Johnson Controls is introducing the integration of the Tyco Kantech EntraPass go Mobile App with the Tyco American Dynamics VideoEdge software, enabling remote management of access control, video and intrusion tasks for seamless, on-the-go security system operation from a mobile device. The American Dynamics VideoEdge integration with the EntraPass go Mobile App provides a single easy use interface for managing, responding and controlling aspects of your Video Management System infrastructure t...
A high majority of Americans (83%) are concerned about a criminal attack causing physical harm at large-scale events such as sporting events or concert festivals. More than one in five (22% of) Americans say they have canceled plans or considered cancelling plans to attend large-scale public events due to concerns about physical attacks and the safety of their data. Across the pond, three in 10 Britons think twice about attending large-scale events due to data or physical security issues. Alth...
FlytBase, Inc., an enterprise drone automation company, releases a white paper highlighting the factors critical to large-sale deployment of autonomous drones for security and surveillance applications. The journey from the ‘early adopter’ phase to the ‘early majority’ phase of the adoption curve for drone deployments in industrial & commercial security will require: a) reliable, off-the-shelf hardware b) cloud-based, hardware-agnostic software, and c) faster time-to...
According to Ms Regina Tsai, the Deputy General Manager of Messe Frankfurt New Era Business Media Ltd, the key for exhibitors is to tap into the diverse pool of trade visitors that will be filtering through the halls of the fair next month: “As Vietnam’s largest business platform for safety, security, fire and smart building products, the fair is able to attract the right mix of decision makers and purchasing managers from across the region’s growing vertical markets. From the...
Time for an indepth review of IFSEC 2019 in London. This show had fewer exhibitors than previous shows, and the ‘vibe’ was definitely more low-key. Fewer exhibitors meant larger aisles and plenty of room to breathe, and the slower pace provided time for exhibitors to reflect (often negatively) on the return on investment (ROI) of large trade shows. There was little buzz on the first day of the show, but spirits picked up on the second day (when, not coincidentally, some exhibitors...
IDIS announces the launch of its IDIS Dynamic Privacy Masking (IDPM) solution, a quick and efficient privacy tool, provided free of charge to its users. Continuing the company’s tradition of delivering specific solutions responsive to market conditions and concerns, IDPM offers a quick and efficient solution to the previously labor-intensive, and at time prohibitively expensive, problem of obscuring or ‘de-identifying’ persons in surveillance footage who are incidental, irrele...
HID Global®, a provider of trusted identity solutions, announces it has added FIDO2 authentication to its Crescendo smart cards, enabling them to support the FIDO Alliance industry initiative focused on standards-based ‘password-less’ sign-in. HID Global partnered with Microsoft on this effort. The company also expanded its Crescendo family with the Crescendo Key Series that brings the same FIDO2 authentication capabilities and other features of its advanced smart cards to workstations, laptops, tablets and ultra-books without requiring additional reader and driver software. Strong authentication credentials HID Global will be demonstrating the new cards and keys at Identiverse 2019 HID Global will be demonstrating the new cards and keys at Identiverse 2019, where it will collaborate with Microsoft and others in the identity industry to showcase FIDO2 authentication. “The Crescendo 2300 Series smart cards and Crescendo Key Series are part of HID’s high assurance solution that delivers end-to-end lifecycle management of strong authentication credentials as well as globally trusted digital certificates for email and document signing and encryption,” said Brad Jarvis, Vice President & Managing Director of Identity & Access Management Solutions (IAMS) with HID Global. “Customers now have two form factor options for use with our unified cloud and on-premises authentication and management system. There is more to come as we work with Microsoft and other industry players to improve how secure credentials are used in a way that emphasizes convenience and privacy.” Major industry standards The Crescendo C2300 Series smart cards and Crescendo Key Series use a common HID authentication platform that supports all major industry standards and regulatory guidelines. They create a consistent, all-in-one access and authentication experience for users, and a simplified administrator experience for deploying high-assurance authentication so they can eliminate weak passwords that are their biggest IT vulnerability. “Microsoft has been on a mission to eliminate passwords and help people protect their data and accounts from threats,” said Alex Simons, Corporate Vice President of Program Management, Microsoft Identity Division. “We are pleased to see companies like HID Global support that goal by adding FIDO2 authentication support and joining our security association.” Cloud authentication The Crescendo keys use Near Field Communications (NFC) and USB-A and C ports to deliver the same capabilities HID Global’s expanded Crescendo offering delivers a consistent set of capabilities, regardless of form factor, through its authentication platform for HID Hardware Authenticators. The Crescendo keys use Near Field Communications (NFC) and USB-A and C ports to deliver the same capabilities as the Crescendo smart cards. The cards also support HID’s Seos credential technology to enable unified enterprise badges that combine visual identification, network and cloud authentication and physical access, improving convenience for employees and contractors who can tap to open the door and tap to authenticate to Windows and cloud applications. Digital identity guidelines The cards and keys also: Provide multi-protocol support for public key infrastructure (PKI) digital certificates, Personal Identity Verification (PIV) digital signature and encryption, the Open Authentication (OATH) open reference architecture, and the emerging Fast Identity Online (FIDO) industry standard -- the backbone of Microsoft’s Windows Hello Security Key for protecting access to Windows and Azure Active Directory. Future-proof compliance with widely used finance and healthcare privacy and security regulations by leveraging native platform support for strong authentication options using emerging and broadly adopted industry Align with NIST SP800-63 Digital Identity Guidelines for achieving Authenticator Assurance Level 3 The Crescendo C2300 dual-interface smart cards and Crescendo keys are available in sample quantities now. Volume availability will commence in the third quarter of 2019. See live demonstrations at Identiverse 2019. Visit HID in booth #324 at Identiverse 2019 from June 25-28 at the Washington Hilton in Washington, D.C. for live demonstrations of its latest Crescendo solutions.
ProdataKey (PDK), an innovator of cloud-based networked and wireless access control products and services, will host the second annual Cloud Access Summit on June 13, 2019 in Salt Lake City, UT. This exclusive event for dealers, integrators and security professionals offers a day packed with educational sessions focusing on the hottest industry trends and topics related to cloud access and its many complementary technologies, presented by executives and thought leaders representing a cross-section of the security industry. Novel integration options Sponsors include Altronix, Digital Watchdog (DW), Assa Abloy and Savance Sessions will address the security of the cloud, novel integration options, applications for new technologies, the business impact of cloud security solutions and much more. Sponsors include Altronix, Digital Watchdog (DW), Assa Abloy and Savance. Conference organizer, ProdataKey, is thrilled to welcome the event’s keynote speaker Dell Loy Hansen, Founder and Chief Executive Officer of the Wasatch Group. The Wasatch Group is a fully integrated real estate development, construction, property management and guarantee capital company, with holdings that include over 16,000 apartments plus commercial properties with assets totaling $4 billion dollars and employing 900 associates. As its Founder and CEO, Mr. Hansen is uniquely qualified to address the evolving state of security technologies, in both the residential and commercial sphere, as seen from the highest levels of management. Ample networking opportunities Mr. Hansen has served on the Governor’s Board of Business and Economic Development for the state of Utah and on the committee for Utah’s Industrial Assistance Fund. His generous philanthropy benefits a wide range of causes throughout the state. The Summit will be held from 9:00 to 5:00 pm, June 13, at the prestigious Audi Executive Club in RSL Stadium located in Sandy, UT. The agenda includes the keynote address, an industry roundtable discussion, six learning sessions, complimentary luncheon, vendor expo, participant appreciation raffle and ample networking opportunities. Physical security industry Attendance is free but preregistration is required due to space limitations Attendance is free but preregistration is required due to space limitations. For out-of-town attendees, a special room rate has been negotiated at the nearby Homewood Suites by Hilton in Draper, UT. “The cloud is transforming the physical security industry and security professionals are eager to learn how to harness its power, whether that involves selling and supporting cloud systems or managing them within their own workplace. ProdataKey is proud to build upon the success of last year’s Cloud Access Summit to once again offer this free event, with the hopes that a better educated marketplace ultimately leads to a safer and more secure society,” said Jeff Perri, President of ProdataKey.
