Human identification system
The SmartWater Group is to operate a National Intelligence Portal for the police and critical infrastructure companies, tracking Organized Crime Gangs (OCG's) across the UK. In particular, the new shared national database and crime mapping system will tackle metal crime and national infrastructure crime. Transport, power, and telecommunications, are some of the sectors severely affected by metal crime. Heritage sites, including places of worship, are also increasingly being targeted with metal...
Nedap, the foremost specialist in advanced vehicle identification solutions, has upgraded its ANPR Lumo license plate reader for vehicle access control with Open Supervised Device Protocol (OSDP) ensuring greater site security. The ANPR Lumo is one of the world’s first all-in-one license plate recognition systems compatible with the OSDP protocol V.2.1.7. The OSDP upgrade within Nedap’s ANPR Lumo camera makes it possible to improve vehicle gate access in a trusted and secure manner...
The Security Industry Association (SIA) and the SIA RISE Steering Committee are launching Talent Inclusion Mentorship Education (TIME) – a new mentorship program for early and mid-career professionals in the security industry. The TIME program is designed to promote diversity, equity and inclusion and empowerment of underrepresented identities in the security industry by creating a well-defined pathway for learning and development. Talented security industry “SIA’s new TIME...
A feeling of security is a universal human need. And beyond physical, bodily security, people need to know that their environment, investments, and belongings are safe as well. Security systems are installed in homes and businesses every day to create that sense of security. Compared to conventional sensor-based alarm systems, a surveillance system that utilizes cameras has several advantages: The ability to watch events in real-time, Obtaining key data around those events, and Providing s...
Panasonic i-PRO Sensing Solutions Corporation of America announces the availability of a new thermal camera solution aimed at helping organizations maintain the health and safety of those entering their facilities. This solution combines MOBOTIX M16/S16 cameras with the functionality of a new plug-in from Panasonic i-PRO's Video Insight video management systems (VMS) to automatically detect when an individual's body temperature exceeds a pre-set threshold and provides an alert to the appropriate...
Airports present a complex challenge to security managers, representing in sharp relief the tension between the need for efficiency and that of maintaining the highest levels of security standards. As the primary passenger travel hubs of the modern era, airports see the most significant amount of traveler traffic as billions pass through their gates annually on their way to their destinations, both domestic and international. This trend of higher rates of air travel shows no signs of letting up...
News
Iris ID, a pioneering provider of iris recognition technology, announced the compatibility of its iCAM M300 handheld, multi-modal biometric reader and the MozaicID iCAM M300 smartcard software credential application. This application enables the mobile device to accommodate a range of Personal Identity Verification (PIV) compatible credentials including PIV Interoperable (PIV-I) and the Transportation Worker Identification Credentials (TWIC), a smartcard used by workers requiring access to secure areas of U.S. maritime facilities and vessels. Secured identity authentication The MozaicID app uses the iCAM M300’s detachable FBI-certified Sherlock fingerprint sensor from Integrated Biometrics to authenticate workers’ identities by comparing a live fingerprint to a stored template embedded in the credential. The application will also check the trust status of the presented credential. The iCAM M300 also enables mobile enrollment of workers with its embedded camera simultaneously capturing both iris and facial modes for contactless identity authentication. Authorities statement Mohammed Murad, vice president of global sales and business development, Iris ID, said compatibility with the MozaicID app adds to the versatility of the iCAM M300. “Iris ID and MozaicID have combined best of breed technologies to create an accurate and more secure means of identifying maritime employees wherever their jobs take them,” he said. “The iCAM M300 provides an unparalleled intuitive user interface, which makes the process easier for the user and operator.” Jim Parroco, chief executive officer of MozaicID said “MozaicID is dedicated to providing effective, relevant, and user-friendly security solutions. We institute intuitive and innovative technology in our software with proven results. The product offering, we have with Iris ID provides an excellent security solution in response to a specific need.” Features and benefits Supports other contact or contactless Personnel Identity Verification (PIV) smartcards such as Common Access Cards (CAC) used by military, civilian, and vendor employees in controlled government spaces Commercial Identity Verification (CIV), used by commercial organizations to meet federal government access control standards Comes equipped with software development kits (SDK’s) ready to deploy a wide variety of Android-based identity application Organizations requiring remote identity verification, such as the U.S. Customs and Border Patrol and law enforcement departments, use the water- and dust-resistant iCAM M300 Provides magstripe and contactless card support, as well as an MRZ reader to verify ePassports Communications protocols include NFC, Wi-Fi, Bluetooth, GPS, 4G LTE
Ping Identity, the intelligent identity solution for the enterprise, announces PingZero, a suite of passwordless authentication features organizations can implement to deliver seamless digital experiences to employees and customers. By eliminating login friction, including the need for usernames and passwords, PingZero boosts employee productivity, improves customer retention and acquisition rates, and strengthens cybersecurity defenses — all with zero passwords and zero friction. PingZero uniquely leverages the Ping Intelligent Identity platform and other technologies including the FIDO2 standard to enable passwordless experiences across a variety of resources and applications. Advanced passwordless authentication Verizon’s investigative report found that passwords are one of the most common causes of security breaches and also a major barrier in digital experiences. In fact, by 2022, 60% of large global enterprises and 90% of mid-size enterprises will implement passwordless methods in more than 50 percent of use cases, predicts Gartner. That’s because passwordless features accelerate and increase adoption of remote work and digital-first initiatives while improving the security and cyber hygiene of customers and employees, who are burdened with keeping track of more usernames and passwords than ever before. PingZero’s advanced passwordless authentication utilizes device and browser settings, biometrics, and the FIDO2 standard to provide enterprises with greater assurance that a user is who they say they are. Managing and resetting passwords PingZero enables businesses to work smarter by eliminating the time wasted managing and resetting passwords" The solution also removes interruptions like excessive login prompts or password resets, which not only cause strain on IT departments but deteriorate employee productivity and customer engagement. “PingZero was designed with a frictionless user journey in mind,” said Andre Durand, CEO of Ping Identity. “At Ping we are committed to delivering secure, convenient experiences for our customers and removing friction is a key component in our innovation evolution. PingZero enables businesses to work smarter by eliminating the time wasted managing and resetting passwords and instead provides users with more secure access to what they need to get work done efficiently.” Authentication authority solutions PingZero can be deployed across a broad range of enterprise resources including mobile, SaaS, legacy applications, and more. PingZero is available in multiple Ping offerings including the comprehensive authentication authority solutions, Customer360 and Workforce360. Key features include: User Self-Registration: A simple and convenient QR code-based sign-on process means no passwords are needed at the time of account creation. Customization: Includes the ability for enterprises to use their own branded mobile application to implement PingZero without requiring third-party MFA applications for the user to download. Security and Compliance: Provides phishing-resistant, privacy-preserving authentication based on the FIDO2/WebAuthn standard. Continuous Authentication: Added convenience by requiring a user to re-authenticate only when certain risk thresholds are exceeded. Operating in the background, risk signals are tracked and monitored including changes in geolocation, IP address, device posture, and other factors.
