Hikvision UK & Ireland has announced offering security installers, integrators and end users the opportunity to undertake free online training on its fever screening thermal products and solutions. Hikvision thermal cameras Hikvision’s newly developed thermal cameras can be configured to aid high level screening by detecting elevated skin-surface temperatures, and are suitable for use in rapid preliminary fever screening in office buildings, factories, railway stations, airports and...
Platinum CCTV has announced the development and release of a unique body temperature sensing security camera designed to help protect against pathogenic community spread by rapidly pre-screening individuals before they enter a facility. The new thermal body temperature camera identifies individual body temperatures in addition to providing visual security, which is an innovative tool to rapidly pre-screen individuals for fevers when entering a facility and help fight future pandemic spread. PT-...
Paravision, the pioneer in mission-critical face recognition, announces that with the latest release of the National Institute of Standards and Technology's (NIST) Face Recognition Vendor Test (FRVT) 1:N Identification report, it has delivered top-3 accuracy in multiple categories when ranked across the vendors in this rapidly developing space. Published recently, NIST's new report on the performance of face recognition algorithms in identification (1:N) scenarios evaluated over 200 algorithms...
Quantum Corporation today announced new product lines and capabilities which significantly expand its video surveillance and physical security product portfolio. The expanded portfolio includes: A new line of network video recording servers A new line of servers for building management systems and GPU-based video analytics New capabilities for the VS-HCI Series, which the company launched in 2019 to provide hyperconverged infrastructure (HCI) for surveillance recording, video manage...
Given the current outbreak of COVID-19 and the impact the virus is having on global communities, customers, employees and families, AAEON would like to share their business continuity plans, and how they can help. Operation as Usual All AAEON facilities and functions are running as usual. The manufacturing sites in AAEON Taiwan and China are at full operation. The Supply Chain Management, FAE, RMA, and Logistic Center in AAEON Europe Netherlands remains working without disturbance. All AAEON E...
A person infected with the Coronavirus (COVID-19) infects an average of 2.5 other people within five days. You do not need to be a mathematician to realize that early detection of infected people is key to successful pandemic containment. The aim of effective containment strategies is therefore not so much to reduce the number of absolute cases as it is to extend the time frame within which they occur. Without effective containment measures, the virus spreads rapidly and is beyond the capacity...
Ultimate Visual Solutions (UVS), the global video wall and visual display providers, has expanded into a new HQ and demo facility in response to customer demand. The facility, close to the M65 near Burnley and in walking distance of the rail network, provides a larger, upgraded showcase for UVS and its technology partners’ integrated solutions. Security system integrators Since opening the new location last month, UVS has already had a record number of visitors, including police forces, security system integrators and video management solution manufacturers. UVS Managing Director Steve Murphy said: “People have been very keen to discuss integration to UVS video wall solutions and various end users have been looking to understand how video wall technology, or an upgrade to their existing systems, can assist them in their operations.” “The facility is available to all our manufacturing partners and system integration partners, and to their end clients, to enable us to provide independent, expert advice in a stress free, neutral and objective environment.” Integrated video management systems Technology which visitors can see in operation includes video wall solutions, displays, video wall controllers, control software, integrated VMS (video management systems for security applications) AV over IP and KVM remote access options. Professional Audio Visual and Digital Signage options are also on show for evaluation at the new facility, which is at the Business First Burnley Business Centre. UVS provides video wall displays and audio visual solutions to a range of clients across the UK and the rest of the world. It is led by four senior colleagues who, between them, have more than 70 years’ combined Audio Visual, Control Room and Visual Solutions experience. It has also opened a new London demonstration venue at Woburn Place, a short walk from Euston Station, to cope with increased demand for its technology.
For customers who service banks, Digital Monitoring Products, Inc. (DMP) offers an affordable way to bring ATM vestibule access control to their facilities. Digital Monitoring Products’ new 734B Bin Code Access Control Module installs just like any of the company’s access control modules. And like all DMP access control solutions, it's designed with customized functionality and added flexibility. 734B Bin Code Access Module 734B allows banks to restrict access into their ATM vestibules and lobbies only to their customers with valid bank cards In combination with a magstripe reader, the 734B allows banks to restrict access into their ATM vestibules and lobbies only to their customers with valid bank cards. With the 734B, banks don’t have to program user codes for every single customer of the bank. A single Bank Identification Number (BIN) can be programmed into the panel and used as the basis for access control. To control access, the module processes the bank card’s BIN that can be up to eight digits long. Customized Functionality One of the best things about adding BIN code support is that there is no need to grant users any new credentials. The 734 allows them to use the same bank cards for access that they’re accustomed to using at the ATM itself. Furthermore, the 734B is compatible with any swipe-based magstripe reader, which supports the ABA Track 2 data from the bank card. “The 734 provides the interface between the reader and the panel,” explains DMP’s Corporate Trainer Adam Barton. “So, you’re free to use any ABA Track 2 magstripe reader that’s readily available.” Added Flexibility With the 734B, your customer can take advantage of schedules and remote locking With the 734B, your customer can take advantage of schedules and remote locking. This gives them the flexibility to schedule an ATM vestibule to be locked during banking hours and unlocked for their patrons’ convenience when banks are closed. Other powerful access control features include the ability to run reports, make users inactive and use Entré or Virtual Keypad Access to easily change BIN codes. These features are available whether the BIN codes are programmed as user codes and either processed at the panel or processed locally from the access control module. For added flexibility, the 734B can also be programmed as a standalone door control module without requiring a panel. Enhanced data security For a bank’s customers, the 734B offers security that’s also convenient. And for the banks, the 734B allows them to review events. They can see how many of their competitor’s customers might be attempting to use that ATM, which helps guide them in their marketing decisions.
