Electronic security systems
ConnectWise, the provider of intelligent software and expert services for technology solution providers (TSPs), has released the findings of the second annual ConnectWise SMB State of Cybersecurity report. The year 2020’s study was conducted between June and July 2020 and surveyed over 700 IT and business decision makers in the US, the UK, Canada, Australia and New Zealand. A few major findings from the report include: 91% of SMBs said they would consider using or moving to a new IT se...
The use of Mobile IDs in access control grows more frequent every week. That is why Idesco’s display reader, 8 CD 2.0 Pin D, will also soon accept a mobile ID from one’s smartphone. Interactive routines that require identification, like payment, are easily and securely managed with an RFID keypad/display reader providing a menu and displaying user-specific responses. That is why 8 CD 2.0 Pin D’s keypad is designed to flexibly support users’ need to select options and inp...
Iris ID, the global renowned provider of iris recognition technology solutions, announced that it has begun shipping IrisTime, a new biometric time and attendance platform that offers a fully customizable and accurate solution, to meet the pioneering workforce management needs of small businesses to enterprise organizations worldwide. IrisTime IrisTime also offers a new recognition technique for authenticating employee identity that uses a fusion of iris and face recognition to increase accura...
IDEMIA, the globally renowned provider of Augmented Identity and Identity Management solutions, has announced the appointment of Andrew Boyd to the position of President and Chief Executive Officer (CEO) for IDEMIA National Security Solutions. Andrew Boyd will be responsible for the over-all strategic growth and leadership of the team, delivering state-of-the-art technology solutions that support national defense, national security, and the classified missions’ space. Security and Intell...
Alcatraz, a developer of autonomous access control products, announced it has joined the NVIDIA Metropolis Software Partner program and is leveraging the NVIDIA Jetson Edge AI platform to create a real-time machine learning and computer vision multi-sensor embedded system. Alcatraz offers the Rock, a touchless and secure physical access control platform that works with any access control system, delivering an autonomous solution on the edge. It replaces or augments badging as a credential with...
Exabeam, the Smarter SIEM™ company, and Code42, the provider in insider risk detection and response, announced a strategic partnership to help security and insider threat teams quickly detect, investigate and respond to data exfiltration, and reduce risks caused by compromised, negligent or malicious insiders. Customers using the joint solution will benefit from having a full picture of their environment, even in distributed workforce conditions, with automated incident response to obstruc...
Aqua Security, the pure-play cloud native security provider, released a new threat report by Team Nautilus, Aqua’s cybersecurity research team, that reveals a growing, organized and increasingly sophisticated pattern of attacks on cloud native infrastructure. While most attacks were aimed at abusing public cloud compute resources for cryptocurrency mining, the methods used open the door for higher-value targets that leverage security gaps in container software supply chains and runtime environments. The full 70-page report provides a detailed account of attacks observed in the wild during a full year of detailed observation and tracing. This is the one such report to outline the precise, systematic methods used to attack container infrastructure, and to highlight supply chain attacks as an emerging threat. The report not only provides trends and observed categories of attacks, but also explains in great detail the specific progression of several attack vectors, from the originating malicious images to the specific evasion techniques, malicious payloads, and propagation attempts. Analysis of the attacks The detailed analysis of the attacks was made possible using Aqua’s Dynamic Threat Analysis (DTA) tool, which was announced by Aqua earlier in 2020. Aqua DTA runs suspicious images as sandboxed containers to safely observe and trace their behavior, and is integrated into Aqua’s full-lifecycle solution to prevent such images from ever making it into production environments. Highlights of the observed attacks include: Container images in public registries being poisoned with Potentially Unwanted Applications (PUAs) that cannot be detected using static scanning. They spring into action only when the container is running. Sophisticated evasion techniques are being used to hide attacks and make them more persistent. This includes the use of “vanilla” images that seem innocuous, disabling other malware, delaying before downloading payloads into the running container, using 64-bit encoding to obfuscate malware, and more. Systematic targeting Since the beginning of 2020, the volume of attacks has dramatically increased, suggesting that there is organized infrastructure and systematic targeting behind these attacks. More than 16,000 individual attacks were tracked back to multiple locations across the globe. The main motivation of the malicious actors has been to hijack cloud compute resources to mine for cryptocurrency, but Team Nautilus has seen evidence that other objectives, such as establishing DDoS infrastructure, were also attempted. Targeting cloud native infrastructure “The attacks we observed are a significant step up in attacks targeting cloud native infrastructure. We expect a further increase in sophistication, the use of evasion techniques and diversity of the attack vectors and objectives, since the widespread the use of cloud native technologies makes them a more lucrative target for bad actors,” notes Idan Revivo, Head of Team Nautilus at Aqua. “Security teams are advised to take the appropriate measures both in their pipelines as well as runtime environments, to detect and intercept such attempts.” In addition to the full report, a concise CISO executive brief document is available that provides an overview of the attacks and methods used, as well as actionable advice to security executives on how to protect against this new and growing breed of attacks.
Altronix, the globally recognized solutions provider of power and data transmission products for professional security applications, has announced that they continue to expand the company’s popular Trove Access and Power Integration Solutions. Integration with LenelS2 NetBox Altronix now seamlessly integrates its power and sub-assemblies with the LenelS2 NetBox platform for installations supporting up to 28 doors in a single housing. “Trove solves system design and installation challenges with a greater degree of versatility and cost-effectiveness,” said Ronnie Pennington, Director of Sales for the Americas, Altronix Corporation, adding “We are pleased to announce that Trove now supports even larger LenelS2 access systems.” Trove3SS3 LenelS2 controllers Altronix new Trove3SS3 is completely customizable and accommodates LenelS2 controllers with Altronix power distribution. Pre-configured kits with Altronix power and sub-assemblies are available to support systems with up to 28 doors, reducing valuable time and labor costs. These new products join Altronix Trove2 solutions for LenelS2 systems with up to 14 doors, providing more options for system designers. All Trove power and access integration solutions simplify board layout and wire management, while providing maximum flexibility and scalability in the design and deployment of the industry’s renowned access control brands. Trove enables installers to easily configure and pre-test systems prior to on-site installation and provides a single point of service and maintenance.
Boldon James Ltd, a globally renowned technology solutions company providing data classification and military messaging solutions that enable customers to effectively protect data, enforce controls and manage data distribution, has announced that it has partnered with Deep Secure, a renowned UK cyber security firm, delivering malware-free, policy enforced data to protect against cyber-attacks and data non-compliances. This new strategic alliance will deliver protective governance and safe information exchange in any organization’s messaging and content environment. Technology alliance The new partnership aims to utilize Boldon James Ltd’s best-of-breed data protection and governance solutions, which will be augmented with Deep Secure’s Threat Removal and Policy Enforcement solutions to present clean data at the application layer, in addition to deep content inspection policy enforcement, applying configurable content policies to pass, block, quarantine or modify content in email. The combined solution enables protectively marked data to have added domain boundary checks on metadata and labeling in messages and attachments. Additionally, it provides dominance checks on over-classification as well as forty-nine different inspections across every piece of content. Enhancing data security We are excited to partner with Deep Secure to bring innovative, ground-breaking technology solutions" “We are excited to partner with Deep Secure to bring innovative, ground-breaking technology solutions to our enterprise and commercial customers,” said Keith Vallance, Head of Product at Boldon James. Keith adds, “Deep Secure policy enforcement and threat removal solutions will complement our strategic focus to deliver advanced data classification and will further enhance our position in both military and government messaging domains and commercial data classification. Our joint efforts with Deep Secure will enable us to pioneer the future of data classification.” Data governance and data loss prevention The partnership will see organizations benefit from a complete messaging solution that provides protective governance around data throughout its lifecycle, further enhancing implemented tools, such as data loss prevention (DLP), data discovery and data governance. “This partnership will allow us to expand our addressable markets by providing customers with integrated solutions that increase the efficiency of their IT infrastructure and security,” said Daniel Turner, Chief Executive Officer (CEO) at Deep Secure, adding “We’ll aim to work closely with Boldon James to address solutions that deliver material benefits for our enterprise and commercial customers.”