ASIS International, the association for security management professionals, announces their education lineup for Global Security Exchange (GSX) 2019, taking place 8-12 September in Chicago, IL. The impressive slate includes more than 300 sessions, organized into 17 subject matter tracks, and reinforces ASIS’ commitment to providing the most diverse, thought-provoking, educational programs for security professionals worldwide. Global security community “GSX is the premier event for education and enrichment of the global security community,” said Kenneth D. Ribler, CPP, GSX 2019 Call for Presentations Selection Committee Chair. “Each year, we work for months to find the best, most informative speakers and subject matter to present to our audience. This year is no exception, and I feel confident that we have designed the best educational program ever for our attendees.” The GSX session lineup addresses a wide variety of topics vital to today's security professional The GSX session lineup addresses a wide variety of topics vital to today's security professional, delivered in immersive formats like small group workshops, simulations, deep dives, and more. The tracks—ranging from business continuity, managing organizations, and enterprise security risk management to crime prevention, national security, and digital transformation and beyond—enable attendees to find the sessions most relevant to their own educational and organizational needs. Diverse professional backgrounds ASIS International has engaged 220+ speakers from diverse professional backgrounds to deliver the peer-driven education program. From Department of Homeland Security personnel to CSOs and CISOs, the presenters cross the range of industries and responsibilities related to security. All GSX attendees are certain to find a wide variety of relevant and valuable sessions to attend. The first announced General Session, Geopolitics and Security, will be delivered by General John Kelly, U.S. Marine Corps (RET), to kick off Military & Law Enforcement Appreciation Day on Wednesday, 11 September.
PAC & GDX, providers of access control and door entry solutions, are showcasing the range and depth of their innovative technology on Stand IF2930 at IFSEC International 2019. From a single door installation to a fully integrated network based system, the company’s extensive portfolio provides unbeatable reliability and robust functionality, at a price point that enables installation in a diverse range of residential and commercial buildings. In order to provide integrators and end users with the highest level of flexibility and ease of operation, PAC & GDX have joined forces with STid, the principal manufacturer of instinctive, contactless security technologies. NFC based readers By incorporating STid’s Bluetooth and NFC based readers with PAC or GDX controllers, a mobile phone can be used to gain access. To enjoy all the benefits of a handsfree option, all an individual has to do is tap their phone twice and the Bluetooth signal is sent to the reader to unlock a door. By downloading the STid app a virtual credential can be configured in a smartphone wallet By downloading the STid app a virtual credential can be configured in a smartphone wallet, allowing the user to have multiple virtual ‘keys’ for different areas or sites. The system can also be configured to use proximity based near field communication (NFC) instead of Bluetooth, or a combination of the two. Furthermore, it is available with a PAC or PAC 64 output and, when using a PAC 512 or PAC 212 access controller, two readers can be connected to provide true read in/out from a single channel. Access control systems Also on display is the PAC Residential Cloud solution, which leads the way in allowing organizations to remotely manage and monitor their access control systems in a secure, modern and cloud based environment. Users can address technical issues, deal with key fob management, view status, set and unset a system, and gain access to an event log more easily than ever before – all from a remote location. Various site communication options are available including PSTN, GSM and GPRS and it can be configured and managed via a smartphone, tablet or PC. At IFSEC PAC is demonstrating how Residential Cloud can be integrated with 3xLOGIC cameras to provide a fully hosted solution, which is perfect for the residential sector. This system allows designated personnel to be notified if, for example, a door is forced or left open. Network switches By sending an alarm to the camera, it starts to record and transmits images to a mobile device via a push notification. This allows the system to provide vital information that elicits a fast response and immediate action. With an optional camera, a backlight LED to provide clear visitor images in low light levels Sharing the limelight with STid and Residential Cloud is GDX7 – a next generation IP based door entry system that offers integrated access control for up to 1,000 keyholders using a standard two-core cable. With an optional camera, a backlight LED to provide clear visitor images in low light levels, and an inbuilt reader, GDX7 has an incredibly high level of functionality and enables integrators to install an IP system without being skilled in IT or familiar with network switches. Identification devices The GDX7 door entry panel can be provided with multiple button options, including those that meet the requirements of the Equality Act, and its readers and identification devices have also been approved by Secured by Design – a police service initiative that aims to improve the security of buildings. Already a huge success, GDX7 has a new seven-inch apartment station and a new landing card, which enables it to provide up to 96 handset connections. It too has recently been augmented with STid integration providing property owners, engineers or contractors with a flexible way of gaining access to remote properties. “PAC & GDX are driven by constant innovation and the desire to push the boundaries of what’s possible with access control,” commented David Hughes, the company’s global product manager. “We also pride ourselves on our customer service and technical support, which includes the provision of a new online training platform that offers a great way to get the most out our products.”
Genetec Inc., a provider of unified security, public safety, operations, and business intelligence solutions, announces it will display its flagship security platform, Security Centre 5.8, and its comprehensive suite of new features while exhibiting at IFSEC International 2019. This will be the first time the new functionality will have been displayed in Europe, taking place at ExCeL London from 18-20 June (Stand IF710). The unified platform has undergone a significant update recently, providing customizable live dashboards, enhanced privacy protection features, a brand-new mobile app, and new functionalities that help users monitor the health of their security system and ensure compliance with cybersecurity best practices. Version 5.8’s new features will also ensure that operators can optimize their physical security environment while benefiting from greater visibility into their operations. Monitor security system Security Center 5.8 enables operators to create user-friendly, highly customizable dashboards, presenting critical information, including real-time data from the scene of an ongoing incident. These dashboards show live video feeds from the exact locations where an alarm may have been triggered and provides users with insightful reports and charts depending on their interest area. This app allows users to record incidents, access nearby video and access control A key new feature of the Security Center interface is the ability to monitor a security system while on the go - through a mobile app which gives operators a valuable new asset in the security environment. This app allows users to record incidents, access nearby video and access control, as well as sharing video from their phones to Security Center. This provides the user with actionable information, that can be shared across the whole security team – allowing them to respond effectively to any situation that might occur. Increase local awareness Security Center 5.8 also provides a wide range of other valuable features: Video (live and recorded playback, PTZ controls, bookmarking, time - and event-based reports); Access control (check door status, lock/unlock doors, override schedule, set maintenance mode etc.); ALPR (live reads/hits, plate reports, and access hotlists); Interactive maps that increase local awareness and put critical information much closer to the operators, enabling them to easily visualize their environment and respond quickly. Built-in messaging allows for instantaneous sharing of information between operators and personnel in the field. This extends to sharing live or recorded video clips, text messages and other security information.
PSA, the security and systems integrator consortium, announces the call for presentations for PSA TEC 2020 is open. Sessions will be selected that serve a variety of disciplines and focus on emerging technologies, critical issues in the industry and tool development to augment attendees’ knowledge base needed to drive the industry forward. TEC, presented by PSA, is the premier education and networking event for all professional systems integrators in the security and audio-visual markets. TEC features education and certification programs, networking, and dedicated exhibit hours designed to advance the skills and expertise of industry professionals nationwide. Professional systems integrators This premier training venue is open to all industry professionals and is designed to meet the educational needs of all employees within an integrator’s organization. TEC 2020 will be held at the Sheraton Downtown Denver in Denver, CO on April 20-23, 2020. PSA is accepting submissions to complete the education program with content that provides knowledge PSA is accepting submissions to complete the education program with content that provides knowledge for professional systems integrators in the physical security and pro-AV markets or sessions that will help advance their personal skillsets within their professional disciplines. Topics represented at TEC include cybersecurity, leadership/management, managed services, marketing, operations, procurement, sales and technical. General education sessions Proposals are welcome for both certification programs and general education sessions for the security and pro-AV markets. All sessions must be unbiased with no brand or product emphasis and minimize commercial references and overt branding. Submissions are evaluated based on topic relevance, speaker expertise and originality of the content. Additional guidelines are provided in the call for presentations submission process. Accepted and approved presenters will receive complimentary registration to TEC 2020 and will have the opportunity to solidify their reputation as an industry resource and subject matter expert while expanding their own professional network and gaining access to strategic partnerships. PSA does not pay honoraria or expenses for accepted proposals.
