Two members of the Hardstaff Barriers team have been shortlisted for national apprenticeship awards due to their commitment and achievements at work. Rhiannon McGhee, Apprentice Health, Safety, and Environment Technician, has been nominated for ‘Apprentice of the Year’ and Kathryn Cooper, Service Manager, has been nominated for ‘Apprentice Champion of the Year’ in the National Apprenticeship Awards 2021 for the East Midlands region. About Hardstaff Barriers Hardstaff B...
Abloy Oy announced ABLOY CUMULUS, a platform for keyless access, combining quality hardware products with secure access and management applications. It brings all the solutions together into a single ecosystem with a risk-free, integrated cloud service. “CUMULUS is our next step in the ‘keyvolution’ — the development in which mechanical keys are transforming into digital ones. We have wrapped our more than one hundred years of security expertise into digital so...
For those looking for a new and intelligent approach to fire detection, AVIOTEC, the artificial intelligence-based fire detection camera from Bosch Security Systems, detects fires quickly and reliably in challenging settings, such as dusty, humid, and dark areas. It is vital to detect fire as early as possible. AVIOTEC is an IP camera with built-in video analytics. The trained algorithm detects flames and smoke directly at the source. The device can, therefore, detect fires faster than a common...
3xLOGIC, Inc., a globally renowned provider of integrated, intelligent security solutions, is introducing its Gunshot Detection solution, which features a reliable dry contact that allows it to be easily integrated into existing security systems. Gunshot Detection solution Rather than utilizing microphones, infrared sensors, or complex analytics, the self-contained device relies on affordably simple concussive force recognition sensors to detect gunshots. When a gun is fired, the bullet create...
Soloinsight, the workflow automation platform company announced the opening of its new location in Charleston, South Carolina named The Workflow Innovation Center. The opening signifies growth and an increased interest in innovative workflow automation solutions, such as Soloinsight’s flagship platform, CloudGate, which addresses the security and facility automation needs specifically to PIAM, VIAM, and space reservations. These systems enhance the way departments interact with the life...
With the continued rolling back of COVID restrictions in the UK, there is a palpable sense of relief. A mixture of mass vaccinations, widespread testing, and track and tracing of the infection is helping to enable a healthy bounce back for businesses – with secure access control taking an important role in facilitating this. However, rather than just being a reaction to the wake of the pandemic, there is every sign that the economy, and consequently the security sector as well, are both r...
LenelS2 announced a North America distribution agreement with its OpenAccess Alliance Program (OAAP) partner, Splan, a next-generation visitor check-in software solutions company. The agreement enables LenelS2 and its value-added reseller network to provide a more comprehensive touchless building access experience that includes visitor management. Splan’s visitor management solution integrates with LenelS2’s market-leading OnGuard®and NetBox™ systems as well as BlueDiamond™ cellphone credentials to more fully realize Carrier’s Healthy Buildings Program. LenelS2, a global pioneer in advanced security systems and services, is a part of Carrier Global Corporation, the global provider of healthy, safe, and sustainable building, and cold chain solutions. Cloud- and Cellphone-based visitor management “Our agreement with Splan provides our value-added resellers with convenient access to a leading visitor management and check-in solution that is also tailor-made to help address COVID-19-related challenges in offices, schools, event centers, and other facilities,” said Ryan Kaltenbaugh, Senior Vice President, North American Sales, LenelS2. “With the combined solutions, end users can easily adopt cloud- and cellphone-based, secure visitor management, and tracking capabilities.” Situational awareness When integrated with LenelS2 access control systems, Splan enables the provisioning of credentials to visitors, employees from other offices, vendors, and contractors using dynamic credentials or existing proximity cards. When integrated with BlueDiamond mobile credentials, Splan can issue temporary credentials for host-free access. To enhance situational awareness, issued badges may be monitored through the OnGuard and NetBox system interfaces. Easy-to-use enterprise application Splan provides a streamlined process for pre-registration, approvals, notifications, and touchless check-in Splan’s visitor management solution is web-based for ease of use, even for enterprise applications. Splan provides a streamlined process for pre-registration, approvals, notifications, and touchless check-in regardless of device or environment. The feature-rich Splan visitor management solution includes watchlist services, guest Wi-Fi provisioning, SMS and cellphone notifications, and multi-lobby, tenant management from a single interface for visitors, employees, and contractors. An optional COVID-19 package offers touchless check-in, screening, tracking, and notification solutions in support of Healthy Buildings.