IP audio and control innovator Barix announces the opening of a new research and development center for next-generation, intelligent audio technologies. Based in Aveiro, Portugal, the Barix Innovation Center focuses on “what’s next” for the company, including audio analytics, anomaly detection, predictive maintenance, and environmental sound monitoring. Barix Founder and CTO Johannes Rietschel identified Aveiro as the ideal location given its proximity to the University of Aveiro, one of Europe’s famous technical institutions. Barix has been aggressively hiring local engineering talent, including recent university graduates, to fill key engineering and research roles. The close proximity to one of Barix' long-term, strategic production partners, HFA SA, will further accelerate Barix’s ability to quickly build custom solutions at this new facility. Energy-efficient solutions Our new Innovation Centre places Barix in the centre of European digital development, a perfect home for Barix" Barix’s business headquarters will remain in Zurich, and will retain its local engineering talent alongside all sales, marketing, product management and other staff. “Aveiro is known as Portugal’s ‘digital city’ and produces a high rate of digital technology innovations, many of which originate from university students and graduates,” said Rietschel. “Our new Innovation Center places Barix in the centrer of European digital development, a perfect home for Barix, which has brought Audio over IP innovations to broadcast, commercial AV, security, retail and other markets for 20 years.” “This new location does not replace our Zurich operation; rather, it will propel Barix innovation in new directions. And we will use our latest-generation, modular platforms to build very powerful, reliable, compact and energy-efficient solutions that serve a continually evolving set of end user requirements.” Widespread adoption of AI At the recent ISE 2020 Show for AV professionals, Barix offered a preview into its next-generation intelligent Audio over IP solutions. These include environmental audio monitoring, detection and analytics solutions for everything from general concerns (noise measurement) to highly sensitive operations (global, universal emergency intercoms, government facility monitoring). We expect widespread adoption of AI and adaptive learning innovations" “The new age of intelligent, widespread devices that understand and hear their surrounding is only beginning,” said Reto Brader, CEO, Barix. “We expect widespread adoption of AI and adaptive learning innovations in all of our markets, and we are proud to have secured highly qualified talent in Portugal for our next-generation research and development team.” Custom-developed OEM products Among the first manufacturers to bring Audio over IP products to market, Barix enjoys an exceptionally large base of installed products worldwide, including custom-developed OEM products for other companies. In recent years, Barix has accelerated product development for its core markets, including multi-site audio distribution (RetailPlayer, SoundScape), intercom and paging (Paging Cloud, IP Former), and broadcast audio transport (SIP Opus hardware codecs, Reflector uncompressed streaming service). Barix will demonstrate these now-shipping products, along with next-generation prototypes from the new Barix Innovation Center, at the 2020 NAB Show for broadcasters (April 19-22, Las Vegas Convention Center, Booth C1139) InfoComm 2020 for AV professionals (June 17-19, Las Vegas Convention Center, Booth C6150), and ISC West for security professionals (July 2020, Sands Convention Center, Las Vegas, Booth 19140; rescheduled from March 17-19).
Aiphone, the international manufacturer of intercom and security communication products, introduced its IXG Series IP-based video intercom, a comprehensive solution providing multi-tenant and mixed-use building managers with reliable network communication and entry security along with the convenience of a tenant mobile app. The IXG Series integrates multiple security layers to meet property managers’ needs for a single facility or an entire portfolio of mixed-use properties. The cloud-based IXG Series Mobile App enables tenants to screen visitors and unlock entries using their smartphones from virtually anywhere in the world. The app may be used with or without an individual interior station. Building managers may select to have tenants screen visitors or have all entry requests go directly to a guard station before being transferred to the appropriate suite or apartment. Elevator control adaptor The IXG Series further enhances security with an available elevator control adaptor to ensure visitors access only the floor on which the tenant works or resides. All entrance, tenant and guard stations include touchscreen displays “The IXG Series combines all the feature-rich benefits of an IP-based intercom with the versatility of a multi-tenant solution,” said Brad Kamcheff, Aiphone marketing manager. “With its virtually unlimited station capacity, the IXG Series provides configurations to meet the specific needs of mixed-use property managers and their tenants.” Benefits of IXG Series video intercom All entrance, tenant and guard stations include touchscreen displays and enable onboard event recording with a microSD card. Other features and benefits of the IXG Series video intercom include: Illuminated touchscreen entrance panel for interface and video display Available later in 2020, a physical video guard station Video conferencing between guard stations Confidence that the system is functioning as intended with scheduled or manual health checks of all stations, components and network connections Ease of installation. All stations are Power over Ethernet using standard structured cable (Cat-5/Cat-6) Compatible with future IX Series The IXG Series may be combined with Aiphone’s IX Series 2 peer-to-peer video intercom system with its many door, master and sub stations, adapters and modular emergency towers and wall boxes, to create broader, more powerful solutions for large and enterprise-level applications. The IXG Series is compatible with legacy and future IX Series and IX Series 2 products. Throughout 2020, Aiphone will be celebrating its 50th anniversary in North America by thanking customers, dealers, integrators and employees for providing the opportunity to develop and improve better security and communication solutions.