Claroty, the pioneer in operational technology (OT) security, announces new enhancements to the Claroty platform, making it the industry’s first OT security solution to offer remote incident management as a fully integrated capability that spans the entire incident lifecycle. The platform now enables cybersecurity teams to detect, investigate, and respond to security incidents on OT networks across the broadest attack surface area securely and seamlessly from any location. Standard operating environment IT and OT networks were already becoming more interconnected due to digital transformation, and the COVID-19-induced shift to remote work has accelerated their convergence even more. These combined forces have created an acutely expanded attack surface and volume of alerts for cybersecurity teams to manage. IT and OT networks were already becoming more interconnected due to digital transformation According to Gartner, “For those organizations whose cybersecurity operations capabilities are tuned to monitor events from their standard operating environment, the abrupt shift to a predominantly remote operating model could see events of cybersecurity interest being missed by the cybersecurity operations team. This will in large part be a result of the relocation of workers to new premises or to a remote working mode that suddenly expands the scope and complexity of the operating environment.” Variable work environment “Arming cybersecurity teams with the ability to detect, investigate, and respond to not only asset-based attacks, but also to identity-based attacks, is at the heart of the new enhancements to The Claroty Platform,” said Grant Geyer, Chief Product Officer of Claroty. “Our customers can now further evolve their OT security posture, strategy, and workflows for a variable work environment, while enduring adversarial activity and whatever else they might encounter on the network.” With its newly enhanced Secure Remote Access (SRA) 3.1 and Continuous Threat Detection (CTD) 4.2 components, The Claroty Platform now spans all three stages of the incident lifecycle. Remote user activity This reinforces the importance of quick detection and identification of unauthorized activities Detection: More than half of OT and IT security professionals say their organizations are now more of a target for cybercriminals since the pandemic began, according to Claroty’s recent survey report. This reinforces the importance of quick detection and identification of unauthorized activities. The Claroty Platform gives teams an early advantage with the ability to identify and differentiate authorized remote user activity from unauthorized ones that could impact process integrity. When users receive an alert from CTD, Claroty’s Wisdom of the Crowd capability utilizes information from similar events across Claroty’s customer base to provide context into the potential impact of the alert, enabling users to respond more effectively and efficiently. Demanding quicker identification Investigation: The increase in both teleworking and malicious activity demands quicker identification in a remote setting. Claroty’s enhanced platform arms SOC teams with full visibility into remote user activity, insight into how indicators detected on the network have manifested in other areas, the ability to investigate incidents from any location, and greater context around the business criticality and process values of assets involved in such incidents. This minimizes the need for onsite staff while optimizing investigations with enriched assets, including both live SRA sessions including full-length video recordings, as well as threat alerts with reputational context from the Claroty community. Expediting remedial activities 62% of IT and OT teams have found it more challenging to collaborate Response: Even as IT and OT networks have become more interconnected since the pandemic began, 62% of IT and OT teams have found it more challenging to collaborate. The Claroty Platform bridges this gap with its integrated interface and the ability to disconnect potentially harmful OT remote sessions, minimizing the need for onsite staff and expediting remedial activities. Integrations with ServiceNow and Swimlane enable teams to manage all IT and OT alerts from a single access point within the respective platforms. This allows organizations to adapt their OT incident response function and workflows for a remote or hybrid workforce. Greater operational resilience Collectively, these features allow teams to adapt their monitoring, inspection, and response management from on- or off-site premises without compromising efficiency or effectiveness. The result for the business is reduced exposure to risk and greater operational resilience. “Receiving vulnerability alerts in real-time is a must-have for our multinational mining, metals, and petroleum operations,” said Thomas Leen, VP Cybersecurity of BHP. “The Claroty Platform allows us to quickly identify which of our assets have led to vulnerabilities and prioritize the actions we need to take in order to reduce and eliminate potential risks to the business.”
Vision-Box a global provider of biometrics seamless travel, automated border management and electronic identity management solutions dedicated to improving the quality and security in government services, travel and border control - announced a regional strategic partnership with AirAsia Group, to implement pioneering, identity management technology across its network of 152 airports. As a provider and pioneer of new seamless digital identification technologies throughout the travel ecosystem, AirAsia has already demonstrated its ability to be ahead of the curve to be able to respond quickly to the COVID-19 pandemic and the restricted travel environment, including the need for new travel safety requirements than many other airlines. Contactless facial recognition This is evident in initiatives such as F.A.C.E.S (Fast Airport Clearance Experience System), the airline’s contactless facial recognition passenger processing system. To continue their innovative trend, AirAsia engaged Vision-Box to help them realize the next step in providing a seamless touchless identification and contactless clearance traveler experience. Further enhancing their digital identity management strategy across AirAsia Group will dramatically improve the customer experience with a single enrollment for services at key customer process points. Collaborative digital platform Orchestra will interconnect with AirAsia’s network to regulate all virtual and physical security The Vision-Box’s Orchestra Identity Management Platform, a collaborative digital platform of real time data administration and end-to-end customer-centric service management tools, will provide instant analysis, monitoring, reporting and configuration ability for a more convenient and seamless travel experience. Orchestra will interconnect with AirAsia’s network to regulate all virtual and physical security and data infrastructure in real-time, bridging and managing the information flow between traveler processing points, multi-source data streams, and relevant stakeholders. Today’s announcement combines the following new services and solutions: Delivery of F.A.C.E.S (Fast Airport Clearance Experience System) - A touchless identification and contactless clearance platform designed for cellphone check-in to enhance the guest experience at the airport, improve customer brand loyalty, and be an integral part of AirAsia’s overall digitisation strategy. Network wide Digital Identity Management - A collaborative development to drive organizational data ecosystem expansion and technology enablers across AirAsia’s travel and finance platforms. Deployment of seamless touchless and contactless experience traveler points across AirAsia’s 24 travel hubs to include: Cellphone Digital ID enrollment Biometric Facial Recognition devices at check-in (FACES) Automated bag-drop self-service Roving VPoD for temperature checks Security and Boarding VPoD for seamless traveler identification and clearance Identity management platforms Speaking about the strategic partnership with AirAsia, Miguel Leitmann, the CEO of Vision-Box said: “This collaboration is a powerful gamechanger for the industry. Partnering with AirAsia will allow Vision-Box to deliver the very best strategies that will be uniquely conceived, designed and built for the next generation of transformative identity management platforms.” “We believe this partnership will lead to a traveler management model that will drive how passenger identification and clearance is conducted in the near future with substantially reduced operating costs, increased efficiency and improved output.” Contactless air travel technologies These technologies are integral to make flying as safe, seamless, and convenient as possible" Javed Malik, COO of AirAsia Group said “Our digital transformation strategy commenced over two years ago and we are taking the opportunity from this COVID-19 crisis to further improve our digital capabilities and enhance the customer journey. These new technologies are integral to make flying as safe, affordable, seamless, and convenient as possible, which is critical in the Covid restricted travel environment." "We are pleased to partner with Vision-Box as an industry leader in their field to deliver a major step change in touchless and contactless air travel technologies.” Identity management platform Vision-Box’s Orchestra Identity Management Platform is certified with Privacy by Design, a premiere accreditation for safeguarding personal and private information used in Identity Management services. Privacy by Design prioritizes the protection of individual data and ensures the highest level of privacy protection as a system default in government and commercial networks. Its use in Orchestra significantly improves how Vision-Box and its clients meet the levels of privacy and security of personal data that citizens and consumers are demanding. The Vision-Box and AirAsia collaboration will bring together industry renowned innovations in digital traveler processing strategy, biometric ID technology ideation and passenger management system maturation. Together, they will support travellers through a successful transformation towards a safer, more secure, and hygienic airport environment.