Sectigo, a provider of automated digital identity management and web security solutions, and Managed Security Service Provider (MSSP) Trustify, have partnered to deliver advanced web security solutions to companies of all sizes across Europe, the Middle East, and Asia. The new partnership combines Sectigo's all-in-one Web Security Platform with Trustify's digital signing, email security, and professional management; now available as Trust365. "Sectigo is the first Certificate Authority (CA) to offer a comprehensive website security solution, combined with industry-leading TLS/SSL certificates," said Michael Fowler, President of Channel Partners, Sectigo. "Trust365 enables additional services that are fully managed for customers by security experts so that they can focus on their core business and feel confident they are protected from cyberattacks." Cybercrime prevention Trust365 brings together best-in-breed web security technology from Sectigo and Trustify, either fully automated or fully managed for customers. Available as an all-in-one solution bundle or as a la carte products, Trust365 includes: Sectigo SSL certificates Sectigo's eight-layered Web Security Platform Web Detect: Daily malware and vulnerability scanning Web Patch: Automated vulnerability and CMS patching Web Clean: One-click malware removal Web Backup & Restore: Daily website backups and one-click restore Web Accelerate: Global Content Delivery Network (CDN) Web Firewall: Continuous DDoS protection with WAF Web Comply: Simplified PCI Compliance Web DNS: Sectigo’s Global Anycast DNS TrustiMail—Fully-encrypted secure email, user-friendly across all key email platforms TrustiSign—Advanced electronic signing solution Simple integration "Trustify is continuously innovating to secure organizations from cybercrime and downtime," said Alistair Murray, CEO & Founder, Trustify. "We selected Sectigo because they share this vision with us, offer a complete portfolio that other CAs do not offer, and they made it incredibly easy to deploy with simple integration into a single API."
The Security Industry Association (SIA) has stated that the decision by the City Council of Portland, Oregon, to ban facial recognition technology use by businesses in places of public accommodation, starting January 2021 and to prohibit all city government use of facial recognition technologies are shortsighted decisions that do not consider effective and beneficial applications of facial recognition. Ban on facial recognition tech use The Portland ordinance prohibiting private entities’ use of facial recognition technologies affects any business providing goods, services or other accommodations to the public and will impact businesses’ ability to protect workers, customers, facilities and property, since it effectively targets business use of security systems. “Turning back the clock on technological advancement through a complete ban on private-sector use of technology that clearly keeps our fellow citizens safe is not a rational answer during this period of social unrest in Portland,” stated Security Industry Association (SIA) Chief Executive Officer (CEO), Don Erickson. Educating masses on facial recognition technology It is hardly a model approach to policymaking that any government should adopt" He adds, “It is hardly a model approach to policymaking that any government should adopt. Let’s act together now to thoughtfully educate the public about the legal and effective use of facial recognition technology, while at the same time, being mindful of legitimate questions raised about the impact of this technology on all stakeholders, including communities of color.” Don further stated, “We continue to invite local leaders across the country to work with us to develop more sensible approaches to the use of facial recognition.” SIA’s Senior Director of Government Relations, Jake Parker, provided his testimony at the Portland City Council hearing on Thursday, Sept. 9, 2020, in opposition to these widespread prohibitions on the use of facial recognition technology. National Institute of Standards and Technology research paper As part of the council’s discussion, Portland City Councilwoman, Jo Ann Hardesty stated prior to the vote that the council would revisit the ban when there is technology that is not racially biased and is tested by independent third parties. SIA notes that such technology is available in the current scenario, and in July, SIA authored and submitted a letter to Portland’s Mayor and City Council, which noted the National Institute of Standards and Technology’s research paper that documented that high-performing algorithms perform equally well across different demographics. The letter stated, “The National Institute of Standards and Technology (NIST), the world’s renowned and foremost authority on this technology, found last year that the highest performing technologies had ‘undetectable’ differences across demographic groups, with accuracy rates well above 99% and undetectable false positive differences across demographics, even when tested against galleries of up to 12 million images.” Lawful, ethical and nondiscriminatory use of facial recognition SIA believes all technology products, including facial recognition, must only be used for lawful purposes SIA believes all technology products, including facial recognition, must only be used for purposes that are lawful, ethical and nondiscriminatory, and recently released and committed to a series of principles to be used in the development and deployment of facial recognition, ensuring the technology is used in a transparent and nondiscriminatory way that implements privacy protections and human oversight into its use. SIA welcomes working with cities and government on future facial recognition ordinances and policies to ensure decisions are based upon facts and a complete understanding of current technologies and that such policies consider widespread public support for the benefits of this technology. SIA protects and advances its members’ interests by advocating pro-industry policies and legislation at the federal and state levels, creating open industry standards that enable integration, advancing industry professionalism through education and training, opening global market opportunities and collaborating with other like-minded organizations.
Alcatraz, developer of autonomous access control products, and Channeltivity, a globally renowned partner relationship management (PRM) solution, have united to help deliver a state-of-the-art channel and training program that fosters partner success. “As a technology-based startup carving out a new space in the security industry for autonomous access control solutions, we knew when it came to managing our dealer network interactions, that the solution had to offer the absolute latest in technology,” said Alcatraz Chief Revenue Officer, Tina D’Agostin. Tina adds, “We wanted to make it very easy for our channel partners to do business with us, and Channeltivity plays a key role in that success.” Channeltivity PRM platform The Channeltivity PRM has provided Alcatraz with an impressive solution that gives partners the power of a DIY channel management solution leading to improved communication, increased training opportunities, and powerful sales channel enablement, said D’Agostin. “We are excited to be part of Alcatraz’s growth plans,” said Jason Jacobs, Chief Executive Officer (CEO) of Channeltivity, adding “Our mission from Channeltivity’s inception was to empower channel professionals to build enduring relationships. When our solution is deployed by rock star channel teams like the one at Alcatraz, we have seen explosive growth.” High-tech security solution Channeltivity’s PRM platform is designed to make channel management as easy as possible for both companies Jason adds, “In the last three years alone, more than 25 of our customers have either IPO’d or been acquired by the likes of Google, Salesforce, Oracle, EMC, and others. We are proud of our stable of unicorns and are confident Alcatraz will be one of them.” Channeltivity’s PRM platform is designed to make channel management as easy as possible for both companies and partners to increase sales productivity. It’s a great solution for a tech-savvy startup like Alcatraz, as they grow in the security marketplace. Alcatraz routinely adds new dealer partners to the Channeltivity PRM, where they can manage deal registration, leads, training, co-branded collateral requests, and more. Leveraging AI and analytics to modernise access control A tech-savvy startup located in the heart of Silicon Valley, Alcatraz is changing the way that companies use access control systems by providing facial authentication solutions that leverage artificial intelligence and analytics to modernize access control. The Alcatraz Rock uses passive 3D sensing, machine learning for increased security, tailgating detection, and now offers mask detection. The system is easy to set up, as users are automatically enrolled as they badge in, which eliminates the enrollment hassles associated with other access control solutions. Because it works with any existing access control system, there is no need for rip and replace.
