stolen every year, according to some estimates.
Adding further complexity, many museums are located within historic properties. The building itself may be integral to the attraction and come with strict heritage protections. Any new locking installation must make minimal mess. For this reason, wireless is increasingly the preferred choice.
Wireless access systems
Wireless access systems based on robust, key-operated locking, rather than cards and other keyless credentials, combine a familiar technology (the metal key) with the intelligence to keep staff and collections safe. Carrying one programmable key to be able to open doors, cabinets, windows and padlocks makes the security team’s rounds easier. It also minimizes the number of keys in circulation with obvious security benefits.
Companion software makes key tracking straightforward, with administrators always knowing who exactly is carrying credentials and they can refine or amend those permissions quickly, and order a full audit trail on demand. And these locks are discreet enough to maintain the property’s appearance.
Protecting high-value assets and exhibits
London’s Design Museum needed access control designed to protect high-value assets and exhibits. Devices here protect a contemporary site with three galleries, a restaurant/café and an events space, with 100 permanent staff and hundreds (sometimes thousands) of daily visitors. The building has multiple door sizes and must meet British Standards compliance.
Electromechanical locks now control access through 56 doors, forming part of a security ecosystem, which incorporates traditional mechanical locks as well. Using intuitive management software, security managers ensure every staff member accesses only the right areas.
CLIQ from ASSA ABLOY installed at museum
The system the Design Museum chose, CLIQ from ASSA ABLOY, also enables integration with third-party cloud-based solutions
Contractors are issued with temporary programmable keys, which saves time formerly wasted escorting them around the building. The system the Design Museum chose, CLIQ from ASSA ABLOY, also enables integration with third-party cloud-based solutions, for control via a single, central management interface.
The delicate balance between protecting a precious building and guarding its contents sets a major challenge. Security and access control must be ‘subtle, but ever present,’ according to one former moderator of the Museum Security Network. Invasive installation, showy or inappropriately designed devices and components cannot be considered.
CLIQ access control technology
This was the checklist facing France’s Musée Maurice Denis, the museum is inside a listed 17th century monument, so they turned to CLIQ access control technology for a solution.
Drawing on extensive experience in the heritage sector, ASSA ABLOY delivered class-leading security without disrupting the building aesthetic. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries inside every programmable key. No further power supply is needed at the door.
Robust, hard-wearing cylinders and padlocks installed
Around 70 robust, hard-wearing cylinders and padlocks now secure doors and windows inside, and outside the main building with waterproof padlocks protecting CCTV camera that are housed on the exterior. Every employee receives access to relevant areas via a single CLIQ key, which administrators program with only the appropriate permissions.
Insurance compliance is another major concern in the heritage sector. Indeed, insurers for 17th century warship, Vasa demand Sweden’s highest level of locking, Class 3. Yet, the Vasamuseet’s access system must also allow 1.2 million annual visitors to move around freely, while keeping exhibits safe.
CLIQ Remote electromechanical technology
Around 700 interior door cylinders were equipped with CLIQ Remote electromechanical technology
To upgrade an existing mechanical system, around 700 interior door cylinders were equipped with CLIQ Remote electromechanical technology. Museum staff used to carry heavy chains with ten or more keys.
Now, facility managers can amend the access rights of everyone’s single CLIQ key at any time, even remotely, using the CLIQ Web Manager. It’s easy to issue contractors such as carpenters with access rights scheduled to end automatically as soon as their work is complete.
Security for shopping and indoor leisure sites
According to one study completed two decades ago, people spend 87% of their time indoors. The number is probably higher now and includes a huge chunk of everyone’s leisure time. Large retail multiplexes like Festival Place in the UK are a popular destination.
Here, over 170 shops, a cinema, sports center and restaurants have an ever-changing roster of permanent staff, cleaners and out-of-hours contractors. Every person requires secure entry on demand. The public also needs open access for 18 hours every day.
Benefit of CLIQ electromechanical cylinders
Yet, a single lost mechanical key could become a security problem for all users and tenants. Installing 100 CLIQ electromechanical cylinders drastically cut the burden of mechanical key management. Now, cleaners and maintenance workers carry an intelligent key, which unlocks specific doors for a pre-defined time period.
Using simple online admin software, site managers can immediately de-authorize and reissue a lost key or amend any key’s permissions. Generating a comprehensive audit trail, who accessed which lock and when, takes a couple of mouse clicks.
Electronics-inside CLIQ locks
CLIQ also cuts Festival Place operational costs. The electronics-inside CLIQ locks are powered by the standard battery inside every key, not mains electricity. Installation was wireless, a huge saving on potentially expensive electrical work.
At Festival Place and wherever we gather to enjoy leisure, indoors or outside, CLIQ enables easy access control for all openings with just a simple, single, programmable key.
Pulse Secure, the renowned provider of software-defined Secure Access solutions, announced the launch of Pulse Zero Trust Access (PZTA), a cloud-based, multi-tenant secure access service that enables organizations to provide users easy, anywhere access to multi-cloud and data centre applications with Zero Trust assurance.
PZTA simplifies access management with single-pane-of-glass visibility, end-to-end analytics, granular policies, automated provisioning, and advanced threat mitigation that empowers organizations to further optimize their increasingly mobile workforce and hybrid IT resources. As enterprises advance workforce mobility and business digitization, users require access to on-premises and cloud applications from any device, from any location, and at any time.
Trust and adaptive control
Meanwhile, cyberattacks, data breaches and compliance obligations have grown significantly, making trust and adaptive control critical. PZTA offers users streamlined application access while allowing organizations to govern every request by automatically verifying identity, device and security posture before granting a direct, encrypted connection between that user's device and applications residing in public clouds, private clouds or data centers.
IT leaders are driving business transformation in the hybrid digital era while also defending assets"
“IT leaders are driving business transformation in the hybrid digital era while also defending assets during the ‘age of hyper-converged access’ - for any user, from any device, anywhere to any application, at any time. Pulse Zero Trust Access is designed for the elastic digital workplace, providing a unified, cloud-based service that enables greater accessibility, efficiency and risk reduction,” said Rohini Kasturi, Chief Product Officer at Pulse Secure.