The new open and modular video system platform MOBOTIX 7 changes the way video surveillance and video analytics are used. With an ever increasing portfolio of hardware, software and intelligent solutions, MOBOTIX applications are not only solutions for current requirements but also scalable for the future needs of various industries. MOBOTIX 7 video system platform The main areas of focus are the utilities, energy and mining industries. MOBOTIX 7 is the latest addition to the MOBOTIX family and enables deep learning and AI tools in addition to the standard for which MOBOTIX is known; reliability and performance. MOBOTIX sets new standards in the market - Extremely robust, extremely sensitive, and incredibly secure The MOVE models, the proven Mx6 and the new MOBOTIX 7 series cover all industry requirements, from high-quality industry standard to AI-based IoT video systems developed for innovative and future applications. MOBOTIX sets new standards in the market - Extremely robust, extremely sensitive, and incredibly secure - Beyond Human Vision. Need for reliable, sustainable solutions With complex applications needed in utilities, mining, energy and treatment plants not to mention oil and gas, the need for powerful, reliable and sustainable solutions is more important than ever. Whether it is due to Health and Safety, cost management, efficiency, asset recovery or just simply security MOBOTIX can deliver in any environment to any standard. The robust MOBOTIX video systems 'Made in Germany' are designed to reliably cope with the extremely demanding external influences in the energy, utility and mining sectors: they can withstand even the most extreme conditions over a long period of time. Highly sensitive optics, thermal sensors, infrared emitters and intelligent apps master the most difficult optical conditions, such as fog, haze and darkness. Preventing unauthorized access and elementary damage "The cameras' Mean Time Between Failure (MTBF) average service life is 80,000 hours (> 9 years)," explains Hartmut Sprave, Chief Technology Officer (CTO) of MOBOTIX AG. "We offer exactly the right overall solutions that are tailored to the respective company in the industry." Critical infrastructure must be secured at all times. Intelligent MOBOTIX video systems recognize dangers before they can spread and with their early fire detection Thermographic solutions, preventative measures can be taken. Cybersecure video surveillance solutions For MOBOTIX, a complete solution does not only mean covering today's needs" "For MOBOTIX, a complete solution does not only mean covering today's needs. We demand that our solutions are future-proof and offer our customers from the utilities, energy and mining industries comprehensive, robust and at the same time sensitive and cybersecure video surveillance solutions that help them to protect their systems, their employees and the environment and to meet future requirements," emphasizes Thomas Lausten, Chief Executive Officcer (CEO) of MOBOTIX AG. All industries and verticals have been subject to cyber-attacks. This is why MOBOTIX solutions, which are as robust as they are intelligent, have strict cyber security protocols which are constantly being increased to maintain the highest level of security we can offer. MOBOTIX only uses powerful and high-quality electronic components. This principle is consistently applied right into the digital world. Cyber security is a top priority at MOBOTIX and is strictly adhered and maintained through the MOBOTIX Cactus Concept. MOBOTIX IoT cameras for enhanced data security MOBOTIX cameras are high-performance computers with eyes and focus on data security and protection. The entire video analysis - and optionally also the recording - takes place in the camera. The self-sufficient IoT cameras transmit images - securely encrypted end-to-end to the highest standards The self-sufficient IoT cameras transmit images - securely encrypted end-to-end to the highest standards - to the network only when relevant events occur. Transmitting less data also means fewer opportunities for cyber-attacks. Edge computing eliminates the need for central video servers and recording devices. CNPP certification for enhanced cyber security MOBOTIX has been certified for cyber security by the internationally renowned French testing institute CNPP (Centre National de Prévention et de Protection) as the first European manufacturer in CCTV as well as Secure by Default from the UK and also penetration tested by SYSS in Germany. MOBOTIX is also committed to data security in compliance with the German Data Protection Act (DSGVO). Both access rights and camera settings can be adjusted according to the application and sensitivity. MOBOTIX cameras are 100% ‘Made in Germany’ for the highest possible cyber security reliability.
