The M73, MOBOTIX’s new high-performance camera based on Artificial Intelligence (AI), is the latest in MOBOTIX’s lineup to have received the SySS IT security certificate. After completing multiple tests, SySS GmbH now attests that the entire MOBOTIX IoT camera series has a particularly high level of cyber security. In addition to the M73, the M16, representing the entire Mx6 series, also has earned the SySS certificate. This is a continuation of the MOBOTIX Cactus Concept which stand...
HID Global, a globally renowned company in trusted identity solutions, has announced the launch of its smallest embedded reader module, the OMNIKEY 5127CK Reader Core. The latest addition to the proven OMNIKEY family makes it possible for systems integrators, Original Equipment Manufacturers (OEMs) and other partners to embed RFID into devices with limited physical space to accurately authenticate people, reduce fraud and protect sensitive data in a contactless way. OMNIKEY 5127CK Reader Core...
Spectra Logic, a provider of data storage and data management solutions, announces the publication of its ‘Digital Data Storage Outlook 2020’. The fifth edition of the report delves into the management, access, use and preservation of the world’s ever-expanding volumes of data, capturing the impact of the Covid-19 pandemic on trends and technology during this unprecedented time in history. Exhibiting technology improvements The report outlines future strategies, technologies...
Patriot One Technologies Inc., is pleased to announce a development partnership with ecoMine Technologies Corporation (ecoMine) to advance ecoMine’s innovative, low-cost, on-the-spot pathogen screening technology, ecoScreen. ecoScreen screening technology ecoMine’s technology platform, ecoScreen has significant potential in this current pandemic, (especially when it comes to enabling the safe return to work across multiples sectors of the economy) as well as a broad range of other...
The French authorities have renewed the maintenance contract of the French Coastal Surveillance System, SPATIONAV, building on an over 20 yearlong successful collaboration between the French Navy and Airbus for safer oceans. Since 2002, Airbus develops, deploys and maintains the SPATIONAV system, under the supervision of the DGA (French General Armament Directorate) for the program direction and the SSF (Service de Soutien de la Flotte) for the sustainment, to support the French authorities gath...
Research carried out by a renowned Cyber Security company, Intruder has revealed that on average, an exposed Mongo database is breached within 13 hours of being connected to the internet. The fastest breach recorded was carried out 9 minutes after the database was set up. MongoDB database program MongoDB is a cross-platform document-oriented database program that consistently ranks in the top 5 most-used databases worldwide. It is used by a wide range of organizations all over the globe to sto...
Exabeam, the Smarter SIEM company, and Armis, a provider of agentless enterprise IoT security, announced a partnership that will enable IT cybersecurity teams to identify unmanaged and IoT devices and to monitor their behavior for malicious activity from a single platform. Attackers increasingly target unmanaged, connected devices to gain access to an organization’s corporate network. The integration of Exabeam and Armis solutions classifies managed, unmanaged, and IoT devices connecting to the corporate network and allows security analysts to detect lateral movement and other advanced threats. Unmanaged and IoT device security alerts are also enriched with contextual data and prioritized by risk score to focus analyst efforts on the riskiest incidents and to increase their efficiency and effectiveness. behavioral analytics solution Exabeam recognises the importance of expanding SIEM to unmanaged and IoT devices" The partnership extends the visibility of the Exabeam Security Management Platform (SMP) into IoT devices to identify anomalies and enable security teams to more efficiently detect, prioritize and investigate threats across a broader range of devices. Specifically, it enables Exabeam Entity Analytics, a behavioral analytics solution that leverages both machine learning and behavioral modeling, to identify complex threats on devices, as well as extend detection and investigation of advanced threats to IoT devices. The integrated solution imports alerts and data about IoT devices from Armis into the Exabeam SMP to extend visibility beyond managed IT assets. Prioritize security alerts Exabeam then places Armis security alerts in the context of Exabeam Smart TimelinesTM to enhance analyst productivity by automating tedious investigations with machine-built timelines and ensuring sophisticated attacks involving lateral movement don’t go undetected. By identifying both managed and unmanaged assets connected to the network in this way, users can prioritize security alerts and initiate rapid investigation. “Exabeam recognizes the importance of expanding SIEM to unmanaged and IoT devices, and integrating with a leading agentless device IoT security vendor will provide significant value for organizations that manage infrastructure, industrial facilities, manufacturing and smart cities,” commented Trevor Daughney, VP, Product Marketing, Exabeam. effective security strategies “By partnering with Armis, we help security teams improve their operational efficiency by automating the detection and investigation of attacks using IoT devices.” Armis and Exabeam let organizations safely adopt new devices to drive their business with stronger security" “Organizations are increasingly looking for security solutions that can integrate cybersecurity defense across every kind of connected device in their organization,” said Christopher Dobrec, VP of Product Marketing at Armis. “As the adoption of unmanaged and IoT devices continues to accelerate, it’s vital that the effectiveness of security strategies extends to secure those devices. Together, Armis and Exabeam let organizations safely adopt new devices to drive their business with stronger security and better risk management.” complete asset inventory “Security attacks aren’t limited to devices like laptops and servers. For organizations like ours, it’s imperative for our security team to have visibility into our complete asset inventory, including IoT devices from point of sale terminals to industrial controllers in our manufacturing operations,” said Exabeam customer Rhett Nieto, IT security chief, FEMSA. “In some organizations, IT is responsible only for the desktop, laptops and server rooms, while business units take care of CPS, such as industrial controls, operational technology, industrial IoT (IIoT), public cloud and line of business (LOB)-centric SaaS applications,” commented John Watts, a Gartner analyst, in the June 2020 Gartner report: How to Respond to the 2020 Threat Landscape. configuration management database The report further mentions, “An IT-focused configuration management database (CMDB) only discovers and tracks IT assets, whereas a security team needs a comprehensive asset inventory. Without this view, threats are missed, and vulnerable assets are not addressed. This requires a partnership between IT and the LOBs to ensure that an adequate inventory of all assets is available and current.”
Artificial Intelligence Technology Solutions, Inc., announces that its wholly owned subsidiary Robotic Assistance Devices (RAD) enhances its autonomous security and property management devices with a new advanced mask detection feature. This feature supports building owners and property managers with an autonomous tool to identify face mask usage, create automatic alerts, and generate ongoing face compliance scores. This enhancement is integrated into RAD’s Health Screening system and can be used to automatically prevent people who are not wearing masks from entering buildings. Manned security monitors This reduces the risk of confrontation and escalation that has happened with manned security monitors and enforces mask usage. Furthermore, analytic features empower executives to monitor mask compliance at retail establishments and other workplaces, and compare compliance rates across multiple sites so management teams can address sites with low compliance first. “Research shows that wearing masks is extremely important in slowing the transmission of communicable diseases such as Covid-19,” said Steve Reinharz, Founder and CEO of RAD. “We also know that other screening methods, such as temperature checks, can be fooled if an individual takes fever-reducing medication. You can’t fool the camera and you can’t argue with it. Autonomous systems enforce mask policies consistently, drive accountability, and are a vital part of RAD’s complete health screening solution.” Autonomous monitoring systems The mask detection feature can be activated on all RAD devices based on client requests Installing RAD’s autonomous monitoring systems is as easy as hanging a mirror or moving a coffee table, especially when compared to the lengthy and laborious process of implementing a comprehensive CCTV system. They can be integrated into access control systems, denying entry to people who fail screenings even if they have a building pass. When a person without a mask is detected, the system can generate, depending on customer preferences, audible and visible alerts to remind people to mask up. It also feeds alerts and a cloud-based data storage system so that security executives can analyze data for trends or quickly locate video of important incidents. The mask detection feature can be activated on all RAD devices based on client requests. Mask detection system Currently, retailers and facility managers are evaluating the mask detection system for several locations. The system would not only be used to enforce mask policies when employees and customers enter the store, but can also detect if someone removes their mask while in the store. RAD has a sales pipeline of over 35 Fortune 500 companies and numerous other potential clients. RAD expects to continue to attract new business as it converts its existing sales pipeline into paying customers. Each new Fortune 500 Customer has the potential of making numerous reorders over time.
