Pulse Secure, the provider of Secure Access solutions to both enterprises and service providers, announced the release of Pulse Policy Secure (PPS) 9.0R3 to extend its Zero Trust Security model to IIoT devices and smart factories. The new version enables factories to streamline machinery repairs and diminish costly production downtime through IT-managed secure access. It also secures networks by expanding its behavioral analytics to IoT devices, detecting anomalies and preventing their compromis...
Everyone can agree the convergence trend is in full force in the electronic security industry and organizations are pushing more and more for integrated solutions that can not only enhance ROI but also solve problems that have traditionally been out of the realm of electronic physical security systems. This leaves system integrators and other solution providers in a difficult position as they scramble to be competitive especially when faced with an industry dominated by a few power players. Tack...
Western Digital Purple microSDAs announces the adoption of 4K Ultra HD video, emerging artificial intelligence (AI) applications and analytics drive the rapid growth and evolution of data in surveillance, Western Digital Corp. unveiled the Western Digital Purple microSD card, purpose-built for the complex and dynamic data demands of modern surveillance cameras and edge systems. Surveillance system operators can count on the robust Western Digital Purple microSD card to support a continuous surv...
The Industrial Internet of Things (IIoT) connects all technologies, systems, and components involved in the industrial value creation process to each other as well as to company networks and the Internet. With connectively playing a critical role in this scenario, BitFlow announced it is shipping a new I/O device for machine vision which provides an unprecedented 36 inputs and 36 outputs in a compact, DIN-rail mounted form factor supporting TTL, LVDS, open collector, opto-isolated and 24V signal...
Antaira Technologies a developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is announces the expansion of its industrial networking infrastructure family with the introduction of the IMP-C1000-SFP series. IMP-C1000-SFP Series Features The IMP-C1000-SFP series is a compact IP30 rated gigabit Ethernet-to-fiber media converter featuring a 10/100/1000Tx Ethernet port that supports IEEE 802.3at high power PoE that can supply...
Smart Factories promise to deliver improved production quality, asset optimization, safety, and cost reduction, but they require reliable always-on network connectivity between devices, sensors and operations control software. Many engineers struggle with the growing complexity and costs of increased network connectivity on the plant floor, especially as they are forced to deal with cramped cabinets and legacy systems. Activating Pre-Configured Automation Protocols To address these concerns, M...
EyeLock's technology delivers an unprecedented level of security with unmatched biometric accuracy EyeLock LLC, a provider of iris-based identity authentication solutions, announced it will be showcasing the nano EXT, the most advanced outdoor iris identity authentication solution, at ISC West 2017, which takes place April 5-7, 2017 at the Sands Expo Center in Las Vegas. ISC West is the largest security trade show in the U.S. Vandal Resistant Construction The nano EXT is designed to withstand EXTreme outdoor elements while providing unmatched security and convenience for data centers, banks, factories, industrial facilities, and office buildings. The nano EXT incorporates the following features: IP-67 rating for operating in extreme outdoor conditions IK-10 certification for its vandal-resistant construction Standoff distance of 19-24 inches ADA-compliant design Instant auto-height adjusting Further, the nano EXT integrates seamlessly with the various access control platforms, including Lenel, AMAG, Pacom, Software House, and Genetec, ensuring dependable, rapid, and hassle-free installation. Advanced Biometric Technology “The addition of an outdoor unit to our offering speaks directly to customers who want to implement a single technology approach for managing outdoor and indoor access control as well as to those looking to upgrade their exterior access points to the most advanced biometric technology,” said Anthony Antolino, Chief Marketing and Business Development Officer of EyeLock. EyeLock’s solutions are ideal for vertical markets including enterprise security, healthcare, stadiums, government, higher education, data centers, and more EyeLock Identity Suite Aside from the nano EXT, EyeLock is highlighting the following products and solutions at ISC West: HBOX: An overhead iris-based identity authentication system. The flexible design accommodates multiple mounting environments from mobile stands, fixed frames, and wall mounts to new construction and existing retrofit configurations. HBOX is ideal for borders, customs, stadiums, office buildings, and the like. nano NXT: A point of entry miniaturized iris-based recognition system. The nano NXT is an ideal replacement for card-based systems, and seamlessly controls access to secured entrances, server rooms, and any other physical Portable template: Provides nano NXT users the option to store templates on a smartcard or mobile The portable template supports large user populations without the need to manage an iris template database or gain access to the network. The portable iris template solution provides next-level security with increased convenience and mobility. EyeLock Identity Suite (EIS): A browser-based Centralized Management Application (CMA) which streamlines administration of EyeLock devices and users. EIS simplifies firmware updates and provides the ability to simultaneously manage multiple device settings and remote device diagnostics for online and offline devices. EyeLock products will also be shown in the following booths: Stanley Security Booth #31073, AMAG Technology Booth #10053, and Vanderbilt Industries Booth #25075. Identity Management EyeLock’s solutions are ideal for vertical markets including enterprise security, healthcare, stadiums, government, higher education, data centers, and more. EyeLock's technology delivers an unprecedented level of convenience and security with unmatched biometric accuracy, making it the most proven way to authenticate one’s identity aside from DNA. EyeLock’s proprietary iris authentication technology looks at more than 240 unique iris characteristics and provides a fast, user-friendly experience. EyeLock is one of the only biometric companies in the world to own and control the entire software and algorithm stack, providing patented approaches to dual-eye authentication, an unmatched security architecture and anti-spoofing technology.