A defibrillator can save the life of a person suffering from cardiac arrest – but it is most effective when used in the first few minutes of the patient collapsing. Studies have shown that a shock given within the first three minutes provides the best chance of survival and even one minute of further delay can substantially lower the chances of recovering. Public Access Defibrillators (PADs) were created to allow untrained members of the public to deliver life-saving treatment in those precious minutes before an ambulance arrives. There are currently over 10,000 in the UK, located in parks, offices, high streets and sporting venues, and they are especially popular in rural communities, where ambulance response times are longer. Every second counts Over the years there has been a long-running debate as to whether PADs should be kept openly accessible or locked. Leaving them open could lead to theft, vandalism or misuse. Leaving them locked could mean that precious moments are lost waiting for a local guardian to arrive – and could even cost a life. To save as many lives as possible, it’s clear that PADs need to be available 24/7, fully operational and easily accessible to users and local guardians. But there is a solution that can meet all these conditions – a lock that can protect against vandalism while providing convenient instant access when required. Life-saving solutions Over the years there has been a long-running debate as to whether PADs should be kept openly accessible or lockedDigital locks are ideal for securing PADs because they don’t require a key, and anyone can be given access over the phone. In the case of a cardiac arrest, the user calls 999 and the ambulance controller provides them with a simple, easy-to-remember code. The ambulance controller can then advise them, step by step, what to do. Local guardians, who have responsibility for the PAD, can be provided with an override key to enable them to monitor and maintain the defibrillator. The PAD cabinets built by Duchy Defibrillators show exactly how this works in practice. Based in rural Cornwall, Duchy Defibrillators manufactures, supplies and installs monitored PAD cabinets. To provide public access to the defibrillators, it needed a lock that could keep its cabinets secure, make them easily accessible and withstand the stormy Cornish weather. Codelocks recommended a digital electronic lock that could operate on a standalone battery, making it especially suitable for remote areas. As well as offering flexible access, digital locks come with a range of varying options and functions to suit different applications. As Duchy Defibrillator cabinets are installed in a wide variety of locations and sometimes need to withstand outdoor exposure, it opted for a robust electronic digital lock that is both affordable and easy to set up. A digital-access revolution Using smart locks in combination with a dedicated app or portal allows operators to send time-sensitive codes to end-users The example of Duchy Defibrillators shows how digital locks can be used to keep defibrillator cabinets secure while affording instant access to users when they are needed. But the flexibility of digital locks also makes them suitable for securing property and equipment in a wide variety of situations, especially for shared and public facilities. This is why you’ll increasingly see digital locks used to secure restricted areas in hospitals, schools and offices, as well as shared facilities like hotel and gym lockers, public restrooms and more. Digital locks are available for a number of specific applications, including doors, lockers and cabinets. They can range from simple mechanical locks through to more sophisticated electronic locks and state-of-the-art smart locks. Using smart locks in combination with a dedicated app or portal allows operators to send time-sensitive codes to end users – making them very popular for contactless entry and with facilities managers that need to manage access to buildings and campuses. One thing is certain – whatever your access control requirements are, there’s a keyless lock solution to suit. The digital access revolution is here.
There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system. The first thing you should ask is “does my firm have a certified thermographer?”. If not, the firm are at risk of getting a low quality system that is being resold to make quick cash. Businesses that are doing this do not know how to operate it properly. Asking the right questions Secondly, you should ask whether the system is NDAA compliant. NDAA compliance means that your temperature detection equipment is protected by U.S. law. Does your system have a HSRP device (blackbody)? HSRP (Heat Source Reference Point) is a device that will allow the camera to detect the correct temperature a distance. Even if the room temperature does change throughout the day, treat it as a reference point for the camera to know the temperature at that distance. Can your system scan mutliple people at once? Can your system scan mutliple people at once? This is a bad question but often asked since most systems will say yes. For ease, everyone wants to scan many people at once, but the best practice according to FDA and CDC guidelines is to run one person at a time for best accuracy. Why? The HSRP (blackbody) device tells the camera what the correct temperature is at a given distance away from the camera. Every foot you are away from the HSRP device will be off by 0.1 degrees roughly. If you are in a room full of people, let's say 6, in view of the camera, every person that is not next to the HSRP device (5) will be given an inaccurate reading. Hence why it is so important to run the system correctly with just one person at a time. You will also need to follow the 6 feet rule. If you take that into consideration, one at a time at 6 feet apart, the device should tell you how you need to run the system. Sensitivity of thermal imaging Is your system’s sensor accurate enough? The FDA recommends an error of ±0.5°C or better. When looking for a system, make sure it is better than what they recommend. I would recommend ±0.3°C or better. Do not purchase a system over ±-.5°C degrees as you are doing yourself and your customers or employees an injustice. Another thing to look at is how many pixels it can determine the temperature from. Some cameras can only tell the temperature of 6 points on the screen, whilst others can take a temperature reading from each pixel. Take a 384x288 camera, for example, which would be over 110,000 points of temperature taking on a single image. Thermal cameras are very sensitive, so there are a lot of do’s and don’ts. For example, the system cannot see through glasses or hats. On the below image you can see a person with the visual camera on the right, whilst on the left side is through a thermal camera. Both are pointing at the same area. It is clear the person on the left side is “invisible” to the thermal imaging camera. Demonstrating the sensitivity of thermal imaging If you are a company who wants to detect the temperature of customers or employees though the front door, window or a car window, the answer would be no. You need a clear line of sight without any interference to scan for temperatures. Other things you need to look out for is wind and distance away from the HSRP (blackbody) device. Air and distance away from the HSRP device will make the system less and less accurate the more space between the device. Air and distance away from the HSRP device will make the system less and less accurate Thermal imaging and COVID-19 If you have a clear line of sight, is there anything I need to know? The answer is yes. Reflective materials such as metal can interfere with your temperature readings. Reflective materials are easily picked up from the thermal side so pointing at a medal, glass or anything reflective can cause inaccuracies within the system. In the age of COVID-19, temperature detection systems are more important than ever. Organizations must get a system in place to help scan for high temperatures in order to reduce the spread of the virus.
The emergence of smartphones using iOS and Android is rapidly changing the landscape of the IT industry around the world. Several industries, such as digital cameras, car navigation, MP3, and PNP, have been replaced by equivalent or even better performance using smartphones. Smartphones provide increasing portability by integrating the functions of various devices into a single unit which allows them to connect to platforms with network-based services and offer new services and conveniences that have never been experienced before. These changes have expanded into the access control market. Although not yet widespread, ‘Mobile access cards’ is one of the terminologies that everyone has been talking about. RF cards used for access security are being integrated into smartphones just as digital cameras and MP3s were in the past. While people might forget their access cards at home in the morning, they seldom forget their smartphones. Using smartphones for access control increases entry access reliability and convenience. Mobile/smartphone access control A key aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction As in other markets, the combination of smartphones and access cards is creating a new value that goes beyond the simple convenience of integration enhancing the ability to prevent unauthorized authentication and entrance. People sometimes lend their access cards to others, but it is far less likely they might lend their smartphone with all their financial information and personal information – to another person. This overcomes an important fundamental weakness of RF cards. Another valuable aspect of mobile credential is that it makes it possible to issue or reclaim cards without face-to-face interaction. Under existing access security systems, cards must be issued in person. Since card issuance implies access rights, the recipient’s identification must be confirmed first before enabling the card and once the card has been issued, it cannot be retracted without another separate face-to-face interaction. Mobile access cards In contrast, mobile access cards are designed to transfer authority safely to the user's smartphone based on TLS. In this way, credentials can be safely managed with authenticated users without face-to-face interaction. Mobile cards can be used not only at the sites with a large number of visitors or when managing access for an unspecified number of visitors, but also at the places like shared offices, kitchens and gyms, currently used as smart access control systems in shared economy markets. The market share of mobile access cards today is low even though the capability can offer real benefits to users and markets. While the access control market itself is slow-moving, there are also practical problems that limit the adoption of new technologies like mobile access cards. Use of Bluetooth Low Energy technology While NFC could be an important technology for mobile credential that is available today on virtually all smartphones, differences in implementation and data handling processes from various vendors prevents universal deployment of a single solution to all devices currently on the market. Accordingly, Bluetooth Low Energy (BLE) has been considered as an alternative to NFC. Bluetooth is a technology that has been applied to smartphones for a long time, and its usage and interface are unified, so there are no compatibility problems. However, speed becomes the main problem. The authentication speed of BLE mobile access card products provided by major companies is slower than that of existing cards. Enhancing credential authentication speed Authentication speed is being continuously improved using BLE's GAP layer and GATT layers The second problem is that mobile access cards must be accompanied by a supply of compatible card readers. In order to use mobile access cards, readers need to be updated but this is not a simple task in the access control market. For 13.56 MHz smart cards (which were designed to replace 125 kHz cards), it has taken 20 years since the standard was established but only about half of all 25 kHz cards have been replaced so far. Legacy compatibility and the need for equivalent performance, even with additional benefits, will drive adoption timing for the Access Control market. While BLE technology helps resolve the compatibility problem of mobile access cards, it can identify some breakthroughs that can solve the speed problem. Authentication speed is being continuously improved using BLE's GAP layer and GATT layers, and new products with these improvements are now released in the market. Making use of key improvements allows Suprema's mobile access card to exhibit an authentication speed of less than 0.5 seconds providing equivalent performance to that of card-based authentication. AirFob Patch MOCA System's AirFob Patch addresses the need for technological improvements in the access control market in a direct, cost effective, and reliable way – by offering the ability to add high-performance BLE to existing card readers – enabling them to read BLE smartphone data by applying a small adhesive patch approximately the size of a coin. This innovative breakthrough applies energy harvesting technology, generating energy from the RF field emitted by the existing RF reader – then converting the data received via BLE back into RF – and delivering it to the reader. By adding the ability to use BLE on virtually any existing RF card reading device, MOCA allows greater ability for partners and end users to deploy a technologically-stable, high performance access control mobile credential solution to their employees, using devices they already own and are familiar with. Adding MOCA AirFob Patch eliminates the need to buy and install updated readers simply to take advantage of mobile credential, lowering costs and risks, and increasing employee confidence and convenience. Growth forecast of mobile access card market in 2020 In 2020, forecasts show that the mobile access card market will grow far more rapidly Several companies have entered the mobile access card market, but they have not set up a meaningful product solution stream until 2019. In 2020, forecasts show that the mobile access card market will grow far more rapidly. Reviewing new entries into the market allows identification of the latest products that provide improving solutions to compatibility and speed problems. MOCA AirFob Patch addresses development plans in process today that overcome the legacy installed base of card readers – allowing rapid creation of an environment that can make immediate use of BLE mobile access cards. Integrated mobile digital ID With proven usability and within suitable environments, mobile access cards will also begin to make inroads into other markets, not just the access control market. In the sharing economy market, which seeks access management without face-to-face interaction, the integrated mobile digital ID led by the 'DID Alliance' will serve as a technical tool that can be used in access authentication – forging increasing links between the access control and digital ID markets.