The Radio Equipment Directive which is applicable for most wireless equipment also in the fire and security industry looks to be prepared for an update where cybersecurity requirements will become part of the directive and with that part of the CE-marking. While Euralarm supports the need for increased cybersecurity, the fire and security industry will preferably support a horizontal cybersecurity regulation. Nevertheless, if embedded in the RED, Euralarm wants to ensure that the technical aspects addressing cybersecurity are relevant for wireless fire safety and security equipment and can work for manufacturers and service providers. Horizontal Cyber regulation With incidents around privacy reported after updates from wireless equipment with official and unofficial software, the commission is urgently looking to enforce increased cybersecurity to protect consumers and to ensure that radio equipment manufacturers meet a level of cybersecurity before they release a product to the market. These developments will impact companies that manufacture or market wireless Fire and Security equipment Because Horizontal Cyber regulation is still under construction and can take some time before being completed, it looks like the EC plans to do this through an update of the RED. These developments will impact companies that manufacture or market wireless Fire and Security equipment. Industrial Internet of Things Following the Internet of Things (IoT) the industrial version of it, Industrial Internet of Things (IIoT) now also enters a phase of wider adaption and deployment around numerous industries. It is predicted that the worldwide IoT spending will surpass $ 1 trillion in 2022 (source: IDC). More and more products and industrial assets with electronics, software, sensors, and network connectivity enable us to collect and exchange data. By connecting numerous devices and pieces of equipment through the Internet, (I)IoT can help businesses operate more efficiently, make more informed decisions and unlock new revenue sources. However, the devices themselves also introduce serious risks for business and society with every device being a potential source for cyber criminals to unauthorized enter home, business or industrial networks. Radio Equipment Directive Radio Equipment Directive is being considered for inclusion of cyber security requirements This threat is caused by the radio communication function ‘on board’ these devices which enables them to communicate via wireless networks and by the possibility to wireless update software / firmware on these devices. Now that products are getting more and more connected, the European Commission is looking how to create a legislative framework to make these products better resistant against cyber attacks. This could be done by including cybersecurity requirements into directives and regulations of the New Legislative Framework (NLF). This framework sets mandatory product safety requirements that are necessary to put products on the EU market (CE marking). The Radio Equipment Directive (RED) is the first Directive that is being considered for inclusion of cybersecurity requirements. Low voltage equipment The idea is to include the cyber security requirements through a delegated act on Internet connected and wearable radio equipment. Such an act is a legally binding act that enables the Commission to supplement or amend non‑essential parts of EU legislative acts, for example, to define detailed measures. Euralarm supports an increased level of cybersecurity and a better protection for the consumers. And they are not alone. With the Cybersecurity Act in place the European Union Agency for Cybersecurity ENISA is now working on new certification schemes to cover a wider range of products, processes and services on all aspects of cybersecurity. Putting aside the EU Cybersecurity Act and pursuing the “RED path” would bring a clear risk of overlaps and inconsistencies across European legislations, not only for radio equipment, but also for instance for low voltage equipment (LVD), machines (MD) and medical devices (MDR). Wearable radio-equipment Meanwhile the European Commission initiated a public consultation on two essential requirements It could result in legal uncertainty and significant impact in case of concurrent mandatory requirements and certification schemes. This would threaten European companies’ ability to compete across the Digital Single Market as well as globally, forcing them to misallocate scarce resources. Fearing a future patchwork of different legislations, the industry suggested a horizontal legislation for products. Meanwhile the European Commission initiated a public consultation on two essential requirements. It concerns the safeguards to ensure that the personal data and privacy of the user and of the subscriber are protected as well as certain features ensuring protection from fraud. This consultation laid down several proposals for the application of those 2 requirements to internet-connected radio-equipment and wearable radio-equipment. Impact assessment study Based on the results of this consultation, the Commission mandated a consultancy firm to conduct an impact assessment study. In his report, the contractor highlights that delegated acts are already mentioned in the RED and that they therefore should be preferred above legislation on cybersecurity which might take more time to develop. It is therefore unlikely that a horizontal cybersecurity related legislation on products can still be developed in a short-term. The report adds that such a horizontal legislation could be considered at mid-term. Euralarm is presently supporting a proposal in this direction. The consultants also recommended that the European Standardisation Organizations should be mandated to pertain to the delegated acts. Both CEN-CENELEC and ETSI are now preparing themselves to get ready for this. Cybersecurity requirements Installing new software or firmware could have an impact on the compliance of the equipment Euralarm recommends companies involved in the production of security equipment to stay informed on the development to ensure that the relevant technical aspects for fire safety and security equipment are embedded into the cybersecurity requirements. Another RED related development that is taking place concerns the Reconfigurable Radio Systems, i.e. radio equipment that can be reconfigured by software (including firmware). Under some conditions, installing new software or firmware could have an impact on the compliance of the equipment. Reconfigurable Radio Systems The European Commission is therefore currently investigating this to ensure that the RED adequately addresses this issue and that reconfigurable radio systems for Europe's single market stay compliant with the Radio Equipment Directive after new or modified software is installed. The investigation is focused on the essential requirements of the RED itself: health and safety, EMC, efficient use of radio spectrum and requirements empowered by adopted delegated acts. Software implemented functions that have no influence on the compliance to these requirements are not technically impacted but the need for demonstration of no-impact will appear. That means for instance that manufacturers of Wi-Fi connected smoke alarm devices would have to demonstrate that software updates do not impact RED compliance. Euralarm has therefore advised manufacturers of wireless equipment falling under the RED to follow these developments. Euralarm will make sure that additional legislation that could result from the current investigation will be feasible for manufacturers.
SALTO Systems has announced the release of its SALTO contactless smart card NCoders. The SALTO NCoder is for next-generation access control systems and they integrate the encoding capabilities of a powerful updated encoder with a built-in desktop reader function. SALTO NCoder The SALTO NCoder configures permissions and user access plans for user credentials. It is compatible with a wide range of RFID cards and mobile keys and can be used in most commercial markets including hospitality, enabling users to control management and user rights within their own building access system. Security meets design with the SALTO BLUEnet generation of smart locking access control products and the NCoder is no exception. Featuring a sleek design, the SALTO NCoder extends SALTO SPACE data-on-card best in class performance while adding innovative features to keep buildings secure, flexible, and smart. It integrates DTLS v1.2 security technology to protect communications. Supports multiple credential technologies SALTO NCoder’s SPACE standards-based design puts system operators in complete control SALTO NCoder’s SPACE standards-based design puts system operators in complete control, working with any compatible cards and smart-locking platform from SALTO Systems. Focused on innovative functionality and secure communication, the SALTO NCoder supports multiple credential technologies (MIFARE and iCLASS Seos) and digital key delivery establishing security between devices. ProAccess SPACE system The ProAccess SPACE system allows operators to grant users access permission for multiple doors and zones, configure date and time for access, and even schedule timed access. The SALTO NCoder lets platform operators manage all access control needs with one smart and secure device. Quickly and efficiently manage system operator user key creation, visitor management, and PPD (SALTO Portable Programming Device) data storage from a single smart and contactless secure management device. SALTO NCoder features: Compatibility: Runs on SALTO ProAccess SPACE and currently programs MIFARE DESFire EV1 and EV2 cards and tags and iCLASS Seos versions. Communications protected by standard cryptography (DTLSv1.2 - AES128) Built-in Ethernet and USB interfaces DHCP IP addressing Standards-compliant reader/encoder with SAM data is not stored in the device to ensure secure key management technology system