Matrix COSEC door controller is engineered to perform under demanding conditions Matrix, a manufacturer and provider of telecom and security solutions, is participating in the ISC West 2017, Las Vegas, USA from 5th to 7th April, 2017. Matrix will be showcasing its IP video surveillance and access control solutions at the event. Door Access Control Matrix is known for offering value driven solutions catering to diverse, complex applications especially for the enterprise sector. Matrix will be showcasing its next generation access control solution—COSEC. Matrix COSEC is a cutting-edge multispectral, biometric fingerprint, palm vein and RFID card-based door controller, engineered to perform under demanding conditions and offer accuracy, speed, and security. These solutions offer an intelligent blend of hardware and software features making them suitable for diverse applications like hotels, warehouses, remote sites, factories, data centers, multi-located enterprises, mines, and so on. The solution also includes COSEC ARC—a unique IP based access control panel having multiple benefits over conventional access control panel. Being PoE based, it eliminates complex wiring and local power requirements. It’s Din Rail and wall mount option gives flexibility to mount even where the space is a constraint. IP Video Surveillance Under the IP video surveillance domain, Matrix will be launching its enterprise video management solution SATATYA SAMAS, which offers much more than just security. This comprehensive, intelligent, and reliable solution is designed to offer enhanced security of physical assets, safety of employees, improved productivity and discipline, centralized control with more visibility and real-time preventive security with quick investigation. To know more about these unique solutions and other security solution offerings, do visit Matrix at ISC West 2017, Booth no. 1041 from 5th to 7th April, 2017.
With the addition of EtherNet/IP the ioLogik E1200 presents a highly reliable, cost-effective alternative to expensive and proprietary I/O modules Moxa, a provider of network infrastructure solutions for the Industrial Internet of Things (IIoT), announces a major firmware update for its ioLogik E1200 line of remote I/O modules that introduces support for EtherNet/IP and a RESTful API. With the addition of EtherNet/IP, one of the most popular communication protocols in industrial automation, the ioLogik E1200 presents a highly reliable, cost-effective alternative to expensive and proprietary I/O modules, while also interfacing easily with IT systems. Versatile And Multi-Lingual Tool "The ioLogik E1200 series has long been valued by the automation community for its compact design, its peer-to-peer communications, and its ability to create daisy chain networks," explained Wenyuan Niu, Product Marketing for Data Acquisition at Moxa Americas, Inc. "This upgrade makes the ioLogik E1200 an even more versatile multi-lingual tool to bring I/O data from the plant floor into nearly any IT platform or system." The Moxa ioLogik E1200 series is available with a wide range of input and output types, including voltage, current, digital, pulse, frequency, RTD, thermocouple and more. Existing owners can gain the additional functionality for free by downloading the new firmware and completing the online registration process. The firmware adds support for both EtherNet/IP and a RESTful application program interface specifically designed for IIoT applications that interact with cloud services. Updated ioLogik units will be able to collect sensor and device data via EtherNet/IP, Modbus, and Active Ethernet I/O, and will be able to share that data with IT platforms over SNMP, RESTful APIs, and MXIO. New E1200 models will ship with the updated firmware beginning in January 2017. EtherNet/IP is a widely deployed industrial protocol that was originally developed by Rockwell Automation and is commonly used in factory, hybrid and process industries. By adding support for EtherNet/IP to the ioLogik E1200, Moxa has opened up greater opportunities for businesses to access Moxa's vast array of I/O solutions and create cost-effective plant floor solutions that control, configure and collect data. The ioLogik E1200 expands Moxa's offering of EtherNet/IP communication products, which including Ethernet switches that can be managed on a SCADA network and EtherNet/IP gateways that allow communication with Modbus devices. Save
Antaira Technologies is a global leading developer and manufacturer of industrial device networking and communication product solutions for harsh environments and is proud to announce its expansion in the industrial networking infrastructure family with the LMX-0800G series. Antaira’s industrial gigabit managed Ethernet switch line (LMX-0800G series) has been designed to fulfill applications in harsh or outdoor environments. Some applications where the LMX-0800G switch works well includes: power/utility, solar grids, windmills, mining infrastructures, factory/process control automation, ITS - roadway traffic control/monitoring, building facility outdoor infrastructures or security surveillance and access control systems. Antaira Technologies’ LMX-0800G series is a cost effective 8-port industrial gigabit managed Ethernet switch with a 12~48VDC power input range. Each unit is designed with eight 10/100/1000Tx RJ45 ports. The LMX-0800G has a 16 Gigabit backplane speed that supports Jumbo Frame and wide bandwidth for large Ethernet data packet transmission for edge level connectivity solutions. The product series provides high EFT, surge (2,000VDC) and ESD (6,000VDC) protection. It is also built with a dual power input design with reverse polarity protection, and has a built-in relay warning function to alert maintainers when power failures occur. This makes it ideal for applications demanding a high reliability and distance extension. Pre-Loaded With “Layer 2” Network Management Software The LMX-0800G series is pre-loaded with “Layer 2” network management software that supports an ease of use Web Console or Telnet through the serial console by CLI configuration. All Antaira managed switches provide the ring network redundancy function with STP/RSTP/MSTP and the ITU-T G.8032 (ERPS – Ethernet Ring Protection Switch) protocol which supports a The LMX-0800G series is backed by a five year warranty and the units are IP30 rated, compact, fanless, DIN-Rail and wall mountable. Each series is built to withstand industrial networking hazards like shock, drop, vibration, electromagnetic interference (EMI) and extreme temperatures. There are two operating temperature version models for either standard temperature (-10 ~ 70°C) or extended temperature (-40 ~ 75°C). The models have the dimensions of 54mm (W) x 99mm (D) x 142mm (H) and a unit weight of 2.1 pounds.