In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organization, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR world. Large cloud environment But modern applications are difficult to secure. SaaS based, web, mobile, or custom made all work on different platforms and frameworks. It’s a headache managing all the APIs needed to automate and sync tools. This introduces risk. The greater the number of apps the broader the attack surface and therefore the greater the chance there will be blind posts. Keeping up to date with updates and new security policies is never easy There are also added hazards. Applications are always changing. Keeping up to date with updates and new security policies is never easy, but especially hard in a large cloud environment. Failure to adopt changes puts the organization and customers at further risk. But the biggest obstacle is keeping applications and APIs out of harm’s way. It’s a near on impossible task when attack methods and sources are constantly changing. More advanced threats To be specific there are four emerging challenges when it comes to protecting apps. Firstly, managing the good and the bad bots and spotting which is which, secondly securing APIs as IoT adoption intensifies, thirdly the relationship between securing apps and DevOps and ensuring ownership of security, and finally denial of service attacks that use newer tactics such as brute force. Basic security hygiene dictates that security teams refer to the OWASP Top 10. It’s considered the ‘ten commandments’ in security circles, providing a starting point for ensuring the most common threats and vulnerabilities are managed, detected and mitigated. Web Application Firewalls also come into the fray with guidance on testing for the ways hackers exploit vulnerabilities. However, though the basics are good to have in place, there are always more advanced threats to take care of. Bots being a big one. Bot management The more sophisticated bots will go as far as to mimic human behaviorAstonishingly about half of internet traffic is bot generated. Half of it is from bad bots. Discerning the good from the bad isn’t easy though and explains why around 80% of organizations can’t make a clear distinction between the two. Bad bots can do a lot of damage like take over user accounts and payment information, scrape confidential data, or hold up inventory and skew marketing metrics. The more sophisticated bots will go as far as to mimic human behavior and bypass tools like CAPTCHA and even device fingerprinting based protection ineffective. Securing APIs Then there’s the complications derived from machine-to-machine and internet of things (IoT) communications. The more integrated ‘things’, the more data there is, the more events there are report on, and the more activity there is reliant on APIs to make the ‘things’ useful and agile. That’s what makes them a target and the threats to API vulnerabilities include injections, protocol attacks, parameter manipulations, invalidated redirects and bot attacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks Denial of service (DoS) You might think there’s little to add to the swathes of denial of service warnings. Yet when businesses are still being targeted and feeling the ill effects it’s worth mentioning again that different forms of application-layer DoS attacks are still very effective at bringing application services down. Even the greatest application protection is worthless if the service itself can be knocked down This includes HTTP/S floods, low and slow attacks (famous examples being Slowloris, LOIC, Torshammer), dynamic IP attacks, buffer overflow, Brute Force attacks and more. The IoT botnets are the culprits and have made application-layer attacks so popular that they have become the preferred DDoS attack vector. Even the greatest application protection is worthless if the service itself can be knocked down. Continuous security It may seem easy to say but for modern DevOps, agility is valued at the expense of security. We see time and again examples of where development and roll-out methodologies, such as continuous delivery, mean applications are exposed to threats each time they are modified. There’s no doubt it is extremely difficult to maintain a valid security policy and protect sensitive data in dynamic conditions without creating a high number of false positives. But we now find that this task has gone way beyond the capability of humans. Organizations now need machine-learning based solutions that map application resources, analyse possible threats, and create and optimise security policies in real time. Reaching this level in security planning should be a big wake-up call that security automation is an essential not a nice to have. Running security plans The board needs to know that investment is critical to protect their profits It’s critical that the security solution your company adopts protects applications on all platforms, against all attacks, through all the channels and at all times. The board needs to know that investment is critical to protect their profits. As such there are six things they need to know: Application security solutions must encompass web and mobile apps, as well as APIs. Bot management solutions need to overcome the most sophisticated bot attacks. DDoS mitigation must be an essential and integrated part of application security solutions. A future-proof solution must protect containerized applications, severless functions, and integrate with automation, provisioning and orchestration tools. To keep up with continuous application delivery, security protections must adapt in real time. A fully managed service should be considered to remove complexity and minimise resources. No amount of human power will beat the bots. That last point is the most critical. Skill is essential in designing and running security plans and policies that work. But the plans can’t be executed without automated tools. There are just too many decisions to make in a split second. Combining both is the path to an effective app protection strategy and a stronger brand to boot.
ISC West continues to innovate and adapt to the changing needs of the security marketplace. In 2019, there will be 200 new exhibitors, 100 new speakers and an expanding mix of attendees that includes more end users and international attendees. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas. Among the more than 200 new exhibitors on the show floor will be Dell Technologies, Resideo, SAST (a Bosch IoT startup), Belkin International, NetApp, Lenovo, Kingston Technology and many others. The event continues to see more and more solutions in the area of IoT/connected security, a surge in barrier/bollards exhibitors, an increased number of start-up companies, and an emphasis this year on stadium/major events security. Plus, the new exhibit area of ISC West, Venetian Ballroom, will include a mix of solutions from mid-sized domestic and international companies, and is the home of the Emerging Technology Zone – back for its second year with 50-plus start-up companies expected. The International Security Conference & Exposition (ISC West) will be held April 10-12 at the Sands Expo in Las Vegas “ISC West is no longer just about video cameras, access control systems and alarms,” says Will Wise, Group Vice President, Security Portfolio for Reed Exhibitions, which produces and manages ISC West. Embracing and stimulating the market dynamic of comprehensive security for a safer, connected world, solutions on display at the show reflect convergence across physical security, IT (information technology) and OT (operational technology). The ISC West expo floor includes specialized featured areas such Connected Home, Public Safety & Security, Connected Security, Unmanned Security Expo and the Emerging Technology Zone. Plus, complimentary education sessions in the Unmanned Security Expo theatre will include topics such as drones, counter-drone solutions, ground robotics and regulations/policies that support autonomous technology. This year’s event will feature more than 1,000 products and brands covering everything from video surveillance, access control and alarms/alerts, to IoT, IT/cybersecurity convergence, AI, embedded systems, drones and robotics, smart homes, smart cities, public safety and more. The ISC West expo floor includes specialized featured areas such Connected Home and the Emerging Technology Zone Elevating the Keynote Series Over the past few years, ISC West has elevated its Keynote Series (open to all attendee types) to include more speakers and dynamic content covering relevant topics. Attendees should be sure to head to the Keynote room Wednesday and Thursday mornings at 8:30 a.m. before the expo floor opens at 10 a.m. Relating to attendance, ISC West continues to diversify and grow the attendee universe by attracting additional enterprise government end-users across physical and IT/OT responsibilities. The show also continues to attract and grow the channel audience, and there will be an increasing number of International attendees. “Years ago, ISC West was known exclusively as a dealer/integrator/installer show, but not anymore,” says Wise. “Today, the demographic mix continues to evolve as the event diversifies its product and educational offerings, embracing the current market reality of collaboration among integrators/dealers/installers, end-user decision-makers, and public safety and security professionals.” When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities Within the SIA Education@ISC West conference program, there are over 100 new speakers. Through ISC West’s strong partnership with the Security Industry Association (SIA, the Premier Sponsor of ISC), the SIA Education@ISC West program has expanded and become increasingly dynamic and diverse over the last three years. In addition, ISC West and SIA are hosting a Women in Security breakfast on Friday morning April 12th. Women in Security is a new track for the education program. “Our attendance data reflects the demand for a mix of physical security integrator and end-user content, a balance of technical and management/strategic topics, and diverse topics incorporating IoT and cybersecurity/physical security convergence, and analytics expertise,” says Wise. “Last year was a record year for conference program attendance, and 2019 will yet again set new benchmarks.” Mobile apps, information desks and ease of registration ISC West is also focusing on the attendee experience. Need advice on what exhibitors are a fit for your business needs and interests? The Information Desk adjacent to the main expo entrance will provide customized recommendations based on the information attendees provided during the registration process. Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website Attendees can download the official ISC West mobile app and create a MyShow account through the ISC West website to research exhibitors and product categories, receive exhibitor recommendations that best fit business needs, review complimentary educational opportunities as well as 85-plus sessions from the paid SIA Education@ISC program. There are many networking opportunities being offered at the show this year. When planning for the show, be sure to view the list of special events and take advantage of the additional connection-making opportunities. Whether attendees want to network with peers or customers at an awards ceremony (Sammy Awards, Fast 50, New Product Showcase Awards), Charity event (AIREF Golf Classic, Mission 500 Security 5K-2K Run/Walk), or an industry party (SIA Market Leaders Reception, ISC West Customer Appreciation Party at Tao), there are a variety of special events offered, all designed to help you make new connections. Make sure to check out the ISC West website for all the Special Events taking place at ISC West.