Maximizing deployment flexibility
“From inception, Pulse Secure has focused on providing secure access solutions that enhance productivity, visibility and compliance as companies migrate to the cloud and take advantage of utility computing. PZTA exemplifies our on-going commitment to innovate while maximizing deployment flexibility, scale, interoperability and investment protection for companies of all sizes.”
PZTA is based on Pulse Secure’s new cloud-native, microservices-based, multi-tenant platform deployed globally in Microsoft Azure Cloud. The PZTA service consists of the Pulse ZTA Controller, which is hosted and managed by Pulse Secure, the virtual Pulse ZTA Gateway that customers deploy on-premises or in the cloud, and the unified Pulse ZTA Client which runs natively on each user’s Microsoft Windows, Apple macOS and iOS, and Google Android device.
Adaptive control advantages
According to the Gartner Zero Trust Network Access (ZTNA) market guide: “ZTNA improves the flexibility, agility and scalability of application access, enabling digital businesses to thrive without exposing internal applications directly to the internet, reducing risk of attack.” Further, “ZTNA augments traditional VPN technologies for application access, and removes the excessive trust once required to allow employees and partners to connect and collaborate. Security and risk management leaders should pilot ZTNA projects as part of a SASE [Secure Access Service Edge] strategy or to rapidly expand remote access.”
Pulse ZTA Gateways are deployed in the customer’s on-premise and cloud environment
Pulse Zero Trust Access aligns with the Software Defined Perimeter (SDP) architecture of the Cloud Security Alliance, incorporating extensive identity and device authentication, separate control and data planes, centralized granular policy management, and micro-segmentation to thwart unauthorized access and attack propagation.
Threat mitigation actions
While every user device access requires explicit authentication and authorization by the Pulse Zero Trust Access service, the Pulse ZTA Gateways are deployed in the customer’s on-premise and cloud environment closest to the application or resource. This proximity optimizes user experience, reduces latency, and enables hybrid IT deployment at scale. Since encrypted application traffic only flows between the ZTA Clients and ZTA Gateways, customers gain full data privacy and data sovereignty.
PZTA governs each access request and session via a centrally deployed and managed policy. Building upon Gartner’s Continuous Adaptive Risk and Trust Assessment (CARTA) framework, PZTA augments contextual and identity-centric policies with built-in User and Entity Behavior Analytics (UEBA) whereby attributes for every session are monitored and assessed, applying proprietary risk scoring algorithms to identify non-compliant, malicious and anomalous activity, and take expedited threat mitigation actions.
“Our customers trust us to identify and deliver advanced solutions that enable their digital business and protect their valuable resources. Pulse Secure has been our key partner for many years as they offer one of the most versatile, integrated and scalable secure access solutions in the market."
PZTA can co-exist with Pulse Secure’s network access solution portfolio including the Pulse Access Suite
"We jumped at the opportunity to test out their new Zero Trust Access cloud-based service and our teams have been impressed with its simplicity, manageability and overall feature-set”, said Herve Rousseau, the Chief Executive Officer at Openminded. “Pulse Zero Trust Access service does indeed offer users an easier means to access network and cloud applications while providing organizations greater hybrid IT access agility, oversight and management.”
Secure access solution
PZTA allows enterprises of any size to gain comprehensive Secure Access with a simple, scalable, cloud-native service that can be implemented in a matter of hours. The solution provides deployment flexibility and cohesive policy management for enterprises migrating applications from data center to cloud, while also offering comprehensive secure access capabilities to those organizations with pure multi-cloud environments.
This allows broad support for legacy applications and popular cloud apps such as those from Amazon, Atlassian, Box, Google, Microsoft, Oracle, Salesforce, SAP and Zoom. PZTA can co-exist with Pulse Secure’s remote, mobile and network access solution portfolio including the Pulse Access Suite.
Leveraging the unified, multi-tunnel Pulse ZTA Client, users can enjoy transparent, uninterrupted, and simultaneous access to applications and resources from their device of choice regardless of access method - SDP, VPN or NAC. Organizations gain implementation and operational efficiencies, investment protection and tool consolidation to realize lower overall cost of ownership.
Additional features of PZTA include:
Extensive identity, endpoint and security posture authentication prior and during each access transaction to negate unauthorized user and vulnerable device access
Broad application support, including HTTP, TCP/UDP based applications, multi-factor authentication (MFA), single sign-on (SSO) and protected connectivity options
User and device resource shielding prior to PZTA Controller authorization, establishing a Dark Cloud defense to eliminate target visibility for attackers and malware propagation
End-to-end analytics to expedite alerting, reporting, auditing, issue triage, and investigation processes
Hybrid IT deployment
According to a 2020 Zero Trust Progress Report, more than half of cybersecurity decision makers (53%) plan to adopt Zero Trust access capabilities with a hybrid IT deployment. PZTA service is available now at an annual subscription MSRP starting at $180 per user for up to 500 users with volume and multi-year discounts being offered. Managed Security Service Providers (MSSPs) can take advantage of flexible deployment options with plans to allow MSPs to host the ZTA Controller in their or their customers’ infrastructure, and the ZTA Gateways across any hybrid environment.
The modern working world has evolved dramatically over the last few decades - from how and when we work, to the places we work from. Widespread internet connection advances, alongside the growth of cloud-based shared working platforms, have not only created the possibility for increasingly flexible working arrangements, but also fueled a desire to do so – particularly among millennials.
The preference for flexible working has now created a widespread need for more agile workforces, saddling IT departments around the world with the task to maintain ‘business as usual’ without compromising corporate privacy.
With flexible working forecasted to stay for the long haul and passwords increasingly under scrutiny, evaluating alternative secure authentication methods to keep companies’ data and networks safe is important to protect these ‘new normal’ ways of working.
The end of the humble password?