Everbridge, Inc., the globally renowned company in critical event management (CEM), has announced that the company has unveiled new CEM capabilities across the Internet of Things (IoT) for corporate, government and healthcare organizations to protect their people, assets, operations, supply chain and brand from critical events such as coronavirus (COVID-19). Everbridge CEM platform Everbridge’s industry renowned CEM platform will feature a new IoT extension module that will also leverage the intellectual property from recent technology acquisitions of Connexient and CNL Software. As a result, organizations will be able to gather a broader range of situational intelligence and automate targeted responses throughout their entire safety, security, and operational continuum – from across a global footprint to within campuses and facilities. Everbridge CEM platform enables organizations to utilize vast amounts of electronic data, including IoT sensors With the number of IoT devices expected to approach 75 billion by 2025, the Everbridge CEM platform enables organizations to utilize vast amounts of electronic data, including IoT sensors, to digitally transform how they manage the safety and security of their employees, customers, patients, first responders, residents, and visitors, as well as the resiliency of their operations and supply chain. Critical Event Management (CEM) for IoT CEM for IoT extends the number of use cases for the Everbridge platform within the broader critical event management market, complementing the company’s existing offerings for supply chain and wearable devices. Companies, governments and healthcare organizations utilize CEM to mitigate risks from coronavirus with several million COVID-19 related communications deployed by Everbridge in recent weeks. The expansion of CEM for IoT enhances coronavirus-related use cases to better protect people, operations, supply chain and brand. Coordination between first responders, healthcare units For example, the Everbridge ecosystem supports over 1,500 healthcare entities including the top pharmaceutical, biomedical and medical device and manufacturing companies, as well as the largest healthcare systems (overseeing more than 25 percent of all hospital beds in the U.S.), managed care organizations, pharmacies, and statewide health alert networks (HANs), including the Center for Disease Control and Prevention (CDC) and the National Institutes of Health (NIH). CEM for IoT improves the ability to coordinate first responders and other critical healthcare resources such as intensive care unit (ICU) beds, respirators, expert medical staff, etc., based on real-time data on the broader impact of COVID-19. Data security and threat identification The Everbridge CEM framework includes aggregating tens of thousands of data sources to identify threats Everbridge’s IoT initiative employs the same CEM framework currently being used by global industry firms involved in aircraft manufacturing, financial services, entertainment & media, high tech, healthcare, hospitality, retail, pharmaceuticals, the federal government, and other sectors. The Everbridge CEM framework includes aggregating tens of thousands of data sources to identify threats; determining the relevance of a threat to an organization’s people, facilities, assets, supply chain and reputation based on their dynamic locations; automatically initiating and orchestrating an enterprise-wide response plan using the organization’s policies and procedures and monitoring execution of that plan; while analyzing cycle times and results to identify bottlenecks and improve future performance. The acquisitions of Connexient and CNL Software augment the IoT capabilities of the Everbridge CEM Platform bringing the total number of out-of-the-box integrations to over 225. Integrations include numerous healthcare systems, indoor positioning, digital wayfinding, building management, access control, intruder detection, video management, and many more. Safe City and Smart Building programs Everbridge solutions secure major events, cities, states, military installations, government buildings, universities, airports, corporate campuses, and healthcare facilities, providing instrumental functionality to Safe City and Smart Building use cases across multiple critical events including coronavirus. The CEM platform monitors threat data streams continuously, alerts stakeholders" “The CEM platform monitors threat data streams continuously, alerts stakeholders when there is a relevant issue, and automatically orchestrates a coordinated response—it is always on,” said Imad Mouline, Chief Technology Officer (CTO) of Everbridge Inc. Connected, IoT devices Everbridge has experience with early implementations of Safe City and Smart Building programs in both the public safety and corporate space. According to IHS Markit, the global Safe City market will reach $35.8 billion in 2024. Brand Essence Market Research forecasts the overall Smart Building market will grow to $59 billion in 2025. The utilization of a network of connected devices, or IoT, will make up a portion of both markets.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasize to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government center or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organization can move their line of defense away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalize their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centers and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialized care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in pediatric health care, education and research. comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priorityAlso crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-Critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organizations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organization’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetize the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organization. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organizations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organizations, not technology. If we truly understand the risks to the organization, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organizations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organizations.