SALTO Systems, a globally renowned manufacturer of electronic access control solutions, has released the SALTO Neo Cylinder, a new electronic cylinder that offers more features and better functionality than any other cylinder on the market. The compact SALTO Neo Cylinder is designed for doors where fitting an electronic escutcheon is not possible or required and can be installed on standard doors, server racks, gates, cabinets, electric switches, sliding doors and more. It’s available in an extensive range of models to suit almost any kind of door – from Europe to Asia to the Americas. SALTO Neo Cylinder The SALTO Neo Cylinder provides the most efficient and convenient way of securing buildings and assets. The re-engineered clutch system design makes efficient use of energy, dropping consumption to impressively low levels, resulting in 100,000/130,000 cycles with just one set of batteries. System standby power consumption is reduced, which extends the electronic cylinder’s battery life. The IP66-rated SALTO Neo Cylinder is weather-resistant, making it especially suitable for the outdoors in even the harshest of environments. Encapsulated safely inside the tough Neo Cylinder exterior is the absolute latest in electronic lock technology. Certified to high security standards The SALTO Neo Cylinder is designed to provide users the finest in safety and security Certified to the highest security standards, and pursuing ever-higher quality and reliability, the SALTO Neo Cylinder is designed to provide users the finest in safety and security. The SALTO Neo Cylinder offers value far beyond security. However, upgrading a mechanical door to electronic access control enhances security, but the SALTO Neo Cylinder provides greater control over the door by offering end-users access to audit trails, reports, alerts and so much more. Utilizes smart keys and mobile technology Using smart keys and mobile technology with the SALTO Neo Cylinder allows users to manage access rights quickly and keyless, which is more secure than using mechanical keys. There is also additional value in the flexibility, convenience and operational efficiency provided by the Neo Cylinder’s wireless technology. SALTO continues to release impressive technological innovations where connectivity between the door, user and system operations aids the growth of overall access control for any building application or access type. Keyless access control solution “SALTO’s new Neo Cylinder technology allows us to introduce customers, systems operators and installers to new experiences and to connect keyless access where we couldn’t have justified wiring a door before,” said Marc Handels of SALTO Systems. Marc adds, “We’ve seen for years that electronic locking technology is an ecosystem that has continuous change and growth and we’ve had to consider how to best anticipate customers’ needs and recommend smart locking solutions that are easy to adopt and install.” SALTO KS cloud-based access management platform SALTO Neo Cylinder has more functionality and performance capability than any other cylinder on the market" He further said, “The SALTO Neo Cylinder has more functionality and performance capability than any other cylinder on the market, allowing businesses to connect to their on-premises network via advanced SVN technology or the cloud with our SALTO KS cloud-based access management platform.” Because the SALTO Neo Cylinder is compatible with SALTO SVN, SALTO BLUEnet Wireless and the SALTO KS – Keys as a Service – cloud-based technology, it can be switched to any of SALTO’s technology platforms at any time without changing the hardware. This allows businesses to decide which technology fits better with their security, operations and IT needs. Featuring SALTO SVN-Flex and JustIN Mobile technology The SALTO Neo Cylinder adds SALTO SVN-Flex technology, which increases the potential, efficiency and reliability of the SALTO SVN, yielding better security, control and convenience for users and sites. SALTO JustIN Mobile technology is onboard every cylinder. This gives users and system administrators the capability to send or receive a mobile key to open any door or gate with an installed SALTO Neo Cylinder with their iOS or Android Bluetooth or NFC-enabled smartphone. SPACE data-on-card on-premise management software This adds incredible convenience and efficiency for end-users in the field which is where a SALTO Neo Cylinder would most likely be used. JustIN mobile app capability also complements usage of SALTO’s other management platforms, such as SALTO SPACE data-on-card on-premise management software or the SALTO KS cloud solution. For any building, function or model, SALTO offers the perfect electronic cylinder to fit any door. Available in the beginning of July of 2020, the SALTO Neo cylinder delivers an easy-to-use electronic locking platform that integrates all physical security needs through smart, wireless and battery-operated smart cylinders, providing all the latest user access information for virtually all of the doors in a facility.
Today’s market wants access control systems that are always available, scalable, and integrated with other security solutions like video and intrusion systems to ensure the highest security and safety levels. At the same time, these systems must be easy to configure and use. With the introduction of the Access Management System 3.0, Bosch meets all of these requirements. Always available for security Access Management System 3.0 is designed to be available at all times. Its resilient design includes a Master Access Controller (MAC) as an additional layer of defense between the server and the access controllers. If the server fails, the MAC takes over, ensuring continuous communication across controllers while sharing necessary information from the card readers. In addition, access control functionalities that involve multiple access readers, such as anti-passback and guard tour can continue to perform. The anti-passback functionality is an important feature to ensure a high level of security. It prevents a cardholder from passing a card to another person enabling an unauthorized entry. Guard tour is a safety functionality offered to security guards, which uses access readers as checkpoints along a defined route at specified times. Threat level management The different threat levels can make all doors open, or all doors blocked, or a mix of open and blocked Any deviation of sequence or timing causes an alarm in the Access Management System. Immediate notifications to colleagues or first responders increase the safety of security guards. In the rare event that both the Access Management System 3.0 server and the MAC fail, cardholders can still enter and leave areas with their badges because the database is stored directly on the Access Management Controllers (AMCs). Thanks to this offline capability, it is possible to save millions of events even during downtimes, ensuring the continuous availability of the system. Access Management System 3.0 offers up to 15 configurable threat levels such as lockdown, controlled lockdown, or evacuation, which means safety measures can be initiated quickly in critical situations such as fire or security breach. The threat level state is activated by one of three triggers: operator workstation, external contact such as an emergency button, or specially configured “emergency” cards that are presented to a reader. The different threat levels can make all doors open, or all doors blocked, or a mix of open and blocked. Scalable and future-proof Users can start small and add extra capacity whenever necessary. The Access Management System 3.0 software can be expanded up to 10,000 doors and 200,000 cardholders. The software is offered in three pre-configured software bundles from medium to large organizations: Lite (max. 144 doors), Plus (max. 512 doors), and Professional (max. 10,000 doors). All bundles support up to 200,000 cardholders. No hardware needs replacing when expanding; users only require software upgrades and possibly additional controllers, readers, and cards. So, increasing the system is also cost-efficient. Customers who work with the software solution Access Professional Edition (APE) from Bosch can migrate to the Access Management System 3.0 by using the new importer/exporter tool. Together with regular updates to data security enhancements, these features make the system a future-proof investment - suitable for office and government buildings, retail environments, educational institutions, and more. Easy configuration and operation Access Management System 3.0 also has trusted digital certificates for mutual authentication Configuration is easy: Users can import existing floor maps into the system, and drag and drop icons on the map to represent controllers, doors, and building objects. User onboarding is straightforward. For example, enrollment and assignment of access profiles are all implemented in one dialog manager. Operation is smooth: The graphical user interface (GUI) is simple and easy to understand. The dark color scheme of the GUI reduces eye-strain and fatigue, so operators stay fresh and alert. Access Management System 3.0 offers protection against cybercrime and loss of personal data. The database, as well as the communication between the server and access controllers, is encrypted at all stages through the support of the secure Open Supervised Device Protocol (OSDP) v2 protocol. Access Management System 3.0 also has trusted digital certificates for mutual authentication between the server and client to prevent tampering by unauthorized clients and uses secure design principles such as “secure-by-default” and “principle of least privilege.” Integration with third-party solutions Access Management System 3.0 is ideal as a standalone solution to meet today’s access control needs. It integrates seamlessly with Bosch B Series and G Series intrusion control panels as well as with video systems such as Bosch Video Management System or third-party systems like Milestone’s XProtect for increased security and enhanced situational awareness. The integrated command and control functionality enables operators to arm and disarm intrusion panels directly Integration with Bosch Video Management System (version 10.1 and higher) offers manual video verification to increase the security level at doors. The operator can visually verify whether the person at the door matches the registered person in the database. If so, the operator allows the person to enter. Bosch Video Management System integration also enables searching for cardholder events and events at doors. With the searching functionality, it is possible to quickly check who has entered an area and at what time. Moreover, access commands and events can be handled in Bosch Video Management System, making the operation of the integrated system most efficient. Intrusion control panels integration B and G Series intrusion control panels integrate seamlessly into Access Management System 3.0 for efficient authorization management and a central overview of all access and intrusion events. With central user management, operators can add, delete, and modify intrusion-related user passcodes and authorizations directly into the system, as well as organize users by groups or functionalities. The integrated command and control functionality enables operators to arm and disarm intrusion panels directly in the Access Management System 3.0 user interface as well as to see states of the areas (e.g. “armed”, “ready to arm”) and detectors (e.g. “motion detected”) on the system map. This provides operators with a central overview of all access and intrusion states, allowing them to easily and remotely handle intrusion events. Bosch Access Management System 3.0 is available for sale and makes access management simple, scalable, and always available.
COVID-19 and the resultant lockdown saw an unprecedented demand for cloud-enabled technologies across Europe. Such services enabled people to stay connected and allowed some businesses to relocate personnel and continue to operate successfully. With enterprise-focused video conferencing mobile app downloads showing a weekly 90% increase in comparison to pre-COVID-19 figures, it’s clear that cloud services have proven invaluable in these challenging times. Now, as the benefits to business of cloud technology become apparent, and the grip of COVID-19 begins to loosen, senior decision makers must consider the learnings from the past few months and look to apply them to boost productivity, streamline costs or become more agile in the long term. Digital transformation presents some enticing advantages for those companies that have been slow to adapt. The physical security industry, traditionally video surveillance cameras (CCTV) and access control, will have witnessed how cloud infrastructure is not only cost effective and safe, but is a force multiplier for connecting platforms, services and people with potent business benefits. The future is VSaaS and ACaaS In today’s modern, connected world, dated technologies are giving way to their cloud-enabled successors, video surveillance as-a-service (VSaaS) and access control as-a-service (ACaaS). In this context, cameras and readers are added to a network as IoT devices that bring security systems up to date and represent a vital component in any modern, cyber-secure digital strategy. Frictionless access control has meant touch free access to buildings But better security is just one benefit of a much greater system that can bring real value. Built in analytics, for example, that utilize the data from network video cameras and smart access control devices, produce valuable business insights that help to inform and automate decision making. In the recent pandemic, frictionless access control has meant touch free access to buildings; while occupancy tools have helped retailers adhere to strict government guidelines on social distancing. And as more security equipment becomes connected to the wider IT network, the advantages have not been lost on the IT industry that is expressing more than a passing interest in the adoption and management of such systems. Morphean recently conducted a survey of 1000 IT decision makers across the UK and Europe, with the purpose of providing clarity around their security purchasing intent in the 2020s. Findings revealed that as many as 84% of IT managers are currently using or considering VSaaS or ACaaS systems, pointing to an appreciation of the convergence of physical security and IT security, and a willingness to embrace systems when integrated with IT in the cloud. An adaptable business model with recurring revenues Of course, it is not just the IT industry that is changing mindsets towards hosted physical security. As a result of COVID-19, end customers are demanding it too and found it easier to scale at speed when business circumstances changed. Rather than being tied to fixed IT infrastructure on premises, a hosted solution offered greater dexterity as operational challenges around the pandemic arose. Businesses were able to customize and scale quickly to meet ongoing need without the need for large upfront capital investment, instead, paying for the convenience as-a-service out of operational expenditure as a monthly cost. This is the proven business model of cloud, yet the security industry has been slow to adopt it. One key challenge is the way in which the prevalent business models in the sector operate. VSaaS is still alien to installers and integrators used to selling hardware on narrow margins, reliant on existing financial arrangements with distributors to fund new equipment. Transitioning to sales cycles based on monthly licences rather than up-front purchases won’t be easy, but the security channel must learn how if it is to remain competitive and drive new business opportunities. This recurring revenue model will be interesting for the physical security industry who will have witnessed uncertainty and, in some cases, a downturn in revenues as decisions around capital expenditure were put on hold during the crisis. Instead, convenient and recurring monthly payments will have put the installer on a firmer footing and guaranteed ongoing vendor support backed by the latest software updates and firmware upgrades to ensure delivery of a high quality service that’s always up to date and online. What is driving your digital strategy? VSaaS and ACaaS provide a flexible and fluid security and business solution Cloud is here to stay. Its resilience and ability to connect the world during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. VSaaS and ACaaS provide a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. CEOs and CIOs within the physical security reseller industry must learn the lessons and apply the learnings to drive their businesses forward in the ‘new normal’ where hosted security solutions must surely play a major part to expand their offering to a wiser customer base. Cloud-enabled physical security solutions represent an investment into improving security and operations, and a chance to forge new business relationships to face the challenges of an ever changing world.
The coronavirus (COVID-19) pandemic marks the biggest global disruption since World War II. While the ‘new normal’ after the crisis is still taking shape, consumers are apprehensive about the future. According to a recent survey, 60% of shoppers are afraid of going grocery shopping, with 73% making fewer trips to physical stores. Returning to the workplace is also causing unease, as 66% of employees report feeling uncomfortable about returning to work after COVID-19. Businesses and employers are doing their best to alleviate these fears and create safe environments in and around their buildings. This also comes at tremendous costs for new safety measures and technologies – including updates to sanitation protocols and interior architecture – that protect against COVID-19. Costs in the billions that most businesses will face alone, without support from insurance and amidst larger, macroeconomic challenges. Saving costs and increasing security But what if building operators, retail shop owners, and other stakeholders could save costs by leveraging new functionality from their existing security infrastructure? More specifically, expanding the use of current-generation security cameras – equipped with AI-driven image analysis capabilities – beyond the realm of security and into meeting new health regulations. This is exactly where video analytics algorithms come into play. And in the next step, a new evolutionary approach towards open security camera platforms promises new opportunities. Security cameras have evolved from mere image capturing devices into complex data sensors Over the past decade, security cameras have evolved from mere image capturing devices into complex data sensors. They provide valuable data that can be analyzed and used in beneficial ways that are becoming the norm. Since 2016, Bosch has offered built-in Video Analytics as standard on all its IP cameras. On one hand, this enables automated detection of security threats more reliably than human operators. And on the other hand, video analytics collect rich metadata to help businesses improve safety, increase efficiency, reduce costs, and create new value beyond security. Expanding Camera Functionality Beyond Security Today, we have ‘smart’ security cameras with built-in video analytics to automatically warn operators of intruders, suspicious objects and dangerous behaviors. The rich metadata from several cameras on the same network can also be consolidated by making use of an intelligent software solution. It offers so-called pre-defined widgets to provide business intelligence by measuring area fill levels, counting building occupancy and detecting the formation of crowds. In combination with live video stream data, these insights enable heightened situational awareness to security operators. What’s more, operators are free to set their own parameters – like maximum number of occupants in a space and ‘off limit’ areas – to suit their needs. These user-centric widgets also come in handy in dealing with the coronavirus pandemic. Specific widgets can trigger an alarm, public announcement or trigger a 'traffic light' when the maximum number of people in a space is exceeded. Building operators can also use available intelligence such as foot traffic ‘heat maps’ to identify problem areas that tend to become congested and place hand sanitizer stations at heavily frequented hotspots. At the same time, the option to perform remote maintenance on these systems limits the exposure of technicians in the field during the pandemic. Again, the underlying camera hardware and software already exist. Cameras will be able to ‘learn’ future functionality to curb the spread of the coronavirus Looking ahead, cameras with video analytic and neural network-based analytic capabilities will be able to ‘learn’ future functionality to curb the spread of the coronavirus. For instance, cameras could monitor distances between individuals and trigger voice announcements when social distancing guidelines are violated. Facial recognition software can be trained to monitor personal protective equipment (PPE) compliance and sound alerts for persons entering buildings without masks. The technical requirements are already in place. The task at hand is to deliver these new functionalities to cameras at scale, which is where open camera platforms hold the key. Why Open Camera Operating Systems? When it comes to innovating future camera applications that extend beyond security, no hardware manufacturer should go at it alone. Instead, an open platform approach provides the environment for third-party developers to innovate and market new functions. In essence, an open platform principle allows customers and users to change the behavior of devices by adding software afterwards. This software can either be found in an app store or can be self-developed. For a precedent, we can look at the mobile phone industry. This is where software ecosystems like Android and Apple’s iOS have become the norm. They have also become major marketplaces, with the Apple App Store generating $519 billion in billings on 2019, as users use their phones for far more than just making phone calls. In the same way, intelligent cameras will be used far beyond classic video applications in the future. To get there, adopting an open platform principle is essential for a genuine transformation on an industry level. But establishing an open platform principle in the fragmented video security industry demands a cooperative approach. In 2018 Bosch started a fully owned start-up company, Security & Safety Things, and became one of five founding members of OSSA (Open Security & Safety Alliance). With more than 40 members, the Alliance has collectively created the first Technology Stack for “open” video security devices. This includes the OSSA Application Interface Specification and Compliant Device Definition Specification. An open camera platform for innovating future functionality Based on OSSA’s common APIs, collective approach on data security and core system requirements for video security cameras, the first camera manufacturers were able to build video security cameras that adopt an open platform principle. Further fueling innovation, OSSA focused on driving the creation of one centralized marketplace to unite demand and supply in the market. Camera devices that are built in accordance with OSSA’s Technology Stack, so-called “Driven by OSSA” devices, can benefit from this marketplace which consists of three pillars: a development environment, an application store, and a device management portal. Security & Safety Things has advanced OSSA’s open camera platform concept, built this marketplace for the security and safety industry and has developed the open OS that powers the first “Driven by OSSA” devices. Making it quick and simple to customize security solutions by installing and executing multiple apps This year, Bosch, as one of the first camera manufacturers, introduces the new INTEOX generation of open platform cameras. To innovate a future beyond security functionality, INTEOX combines built-in Intelligent Video Analytics from Bosch, an open Operating System (OS), and the ability to securely add software apps as needed. Thanks to the fully open principle, system integrators are free to add apps available in the application store, making it quick and simple to customize security solutions by installing and executing multiple apps on the INTEOX platform. In turn, app developers can now focus on leveraging the intelligence and valuable data collected by analytics-equipped cameras for their own software developments to introduce new exciting possibilities of applying cameras. These possibilities are needed as smart buildings and IoT-connected technology platforms continue to evolve. And they will provide new answers to dealing with COVID-19. The aforementioned detection of face masks and PPE via facial detection algorithms is just one of manifold scenarios in which new apps could provide valuable functionality. Contact tracing is another field where a combination of access control and video analytics with rich metadata can make all the difference. Overall, open camera platforms open a future where new, complex functionality that can save lives, ensure business continuity and open new business opportunities will arrive via something as simple as a software update. And this is just the beginning.