Globally renowned access control manufacturer, Inner Range is offering customers the ability to identify close contacts of anyone displaying symptoms of COVID-19 or other infectious diseases, by generating detailed reports of where the infected person has been and who else has been near them. Contact tracing The contact tracing report can be generated and shared quickly and easily. It can show which doors an infected user has passed through, how much time they spent in each area, what time they badged a reader and which other users were near them, up to 15 minutes before the infected person arrived and 60 minutes after they left the area. Furthermore, the report is completely customizable and multiple variations can be saved to ensure operators have what they need for a range of requirements. Inner Range General Manager, Tim Northwood, said “Organizations around the globe are struggling with the challenges raised by the COVID-19 global pandemic. One way in which Inner Range can help address some of these issues is by assisting organizations to design safer work environments for their staff and customers.” He adds, “The company also aims to provide a robust contract tracing report will help organizations quickly identify users who could be at risk and interrupt the spread of infection.” Integriti integrated access control system The contact trace report is available via Inner Range’s intelligent integrated access control and security system, Integriti, for customers using Integriti Business and Integriti Corporate software editions. The reports can be generated and displayed directly within Integriti and displayed on the operator’s screen in a user-friendly format. The report can be saved in PDF, Excel, CSV, Text, Image or RTF formats along with more advanced options such as generating HTML, or creating everything needed for a MHL single page website. Specific access permissions and area counting features Inner Range access systems can provide specific access permissions for each area of a building In addition, Inner Range access systems can provide specific access permissions for each area of a building and include area counting to monitor and limit the number of users in a particular area. This is available for Enterprise-level Integriti as well as Inner Range’s Entry-level system, Inception. Occupancy thresholds can be set for a whole building, specific area, individual offices or rooms, car parks and lifts. Once the level is reached further users’ permissions are suspended until the occupancy count has a spare space. Real-time monitoring and alerts All information about occupancy can be transmitted to the site health and safety manager for real-time monitoring and alerts. A report can be run at any time to confirm the occupancy status of any designated area. Inner Range is a globally renowned company in the design and manufacture of intelligent security solutions, since it was established in 1988. More than 150,000 Inner Range systems have been installed in over 30 countries. Customers include hospitals and high-security units, colleges, distribution centers, pharmaceutical companies, government and critical national infrastructure.
The Alarm.com Smart Water Valve+Meter is now available to service providers partnered with Alarm.com and its subsidiaries to help protect connected homes and businesses from unexpected water emergencies and steep water bills. The award-winning device, unveiled at the Consumer Electronics Show (CES) earlier this year, is an affordable, Z-Wave water shutoff valve that combines innovative technology with high-quality plumbing hardware. Leveraging critical system and occupancy data helps the Smart Water Valve+Meter intelligently respond to large leaks, small drips and leaky appliances that cause billions of dollars in property damage every year. Preventing water damage “We are big fans of the Smart Water Valve+Meter because of the insight it provides, especially around how much water is being used and even wasted at times,” said Matt Madden, project manager at Superior Alarm & Electronics. “The data it provides can help customers be more aware of their water use and costs. Another crucial aspect is its ability to detect and react to water leaks of any size and alert the customer via the mobile app. You can’t put a price on peace of mind.” Designed and developed by Building36, a subsidiary of Alarm.com, the Smart Water Valve+Meter quickly identifies excessive or continual water flows to help prevent water damage, as well as health and safety issues that often result from prolonged low-volume leaks. Water management solution Property owners get mobile alerts about excessive water usage to avoid higher water bills As part of the Alarm.com Water Management solution and overall ecosystem, users can manage everything remotely through a single point – the Alarm.com mobile app. Property owners get mobile alerts about excessive water usage to avoid higher water bills and real-time water use data to guide conservation efforts in their homes and businesses. “Our comprehensive water solution that includes the Smart Water Valve+Meter makes homes and businesses safer from damaging and costly water problems,” said Jeff Bedell, chief strategy and innovation officer for Alarm.com. “The advantages of having a robust ecosystem of connected devices make it easy for our partners to deliver solutions that help their customers protect the things they care about most.” Integrator and installer benefits The Alarm.com Smart Water Valve+Meter has earned multiple awards this year. It received a 2020 SIA New Product Showcase award and a 2020 Security Sales & Integration Most Valuable Product award, for its unique design, function and integration features, such as: Automatic water supply shut-off when leaks are detected Remote control and automation as part of Rules or Scenes from the mobile app or customer website Durable, high-quality manufacturing and materials Monitoring for tiny leaks without the need to shut down the water supply to a property Real-time view of water consumption Patterns behavior to identify and signal when water use differs from normal There are numerous integrator and installer benefits as well, including over-the-air firmware updates to reduce post-installation customer visits and support costs.


Expert commentary
Tragically, in the world we now live, mass shootings and gun violence are epic concerns not only in schools, but Big Box retail, hospitals, municipal buildings, festivals, sporting events, concert venues, and just about anywhere crowds gather or work. The number of incidents is not acceptable and is truly startling. There are many societal and mental health issues that can cause these events and their importance in solving this issue is critical. However, this article will be focussed on the technology side of preventing mass shooting events. Going beyond metal detectors The best way to eliminate mass shootings is to detect weapons before they ever enter, or as they enter, a building. Metal detectors have been effectively dispatched and used to identify weapons on a person entering a building. The major drawbacks of metal detectors are the cost to operate them, several security guards per machine, and the resultant bottlenecks which cause limited throughput at the entrances. The technology eliminates the need to empty pockets and allows backpacks, luggage bags, and purses to be scanned New technology on the market uses millimeter wave detection to quickly scan someone walking through a portal. The technology eliminates the need to empty pockets and allows backpacks, luggage bags, and purses to be scanned at the same time as the person. People can walk through the portals side by side to reduce bottlenecks. Additionally, the technology reduces the number of guards needed, reducing overall costs. Taking out the human element The first step in surviving a mass shooting is being situationally aware. Immediately accepting and understanding the sounds as gunshots is paramount. Just a few seconds can mean the difference between life and death during an active shooter situation. Gunshot detection can eliminate the fear factor, which in many cases temporarily paralyzes those involved and causes precious seconds to pass before action is taken. By using a trusted, effective gunshot detection solution properly partnered with a monitoring system can eliminate the human factor of indecision and delay. Further, coupled with a VMS camera system, it can visually verify the situation as an emergency, identify the shooter, and provide valuable, accurate information to First Responders—all within just a few seconds. The state of gunshot detection technology Gunshot detection technology has been explored and developed by the military since WWI, but commercially it has only been around for a few years. Such detection systems range from wide area coverage to room-to-room coverage. Most are acoustic based (using microphones) to listen for the sound of a gunshot, record the sound, then analyze it with sophisticated software to determine if it is, indeed, a gunshot. Many years have been invested fine-tuning the software to differentiate between a gunshot and other loud noises. Eliminating ambient noise is very difficult during this process. The locations and venues mentioned at the outset of this article inherently have loud, ambient noise. This, in most cases, causes systems to give a false-positive or to even fail to detect the gunshot. In turn, it can send unverified or wrong information to First Responders and Security and cause havoc of unwarranted fear and actions. To help increase the accuracy of the detection of an actual gunshot, many systems have added infrared sensors. Many systems use backroom or cloud servers to run the necessary analysis In addition to the challenge of false positives, many systems use backroom or cloud servers to run the necessary analysis. This not only increases the cost of the system but may increase the notification time of the actual gunshot. Integration of this data to alarm, notification, and camera systems is difficult and costly. And experts say none of these systems are yet 100 percent effective. Enter ultrasonic sensor technology Fortunately, new technology is emerging in the industry. Technology which can eliminate the false-positives and reduce the cost by doing away with the expensive software, servers, cloud servers, and human intervention. This technology uses non-acoustical ultrasonic sensors to detect the frequency of a gunshot concussive wave created by a bullet, leaving the chamber along with the explosion wave force. Because these sensors are not acoustic (microphone), they will not pick up the ambient noise like other systems. In addition, the ultrasonic sensors only detect the gunshot concussive wave within the determined frequency. This also helps eliminate confusion caused by loud noises such as thunder, cars backfiring, large boxes being dropped, etc. An added bonus is ultrasonic sensors are not acoustic, therefore they are never listening or recording, the sensors only operate when there is an actual gunshot; hence, they’re completely non-invasive. The ultrasonic sensors only detect the gunshot concussive wave within the determined frequency Finally, these non-acoustic sensors do much of the work through an onboard processor, no backroom or cloud servers are needed. Integration to systems such as VMS, Access Control, Alarm Panels, etc. requires minimal effort. This allows existing security systems to be integrated with gunshot detection, creating a low-cost, highly effective overall solution. Protecting our children, loved ones, employees, and customers is a monumental challenge for any security professional. Using newly available technology, combined with existing security infrastructure, we have the ability to add on layers of safety to help reduce the tragedy of gun violence and mass shootings. This article was co-written by Brad McMullen, General Manager at 3xLOGIC, and Brad Jarrett, CTO at Active Guardian.