Securing New Ground, the security industry’s annual executive conference this week in New York, offered food for thought about current and future trends in the security marketplace. Highlights from SNG 2019 included keynote remarks from security leaders at SAP, Johnson Controls and the Consumer Technology Association, discussions on how CSOs mitigate security risks, topic-focused thought leadership roundtables and a lively networking reception. Top trends observed at the event include cybersecurity, data privacy, facial recognition and artificial intelligence. A "View from the Top" session covered the need for companies to consider responsible use and ethics around technology; responsibility should extend throughout the organization. A panel of security leaders emphasized the need to understand the diversity of risks that end users face. As the Internet of Things (IoT) expands connectivity, the inputs, outputs and "attack surface" also expand. It's critical to have security "baked" into products themselves, and also to undertand the mission of the organization being protected, the context and correlation. Technologies transforming security market Keynote speaker Gary Shapiro, President and CEO of the Consumer Technology Association, listed the many technologies that will impact the consumer electronics market – and the security market – in the near future: artificial intelligence (AI), voice recognition, the transition to 5G and self-driving cars.As the Internet of Things expands connectivity, the inputs, outputs and "attack surface" also expand “What we're seeing today is a huge turning point in where the world is going,” said Shapiro, whose organization presents the giant CES trade show each year in Las Vegas. “It’s not just about jobs and technology, but who we are and how we address fundamental human rights.” Privacy is a component of human rights, but “in the world of AI, there is a tradeoff between innovation and privacy”. Balance between security standards Shapiro sees Europe as representing one extreme of privacy, epitomized by General Data Protection Regulation (GDPR), which he sees as stifling innovation. Meanwhile, China is pushing innovation using massive amounts of data with no regard to privacy. The United States, therefore, should look for a balance that acknowledges the inevitability of innovation while respecting privacy and realizing it is “always situational.”With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place" Too much concern for privacy comes at a cost, Shapiro said. “Privacy zealots are killing facial recognition, step by step by step,” he said. “Regulators should not throw away the baby with the bathwater. Every technology in history has been used to cause evil and to do good. Throughout history any new technology could have been banned and made illegal.” Shapiro offered encouraging words to the security marketplace, even in the wake of large tech firms such as Amazon entering the market. “With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place,” he said. “There is opportunity. There will be increasing new things people want, and always new threats. People will want what you're providing, which is physical and technology security in their facility.” Scott Schafer, Chairman of the Board of the Security Industry Association (R), interviewed Steve Jones, CEO, Allied Universal, on stage about the importance of merging technology with security officers Allied Universal CEO Steve Jones discussed holistic approach Steve Jones, CEO, Allied Universal, was interviewed on stage about the importance of merging technology with security officers for a holistic approach to securing a facility. “Today, customers are asking us to look at their facility holistically and asking: What is my best approach?” said Jones. A holistic approach includes protecting people, the facility, intellectual property (IP), and how to handle visitors. Manguarding perspective on security Allied Universal looks at security from a manguarding perspective and also from a technology perspective, based on their daily experience managing security for 40,000 customer sites across the United States and Canada.Allied Universal has a new handheld technology platform that uses AI “We are in a unique position in the channel,” said Jones. “We know the stats at any customer site. We know the last time there were repairs on cameras, which card reader is malfunctioning, how long the systems company takes to respond to a call. We are at these locations 24/7 and have an intimate relationship with customer. We are a significant influencer in the decision-making process. We have an opportunity to have a voice, and to build a business around it.” Predictive security “We are looking for technology that will enhance the security of the customer,” said Jones, including situational awareness and analysis of data to predict patterns. Allied Universal has a new handheld technology platform that uses artificial intelligence (AI) to analyze data, predict outcomes, and prescribe optimum responses. Workforce development – hiring and training new employees – is a big issue for Allied Universal, which last year interviewed more than a million applicants to find around 100,000 employees. They are targeting every demographic, and last year hired 33,000 veterans. The company is using technology to help with the massive recruiting effort, including AI to analyze applicant qualifications and a computer-generated avatar to conduct the first online interview. Future security challenges Jones sees the rapid increase in the homeless population in the United States as one of the biggest security challenges of coming years. The rapid increase in the US homeless population is one of the biggest security challengesMany businesses face the prospect of homeless individuals living in front of their buildings, possibly using drugs or approaching customers. “It has become a real threat,” he said. “When they are living in front of your buildings, in many cases, there are ordinances that allow them to be there so the police will not get involved. It falls on the facility owner and private security to address the problem. Given the large homeless population we have now during good economic times, I don’t know what it will look like in an economic downturn.” Human side of security An SNG session on the human side of security observed that people are the biggest source of vulnerability. Companies should foster a "safety climate" in which security is integral to operations and viewed as something that helps employees rather than create hassles. Human resources is now a technology field and should work together with security to achieve shared goals. At the consumer and small business level, cybersecurity must also be top-of-mind and built into a security companies' DNA. SNG attendees heard about opportunities to move beyond providing products and devices to providing experiences, by partnering with customers to protect what matters most to them. While a bit of inconvenience comes along with security, products should be built in a way that is easy to use, with security baked in. The results are systems people are comfortable engaging with every day. Securing New Ground is presented by the Security Industry Association (SIA).