You are not alone: operators everywhere are asking themselves what are they going to do? How are they going to get back to business, and fast? How are they going to cost-effectively operate with all the new safety requirements that have arisen as a result of COVID? How are they going to ensure it all gets done for the safety of customers and staff? How are they going to protect their brand from the negative exposure of being identified as a property with a reputation for COVID? The economic impact of COVID is expected to hit brick and mortar businesses the worst, as their businesses are dependent on people being physically present. According to a recent report by RBC, it is estimated that 70% of Americans expect to avoid public spaces, 57% of Canadians will be unwilling to attend conferences without a vaccine and 63% of people will prefer to drive vs fly. This means, that for those of you in the business of travel, conferences, co-working spaces, retail stores, museums, art galleries, restaurants, sports arenas, hotels, cruises, airlines, resorts, theme parks, long-term care, education, etc. in the blink of an eye your approach to on-site safety just changed. To ensure your property is safe and secure, it is no longer just about access control, video surveillance and intruder alarms; it is also about sanitisation To get back to business and operating at full capacity after COVID, operations must find a way to eliminate the fear, uncertainty and doubt in the minds of their customers and employees. The affect of COVID-19 on safety and security To safely get back to business, the Centers of Disease Control and Prevention (CDC) emphasis that all operations need a pandemic response planJust like cybersecurity has had a direct impact on the IT strategy and budget, COVID will have a direct hit on the operations strategy and budget. To ensure your property is safe and secure, it is no longer just about access control, video surveillance and intruder alarms; it is also about sanitization, the lines between the security and maintenance just blurred. From customers, to employees, to government regulators, to management, the focus is now on operations and the sanitization policies, procedures and actions of the team. To put this change of priority into perspective, six months ago, sanitisation was not top of mind for people. Why, because it was not a life or death issue, we had other first world problems to garner our attention. From an operations perspective if we enabled a sanitization issue to become significant enough to impact the safety of customers and staff and therefore the brand, then that was an operational choice versus a mistake. Standards for sanitisation Just like cybersecurity has had a direct impact on the IT strategy and budget, COVID will have a direct hit on the operations strategy and budgetThe issue is, today while the operating priority of sanitization has significantly increased, it is not measured and managed to the same standard as the other safety and security concerns across a business. Also, important to consider, while people may not hold an operation liable during this first wave, we can guarantee they are not going to be as understanding during the second wave or a future pandemic. To safely get back to business, the Centers of Disease Control and Prevention (CDC) and the Occupational Health and Safety regulators emphasis that all operations need a pandemic response plan and should follow these simple guidelines: Develop your plan Implement your plan Maintain and revise your plan While this sounds simple enough, keep in mind that requirements are constantly evolving and will continue to do so for the foreseeable future, or at least until all the research is in. To create an emergency response plan for a pandemic, properties must first determine what needs to be sanitized. The current requirements dictate that most surfaces and objects will just need a normal routine cleaning, it is only the frequently touched surfaces and objects like light switches and COVID has changed the game and made the digital transformation of operating procedures not a ‘nice-to-have’ but a must-havedoorknobs that will need to be cleaned and then disinfected to further reduce the risk of germs on surfaces and objects. The challenge is when you step back and consider what people touch in a day; the list quickly grows. After only 30 minutes, I easily came up with a list of over 60 items that one could call ‘high touch’! If you think about it, the list is extensive; telephones, doorknobs, drawer handles, counters, pens, keypads, computers, etc. and the list is only going to get longer as the research comes in. The challenge is when you step back and consider what people touch in a day; the list quickly grows Operating efficiency If we don’t change our ways, not only will we be doomed to continue making the same mistakes, but we will continue to be lost in paper and filing cabinetsTo scope the impact on operations as part of the plan, we must then find and identify all of those high touch things across the property. If we then combine that with the fact that CDC requires that all high touch locations must not only be cleaned more often, but that they also require that each location is first cleaned with soap and water, and then disinfected for one minute before finally being wiped down. This means a one-minute task just turned into a 4-minute task, that must now be completed multiple times a day. From a resourcing perspective this adds up quickly, and operating efficiency must be a priority. Not to mention it is going to get very complicated to measure and manage especially. Post COVID rules Getting back to business is going to be complicated; lots to do, lots of moving parts and no technology to help. The fundamental challenge to keep in mind is not that the sanitization requirements have evolved, the real issue is that for most businesses this area has been left unchanged for generations. Still today most rely on checklists, logbooks and inspections to manage the responsibilities of our front-line workers, which might have been fine before COVID. Post-COVID the rules have changed and so should the approach to managing physical operating compliance on the front lines. COVID like most physical operating requirements is tactical, detailed and specific; broad strokes, the honor system and inspections are not going to cut it. The digital transformation COVID has changed the game and made the digital transformation of operating procedures not a ‘nice-to-have’ but a must-have. If we don’t change our ways, not only will we be doomed to continue making the same mistakes, but we will continue to be lost in paper, filing cabinets filled with checklists, never to be seen again. Only with the right data can we significantly improve the operational decisions necessary to accelerate our return to full operating capacity. At the end of the day, to fully recover, operations must eliminate the fear, uncertainty and doubt in the minds of customers and employees, only then can we really get back to business.
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilizing the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualization and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
Facial recognition continues to be a political football and a target of privacy activists in the United States. For example, San Diego has suspended its use of facial recognition scanners by law enforcement after a campaign by civil rights groups. The San Diego Tactical Identification System (TACIDS) program included a database of facial recognition scans shared by 30 local, state and federal agencies. A California law, passed in the fall, puts a three-year moratorium on law enforcement use of face recognition technology. A proposal in Congress would prohibit use of biometric recognition technology in most public and assisted housing units funded by the Department of Housing and Urban Development (HUD), thus protecting the more than two million public housing residents nationwide from being “over-surveilled.” The “No Biometric Barriers to Housing Act” is supported by the NAACP, the National Housing Law Project, National Low-Income Housing Coalition, National Action Network, Color of Change, and the Project on Government Oversight. The problems of Facial Recognition "Studies that show that facial recognition systems may misidentify many individuals including women and people of colour" A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing because it “could be used to enable invasive, unnecessary and harmful government surveillance of…residents.” The letter cites studies that show that facial recognition systems may misidentify many individuals including women and people of color, thus “exacerbating vulnerabilities that marginalized groups already face in life.” In June, Somerville, Mass., became the second U.S. city to ban the use of facial recognition technology in public spaces. The first was San Francisco. A coalition of organizations and trade associations has issued a letter to Congress outlining concerns with “blanket prohibitions” or moratoriums on facial recognition technology and listing beneficial uses for public safety, national security and fighting fraud. The Security Industry Association (SIA) is part of the coalition, the Information Technology and Innovation Foundation. A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing Facial recognition technology has benefited Americans in many ways, such as helping to thwart identity thieves" The letter says: “While polls consistently show that Americans trust law enforcement to use facial recognition technology responsibly, some groups have called for lawmakers to enact bans on [the] technology. While we agree that it is important to have effective oversight and accountability of these tools to uphold and protect civil liberties, we disagree that a ban is the best option.” Development and guidance As alternatives to outright bans, the letter proposes expanded testing and performance standards, develop of best practices and guidance for law enforcement, and additional training for different uses of the technology. “Facial recognition technology has benefited Americans in many ways, such as helping to fight human trafficking, thwart identity thieves and improve passenger facilitation at airports and enhance aviation security,” says Don Erickson, CEO of SIA. “SIA believes this advanced technology should be used in a safe, accurate and effective way, and look forward to working with Congress to help the U.S. set the example on how to ethically and responsibly govern this technology.” SIA has produced a document called “Face Facts: Dispelling Common Myths Associated with Facial Recognition Technology.”