Antaira Technologies is a global leading developer and manufacturer of industrial device networking and communication product solutions for harsh environments and is proud to announce its expansion in the industrial networking infrastructure family with the LMP-0800G-24 series. Antaira’s industrial gigabit managed Ethernet switch (LMP-0800G-24 series) has been designed to fulfill industrial applications in harsh or outdoor environments. Some applications where the LMP-0800G switch works well includes: power/utility, solar grids, windmills, mining infrastructures, factory/process control automation, ITS - roadway traffic control/monitoring, building facility outdoor infrastructures or security surveillance and access control systems. Built-In Voltage Booster Antaira Technologies’ LMP-0800G-24 series is a cost effective 8-port industrial gigabit PoE+ managed Ethernet switch with a 12~36VDC low voltage power input that has a built-in voltage booster to support a full 48VDC PoE power output for each PoE port. Each unit is designed with eight 10/100/1000Tx gigabit ports that are IEEE 802.3at/af compliant (PoE+/PoE) with a PoE power output up to 30W per port. With a 16 Gigabit backplane speed, the LMP-0800G-24 supports Jumbo Frames and wide bandwidth for huge Ethernet data packet transmission for edge level connectivity solutions. The product series provides high EFT, surge (2,000VDC) and ESD (6,000VDC) protection. The unit is built with a dual power input design with reverse polarity protection. There is also a built-in relay warning function to alert maintainers when power failures occur. This makes it ideal for applications requiring high reliability and distance extension. Pre-Loaded With “Layer 2” Network Management Software This product series is pre-loaded with “Layer 2” network management software that supports an ease of use Web Console or Telnet through the serial console by CLI configuration. All Antaira managed switches provide the ring network redundancy function with STP/RSTP/MSTP and the ITU-T G.8032 (ERPS – Ethernet Ring Protection Switch) protocol which supports a The LMP-0800G-24 series is backed by a five year warranty and the units are IP30 rated, compact, fanless, DIN-Rail and wall mountable. Each series is built to withstand industrial networking hazards like shock, drop, vibration, electromagnetic interference (EMI) and extreme temperatures. There are two operating temperature version models for either standard temperature (-10 ~ 70°C) or extended temperature (-40 ~ 75°C). The models have the dimensions of 54mm (W) x 99mm (D) x 142mm (H) and a unit weight of 2.1 pounds.
SATATYA SAMAS enterprise VMS provides complete centralized control over security and safety Matrix, a leading manufacturer and provider of telecom and security solutions, is participating in the ISC WEST 2016 (Stand no: 1042), Las Vegas, USA from 6th to 8th April 2016. Matrix will be showcasing its IP Video Surveillance, and Access Control solutions at the event. Matrix COSEC Access Control Solution Matrix is known for offering value driven solutions catering to diverse complex applications especially for enterprise. Matrix will be showcasing its next generation Access Control solution – COSEC. Matrix COSEC is a cutting edge multi-spectral, biometric fingerprint, Palm vain and RFID Card based door controller, engineered to perform under demanding conditions and offer accuracy, speed and security. These solutions offer intelligent blend of hardware and software features like IP65 Water Resistant design, Wi-Fi, 3G/4G connectivity, Power over Ethernet making them suitable for diverse applications like hotels, warehouses, remote sites, factories, data centers, multi-located enterprises, mines, etc. The solution also includes COSEC ARC - a unique IP based access control panel having multiple benefits over conventional access control panel. Being PoE based, it eliminates complex wiring and local power requirements. Its din rail and wall mount option gives flexibility to mount even where the space is a constraint. Matrix SATATYA SAMAS Enterprise VMS Under the IP video surveillance domain, Matrix will be launching its Enterprise Video Management solution SATATYA SAMAS, which offers much more than just security. SATATYA SAMAS is an all-in-one Enterprise Video Management solution, which provides complete centralized control over security and safety to the staff entrusted with the overall security. This scalable and intelligent preventive solution allows centralized control with detailed and contextual live monitoring & playback, fool proof management of the connected devices and identifying, notifying & reacting to any unexpected events. Furthermore, this modular, comprehensive, insightful and reliable solution with redundancy also provides the IT manager with centralized real-time information about the bandwidth and usage of its servers for hassle free solution management.
The FSMA Final rule will protect the food supply against intentional contamination due to sabotage, terrorism, counterfeiting, or other illegal harmful means The U.S. Food and Drug Administration (FDA) is due to release the Food Safety Modernization Act (FSMA) Final Rule on Intentional Adulteration on May 31, 2016. Food Industry Security Professionals will soon be tasked with assessing their facilities to reduce supply chain food adulteration vulnerabilities. Food Security Professionals will need to develop an effective site plan to include where and when to conduct vulnerability assessments, implement focused mitigation strategies, and examine resources available to the food defense practitioner to minimize risk exposure and meet outlined regulatory requirements. Food Drug Administration’s Proposed Rule On Food Defense The FDA’s proposed rule on food defense would require facilities to address vulnerable processes in their food supply operations to prevent acts of intentional adulteration intended to cause large-scale public harm. Some background on what led to this aspect of the rule may provide insight into its key elements. The Act was signed into law on January 4, 2011 to better protect human and animal health by helping to guarantee the safety and security of the food and feed supply. Its focus was to ensure that the U.S. food supply is safe by shifting the focus of federal regulators from responding to contamination to preventing contamination. The law also provides FDA with new enforcement authorities designed to achieve higher rates of compliance with prevention & risk-based food safety standards, and to better respond to and contain problems when they do occur. Danger Of Large-scale Public Health Harm Intentional adulteration includes those types of acts committed by disgruntled employees, consumers, or competitors where the intention is to cause large-scale public health harm; or by economically-motivated adulteration. Acts of disgruntled employees, consumers, or competitors are generally directed at attacking the reputation of the company and not at causing public health harm. The primary purpose of economically-motivated adulteration is to obtain economic gain, and not to impact public health, although public health harm may occur. From a historical perspective, the threat to the food supply chain has been evident for decades. Examples include during World War I when German agents in the U.S. infected horses and cattle in transit across the Atlantic to France; to al Qaeda documents and manuals found in Afghanistan after the 2001 U.S.-led invasion revealed interest in conducting chemical & biological attacks on food supplies; to 2014 when a Chinese court sentenced a former plant employee to life in prison after the poisoning of frozen dumplings that made at least 10 individuals ill. An effective overall site security plan will soon require the aspect of food defense to protect the food supply against intentional contamination due to sabotage, terrorism, counterfeiting, or other illegal, intentionally harmful means. The rule applies to facilities required to register as “food facilities” under Section 415 of the Food, Drug, and Cosmetics Act. Facilities covered under the rule would be required to develop a “Food Defense Plan” and identify and implement mitigation strategies to minimize or prevent significant vulnerabilities in food operations. The four key activities within the food system that are the most vulnerable to intentional adulteration, and have the potential to cause large scale public harm, are defined as liquid receiving and loading; liquid storage and handling; secondary ingredient handling; and mixing and similar activities. Each facility will be required to conduct a reanalysis of its Food Defense Plan at least once every three years Food Defense Plan Against Intentional Contamination Covered facilities would be required to review their production systems to determine if they have any of these activity types and conduct their own vulnerability assessment to identify and prioritise points in their food operations that may be vulnerable to intentional adulteration. For the first time, FDA will have a legislative mandate to require comprehensive preventive controls across the food supply. This mandate includes compulsory preventive controls for food facilities to include the implementation of a written preventive controls plan. This plan involves: Evaluating the hazards that could affect food safety Specifying what preventive steps, or controls, will be put in place to significantly minimize or prevent the hazards Specifying how the facility will monitor these controls to ensure they are working Maintaining routine records of the monitoring Specifying what actions the facility will take to correct problems that arise. Each facility would be required to conduct a reanalysis of its Food Defense Plan at least once every three years, or following certain conditions (e.g., significant change in facility operations, new information about potential vulnerability, etc.). Personnel and supervisors assigned to the Actionable Process Steps would be required to receive appropriate training in food defense awareness and in their responsibilities for implementing Focused Mitigation Strategies. Facilities would be required to maintain certain records, including the written Food Defense Plan, personnel training documentation, and records related to monitoring, verification, and corrective actions. Lastly, as the issuing of the Final Rule approaches, the FDA has proposed to also publish a guidance document that provides the requirements in plain language to help businesses, particularly small businesses, comply with the identification of actionable process steps and implementation of focused mitigation strategy requirements. Industry can prepare now by conducting a comprehensive security assessment of their facilities to include the site perimeter, access control, security & emergency procedures, shipping, receiving & warehouse storage security practices, on-site security personnel, law enforcement outreach, site utilities, suppliers, hazardous materials/chemicals, criminal background check programs, cyber security, employee security awareness training, incident reporting & documentation, and recordkeeping requirements. The FDA website also includes useful information on FSMA, as well as links to their software programs such as the “Food Defense Plan Builder” that is designed to assist in developing a food defense plan based on a user entering specific answers relevant to their facility.
Customers are looking for more than simple plug-and-play cameras. They wantgood, high-definition cameras to protect their driveways, garages & shops Surveillance and CCTV applications are poised for continued growth in 2016 and beyond as security dealers and their end-user customers turn to video technology for physical security, loss prevention and gathering data and intelligence to assist business management and operations. Overall, the CCTV industry is benefitting from greater awareness of the different uses for surveillance, as well as more accurate and robust technology. According to research firm Memoori's 2015 annual report on physical security, video surveillance products were 54 percent of total sales and accounted for $14.68 billion, topping intruder alarms which came in at 23.5 percent and $6.40 billion and with access control garnering $6.13 billion and 22.5 percent of the total. The report further indicates that the industry overall has edged up at a compound annual rate of 7.82 percent since 2010 and forecasts growth for total security equipment up some eight percent in 2016, reaching almost $42 billion over the next five years to 2020. Steve Stowe, Vice President of BAP Security in Macon, Georgia., is keen on the higher feature sets and intrinsic value of video surveillance applications for the company’s prospects and customers. BAP Security has been in business since 1967, offering custom security solutions for residential and commercial subscribers in Georgia, North Carolina, South Carolina and Florida. Video Analytics On A Roll Stowe says he expects to see higher adoption of video analytics as it becomes a more common feature in even lower-cost equipment. “We have more and more people asking about line-crossing detection in particular. Many customers are also looking at upgrading older analog CCTV equipment since we can economically match the 1080P resolutions they are used to seeing on their televisions with HD-TVI, HD-SDI and other HDcctv technologies while still using their existing cabling infrastructure. There are still many customers who have seen the value at one point in time to invest in a CCTV system – we can now help them migrate cost-effectively and offer much improved picture quality than what they are used to,” Stowe says. Video analytics is becoming an increasingly common video surveillance feature,even in lower-cost equipment According to Stowe, businesses with personnel who have one-on-one contact with their customers such as office reception areas, teller stations and others are looking at adding cameras to record these interactions in case there is a problem, possibly even recording video with audio when appropriate. “Even customers who don't want a complete CCTV solution can use a more limited, standalone system or even IP cameras with edge recording,” he says. Replacing Intrusion Detection With CCTV Increased awareness by the general public regarding the advantages of surveillance is also fueling an interest in video installations, Stowe says. “Homeowners are asking about CCTV more than ever before, and most of the people we are talk to are looking for a lot more than the simple plug-and-play cameras being sold by mass marketers. They want good, high-definition cameras to watch their driveways, HVAC units, garages, shops and even their pets.” The commercial market is also experiencing an uptick, especially for integrated installations. “Some commercial markets such as factories, multi-tenant properties and churches are looking more at integrating CCTV with other systems such as access control. Capturing the video as the door is accessed along with who and what might be with the cardholder is information that is important to them, whether it is to catch internal theft or making sure the tenant is not letting others access the property or even for child safety.” Looking ahead, word on the street is that CCTV installations may eventually take the place of traditional intrusion detection sensors. Motion detection, analytics and integration with audio or other technology continues to increase the power of surveillance specifications for loss prevention and more.