VIVOTEK, the global IP surveillance provider, has deployed its IP surveillance cameras in the residential project “New Borovaya,” constructed by A-100 Development, one of the largest developers of residential and commercial real estate in Belarus. This deployment has been carried out by long-standing distributor DataStream DEP, and has successfully put into action the high-quality products and brand value of VIVOTEK. On land with a total area of more than 100 hectares, a whole district is being actively developed in line with the most modern European trends of improved urban living environments. Based on the principle of SMART and SOCIAL, the “New Borovaya” project is one of the most innovative and upscale developments in Minsk, the capital of Belarus. In order to ensure public safety and protect private property, А-100 Development pays special attention to the security of the huge residential complex. Bullet network cameras To meet the demanding requirements of the project, including high-quality imagery, reliable equipment from a global brand, excellent technical characteristics and optimal price, the distributor DataStream DEP had complete confidence in recommending VIVOTEK’s IP surveillance solutions. VIVOTEK is honored to have this decade-long strategic partnership with A-100 Development VIVOTEK’s IB8369A and IB8367A bullet-type network cameras were selected for video surveillance of streets, playgrounds and outdoor parking, while the FD8369A-V dome type cameras were chosen for the entrances of residential buildings. A single data transmission network has been built at the facility, which unites all cameras and provides easy-access to any camera. Surveillance solutions Commenced in 2014, development of the "New Borovaya" project will last for 10 years. In the first two quarters, solutions based on VIVOTEK IP surveillance cameras were implemented, the success of which has led developer А-100 Development to proudly place VIVOTEK solutions in its marketing materials, and confidently declare the reliability of this brand during both operation and for further cooperation. VIVOTEK is honored to have this decade-long strategic partnership with A-100 Development and looks forward to providing its latest surveillance solutions again in the near future.
Intelligent Light Detection and Ranging (LiDAR) sensors from OPTEX, global sensor manufacturer and supplier, are at the heart of a new security access control solution that is helping to protect endangered elephants at the Mount Kenya National Park in Kenya, Africa. Countering the threat of poaching Mount Kenya is the second largest mountain in Africa, and the UNESCO (United Nations Educational, Scientific and Cultural Organization) listed National Park was established to protect the mountain, which is a water tower for the surrounding area and whose forest reserves and surrounding areas provide refuge for a vast array of wildlife, of which there is a large population of elephants, estimated at around 2,500. Despite the numbers, the animals are under constant threat from poachers Despite the numbers, the animals are under constant threat from poachers. The changing geography of the region and the proliferation of agricultural farms have also resulted in increased incidences of human-elephant conflict, with the elephants causing damage to the fencing and property that surround these farms when trying to re-enter the park. Elephants' access control system Instarect Limited, a security fencing solutions provider based in Nairobi, was approached by the Mount Kenya Trust – a non-profit organization running conservation projects for the forests and wildlife of Mount Kenya – to design and install a new elephant access control system within the three elephant ‘corridors’. The corridors are designed not only to keep the elephants protected but also allow them to re-enter the park safely and securely, without causing any damage to the fencing or farmland. Instarect selected OPTEX’s intelligent RLS-2020 LIDAR sensors as an integral part of the project. Solar powered gates and CCTV cameras installed In conjunction with new solar powered gates and CCTV cameras that have been installed, the RLS-2020 sensors, with a 20x20m detection range, are being utilised to detect the elephants as they approach and automatically open the gate for them. The sensors have been programmed to only detect elephants and will not open for smaller animals or humans. When the elephants trigger a gate to be opened, authorized park rangers are immediately notified via an SMS and are then able to view the CCTV cameras on their phone to check whole herd of elephants have re-entered the park safely. The rangers then send an SMS to close the gate. REDSCAN RLS-2020 sensors The new system is working well, the elephants are very intelligent and have quickly adapted to these new gates" Ebrahim Nyali, Security Solutions Designer at Instarect Limited, says “the new system is working well, the elephants are very intelligent and have quickly adapted to these new gates. They have learned to wait for the gates to open for them to re-enter the park and do not try to enter with force.” Masaya Kida, Managing Director of OPTEX EMEA, says “the REDSCAN RLS-2020 Series provides enhanced detection in even the most challenging environments and easy integration with any video security solution. These sensors are intentionally designed to create customized detection area and set a wide range of target sizes. This flexibility allows it to be used for many different and sometimes unusual applications; the elephant detection is a perfect illustration of that.” Advanced sensor technology Masaya adds, “We are pleased and proud to be chosen to work with Instarect Ltd. on this important project and that our leading sensor technology is helping to protect the elephants & reducing human wildlife conflict around the Mount Kenya National Park”. OPTEX Co., Ltd is a globally renowned manufacturer of sensing technologies for a number of sectors, ranging from security, entrance systems and factory automation to measuring instruments and transportation safety.