Artificial Intelligence. You’ve heard the words in just about every facet of our lives, just two words, and they’re quite possibly the most moving, life-changing words employed in everyday conversations. So what exactly is AI, who currently uses it and should be using it? What Is AI? AI is a powerful way of collecting, qualifying and quantifying data toward a meaningful conclusion to help us reach decisions more quickly or automate processes which could be considered mundane or repetitive. AI in its previous state was known as “machine learning” or “machine processing” which has evolved into “deep learning” or, here in the present, Artificial Intelligence. AI as it applies to the security and surveillance industry provides us the ability to discover and process meaningful information more quickly than at any other time in modern history. Flashback - VCR tapes, blurred images, fast-forward, rewind and repeat. This process became digital, though continued to be very time-consuming. Today’s surveillance video management systems have automated many of these processes with features like “museum search” seeking an object removed from a camera view or “motion detection” to create alerts when objects move through a selected viewpoint. These features are often confused with AI, and are really supportive analytics of the Artificial Intelligence, not AI themselves. Machine Learning Fully appreciating AI means employment of a machine or series of machines to collect, process and produce information obtained from basic video features or analytics. What the machines learn depends on what is asked of them. The truth is, the only way the AI can become meaningful is if there is enough information learned to provide the results desired. If there isn’t enough info, then we must dig deeper for information or learn more, properly described as “deep-learning” AI. Translated, this means that we need to learn more on a deeper level in order to obtain the collaborative combined information necessary to produce the desired result. Deep Learning AI Deep learning AI can afford us the ability to understand more about person characteristic traits & behaviors. Applying this information can then further be applied to understand how to interpret patterns of behavior with the end goal of predictable behavior. This prediction requires some degree of human interpretation so that we are able to position ourselves to disrupt patterns of negative behavior or simply look for persons of interest based on these patterns of behavior. These same patterns evolve into intelligence which over time increases the machine’s ability to more accurately predict patterns that could allow for actions to be taken as a result. This intelligence which is now actionable could translate to life safety such as stopping a production manufacturing process, if a person were to move into an area where they shouldn’t be which might put them in danger. Useful Applications Of Intelligence Informative knowledge or intelligence gathered could be useful in retail applications as well by simply collecting traffic patterns as patrons enter a showroom. This is often displayed in the form of heat mapping of the most commonly traveled paths or determining choke points that detract from a shopper’s experience within the retail establishment. It could also mean relocating signage to more heavily traveled foot-paths to gain the highest possible exposure to communicating a sale or similar notice, perhaps lending itself to driving higher interest to a sale or product capability. Some of this signage or direction could even translate to increased revenues by realigning the customer engagement and purchasing points. Actionable Intelligence From a surveillance perspective, AI could be retranslated to actionable intelligence by providing behavioral data to allow law enforcement to engage individuals with malicious intent earlier, thus preventing crimes in whole or in part based on previously learned data. The data collection points now begin to depart from a more benign, passive role into an actionable role. As a result, new questions are being asked regarding the cameras intended purpose or role of its viewpoint such as detection, observation, recognition or identification. Detecting Human Presence By way of example, a camera or data collector may need to detect human presence, as well as positively identify who the person is. So the analytic trip line is crossed or motion box activated or counter-flow is detected which then creates an alert for a guard or observer to take action. Further up the food chain, a supervisor is also notified and the facial characteristics are captured. These remain camera analytics, but now we feed this collected facial information to a graphic processing unit (GPU) which could be employed to compare captured characteristics with pre-loaded facial characteristics. When the two sources are compared and a match produced, an alert could be generated which results in an intervention or other similar action with the effort of preventing a further action. This process- detect, disrupt, deter or detain could be considered life-saving by predictably displaying possible outcomes in advance of the intended actions. The next level is deep-learning AI which employs the same characteristics to determine where else within the CCTV ecosystem the individual may have been previously by comparatively analyzing other collected video data. This becomes deep-learning AI when the GPU machine is able to learn from user-tagged positive identification, which the machine learns and begins to further reprocess its own data to further understand where else the person of interest (POI) may have existed on the ecosystem and more correctly improve its own predictive capabilities, thus becoming faster at displaying alerts and better at the discovery of previously archived video data. The Future In conclusion, the future of these “predictables” wholly rests in the hands of the purchasing end-user. Our job is to help everyone understand the capabilities and theirs is to continue to make the investment so that the research perpetuates upon itself. Just think where we’d be if purchasers didn’t invest in the smartphone?
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change program, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programs continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessaccess to valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasize the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programs. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programs.
Security beat
Facial recognition continues to be a political football and a target of privacy activists in the United States. For example, San Diego has suspended its use of facial recognition scanners by law enforcement after a campaign by civil rights groups. The San Diego Tactical Identification System (TACIDS) program included a database of facial recognition scans shared by 30 local, state and federal agencies. A California law, passed in the fall, puts a three-year moratorium on law enforcement use of face recognition technology. A proposal in Congress would prohibit use of biometric recognition technology in most public and assisted housing units funded by the Department of Housing and Urban Development (HUD), thus protecting the more than two million public housing residents nationwide from being “over-surveilled.” The “No Biometric Barriers to Housing Act” is supported by the NAACP, the National Housing Law Project, National Low-Income Housing Coalition, National Action Network, Color of Change, and the Project on Government Oversight. The problems of Facial Recognition "Studies that show that facial recognition systems may misidentify many individuals including women and people of colour" A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing because it “could be used to enable invasive, unnecessary and harmful government surveillance of…residents.” The letter cites studies that show that facial recognition systems may misidentify many individuals including women and people of color, thus “exacerbating vulnerabilities that marginalized groups already face in life.” In June, Somerville, Mass., became the second U.S. city to ban the use of facial recognition technology in public spaces. The first was San Francisco. A coalition of organizations and trade associations has issued a letter to Congress outlining concerns with “blanket prohibitions” or moratoriums on facial recognition technology and listing beneficial uses for public safety, national security and fighting fraud. The Security Industry Association (SIA) is part of the coalition, the Information Technology and Innovation Foundation. A letter from seven members of Congress to HUD Secretary Ben Carson questioned the use of facial recognition in federally assisted housing Facial recognition technology has benefited Americans in many ways, such as helping to thwart identity thieves" The letter says: “While polls consistently show that Americans trust law enforcement to use facial recognition technology responsibly, some groups have called for lawmakers to enact bans on [the] technology. While we agree that it is important to have effective oversight and accountability of these tools to uphold and protect civil liberties, we disagree that a ban is the best option.” Development and guidance As alternatives to outright bans, the letter proposes expanded testing and performance standards, develop of best practices and guidance for law enforcement, and additional training for different uses of the technology. “Facial recognition technology has benefited Americans in many ways, such as helping to fight human trafficking, thwart identity thieves and improve passenger facilitation at airports and enhance aviation security,” says Don Erickson, CEO of SIA. “SIA believes this advanced technology should be used in a safe, accurate and effective way, and look forward to working with Congress to help the U.S. set the example on how to ethically and responsibly govern this technology.” SIA has produced a document called “Face Facts: Dispelling Common Myths Associated with Facial Recognition Technology.”