Cybersecurity is a fast-changing field and 2015 was no exception. The proliferation of cybersecurity issues continued to make headlines, including the very dramatic hacking of a vehicle to allow for remote control over steering, brakes, the transmission and other critical functions. There was also state-sponsored hacking that targeted government, defense and other strategic sectors of the marketplace. Staying on top of these breaches still remains a challenge. Securing The Internet of Things While we can’t discuss the details of our projects over the past year, we are proud to say that NTT Com Security has been successful in identifying new vulnerabilities in mobile devices, home security systems, and automotive telematics interfaces. These are all part of the important area of the “Internet of Things” that will continue their climb into the information security headlines in 2016. For the New Year, we are anticipating a broader focus beyond the servers, workstations and communications infrastructure that we are used to, growing to encompass appliances, vehicles, factories, utility infrastructure, medical devices, and myriad other devices that will eventually all be connected to the Internet – and therein lies the ongoing task. The Internet in general is extremely vulnerable, and companies and individuals have a long way to go in learning how to protect themselves. We can expect continued attacks targeting payment card data wherever it can be found along with attempts to commit financial fraud with stolen banking credentials or via social engineering tricks like spear phishing emails. High profile breaches, such as the Edward Snowden leaks, have brought security to the forefront of the public consciousness Security and risk management Fortunately, these high-profile breaches, hack demonstrations (like the Jeep hack), and the Snowden leaks have all helped bring the topic of security directly into the public consciousness. With consumers becoming aware of the value of their information and the importance of protecting their privacy, companies will be forced to design security into their products. We are already seeing a public demonstration of this with the new security and encryption controls Apple has implemented on the iPhone. Meanwhile, talking about risks and vulnerabilities can sometimes feel like shouting at a crowd that refuses to listen despite the obvious danger they are in. The good news is that we are taking active steps to guard against risk and combat it where it happens. NTT Com Security has developed a global cybersecurity and risk management portfolio of managed services, consulting and technology solutions to protect critical and confidential data from attacks. See the full coverage of 2015/2016 Review and Forecast articles here
Keeping the food supply safe was not an issue for Furman Foods back in 1921, when John W. Furman canned 360 glass jars of tomatoes with his wife, Emma, and their six children. Just as food processing practices have evolved over time, so too has the nation’s approach to securing food processing facilities. Today, Furman Foods uses ID cards as the first step of a greater plan to enhance its plant security. Furman Foods is a family-owned business. By 1969, the company had sold a million cases of tomatoes and was complementing its tomato crop with beans, peppers and other vegetables sold under the Furmano’s name. The company’s roots are planted firmly in the soil of the Susquehanna River Valley of Pennsylvania. Despite this remote location, Frank Furman, Vice President of Quality, is ready to take the facility to the next level of security and quality. “The need is here,” he said. “Everything is coming together at once. Not only does security make good business sense, but it also is something we need to do for our customers.” Food Safety And Security While the company has focused on food safety for many years, the U.S. Food and Drug Administration’s (FDA’s) Bioterrorism Act of 2002 made security a top concern for food producers such as Furman’s. Title III of the act specifically addresses protecting the safety and security of food and drug supplies. In addition, because Furman Foods provides food for U.S. Department of Agriculture (USDA) food programs, it is subject to USDA security measures. Security isn’t new to the company. It began incorporating additional security measures shortly after September 2001. The well heads for the water supply are locked and checked daily, for example, and a third-party security service is on duty during off-hours. Delivery truck doors now must be sealed, the company’s computer systems have new access controls in them, and locks now adorn all bulk storage areas, such as those for corn sweeteners and vinegar, some of the most vulnerable areas in the company. An important part of the security system at Furman’s is a new ID card program Time And Attendance Tracking An important part of the security system at Furman’s is a new ID card program. “We needed to replace our time clocks,” said Mark Slear, Systems Administrator, “so we took advantage of the opportunity to introduce employee ID cards to track time and attendance.” “I wanted some kind of control so that people who don’t work here don’t get in,” Furman said, “Despite the fact