While HENSOLDT is a global pioneer of technologies that are designed for protecting armed forces, civilians, assets and borders, the company is also actively making a difference as a protector of endangered species. South Africa is known for its iconic wildlife and is also home to one of HENSOLDT’s largest industrial sites. As a result, it came as a natural progression to protect the country’s wildlife using state-of-the-art defense and security technologies. Rise in rhino poaching In recent years, animals such as rhinos have been under increased pressure due to rising poaching levels, threatening the future of these animals. South Africa holds nearly 80% of the world’s rhinos and has been hit the hardest by poaching, with more than 1 000 rhinos killed each year between 2013 and 2017. HENSOLDT celebrates three years of zero poaching on the world’s largest rhino conservancy HENSOLDT responded to this threat, and is now combining advanced intelligence, radar and optical surveillance systems with physical security for high-end wildlife protection. This week, HENSOLDT celebrates three years of zero poaching on the world’s largest rhino conservancy, where HENSOLDT’s technologies have been keeping a large number of rhino safe. HENSOLDT South Africa designed and installed a surveillance and security system on the farm and since then, not one animal has been lost to poaching. “Before that, we had poaching every month, sometimes every week,” says John Hume, owner of Buffalo Dream Ranch. Situational awareness In 2017, Buffalo Dream Ranch, the world’s largest rhino farm, started a partnership with HENSOLDT to secure 8000 hectares of land, where some 1800 rhinos now live peacefully, protected by state-of-the-art HENSOLDT technology. The specially developed system combines a number of advanced sensors, including optical and radar sensors, to monitor the rhinos, farm and surrounding area. Data from these sensors are fused using advanced analytics at a command and control center to provide complete situational awareness and early-warning of potential poachers approaching the area. In combination with existing physical barriers and a team of security personnel, the system augments the total security approach to create a surveillance solution, with technology that is always on guard, never fatigues and which cannot be compromised. “We are for the first time in years feeling confident, with HENSOLDT, of perfecting the protection of our rhino,” says Hume. Wildlife protection The know-how acquired through these projects can be applied for protecting other wildlife “We are honored to be part of important initiatives such as the conservation of our wildlife and we aim to expand our efforts,” says Hennie Venter, Chief Executive of the HENSOLDT South Africa GEW business unit. The know-how acquired through these projects can be applied for protecting other wildlife and national parks to safe-keep endangered species such as lions, elephants and even abalone. HENSOLDT prides itself on its relationship with its clients. “For us it’s not putting down the equipment and getting the business, for us it’s rather a journey,” says Werner Muller, GEW’s Chief Executive of Spectrum Monitoring and Security. Needs-based solutions Because of this philosophy, and because each wildlife scenario is different, with its own unique set of challenges, HENSOLDT’s experts collaborate with each client to develop a solution that addresses their specific needs. Through its business units, GEW and Optronics, HENSOLDT South Africa delivers solutions to clients across the world, and significantly contributes to South Africa’s export industry, while it is firmly grounded in its roots as a proudly South African company, operating in South Africa for South Africa. HENSOLDT is committed to continue innovating to protect the wildlife.
The State of Illinois has enacted a ‘stay at home’ order effective as of Saturday, March 21, at 5pm to curb the spread of the COVID-19 coronavirus. This means all residents are mandated to ‘remain at home’ and only essential businesses may remain open to provide critical services. Everybody fully supports this measure as it will hopefully slow the spread of the virus. Securing critical infrastructure Under the order, Illinois Gov. J.B. Pritzker has mandated that all Illinoisans stay in their homes except as needed to maintain continuity of business critical operations. This coincides with Presidential Policy Directive 21 (PPD-21): Critical Infrastructure Security and Resilience that advances a national policy to strengthen and maintain secure, functioning, and resilient critical infrastructure. BCD plays an important role in the information technology sector. The sector's complex and dynamic environment makes identifying threats and assessing security vulnerabilities difficult and requires that these tasks be addressed in a collaborative and creative fashion, especially as it directly affects both the public and security infrastructure.BCD plays an important role in the information technology sector Working with security integrators and OEMS In addition, it is imperative to maintain the supply chain in this unprecedented time of need. They work hand-in-hand with a number of security integrators and OEMs that work directly with the Federal Government. Most importantly, they supply life safety equipment that is used by first responders to help and keep them safe. Therefore, BCD Illinois build centers will remain open and operational, as the support technicians and engineers will remain available to continue to support all customers to fulfill the critical technology needs of the nation’s federal, state and local governments, healthcare facilities, and education, industrial and financial services sectors. It has also been notified that all shipments to US States currently in "stay at home" status may be delayed by the freight carriers; this includes the State of Illinois. BCD build centers Jeff Burgess, Chief Executive Officer (CEO) at BCD said, “We continue to implement strict precautionary measures in all our logistics and integration centers, in accordance with government and public health requirements, to reduce risk for colleagues who are performing their duties. Our Illinois-based technical operations will continue as long as we can confidently protect the health and well-being of these dedicated two dozen team members. All other BCD staff will continue working from home until further notice.”