A recent report by Raconteur found that the most common method of authentication for securing the digital aspects of workplaces is passwords.
Unfortunately, however, between phishing, hacking and simple guesswork, passwords are easily compromised – a problem that is only getting worse, with IT professionals reporting an increase in phishing attacks in the last few years. Once compromised, passwords can be used to enter untrusted apps or websites and, worst and most commonly of all, give rise to even greater data breaches.
Between phishing, hacking and simple guesswork, passwords are easily compromised
Alongside security concerns, 6 in 10 people worry about forgetting their passwords and, according to a recent Balbix study, 99% of people reuse the same password across different work accounts. This, undoubtedly, is a side effect of the increasingly complex character requirements implemented by many enterprises. This stress and effort leads to frustrated employees, but, more worryingly, forgotten passwords can also cost IT departments millions of dollars a year.
In our flexible, hyper-connected world, it is clear then that the humble password is no longer effective. Additional or alternative layers of authentication are needed to help enterprises maintain their workplace security in a more convenient and cost-effective way.
Smarter workplace authentication with biometrics
Often, hacking incidents involve the use of stolen credentials. One authentication solution that could bring an end to these large-scale hacking attacks is biometrics, as unique biological traits are extremely hard to steal and spoof.
In addition to being a more secure method to authenticate users and prevent fraud in companies’ networks, it is also possible to layer biometric modalities to create a highly convenient and secure multi-modal authentication solution for sensitive areas or information. Spoofing two biometric modalities, such as fingerprint and iris, in the same attack is virtually impossible, but that doesn’t mean this level of security needs to impair the UX. After all, you can put your finger on a touch sensor, while at the same time glancing at a sensor.
For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees at secured access and entry points. It can also be used to add frictionless layers of additional security to any aspect of current security systems, such as key fobs or USB sticks, or to access personalized settings or employee accounts when using shared devices, such as a printer system. This way, beyond playing a role in securing the modern workplace, biometrics can also give employees greater flexibility and convenience over how, when and where they work.
Privacy and biometrics - explained
Many employers and employees worry about safeguarding privacy in the workplace. Considering biometric data is highly personal, it is no wonder, then, that many are concerned about collecting this data for the purpose of workplace security and what liabilities this may expose them to.
For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees
Employers must adhere to the relevant workplace privacy laws, such Europe’s GDPR, and this duty extends to biometrics, of course. But, providing biometrics is implemented in line with best practice, it can actually protect employees’ privacy far more effectively than its predecessor, passwords.
When employers use an on-device approach, their employees can rest assured no one will be able to access or steal their biometric data, as all biometric data is stored and processed on the device - whether that is a laptop, smartphone, USB stick or key fob. Removing the need for data to ever enter the cloud, this also removes the technical and legal complexities of managing a biometric database and, if a key fob is lost for example, all parties can rest assured there is no chance of anyone else being able to use it. A win-win.
Precisely because biometric data is so difficult to steal and spoof, adding biometric authentication to end-point devices can considerably reduce data breaches to keep both sensitive employee and corporate data safe and secure.
Reimagining workplace security
As people work more flexibly, systems are shared more frequently, and attacks get smarter, it is clear to see that passwords alone are no longer enough to secure the modern-day workplace.
Adding biometric authentication to end-point devices can considerably reduce data breaches
Now is the time to reassess the physical and logical access control infrastructure. To keep personal and corporate data safe, it is crucial to add new and additional authentication methods to the security infrastructure. Luckily, the benefits of biometrics are often far simpler to realize than many enterprises imagine.
The beauty of biometrics is its combination of both security and convenience. Compared to other forms of authentication, biometrics offers considerably stronger protection and an enhanced UX that can easily be integrated into existing enterprise security infrastructure – without the need for huge biometric databases to manage or fear.
So, whether to replace outdated passwords or as part of a multi-modal authentication system, biometrics can play an important role in pushing workplace security into a new era for both physical and logical access control.
COVID-19 has been a thorn in the side of countless companies within the security industry and far beyond. Here, we speak with Richard Huison, Regional General Manager for the UK and Europe at Gallagher Security, who summises his personal experience from these recent months and how Gallagher has adapted in the face of pandemic-induced adversity.
How has the COVID-19 crisis impacted Gallagher on a day-to-day basis?
Gallagher was actually well placed as a result of work already in progress with a number of visionaries and innovators within our business, such as our CIO Neville Richardson. They are determined to put the business on the front foot, making it more digital and proactive in delivering high speed change and we had already been migrating to Microsoft Teams before COVID-19 first reared its ugly head. It’s part of our philosophy to make our business and the solutions we create as stable, reliable and resilient as possible.
Gallagher has adapted to the new way of operating fairly seamlessly, while still working alongside the evolving guidance from governments around the world
It means Gallagher has adapted to the new way of operating fairly seamlessly, while still working alongside the evolving guidance from governments around the world. When lockdown was imposed, we set about prioritising our clients’ needs and delivering on our commitments as a critical supplier. The Gallagher leadership team quickly rolled out the means to stay connected, positive and safe as each region went into isolation. Effective communication, both internally and externally, has always been a critical success factor for our business. That hasn’t changed with the more remote and virtual nature of our communication now and, if anything, it’s even more important both for business continuity and for the personal wellbeing of each and every one of our colleagues.
We’ve quickly adapted to this new way of working and have even become quite adept at recognizing people’s contributions and acknowledging a job well done in new ways, such as using the emojis on Microsoft Teams.
Perhaps the most striking example of this is our new European marketing manager Bethan Thompson, who joined Gallagher on 1 April, little over a week after lockdown was imposed in the UK. She has enjoyed the richest and most comprehensive introduction to the business from the safety of her own home armed with just a laptop and Teams.
What can be the benefits of having employees working from home?
There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and traveling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working.
We’ve quickly adapted to this new way of working and have even become quite adept at recognizing people’s contributions and acknowledging a job well done
To be honest, before COVID, we didn’t disconnect enough, close the laptop, switch off our technology and allow ourselves NOT to respond instantly. But trust is an integral part of our culture at Gallagher and we can easily and effectively continue to champion the right balance and support for the team moving forward.