Boon Edam Inc., a global pioneer in security entrances and architectural revolving doors announced the resumption of on-site entry evaluations, a building or campus analysis that aids security managers in creating a defensible physical security entrance strategy against the costly liabilities associated with tailgating and piggybacking. These evaluations have proven to be critical to the success of entrance projects. During the COVID pandemic, to support community health and safety, Boon Edam shifted from conducting on-site evaluations to virtual ones. With the loosening of COVID restrictions in the United States, Boon Edam is resuming on-site, in-person entry evaluations. Uncover vulnerable entry points Boon Edam initially began offering consultative entry evaluations with the recognition that every facility has a unique set of risks, resources, and capital. In addition to this, security entrances offer a wide range of intrusion mitigation capabilities – they are not a “one size fits all” solution. Turnstiles, security revolving doors, and mantrap portals differ in several categories, ranging from security level and a guard needs to capital and operating expenditures. Because security entrances are a significant investment, it is critical that security professionals understand the differences between entrance types to best align with their physical security strategy. Assess entrance solutions The goal is to define vulnerable entry points and discuss other unique but critical concerns Entry evaluations are “walk-throughs” conducted by experienced entry experts who traverse a building or campus with the client’s security team and other stakeholders. The goal is to define vulnerable entry points and discuss other unique but critical concerns. These may include throughput, supervision available, and industry compliance requirements; today’s need for “touchless” entry to minimize germs and promote social distancing; local safety codes for emergency egress and ADA compliance; and how existing security technologies such as access control systems, cameras, etc. will integrate with the entrance solutions. Actionable entry evaluation report At the conclusion of the evaluation, Boon Edam’s entry experts develop a comprehensive summary with recommendations for improvement, including: The client’s current state of security as it relates to the entry, as well as any regulatory needs specific to their industry or organization. A review of each entry location requiring a physical barrier and the recommended solution based on the security goals discussed. Custom photo renderings of each entry location to help the client visualize what the discussed entrance solutions will look like at their site. Ensuring best practices “It’s always amazing to see what gets uncovered during an evaluation and how often a decision or assumption can change after a great discussion. We’ve always put considerable emphasis on security entrance education and consultation, and as COVID-19 threatened to reduce our ability to perform these invaluable evaluations, we were able to pivot and offer virtual evaluations,” says Greg Schreiber, Senior Vice President of Sales at Boon Edam Inc. “Now, with COVID restrictions lessening, we continue to offer virtual evaluations but are very excited to resume in-person entry evaluations as organizations begin to accept outside vendor visits.” Schreiber further notes that all entry evaluations are solely for the determination of best practices around the entrances at the facility being assessed. The evaluation does not encompass a full vulnerability and threat evaluation usually conducted by a security consultant firm.
Suprema, a global pioneer in access control, biometrics, and time & attendance solutions, announced the new product launch of the X-Station 2, a versatile intelligent terminal with credential options of cellphone access, QR, and barcodes as well as RFID cards and PIN. Multiple credential options X-Station 2 enables flexible access control system design by supporting multiple credential options. The terminal is compatible with most types of existing RFID cards including EM, MIFARE, iCLASS, DESFire, and FeliCa, but also lets users go card-less by offering cellphone credential options including QR codes and barcodes. The terminal can read QR codes and barcodes composed of up to 32 ASCII code strings issued on Suprema BioStar 2 or 3rd party systems. X-Station 2 can also communicate with NFC and BLE signals, allowing both Android and iOS device owners to use cellphone access. Key features X-Station 2 improves security while safeguarding user data Equipped with a secure boot process, Open Supervised Device Protocol (OSDP), and cameras for image log capture, X-Station 2 improves security while safeguarding user data. X-Station 2 is also easy to install, use and maintain with features like Power over Ethernet (PoE), intuitive GUI on a 4” wide touchscreen, and IP65 rating. Versatile options X-Station 2’s various credential options allow it to meet all kinds of access control needs. Visitors can be issued QR codes or temporary mobile access cards while employees and registered users can use RFID cards and PIN codes to access areas that require additional security. When used in combination with BioStar 2 or 3rd party software with time and attendance, HR management features, X-Station 2 can track employee work hours, completed tasks as well as vacation days, photocopy credits, canteen tickets, and subscription validity. “X-Station 2 is a truly versatile terminal that can be installed in any facility with time and attendance, visitor management, and access control needs. Its cellphone credential options of QR code and mobile access cards can also satisfy contactless and non-face-to-face needs. I’m excited to see how the market will respond to X-Station 2,” said Hanchul Kim, CEO of Suprema Inc.
Redline, an Air Partner company and a provider of global security solutions, has recently secured six business wins with both UK and international customers, totaling in excess of £1 million in revenues. Customers include international airports, public transport operators, regulatory bodies, and government support agencies. In a demonstration of continued customer trust in Redline's services, four of these six contracts were renewals or extensions. This includes a three-year contract renewal by Edinburgh Airport for Redline's x-ray threat image recognition training (TIRT) system. Included in the new work is a two-year contract with Teesside International Airport for a digital Security Management System (SeMS). Advanced TIRT system Redline is seeing increased demand for its security solutions as airports start to scale up operations, including for its user-friendly and technically advanced TIRT system, which has been designed to finetune x-ray image screeners' ability to detect even the smallest components of viable threats. Meanwhile, its proprietary SeMS, which allows managers to effectively assess and manage risk in an ever-changing threat environment, is also gaining good traction with customers. Launched training academy NSSA's new name reflects the fact that the academy now also provides Baines Simmons safety training In order to assist businesses across the aviation industry as they plan for the return of international travel, Air Partner has also recently launched its newly branded National Safety & Security Academy (NSSA) in Doncaster, which was previously the National Security Training Center (NSTC). The NSSA's new name reflects the fact that the academy now also provides Baines Simmons safety training in addition to Redline's security courses. Digital SeMS Commenting on Redline's appointment, Phil Forster, Managing Director at Teesside International Airport, said, "The airport is on an exciting journey of transformation and growth, with Redline playing a key part in our future success. Digital SeMS is a welcome enhancement that will help us to manage and improve our security performance." Enhanced product offerings Mark Briffa, CEO of Air Partner, added, "We are very pleased to see a strong rebound in demand for Redline's services in anticipation of lockdown measures and travel restrictions lifting. It is a testament to our first-class product offering and customer service that both new and existing customers, from international airports to government departments, continue to place their trust in us.” “We are very confident about Redline's prospects and we expect to see the true value of this division come through in the current financial year. We look forward to welcoming customers old and new to our newly re-branded National Safety & Security Academy, where we now offer safety and security training from Baines Simmons and Redline under one roof."