that we are located in a rural area, we still were seeing people here who shouldn’t be here. We had to figure out some way to limit access.” In the past, the company had pre-printed, pre-numbered, bar coded cards for hourly employee access. Employees were assigned a number, but that was it. HID Fargo Printer/Encoder Slear and Furman selected the Fargo DTC550 Direct-to-Card Printer/Encoder with lamination capabilities from ID Wholesaler (www.idwholesaler.com), a Fargo Value-Added Retailer and the largest online reseller of photo ID products. “I looked around quite a bit,” said Slear, “and all of my research kept coming back to Fargo.” Furman’s warehouse employees require a stronger card to withstand the everyday wear and tear associated with their active jobs" “We determined that Furman Foods needed a higher level of security than a basic photo ID card could offer,” said Shane Stark, Account Manager, ID Wholesaler. “The FDA keeps tight regulations on who has access to food processing areas. Along with using bar codes and magnetic encoding for security measures, Furman’s warehouse employees require a stronger card to withstand the everyday wear and tear associated with their active jobs. This led us to lamination and a Mylar card, which offers greater durability.” Slear was also interested in the printer’s speed. “When we ramp up during the summer, we produce a year’s worth of product in three months,” he said. “We have to print a lot of ID cards quickly to accommodate our seasonal workers.” Security Access Cards Furman’s bought the Fargo printer in October, took employee pictures in November and began issuing new ID cards in January. The ID cards contain a full photo, and the program includes all employees, even the extra 300 that are hired during the July-to-October busy season. While tracking time and attendance with the ID cards was the company’s first concern, Slear and Furman were thinking ahead when they chose an ID card printer, knowing that security needs would be enhanced down the road. “We added a magnetic stripe and photo in preparation for future security,” said Slear. “We haven’t defined yet what else we might do, but much of it will be driven by FDA and USDA directives.” “We liked the fact that the DTC550 printer can print on proximity cards if we decide to upgrade our ID cards someday,” said Slear. Furman agreed. “Eventually, we will go to smart cards, especially for the room where our ingredients are mixed,” he said. “We need to limit this area to those who are designated to be there. They will have to swipe an ID card for access. We chose a printer that will allow us to upgrade the cards, knowing that sooner or later we’ll have to go further with security.” Our product and industry knowledge enable us to assess our customers’ needs and present options that meet their requirements" Comprehensive Identification Solutions “Everything has been going well,” Slear said. “The person printing the cards picked up on it quickly.” Slear gives high marks to ID Wholesaler for their customer service. “Every time I talk to Shane, I get the answers I need,” he said. “He also checks in from time to time, just to see how things are going.” “Our product and industry knowledge enable us to assess our customers’ needs and present options that meet their requirements and their budgets,” said Jennifer Clancy, Marketing Manager, ID Wholesaler. Currently there are three variations to the Furman’s ID cards: yellow background for employees, green background for visitors and blue background for vendors. “Certain vendors are allowed on site without an escort,” said Furman. “For instance, because we are a kosher facility, once a month a rabbi comes in to check our operations. He has his own vendor ID card and is pre-approved, so he can move throughout our facility unescorted.” Facility Security One of our big concerns is having someone follow a carded employee into the plant Furman Foods prides itself on its strong values, its quality products, its sustainability and its food security. Yet Furman isn’t satisfied. “We are still not where we should be,” he said. “We have come a long way, but we have a long way to go. If I could wave a magic wand, we would have one entrance, where everybody has to enter and exit. This entrance would be secured by a card reader, so individuals would have to swipe an ID card to get in. One of our big concerns is having someone follow a carded employee into the plant. Restricted areas should require special access cards, and I’d like a fence around the entire facility, with a guard shack where everyone checks in and out,” he further added. Right now, there are multiple entrances for traffic. The facility is very spread out, and the road in front is a public road. Photo ID Access Card Yet, all agree that the ID cards are an important step on Furman Foods’ journey toward enhanced security. “A safe workplace is fundamental,” said Clancy. “Photo ID cards provide at-a-glance validation that the card wearer is authorized to be on the premises. This is especially important for food manufacturers.” “I tell our employees security is only going to get tighter,” Furman said. “More safeguards will be put in place. We are in the food business. If we don’t have safe foods, we don’t have jobs.”