How can employees ensure they keep a healthy work/life balance?
Working from home can require some personal discipline around taking regular breaks and disconnecting from technology. I encourage all my colleagues to stay active and get regular exercise during the day. Taking time out allows you to process ideas with greater clarity, to be more creative, to plan your day and use your time more effectively – all of which is part of achieving that balance.
And it’s important that we do switch off and close our laptop at the end of the day, which requires some discipline when you work for a business headquartered in New Zealand, where they are 11 hours ahead.
It’s good to cultivate hobbies and welcome distractions that you are passionate about, to switch off from work more effectively. Personally, I love to be outside on a long dog walk with no technology. It’s liberating.
Are you seeing that businesses are already beginning to think differently about their security?
We have to remember why security is important. We all have a different view on how we should maintain business continuity. Yes, properties need a reliable detection and defense solution to resist the opportunist. With the mass migration to work remotely, business leaders are concerned that their IT systems are vulnerable to attack and we read daily about the growth in cyber-attacks. It’s common sense to protect your business with a suitable access control and intrusion detection system and the pandemic has proven to business the value of being truly resilient and able to still operate whatever circumstances ensue.
What will be the biggest security challenges facing businesses over the next six months?
In that timeframe, I don’t see us returning to how things were prior to the pandemic, so businesses will have to adapt to a new normal. We will have to adopt a more holistic view of security, encompassing safety, security and wellbeing, with our teams at the heart of that. In the new world, how can we maintain our teams’ safety at home, or limit them to certain floor space or introduce rotas for office attendance and keep surfaces virus free while they’re there? We need to be alert to where the next threat will come from and mitigate risk against both cyber and biological threat as we’ve seen a virus in either domain can be devastating.
How is Gallagher meeting the evolving demands of the market?
To be honest, Gallagher has always been ahead of the curve. We’ve been talking about competencies, compliance and resilience for decades, long before cyber became the buzzword. Everything we do is related to business resilience and continuity and security is baked in to our products and solutions at source, providing confidence and reliability for all of our customers.
You are not alone: operators everywhere are asking themselves what are they going to do? How are they going to get back to business, and fast? How are they going to cost-effectively operate with all the new safety requirements that have arisen as a result of COVID? How are they going to ensure it all gets done for the safety of customers and staff? How are they going to protect their brand from the negative exposure of being identified as a property with a reputation for COVID?
The economic impact of COVID is expected to hit brick and mortar businesses the worst, as their businesses are dependent on people being physically present. According to a recent report by RBC, it is estimated that 70% of Americans expect to avoid public spaces, 57% of Canadians will be unwilling to attend conferences without a vaccine and 63% of people will prefer to drive vs fly.
This means, that for those of you in the business of travel, conferences, co-working spaces, retail stores, museums, art galleries, restaurants, sports arenas, hotels, cruises, airlines, resorts, theme parks, long-term care, education, etc. in the blink of an eye your approach to on-site safety just changed. To ensure your property is safe and secure, it is no longer just about access control, video surveillance and intruder alarms; it is also about sanitisation
To get back to business and operating at full capacity after COVID, operations must find a way to eliminate the fear, uncertainty and doubt in the minds of their customers and employees.
The affect of COVID-19 on safety and security
To safely get back to business, the Centers of Disease Control and Prevention (CDC) emphasis that all operations need a pandemic response planJust like cybersecurity has had a direct impact on the IT strategy and budget, COVID will have a direct hit on the operations strategy and budget. To ensure your property is safe and secure, it is no longer just about access control, video surveillance and intruder alarms; it is also about sanitization, the lines between the security and maintenance just blurred.
From customers, to employees, to government regulators, to management, the focus is now on operations and the sanitization policies, procedures and actions of the team. To put this change of priority into perspective, six months ago, sanitisation was not top of mind for people. Why, because it was not a life or death issue, we had other first world problems to garner our attention.
From an operations perspective if we enabled a sanitization issue to become significant enough to impact the safety of customers and staff and therefore the brand, then that was an operational choice versus a mistake.
Standards for sanitisation
Just like cybersecurity has had a direct impact on the IT strategy and budget, COVID will have a direct hit on the operations strategy and budgetThe issue is, today while the operating priority of sanitization has significantly increased, it is not measured and managed to the same standard as the other safety and security concerns across a business. Also, important to consider, while people may not hold an operation liable during this first wave, we can guarantee they are not going to be as understanding during the second wave or a future pandemic.
To safely get back to business, the Centers of Disease Control and Prevention (CDC) and the Occupational Health and Safety regulators emphasis that all operations need a pandemic response plan and should follow these simple guidelines:
Develop your plan
Implement your plan
Maintain and revise your plan
While this sounds simple enough, keep in mind that requirements are constantly evolving and will continue to do so for the foreseeable future, or at least until all the research is in. To create an emergency response plan for a pandemic, properties must first determine what needs to be sanitized.
The current requirements dictate that most surfaces and objects will just need a normal routine cleaning, it is only the frequently touched surfaces and objects like light switches and COVID has changed the game and made the digital transformation of operating procedures not a ‘nice-to-have’ but a must-havedoorknobs that will need to be cleaned and then disinfected to further reduce the risk of germs on surfaces and objects.
The challenge is when you step back and consider what people touch in a day; the list quickly grows. After only 30 minutes, I easily came up with a list of over 60 items that one could call ‘high touch’! If you think about it, the list is extensive; telephones, doorknobs, drawer handles, counters, pens, keypads, computers, etc. and the list is only going to get longer as the research comes in.
The challenge is when you step back and consider what people touch in a day; the list quickly grows
If we don’t change our ways, not only will we be doomed to continue making the same mistakes, but we will continue to be lost in paper and filing cabinetsTo scope the impact on operations as part of the plan, we must then find and identify all of those high touch things across the property. If we then combine that with the fact that CDC requires that all high touch locations must not only be cleaned more often, but that they also require that each location is first cleaned with soap and water, and then disinfected for one minute before finally being wiped down.