Zscaler, Inc., a pioneer in cloud security announced its new Ransomware Report featuring analysis of key ransomware trends and details about the most prolific ransomware actors, their attack tactics, and the most vulnerable industries being targeted. The Zscaler™ ThreatLabz embedded research team analyzed over 150 billion platform transactions and 36.5 billion blocked attacks between November 2019 and January 2021 to identify emerging ransomware variants, their origins, and how to stop them. The report also outlines a growing risk from “double-extortion” attacks, which are being increasingly used by cybercriminals to disrupt businesses and hold data hostage for ransom Increasing ransomware threats “Over the last few years, the ransomware threat has become increasingly dangerous, with new methods like double extortion and DDoS attacks making it easy for cybercriminals to sabotage organizations and do long-term damage to their reputation,” said Deepen Desai, CISO and VP of Security Research at Zscaler. Source and measures “Our team expects ransomware attacks to become increasingly targeted in nature where the cybercriminals hit organizations with a higher likelihood of ransom payout. We analyzed recent ransomware attacks where cybercriminals had the knowledge of things like the victim's cyber insurance coverage as well as critical supply-chain vendors bringing them in the crosshairs of these attacks." "As such, it is critical for businesses to better understand the risk ransomware represents and take proper precautions to avoid an attack. Always patch vulnerabilities, educate employees on spotting suspicious emails, back up data regularly, implement data loss prevention strategy, and use zero trust architecture to minimize the attack surface and prevent lateral movement.” National security threat Ransomware was the third most common and second most damaging type of malware attack recorded in 2020 According to the World Economic Forum 2020 Global Risk Report, ransomware was the third most common and second most damaging type of malware attack recorded in 2020. With payouts averaging $1.45M per incident, it's not difficult to see why cybercriminals are increasingly flocking to this deepens new style of high-tech extortion. As the rewards that result from this type of crime increase, risks to government entities, company bottom lines, reputation, data integrity, customer confidence, and business continuity also grow. Zscaler’s research supports the narrative recently established by the U.S. federal government, which classifies ransomware as a national security threat; underscoring the need to prioritize mitigation and contingency measures when protecting against these ongoing threats. Double-extortion method In late 2019, ThreatLabz noticed a growing preference for “double-extortion” attacks in some of the more active and impactful ransomware families. These attacks are defined by a combination of unwanted encryption of sensitive data by malicious actors and exfiltration of the most consequential files to hold for ransom. Affected organizations, even if they are able to recover the data from backups, are then threatened with public exposure of their stolen data by criminal groups demanding ransom. In late 2020, the team noticed that this tactic was further augmented with synchronized DDoS attacks, overloading victim’s websites, and putting additional pressure on organizations to cooperate. According to Zscaler ThreatLabZ, many different industries have been targeted over the past two years by double-extortion ransomware attacks. The most targeted industries include the following: Manufacturing (12.7%) Services (8.9%) Transportation (8.8%) Retail & wholesale (8.3%) Technology (8%) Most active in ransomware Over the last year, ThreatLabz has identified seven “families” of ransomware that were encountered more often than others. The report discusses the origins and tactics of the following top five highly active groups: 1) Maze/Egregor Maze targeted were high-tech (11.9%) manufacturing (10.7%), and services (9.6%) industries Originally encountered in May 2019, Maze was the ransomware most commonly used for double-extortion attacks (accounting for 273 incidents) until it seemingly ceased operations in November 2020. Attackers used spam email campaigns, exploit kits such as Fallout and Spelevo, and hacked RDP services to gain access to systems, and successfully collected large ransoms after encrypting and stealing files from IT and technology companies. The top three industries Maze targeted were high-tech (11.9%) manufacturing (10.7%), and services (9.6%). Mase notably pledged to not target healthcare companies during the COVID-19 pandemic. 2) Conti First spotted in February 2020 and the second most common attack family accounting for 190 attacks, Conti shares code with the Ryuk ransomware and appears to be its successor. Conti uses the Windows restart manager API before encrypting files, allowing it to encrypt more files as part of its double-extortion approach. Victims that won’t or are unable to pay the ransom have their data regularly published on the Conti data leak website. The top three industries most impacted are manufacturing (12.4%), services (9.6%), and transportation services (9.0%). 3) Doppelpaymer First noticed in July 2019 and 153 documented attacks, Doppelpaymer targets a range of industries and often demands large payouts - in the six and seven figures. Initially infecting machines with a spam email that contains either a malicious link or malicious attachment, Doppelpaymer then downloads Emotetand Dridex malware into infected systems. Doppelpaymer’s top three most targeted organizations were manufacturing (15.1%), retail & wholesale (9.9%), and government (8.6%). 4) Sodinokibi Sodinokibi uses spam emails, exploit kits, and compromised RDP accounts in Oracle WebLogic Also known as REvil and Sodin, Sodinokibi was first spotted in April 2019 and has been encountered with increasing frequency with 125 attacks. Similar to Maze, Sodinokibi uses spam emails, exploit kits, and compromised RDP accounts, as well as frequently exploiting vulnerabilities in Oracle WebLogic. Sodinokibi started using double-extortion tactics in January 2020 and had the greatest impact on transportation (11.4%), manufacturing (11.4%), and retail/wholesale (10.6%). 5) DarkSide DarkSide was first spotted in August 2020 after putting out a press release advertising its services. Using a “Ransomware-as-a-Service” model, DarkSide deploys double-extortion methods to steal and encrypt information. The group is public about its targeting manifesto, writing that it does not attack healthcare organizations, funeral services, education facilities, non-profit organizations, or government entities on its website. Instead, the primary targets of choice are services (16.7%), manufacturing (13.9%), and transportation services (13.9%). Similar to Conti, those that cannot pay the ransom to have their data published on the DarkSide leak website.