The Private Security Industry Act of 2001 gives the Security Industry Authority (SIA) the function of setting standards of conduct in the United Kingdom’s private security industry. Time is winding down to provide input during the SIA’s six-week consultation on a new draft code of conduct for SIA licence holders and applicants for SIA licences. The authority is inviting the industry, licence holders, and anyone with an interest in private security to have their say on the draft code of conduct by taking part in a survey. The consultation will end on 23 February. “The ethos of the code of conduct is that it will improve standards and public safety by setting out the standards of conduct and behavior we expect people to uphold if they are entrusted with protecting the public, premises and property,” says Ian Todd, Chief Executive, Security Industry Authority (SIA). Security's Code of Conduct A code of conduct sets out what standards of behavior professionals have to meet in order to work in the profession In security as in many professions, a code of conduct sets out what standards of behavior professionals have to meet in order to work in the profession. SIA is suggesting Six Commitments of behavior that will apply to all licensed security operatives and to applicants. If the code of conduct is sanctioned by the U.K. Home Office, it would become mandatory and incorporated into SIA’s licensing criteria Get Licensed. A commitment to certain standards of behavior is fundamental to what it means to be fit and proper, and to being part of a profession. The six commitments are: Act with honesty and integrity Be trustworthy Protect the people and property you are entrusted to protect Be professional at work Act with fairness and impartiality at work Be accountable for your decisions and actions “We will review the comments from the consultation once it concludes on 23 February, analyze the results and publish a report on our findings,” says Todd. “The SIA will then use the comments it has received to write a final version of the code of conduct. The introduction of a code of conduct will be subject to final approval by Home Office Ministers.” SIA’s current Standards of Behavior provide guidance on professional behavior but are not mandatory. The draft code of conduct builds on the Standards of Behavior. Upholding SIA's Standards The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act “The majority of licence holders uphold the standards of behavior that the SIA, their employers and the public expect of them,” says Todd. “Their professionalism and dedication keep the public safe and tackle crime. However, there are incidents in which some licence holders do not behave in this way. This minority lower the standard of service the public receives, harm public safety, and bring themselves and the rest of the private security industry into disrepute.” The SIA’s Partnership and Interventions team is the unit that enforces the Private Security Industry Act. It is likely that they will be required to enforce the code of conduct should it become mandatory. The draft code of conduct is currently out for consultation and the proposal has been shared widely to licence holders, private security businesses, and enforcement partners encouraging them all to take part. “Once the consultation has concluded, we will analyze the findings from the feedback, produce a report and publish it on our website and share this widely via social media,” says Todd.
Using computed tomography (CT) security technology for cabin baggage screening at airports can eliminate the need for passengers to remove liquids and laptops from their bags, thus helping to make the security process easier and more efficient. As the latest in checkpoint scanning technology, CT provides 3D images with much more information to improve threat detection capabilities so decisions by the operator can be resolved quickly and more accurately, without the need for manual search. The whole experience is better and safer for everyone. The use of computed tomography The Netherlands were the first to introduce CT at the checkpoint and the Transportation Security Administration (TSA) in the United States plans to install 145 units in its airports by the end of the year. Australia is already installing and using CT at some of its airports. The United Kingdom is the first country to mandate use of CT for screening cabin baggage, and it is expected that the EU will also mandate this type of technology in the near future. It is expected that the EU will also mandate this type of technology in the near future The process of deploying CT is another level in the evolution of passenger screening and aviation security. Since 9/11, the traveling public has become increasingly educated about aviation security, says Steve Revell, Senior Director of Aviation CT at Rapiscan Systems. “What passengers expect is courtesy, professionalism and, most of all, to be able to travel safely without fear of harm,” he says. “Each level of security we have seen introduced over the years, I believe, shows commitment from all stakeholders to meet these key deliverables.” Rapiscan Systems' 920CT Rapiscan Systems' 3D cabin baggage screening system, 920CT, utilizes patented Dual-Energy technology and a sophisticated algorithm to provide the highest level of automatic detection of highly dense items, as well as automatic detection of explosives based on the most stringent global regulatory requirement. It also has a truck wheel design and contactless power and data transfer, both of which reduce maintenance costs and downtime and make the 920CT more efficient and robust. Rapiscan's 920CT provides the highest level of automatic detection Rapiscan’s 920CT is equipped with advanced software and detection algorithms that are designed to be upgradeable. With 3D volumetric imaging, the 920CT is superior to 2D systems as it provides improved visualization of potential threats. It has also been engineered to integrate seamlessly with Rapiscan’s TRS tray return solution to create a more efficient checkpoint experience, for both passengers and staff. “As a manufacturer, we strive to provide the very best quality service and equipment we can – working closely with regulators and airports alike to ensure the evolution and expansion of air travel is both collectively understood and fit for purpose,” says Revell. Portfolios and partnerships Rapiscan has a wide portfolio of products and capabilities. However, one company cannot do it all. “For this reason, we will always look to best-of-breed technologies that complement our offerings and provide a cohesive solution and, more importantly, long-term partnership,” says Revell. “The partnership deliverable is what drives the future. Our mission is one of an open platform that invites other technologies to work in conjunction with ours and integrate in such a way that can provide meaningful reports and controls systems to our clients, driving core efficiencies and security enhancements.” Our mission is one of an open platform that invites other technologies to work in conjunction with ours “The efforts borne by each of the key stakeholders is done for one very important and aligned reason, to ensure to the very best of our abilities that passenger safety is put first, is always put first and is done in the most courteous, professional way possible, without any undue inconvenience,” he adds. Increasingly, airports are asking for suppliers’ systems to talk to each other. Many airports have security screening equipment from multiple manufacturers and want to put images from these into a single, searchable database, to track missing items, improve productivity and efficiency, or comply with regulations. The Digital Imaging and Communication for Security (DICOS) is an industry standard that defines an interoperable data format for integration of security screening technologies across multiple vendor platforms. It facilitates the development and use of improved security screening technologies and third-party software. Rapiscan’s 920CT supports DICOS, and the company is working with multiple vendors to help create a single platform for airports.