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Since the spread of COVID-19 started in Denmark, the Danish government has closed all restaurants, bars and other business areas. In order to comply with the back-to-business policies of the government, Arkaden Food Hall, a popular food court located in Odense, needs to keep the number of guests within a specific limit per square meter – 308 people in their case. Being responsible for their customers and staff, the Food Hall deployed the People Counting and Flow Control Solution from Dahua Technology, to ensure a smooth and safe reopening after the pandemic. People count solution With 14 food stalls and 2 bars, the Food Hall has two entrances. The people count from these two entrances needs to be combined and displayed on screens to determine if there is any more room for customers to enter or will have to temporarily wait at the door. The solution consists of: 2 Entrances with 5 Series IPC (HDW5442E-ZE) 2 DPB18-AI 2 DHL32-F600 1 DSS Pro License 64 Channels + BI Module People counting and flow control The Dahua AI-powered people counting camera can automatically and accurately calculate the real-time number of people entering the restaurant, avoiding congestion and helping to mitigate the spread of the pandemic. The DSS PRO platform with People Counting and Flow Control, together with monitors and DPB18A helps send different videos/pictures and editable content for guests to see. When the number of guests exceeds the set value, the platform and monitors will notify and display ‘the limit is reached’ on the digital signage at the entrance of the Food Hall, reminding incoming customers to wait at the door. In addition, the people counting cameras are simple and easy to install, which allowed the installer to complete the entire project in just 1 day. Enhancing the safety level The People Counting solution has given us statistics and data about the behavior of our customers" “The People Counting solution has given us statistics and data about the behavior of our customers, which saves us a lot of resources since we do not have to physically count the number customers at the door. Furthermore, we can provide them with important information at the entrance using the monitors. We are very happy with our cooperation.” “There seem to be lots of innovative solutions out there that we would be more than happy to try out since we feel this will benefit us to be smarter and more efficient in many ways,” said Sanne Brigsted, Business Development Manager of the Food Hall. Faced with the impact of COVID-19, the Dahua People Counting and Flow Control Solution enhances the safety level and competitiveness of business establishments like Arkaden Food Hall, while creating a comfortable dining environment for their guests. Restaurant management efficiency Most importantly, it has helped the restaurant to successfully achieve its primary task of reopening its food hall by allowing an operator to monitor the customer traffic in real time so that timely security measures can be taken before the place becomes packed with customers. With this smart system, no additional employees are needed to count customers manually at the door, which can significantly reduce labor costs and improve restaurant management efficiency. Moreover, its monitor can serve as a notice board to inform customers or as a multi-purpose advertising screen with event marketing and planning based on the DSS Pro's intelligent data analysis, providing a platform with huge expansion potential and creating business opportunities for the restaurant.
It has been a long time coming, but the Bexar County Metro 911 Emergency Operations Center (EOC) is up and running, and the security systems implemented to protect the facility are among the best of the best. The regional operations center unifies emergency operations into one cutting-edge facility. A New Home Built in San Antonio, Texas, the EOC provides a new home for the Bexar County Sheriff’s communications operations and is an alternate site for the San Antonio police and San Antonio fire and EMS operations. The facility is a joint operations center not only for Bexar County but also for Comal (New Braunfels) and Guadalupe (Sequin) counties. Tight security system All three counties touch dividing lines and are considered part of the San Antonio metro area. Bexar Metro 911 Executive Director Bill Buchholtz said building the facility has stayed on budget of $40 million, “give or take a couple of million.” The electrical system meets Tier IV data center standards for maintaining operations regardless of any unplanned activity, and the mechanical system meets Tier III standards. Because the building is under a tight security system inside and out, it was also important that redundant systems were in place, as well as uninterrupted power. Employees based at the monitors on the main floor are given breaks every so often to decompress, relax and interact. Early stages of planning Alterman staff was fortunate to work with the general contractor in the early stages of planning security Alterman Technologies was hired to provide, install and direct the security solutions effort for general contractor Whiting-Turner, who directed construction on the 81,500 square foot facility located on 11 acres of land. Alterman Technologies’ staff was fortunate to work with the general contractor in the early stages of planning security for this facility. According to James Carmen, Alterman’s Project Engineer, being able to make early and consistent contact allowed for the integrator to help specify the types of security that they felt would most satisfy the end user. It also allowed the installation crew to be able to meet their integration deadline of 8 months, long before the overall construction of the facility was complete. Enterprise access control systems “We were able to evaluate all components of the security solution when we saw the demonstrations of the Lenel, Axis and Salient products,” Carmen said. “We’re pleased with the decisions we made to deploy this security equipment.” To keep the facility secure, Alterman Technologies installed 170 IP cameras inside and out to enforce perimeter security. Now that the facility has been formally dedicated and is fully in use, if a person doesn’t have a reason to be on property, they aren’t getting inside. The facility is secure. Alterman Technologies installed 120 door enterprise access control systems, including iClass biometric readers. Video management systems To monitor both the outside perimeter and inside the building itself, 110 5 MP Axis Communications IP cameras were paired with Salient Enterprise video management systems integrated with the Lenel access control solution. Inside the operations center, the facility is outfitted with 100 55-inch video control systems side by side, all of which are integrated with video and audio control solutions. During Hurricane Harvey, operators inside are able to coordinate any and all emergency and rescue operations Inside the facility, there is a first-floor, open room for 104 operator desk consoles, where operators can keep tabs on all three counties. Operators sit in a 13,878-squarefoot Public Safety Answering Point (PSAP) to handle all 911 calls, formerly managed at 25 different locations. In fact, during the recent Hurricane Harvey, operators inside are able to coordinate any and all emergency and rescue operations. Getting behind the power “The ability to have multiple supervisor control stations is a key feature, providing access to sources and allowing supervisors to manipulate the wall and change presets as needed,” said Art Salinas, Project Manager for Alterman Technologies. “It’s a great system with no real limitations. I believe the client has been pleased with the capability to control and preview content before it goes on the wall. They currently have about 30 preset displays.” With the number of cameras and the video streaming to the facility, Salinas had to be certain the equipment he was recommending and the software that would power the system would work without a hitch, 24 hours a day, seven days a week. “Our work to determine the right kind of solution was very involved, and we evaluated all the systems,” Salinas said. “When it came right down to it, we selected Lenel’s OnGuard for access control, Axis Communications IP cameras and Salient’s VMS and its PowerUltra servers. All of this is securely stored in an enclosed network so there is no worry of outside hacking.” Perimeter security system With three counties and multiple agencies using this facility, the security solutions have to be dependable" Salient Regional Sales Representative Paul Fisher said the choice of VMS was truly an important decision because it had to be strong enough to stop any breaches but also be able to provide the ability to run the perimeter security system and the internal security. “Our VMS solution is able to take the lead with all the streaming video and push it wherever it is directed,” Fisher said. “With three counties and multiple agencies using this facility, the security solutions have to be dependable, yet easy to use. We were invited in to demonstrate the system, and we were able to show numerous details that would benefit the end user. We are able to provide reliability and scalability, and we’re a local company, so that worked to our benefit as well,” Fisher said. Law enforcement officials The facility is designed to provide uninterrupted 911 services during various emergencies, including terrorist attacks and natural disasters. There also is an onsite helipad for access by law enforcement officials, should area roadways be closed or congested, and for staging for media during a public emergency. The building is constructed to withstand an EF3 tornado strike and to operate without any public utilities for an extended period of time. “The mission of the facility is to provide that emergency response when a caller is quite possibly going through the worst experience of their life,” said James Hasslocher, Bexar Metro 911 Network District Chairman.