ASSA ABLOY has invested in Paravision, an advanced facial recognition solutions provider, and is recognized for its world-class leadership in accuracy. Facial recognition solution "The investment in Paravision is a strategic technological investment for the ASSA ABLOY Group and will accelerate the development of biometric solutions that leverage facial recognition algorithms and provide complementary growth opportunities,” says Nico Delvaux, President, and CEO of ASSA ABLOY. “In partnership, HID and Paravision have already cooperated on projects and we look forward to further advancing our collaboration across a number of different markets and use cases,” says Björn Lidefelt, Executive Vice President and Head of Global Technologies business unit HID Global. Secure user experience The investment aligns with HID Global’s strategic direction to embed facial recognition into solutions for a seamless and highly secure user experience in a variety of identity verification and authentication applications, including access control.
The FSMA Final rule will protect the food supply against intentional contamination due to sabotage, terrorism, counterfeiting, or other illegal harmful means The U.S. Food and Drug Administration (FDA) is due to release the Food Safety Modernization Act (FSMA) Final Rule on Intentional Adulteration on May 31, 2016. Food Industry Security Professionals will soon be tasked with assessing their facilities to reduce supply chain food adulteration vulnerabilities. Food Security Professionals will need to develop an effective site plan to include where and when to conduct vulnerability assessments, implement focused mitigation strategies, and examine resources available to the food defense practitioner to minimize risk exposure and meet outlined regulatory requirements. Food Drug Administration’s Proposed Rule On Food Defense The FDA’s proposed rule on food defense would require facilities to address vulnerable processes in their food supply operations to prevent acts of intentional adulteration intended to cause large-scale public harm. Some background on what led to this aspect of the rule may provide insight into its key elements. The Act was signed into law on January 4, 2011 to better protect human and animal health by helping to guarantee the safety and security of the food and feed supply. Its focus was to ensure that the U.S. food supply is safe by shifting the focus of federal regulators from responding to contamination to preventing contamination. The law also provides FDA with new enforcement authorities designed to achieve higher rates of compliance with prevention & risk-based food safety standards, and to better respond to and contain problems when they do occur. Danger Of Large-scale Public Health Harm Intentional adulteration includes those types of acts committed by disgruntled employees, consumers, or competitors where the intention is to cause large-scale public health harm; or by economically-motivated adulteration. Acts of disgruntled employees, consumers, or competitors are generally directed at attacking the reputation of the company and not at causing public health harm. The primary purpose of economically-motivated adulteration is to obtain economic gain, and not to impact public health, although public health harm may occur. From a historical perspective, the threat to the food supply chain has been evident for decades. Examples include during World War I when German agents in the U.S. infected horses and cattle in transit across the Atlantic to France; to al Qaeda documents and manuals found in Afghanistan after the 2001 U.S.-led invasion revealed interest in conducting chemical & biological attacks on food supplies; to 2014 when a Chinese court sentenced a former plant employee to life in prison after the poisoning of frozen dumplings that made at least 10 individuals ill. An effective overall site security plan will soon require the aspect of food defense to protect the food supply against intentional contamination due to sabotage, terrorism, counterfeiting, or other illegal, intentionally harmful means. The rule applies to facilities required to register as “food facilities” under Section 415 of the Food, Drug, and Cosmetics Act. Facilities covered under the rule would be required to develop a “Food Defense Plan” and identify and implement mitigation strategies to minimize or prevent significant vulnerabilities in food operations. The four key activities within the food system that are the most vulnerable to intentional adulteration, and have the potential to cause large scale public harm, are defined as liquid receiving and loading; liquid storage and handling; secondary ingredient handling; and mixing and similar activities. Each facility will be required to conduct a reanalysis of its Food Defense Plan at least once every three years Food Defense Plan Against Intentional Contamination Covered facilities would be required to review their production systems to determine if they have any of these activity types and conduct their own vulnerability assessment to identify and prioritise points in their food operations that may be vulnerable to intentional adulteration. For the first time, FDA will have a legislative mandate to require comprehensive preventive controls across the food supply. This mandate includes compulsory preventive controls for food facilities to include the implementation of a written preventive controls plan. This plan involves: Evaluating the hazards that could affect food safety Specifying what preventive steps, or controls, will be put in place to significantly minimize or prevent the hazards Specifying how the facility will monitor these controls to ensure they are working Maintaining routine records of the monitoring Specifying what actions the facility will take to correct problems that arise. Each facility would be required to conduct a reanalysis of its Food Defense Plan at least once every three years, or following certain conditions (e.g., significant change in facility operations, new information about potential vulnerability, etc.). Personnel and supervisors assigned to the Actionable Process Steps would be required to receive appropriate training in food defense awareness and in their responsibilities for implementing Focused Mitigation Strategies. Facilities would be required to maintain certain records, including the written Food Defense Plan, personnel training documentation, and records related to monitoring, verification, and corrective actions. Lastly, as the issuing of the Final Rule approaches, the FDA has proposed to also publish a guidance document that provides the requirements in plain language to help businesses, particularly small businesses, comply with the identification of actionable process steps and implementation of focused mitigation strategy requirements. Industry can prepare now by conducting a comprehensive security assessment of their facilities to include the site perimeter, access control, security & emergency procedures, shipping, receiving & warehouse storage security practices, on-site security personnel, law enforcement outreach, site utilities, suppliers, hazardous materials/chemicals, criminal background check programs, cyber security, employee security awareness training, incident reporting & documentation, and recordkeeping requirements. The FDA website also includes useful information on FSMA, as well as links to their software programs such as the “Food Defense Plan Builder” that is designed to assist in developing a food defense plan based on a user entering specific answers relevant to their facility.