The boundaries between the smart home market and security market at large are narrowing. Amidst a wave of expansion, suddenly everything is becoming digital. Home automation has been around for close to 30 years but hasn’t really hit it big because integration hasn’t been that simple. Now that the Internet of Things has stepped into the market, home automation is really taking off. As technology in the smart home market advances, the gap between the residential and professional security markets is growing smaller. Additional revenue for security industry There will continue to be more opportunity for interoperability, and home automation will continue to grow and eventually become a norm. Growth in the residential security market and its position as the channel for smart home solutions, have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras and other products suffice for their security. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. Data capture form to appear here! Residential security solutions Growth is going to be slow and steady. Everyone needs to be realistic about that" The trend has no doubt accelerated in the last couple of years. New collaborations are being made between audio-video (AV) suppliers and security solution providers. The clientele of high-end AV products is becoming increasingly concerned with home security and property protection. So, in recent months, the requirement for residential security solutions has been increasing as technical solutions can go hand in hand with AV installers’ capabilities and client base. “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” says Michael Philpott, Senior Practice Leader, Consumer Services at Ovum. "This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” Pressure to upgrade security standards Surprisingly for what has historically been something of a grudge purchase, in the context of home automation, security is seen as a solution some consumers are looking for. Another security aspect of home automation is cybersecurity, in particular how it applies to various IoT devices in the home. Now as connected devices gather personal information from realms long considered private and protected – the bedroom, the kitchen counter, the nursery – the risks are higher than ever. All of the data that various devices and sites have collected can be combined, shifted and then exploited by marketers or even stolen by hackers. Both manufacturers of smart home products and the companies that install them are feeling pressure to upgrade security standards. They are moving to set policies that will regulate who has access to data and how it is used. Ease of installation Advances in the home market are increasing customers’ expectations as well as adoption of newer technologies A recent revelation that some “smart TVs” might be listening to conversations and transmitting them to "third parties" caused an uproar. These sets have voice activated features that enable users to change channel, turn on a DVD or browse the internet by speaking to the screen or remote. The fine print in privacy policies contains warnings that general conversations are also being heard, and one company even told owners to turn off this function if they were concerned. Another impact of smart homes on the security marketplace is to raise expectations about the capabilities of commercial systems. Products made today for residential applications are very high quality, easy to install (do-it-yourself, or DIY), and have very rich feature sets. End users expect their commercial solutions to have a similar ease of use and ease of installation. Geofencing in commercial applications The quality of video that people are seeing at home is motivating some legacy commercial customers to finally move to IP video from lower resolution analog cameras. A higher percentage of commercial customers use cellphone applications to view integrated video and access control data. People’s experience with smart thermostats has them asking for geofencing in some commercial applications. In short, advances in the home market are increasing customers’ expectations as well as adoption of newer technologies. Read part two of our smart home mini series here.
Beginning September 1, 2020, six Vision-Box Automated Border Control (ABC) eGates will greet arriving travelers enrolled in the NEXUS Program at Winnipeg International Airport. As the only international airport in the Province of Manitoba, Winnipeg is an important travel hub for the region, having served close to 5 million aviation passengers in 2019. NEXUS program NEXUS is a trusted traveler program operated by Canada Border Services Agency (CBSA) that expedites border crossings for pre-approved and enrolled Canadian, American, and Mexican citizens. Travelers enrolled in the NEXUS program avoid border entry lines by using specially reserved lanes equipped with identity screening platforms for expedited checks when entering the country from anywhere in the world. Automated Border Control (ABC) eGates ABC eGates will facilitate and speed up the border clearance of arriving NEXUS enrolled passengers The Automated Border Control (ABC) eGates will facilitate and speed up the border clearance of arriving NEXUS enrolled passengers from all international locations using safe and secure automated biometric facial matching. “Finding better ways to serve the needs of travellers is paramount for Winnipeg Airports Authority,” said Barry Rempel, WAA President and Chief Executive Officer (CEO), adding “Adding Vison Box eGates for NEXUS users at Winnipeg Richardson International Airport not only enhances the customer experience but sets the foundation for future innovation and brings us one step closer to seamless, touchless passenger travel.” NEXUS touchless solution This is the first time that ABC Biometric eGates are being deployed to process NEXUS enrolled Travelers, instead of the regularly used NEXUS kiosks. It is also the first NEXUS touchless solution that will improve the border clearance process and give NEXUS travelers a unique convenience at the airport. The deployed GT-11 eGates are part of Vision-Box’s newest generation digital identity systems and will use the latest advances in biometric technology to securely and efficiently clear travellers using digital facial matching. The GT-11 eGates offer a smaller footprint than the previous NEXUS kiosks and are part of a modernizing process for a seamless travel journey from curb to boarding at Winnipeg International Airport. Remote installation of border digital identity software This may also be the first time that a complete remote installation of border digital identity software has been successfully attempted and completed. Because of the COVID-19 pandemic that quickly spread across the globe, work at Winnipeg International Airport had to be stopped in February 2020, with only the physical installation of the eGates completed. Software and systems setup The ability to go live with a remote orchestrated installation is a major accomplishment" Logical setup of the software and system testing, prior to going live was then completed entirely from Vision-Box Lisbon headquarters, in close collaboration with Canada Border Services Agency (CBSA), using a dedicated secure connection. By remotely installing a border processing system, Vision-Box proved the feasibility and security of a remote installation process that could lead to far-reaching industry changes and cost-saving measures. “The ability to go live with a remote orchestrated installation is a major accomplishment,” said Miguel Leitmann, Vision-Box’s Chief Executive Officer (CEO), adding “Our team, along with CBSA and members of the Winnipeg Airport Authority worked tirelessly across time zones, with frequent and intense communication, to make this happen. I couldn’t be prouder of this accomplishment and I congratulate all the agencies and people involved in making this project a reality.” Orchestra Digital Identity Management Platform Vision-Box’s Orchestra Digital Identity Management Platform will manage the Nexus border clearance and crossing process. Orchestra manages in real-time the necessary parameters of traveler identification at the crossing point. After the traveler scans their NEXUS member card, a photo is taken of the traveler’s face and a secure identification match is made against the biometric facial information in the traveler’s NEXUS membership profile. This system gives CBSA and Winnipeg International Airport added flexibility with faster dedicated lanes that simplifies the airport border clearance process along the way.