Ellams, a global manufacturer and supplier of telephone scratch cards based in Nairobi, Kenya, required a foolproof security solution, integrated with access control and video surveillance for their manufacturing units. Matrix provided Ellams with an Integrated Access Control solution comprising of Card based Entry and Exit Readers. Established in the year 1977, Ellams primarily started off as a Security Documents Printer and Business Forms Manufacturer. In the year 2001, Ellams started off with the new venture of developing Telephone Scratch Cards for local telecom and cellular operators. Ellams has two manufacturing units based in Nairobi that supply secure pre-paid scratch cards to Central, Western, Eastern, and Northern Africa. Security being crucial for Ellams with respect to its manufacturing unit, the company was on a look out for a vendor who could meet the below mentioned requirements. Challenges: Dual verification of credentials at main entrance Allow entry or exit to a user in an employee zone if a guard is present in his cabin Guard does not leave while employees are present in an employee zone Keep a check on employees’ movements – whether they enter after gaining access or not, etc. Access Control in each department Pre-defined number of users allowed in a department When a user enters an area, the event is recorded till he/she leaves Generate alarm on violation of access rules Solutions: Web-based access control solution with card-based entry and exit readers Integration with beam detector for checking user availability in an area after entering the premises Man-Trap feature to open one gate at a time Employees allowed access only if guard is present Occupancy control to ensure defined number of people are allowed in the respective zone Camera remains on in presence of employees in a respective zone and turns off in their absence Instant alarm notification to take immediate action upon violation of access rules Benefits: Improves security with integrated solution Real-time alarm notification helps take immediate action upon violation of access rules Ensures the guard continuously monitors entry and exit of employees Products: COSEC DOOR CAP - RF card based premium door controller COSEC PATH RDCE – EM proximity card-based reader COSEC PANEL LITE- Site controller for multiple door controllers COSEC CENTRA GE- Application software for 100 users, expandable up to 500 users COSEC GE ACM- Access control module for COSEC CENTRA GE
Vanderbilt’s ACT access control solution was recently installed by BDI Security Solutions Ltd at sites in Burnaston, Derbyshire, and Deeside, North Wales, for car manufacturer Toyota Motor Manufacturing (UK) Ltd. At Deeside, Toyota operates a 115-acre engine plant. Together, the two sites represent investment of £2.5bn and employ 3,000 people. For the plant’s security, Toyota wanted a tailored solution that would enable them to operate from a virtual environment and respond promptly to requests. Unified Access Control Solution The installation replaced a legacy system that was no longer future-proof and did not allow access control listings to be integrated with Toyota’s general corporate database. Toyota now has a unified solution with badge-printing as an integral and cost-effective element when it had previously been a separate process. The equipment installed at the manufacturing plant includes ACT Mifare1030 mullion proximity readers at both indoor and outdoor locations. These slim-line readers support third-party smart cards and fobs, feature a robust polycarbonate housing and have an ingress rating of IP67. They are particularly suited to this type of project where the smart card is used for multiple applications across access control and HR. ACT eLock MIFARE Classic Toyota is also using ACT eLock MIFARE Classic. This is a wireless door lock that includes an access control reader and opening mechanism, all powered by batteries. ELocks operate with an ACT eLock hub and up to 32 locks can communicate over a wireless network with each hub.
Security and surveillance systems are becoming critical to manufacturing plants and factories by helping to address the theft of raw materials, the theft of IP, and the tampering of equipment, machinery and cargo. They can also serve as an effective monitoring tool for overseeing assembly line production and worker safety. A Micron/Repon Case Study Repon, a manufacturer of high-quality ball bearing slides used in various industries including server- and rack-mount systems, office/home furniture, white appliances, tool boxes and medical carts, recently deployed an advanced security and surveillance system—an edge storage solution—at their newly built manufacturing plant in the south of Taiwan. Their system architect, Apogear, integrated Micron’s industrial microSD cards into this solution. In the case of Repon’s deployment, 24x7 operational requirements needed to be met while minimizing the risk of data lossIn this case study, we discuss why Repon implemented an edge storage solution and how they will benefit—from a total cost of ownership (TCO) perspective—with Micron’s industrial microSD cards. Why Edge Storage? The simple answer: to enhance overall system reliability. In the case of Repon’s deployment, 24x7 operational requirements needed to be met while minimizing the risk of data loss. Edge storage—the recording of video and storing it at the camera—provides recording redundancy, helping to reduce the risk of data loss. By storing a second copy of recorded video in a microSD card, edge storage provides backup in case there are any issues with the primary network storage (including network reliability issues). In the event the primary network storage goes offline, video continues recording in the microSD card. The recorded video can then be synchronized to network video recorders (NVRs) or video management systems (VMS) after the primary system is restored. Selecting The Right Industrial microSD Card Historically, memory manufacturers sell the lowest quality NAND flash (media grade) memory to the memory card market. While this quality of NAND can be sufficient for storing pictures and video (where data is written to once and stored), using it in microSD cards for edge storage (where data can be written and rewritten to often) is not recommended. Figure 1: Edge Storage for Recording Redundancy Edge recording with memory specifically designed to support 24x7 recording over a long period of time requires a new understanding of how that memory is made— from silicon selection, to manufacturing flow, to product design, to qualification testing. Many microSD cards available in the market today are intended for consumer use in digital still cameras (DSCs), car dash cams, or home cameras; they are not designed for commercial and industrial edge storage in IP video surveillance cameras. As such, edge storage can often be viewed as ‘unreliable’ by system integrators and installers.Users may not understand that the lifetime and quality of a microSD card can vary significantly depending on the quality of the card Users may not understand that the lifetime and quality of a microSD card can vary significantly depending on the quality of the card. Selecting the wrong quality of microSD card can result in costly field failures, often occurring within months after deployment. The importance of selecting the right memory card in an edge storage solution is illustrated in Apogear’s analysis of Repon’s edge storage solution. The analysis also shows the cost savings Repon anticipates from using Micron’s Industrial microSD cards in their solution. Project Cost Analysis And Assumptions Apogear’s total cost of ownership (TCO) analysis (below) is reflected in relative percentages, and not on actual dollars and cents given regional and vendor differences. To create an understanding of the project scale, the TCO was estimated at approximately $850,000 USD over