Customers are looking for more than simple plug-and-play cameras. They wantgood, high-definition cameras to protect their driveways, garages & shops Surveillance and CCTV applications are poised for continued growth in 2016 and beyond as security dealers and their end-user customers turn to video technology for physical security, loss prevention and gathering data and intelligence to assist business management and operations. Overall, the CCTV industry is benefitting from greater awareness of the different uses for surveillance, as well as more accurate and robust technology. According to research firm Memoori's 2015 annual report on physical security, video surveillance products were 54 percent of total sales and accounted for $14.68 billion, topping intruder alarms which came in at 23.5 percent and $6.40 billion and with access control garnering $6.13 billion and 22.5 percent of the total. The report further indicates that the industry overall has edged up at a compound annual rate of 7.82 percent since 2010 and forecasts growth for total security equipment up some eight percent in 2016, reaching almost $42 billion over the next five years to 2020. Steve Stowe, Vice President of BAP Security in Macon, Georgia., is keen on the higher feature sets and intrinsic value of video surveillance applications for the company’s prospects and customers. BAP Security has been in business since 1967, offering custom security solutions for residential and commercial subscribers in Georgia, North Carolina, South Carolina and Florida. Video Analytics On A Roll Stowe says he expects to see higher adoption of video analytics as it becomes a more common feature in even lower-cost equipment. “We have more and more people asking about line-crossing detection in particular. Many customers are also looking at upgrading older analog CCTV equipment since we can economically match the 1080P resolutions they are used to seeing on their televisions with HD-TVI, HD-SDI and other HDcctv technologies while still using their existing cabling infrastructure. There are still many customers who have seen the value at one point in time to invest in a CCTV system – we can now help them migrate cost-effectively and offer much improved picture quality than what they are used to,” Stowe says. Video analytics is becoming an increasingly common video surveillance feature,even in lower-cost equipment According to Stowe, businesses with personnel who have one-on-one contact with their customers such as office reception areas, teller stations and others are looking at adding cameras to record these interactions in case there is a problem, possibly even recording video with audio when appropriate. “Even customers who don't want a complete CCTV solution can use a more limited, standalone system or even IP cameras with edge recording,” he says. Replacing Intrusion Detection With CCTV Increased awareness by the general public regarding the advantages of surveillance is also fueling an interest in video installations, Stowe says. “Homeowners are asking about CCTV more than ever before, and most of the people we are talk to are looking for a lot more than the simple plug-and-play cameras being sold by mass marketers. They want good, high-definition cameras to watch their driveways, HVAC units, garages, shops and even their pets.” The commercial market is also experiencing an uptick, especially for integrated installations. “Some commercial markets such as factories, multi-tenant properties and churches are looking more at integrating CCTV with other systems such as access control. Capturing the video as the door is accessed along with who and what might be with the cardholder is information that is important to them, whether it is to catch internal theft or making sure the tenant is not letting others access the property or even for child safety.” Looking ahead, word on the street is that CCTV installations may eventually take the place of traditional intrusion detection sensors. Motion detection, analytics and integration with audio or other technology continues to increase the power of surveillance specifications for loss prevention and more.