Verkada, the provider in cloud-managed enterprise building security, announced the release of its environmental sensor product line and its initial product, the SV11. The announcement comes on the heels of Verkada’s recent Series C funding and successful launch of its access control line, further establishing the company as the provider of the operating system for modern, integrated buildings. Monitoring “Our customers are responsible for the systems that keep facilities online, and our mission is to give those administrators the best possible tools to do their jobs,” said Filip Kaliszan, CEO and co-founder of Verkada. “Whether it be monitoring the status of a server room, the temperature of a patient room in a hospital, or the air quality of a school, the SV11 gives facilities and staff unprecedented visibility and control over the sites they’re responsible for keeping safe and secure.” The SV11 is a simple-to-deploy, powerful sensing device that provides enhanced visibility into what is happening in a physical space. The cloud-managed device seamlessly integrates with Verkada’s enterprise video security solution, allowing organizations to review context and quickly associate sensor events with relevant video footage. Real-time insights and proactive alerts The interface delivers real-time insights and makes it easy to respond to proactive alerts or conduct investigations into past incidents. Customers across a range of industries, including healthcare, manufacturing, education, retail, and hospitality, have already deployed the SV11 to monitor: Air quality: Protect one's environment from invisible threats like gas and chemical leaks, or detect illicit activities like vaping and smoking. Temperature and humidity: Monitor changes in temperature and humidity that may damage expensive infrastructure, materials, or food and medical supplies. Motion and occupancy: Detect motion or occupancy in bathrooms, locker rooms, and other private areas where cameras are not appropriate. Noise levels: Detect activity or disturbances without violating privacy. Receive and manage alert notifications remotely “The ability to deploy Verkada's sensor in our network closets has provided us with complete visibility into what’s happening in those rooms,” said Rick Palandro, Security and Facilities Operations Engineer at Fox Rothschild LLP. “With Verkada, I'm now able to receive and manage alert notifications remotely the moment temperature rises above a specific threshold. I can instantly mobilize the team to respond to HVAC issues. We’ve shifted from a reactive approach that often resulted in damaged equipment to a proactive one that ensures our equipment is always operating properly.” Monitoring preventative and predictive maintenance Verkada’s SV11 has empowered us to take a data-driven approach to food manufacturing" “Verkada’s SV11 has empowered us to take a data-driven approach to food manufacturing that helps us stay ahead of the curve on environmental improvements across our plant facility,” said Frank McKinney, COO and Plant Manager of Carolina Ingredients. “By pinpointing where we can set up both preventative and predictive maintenance, we can closely monitor and optimize air quality, efficiency of our HVAC units, and behaviors in the plant, which enables us to more effectively manage the business and deliver quality ingredients and superior blending services that support our customers.” Integration with video monitoring solution "We installed the environmental sensor across campuses in areas like bathrooms that are difficult to properly monitor and are therefore likely places for inappropriate activity such as vaping," said Marty Oliver, Director of Technology at Godley Independent School District. "Paired with Verkada's video monitoring solution, the SV11 provides a new level of visibility into what's happening in those spaces without infringing on students' privacy, giving principals, superintendents, and office administrators a more holistic understanding of student activity in school." Environmental sensor The introduction of the environmental sensor follows accelerated business growth in Q2 2020, highlighted by: Sixty-five percent quarter-over-quarter revenue growth (compared to Q1 2020), including new deployments with Holiday Inn Express and Suites, Rubrik, NextGen America International expansion with new Sales operations in Sydney and Latin America and deployments with Heinemann Australia, Lifeview Residential Care, and Transportes Canales A projection to double headcount by year-end 2020 (compared to year-end 2019) Expansion of its global channel partner program to more than 1,500 resellers The launch of its Access Control solution, which oversold in the first quarter of general availability and surpassed projected sales by more than 400 percent The release of the Bullet Series of hybrid cloud cameras as well as new features as part of a COVID-19 Response Suite, including People Heatmaps, Person of Interest Notifications, and Crowd Notifications Smart buildings The launch of the SV11 is the next step towards Verkada delivering on its vision to power the modern, integrated building. With security cameras at its core, Verkada is expanding its product offering with new applications such as access control and sensors to deliver the infrastructure that runs safer, smarter buildings.
South Africa conservationist, Brett Barlow needed a robust security solution to protect Munu, a blind, South Western Black Rhinoceros, whose species is critically endangered. FLIR video solution Barlow deployed an all FLIR solution, comprising thermal cameras, visible cameras and an NVR, for around-the-clock monitoring, early detection and real-time response. FLIR technology has played an instrumental role to protect Munu’s life and livelihood. Throughout the 20th century, big-game hunters, settlers and poachers have decimated Africa’s black rhino population. In the early 1970s, there were approximately 65,000 black rhinos, and by 2018, that number was reduced to 5,630. In 2020, there are three remaining subspecies of the black rhino, one of the most vulnerable being the South Western Black Rhinoceros, also known as Diceros bicornis bicornis, of which there are only 254 left in South Africa. FLIR thermal and visible security cameras deployed Barlow teamed up with FLIR Systems to use state-of-the-art thermal and visible security cameras to act as Munu’s eyes Munu, a 20-year-old blind male rhino, is one of these critically endangered species. When Munu was in danger, South Africa conservationist, Brett Barlow stepped in to save Munu’s life. Barlow teamed up with FLIR Systems to use state-of-the-art thermal and visible security cameras to act as Munu’s eyes, detecting threats, increasing safety and enhancing his overall quality of life. In 2019, rangers working at a South African National Park found a black rhino walking in circles and visibly disoriented. They knew they had to do something. After safely tranquilizing him, an ophthalmic surgeon confirmed that the rhino, known as Munu, had suffered two detached retinas and was completely blind, likely as a result of disputes with other rhinos in the area. Protecting endangered rhino, Munu As soon as he heard about the situation, renowned South African conservationist, Brett Barlow spoke with the South African National Park and offered to permanently house and protect Munu. “Every rhino matters,” Barlow adamantly affirmed, adding “You wouldn’t put down a blind child, so why would you put down a blind rhino?” The South African National Park later transferred Munu to Barlow’s care. However, Barlow wasn’t the only one who wanted to help Munu. Relocating Munu to the Mantis Founder’s Lodge Adrian Gardiner, globally renowned conservationist famous for founding the Shamwari Game Reserve and the Sanbona Wildlife Reserve in South Africa, extended the invite for Munu to stay on one of his properties, the Mantis Founder’s Lodge. Wasting no time at all, Barlow relocated Munu to the lodge, knowing it would increase his quality of life. The property, spanning 850 hectares, is home to five white rhinos, as well as other animals, including a zebra and giraffe. The White Lion Foundation, in which Gardiner and Barlow are both executive board members, donated funds to construct Munu’s boma, comprising a secure covered boma and a five-hectare open grazing area. American Humane funding Though under Barlow’s care and in a safe enclosure, Munu still faced many grave threats Additional support came from a local internet provider, who donated free internet services for the project. American Humane, a non-profit organization committed to ensuring the safety, welfare and well-being of animals, funded one year of feed for Munu. All donations for Munu go directly to the project with no administration costs deducted. Though under Barlow’s care and in a safe enclosure, Munu still faced many grave threats because of his highly valuable horn. He remained a prime target for illegal poaching. Much of Munu’s horn was removed to protect him, but the amount of horn that remained is still worth thousands of dollars. Experts say that one pound of rhino horn is worth at least US$ 3,000 universally and ten times that, on Asian black markets. Thus, even with much of his horn removed, Munu was still in danger. Self-harm was a risk should Munu charge into the boma. Munu’s next door neighbor, Rodney, a white bull rhino, was also a concern should a territorial fight occur. For all these reasons, Barlow looked for ways to enhance Munu’s safety. Video surveillance for enhanced security Previously, the Mantis Founder’s Lodge employed two guards for Munu’s security. However, Barlow believes guards should only be a second line of defense, a visual deterrent that responds to threats. “I wanted to go down to the electronic security system route,” Barlow said, adding “Technology doesn’t sleep.” The first security manufacturer Barlow hired charged high prices for their security products. More than this, once installed, Barlow discovered that these devices were unable to deliver quality images in extreme weather conditions, such as mist or rain, both of which are commonplace at the Lodge. As such, he decided Munu’s security required for a more robust and reliable video security system. In 2019, Wilke Pretorius, Distribution Sales Manager for Sub Sahara Africa at FLIR Systems, was working with Brett Barlow on a separate project. When Barlow told Pretorius about Munu, Pretorius informed the FLIR team who immediately got involved. FLIR end-to-end video surveillance system FLIR donated an end-to-end surveillance system, featuring