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilized by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing An Effective Action Plan When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilizing doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organize a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing Public Areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install Guard Booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
Krowd is an app that connects people together based on geography; that is, if they are at the same place at the same time. Users sign into the app using the local WiFi, identify themselves by username, and are placed immediately in a group chat comprising anyone else at the location who has signed into the app. An enhancement of the Krowd app, known as Krowdsafe, leverages the technology to achieve and promote security and safety. Specifically, Krowdsafe enables users to interact directly with security personnel at a public place to report any crimes or security infractions and to enable rapid response. Think of it as “crowdsourcing” security – the app provides more eyes and ears to keep a venue safer. In effect, it enables each of its users to be an extension of the security presence at a venue or event. Krowdsafe improves crowd resilience. “Crowdsourcing” security – the app provides more eyes and ears to keep a venue safer Krowdsafe security app Krowdsafe also opens a channel of communication for the security team to provide ad-hoc security information reminders or messages. Krowdsafe can be used at a variety of venues, including stadiums, transport hubs, office blocks, retail malls, college campus and major events organizers. The app does not access identities, violate privacy, or track the movements of users. Other app users only know the information fellow users disclose. Still, group chats, one-on-one engagement, and other social media interactions can ensue, whether about a favorite soccer team or the excitement of a rock concert. The system fosters digital engagement that centers around a physical space. Krowdsafe applies those capabilities to promoting better security. Enhancing crowd safety and management The elements of Krowdsafe beat out 67 competitors to win the Defense & Security Accelerator Competition to Innovate Crowd Safety, launched by the UK Home office after terror events in 2017. Key areas of interest in the competition were to improve the detection of threats from explosives and weapons within a range of crowded places with high footfall and so reduce the chance of future attacks. Krowdsafe provides a prioritized, readily accessible and simple way for members of a crowd to communicate with a security team charged with keeping them safe. The £250,000 government award has helped the product move forward commercially at a faster pace. Krowdsafe app does not access identities, violate privacy, or track the movements of users Krowdsafe users can tap a red button, prominent on the Krowd app, that says “Report.” They may then choose from a listing of common threat types – from suspicious activity or unattended activity to medical emergency or fire services. The list is configurable by venue and corresponds to any specific threat models. The list corresponds to the nature of any situation security wants to address, such as “anti-social behavior” at a soccer game. Users in the crowd can anonymously report racist chanting, for example. In a children’s sporting event, the app can be used to facilitate lost-and-found children. If a child gets lost, a user can share a photo with the security team, who can alert the “public” (other Krowdsafe users) and find the child within minutes or seconds. Encrypted identifier code A user taps the “Report” button, selects an issue, and an alert goes directly to the security team A user taps the “Report” button, selects an issue, and an alert goes directly to the security team, who can respond because they have the encrypted identifier code from which the message came. For that point, the security team communicates one-on-one with the user, who can then choose to share their current location with the security team to facilitate response. (The “legitimate interest” of knowing the location negates any privacy concerns.) Once location is enabled, the security team can follow the precise positioning of threats on a map, using GPS and other technologies, or even on a three-dimensional digital map of a multi-story building. Another security benefit of Krowdsafe is prevention. Event organizers and venue managers can promote the use of Krowdsafe on posters or in announcements throughout the venue. Additional eyes and ears are the equivalent of CCTV coverage on every inch of a venue and use of the system makes the environment more hostile to mischievous, malicious and/or terrorist activity. In effect, bad guys will go somewhere else. Enhancement to Krowd app Krowdsafe is an enhancement to the Krowd app, which has been around for a couple of years and is available in app stores for iOS and Android. The app approximates in the digital world the experience of being a stranger in the crowd in the real world. Users can join a conversation based on their username, and then disclose to the crowd whatever they wish (or not). Event managers/organizers can promote hashtags to help identify others in the crowd (such as #ManUnited to identify fans of the same soccer team). In general, users can identify themselves (voluntarily) according to common interests using hashtags. “Krowd is a group chat that connects people together at the same place at the same time in a group, but without anyone having to disclose personal information,” says Geoff Revill, Managing Director, Krowdthink Ltd. “You have a digital presence in the same place with other people at the same time.” Wireless connectivity Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue Users connect initially into the system through WiFi, access to which serves to approximate presence at a venue. Once someone signs in, information about them is merely a grouping of “hash” numbers, which are used to identify them as they communicate with others in the location. However, the “hashing” cannot be hacked to find a user’s location, thus ensuring greater privacy. Because Krowd does not collect personal data (which is a revenue source for most social media companies), the company generates revenue by providing the service to venue owners who wish to interact with and manage a crowd. Data security Location data is considered sensitive under General Data Protection Regulation (GDPR), and tracking locations can help to identify where someone lives, works, who they associate with, etc. By not tracking location, Krowd avoids the related privacy issues. After initially signing in on WiFi, Krowd communications can also use 2G, 3G and other cellular networks in addition to WiFi. Addressing privacy concerns is essential to encouraging involvement in the Krowd app, and in Krowdsafe. “If you want people to participate in keeping the crowd safe, you have to get their trust and respect them, that’s a building block behind the behavioral science,” says Revill. By not tracking location, Krowd avoids the related privacy issues Privacy protection Because Krowd users remain anonymous (except for the information they choose to share), user data is not collected (and/or sold or used for future marketing purposes). Krowd’s paying customers are event venues and public places that provide the Krowd service and can promote their commercial messages or provide other information to their populations while on site. Krowdsafe can provide immediate security benefits to a venue. Even if only 25 staff members use the app in a given location, for example, that’s 25 more sets of eyes and ears to help the security department. In a retail mall, if the staffs of 200 tenant businesses use the app, that’s another 500 or so people watching out for security. Among the general public, use of the app can be promoted in customer newsletters, or by posting group discussions on big screens around a venue. Wide marketing scope It enables members of a crowd to report any broken doors, water leaks or blocked toilets Security is a secondary benefit for some Krowd users, who are drawn to the app because of marketing opportunities, such as the ability to provide discounts or promotional offers to customers while they are on site. The app also encourages social media interaction, while maintaining the venue’s ability to “manage” the crowd by moderating any discussions. The Krowd app also provides management benefits to a venue. For example, it enables members of a crowd to report any broken doors, water leaks or blocked toilets. In general, the app helps to promote a better brand experience for the customer. Incident management One of the UK government’s concerns about Krowdsafe was its possible use by terrorists or other to cause incidents in a public venue. Think of the case of Olly Murs, a U.K. singer, whose mistaken tweets about hearing gunshots caused a brief panic at a department store on a busy shopping day. Might Krowd be uses similarly by a terrorist or other evil-doer to cause chaos or a distraction? No, says Revill, who points to a higher level of control over content exchanged in Krowd versus Twitter, for example. The security team can censor content or limit its propagation. They can also disable or block a user from communicating on the app. Messages containing dangerous or troubling content, such as racist terms, can trigger alerts to enable security teams to respond quickly.