Cybersecurity is a fast-changing field and 2015 was no exception. The proliferation of cybersecurity issues continued to make headlines, including the very dramatic hacking of a vehicle to allow for remote control over steering, brakes, the transmission and other critical functions. There was also state-sponsored hacking that targeted government, defense and other strategic sectors of the marketplace. Staying on top of these breaches still remains a challenge. Securing The Internet of Things While we can’t discuss the details of our projects over the past year, we are proud to say that NTT Com Security has been successful in identifying new vulnerabilities in mobile devices, home security systems, and automotive telematics interfaces. These are all part of the important area of the “Internet of Things” that will continue their climb into the information security headlines in 2016. For the New Year, we are anticipating a broader focus beyond the servers, workstations and communications infrastructure that we are used to, growing to encompass appliances, vehicles, factories, utility infrastructure, medical devices, and myriad other devices that will eventually all be connected to the Internet – and therein lies the ongoing task. The Internet in general is extremely vulnerable, and companies and individuals have a long way to go in learning how to protect themselves. We can expect continued attacks targeting payment card data wherever it can be found along with attempts to commit financial fraud with stolen banking credentials or via social engineering tricks like spear phishing emails. High profile breaches, such as the Edward Snowden leaks, have brought security to the forefront of the public consciousness Security and risk management Fortunately, these high-profile breaches, hack demonstrations (like the Jeep hack), and the Snowden leaks have all helped bring the topic of security directly into the public consciousness. With consumers becoming aware of the value of their information and the importance of protecting their privacy, companies will be forced to design security into their products. We are already seeing a public demonstration of this with the new security and encryption controls Apple has implemented on the iPhone. Meanwhile, talking about risks and vulnerabilities can sometimes feel like shouting at a crowd that refuses to listen despite the obvious danger they are in. The good news is that we are taking active steps to guard against risk and combat it where it happens. NTT Com Security has developed a global cybersecurity and risk management portfolio of managed services, consulting and technology solutions to protect critical and confidential data from attacks. See the full coverage of 2015/2016 Review and Forecast articles here
Truline Industries is a specialty machining business located in Chesterland, Ohio, United States. Founded in 1939 Truline is built upon integrity both in work and in life. An AS 9100 / ISO 9001 certified facility, Truline makes use of the latest technology to fabricate fuel pump bearings for the aircraft industry as well as other high-tolerance precision machine parts. Challenge Truline Industries has been using Gallagher physical access control systems for their office building. However, the traditional access control is no longer satisfying; the client looked for an outdoor touchless face recognition access control solution with mask-wearing detection. Touchless recognition system Users who have been using RFID cards will still be able to keep using them on FaceDeep 5 RFID module Anviz reliable and stable touchless face recognition FaceDeep 5 (temperature detection optional) offers the client a good outdoor solution to get access to their office building without touching the reader, and wearing a mask. In addition, users who have been using RFID cards will still be able to keep using them on FaceDeep 5 RFID module, due to Protech Security with the Gallagher Controller integration. 10pcs FaceDeep 5 was installed in their office building outdoor and indoor, all devices are controlled centrally by software, very convenient to check access records, manage users, etc. Project partner Protech Security, with more than 30 years of service in Northeast Ohio and a strong commitment to providing quality, cost-effective protection for homes, businesses, educational institutions, and government facilities. Customer comments Anviz FaceDeep 5 is a very nicely designed and sturdy device, the recognition is very fast and precise even under outdoor strong sunlight, Truline Industries is very happy about this upgrading, which definitely brings the employees a safer and touchless access experience. Therefore, Protech Security provides excellent services and support; "we will surely recommend Anviz and Protech Security to our business partners."
Aurora Cannabis, a pioneer in global cannabis serving thirteen markets internationally, has deployed SightLogix smart thermal intruder detection cameras to provide robust physical security over expansive grow operations. Aurora Cannabis has created a diverse portfolio in both the consumer and medical markets which has increased access to safe, high-quality cannabis worldwide. As Aurora’s growth facilities were developing, their need for reliable physical security overgrows operations became paramount. Vandalism, theft of plants, and destruction of property can severely impact business operations. Given the unique characteristics that are part of cannabis grow operations – large applications, often outdoors, where lighting and conditions are difficult to control – Aurora turned to SightLogix to help solve their cannabis security challenges. Perimeter security As Aurora was beginning to set up for an outdoor grow site, they needed to address their perimeter security as part of their licensing requirements. Health Canada, the governing Canadian body for cannabis, has many regulations for growing sites. According to one of their requirements, cannabis sites must be able to detect and verify human intrusion in all weather conditions with 100% coverage, 100% of the time. As part of compliance, all alarms are required to be cataloged and investigated, so maintaining low false alarms was key In addition, as part of compliance, all alarms are required to be cataloged and investigated, so maintaining low false alarms was key to all stakeholders. Given Aurora’s perimeter security needs at the site, SightLogix smart thermal cameras offered the most robust solution to meet all the requirements, under all conditions, all the time. SightLogix SightSurvey tool The SightLogix team was able to work directly with Aurora’s Sr. Director of Corporate Security, Mike Soberal, along with Aurora’s integrator to understand their requirements. Together, they developed a complete solution for perimeter security to protect the site from intruders and meet Health Canada’s requirements. Utilizing the SightLogix SightSurvey tool, they were able to create a detailed perimeter design that selected the optimal lenses, displayed intruder detection ranges along the perimeter, ensured the absence of blind spots, and created a blanket of automated protection across the site. The SightLogix cameras selected for the Aurora application were SightSensor HDs, smart detection cameras that include both thermal and visible imagers. They also employ Dual-Sensor Analytics (DSA) to enhance detection performance under difficult outdoor conditions. DSA detects targets from