GSX 2019 got off to a jaunty start Tuesday. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their booths. There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side), while the trend toward system sales is continuing. Here's a review of Day 1 from the show floor. Dahua continues to educate market “Traffic-wise, the show is better than last year,” observed Tim Shen, Director of Marketing at Dahua Technology USA, at midday on Tuesday. “We met more people from Latin America,” he added. Shen theorized that Chicago is at the center of a larger territory of customers than last year’s location (Las Vegas).Dahua’s presence at the show makes a statement: “We’re still here" Dahua has faced some negative publicity in the last year since they were banned from procurement by U.S. government customers by the National Defense Authorization Act (NDAA). Dahua’s presence at the show makes a statement, says Shen. The statement is “We’re still here.” Shen said only one visitor to the Dahua booth even mentioned the NDAA on the first day of the show, and the visitor was misinformed about the provisions and implications of the law. “There is a lot of misinformation,” he says. “We need to continue to educate the market.” Facial recognition, video metadata, and people counting New at the show is the Dahua Analytics+ line of cameras that feature more in-depth analysis of data such as facial attributes, video metadata, and people counting. For example, the cameras can identify 128 points in a face, with an additional 256 attributes analyzed by the back-end recorder. Analysis can provide information such as age and gender, which can help a retailer analyze the demographics of their customers, for instance. Dahua is also adopting some of its consumer line of products for sale through the commercial channel. These include a flood light camera, a 2-megapixel WiFi camera and a doorbell camera. The products might be used outside of a retail store, for example, to complement Dahua commercial cameras that are used inside the store, says Shen. Dahua previewed a new multi-sensor camera that also includes a speed dome. The multi-sensor component combines eight views, each 2 megapixels, for a total of 16 megapixels. Below the multi-sensor camera is mounted a speed dome that can zoom in on regions of interest in the larger multisensor view. The camera will be launched in the fourth quarter. The show was humming with activity much of the day, and most exhibitors said they were pleased with the numbers and types of potential customers visiting their exhibits ACRE reports continued North American growth “The industry’s momentum will continue to grow,” predicted Joe Grillo, Principal of ACRE. New areas such as cloud and mobile credentialing have the fastest growth rate, but are starting from a much smaller base, he said, so momentum in those categories will take time.ACRE sees continued rapid growth with no slowdown in the North American market Grillo noticed the first morning of GSX was busy, although there was a bit of a lull at midday. In terms of the business outlook, Grillo sees continued rapid growth with no slowdown in the North American market, although there have been some negative elements creeping into the outlook in Europe. Cybersecurity concerns in access control I caught up with Grillo at the booth promoting RS2, a Munster, Ind., access control company that Acre acquired last May. It is the only Acre company that is exhibiting at GSX. RS2 is one of two access control companies acquired by Acre in the last year — the other was Open Options, Addison, Texas. Grillo said the two acquired companies are complementary, especially in terms of their sales channels and geographic strengths. Although both are national companies, RS2 tends to be stronger in the Midwest, while Open Options sales emphasis is centered in Texas and emanates to the rest of the country. Concerns about vulnerabilities are a growing issue in access control, said Grillo, and more large endusers are conducting penetration testing of systems. The industry should welcome the scrutiny, he added. Cybersecurity also represents an business opportunity in access control, noted Grillo. Concerns about the vulnerabilities of legacy technologies such as 125Khz proximity cards and the Wiegand protocol will likely accelerate the pace of companies upgrading their access control systems There seemed to be less emphasis on product introductions than at the ISC West show in the spring (although there is much that is on the new side) Eagle Eye Networks and cloud-based VMS Ken Francis of Eagle Eye Networks had already realized some new client opportunities during the first day of the show, although he was not optimistic at the outset. In contacting potential clients to meet at the show, he had heard that many were not attending. Among Eagle Eye Networks’ news at the show is full integration of body-cams into their cloud-based video management system. “It’s the most unique thing happening from a video management perspective,” Francis said. Previously, if someone needed a video clip from a body cam, they had to use a separate software system. Five years from now, at least 80 percent of all VMS systems will be cloud-managed" Francis continues to be bullish on the subject of cloud adoption of video management and made a bold prediction: “Five years from now, at least 80 percent of all VMS systems will be cloud-managed.” Eagle Eye Networks is doing its part with “rocket growth” that is reflected in an increase of company employees from 27 to 165 or so. Economies of scale have enabled Eagle Eye Networks to lower subscription prices by up to 45 percent. Genetec's release self-service PIAM system Many of the “new” products at GSX 2019 are slight variations on what was introduced at ISC West last spring. An exception is Genetec’s introduction of ClearID, a self-service physical identity and access management (PIAM) system that enforces security policies while improving the flow of people within the organization. The new system is integrated with the Genetec's Security Center Synergis access control system. PIAM systems have historically been customizable, complex to install and costly, which is why a lot of companies have not used a system. Genetec’s differentiator is that it is an off-the-shelf, out-of-the-box solution for a broader base of customers. “We scanned the market and found a lack of off-the-shelf identity management systems,” said Derek Arcuri, Product Marketing Manager, Genetec. “Targeting the mid-market, we are providing an accessible, ready-to-go cloud-based system that is ‘baked’ for the average company but can be integrated and expanded to include other systems.” The trend toward system sales at the show is continuing ClearID will simplify operation for the security department, which was previously tasked with a lot of administrative work in response to various departments. ClearID “pushes down” the authority to use the system to stakeholders (such as IT and/or facilities directors) and provides a system they can use themselves without involving security. “It empowers stakeholders and employees to work directly through the system rather than going through security,” says Arcuri. “It gives employees access based on stakeholder policies and improves the flow of people through an organization. The security director is relieved of administrative work and can work on ‘real’ security.” I saw some other things today, too, which I will share in a future GSX article... And more about the show tomorrow.