thermal and visible cameras FLIR donated an end-to-end surveillance system, featuring thermal and visible cameras, in order to protect Munu from poachers. FLIR’s powerful thermal and visible imaging cameras deliver intrusion detection at much longer ranges and complete, 24-hour perimeter protection, regardless of weather conditions. "Other camera manufacturers don't compare. Their cameras can't see through mist or rain. FLIR delivers images 24/7, rain or shine, darkness or light,” Barlow said, adding “technology like FLIR thermal cameras allow for early warnings for perimeter breaches. Even though rhinos have weak eyesight, without any sight, they are basically defenseless. So, in essence, FLIR became Munu’s eyes.” Beyond FLIR’s high-performing technology, Barlow loved working with the FLIR staff. Barlow said, “What drew me to FLIR were the people involved. Wilke and the rest of the FLIR team have been so passionate and resourceful, always available and willing to help when issues arise.” “When I started working at FLIR, Chief Executive Officer (CEO) Jim Cannon said our mission is to save lives and livelihoods,” Pretorius explained, adding, “These words stuck with me. Working on the Munu project, it was clear that saving lives and livelihoods are indeed a passion of FLIR employees. I am proud to be a part of a company so eager and passionate to produce solutions and technology that make a positive impact in the world.” Installation of FLIR cameras Installing the new security system was not an easy task. Merely two days prior to the arrival of FLIR cameras, in March 2020, South Africa was ordered into an immediate lockdown, due to the COVID-19 pandemic. But Barlow was eager to begin the installation process, so he set out to do it himself. By early May 2020, a two-person crew had manually dug over 600 meters of trenching to run cable and conduit through the lodge’s hard African soil. Barlow also installed a solar array to power the system. He cut bushes, installed polling and connected the entire system to FLIR’s central network video recorder (NVR), to view the camera feeds both inside and surrounding Munu’s boma. The result is a fully functioning, comprehensive video security system. FLIR Elara FB-Series ID thermal security cameras deployed Barlow worked closely with Pretorius to strategically design and lay out the FLIR security system Barlow worked closely with Pretorius to strategically design and lay out the FLIR security system based on a two-tier model. The perimeter is shaped as a big triangle about 110 yards away from the boma enclosure. Six FLIR Elara FB-Series ID thermal security cameras, which use onboard analytics to classify human or vehicular intrusions, are installed to monitor the outer perimeter or the first tier. There are also 11 Ariel Full HD IP Bullet cameras deployed, which deliver 1080p video for high motion, complex and low-light scenes. FLIR Saros Dome DH-390 cameras deployed For effective surveillance of Munu’s boma, six FLIR Saros Dome DH-390 cameras, designed to deliver actionable alerts and alarm data, surround the enclosure. One FLIR Saros DM-Series camera is mounted inside the boma to capture every minute detail of Munu’s movement in all conditions. To manage the video from all the cameras, FLIR also supplied its Meridian TM product, a compact, all-in-one network video recorder (NVR), specially designed to support dozens of channels. Meridian also features a FLIR United VMS EZ Client web interface, which simplifies viewing capabilities and saves the cost of additional workstations. Powering, processing and managing this system are six edge servers, FLIR’s USS Edge Appliances, containing 12TB of storage and preloaded with United VMS software, built to seamlessly manage multiple, varied devices. Heightened perimeter protection Thanks to FLIR’s technology, Barlow is confident that Munu can be an ambassador for his species. He hopes Munu’s story may inspire future conservancies around the world to partner with manufacturers, like FLIR, for heightened perimeter protection. Case in point, actress Shannon Elizabeth, founder of the South Africa-based Shannon Elizabeth Foundation that is focused on wildlife conservation, was deeply moved by Munu’s story. She later asked Barlow to participate as an advisor to her foundation’s Ranger Relief Fund. Importance of early warning technology FLIR could prove invaluable to the efforts of rangers all over the African continent to protect endangered animals" In a time where conservation funding is down because of declining tourism due to the COVID-19 pandemic, the Ranger Relief Fund supplies money and much needed equipment to ensure conservation first responders remain employed and properly resourced. With early warning technology being more critical than ever, the need for conservancies to partner with technology manufacturers like FLIR is urgent. “FLIR could prove invaluable to the efforts of rangers all over the African continent to protected endangered animals,” Barlow explained, adding “With Munu being the proof point, FLIR could be more than Munu’s new eyes, but indeed the eyes of an industry desperate to protect the world’s natural heritage from the burgeoning poaching crisis.” Picking the optimal security solution When asked what advice Barlow would give to other conservancies considering similar security technologies, he said “Speak to the right people. Make sure you talk to someone who understands the product. See the solution in action. View a live site and see how it works. Work with the right people to implement that for yourself.” The longer Munu lives, the more good he’ll do. Barlow plans to expand Munu’s boma, once he has acclimatized to his new home. And he has already begun using the FLIR Saros DM-Series’ live stream capabilities to invite learners around the world to observe Munu up close. The plan for Munu is to mate with a female within his own subspecies, thereby directly contributing to the survival of his kind. If Munu does sire a calf, Barlow plans to donate the calf back to the South African National Park that Munu came from to help with the genetic diversity for the reserve. The future for Munu is bright and, with his new eyes, he will see through to the end.
Located 40 kilometers outside the Russian capital, the new Mercedes-Benz passenger car factory is a showcase for Industry 4.0 automotive manufacturing. To ensure the safety of more than 1,000 employees at the massive facility, Bosch provided a fire alarm and security system, replete with voice evacuation capabilities to meet the specific safety needs of modern-day car factories. Future of car manufacturing Walking into the main manufacturing hall of the new Mercedes-Benz Cars plant in the Moscow region is to see the future of automotive production. Amid glass walls and high ceilings, robots and humans work side-by side to assemble the company’s most popular limousines for the Russian market. From chassis welding to windshield installation to painting, the plant combines all production steps in the same building as part of a ‘one-roof concept’. But from a fire safety perspective, the ‘one-roof concept’ with its tall factory ceilings and open floorplan poses challenges. The reason: Conventional, point-type fire detectors exceed their performance limit when it comes to detecting smoke particles inside such a vast, air-conditioned space. Working closely with the client, experts of Ateksis, the system integrator who lead this project, realized that early fire detection would take a solution just as innovative as the futuristic car factory itself. Safety for automotive factories They can detect fires in the beginning stages (called the “smoldering” phase) even before visible smoke is released Additionally, Mercedes-Benz required a centrally controlled combination of intrusion alarm and video security to guard the entire perimeter of the 85-hectare facility with its total of seven buildings. And could the solution be ready within a few weeks for the plant’s grand opening featuring international dignitaries? Working on a tight timeline, the team of Bosch and Ateksis experts selected a fitting smoke detection technology: aspirating smoke detectors. Perfectly suited for large warehouses, the detection units are located within a pipe system that constantly ‘inhales’ samples of air, which are checked for smoke particles via intelligent signal processing technology. As a result, the light-based detectors achieve smoke sensitivities as precise as 0.05%. They can detect fires in the beginning stages (called the “smoldering” phase) even before visible smoke is released. electrical interference for reliability Aspirating detectors also pinpoint the exact location of fires, thus reliably preventing major damage in most cases. The system also suppresses environmental factors that typically cause false alarms in car factories, including dust, flying sparks and electrical interference for maximum reliability. “The Mercedes-Benz project is an important reference for us. It shows the level of integration and customer focus made possible by Bosch solutions. Our system has succeeded in meeting the specific needs of automobile manufacturers in the next generation of car production facilities”, said Ivan Konukhin, Bosch Security and Safety Systems Russia. audio sound quality The ceiling loudspeakers are equipped with a metal fire dome to adapt to the in-air handling spaces Amid the acoustic conditions inside the vast production plant, a total of 650 horn and ceiling loudspeakers from Bosch deliver sufficient volume and intelligibility. The horn speakers offer a wide opening angle to broadcast sound across factory floors while offering protection from water and dust, as well as the corrosive effects of industrial environments. What’s more, the ceiling loudspeakers are equipped with a metal fire dome to adapt to the in-air handling spaces of the automotive plant. The cabinet loudspeakers are certified according to the fire evacuation EN54-24 standard for reliable performance under emergency conditions. Overall, this level of audio sound quality directly serves to keep workers secure and informed, especially if evacuation becomes necessary. automatic fire detectors In the bigger picture, the total of 248 aspirating detectors inside the main production hall are centrally networked via Modular Fire Panels 5000 series and connected to more than 2,500 automatic fire detectors installed throughout six additional administrative buildings on the premises. For maximum employee safety, clear voice and audio alarm is provided by the PRAESIDEO Digital Public Address