Facial recognition has seen huge breakthroughs since the U.S. National Institute of Standards and Technology (NIST) first began testing in 2010. Accuracy has seen massive gains, especially from 2013-2018. In the 2018 test, the most accurate algorithm was 20 times more accurate than the 2013 equivalent. Essentially, 95 percent of the matches that failed in 2013 now yield correct results. Compare that to 2010-2013, when the most accurate algorithm reduced its error rate by 30 percent. This reduction in error rates since 2013 is due to wholesale replacement of the old algorithms with new ones based on deep convolutional neural networks — completely revolutionizing the technology. Optimal recognition results SAFR says it delivers optimal recognition results with 99.86 percent accuracy in under 100 milliseconds One entrant in the newly energized market is RealNetworks, whose SAFR for Security is an AI-based facial recognition solution for live video that integrates video management system (VMS) solutions. With 24/7 monitoring, SAFR detects and matches millions of faces accurately in real time, enabling teams to manage a watchlist across any number of video feeds. SAFR says it delivers optimal recognition results with 99.86 percent accuracy in under 100 milliseconds, even in real-world conditions where faces are in motion, at different angles, under poor lighting, or partially obscured. SAFR builds on RealNetworks’ 23-year history in video technologies. Launched in July 2018, SAFR — secure, accurate facial recognition — is enabling new applications for security, convenience, and analytics. Create security responses “We seek to be the world’s most trusted facial recognition platform and are delighted to partner with customers in the security industry and elsewhere to shape a more secure, convenient future worldwide,” says Dan Grimm, Vice President of Computer Vision and General Manager of SAFR at RealNetworks. “Security professionals are asked to keep us safe 24/7, monitoring a burgeoning number of cameras, and we help make them more effective.” SAFR targets facial recognition for live video, identifying camera-unaware faces moving in real-world conditions. In the April 2019 NIST results, SAFR tested as the fastest and most compact solution among algorithms with less than 0.022 False Non-Match Rate — 62 percent faster than the average speed, according to the company. SAFR now provides capabilities such as live video overlays alerting security professionals to events in real time, automatic bookmarks with rich metadata for investigative work, and alerts that can be customized to create security responses. SAFR uses one-sixth the compute power of competing facial recognition solutions Facial recognition algorithms Five years ago, facial recognition algorithms would struggle to match forward-facing people from still images, let alone camera-unaware moving faces from live video with variations in rotation and tilt. SAFR says they have achieved a balance of accuracy and performance for live video. A contributor to this accuracy is consistency across a range of skin tones. The algorithm was trained on a highly diverse global set of over 10 million non-simulated real-world faces. SAFR was optimized for speed and can sample a face multiple times during the same period of time as other algorithms, subsequently increasing its accuracy. SAFR achieves the performance through edge processing. Distributed architecture enables efficient bandwidth consumption, reducing the roundtrip latency of facial recognition speed to under 100 milliseconds. The savings lower total cost of ownership (TCO): SAFR uses one-sixth the compute power of competing facial recognition solutions, equating to $500,000 or so in savings on a 250-camera deployment. Integrated experience SAFR also uses off-the-shelf hardware and is optimized to leverage inexpensive GPUs SAFR also uses off-the-shelf hardware and is optimized to leverage inexpensive GPUs. SAFR can be deployed on premises or in the cloud, and supports Windows, Linux, macOS, iOS, and Android. When SAFR is paired with a VMS, such as Milestone XProtect or Genetec Security Center, the integrated experience includes 24/7 monitoring to detect and match faces in real-time. Features include live video overlays within the VMS to identify strangers, threats, concerns, unrecognized persons, VIPs, employees, or other tagged individuals in live video. Real-time alerts can be customized for when persons of interest appear on a video camera feed. Additionally, automatic bookmarks with rich metadata make for easier investigative review of security footage. Facial recognition technology is increasingly in demand to improve safety across various industry verticals. Better customer experience Large enterprises with high-visitor flows and heightened security — such as transportation hubs, stadiums, universities, and hospitals — need to know in real time when persons of interest or those on watchlists appear on camera. Sports stadiums could apply facial recognition to deny entry to banned patrons, locate lost children, or recognize VIPs to deliver a better customer experience. Hospitals need access control to restricted areas and pharmaceutical storage closets Hospitals need access control to restricted areas and pharmaceutical storage closets. Airports and transit centers value traffic flows, demographic composition, and dwell times to help improve scheduling. SAFR for Security is available worldwide, and the company partners with VMS providers such as Milestone, Genetec, Digifort, and IPConfigure by Paliton Networks. They are actively working to support additional VMS solutions and have sales teams located in major metropolitan cities around the world. Security professionals “The job of the security professional is critical in today’s world,” says Grimm. “SAFR for Security helps mitigate the challenges of the important work security professionals do to keep us all safe.” In designing and developing SAFR, RealNetworks considered diversity and the uniqueness of each person; Grimm says their massive global training data set is a competitive advantage. SAFR is designed with privacy in mind. All facial images and signatures are AES-256 encrypted in transit or at rest. “SAFR is powerful enterprise-grade software that is continuously improving through innovation and many years of expertise,” says Grimm.
Unmanned aerial vehicles (UAVs), or drones, present a range of threats, from the careless and clueless to the criminal. While many incidents may seem harmless, the threat to any location at any time depends on a range of factors. Drones are inexpensive for criminals to buy or make, and there are continuously improving battery, airspeed, and payload capabilities. UAVs can also fly without an RF signal to jam or hack. Fortunately, sensor technologies including radar are available for security agencies and personnel to protect assets and the public. Radio-Wave Signals Radar works as a deterrent by sending out a radio-wave signal using a transmitter antenna, and a small portion of that signal reflects off objects in its path and returns to a receiver antenna. The highest performing radars use an antenna technology called Active Electronically Scanning Array (AESA), which enables all-electronic reconfiguration of the antennas. When an AESA radar detects an object, it can ‘focus’ its antennas to track the object, in much the same way as the zoom on a camera does. Multiple objects can be tracked while continuing to scan. Kirkland, WA-based Echodyne offers a radar product that brings these ESA capabilities to non-military security applications at commercial price points. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array Echodyne’s ESA Radar Echodyne says they are reinventing radar price-performance for security applications in the ground (people, vehicles) or air (counter-UAS) domains. Combining proprietary hardware with intelligent software, Echodyne produces a compact, solid-state, electronically scanning array (ESA) radar that is affordable for commercial, law enforcement, and governmental customers. The company is backed by high profile investors, including Bill Gates, Madrona Venture Group, Vulcan Capital, NEA, and Lux Capital. “Radar is a sensor,” says Leo McCloskey, Echodyne VP Marketing. “It is most applicable when security professionals can both understand its capabilities and define risk assessment and deployment requirements that call for those capabilities. Our customers are primarily security system integrators and consultancies, which integrate the performance of radar into a sensor array that meets mission requirements.” Radar Technology For Border Surveillance Echodyne was selected by the Science and Technology Directorate of the Department of Homeland Security (DHS) for its Silicon Valley Innovation Program (SVIP) to demonstrate the performance of its radar technology for border surveillance applications. The radar was deployed both in fixed remote surveillance towers and as a lightweight rapid deployment kit for field agents. Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities. “We set out to build the world’s best compact, solid-state ESA radar sensor, and we are demonstrating that we’ve reached that objective,” says McCloskey. “We’re excited to introduce these capabilities for other security applications.” Able to surveil ground and air domains, the radar combines versatility and commercial price with surveillance capabilities MESA Technology Echodyne’s proprietary technology provides a small true electronically scanning array (ESA) radar. Unlike expensive Active ESA (AESA) phased array radars, MESA requires no physical phase shifters, thus reducing the cost, size, weight, and power by several orders of magnitude while maintaining all the benefits of fast ESA radar. Echodyne combines its MESA technology with an intelligent software suite, Acuity, to produce a configurable, software-defined radar for commercial, law enforcement, and governmental security applications. The capability is also useful for temporary events such as rallies and marathons, and many other market applications “Technology seems to make everything more available to more people over time,” says McCloskey. “What is a retail product today will be a purchased self-assembly kit tomorrow and an improvised self-made drone the following day. The Federal Aviation Administration (FAA) is diligently at work on creating rules for safe UAV operation, though any final rules remain some distance off. As drone volumes increase, delineating friend from foe in the airspace requires clear legal and regulatory frameworks, which are nascent but would help distinguish the threat of nuisance flyers from illegal overflight.” Radar Sensor For Security Applications “Detecting and tracking airspace objects of interest is imperative for airports, chemical plants, oil and gas installations, refineries, water and energy utilities, stadiums and other public spaces”, says McCloskey. The capability is also useful for temporary events such as rallies and marathons, and many other market applications. “As with any product, our applicability will depend on variables like location, terrain, risk assessment, and existing security technologies,” says McCloskey. “Our mission is to deliver the very best radar sensor for security applications.”
Wintec (The Waikato Institute of Technology), established in 1924 is a major New Zealand Government-funded tertiary institution, which has three Hamilton campuses; a city site overlooking the central business district, Avalon campus on the northern outskirts of the city, and a horticultural campus at Hamilton Gardens. In addition, it has regional operations at Te Kuiti and Thames and also an office in Beijing. The Avalon campus, a ten-minute drive from the city, is home to specialist trades training facilities, a state-of the-art sport and exercise complex and custom designed facilities for the School of International Tourism, Hospitality and Events. The third Hamilton campus, the Horticultural Education Centre, is situated amidst the 58 hectares of Hamilton Gardens. On-Line distance education Wintec’s programs and qualifications are nationally and internationally recognized Wintec is one of the largest institutes of technology in New Zealand, and has more than 35,000 full-time and part-time students, more than 500 full and part time staff and eleven schools within its academic faculty. International enrolments exceed 1000 from 47 countries. A range of student services provide its domestic and international students with a high level of support so they enjoy a positive, safe and secure study experience. Wintec’s programs and qualifications are nationally and internationally recognized and its degrees have equal status to those from universities. The degree programs include Media Arts, Midwifery, Nursing, Occupational Therapy, Early Childhood Education, Business Studies, Engineering, Technology, Information Technology, and Sport and Exercise Science and a wide range of full and part time courses for those already in the workforce. Wintec is also recognized nationally in the delivery of on-line distance education for those unable to attend regular classes for reasons of geographical access or other constraints. Electronically controlled doors Wintec strives for a balance of unobtrusive yet robust control of site activity, essential for maintaining an open campus environment. Shane Goodall, Security Manager at Wintec, describes the approach to security as highly proactive and collaborative: “by focusing on preventing issues arising, we now have a minimal policing role and the crime resolution rate is high”. This environment is underpinned by Gallagher’s security system, a core access control, intruder alarms and integration platform. Wintec first installed the Gallagher system (formerly Cardax FT) in 1999 and has since migrated this legacy system to Gallagher’s latest security technology platform. Security for the entire organization, including satellite sites, is managed and monitored centrally from Wintec’s single Gallagher security system. Since initial installation, Wintec’s Gallagher access control system has grown from 7 to 240 electronically controlled doors in 2009, with another 40 planned - testimony to the scalability and flexibility of the system. Network friendly system communications The organization first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras Wintec has integrated its imaging system to the Gallagher system delivering a visual record which can be matched to the audit trail of events in Gallagher Command Centre software. The organization first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras (both analog and IP). Another compelling aspect of the system for Wintec is the scalability and TCP/IP network friendly system communications. As well as monitoring and controlling staff and student access, equipment including computers, TVs, printers, audio visual resources at Wintec are also monitored through the Gallagher system. The ‘Gallagher Hub’, a new computer laboratory offering comprehensive IT resources is open 24 hours. The Hub contains 125 workstations, and there are plans to extend that number. Active monitoring of equipment though the Gallagher system has significantly reduced theft. Students and staff have scheduled access to shared IT resources, classrooms and lecture theatres. Manage cardholder data ‘Cardholder Import’, an XML Interface, supports the importation of cardholder data including course enrolments from their student record system to Gallagher Command Centre. Shane comments, “Student card issuing is an automated process which is enrollment-driven – a student’s access privileges are assigned according to their enrolled courses.” “To implement this, we defined a rules-based allocation of access groups in the Gallagher system using the XML interface. The interface is ‘live’ so that changes in the student enrolments database are immediately reflected in the Gallagher system. The student’s updated access privileges come into effect without delay.” Staff that interact directly with students are now empowered to manage cardholder data enabling the security team to focus on security. Students and staff utilize Mifare SmartCard functionality extensively, embracing them as an integral multiapplication tool in their modern educational environment – SmartCards are used to issue resources from the library and as pre-stored value cards enabling prepaid printing and photocopying. In the near future they will also be used in Wintec’s Pay and Display car-park and potentially as passes onto city council buses. Electronic access control At Wintec, security is not viewed as a discrete functional activity relegated to security staff only Stewart Brougham, Director of Internationalisation at Wintec, says students have given very positive feedback about their ID cards. In particular, the ability to verify the identity of staff members from their ID access cards provides peace of mind for students. The end result is a people-friendly campus. Future enhancements of Wintec’s security may include the utilization of the CommCard solution from Gallagher to manage and monitor access to student accommodation. CommCard is a unique high level integration between the Gallagher Command Centre software and Salto off-line readers, delivering offline, non-monitored electronic access control for lower security doors. An overriding philosophy of collaboration has seen Wintec take a lateral approach to security, the value of which many organizations have yet to realize. At Wintec, security is not viewed as a discrete functional activity relegated to security staff only. The ongoing management of security is a joint effort between the security services team and the information services team. Increasing operational security The security services team manages the Gallagher system while IT looks after back end functions such as installation on the network and backup. Wintec has leveraged the convergence of security (access control) and other operational business functions recognizing the tremendous potential for reducing risk and increasing operational security, safety, performance and efficiency. Looking beyond simply controlling and monitoring who goes where and when on site, Wintec is harnessing the reporting capabilities of Gallagher Command Centre to meet regulatory requirements. The Gallagher system enables the institution to report on actual space utilization (not just space booking). Decisions are made for best use, and also to substantiate funding, based on these reports. “The key to space utilization reporting are the frequency of reporting and the integrity and reliability of information,” states Stewart Brougham. It’s a national issue for educational institutes in New Zealand. Extending external partnerships “For Wintec, reporting is about ensuring compliance with regulatory requirements and is also a staff time management issue – reducing the administration load on lecturers, who would otherwise have to track student attendance manually.” Brian Fleming, Director of Gallagher Channel Partner, Concord Technologies, sites this lateral application of a security system as key to maximizing the value of Gallagher to Wintec. Wintec has a strong relationship with Gallagher in the ongoing development of its technologies This collaborative philosophy extends to proactive external partnerships with their Gallagher Channel Partner, Concord Technologies, for the installation and maintenance of the Gallagher system, and with system designer and manufacturer, Gallagher. Having signed an agreement to continue in the capacity of a Gallagher field test site, Wintec has a strong relationship with Gallagher in the ongoing development of its technologies. Wintec’s success, in the last 5 years, as a test site reflects the competence of both its IT and security staff and the institute’s commitment to edge student services. Minimal training has been required. Software maintenance agreement There is open communication and information sharing between all internal and external parties involved, which means any issues that arise can be quickly addressed. Wintec has committed to a site maintenance plan with their security partner, Concord Technologies. The plan incorporates both software and hardware maintenance to ensure the system is maintained on the latest operating platforms within a known cost structure. A Software Maintenance Agreement also ensures enhanced ongoing system performance and reliability of the Gallagher system. Acknowledgements Gallagher would like to acknowledge the support of Wintec and security partner, Concord, with the development of this in-site study. Gallagher would also like to particularly acknowledge and thank Shane Goodall for the pivotal role he plays in championing the collaboration of these parties and for his outstanding support of the Northern Region Cardax User Group (NZ) in the capacity of Chairman of the group.