both thermal and visible sensors simultaneously, allowing Aurora to reduce nuisance alerts and increase intruder detection reliability. Outdoor intrusion detection Once the SightLogix system was installed, Aurora was able to meet all their outdoor intrusion detection requirements at the grow site. These include: An ability to detect intruders at all areas of the perimeter – inside and outside the fence line Reliable intruder detection 24/7 in the presence of wind, snow, fog, and complete darkness With SightLogix’s Dual Sensor Analytics, they were able to filter out the movement of small animals, blowing debris, and other false alarm causes Ease of integration between SightSensors and Aurora’s VMS system Long-range detection that reduced devices, infrastructure, and bandwidth otherwise required by less capable solutions. Cost-effective all-in-one-resolution Properly securing any outdoor asset from unauthorized intrusions starts at the perimeter “After an extensive search for a solution for our unique perimeter security needs,” said Mike Soberal, Aurora’s Senior Director, Corporate Security, “SightLogix not only provided an all-in-one resolution, it came at a cost-effective price and the support during implementation and since has been second to none.” "Properly securing any outdoor asset from unauthorized intrusions starts at the perimeter, and cannabis facilities are no different. These sites need to know in real-time the instant an intruder enters anywhere along the perimeter so you can intervene and stop the event in the act." SightSensor cameras SightSensor cameras are designed for security applications where detection matters. These are the reasons cannabis sites across the world have turned to SightLogix smart thermal cameras to address outdoor security challenges, including: The system’s unmatched video analytics detection performance, which won’t miss intruders or trigger excess nuisance alarms The power of the system to provide early warning of intruders over large areas perimeters Dual-video thermal and visible systems that provide a layered solution that delivers results 24/365 Built-in stabilization ensuring reliable detection in the presence of wind or vibrations Operating in complete darkness without expensive lighting and infrastructures
Passive RFID tags and mobile readers are cutting 70 percent of the time needed at this French nuclear power plant to locate tool containers, and 80 percent of the time needed to prepare regulatory reports. The Fessenheim nuclear power plant in the Alsace region of France has dozens of large, portable metal containers that store maintenance tools and equipment. The containers and their tool content are subject to numerous internal and regulatory controls for tool safety and security. The facility operator must know the location of all materials at all times, track and record all container movements, and provide regular audit reports. The Center Nucléaire de Production d’Electricité (CNPE) Fessenheim facility joined the growing number of nuclear power facilities to implement the NexCap® system from Nexess to automate its container management, tool tracking, and reporting processes. Nexess is an RFID integrator specialist for the energy and aerospace industries that is headquartered in Sophia Antipolis, France. RFID-based mobile assets management system Micro X-II tags withstand the shock and vibration from rough handling plus exposure to the elements The NexCap Mobile Assets Management system at CNPE’s Fessenheim facility uses Xerafy Micro X-II UHF RFID tags to identify and audit storage containers, record all movements and locations, provide picking, and put-away instructions to workers over a wireless LAN connection. The system also collects location and status data for reports and regulatory filings and supports materials management and maintenance operations. CNPE estimates the container tracking system will: Reduce the time spent looking for containers by 70% Reduce the time needed to prepare regulatory filings by 80% Improve forklift driver productivity 60% Improve storage space efficiency by 50% Micro X-II tags were a good choice for the Fessenheim facility because they are applied directly to metal containers, which are moved with forklifts and may be stored outdoors. The tags withstand the shock and vibration from rough handling plus exposure to the elements.
Integrated security manufacturer TDSi announces the new integration of its powerful GARDiS access control range with Thinking Software’s RotaOne Time & Attendance platform. The new integration enables businesses and organizations to incorporate the two market-leading solutions, providing a complete overview of staff movements and the security of facilities. Time & attendance solution Reflecting on the new integration, Gwen Curran, Channel Partner Manager North at TDSi commented, “GARDiS is designed to not only deliver the most secure of integrated access control solutions but also to be highly flexible and adaptable to the needs of our customers.” “As a highly popular Time & Attendance solution, RotaOne is the perfect integration partner for GARDiS, enabling users of both systems to link their technology investments and enjoy the benefits of combining data and having a powerful overview of operations.” Integrated access control TDSi’s GARDiS represents the best-of-breed in access control and working together means ease of benefits to our customers The integration with TDSi’s GARDiS platform was a clear choice for Thinking Software too, as Paul Coombes, Sales and Marketing Director also commented, “No systems developer can specialize in all areas of expertise, so integration is a far better approach than trying to be the best at everything.” “TDSi’s GARDiS represents the best-of-breed in access control and working together means we can both add additional ROI and ease of management benefits to our customers.” Central monitoring Integrating GARDiS with RotaOne enables businesses to mitigate risk by ensuring staff is safe and facilities are secure. It also provides an accurate record of people's movement, which is perfect for the time and cost savings when running a business that employs contracted, casual, and salaried staff on complex or repeating shift patterns. The integrated solution also ensures full monitoring for compliance reporting and safety. Cloud compatibility Integration is backward compatible with existing installations to provide a professional solution for customers For added flexibility and resilience RotaOne can be deployed remotely and hosted in the cloud (either private or securely shared) and is fully scalable - from a small SME team up to a full multi-national enterprise. Integration is backward compatible with existing installations (running the latest updates of both platforms) and both TDSi and Thinking Software offer their solutions through fully trained installation partners, to provide a professional integration solution for customers that can be swiftly implemented. Integrated systems Gwen Curran concluded, “As the world begins to adjust to the complex post-pandemic landscape, integrated systems will be at the forefront of enabling people to get back to work successfully, managing social distancing and reducing the possibilities of cross-infection.” “We are proud that by integrating two solutions that are best-of-breed in their respective spheres, we can help businesses get back to concentrating on their core functions with full peace of mind.”