The new Student Center at Columbia College Chicago, located at 754 South Wabash Avenue in Chicago, opened its doors in the fall of 2019. This brand-new building offers five spectacular stories of spaces for students including music and film-screening rooms, dining options, a fitness center, a reflection room for meditation and prayer, and event spaces for meetings, performances, and receptions. According to Andy Dutil, Director of the Columbia College Chicago Student Center, the school has taken the initiative to improve overall security, with the intention of keeping an open feel to the campus. Speedlane open turnstiles To help meet that objective at the new Center, the architects designed the building with Speedlane Open turnstiles and a TQM manual revolving door from Boon Edam. Columbia College Chicago has a closed campus. In order to enter any building on campus students and staff must have a Columbia ID or visitors must have a valid appointment. The main entrance at the Student Center is the TQM revolving door that leads to a public foyer that includes a coffee shop and lounge. Guards watch as people pass through them to ensure that everyone is scanning their IDs Since the turnstiles are just past the security desk at the boundary of this area, they serve as a visual and physical indicator of where the public area terminates. Next to the Speedlane Open turnstiles, which are notable because they do not have any closing barriers, guards watch as people pass through them to ensure that everyone is scanning their IDs and that the IDs are valid, in which case the turnstile shows a green light. Controlling access without being obtrusive In a situation where a red light shows and the turnstile alarms, the guard will check the person’s credentials and can try to troubleshoot the ID card. “The decision was really about what creates the least barrier to those entering and exiting the building,” said Dutil. “We don't really want our students to feel like they are overly policed or that our buildings are not accessible to them. So the design of the Open turnstiles provided the best solution in terms of controlling access without being obtrusive.” Before the Student Center was built, students entering any campus building would just show their ID to the security officer as they walked past. The administration realized that while this does provide some level of security, it is not foolproof – particularly when many people are entering at the same time for a class. Brief learning curve The College’s head of security made the suggestion to install a system that would allow for swift passage of authorized people while maintaining accountability around who enters and exits the building. As anticipated, there was a brief learning curve for the students using the new system As anticipated, there was a brief learning curve for the students using the new system. “This was the first system like this on our campus,” said Dutil. “And the first few days that the new Center was open were also the first few days of school. There were a lot of people new to the campus who required a bit of coaching from guards and our student staff in terms of where to place your card, and to not walk through before you place your card.” Dutil confirms that the access systems placed at Boon Edam turnstiles are actually outperforming those placed at swing doors across the campus for convenience and adoption. Benefits beyond campus security “Across the campus, there is a card reader at every swing door entrance of a building where you present your card and a light turns red or green. But oftentimes the card reader is missed, or depending on the placement of the lights and placement of the guard, it can be kind of hit or miss with students walking right by it.” “But with the Open turnstiles, they're very visible and although they're not a total barrier to entry, they are something that's right in front of you. Because it's very noticeable and not easily overlooked, the students have learned pretty quickly to get their ID out. In fact, this was meant to be a test run for the campus to ensure it would be viable and worthwhile for other buildings as well.” The turnstiles have delivered additional benefits beyond basic campus security, according to Dutil. Convenient touch panel “One of the nice things about a system like this is that we can count visitors to the Student Center because we get the data of everybody that scans in. So on a busy day for us it's about 2500 people throughout the day. That can range depending on what's going on and what time of year it is. On weekends we're very slow, since there are no classes – maybe 900 to 1200.” There's a really convenient touch panel right at the security desk called the BoonTouch" “We are a rental venue as well, so we have times where the building is open to non-Columbia College Chicago people for events or other functions. There's a really convenient touch panel right at the security desk called the BoonTouch, where the officer can turn off the turnstiles during those times and then attendees can move through freely without any alarms going off at all.” Keeping the building warm Finally, the TQM revolving door delivers one additional benefit to the Student Center, located in a city known for harsh weather. “Revolving doors are always preferred at a building like this that gets a lot of traffic going in and out. We have cold, drafty weather that blows right into our main space at that first floor entry. The revolving door helps to keep the building warm and saves energy and utility costs as well,” said Dutil. “Students feel safe and comfortable entering the building at night,” he concludes. “Our building has a lot of nooks and crannies, and someone can end up alone in a space. And so I think knowing that the only people that are in that building are the ones that are supposed to be there is helpful. Overall, our students appreciate the effort to try to keep them safer.”
Invixium, a global provider of innovative touchless biometric solutions, has been contracted by Fine Hygienic Holding (FHH), one of the provider Wellness Groups and manufacturer of hygienic paper products, to deploy IXM TITAN devices and integrate Invixium’s workforce management solution with FHH’s Oracle HR cloud as part of its corporate digital transformation initiative. Businesses like FHH that have many operating locations require a workforce management solution where data from all facilities is readily available. Invixium’s IXM WEB is a web-based, cloud-ready biometric access control and workforce management software that the TITAN devices installed at FHH’s sites in Jordan, the UAE, Saudi Arabia, and Egypt constantly share data with. This data, including time tracking, is visualized in IXM WEB’s playful interface through interactive dashboards and intuitive reports showing employee data and the overall health of the biometric system. Payroll and employee time management FHH’s existing ORACLE Fusion time management system created a unique challenge for all stakeholders, including Invixium and their partner ElectroSec, from an implementation and support perspective to cover all FHH’s operations across the MENA region. For the TITAN installation to be effective, employee clock-ins (i.e. punches) needed to be immediately exported to ORACLE Fusion, where FHH’s Human Resources could manage payroll and employee time. Invixium’s team of experts worked with FHH and ORACLE to bridge IXM WEB with Fusion, allowing TITAN to seamlessly share data with FHH’s existing human capital cloud. After three consecutive pay periods with 100% time accuracy, Invixium and FHH share that this custom digital transformation implementation was a complete success. Zero human intervention “We had very tight timelines in 2019 to ensure we go live in 2020 for all our Phase 1 Cloud transformation programmes, where the core focus was on Human Resource processes, technology and improvements. Working with Invixium, Oracle, FHH’s technical team, supported by the HR team, we were able to implement a system that is 100% accurate on employee records for Time and Attendance and then integrated it into the Oracle platform. This leaves very little room for fraud and zero human intervention, and provides FHH with a foundation for the future for all HR related systems and processes," said FHH’s CIO Yahyah Pandor. “Invixium is very proud of what we accomplished with Fine Hygienic Holding,” said Shiraz Kapadia, President and CEO of Invixium. “Our products are made to be highly customizable, so we accepted this challenge knowing that TITAN and IXM WEB were the right fit for FHH’s unique needs. IXM WEB especially is designed with the end-user in mind; we want our customers to have the freedom to build their system around their business needs. Our engineers worked tirelessly with FHH and ORACLE to make this digital transformation happen, and the results have been incredibly positive.”
Check Point has introduced CloudGuard Cloud Native Security, a fully-automated cloud platform that enables customers to seamlessly protect all of their cloud deployments and workloads, and manage security through a single pane of glass. CloudGuard streamlines and simplifies cloud security, preventing the most advanced 6th generation cyber-attacks from impacting organizations’ cloud environments, and enables them to take full advantage of the speed and agility of cloud. Rapid migration to the cloud is the biggest cause of breakages in enterprise security architectures, according to the SANS 2020 Cybersecurity Spending Survey, with over half of respondents citing increased use of public clouds as the leading cause of security disruption. The COVID-19 pandemic has magnified this, as companies scramble to support mass remote working. Their current security controls cannot cope with the speed, scale and complexity of cloud deployments, leaving them vulnerable to attacks and breaches. Security across cloud implementations “Cloud security can be challenging; however, the real challenge is multi-cloud, as IDC data continually shows that over 80% of organizations have multiple cloud providers. The goal is one set of policies to rule them all,” said Frank Dickson, Program Vice President, Security & Trust at IDC. “Check Point's multi-cloud security platform looks to unify security across private and public cloud implementations, essentially making cloud security agnostic of the resident software define compute environment.” Check Point CloudGuard addresses these challenges, delivering comprehensive and easy to manage cloud security platform. It gives frictionless deployment and control of the advanced security protections to any cloud environment and workload, and enables security processes to be automated to meet DevOps’ demands for rapid deployment and agility. “Security is continually cited as a barrier to enterprise cloud deployments, because traditional security controls are not agile enough to handle the cloud’s speed and scale,” said Itai Greenberg, VP of Product Management, Check Point. “CloudGuard solves this problem, giving organizations the advanced cloud-native security across their cloud estates, together with holistic visibility and easy, automated management and enforcement of security policies.” CloudGuard’s Unified Cloud Native Security Fully integrated security with advanced threat prevention: Prevents APTs and zero-days from infecting clouds and workloads with unified security, and workload runtime protection, including firewalling, IPS, Application Control, IPsec VPN, Antivirus and Anti-Bot, powered by the industry’s real-time, cloud-based threat intelligence. High-fidelity cloud security posture management: CloudGuard gives unified, at-a-glance visibility across organizations’ multi-cloud environments, enabling continuous analysis and control of their cloud security posture from CI/CD to production environments. Automated security for any workload in any cloud: CloudGuard delivers true cloud-agnostic security, enabling organizations to automatically secure any workload, anywhere with auto-provisioning, auto-scaling and automated policy updates. It enables holistic, single-console security management as well as run time protection for serverless and container-based applications, in multi-cloud environments. Supporting Partner and customer quotes: “Check Point CloudGuard has been a saving grace for Gas South. It is the only solution that gives us secure, stable, complete access to our critical applications and services in Azure,” said Rajiv Thomas, Senior Systems Engineer, Gas South. “When deploying a multi-cloud environment, you need to have a consistent tool that plays across all the platforms,” said Sreeni Kancharla, VP & Chief Information Security Officer, Cadence. “Using the cloud-agnostic CloudGuard service, I only need to train an individual on one set of tools and he can manage our total cloud environment very effectively.” Ann Johnson, Corporate Vice President, Cybersecurity Solutions Group at Microsoft Corp. said, “Where people often thought about security as a solution to deploy on top of existing infrastructure, events like COVID-19 showcase the critical need for truly integrated cloud security for organizations of all sizes. Solutions like CloudGuard running on Microsoft Azure help to empower our customers through a unified platform which has become a business imperative as more organizations embrace cloud-based protections.”