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situation occurs. Cloud-Based Analysis Software ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs, providing comprehensive outdoor coverage on campuses and in complex urban geographies. ShotSpotter sensors and cloud-based analysis software triangulate and pinpoint the precise location of each round fired within seconds, the number of shots fired and provide an immediate gunfire alert with an audio clip. Detailed incident data is immediately sent to SST’s Incident Review Center (IRC), a secure data processing and alert validation facility, where acoustics experts analyze the data and qualify the incident in real-time 24/7. Once validated, an alert is sent directly into Genetec’s Security Center, all in under a minute. Once the alarm is triggered within Security Center upon gunshot detection, operators can quickly access video and other related data surrounding the location of a gunshot alert, and immediately visualize it on Security Center maps, leveraging the dynamic visualization capabilities of the Security Center Plan Manager. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform Gunshot Identification Software Stanley Security has announced a partnership with Shooter Detection Systems LLC (SDS), gunshot detection solutions provider. As an authorized dealer, STANLEY Security is now certified to sell, install and service SDS products and services. SDS’s Guardian Indoor Active Shooter Detection System combines acoustic gunshot identification software with infrared gunfire flash detection for a fully automated gunshot detection and alerting solution. The Guardian System immediately detects gunshots and simultaneously alerts building occupants The Guardian System immediately detects gunshots and simultaneously alerts building occupants and first responders within one second and with zero false alerts. Johnson Controls has announced that its exacqVision video management system now integrates with Databuoy Corp.’s ShotPoint acoustic gunshot detection and localization system to speed response time and heighten the decision-making process for local responders during active shooter situations. Integrated Security Systems Johnson Controls has also released the Detect360 Active Shooter Response (ASR) system, combining reliable gunshot detection with notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the threat up to 60 percent faster. Detect360 ASR gives first responders information as it develops at the scene, including shot location, number of shots, location of the shooter in near real-time and the ability to remotely monitor the situation through integrated security systems. It also collects forensic information that can later be used by law enforcement. The system supports multiple integration options, including video feeds from existing CCTV and intrusion systems, mass notification systems, access control systems and panic button/manual initiation systems. Public Safety Access Points Listed as one of the most important new technologies debuted at CES 2019 by the Wall Street Journal and NBC News, Safe Zone also showcased its Safe Zone Gunfire Detector (GFD) at ISC West 2019. Priced at $149 per unit, the Safe Zone Gunfire Detector combines infrared and sound detection technologies with immediate cloud-based data analysis that can analyze more than 3,000 data points of each loud noise that exceeds ambient levels by a certain threshold. Utilizing the data from multiple detectors simultaneously, the system determines the location of shots fired, the number of shots, and the type and caliber of gun being used. Within 10 seconds of the trigger pull, an alert is sent to Public Safety Access Points in the appropriate dispatch center, giving local 911 dispatchers all critical information on their computers. Reseller Recruitment Program Shot Tracer has launched a reseller recruitment program with a highly attractive on-boarding proposition for qualified dealers. Qualifying resellers can receive a Gunshot Simulator Kit valued at $1,000 when they commit to becoming a Shot Tracer dealer. Shot Tracer’s Eagle Gunshot Detection System easily integrates with virtually any security, alarm, surveillance and access system via contact closure – or wirelessly via IP integration. The system determines the location of shots fired, the number of shots, and the type In fact, Shot Tracer gunshot detection sensors are as easy to install as a smoke detector, so there’s virtually no learning curve for installing dealers. The new Shot Tracer Reseller Recruitment Program includes an exclusive offer for installing dealers to receive a free Gunshot Simulator Kit, valued at over $1000, which is essential for demonstrating Shot Tracer Eagle Gunshot Detection sensors. Terms and conditions apply for qualifying resellers.
Case studies
Security is the biggest concern for military facilities. Modern military facilities face a wide variety of risks, from cyber attacks to data theft to terrorist attacks. The Corpus Christi Naval Air Station in Corpus Christi, Texas for example, dealt with three separate attempted intrusions in a year and a half. In one incident, man driving a stolen SUV entered the base and attempted to exit through a separate entrance, but crashed his car and was then shot by security personnel. In another incident, just eight months later, the base went on lockdown again before an armed man was taken into custody. Then, in the third incident, seven months later, there was a third attempt to break into the base, this time by a man with known ties to terrorist groups. Protect sensitive facilities The man fired at the security guard at an entrance gate and struck her bulletproof vest before she raised the barrier to prevent the attacker from getting inside the base. The base’s security did a good job of preventing any serious damage during these attacks, but with the frequency of these incidents, more modern security may be needed to ensure that the next attack doesn’t end in catastrophe. Modern times call for modern security solutions, and Helios is the perfect option to protect sensitive facilities Modern times call for modern security solutions, and Helios by UVeye is the perfect option to protect sensitive facilities. Helios is safer, improves security, makes security officers’ jobs easier, works in extreme conditions, and can even identify vehicle passengers with high body temperatures to help prevent the spread of COVID-19. Helios UVIS uses machine learning and artificial intelligence to inspect the undercarriage of any vehicle that drives over its multiple high-resolution cameras. Improved safety for facilities It alerts the user on any irregularities or foreign objects hidden in the undercarriage. Inspecting the undercarriages of vehicles is very difficult for security personnel. Before Helios, there was never an effective solution for under-vehicle inspection, and even if security officers inspect the undercarriage, they may not know what to look for. They may not recognize a threat and allow a vehicle with a weapon, bomb, or other illicit or dangerous item to enter the facility. Security officers put themselves at great risk by manually inspecting vehicles, as evidenced by the attempted terrorist attack in Corpus Christi in May. With Helios, the security guard can inspect the vehicle from a safe distance by simply looking at the high-resolution images and checking for anything suspicious or unusual in the undercarriage. Detecting potential threats Scanning all vehicle types for undercarriage threats Automatic detection of illicit materials below the vehicle on the first pass Full integration to barriers, bollards and access control systems Driver and passenger fever detection capabilities No matter how well trained a security officer is, all humans make mistakes. However, with Helios, the chances of human error are greatly reduced. The system produces high-quality images of the undercarriages and alerts the security officer of any irregularities. It will even detect issues in the undercarriage of a vehicle passing through the system for the first time. Detecting potential threats is easy with UVIS. Works in extreme conditions The high-resolution images allow a security officer to see the entire undercarriage very clearly to determine whether there is anything suspicious. Instead of manually inspecting the vehicle and putting themselves at risk, security officers can inspect the vehicle from a more relaxed and safer environment and zoom in on the smallest details. Helios can withstand up to 20 tons per axle, meaning that it will survive being run over by massive vehicles Plus, Helios provides a side-by-side view of previous scans from the same vehicle if it has gone through the system before to make it easier for the officer to notice any differences. Helios can withstand up to 20 tons per axle, meaning that it will survive being run over by even massive vehicles. It is fully operational at temperatures between -20 and 40 degrees Celsius and is IP 68/54 compliant, meaning it offers full protection against sand, dust, or rain. Combat COVID-19 UVeye’s thermal sensor can also detect the body temperatures of vehicle passengers, which can identify visitors with potential fevers, improving the safety of everyone on the base. UVeye fully supports 3rd party integration and provides a multiple layer of security for any facility Integrations made in the past: ALPR Face Detection / Recognition Arm Barriers / Bollards VMS (Video Management System) Integrating to the centralized server provides the capability of connecting multiple systems or lanes across different sites while enabling central management and control via one screen. The centralized management system enables the client to access the different systems deployed and manage the different users and historical data. Access control systems The undercarriage of a vehicle is one of the most important parts of the vehicle to inspect, but also one of the most difficult areas to inspect. Helios is the perfect solution to prevent any weapons, bombs, drugs, or other illegal and dangerous items from entering military facilities. It can make everyone in the facility safer, including security officers, who will no longer need to manually inspect vehicles and put themselves in harm’s way. Integrating with other security and access control systems can provide a multi layer approach to tighten the entry and exit points to any sensitive site while keeping personnel and data safe.