and Voice Alarm System. With Smart Safety Link, the interfaced fire and voice alarm system offers a full control in case of emergency, including the customization of the fire verification time and the automatic process that can ensure a safe phased evacuation. To ensure full visibility of the premises and around-the-clock safety, the video security solution consists of 112 high-definition cameras from Bosch. While bullet and moving cameras secure the perimeter, dome cameras monitor inside spaces. Video Management System Integrated on the Bosch Video Management System, all cameras can be controlled by the on-site security team Integrated on the Bosch Video Management System (BVMS), all cameras can be controlled centrally by the on-site security team inside the control room. Bringing security full-circle, the video system has a direct interface with intrusion alarm system containing over 200 detectors. This seamless integration of all solutions on the Building Integration System (BIS) from Bosch enables a host of additional functions: for instance, the system alerts the control room when a fire detector is triggered and sends live images from the nearest camera for full situational awareness. Aspiration smoke detector As Ivan Konukhin at the Regional Representative Center North-West and South Russia at Bosch Security Systems explains: “The cooperative functionalities between BIS and BVMS components were programmed according to customer requirements in an uncomplicated manner via macros, which also supported a timely installation.” Bosch Security System’s solution consists of: FPA-5000 Modular Fire Panel Solution Smart Safety Link License key for voice alarm Aspiration smoke detector 2 pipe systems AVENAR detector 4000 PRAESIDEO Digital Public Address and Voice Alarm System Metal Fire Dome Cabinet loudspeaker, metal, rectangular Horn loudspeaker, 10W, 6x10" Ceiling loudspeaker, 6W, ABS MAP 5000 family IP4000i, 5000i and 6000 cameras AUTODOME IP Cameras Access Control System Bosch Video Management System Building Integration System
Marassi harbors, known as upcoming gateway to Egypt, is a community with a picturesque surrounding overlooking the turquoise Mediterranean Sea along the Alamein coastline. At this community one will find lavish residences that includes chalets, apartments, townhouses, villas, large marinas and signature hotels creating a lifestyle of sheer pleasure and luxury vacation destination. Secured access points to such an extravagant, lavish community is fundamental as the community is occupied by highly influential people, including high-ranking Egypt government officials. Streamlined access Until recently, manual security checks of vehicles and people were carried out at the community access to comply with the security requirements. As manual security checks were not only time consuming, but also resulted in queuing, the need for a secure and convenient access experience arose. Deluxe communities, like Marassi, strive for an automated frictionless, streamlined vehicle and people access process. Identifying tenant vehicles To automate vehicle access at the gates, Nedap’s UHF RFID uPass Reach readers, with a read range up to 5 meters, are implemented. Combined with Nedap’s UHF windshield-mounted tags, these readers are used for automatic vehicle access. The UHF tags are issued to registered tenant vehicles and when the vehicle comes within the read-range, the tag is identified and granted access. The UHF windshield tag is battery-free and maintenance-free, making it the most effective solution provide secure and seamless vehicle access. E-gate entry to residents Marassi residents manage their digital access card through the community app developed by EMAAR. Digital access cards are used as identifiers and are stored in user’s smartphones. Nedap’s multi-technology reader makes use of smartphones to identify people utilizing Bluetooth Low Energy (BLE) and NearField Communication (NFC) technologies. The solution has provided Marassi tenants with easy and secure access to the community and beach. Residents manage visitor access Visitor access to the community and beach is further simplified by enabling the residents to generate guest requests through the app. Besides supporting BLE and NFC technology, Nedap’s multi-technology reader includes a QR reader that enables scanning QR-codes displayed on a smartphone. Residents can share the QR code with guests. The guest presents the QR-code to the reader and access to the property is granted frictionless. Implementation of such an integrated solution has provided a high level of convenience to all users at Marassi. The reliable solution has also reduced the congestion at the entry gate, securing the flow of vehicles and reducing the waiting period for guests.
Sonitrol, the globally renowned provider of verified electronic security solutions, has announced that CMS Corporation, an award-winning construction contractor, relies on one of Sonitrol’s newest offerings, Sonitrol Network Protection. CMS Corporation’s scope of services encompasses new construction, renovations, fueling systems, and energy and sustainability projects for a wide range of commercial and federal government clients. The company’s projects are approximately 70% Federal and 30% civilian undertakings. Upgrading network security According to CSO Online, the average small business loss when a network has been breached is US$ 170,000 According to CSO Online, the average small business loss when a network has been breached is US$ 170,000. CMS Corporation’s management knew that they needed to upgrade their network security in an effective, comprehensive and cost-effective manner. Matthew Wilson, Director of Information Technology at CMS Corporation, was impressed with Cisco’s reputation, and he was aware of their Cisco Meraki software. He chose Sonitrol Network Protection as the preferred network security solution because it offered a world-class solution provided by a known and trusted provider, Sonitrol. SB/MBEs more vulnerable to cyber-attacks The company, CMS Corporation’s Bargersville, Indiana Office is a two-story administrative space with a large workshop and fabrication area, and a large detached workshop/storage area. Small Business and Minority-Business Enterprises (SB/MBEs), like CMS Corporation, are particularly vulnerable to cyber-attacks, because their relatively small size means that they have a lower IT budget and resources. Furthermore, with CMS Corporation’s large number of federal government contracts, effective cyber security is essential to the company’s continued growth and success. Cybersecurity Maturity Model Certification compliance Due to upcoming Cybersecurity Maturity Model Certification (CMMC) compliance, federal contractors are required to tighten their network security to protect Controlled Unclassified Information (CUI). “Cisco Meraki products enable us to have proactive insight into our network activity to help ensure compliance with current and new federal regulations,” Matthew Wilson explained. Sonitrol Network Protection Wilson was attracted to Sonitrol Network Protection’s ease of deployment, auto mesh VPN and seamless scalability Wilson was attracted to Sonitrol Network Protection’s ease of deployment, single pane of glass administration, auto mesh VPN, and seamless scalability. These features are powered by the Cisco Meraki products and solutions, installed by CMS Corporation, which include: MX68CW, MS120-8 FP switch, and four MR36 access points. They also have a handful of Z1 and Z3 devices in remote construction trailers that are able to support the software. In addition to topline network protection from potentially daily cyber-attacks and ransom-ware attacks, Wilson and his colleagues are now learning post-deployment that Sonitrol Network Protection offers a host of additional security features and benefits. Cisco Meraki and Sonitrol intregation Wilson noted, “Cisco Meraki and Sonitrol are a winning combination and Sonitrol’s knowledgeable, courteous installation staff made the transition to our powerful, new network protection quick and easy.” Sonitrol Network Protection, powered by Cisco Meraki, can protect any size company’s network, devices, and data from daily cyber-threats and attacks. Firewall and intrusion protection The solution provides firewall protection, intrusion protection and prevention, ransom-ware protection, anti-phishing, malicious file scanning and more, thereby protecting businesses from huge monetary and data losses. It is cloud-based and managed from a single dashboard GUI, making managing ones network easy. Sonitrol Network Protection solution also provides robust business management tools: content/URL filtering, application-aware traffic control, guest WIFI access, analytics and heat mapping, and custom reporting options. The technology stays current with automatic firmware and security patches, and it works within a connected ecosystem, delivering security on Day 1 of implementation.
Round table discussion
We live in an era of Big Data. Surrounded by a flood of information, more companies are looking for ways to analyze that information (data) and systematically extract intelligence that can help them operate more efficiently and profitably. The data obsession has extended to the physical security industry, too, where large amounts of data have historically been a little-used byproduct of our access control and even video systems. But the picture is changing. We asked this week's Expert Panel Roundtable: What impact are data analytics having on the security market?
Delivering on customer expectations is a basic tenet of success in the physical security market. However, meeting expectations may be an elusive goal, whether because customer needs are not communicated effectively or because equipment doesn’t perform as promised. We asked this week’s Expert Panel Roundtable: what if a customer expects more than a security system can deliver?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Electronic security systems: Manufacturers & Suppliers
- CyberLock Electronic security systems
- ACT Electronic security systems
- Alpro Electronic security systems
- ASSA ABLOY - Aperio® Electronic security systems
- HID Electronic security systems
- Morse Watchmans Electronic security systems
- CLIQ - ASSA ABLOY Electronic security systems
- SALTO Electronic security systems
- TDSi Electronic security systems
- Dahua Technology Electronic security systems
- Corbin Russwin Electronic security systems
- AMAG Electronic security systems
- Baxall Electronic security systems
- EVVA Electronic security systems