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, announces yet another successful apprehension, courtesy of sister company, Sonitrol’s, incredibly effective TotalGuard technology. Sonitrol of Lexington, Kentucky performed the system installation and does on-going 24/7/365 monitoring. Brandenburg Auto is a small, family-owned and operated auto repair shop in Lexington, Kentucky, run by Jack Brandenburg and his son, Jack Jr. The business had recently experienced a break-in, during which the phone line was cut prior to entry, rendering their previous security system incapable of sending alerts when the intrusion occurred. Installing entire system Brandenburg Senior was initially reluctant to deploy the new Sonitrol TotalGuard solution, as he felt they already had cameras and he was concerned because the new technology would not have a keypad. However, after Danny Goodpaster, Sonitrol Security Consultant, demonstrated the technology and showed him a video of an actual break-in resulting in an apprehension, both father and son decided to move forward. Sonitrol staff had implemented a process of pre-deploying the TotalGuard devices in their offices Sonitrol scheduled the installation with an expedited timeline considering the recent loss the business had experienced. The technicians actually finished a previous job earlier than expected, which allowed them to come to the Brandenburg facility one day earlier than planned. Prior to installation, Sonitrol staff had implemented a process of pre-deploying the TotalGuard devices in their offices before arriving on site, which allowed the team to install the entire system in less than half a day. Scheduled installation This was quite a fortuitous turn of events, because that very night, the night before the original scheduled installation, an intruder cut the phone line again and entered through the shop door. The new TotalGuard system was no longer on the phone line, and the unfortunate thief was immediately detected by Sonitrol monitoring personnel and the police were dispatched. Law enforcement arrived quickly, and in numbers, making the apprehension and minimizing the impact to the next day of business for this valued customer. The full system is comprised of three TotalGuard sensors and a standalone TotalGuard, which does not need a panel because it is wired directly to the camera. TotalGuard alarms on motion, impact, audio, and video and communicates to the central station without needing a phone line. The system is arm/disarm via Sonitrol mobile app and the business phone is the keypad, so no maintenance and no wearing out of the equipment. All control is from the mobile app, and updates are pushed to the system automatically.
The high-performance Predator Ultra HD PTZ video surveillance camera from UK CCTV manufacturer, 360 Vision Technology, has entered service at the National Coastwatch Institution’s (NCI) Felixstowe lookout station, to help protect lives along the coastline of the River Deben estuary. Felixstowe Coastwatch is a charity funded, volunteer-based organization with over 50 highly trained volunteers available to man lookout shifts. It’s also part of the NCI, a voluntary organization established in 1994 to restore a visual watch along UK shores, after many small Coastguard stations had been closed. Maritime navigation Felixstowe Coastwatch took over operations at the Lookout in April 1996 Under Felixstowe Coastwatch’s territory is the Deben estuary, whose treacherous shifting shingle banks and bar can present quite a challenge for maritime navigation, as Ian Clarke of Felixstowe Coastwatch explains: “Half of all call outs from the RNLI Harwich Lifeboat Station during 2016/17 were to attend incidents in this area, so it was clear that additional observation of the area would be beneficial and help to make it safer.” Felixstowe Coastwatch’s Lookout is built on top of Martello Tower ‘P’, one of the famous ‘Martello Towers’, built in the early 1800s as a defense against a possible invasion by Napoleon. The first lookout was originally built by HM Coastguard (replaced in 1979 by the current structure), who operated the Lookout until 1994. Felixstowe Coastwatch took over operations at the Lookout in April 1996. Experiencing CCTV cameras “Originally, the first idea to tackle the maritime issues at the River Deben estuary was to build an additional lookout tower,” says Ian. “That would have been a prohibitively costly exercise for a charity-based organization. However, after a visit to the NCI Station at Portland Bill, I was inspired by the use of CCTV there and interested to establish if video surveillance could be deployed to monitor the remote Deben estuary from our existing lookout station.” “The first task was to experience CCTV cameras in action, so we visited the Port of Felixstowe, the Felixstowe Town CCTV system and the Great Yarmouth Port Authority, where we saw the 360 Vision Predator in action. Impressed by the quality of its images, I contacted 360 Vision Technology for a demonstration, at which we were able to record video from the proposed location of the camera mast.” Comprehensive business case 360 Vision Technology had just launched their Predator equipped with a 40x optical zoom" “After the demonstration of the camera’s capability, I was able to prepare a detailed report to our trustees, setting out a comprehensive business case as to why a CCTV camera would offer the best solution to the issues we were facing at the mouth of the River Deben. I was able to use the recorded footage of the demonstration to produce a video highlighting the impressive capability of the imaging technology.” From Ian’s report, approval of the project was granted and the 360 Vision Predator Ultra HD was installed by STC Solutions Ltd, after funds were raised from council-allocated budget and fundraising events organized by Felixstowe Coastwatch volunteers. “When we placed the order, 360 Vision Technology had just launched their Predator equipped with a 40x optical zoom,” Ian continues. Wireless transmission solution “This was an important factor for us, as the entrance to the River Deben is expansive, and identifying vessels and individuals there would be greatly assisted by the optical zoom of the 360 Vision Predator camera.” With no line of sight from the camera to the lookout tower, an innovative wireless transmission solution was employed, using a belfry tower at a midway point in Felixstowe, where the signal is relayed to enable control and recording of the high definition images back at the lookout station. “Now operators can view superb live images of the River Deben, to confirm the identity, position and situation of vessels in the mouth of the river and if necessary, contact HM Coastguard if we observe any problems,” Ian explains. Seamless ONVIF integration Thanks to the broad integration capability of 360 Vision’s Predator Ultra HD, all surveillance video is archived for retrospective investigation, and controlled via a QVIS Viper NVR recorder. In addition, seamless ONVIF integration into Cambridge Pixel’s ‘RadarWatch’, a flexible client display application for radar display and target tracking, allows Felixstowe Coastwatch’s operators to set up virtual tripwire lines across dangerous areas of the river and shallow waters close to the main shipping channel. The trip alarms instantly alert operators and provide immediate verification of a vessel’s precise location Once crossed by a vessel, the trip alarms instantly alert operators and provide immediate verification of a vessel’s precise location, along with high-definition visual verification from the Predator camera. Also displayed as an overlay on screen, via the Predator Ultra camera and Cambridge Pixel technology integration, is Automatic Identification System (AIS) ship transponder information for each vessel, including a compass bearing supplied by the Predator camera’s head, which indicates which way the camera is pointing. Innovative installation “This means we can instantly identify and position any specific vessel we’re seeing with the camera,” says Ian. “We can also view the banks of the river and its beaches, to ensure that no members of the public are in danger.” Taking advantage of 360 Vision Technology’s any color and any finish design offer, the Predator Ultra camera was supplied in a Marine Grade white paint finish, and along with its powerful 40x zoom lens, is equipped with a ½” Ultra camera module to ensure maximum imaging performance, even in low-light conditions. This innovative installation has been so successful that Felixstowe Coastwatch are currently looking at other areas of the coastline where high-definition 360 Vision Predator Ultra HD cameras could assist with their daily operations, to protect the public and maritime traffic.
Wellington is the southernmost capital city in the world and is the center of New Zealand government. With the second highest population in the country, Wellington is a large coastal city with a diverse range of facilities and attractions. A large portion of those facilities and attractions are the responsibility of the Wellington City Council (WCC) – a local body government organization employing around 1,800 staff. As with all councils that manage a large number of facilities on behalf of their city, the WCC has a broad range of security needs and an accountability to the rate-paying citizens of Wellington. Since 2001, WCC has met those security needs with Gallagher’s integrated security solutions. Central management platform WCC developed a five year plan to migrate all 150 sites on to the Gallagher system With 1,800 employees and 150 sites located across Wellington, the council has a large number of people and assets to secure. With sites including libraries, swimming pool complexes, community and recreation centers, housing blocks, a city zoo, event facilities, and a multi-story central office building, the security requirements vary considerably. “We’re responsible for securing and monitoring all 150 sites around the clock” said Chetan Prasad, Security Manager for Wellington City Council. “It’s imperative we have a reliable system that provides us with a complete view of activity at all sites”. In order to deliver this, WCC uses Gallagher’s Command Centre central management platform to manage security across numerous sites. Utilizing a single security platform has been a long-term objective of the council. Initially operating six different systems, WCC developed a five year plan to migrate all 150 sites on to the Gallagher system. Chetan links the Council’s growth with their need to become smarter about how security is managed. Primary security solution “Gallagher’s system has enabled us to standardize our infrastructure and bring all elements including alarm management, fire systems, vehicle bollards, video surveillance, facility and carpark access, reporting, visitor management, and more, on to one platform. That was a key factor in why we chose Gallagher initially, and why we will continue with them as our primary security solution.” Visibility is critical when you have 150 independent sites to secure. An integration between Command Centre and over 400 cameras located throughout the WCC’s facilities provides live video footage to the security team. “Our camera integration with Command Centre means that in addition to being able to continuously observe critical areas, any site alarm that is triggered will immediately bring up a live video feed for the security staff in our control room. This visibility is invaluable for us in activating appropriate responses and, in the event of a crime, being able to provide crucial evidence to police” said Prasad. Electronic access control WCC is utilizing Gallagher security technology to ensure staff are protected In addition to securing facilities and assets, WCC secures and protects staff working at each of its sites. From initiatives like integrating building elevators with access control to prohibit unauthorized entry, to the integration of panic buttons at each site, WCC is utilizing Gallagher security technology to ensure staff are protected and that in the event of an incident, a rapid security response is initiated. According to Prasad, the Gallagher system is delivering cost savings to the Council in several key areas. The first area relates to the shift from traditional key systems to smart card technology. “With such a large staff base and so many sites, we inevitably faced challenges with traditional keys being lost or not returned by staff or contractors” said Prasad. Rekeying a site cost the Council approximately $4,000 each time – an expense that has now been eliminated by the replacement of traditional lock and key systems with electronic access control. Visitor management solution “Now if a card is lost or not returned, we simply deactivate it in our system. Not only is it a solution that saves us money” said Prasad, “it is also a solution that can be applied instantly.” Similarly, the ability for security personnel to assess a site and reprogram an alarm remotely, also saves the council considerable costs associated with dispatching guards to site. The second area where cost savings are apparent relates to intelligent automation. An integration with WCC’s HR system means that as staff leave employment, their cardholder profiles are automatically disabled in the system. The use of Gallagher’s Visitor Management solution, means that appropriate staff are automatically notified if a guest or contractor fails to sign out or return a key. These two automations alone, save the WCC security team approximately 4-5 days of cardholder administration each year. Software Maintenance contract WCC elected to take a 10 year Software Maintenance agreement with Gallagher In 2014, following 13 years as a Gallagher customer, WCC elected to take a 10 year Software Maintenance agreement with Gallagher. The Software Maintenance contract ensures the Council have access to the latest developments as soon as they are released, keeping WCC at the forefront of security technology. “Software Maintenance makes good business sense” says Prasad. “It gives us access to a comprehensive range of licensable features and benefits, and ensures our upgrade costs are effectively distributed.” Prasad describes the Council’s confidence in Gallagher as another significant factor in the 10 year agreement. “We have found Gallagher’s security solution to be a reliable and versatile, highly secure, modern system. It has supported our significant growth to date, and we are committed to using Gallagher systems for the Wellington City Council’s future.”
Beijing Daxing Airport, due to open in September, will soon be the second in Beijing to secure daily operations with state-of-the-art technology by Airbus. Airbus will provide one Tetra DXTA server, and nine TB3 base stations with eight TTRX 32-channel receivers per base station for Bejing’s second international Airport communication structure. The system will be mutually backed up by the Beijing Capital International Airport to enhance the communication and management of the two airports. The whole network will be put in use before the 30th of September, the official opening date of the airport. This new airport will possess eight runways and serve around 100 million passengers annually, all of which will be secured with Airbus technology. Seamless communications Airbus Tetra system has played a vital role in securing tasks relating to passenger transportationTests carried out in April proved the interconnectivity between the digital trunk communication systems of both airports to be reliable, as stable and clear communications were recorded. The two Tetra systems provided by Airbus are fully interconnected; this will allow for Airport related entities such as Airlines and ground service companies to benefit from seamless communications between both airports. Beijing International Airport is also equipped with an Airbus Tetra system, which has provided highly stable, reliable, and flexible communication security for daily operations since its deployment in 2008. Over the past ten years, it has played a vital role in securing tasks relating to passenger transportation, as well as the logistics of high-scale world sports events. The current system serves over 10,000 subscribers. In 2018, the Beijing Capital International Airport saw over 100 million passengers for the first time, making it the second busiest airport in the world.
Business Finland together with Metsä Group is creating the Metsä pavilion for the 2020 summer Olympics and Paralympics in the grounds of Embassy of Finland in the heart of Tokyo. The pavilion will operate as the official National Hospitality House during the Olympics and Paralympics for Finnish teams. digital locking systems Among the topics promoted in the pavilion are smart energy, sustainability, digitalization, health and wellbeing Among the topics promoted in the pavilion are smart energy, sustainability, digitalization, health and wellbeing. It was a logical decision therefore that iLOQ would be a partner of the Metsä pavilion, and deliver its self-powered, digital locking system to the house. iLOQ is an innovator in the locking industry and has a strong portfolio of safe and sustainable products that maximize safety and minimize administration and lifecycle costs. iLOQ’s mobile and digital locking systems are self-powered and enable electronic locking without batteries or cables. They cater to the needs of industry and the utility sector by providing smart locking and secure and simple access management solutions for the buildings and spaces used daily. President and CEO of iLOQ, Heikki Hiltunen, commented: “We are delighted to showcase our state-of-the-art and environmentally friendly digital and mobile access management systems in the Metsä pavilion. This will open business opportunities for us in the Japanese markets and among Japanese customers and will help us establish new connections with partners in the region and globally”. Advanced remote control services In accordance with the Company’s environmental program, iLOQ conserves natural resources and the environment. For example, it maximizes the usability of their products, minimizes battery and metal waste, favors recyclable packaging and reduces the need for maintenance-related travel by developing advanced remotely control services. Every year, iLOQ’s solutions save 27,000 kg or battery waste and, compared to mechanical locking solutions, 7000 kg of metal waste. The aim of the pavilion is to provide Finnish companies with the opportunity to create new business in Japan and gain new contacts in the market. iLOQ – Metsa platform integartion We are happy to cooperate with iLOQ and present their locking solutions “We are happy to cooperate with iLOQ and present their locking solutions among other leading Finnish technologies in the Metsä pavilion. We believe that Finland can offer numerous complementary products, services and innovations for Japan” states Petri Tulensalo, Head of Sports Cluster, Business Finland. Joni Lampinen, Chief Marketing Officer, explains: “We are looking forward to working closely with the Metsä pavilion and raising iLOQ’s brand awareness in Asia. We have a lot to offer customers and partners in the region, and they will be able to see this firsthand as our locking systems will be in use in the pavilion”.
Round table discussion
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
The beginning of the school year and upcoming seasonal changes remind us that demand for security systems, like almost everything else, is seasonal to some extent. Making improvements to educational facilities during the summer months – including installation of security systems – is the most obvious example of seasonal demand, but there are others. We asked this week’s Expert Panel Roundtable: Which vertical markets for security are impacted by seasonal changes in demand?
When a big security breach occurs, the phones start ringing at security companies, or so the expectation goes. The nature of security is that it takes a security breach, or even a high-profile tragedy, to convince managers of the need for security technology. When a school shooting occurs, schools take note. When terrorism strikes a soft target, other vulnerable institutions notice. Same for hospitals and airports and even nightclubs. When an event occurs, it gets attention that could translate into business for security companies of various types. But should security companies seek to capitalize on these opportunities? We asked this week’s Expert Panel Roundtable: Is it fair game for manufacturers or marketers to leverage recent violent incidents or terrorist attacks to promote sales of security systems or products?