FLIR Systems, Inc. announced that the United States (U.S.) Army, Air Force, and Navy have collectively ordered more than 250 additional FLIR Centaur™ unmanned ground vehicles (UGV), worth $32 million combined. The award is being sourced through the Army’s Man Transportable Robotic System Increment II (MTRS Inc. II) program. Over the last 12 months, FLIR has announced multiple orders totaling roughly $97 million for more than 750 Centaur unmanned ground systems from the Army, Air Force, Navy, and Marine Corps. Improvized explosive devices Explosive Ordnance Disposal (EOD) teams across all services will use the FLIR Centaur to assist in disarming improvized explosive devices, unexploded ordnance, and similar hazardous tasks. Operators can quickly attach different sensors and payloads to the robot to address other missions, including chemical, biological, radiological and nuclear (CBRN) threats. “We’re tremendously honored that EOD teams across America’s military are relying on our Centaur robot to help them perform dangerous missions with greater stand-off capability,” said Tom Frost, VP and general manager for Unmanned Ground Systems in the Unmanned and Integrated Solutions business at FLIR. Electro-Optical infrared cameras FLIR is delivering systems to the Army under that multi-year program of record “From enabling easy software updates to enhanced electro-optical infrared cameras, controllers, and communication systems, the Centaur can be a game-changer for troops on the battlefield. Sharing common technology across EOD units also creates efficiencies for joint service operations, training and sustainment,” Frost added. In 2017, the U.S. Army selected the medium-sized Centaur robot as its MTRS Inc II solution. FLIR is delivering systems to the Army under that multi-year program of record, which upon award was valued at more than $150 million, including options. These latest orders fall under the current ceiling. Ground robot system Since then, other U.S. military branches have opted to deploy the Centaur to their EOD teams as a new or replacement ground robot system. Centaur is a medium-sized UGV that provides a standoff capability to detect, confirm, identify, and dispose of hazards. Weighing roughly 160 pounds, the open-architecture robot features an advanced EO/IR camera suite, a manipulator arm that reaches over six feet, and the ability to climb stairs. Modular payloads can be used for CBRNE detection and other missions. Deliveries are expected to begin in the first quarter of 2021.
Lufthansa Technik operates in a special division of the aviation industry, and security is a top priority to safeguard its people, planes and facilities. Over the years, the need to control access to its premises - particularly when it comes to external visitors - has become increasingly more important. A key challenge, however, is that Lufthansa Technik wants to maintain an inviting environment that feels free from restrictions, while also ensuring the highest security standards. Although Lufthansa Technik wants to prevent unauthorized access, it doesn’t want to hinder employees as they go about their day. It’s really important to the business to find the right balance between security and convenience, so people can feel secure but also free as they move around. And employees have a dynamic work environment that supports them in performing to the best of their ability. Unified access control Another key objective for Lufthansa Technik’s new access control system was unification. It has more than 35 locations and 100,000 employees worldwide and, in the past, each site was responsible for its own security. This would sometimes involve hiring specialists to solve the same problems at different locations. Lufthansa Technik’s ultimate goal is for all its sites to share the same access control system Lufthansa Technik wanted to avoid this and ensure not just consistent security standards but a culture of great connection where people can easily network and collaborate wherever they’re based. As a result, Lufthansa Technik’s ultimate goal is for all its sites to share the same access control system and follow the same standardized security policy. Access control system It also wants all employees to be able to use one single Lufthansa Technik badge to access all the locations they’re authorized to access - both locally and internationally. It was a big challenge to begin tackling, particularly when considering the IT challenges of implementing a unified access control system in multiple locations around the world. Lufthansa Technik began its search to find the right access control system by thoroughly researching the market and issuing an in-depth tender to a variety of suppliers. After detailed comparison, it chose Nedap. Melf Westphal, Head of Security Solutions at Lufthansa Technik, explains: “We were really impressed with Nedap’s entrepreneurial culture, hands-on mentality and personal approach. They were really reaching out to us, determined to find out exactly what we need. So we decided to implement Nedap’s AEOS system, which has helped us tremendously in meeting our requirements and creating a single system.” Security with convenience People set free to perform at their best Lufthansa Technik’s goals for its access control also align with Nedap’s people-first approach to providing ‘Security for life’. Nedap believes that a security system should be designed around the people using it, rather than the technology driving it. This ‘Security for life’ concept underline’s Nedap’s desire to free people’s minds from security so they can make the most of each day. Initially, Lufthansa Technik began with a pilot project to implement AEOS in Hamburg Which, in turn, mirror’s Lufthansa Technik’s desire to balance security with convenience. Initially, Lufthansa Technik began with a pilot project to implement AEOS in Hamburg, where it has 10,000 employees, followed by four affiliate locations. Melf says: “We weren’t sure at first how to go about it. But we got a lot of help from Nedap and their excellent partners, who were a great help to us during the implementation phase." Create tailormade solutions "The pilot project enabled us to overcome two major challenges: how to implement AEOS access control in our IT infrastructure and how to involve our employees. In both areas, Nedap and their partners did a wonderful job,” he continues. “It wasn’t only the really good products they presented to us. With their support, and that of their dedicated partners, they helped us solve all the operational issues." "And through their partner network, they enabled us to create tailormade solutions by offering third party integrations that matched our security demands. It’s meant that instead of barricading ourselves in we have relative freedom of movement. I feel very secure but I can use my badge to go anywhere. We have fantastic solutions and, importantly, the same Lufthansa Technik ID badge connects all of us – no matter where we’re based.” Third-party integrations The AEOS access control system that Lufthansa Technik implemented goes beyond just securing doors; they installed additional components such as key cabinets and visitor management. Melf says: “AEOS was a great help in this respect - it enabled us to bring in third-party providers. As Nedap has an ethos of working closely with third-party technology partners, and AEOS integrates easily with other systems, it means we weren’t restricted to just one solution." "We had the flexibility to create exactly what we wanted. I have a slogan when it comes to our security: ‘We open doors rather than close them.’ That’s really important to me,” Melf Westphal, Head of Security Solutions at Lufthansa Technik. For Lufthansa Technik, a key aspect of the pilot project and subsequent rollout is getting employees on board with the new access control system. Significant investment in training Each Lufthansa Technik employee is now incited to feel a shared responsibility for creating a secure work environment It believes that even the best access control system loses its value if the people working with it don’t have the right mindset. For this reason, Lufthansa Technik made a significant investment in training, communication and awareness campaigns. These focused first on letting employees know how valuable they are, how important security is and why the security changes are being implemented. They’ve also made employees aware of the importance of anticipating security risks and of their own role in Lufthansa Technik’s security management system. Each Lufthansa Technik employee is now incited to feel a shared responsibility for creating a secure work environment. And they’re all trained in how to respond to a security alert and address someone if they see them in a place they’re not supposed to be. New security system Importantly, Lufthansa Technik employees understand that their AEOS access control system is as much about preserving their freedom as it is about locking down their safety. The next steps for Lufthansa Technik are to continue rolling AEOS out worldwide. Melf explains: “The success of our new security system hasn’t gone unnoticed. Other Lufthansa Technik facilities have seen that AEOS has proved itself in practice in Hamburg, in a facility with 10,000 employees." "And we’ve seen an increase in requests for similar systems from facilities all over the world. Our goal now is to implement AEOS in all our locations worldwide, so we can truly build a unified security system that connects the entire Lufthansa Technik family. A security system that allows us to open doors, not close them.”