Rajant and Dejero’s Technology Springs into Action in the Battle Against a 420-Acre Wildfire on the Santa Barbara County Coast. A wind-driven brush fire triggered evacuations after breaking out along the Gaviota Coast in Santa Barbara County, California. On a sunny afternoon in mid-October 2019, the heat from the sun combined with winds gusting up to 40 mph through the quiet foothills of El Capitán Canyon, sparking a wind-whipped, vegetation brush fire in the overly dry desert hills. The blaze, dubbed the ‘Real Fire,’ quickly charred 420 acres while threatening more than 100 structures that sat along the Gaviota Coast before firefighters and emergency crews were aware of the fire and able to gain an upper hand on the wild blaze. Wind-Driven bush fire Coincidentally, Rajant and Dejero had just arrived in Santa Barbara for a demonstration with the Santa Barbara County Fire Department. Shortly after the fire broke out, word reached the emergency services and crews from the Santa Barbara County Fire Department, Cal Fire, the U.S. Forest Service, and other agencies who immediately dispatched their teams to contain the blaze before it spread further. The climate in the canyon at the time of the blaze was considered ‘critical fire weather’ with its dangerously dry grass and wind gusts. These conditions only encouraged the wind-driven bush fire to spread swiftly through the foothills on the north side of Highway 101 near El Capitán State Beach, California and east over the ridge. A good stretch of the 101 Freeway had to be shut down immediately—in both directions—and Amtrak routes through the area were canceled. Total communications solution At the peak of the fire, helicopters and fixed-wing aircrafts attacked the flames from the air with retardant and water drops Visitors at nearby ranches, campgrounds, beaches, and resorts were evacuated, and a warning was given to residents living in the nearby Dos Pueblos, Refugio, and Winchester Canyons. At the peak of the fire, helicopters and fixed-wing aircrafts attacked the flames from the air with retardant and water drops, while dozens of engines, along with bulldozers and hand-crews, fought it from the ground. At about that same time the fire broke out, teams from Rajant and Dejero, along with subject matter expert Bruce Arvizu from the Department Homeland Security, had arrived in Santa Barbara. Together, they were prepared to deliver a live safety demo to the Santa Barbara County fire chief on how the companies can together provide the total communications solution. Improved spectrum efficiency The planned public safety demo was also to show how the blending of Rajant’s technology with Dejero Smart Blending Technology (SBT) eliminates drops and gaps—a solution comprised of mesh radio communications, blended cellular, and satellite technologies to bridge the communication gap in remote locations where signals are often weak or lost. While LTE networks provide high bandwidth, lower latency, and improved spectrum efficiency, LTE can also become spotty and drop signals in remote locations and other areas. Dejero’s Smart Blending Technology (SBT) fills in these gaps in the Wide Area Network by seamlessly blending any available LTE with SAT comms to guarantee a connection for the responding teams. Signal continuity becomes even more challenging in valleys, around mountains, and along coastlines, which becomes mission critical when emergency services are responding. Continuous and reliable connection More than 200 firefighters were on site fighting the fire with reinforcing containment lines of helicopters Rajant’s mesh radio technology bridges the gaps in these local areas. When the three technologies are used together, a continuous and reliable connection is provided, ensuring that communications between the responding agencies and their teams in the field are not lost. Meanwhile at the El Capitán canyon, more than 200 firefighters were on site fighting the fire with reinforcing containment lines of helicopters and drones in the air and 30-ton bulldozers on the ground cutting out ‘catlines’ and uprooting vegetation, thus eliminating the fire’s fuel. By plowing through the flames, brush, and trees with the dozers, the emergency crews saved valuable manpower and shortened the fire’s reach and life. When fighting fires with bulldozers, it is critical for the commander in control to receive data from each dozer to manage fighting the fire collectively as a team and to track each dozer individually. Critical local data Rajant and Dejero quickly proposed to the fire chief the benefits of their combined technology at a time of crisis and asked to allow Rajant and Dejero to modify their presentation from a demo to a real life exercise. “Our county firefighters are willing to do whatever it takes to get that job done. When we do our after-action review, the successes and failures always come out. And we like to capitalize on our successes.” said Daniel Bertucelli, County Fire Captain Santa Barbara County Fire Department. Rajant BreadCrumbs® can be mounted to the bulldozers so the critical local data could be transmitted while other situational data and mapping could be revived in the field. Dejero SBT would power the Microsoft Tactical Truck and provide the bridge from the field to the command post over cellular and SAT networks, during this actual emergency situation. Combined firefighting attacks More than 400 acres had burned with no structures damaged and no reported injuries Notably, the SAT comms on the vehicle was to be powered by Kymeta’s flat-panel dish technology, enabling true ‘comms on the move’ to best leverage Rajant’s Kinetic Mesh®. The updated mission was green lighted. On Friday morning, Rajant and Dejero meet with the fire squad at the command control center. Rajant BreadCrumbs and camera systems were mounted to dozers while the Microsoft mobile comms truck, with the Dejero GateWay on-board, maintained a close, but safe, proximity to the dozers to provide LTE. The firefighters manning the bulldozers were able to communicate in the valley when normally they could not. Data was sent from the bulldozers to the van to the internet where the command control center could receive the video feed. The real-life demo was a success. The combined firefighting attacks on the blaze gained the upper hand and went from a 20-percent containment on Thursday evening to 50-percent by Friday afternoon. By Monday, the Real Fire was 100% contained. More than 400 acres had burned with no structures damaged and no reported injuries. Evacuations were lifted for all areas.
Round table discussion
The general public gets much of its understanding of security industry technology from watching movies and TV. However, there is a gap between reality and the fantasy world. Understanding of security technologies may also be shaped by news coverage, including expression of extreme or even exaggerated concerns about privacy. The first step in addressing any challenge is greater awareness, so we asked this week’s Expert Panel Roundtable: Which security industry technology is most misunderstood by the general public and why?
We are all more aware than ever of the need for cybersecurity. The Internet of Things is a scary place when you think about all the potential for various cyber-attacks that can disrupt system operation and negatively impact a customer’s business. Because most physical security systems today are IP-based, the two formerly separate disciplines are more intertwined than ever. We asked this week’s Expert Panel Roundtable: How can cybersecurity challenges impact the physical security of a company (and vice versa)?
We live in an era of Big Data. Surrounded by a flood of information, more companies are looking for ways to analyze that information (data) and systematically extract intelligence that can help them operate more efficiently and profitably. The data obsession has extended to the physical security industry, too, where large amounts of data have historically been a little-used byproduct of our access control and even video systems. But the picture is changing. We asked this week's Expert Panel Roundtable: What impact are data analytics having on the security market?
Data Security: Manufacturers & Suppliers
Automatic Vehicle Identification: State Of The Industry 2020Download
11 Considerations For Embedded System RFID ReadersDownload