This means a one-minute task just turned into a 4-minute task, that must now be completed multiple times a day. From a resourcing perspective this adds up quickly, and operating efficiency must be a priority. Not to mention it is going to get very complicated to measure and manage especially.
Post COVID rules
Getting back to business is going to be complicated; lots to do, lots of moving parts and no technology to help. The fundamental challenge to keep in mind is not that the sanitization requirements have evolved, the real issue is that for most businesses this area has been left unchanged for generations.
Still today most rely on checklists, logbooks and inspections to manage the responsibilities of our front-line workers, which might have been fine before COVID. Post-COVID the rules have changed and so should the approach to managing physical operating compliance on the front lines. COVID like most physical operating requirements is tactical, detailed and specific; broad strokes, the honor system and inspections are not going to cut it.
The digital transformation
COVID has changed the game and made the digital transformation of operating procedures not a ‘nice-to-have’ but a must-have. If we don’t change our ways, not only will we be doomed to continue making the same mistakes, but we will continue to be lost in paper, filing cabinets filled with checklists, never to be seen again. Only with the right data can we significantly improve the operational decisions necessary to accelerate our return to full operating capacity.
At the end of the day, to fully recover, operations must eliminate the fear, uncertainty and doubt in the minds of customers and employees, only then can we really get back to business.
Within days, a rule will take effect that bans from U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and Dahua. The Federal Acquisition Regulation (FAR) rule implements the “blacklist” (or “Part B”) provision of the National Defense Authorization Act (NDAA), which is understood in the security industry as prohibiting dealers and integrators that do business with the federal government from selling Chinese-made video products to any of their customers (even for non-government projects).
The rule, which is officially still interim, states: “On or after August 13, 2020, [federal] agencies are prohibited from entering into a contract, or extending or renewing a contract, with an entity that uses any equipment, system, or service that uses covered telecommunications equipment or services as a substantial or essential component of any system, or as critical technology as part of any system.”
Within days, a rule will take effect that bans U.S. government contracts any companies that “use” video products from Chinese companies Hikvision and DahuaFederal agencies issuing the rule are the Department of Defense (DoD), the General Services Administration (GSA) and the National Aeronautics and Space Administration (NASA). GSA provides centralized procurement for the federal government.
Because the COVID-13 crisis delayed issuance of the rule, the usual 60 days will not be allowed for public comment before the rule is implemented. However, public comments are welcome and will be addressed in subsequent rulemaking.
“Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giants. The rule also specifies that it applies to “certain video surveillance products or telecommunications equipment and services produced or provided by Hytera Communications Corp., Hangzhou Hikvision Digital Technology Company, or Dahua Technology Company (or any subsidiary or affiliate of those entities).” Hytera is a Chinese manufacturer of radio systems. Hikvision and Dahua are major international manufacturers of video surveillance equipment.
Limits and prohibitions
The rule states: “This prohibition applies to the use of … equipment or services, regardless of whether that use is in performance of work under a Federal contract.” In the industry, this clause is taken to mean that integrators that “use” any of the covered equipment are prohibited from selling to the government. “Use” presumably covers an integrator deploying the equipment in their own facilities and/or selling it to other customers. The rule also prohibits “service … related to item maintenance,” which in the case of a security integrator would include providing service contracts on previously installed systems.
Security Industry Association (SIA)
The Security Industry Association (SIA) comments: “Due to applicability [of the rule] to uses by entities with federal contracts even unrelated to their federal work, this broad interpretation is expected to have widespread impact on the contracting community across many sectors, as covered video surveillance equipment is some of the most commonly used in the commercial sector in the United States.”
Security integrators that do business with the federal government have largely anticipated the new rule and already switched their Chinese camera lines for NDAA-compliant competitors. However, as SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns.
Easing compliance burdens
The interim rule adopts a “reasonable inquiry” standard when an offeror (government contractor) represents whether it uses covered equipment. “A reasonable As SIA points out, extensive common uses of the Chinese equipment in various commercial sectors raises additional concerns. inquiry is an inquiry designed to uncover any information in the entity’s possession about the identity of the producer or provider of covered telecommunications equipment or services used by the entity. A reasonable inquiry need not include an internal or third-party audit.” SIA notes that this provision may be aimed at easing the compliance burden by suggesting that contractors only need to inquire based on what information they already possess.
The new rule covers Paragraph (a)(1)(B), which has informally been referred to as the “blacklist” provision of the NDAA, the John S. McCain National Defense Authorization Act for fiscal year 2019. However, the “Chinese ban” provision [Paragraph (a)(1)(A)] already went into effect a year after the law was signed by President Trump (August 13, 2018). “Part A” covers use of Chinese-made products in fulfilling government contracts.
A growing threat
Seeking to justify the new restrictions, the FAR rule states: “Foreign intelligence actors are employing innovative combinations of traditional spying, economic espionage, and supply chain and cyber operations to gain access to critical infrastructure and steal sensitive information and industrial secrets. The exploitation of “Telecommunications equipment” refers to equipment or services provided by Huawei Technology or ZTE Corp, both Chinese telecommunications giantskey supply chains by foreign adversaries represents a complex and growing threat to strategically important U.S. economic sectors and critical infrastructure.”
SIA has urged a delay in implementing the “Part B” provision, stating: “The federal government estimates that it will cost contractors well over $80 billion to fully implement this prohibition on the use of certain Chinese telecommunications and video surveillance equipment, yet endless delays in publishing the rule now mean that federal suppliers have just weeks to understand and comply with the new rule, which raises as many questions as it answers.”
SIA continues: “Federal suppliers across a wide range of industries have increasingly concluded that Part B is unworkable without clarification of the scope and meaning of key terms in the provision, which the rule does not do enough to define. For example, Part B bans agencies from contracting with a provider that “uses” any covered equipment or service. This term is not clearly defined in law or regulation, yet contractors must certify compliance beginning Aug. 13, 2020.”