Installation company Nessence recently integrated Vanderbilt’s ACT365 cloud-based access control and video management system with Mobile BankID in Sweden. Mobile BankID is a citizen identification solution that allows companies, banks, and government agencies to authenticate and conclude agreements with individuals over the internet. The integration with ACT365 comes together to solve a brief put forward by the supermarket chain, ICA Sweden. Web API for integration Tobias Olofsson, Project Sales Manager at Vanderbilt, explains that ICA Sweden is a retailer with a focus on food and health, and they wanted to be open earlier in the morning and later in the evening. “It would be too expensive to hire staff to stay open during these times in smaller locations. This is because the number of customers shopping early in the morning or late at night is minimal. But the store wants to be able to provide its customers with this value-added service,” says Olofsson. ACT365 was the perfect solution for this project due to its easy deployment, easy operation To solve this, the supermarket wanted to open unmanned and needed a solution to allow customers to enter the store in a functioning and approved manner by the insurance company. In Olofsson’s opinion, ACT365 was the perfect solution for this project due to its easy deployment, easy operation, and a smooth web API for integration. Increased accessibility and convenience “The success of this project means it is now possible for shoppers to open the supermarket’s entrance door by digitally signing into the Mobile BankID on their phone and presenting it to the ACT365 reader located on the outside of the door,” states Olofsson. Moreover, good accessibility is maintained as all customers do not need to have specific cards or tags for the access system to be able to enter the supermarket. “A new modern solution has been developed to facilitate trade for private individuals, especially in smaller towns where food stores do not tend to stay open for as long as in the big cities. This project has resulted in increased profits for the supermarket, as well as increased accessibility and convenience for its customers,” concludes Olofsson.
Protecting commercial properties is complicated and goes beyond safeguarding people and property. Security professionals respond to the needs of the business, staff, contractors, and visitors and deal with the realities of property damage, theft, and disgruntled employees. Ava helps the team react to anomalies and policy enforcement in real-time. Instead of merely investigating incidents, organizations can take the necessary steps to prevent them. Spotlight brings relevant feeds to the operator’s attention and triggers real-time alerts to address threats before they escalate. Leverage integrated video and audio analytics to give an enhanced understanding of the camera feeds. Respond to loitering challenges, access anomalies, theft incidents, fires, and more. Identifying suspicious people Smart Search allows operators to search by appearance, events, objects, similarity, or image. Recovering lost or stolen objects, identifying suspicious people like unescorted visitors, investigating health incidents or damage to the property, performing cleaning crew inspections now take minutes instead of hours. Combine with access control to identify tailgating or fire or active shooter scenarios To gain occupancy insights, operators can leverage Ava Aware’s unique Map view with Smart Presence. By adding floor plans and maps of premises, people and vehicles appear as dots in their precise on-site locations. Operators can see live footage as they move on the cameras’ fields of view. Combine with access control to identify tailgating or fire or active shooter scenarios. Connect Ava Aware to the cloud to achieve easy and simple deployment and access from anywhere in the world. Share links of recorded video with team members, claim investigators, and law enforcement, regardless of whether they have admin access to Aware or not. Get a secure download of video files in a standard mp4 format with digital watermarking for authenticity. Key benefits delivered are as follows: Integrate with existing cameras Hundreds of hours saved in forensic searches Add access control to extend capabilities Video & metadata storage remain on-premises Full site survivability and local access Increase operational productivity and reduce facility costs Distribute heat and cooling efficiently, optimize cleaning and workplace productivity through hot-desking insights Use people flow insights to manage people and vehicle queues efficiently Automatically decrease storage demands from all the recordings Reduce bandwidth consumption on critical links with AI-based optimization Pay for what is needed, when it is needed, without the hassle of complicated licensing Up to 200 cameras per Ava appliance— small footprint support for larger facilities One-click Ava Dome and Ava 360 camera configuration Encrypted media at rest and in transit Automatic firmware updates Digital watermarking to prevent tampering Simple subscription model without hidden costs or analytics add-ons With a simple licensing model, Vaion always includes services and software upgrades. They no longer have to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.
Retailers face complex challenges that range from loss prevention and maintaining a safe environment for both customers and staff to improving customer experience and operational productivity. Choose Ava Unified Security (formerly Vaion) to ensure security operators can tap into advanced analytics to detect and react to anomalies in real-time. Additionally, store managers can use Ava’s customer intelligence insights to increase profits and meet the customers’ needs. Leverage Ava’s machine learning anomaly detection to get alerts on people and vehicles loitering or cars present out of hours. Facilitating advanced analysis Get a clear understanding of activity at rear entrances, aisles, or end-caps by counting people who congregate in certain areas. Track cash register points to minimize thefts and identify return frauds. Authorized users can share links of recorded video securely with team members, claim investigators, and law enforcement. Monitor queues and the number of employees behind counters to ensure minimal waiting time Use counting of people and vehicles entering and exiting to analyze store performance, footfall, queues, and allocate more staff during busy periods. Download and share historical data of occupancy information with store managers to facilitate advanced analysis. Improve store safety by detecting verbal aggression, robberies, and vandalism, and empower security operators to act before incidents escalate. Track goods and control access as vehicles are entering your warehouses. Get notifications in real-time when trucks are approaching loading docks and prevent the damage of fleet and storage areas. Monitor queues and the number of employees behind counters to ensure minimal waiting time. Use Ava’s powerful search features to investigate across all stores, warehouses, and distribution centers and identify repeat offenders or suspects. Enhanced overview of operational insights Increase operational productivity and reduce store and warehouse costs Distribute air efficiently to match economics and customer comfort Use people flow insights to manage queues efficiently Understand the customers’ in-store activity and which are the least and most visited areas Enhanced customer experience Get insights on the customers’ in-store traffic patterns Instant notification when queues are detected to allocate staff according to the busiest business hours Find out which of the locations perform the best and why Saving storage and money Automatically decrease storage demands from all the recordings Reduce bandwidth consumption on critical links with AI-based optimization Pay for what is needed, when it is needed, without the hassle of complicated licensing Up to 200 cameras per Ava vserver appliance—small footprint support for larger facilities Simplicity and compliance One-click Ava vcam configuration Encrypted media at rest and in transit Automatic firmware updates Digital watermarking to prevent tampering Simple subscription model without hidden costs or analytics add-ons With a simple licensing model, Ava always includes services and software upgrades. One no longer has to worry about integration charges, operator charges, API fees, or the complexity between small, medium, large, and enterprise services.


Products
Round table discussion
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
Ensuring privacy is often a concern for video surveillance systems, especially in situations where a system intended for “public” surveillance could somehow, perhaps inadvertently, view private areas or situations. The classic example is an apartment building whose windows are within the range of a video surveillance camera. How can you provide video surveillance without invading the privacy of the apartment dwellers? Integrators and end users often turn to technology for a solution. We asked this week’s Expert Panel Round Table: How can smart camera features (such as privacy masking and programmable pan-tilt-zoom) address concerns about privacy?
Terrorism is in the headlines all over the world. After any such incident, many of us in the physical security market find ourselves asking: What could we have done to prevent it? Assessing risk and preventing catastrophes before the fact are part of our market’s DNA; and yet, too often the random nature of terrorist attacks and their targeting of public places leave us unsure of anything anyone could have done. How can we translate the benefits of our industry’s products into real-world solutions that can prevent terrorist attacks? We presented the question to this week’s Expert Panel Roundtable, and received a variety of interesting responses. Specifically, we asked: How is the recent rise in terrorism impacting the physical security market (e.g., higher demand, different mix of products, etc.)? How should the physical security market respond? What solutions are needed?