As a small town in Belgium became one of the most important vaccine sites in the world, in the global fight against the coronavirus (COVID-19 virus), the G4S team in Puurs was ready to scale up rapidly, to meet the growing demand for security on site. At the beginning of 2020, nobody in the Belgian town of Puurs, located between Brussels and Antwerp, could have known how globally significant a role their small town would come to play in the year that followed. COVID-19 vaccine manufacturing facility Mostly known for producing the strong Belgian beer, Duvel, Puurs has also been the home of one of Pfizer’s largest production and packaging sites worldwide for over 50 years. In a normal year, before COVID-19 was a concern, the American pharmaceutical company produced more than 400 million doses of vaccines and medicines in Puurs every year. Now, with the global COVID-19 pandemic continuing to cause devastation across the world, Pfizer has become a household name, synonymous with one of the leading COVID-19 vaccines being distributed worldwide, in order to help countries emerge from the crisis. G4S security services For the last ten years, G4S has been a proud part of the team providing security services for the site in Puurs, Belgium For the last ten years, G4S has been a proud part of the team providing security services for the site in Puurs, Belgium. However, the security solutions provided have changed substantially since then. “There has definitely been a significant evolution over the years in G4S’s role for Pfizer at Puurs,” said Dirk Clauwaert, Senior Operations Coordinator for G4S Belgium, adding “When we started out we were only contracted to provide on-call security. Now, we have a fully integrated security solution at the site that gives Pfizer’s employees and assets a very high standard of security.” Site safety and security The high standard of security recently caught the attention of King Filip of Belgium’s personal security team, during a visit to the Puurs site, who congratulated the G4S team for the sophisticated security measures, keeping the site safe and secure. The solutions that G4S provides at all hours at the site include camera surveillance, access control, safety checks, security officer patrols and response, and personnel checks of anybody attending the site. Highly robust service and operational excellence “We’re especially proud to have played our part at a site that has become so globally significant due to the COVID-19 vaccine,” said Dirk Clauwaert, adding “The site has had to expand substantially, with many new buildings and car parks. We’ve ensured our security operations are flexible and can scale up as needed to meet any extra requirements.” The G4S Puurs team was also awarded the G4S Excellence Award for the Best Performing Security Site across Europe and the Middle East for 2020. “Pfizer demands a highly robust service with operational excellence,” said Ciaran Comiskey, G4S Director of Global Operations, adding “The G4S team has always strived to meet and exceed this expectation, in particular, during the ongoing COVID -19 pandemic.”
Traffic management takes many forms. Traffic management can involve closing a roadway during a major city event such as a motion picture awards show or traffic management can simply entail a traffic arm that raises and lowers after a fee has been paid in a parking garage. Traffic management can include directing traffic in one direction during peak hours or closing a facility to vehicle traffic after hours. It can also prevent wrong-way entry or ensuring vehicles cannot encroach on pedestrian areas. Barriers for security In most cases, it is quite easy to breach the entrance to the parking lot. Once entered, the vehicle can pick up speed to crash through one of the gates or entrances to get within the stadium itself. To provide increased security, Delta Scientific DSC501 barriers are used at the Mercedes Benz Stadium in Atlanta at main entrances where players and VIPs, among others, enter with their cars. K54 certification The DSC501 protects against a “second hit” risk from a second vehicle The DSC501 is the only K54-certified retractable vehicle barricade in the world. Set in a foundation only 18 inches deep, it will survive and operate after a 5.4-million foot-pound impact. That’s equivalent to a 65,000-pound truck hitting it at 50 mph. Stopping the truck or car dead in its tracks, the DSC501 protects against a “second hit” risk from a second vehicle. Deployable vehicle crash barriers In another example, on May 22, 2020, an armed assailant attempted to drive through entryway gates at the Naval Air Station-Corpus Christi. The suspect was stopped almost instantaneously. A wounded sailor, a security team member, managed to raise a barricade despite her injuries. The shooter, the would-be trespasser, died in the incident, which could have been made much worse had the station not taken appropriate measures to keep intruders at bay. At this location, the totally self-contained Delta Scientific MP5000 mobile deployable vehicle crash barriers guarding that base carries an ASTM rating as high as M50, able to stop and disable a 15,000 lb (66.7 kN) G.V.W. vehicle moving at 50 mph (80.4 kph). The barricade tows into position to control vehicle access within 15 minutes. No excavation or sub-surface preparation is required. Once positioned, the mobile barricades unpack themselves by using hydraulics to raise and lower the barriers off their wheels. DC-powered pumps will then raise or lower the barriers. To remove, procedures are reversed and the barriers are towed away. Traffic control devices With so many traffic management scenarios, it is no wonder that Delta Scientific manufacturer’s more than fifty types of barriers and traffic control devices. Delta can assist any facility in controlling the flow of traffic through devices such as traffic arms, lights, spike teeth or even crash tested vehicle barricades.