The Part B rule, which only applies to prime contractors, enables agency heads to grant a one-time waiver on a case-by-case basis, expiring before Aug. 13, 2022.
The global pandemic caused by the novel coronavirus is changing work environments to an unprecedented degree. More employees than ever are being asked to work remotely from home. Along with the new work practices comes a variety of security challenges.
Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.”
Concerns about the coronavirus have increased the business world’s dependence on teleworking. According to Cisco Systems, WebEx meeting traffic connecting Chinese users to global workplaces has increased by a factor of 22 since the outbreak began. Traffic in other countries is up 400% or more, and specialist video conferencing businesses have seen a near doubling in share value (as the rest of the stock market shrinks).
Basic email security has remained unchanged for 30 years
Email is a core element of business communications, yet basic email security has remained unchanged for 30 years. Many smaller businesses are likely to still be using outdated Simple Mail Transfer Protocol (SMTP) when sending and receiving email. “The default state of all email services is unencrypted, unsecure and open to attack, putting crucial information at risk,” says Paul Holland, CEO of secure email systems provider Beyond Encryption.
“With remote working a likely outcome for many of us in the coming weeks, the security and reliability of our electronic communication will be a high priority,” says Holland. The company’s Mailock system allows employees to work from any device at home or in the office without concerns about data compromise or cybersecurity issues.
Acting quickly and effectively
As the virus spreads, businesses and organizations will need to act quickly to establish relevant communication with their employees, partners and customers surrounding key coronavirus messages, says Heinan Landa, CEO and Founder of IT services firm Optimal Networks. Employers should also enact proper security training to make sure everyone is up to speed with what’s happening and can report any suspicious online activity.
Reviewing and updating telework policies to allow people to work from home will also provide flexibility for medical care for employees and their families as needed.
Scammers, phishing, and fraud
An additional factor in the confusing environment created by the coronavirus is growth in phishing emails and creation of domains for fraud. Phishing is an attempt to fraudulently obtain sensitive information such as passwords or credit card information by disguising oneself as a trusted entity. Landa says homebound workers should understand that phishing can come from a text, a phone call, or an email. “Be wary of any form of communication that requires you to click on a link, download an attachment, or provide any kind of personal information,” says Landa.
Homebound workers should understand that phishing can come from a text, a phone call, or an email
Email scammers often try to elicit a sense of fear and urgency in their victims – emotions that are more common in the climate of a global pandemic. Attackers may disseminate malicious links and PDFs that claim to contain information on how to protect oneself from the spread of the disease, says Landa.
Ron Culler, Senior Director of Technology and Solutions at ADT Cybersecurity, offers some cyber and home security tips for remote workers and their employers:
When working from home, workers should treat their home security just as they would if working from the office. This includes arming their home security system and leveraging smart home devices such as outdoor and doorbell cameras and motion detectors. More than 88% of burglaries happen in residential areas.
When possible, it’s best to use work laptops instead of personal equipment, which may not have adequate antivirus software and monitoring systems in place. Workers should adhere to corporate-approved protocols, hardware and software, from firewalls to VPNs.
Keep data on corporate systems and channels, whether it’s over email or in the cloud. The cyber-protections that employees depended on in the office might not carry over to an at-home work environment.
Schedule more video conferences to keep communication flowing in a controlled, private environment.
Avoid public WiFi networks, which are not secure and run the risk of remote eavesdropping and hacking by third parties.
In addition to work-from-home strategies, companies should consider ways to ensure business cyber-resilience and continuity, says Tim Rawlins, Director and Senior Adviser for risk mitigation firm NCC Group. “Given that cyber-resilience always relies on people, process and technology, you really need to consider these three elements,” he says. “And your plan will need to be adaptable as the situation can change very quickly.”
Employees and their employers
Self-isolation and enforced quarantine can impact both office staff and business travelers
Self-isolation and enforced quarantine can impact both office staff and business travelers, and the situation can change rapidly as the virus spreads, says Rawlins.
Employees should be cautious about being overseen or overheard outside of work environments when working on sensitive matters. The physical security of a laptop or other equipment is paramount. “It’s also important to look at how material is going to be backed up if it’s not connected to the office network while working offline,” says Rawlins.
It’s also a good time to test the internal contact plan or “call tree” to ensure messages get through to everyone at the right time, he adds.
HID Global is introducing a new “flagship” line of access control readers as successors to the iCLASS line. The new HID Signo readers will support 15 different credentialing formats and communicate using the latest NFC (near field communication), BLE (Bluetooth Low Energy) and OSDP (Open Supervised Device Protocol) standards. HID Global says the new readers will simplify integration to more secure and mobile credentials.
HID Global has invested in a “future-proof” approach that both accommodates a variety of current market needs and can adapt to embrace new technologies as they come onto the market. The new line incorporates “all the hardware you need,” combining the capabilities of older generations of readers into a single product.
Simplifying the choice of readers
The new reader line seeks to simplify the choice of readers in a time when a variety of trends is complicating the access control market, from cloud systems to mobile access to identity management.
“We are simplifying the way we bring our products to market, and baking it all into our readers,” says Harm Radstaak, HID Global Vice President and Managing Director. “If an installer takes a reader out of the box and mounts it on the wall, it just works.”
We are simplifying the way we bring our products to market"
In designing the product, HID sought feedback from channel partners, installers, consultants and end users on how the new readers would function. In addition, the company sought advice from architects on the design of the product. Aesthetics and industrial design elements were a priority because they ideally reflect the quality and “promise” of how the product will perform.
Cybersecurity is another emphasis. The readers store cryptographic keys and process cryptographic operations on certified EAL6+ secure element hardware, and custom authentication keys can be used for organizations who prefer that level of control. EAL6+ certification is a designation of the Evaluation Assurance Level of an IT product or system (the highest score is EAL7). Signo also includes a velocity checking feature designed to mitigate and thwart brute force attacks.
“The new Signo line is a continuation of the journey we have been on,” says Radstaak. “It is the natural succession of what we have been doing for years, and it underlines our position in the market.” By natively supporting mobile credentials, the new product line reinforces HID’s commitment to mobile systems, which the company first brought to market in 2014. Signo readers also include Enhanced Contactless polling to support mobile credentials in Apple Wallet.
Embracing the OSDP standard, which was created in 2008, also addresses the growing customer need for bi-directional, secure communications. There is built-in support for OSDP Secure Channel as well as legacy Wiegand communication for organizations seeking to transition.
Signo incorporates support for most credential technologies globally, including Seos, credentials with HID’s Secure Identity Object, and a variety of 125kHz legacy technologies such as Indala and Prox.
The flexibility and openness of Signo is a response to the acceleration of new technologies entering the access control market. “If you look at new technologies in general, our market has been slow in adopting them,” says Radstaak. “However, with new entrants in the market, new technologies, new device manufacturers and artificial intelligence (AI), I believe the market is adopting new technologies much faster than before. Users are much savvier.”
Administrators will be able to remotely configure and diagnose readers
Radstaak says he expects market adoption of the new readers will be fast. “Customers have been waiting for this platform,” he says. “This has been a tremendous investment for HID Global, and it underlines our position in the market with its open platform, simplicity and future-proofing. We are prepared for whatever comes next technology-wise.”
With Signo readers, administrators will be able to remotely configure and diagnose readers as well as monitor status through a centrally managed and connected reader ecosystem.
As a member of the FiRA Consortium, HID Global has advocated bringing new technology to market based on the “fine ranging” capabilities of ultra-wideband (UWB) technology, which has applications in detection of the precise location or presence of a connected device or object. It’s the kind of technology that Signo platform’s “future-proofing” approach is geared to accommodate. “As the capability unfolds, we will be there to adapt,” says Radstaak.
ISONAS Inc., a globally renowned IP access control and hardware solutions provider, and part of the Allegion family of brands, has announced that the ISONAS Pure IP access control solution has been installed at a new flagship distribution center for Premier Packaging, an international packaging solutions company, with facilities in 14 locations nationwide.
ISONAS Pure IP access control
In the summer of 2018, Premier Packaging was looking to implement an access control system to help secure their brand-new 320,000-square-foot facility in Louisville, Kentucky. After working closely on a recent project with Orion Networks, a trusted IT infrastructure provider, Premier Packaging relied on their recommendation to implement a cutting-edge access control solution from ISONAS.
With no access control system in place at any of their 14 locations and a combination of office workers, support staff, truck drivers and warehouse employees entering and existing the building daily, a process to control access was a necessity.
Monitoring and tracking visitors to distribution center
A major challenge facing the new distribution center was truck drivers, who came into the facility, were not company employees. With on average 250 people coming in and out of the new facility in Kentucky daily, monitoring and tracking who those people were and if they belonged there was imperative.
They were also looking for the flexibility to manage the locking and unlocking of doors remotely, rather than having to rely on physical keys. “After comparing ISONAS to other access control systems out there, we knew that ISONAS was the right flexible access control solution to meet Premier Packaging’s security needs,” states Brock Jamison, VP and Director of Sales at Orion Networks.
ISONAS RC-04 reader-controllers installed
ISONAS Pure Access software was implemented to give the packaging company remote access capabilities
The initial project consisted of 18 ISONAS RC-04 reader-controllers installed at their new distribution center in Louisville. The RC-04 reader-controllers from ISONAS delivers advanced technical functionality with an easy installation process.
In addition to the ISONAS hardware, the ISONAS Pure Access software was implemented to give the packaging company remote access capabilities.
Pure Access, ISONAS’s industry-renowned software, is a cloud-based access control application that provides users the ability to manage their access control from anywhere at any time, on any device.
“We are extremely happy that our unique access control solution could help Premier Packaging improve safety and security at their new distribution center seamlessly,” states Jonathan Mooney, ISONAS Sales Leader.
ISONAS cloud-based platform
By using both the ISONAS hardware and software solution together, Premier Packaging was able to improve security and keep employees safe. With the ISONAS cloud-based platform, Premier now required all Louisville employees to enter the building using their ID badges to gain access.
If an employee was not in the database and verified, then access would be denied. Future plans include rolling out the ISONAS access control solution to additional buildings and possibly integrating it with other security systems.
With Razberi Monitor™, security professionals can securely and remotely monitor their physical security network during a time of social distancing. IT professionals can quickly review the cyber posture data in case of a cyber-breach. Razberi Monitor™ provides secure, remote visibility into the availability, performance, and cyber posture of servers, storage, cameras, and other networked security devices.
The tool simplifies the monitoring and support of a multi-site enterprise security system, predicts and prevents problems for security professionals while providing a centralized view that benefits both IT and Physical Security departments.
We have listened to the surveillance industry and created our software platform to enhance relationships"
According to Tom Galvin, Chief Product Officer, Razberi Technologies, "We have listened to the surveillance industry and created our software platform to enhance relationships and align Physical Security and IT departments. Razberi Monitor allows security professionals to be proactive by predicting problems."
Aligning network and surveillance departments
Razberi Monitor's software platform, paired with Razberi's video recording and switch appliances, has enabled Tropical Shipping to save on the cost of sending maintenance crews to check on potential issues in their US and Caribbean facilities.
"Our network is highly distributed across the US and Caribbean with up to 125 users viewing camera feeds at one time. Razberi Monitor has helped us increase our camera uptime assurance and align our network and surveillance departments," said Chad Nelson, Director of Security, Facilities and Cargo Compliance, Tropical Shipping. "They now have a clear view of all operations, and it puts me in the driver's seat to be able to provide specific alerts to each port remotely, quickly and more efficiently than sending a tech to troubleshoot."
Teleste Corporation and a renowned international rail vehicle construction company Stadler have agreed on deliveries of Teleste’s passenger information and CCTV systems to Stadler’s new FLIRT trains for Norwegian State Railways. The deliveries will take place in 2019–2021, continuing the cooperation between Teleste and Stadler that was started in 2009.
The deployment will include on-board passenger information (PIS) and CCTV systems for more than 20 trains complemented with video security cameras and video recorders, intercommunication and public address systems as well as TFT and LED information displays. The flexible and future-proof system works seamlessly together with the existing PIS systems, delivered during earlier stages of the cooperation, and includes upgrades such as enhanced cybersecurity.
Rolling stock manufacturers
We have been able to fulfill Stadler’s requirements for high-quality delivery of passenger information"
“Today, transport operators and rolling stock manufacturers need to stay at the cutting edge of on-board technologies to deliver an excellent travel experience for the growing number of public transport users who wish to be informed about their travel at every step of the journey."
"We are pleased that we have been able to fulfill Stadler’s requirements for high-quality delivery of passenger information on their trains to Norway, and we are looking forward to continuing our cooperation,” stated Jörn Grasse, Vice President of Rail Information Solutions at Teleste.
Effective transport system
Teleste’s on-board passenger information system is based on modular software architecture, which makes it possible to use the system technology for different kinds of applications. The system provides a flexible option for the delivery of passenger information for rolling stock manufacturers and operators who wish to build and run an effective transport system that can carry large volumes of passengers smoothly and safely every day.
Customers can visit the company’s website for more information about the solution and its benefits.
In St. Petersburg, a set of Dahua thermal body temperature monitoring system was installed at the entrance of JSC Concern Okeanpribor to help the company with preliminary body temperature screening of employees and visitors during the pandemic. The equipment can quickly and accurately detect people with elevated body temperatures, one of the key symptoms of COVID-19, providing the organization with an additional layer of protection for its employees.
JSC Concern Okeanpribor is a company engaged in the production of sonar systems and shipbuilding stations to meet the needs of the country’s naval force and national economy. It is also listed as one of the ‘backbone enterprises’ of the Russian Federation.
Temperature monitoring solution
To provide its employees with safe working conditions under COVID-19, JSC Concern Okeanpribor hopes to use the Dahua thermal body temperature monitoring system to assist their daily temperature screening work and minimize the chances of infection with the strictest measures possible, while not ignoring privacy and respect.
The Dahua thermal body temperature monitoring solution was installed at the checkpoint of JSC Concern Okeanpribor, consisting of:
Thermal body temperature monitoring camera DH-TPC-BF5421P-T
Calibration equipment (blackbody)
Accessories (2 tripods, 2 adapters for a tripod)
The Dahua thermal body temperature monitoring system is a part of the VideoNet security systems at the facility
The implementation of this solution was completed by Skyros Corporation, a gold partner of Dahua Technology in the Northwest Federal District, together with a well-known Russian software developer for security systems – VideoNet. The Dahua thermal body temperature monitoring system is a part of the VideoNet security systems at the facility.
The Dahua Thermal Body Temperature Monitoring Solution provides a non-invasive way to help organizations check body temperatures of a group of people at the same time, which is faster than hand-held scanners and can be done at a safer distance. That’s why this solution is accepted and adopted by JSC Concern Okeanpribor and other security experts during the pandemic and recovery. Moreover, the most important factor why it was chosen is its accuracy.
Reducing false alarms
With a blackbody, the solution uses a hybrid thermal imaging camera to achieve highly accurate temperature monitoring of ± 0.3 ℃, which is essential in detecting people with abnormal temperatures. At the same time, the camera’s built-in face detection enabled by advanced AI technology can improve the overall measurement accuracy with better positioning of the measuring point on the face.
This approach significantly reduces false alarms caused by a variety of hot objects that may accidentally or intentionally appear in the monitored zone. It can also detect the temperatures of people wearing medical masks.
This solution also includes a special version of Dahua DSS software, which can handle temperature alarms
This solution also includes a special version of Dahua DSS software, which can handle temperature alarms. If the set temperature threshold is exceeded, this could be an indication that the system has detected a person with fever and should be checked by a medical professional. In this case, the camera will send an alarm message to this software, allowing the operator to take appropriate measures.
Conduct preliminary detection
Featuring long distance, non-contact and fast detection speed, the Dahua Thermal Body Temperature Monitoring Solution allows JSC Concern Okeanpribor to conduct preliminary detection of people entering their building who are exhibiting fever, thus effectively limiting cross-infection caused by physical contact, saving manpower and material resources, enabling efficient passage of people at the entrance, as well as enhancing protection for the operation of the whole company.
The solution has been widely used in China and many parts of the world during the pandemic and corresponding recovery. Its effectiveness for mass scanning especially in public places such as shopping centers, office buildings, airports, train stations, subway, as well as in hospitals and educational institutions has been proven by its applications all over the world. In one transportation hub for instance, the system detected more than 100 passengers with abnormal temperature. After conducting medical tests, 60 of them were confirmed positive for COVID-19.
Protecting the oil and gas market is key to a thriving economy. The list of security challenges for oil and gas requires the best technology solutions our industry has to offer, from physical barriers to video systems to cybersecurity. We asked this week’s Expert Panel Roundtable: What are the security challenges of the oil and gas market?
We are all more aware than ever of the need for cybersecurity. The Internet of Things is a scary place when you think about all the potential for various cyber-attacks that can disrupt system operation and negatively impact a customer’s business. Because most physical security systems today are IP-based, the two formerly separate disciplines are more intertwined than ever. We asked this week’s Expert Panel Roundtable: How can cybersecurity challenges impact the physical security of a company (and vice versa)?
Cloud systems are among the fastest-growing segments of the physical security industry. The fortunes of integrators can improve when they embrace a recurring monthly revenue (RMR) model, and cloud systems are expanding the services and features manufacturers can provide, from remote diagnostics to simplified system design. But for all the success of cloud systems, there remains confusion in the market about the exact definition of “cloud.” Or does there? We asked this week’s Expert Panel Roundtable: What is “the cloud?” Is there agreement in the market about what the term means?