a three-year contract term in regards to deploying a 600-camera system at Repon’s manufacturing facility using Micron Industrial microSD cards. Figure 2: Cost Distribution Data, as provided by Apogear Figure 2 provides the percentage of costs during the estimated lifecycle of the edge storage system. The cost per system phase amounts to: Equipment cost (68%) - the cost of an IP camera, networking equipment (switch, cables, etc.), accessories, NVR and central monitoring system (CMS), and storage (HDD and microSD card). Deployment cost (20%) - the cost of installation, configuration and integration. Design cost (2%) - the cost of consulting and system architecture design. Maintenance cost (8%) - the cost of planned, regular and additional maintenance services. Decommission cost (2%) – the cost of dismounting and recycling equipment at the end of its lifetime Why Micron’s Industrial microSD Card? Micron’s solution is backed with a 3-year product warranty under professional surveillance use casesThe importance of product reliability is often underestimated when considering the cost of maintenance and field service. When a retail-grade microSD card fails, the card must be replaced. Not only are there direct costs of sending a crew to service and replace the card, but there are also outage times that can result in significantly more costs. By implementing Micron’s industrial microSD card, which is designed for 24/7 video surveillance edge storage usage, it is estimated that Repon will see an approximate $141,000, or about 16%, improvement in TCO compared to using an off-the-shelf retail microSD card1. High Reliability and Quality, Lower Maintenance and Replacement Costs Micron’s industrial microSD card supports 3 years of high-quality continuous 24/7 video recording with a quality specification of 2 million hours mean time to failure (MTTF) and 0.44% annualized failure rate (AFR) —2X better than a typical HDD today. Additionally, Micron’s solution is backed with a 3-year product warranty under professional surveillance use cases, helping to keep maintenance and replacement costs to a minimum. Figure 3: Maintenance and Replacement Cost Comparison, as provided by Apogear Advanced Features Minimize Risk Of Data Loss Micron’s industrial microSD card contains firmware optimized to provide stable performance for 24x7 high quality video recording with minimal frame drops.Micron understands the unique needs of this market and has developed deep application-level expertise In addition, Micron’s industrial microSD card offers a health monitoring feature for IP camera integration that reports card usage and lifetime remaining. Systems can integrate this feature into their software to alert predictive maintenance service. Micron’s industrial microSD card comes with password protected lock/unlock features to keep the device secure. Conclusion The move to edge recording and high endurance storage is happening across the Industrial IoT landscape. Targeted solid state storage solutions are emerging, and with it, new entrants into the security and surveillance ecosystem. As a leader in automotive and industrial memory solutions, Micron’s new product line of industrial microSD cards are built to meet the requirements of this industry. As a trusted advisor to its embedded customers for more than 25 years, Micron understands the unique needs of this market and has developed deep application-level expertise and a portfolio designed with that in mind. Most importantly, it brings to the market a mindset to deliver sustainable value to its customers.
JK Tyre & Industries Ltd. is an automotive tire, tubes and flaps manufacturing company based in Delhi, India. The company is the only tire manufacturer offering the entire range of four-wheeler radials for trucks, buses, and cars. JK Tyre has a worldwide customer base in over 80+ countries. With production facilities in nine plants, total production capacity is almost 20 million tires per annum. Employee Shift And Visitor Management JK Tyres have its biggest manufacturing setup in Mysore. The premise consists of a manufacturing unit as well as the administrative department. Since the plant runs 24×7 and there are numerous shifts of workers, they found it difficult to manage multiple shifts manually. Managing visitors was also a problem for the company. So, they required a software that would help them keep a record of visitors on time-to-time basis. Creating a visitor’s identity in the form of visitor pass and generating reports of visitors on a monthly basis was a tiresome process. JK Tyres was looking for a vendor who could offer them a complete solution related to time-attendance and visitor management. Matrix Time-Attendance Solution Matrix offered a time-attendance solution, which centrally handled multiple shifts of workers and employees. Numerous shifts were created to manage time-attendance of over 500+ workers. Moreover, they provided employee self service, which helped the employees view day-to-day attendance, apply for leave/tour, etc. JK Tyres further required a record of visitors so Matrix delivered visitor management software, which helped them create a visitor pass, fetch visitor records, and generate reports of the same. Results: Reduction in cumbersome HR tasks Automatic maintenance of visitor records on day-to-day basis 40% increase in productivity of employees and workers
Surveon, the enterprise NVR solutions provider, announced a factory in Kuwait City has deployed Surveon’s IP surveillance solutions as their partner for security application, including 100+ megapixel cameras and 10 enterprise-grade network video recorders, which not only fulfill the need of 180-day non-stop recording, but also ensure a strong protection for the safety in the factory.Ensuring Long-Term Video RetentionWhen it comes to an effective surveillance system for factory application, megapixel solutions offer significant benefits for surveillance purpose as the clarity of images offers efficiency in monitoring and help prevent possible events such as intrusion in forbidden areas like production line or operation station.However, it’s challenging to plan a reliable system with sufficient storage to cope with large number of cameras that cover every critical area for 24/7 recording requirement. With Surveon NVR7316, these problems can easily be solved. Supporting up to 128CH 1080P full HD cameras with non-stop recording and 16-bay hot-swappable HDDs, NVR7316 is an ideal solution for industrial application. In addition, NVR7316 is able to expand the storage via local SAS port or iSCSI interface, making it suitable to projects that require long-term video retention.Wide-Range MonitoringDue to its spacious environment and the limited number of security guards, not all the places in the factory can be well monitored. Surveon 3MP cameras, CAM3461LV and CAM3471HEV, provide 1.5-times larger monitoring range at 30 FPS and allow the whole production line to be seen clearly, giving the factory cost-effective options without installing other cameras for wide-range monitoring.Meanwhile, Surveon 5MP cameras, CAM3571VP and CAM4521LV, ensure all details can be seen without any missed, even under the low light conditions such as the gateway of factory. All Surveon megapixel cameras are with industrial-grade components to ensure product reliability for long-term operations.Affordable Yet Professional Solution"Surveon can always provide the affordable yet professional solutions for our projects. Without searching other solution providers for months, Surveon's total solutions have met all of our expectations and delivered the performance that is tailored to our needs," said the Project Partner, Advanced Technology Company for Computers ATCC.Surveon is dedicated to offering a variety of end-to-end video surveillance solutions catering to different vertical applications, giving partners reliable options for their projects.