Link11, renowned European firm in the field of cyber-resilience and cyber security, is offering its DDoS protection solutions free of charge to public sector health, government and public education organizations during the highly contagious phase of COVID-19. Public sector organizations are particularly vulnerable to cyber-attacks, and the availability of critical public infrastructures is more important than ever as people look for genuine sources of information related to the virus outbreak. Remote working policies Governments all over the world have taken necessary actions to lower COVID-19’s spreading curve, including implementing remote working policies, resulting in significant growth in internet traffic, leading to an increased risk of social engineering, business email compromise, ransomware and DDoS attacks. According to Link11’s research, during the three-week period Monday 17 February to Monday 9 March, Link11’s Security Operation Center (LSOC) defended 20,349 minutes of attacks (over 2,860 hours), which is more than 30% up compared to the 15,612 minutes of attacks mitigated during the same period in 2019. Link11 Cloud Protection Platform Marc Wilczek, Chief Operations Officer (COO) of Link11 said, “It takes only a small effort these days to overload servers and online services, and organizations need to protect their infrastructures. To help them deal with the evolving threat landscape, Link11 is offering government, public health and education organizations a solution that proactively identifies, blocks, and mitigates DDoS attacks within the Link11 Cloud Protection Platform, free of charge until September 2020.” Link11’s integrated Cloud Security Platform ensures cyber-resilience of the entire IT infrastructure On Sunday 15 March, the U.S. Department of Health and Human Services (HHS) suffered a cyber-attack, designed to slow the agency’s services amid the government’s rollout of a response to coronavirus, with the aim of overloading HHS servers. Officials assume a hostile foreign actor was behind this campaign. Cloud-based DDoS protection Traditional on-premise DDoS defenses, which are still widely used, and load-balancing products, are not able to protect individual websites, APIs or cloud applications against Layer-7 attacks, as these malicious data tsunamis can create big damage with little total bandwidth, bringing everything to a standstill instantly. Cloud-based DDoS protection, such as Link11’s integrated Cloud Security Platform, uses artificial intelligence, machine learning, strict automation and real-time analytics to ensure cyber-resilience of the entire IT infrastructure and application landscape supporting hybrid as well as cloud-native deployments.
Doncaster Culture and Leisure Trust (DCLT) is a registered charity delivering premier leisure provision venues across Doncaster. DCLT offers a diverse range of health, fitness, leisure, and entertainment activities to customers to help to achieve a healthier community across Doncaster. DCLT’s premier venue, The Dome, required a new solution that would protect several areas, including one of the largest gym’s in Doncaster, The Fitness Village. DCLT had a specific brief for this project that specified enhancing the staff and customer experience, while simultaneously providing access control solutions to restricted areas from the general public, members, and staff alike. Alongside interfacing the onsite gym membership system to enable a single source of data to populate the access control and automate the process, the Trust was also in a transition period of moving members from barcode to RFID badges. Advanced fast-acting swing speed gates Moreover, the entrance to The Fitness Village gym was also under renovation. The access control system would also need to feature advanced fast-acting swing speed gates and slim lanes. Advanced user obstacle protection also had to be kept in consideration to keep members safe during peak times when there would be a high level of footfall from visitors. Solutions Provided: Oliver Law Security (OLS) did not hesitate to recommend the Vanderbilt ACT365 system. ACT365 is not only a fully cloud-based product; it offers a flexible solution for installation and management that OLS identified as a key ingredient to meet DCLT’s project brief. In addition to DCLT’s security requirement, OLS also realized ACT365 as an ideal solution for this task, given the product’s very focused API integration. Thanks to the ACT365 interface, OLS was able to integrate DCLT’s gym management system to enable single-source data to be used to populate the access control system, keep records up-to-date, and enhance customer experience. For instance, previously, the older system had taken up to 3-5 seconds to validate members and open the entry turnstiles. Once the API interface had been achieved, this validation is now done instantly through ACT365 and allows members with active memberships through the entry points without any minimal delay. The scope of this project, although not significant in the number of doors, was a very technical project with integration into SQL server and a third-party membership system with the potential for thousands of would-be users. Key Highlights: According to OLS, using ACT365 and its API interface is a game-changer for this type of project. With multiple updates per day, the access control system is always fully populated with the correct, validated members ensuring DCLT’s premier venue, The Dome, is protected against memberships that have lapsed. The system is very user-friendly and can grow with DCLT’s plan for the future, and adding further developed integration for other areas within the near future. The system is entirely cloud-based offers an off-premise solution with no additional new servers required or PC’s running software. Through the ACT365 app, DCLT’s site administrators can manage the system for staff. The solution that OLS has implemented has removed the need for old, antiquated technologies and moved DCLT’s security system forward to the cloud and future-proof solutions. The beauty of the interface is once the schedule runs, all information is autonomously sent to the ACT365 database, meaning adding new memberships, updating memberships, or revoking access is seamless, not tying up staff verifying and administering the membership/access control systems respectively.
Round table discussion
The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
Fire and security systems are two elements of the same mission: To keep buildings and their occupants safe. However, the two systems often operate independently and may not be integrated. Should there be more integration and what are the pitfalls? We asked this week’s Expert Panel Roundtable: What are the challenges and opportunities of integrating security and fire systems?
Passwords are one of the most familiar elements of information systems, but also one that can be overlooked or underutilized. New alternatives are emerging, and the role of passwords is evolving in the age of the Internet of Things. We asked this week’s Expert Panel Roundtable: How is the role of passwords changing in physical security systems?
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals