Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situatio...
The Spanish SMBs subscribed to Conexión Segura Empresas have avoided more than 80,000 potential cybersecurity incidents since the solution was launched in May. Of those, more than 89% of blocks occurred when users tried to access risky domains or websites, as a result of ‘phishing’. Combating rising cybercrime “The service that Telefónica Empresas offers to its customers has been launched at a moment of high level of cybercrime, in which a new threat is created...
Johnson Controls has updated its popular Illustra Pro camera family with a new generation of Illustra Pro Mini-Domes featuring Smart Wide Dynamic Range. Offering a choice of 2, 3, 5 and 8 megapixel models and a variety of lens options, the new Pro Mini-Domes are ideal for a wide range of deployments in both medium and large-sized facilities. Smart WDR technology This new Smart Wide Dynamic Range (WDR) technology built into the new Mini-Domes greatly improves the quality of images captured in v...
Everbridge, Inc., the global provider of critical event management (CEM) and enterprise safety software applications to help keep people safe and businesses running, announced the acquisition of NC4, a global provider of threat intelligence solutions that empower businesses, government organizations, and communities to assess and disseminate risk data and information to manage and mitigate the impact of critical events. The combination of NC4’s real-time threat intelligence and analyst te...
Punch Technologies, Inc. and Johnson Controls have finalized an agreement to bring an innovative safety communications platform to market. The platform, which can be integrated into businesses’ existing security systems, provides the opportunity to more easily and effectively communicate with employees, emergency responders and other surrounding businesses in the event of an emergency incident. Under the terms of the agreement, Johnson Controls will be the primary distributor of PunchAler...
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
Pivot3, global provider of intelligent infrastructure solutions, has announced the Virtual Security Operations Center (Virtual SOC), designed to address the need for security teams to access client workstations running video surveillance and other related systems in multiple locations without using expensive, dedicated client workstation hardware. Virtual Security Operations Center With the Pivot3 Virtual SOC, security teams can now get fully functional security workstation capabilities With the Pivot3 Virtual SOC, security teams can now get fully functional security workstation capabilities – including video surveillance, access control, PSIM, and other security-related systems – on more devices, more securely and more cost effectively than desktop workstations. Mission-critical security environments require remote and immediate access to video and other security data coming from cameras and devices at multiple locations to improve incident response times and situational awareness. Processing integrated security data Until now, however, these type of security operations centers have relied on dedicated, expensive physical workstations to process video streams and integrated security data, which require extremely high levels of compute power and exposes data to potential unauthorized access. Furthermore, physical workstations lack critical fail-over and high availability capabilities and are cumbersome to manage and administer. The Pivot3 Virtual SOC delivers fully functional client workstation capability to any device including low-cost thin/zero clients, remote client PCs and laptops, video walls and mobile devices. Replacing expensive graphics-enabled workstations with flexible, secure thin- and zero-clients reduces upfront capital equipment costs and on-going maintenance and management expenses. Data And Cyber security The Pivot3 Virtual SOC works with any video management software, regardless of brand Video data is stored and secured in the Virtual SOC’s central storage system while only a secure, encrypted desktop image is streamed to the remote device, ensuring that all sensitive information remains protected and secured at the central host site. This also enables the security team to share video with outside agencies and organizations in a more immediate, secure and bandwidth-efficient fashion. The Pivot3 Virtual SOC works with any video management software, regardless of brand. “Security teams must have the ability to access video and related systems securely on any device, including mobile clients, to facilitate a faster and more intelligent response to an incident,” said Brandon Reich, Vice President, Security and IoT, Pivot3. Incident management “The Pivot3 Virtual SOC delivers virtualized video workstation capability that provides better security, faster remediation and a rich mobile experience for enhanced situational awareness and provides compelling economics since it eliminates the need for expensive, dedicated workstations.” Organizations with distributed locations such as university, corporate, and medical campus environments, airports, safe cities, casinos, entertainment complexes, and correctional facilities all benefit from high-performance, virtual security workstations to provide real-time insight in the event of an incident. Mission-critical security environments A security manager or agency can leverage the Pivot3 Virtual SOC to deliver real-time, fully functional security systems to any mobile device in use by distributed security personnel, reducing their risk through better situational awareness and faster response. Pivot3’s intelligent hybrid cloud and IoT solutions provide security, resilience and management simplicity “Within mission-critical security environments, organizations require a scalable and easy-to-manage solution that maintains the integrity of mission-critical video and data,” said Todd Brown, President, Affinitech, Inc. “The Pivot3 Virtual SOC exceeds all expectations by delivering a cost-effective replacement for physical workstations, improving ROI while increasing operator visibility.” Intelligent hybrid cloud, IoT Pivot3’s intelligent hybrid cloud and IoT solutions provide security, resilience and management simplicity at scale for customers’ mission-critical environments. Powered by the industry’s only Intelligence Engine, Pivot3 automates the management of multiple, mixed application workloads, delivers industry-leading performance at scale, eliminates unplanned downtime and reduces the cost of traditional IT infrastructure by half or more.
Qognify, the trusted advisor and technology solution provider for physical security and enterprise incident management, has announced that it will share its expertise of how metropolitan areas can make the shift from being safe and smart to fully cognitive cities, at the 5th National Summit on 100 Smart Cities India 2019. Qognify is the Presenting Partner of the Summit which takes place August 22, 2019 at The LaLiT in New Dehli. Safe & Smart City Solution Qognify, with its Safe & Smart City Solution, is one of the leaders in safe and smart cities in India. It is currently involved in more than 20 safe and smart city projects throughout the country that include high profile award-winning projects such as: Navi Mumbai - Qognify is used to monitor all critical points within the city including public transportation, schools, heavily traveled traffic junctions, city entrances and exits, open-air markets and utility infrastructure. Nanded City has an integrated command, control and communication center (C-Cube) that is powered by Qognify’s Safe City solution that includes Qognify’s Situator, video management and analytics solutions. Kohlapur is using Qognify’s video management and analytics to assist law enforcement and city management in coping with the influx of increased tourism. Regional VP, India at Qognify, Dilip Verma, will present at the Summit and he comments: “Many cities have taken steps to become safe cities, while a smaller but growing number are breaking ground as truly smart cities. At the Summit, we will use our experience, working on some of the most innovative projects in India and around the world, to look to the horizon, where we envisage urban environments becoming truly cognitive.” Safe, smart and cognitive cities Cognitive cities are much better positioned to thrive in the face of significant challenges" Verma makes the distinction between safe, smart and cognitive cities: “A safe city aims to ensure the safety and security of its residents, while smart initiatives go further, improving the operations of city. Cognitive cities take things to the next level by keeping citizens engaged and contributing to the gathering of the relevant data. The insights from which can be used not only to improve security, safety and city operations, but also the lives of residents.” He adds: “Cognitive cities are much better positioned to thrive in the face of significant challenges such as clean water scarcity, climate change, and providing functional and efficient mass transportation at mega-city scales. It is an ambitious goal that not only holds the promise of being more resilient, but at the same time promotes civic participation, sense of community and the health and wellbeing of citizens.” 5th National Summit on 100 Smart Cities India 2019 The 5th National Summit on 100 Smart Cities India 2019 will bring together global thought leaders to focus on aspects of a smart city including urban development, surveillance, power, energy, transport, technology, smart building, smart grid, smart health, network and communication technology.
FlytBase, Inc., an enterprise drone automation company, releases a white paper highlighting the factors critical to large-sale deployment of autonomous drones for security and surveillance applications. The journey from the ‘early adopter’ phase to the ‘early majority’ phase of the adoption curve for drone deployments in industrial & commercial security will require: a) reliable, off-the-shelf hardware b) cloud-based, hardware-agnostic software, and c) faster time-to-value, driven by low capex and seamless integration. Security and surveillance Unmanned aerial vehicles (UAVs) can be deployed in a multitude of 24/7 security and surveillance use-casesUnmanned aerial vehicles (UAVs) can be deployed in a multitude of 24/7 security and surveillance use-cases - the pace of which is determined by the intensity of user/customer pain points - such as high turnover of security guards, operations at night and in hostile scenarios, surveillance of hard-to-reach locations, liabilities associated with human and helicopter patrols, CCTV blind spots, need for real-time situational awareness in emergencies, etc. The time for aerial security is now ripe because the prosumer drone market has matured so rapidly in the last few years that commercial-off-the-shelf drones can be used commercially, instead of (expensive, monolithic, low reliability) custom drones, in all but the most demanding security and surveillance use-cases. Real-Time incident response Nitin Gupta, FlytBase CEO, commented, “The physical security market is primed for drone automation and scaling - the time, cost and safety benefits of autonomous drone fleets can create significant business value for this industry.” “Drone patrols will augment human guards and enable security agencies, risk managers, security directors, system integrators and other stakeholders to make faster, better decisions for real-time incident response, remote security operations, event management, disaster response and more.”
UK organizations are failing to make progress towards strong cybersecurity and are facing paralysis as cybercriminals become more advanced. This is the conclusion drawn from the findings of the 2019 Risk:Value report – ‘Destination standstill. Are you asleep at the wheel?’ – from NTT Security, the specialized security company and center of excellence in security for NTT Group. Examining the attitudes of 2,256 non-IT decision makers to risk and the value of security to the business, NTT Security’s annual Risk:Value report researches C-level executives and other senior decision makers across 20 countries in the Americas, Asia Pacific and Europe, including the UK, and from across multiple industry sectors. Impact of cyber attacks on businesses Almost all respondents in the UK believe that strong cybersecurity is important to their business over the next 12 monthsUK respondents are aware of the risks posed by cyber threats, with over half (54 per cent) ranking cyber attacks on their organization as one of the top three issues that could affect businesses in the next 12 months – second only to ‘economic or financial crisis’ (56 per cent). While global organizations rank ‘loss of company data’ in third place, in the UK, 44 per cent believe that cyber attacks on critical infrastructure is a far greater threat. Of the most vulnerable components of critical national infrastructure, telecoms, energy and electricity networks take first, second and third place. Almost all (90 per cent) respondents in the UK believe that strong cybersecurity is important to their business over the next 12 months, compared to 78 per cent who say the same about ‘growing revenue and profit’, while 93 per cent believe cybersecurity has a big role to play in society. According to the report, strong cybersecurity allows UK organizations to ‘ensure the integrity of their data’ (58 per cent) and ‘ensure only the right people have access’ to this data (56 per cent), while around half say it ‘helps protect the brand’. Good and bad practice in cybersecurity Businesses in India, a new country to the research, are now the best performing in the world for cybersecurityFor each organization in the research for the last two years, NTT Security has analyzed the responses for good and bad practice in cybersecurity, with good practice awarded positive scores and bad practice awarded negative scores. The results show a worrying lack of progress globally: in 2019 as in 2018, the average score was just +3, meaning that there is nearly as much bad practice as good practice. Thirty-two per cent of businesses score less than zero: that is, they are exhibiting more bad practice than good practice. Businesses in India, a new country to the research, are now the best performing in the world for cybersecurity, ahead of the UK. The performance of organizations in France, Germany and Singapore has worsened in the last year, as has the performance of the financial services, telecommunications, chemicals, pharmaceuticals, oil and gas and private healthcare sectors, placing doubt on the robustness of critical national infrastructure. Areas where UK organizations are stalling Paying cybercriminals: A third (33 per cent) of UK respondents say that they would rather pay a ransom to a hacker than invest more in security because it would be cheaper, a significant rise of 12 per cent over 2018’s Risk:Value report. In addition, 34 per cent said they would rather pay a ransom to a hacker than get a fine for non-compliance of data regulations. Budgets: Security budgets in the UK are potentially failing to keep up with increasing cyber risk, with the percentage of IT budget attributed to security (15 per cent) in line with the global average. The percentage of operations budget spent on security has fallen by around 1 per cent since 2018, to 16.5 percent in 2019. GDPR compliance: Just 30 per cent globally believe they are subject to GDPR, a year on from the deadline, despite it affecting all organizations that have operations or customers in any European Union member state. The UK is a more respectable 48 per cent – still behind Spain (55 per cent) and Italy (50 per cent). Internal security policies: Businesses are still failing to be proactive internally. At a global level, 58 per cent have a formal information security policy in place, just 1 per cent up over last year. While the UK shows an impressive 70 per cent with a policy in place, this is down on last year’s 77 per cent. Less than half (47 per cent), however, admit that their employees are fully aware of such a policy. Incident response plans: In 2019, 60 per cent of UK organizations have an incident response plan in place in the event of a security breach, a 3 per cent drop. However, this is still above the global average of 52 per cent and among the highest figures across all 20 countries. Blaming IT: Around half (44 per cent) of UK respondents believe cybersecurity ‘is the IT department’s problem and not the wider business’, which is in line with the global average of 45 per cent. While Swedish organizations are most likely to blame IT (60 per cent), Brazil is least likely (28 per cent) to do so. Time spent on recovery from cyber breach The cost of recovering from a breach is estimated to be $1.2 million in the UK, matching the global averageThe 2019 Risk:Value report reveals that the time spent on recovering from a cyber breach continues to rise year on year, with UK respondents estimating that it will take 93 days on average to recover. The UK figure is a significant rise of nearly double over last year’s estimated 47 days. The UK now ranks as one of the highest figures globally compared to one of the lowest in 2018. The cost of recovering from a breach is estimated to be $1.2 million in the UK, matching the global average. Notably in the Nordics, costs are predicted to be much higher, with Norway at $1.8 million and Sweden in first place with expected recovery costs for a business suffering a breach of $3 million. Oil & Gas is the industry sector having to spend the most on recovery efforts to the tune of $2.3 million. The estimated loss in revenue in percentage terms is up year on year in the UK – 12.9 per cent, up from 9.7 per cent in 2018, and in line with the global average of 12.7 per cent. Integration of new technologies The execution of cybersecurity strategies must improve or business risk will escalate for the organisations concerned"Commenting on the 2019 findings, Azeem Aleem, VP Consulting, NTT Security, says: “The Risk:Value report is an interesting barometer based on responses from those sitting outside of the IT function – and is often very revealing. What’s clear is that the world around them is changing, and changing fast, with the introduction of new regulations, integration of new technologies and fast-paced digital transformation projects changing the way we work. "What’s concerning though is that organizations seem to have come to a standstill in their journey to cybersecurity best practice – and it’s particularly worrying to see UK businesses falling behind in some critical areas like incident response planning. “Decision makers clearly see security as an enabler; something that can help the business and society in general. But while awareness of cyber risks is high, organizations still lack the ability, or perhaps the will, to manage them effectively. The execution of cybersecurity strategies must improve or business risk will escalate for the organizations concerned.”
ExtraHop announces ExtraHop® Reveal(x) Cloud™, a Software-as-a-Service (SaaS)-based network detection and response (NDR) solution for the cloud-first hybrid enterprise. Reveal(x) Cloud provides deep and continuous visibility, enabling Security Operations (SecOps) teams to analyze every transaction, detect threats, and respond to attacks to gain control over their hybrid attack surface and protect their investment in the cloud. While the cloud has proven to be a force multiplier for DevOps and IT Ops, for SecOps teams already struggling under the burden of a sprawling attack surface and a shortage of skilled analysts, adopting cloud platforms can be a vulnerability. With SecOps taking the blame for stalled migration efforts, enterprises are recognizing the need to take a cloud-first approach to securing elastic workloads rather than trying to retrofit old practices to new technology design patterns. Investigate complex threats Without native network visibility in the cloud, enterprises have been limited to log- or agent-centric tools Without native network visibility in the cloud, enterprises have been limited to log- or agent-centric tools, making it difficult to detect and investigate complex threats in a timely manner due to lack of continuous visibility across all environments. Reveal(x) Cloud is a SaaS-based solution that provides security teams with a zero-infrastructure service for AWS that deploys quickly, delivers immediate asset discovery, and offers threat detection, investigation, and response. The solution takes advantage of new enterprise features introduced by AWS during AWS re:Inforce 2019, including Amazon Virtual Private Cloud (Amazon VPC) traffic mirroring that supports passive observation of network traffic from cloud workloads, and private network peering that allows for the secure transmission of data between AWS accounts. It also connects natively with AWS data sources, such as Amazon CloudWatch, AWS CloudTrail, and Amazon VPC flow logs. Purpose-Built solution “Today, security operations teams often rely on tools and data sources like logs that don’t provide a complete picture,” said Dave Brown, Vice President, EC2 Compute and Networking Services, Amazon Web Services, Inc. “With the introduction of Amazon VPC traffic mirroring, we’re allowing customers to extract traffic of interest from any workload in an Amazon VPC and send it to the right tools to detect and respond faster to attacks often missed by traditional log- and agent-centric tools. With Reveal(x) Cloud, ExtraHop is delivering a purpose-built solution designed to enable AWS customers to take full advantage of network traffic for better cloud visibility, detection, and response.” Reveal(x) Cloud offers a host of features designed to help SecOps teams support the shared responsibility model, protect cloud workloads by ensuring compliance, and deliver security across the hybrid attack surface. Track rogue instances Automatic Discovery and Classification: Up-to-the-minute visibility and classification across all cloud workloads allows SecOps teams to track rogue instances, prioritize investigations by risk score, and correlate malicious activity and asset criticality to focus on the highest-risk threats. Application Layer Decoding: Full support for AWS services, such as Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Service (Amazon S3), and AWS Elastic Load Balancing means visibility into behavior, not just activity, while machine learning at the application layer provides immediate detection of exfiltration activity. Encrypted Payload Visibility: Reveal(x) Cloud decrypts SSL/TLS-encrypted traffic at line rate, including cipher suites supporting perfect forward secrecy, providing complete visibility into all communications, including encrypted malicious traffic. Rich Integrations: AWS CloudTrail events enrich network-based threat detection with on-box activity (disabled logging, suspicious processes, suspect file execution), while connection with Amazon CloudWatch allows granular tracking of privilege manipulation. Customers can also leverage integrations with orchestration platforms, such as Phantom, ServiceNow, and Palo Alto Networks, to automate response workflows. Complex attack surface It's time to stop retrofitting old models onto the new reality and start building cloud-first security operations" “The modern hybrid enterprise has created an expansive and complex attack surface that cannot be managed by traditional security tools or architectures," said Jesse Rothstein, CTO and co-founder, ExtraHop. "It's time to stop retrofitting old models onto the new reality and start building cloud-first security operations. With Reveal(x) Cloud and Amazon VPC traffic mirroring, SecOps teams finally have inside-the-perimeter visibility and control over their hybrid attack surface.” “With Amazon VPC traffic mirroring in Reveal(x) Cloud, ExtraHop is further reducing the barriers to cloud adoption, by giving enterprises the same level of insight they’ve always had into their on-premises traffic,” said Mike Sheward, Senior Director, Information Security, Accolade. Native security features “Visibility has always been key in security, combine Reveal(x) with the native security features you find in AWS, and you’re going to have more actionable visibility than ever. Cloud providers continue to work with security vendors and with enterprise customers to provide functionality and integrations that make it easier, more efficient, and more secure to build presence in the cloud,” said Fernando Montenegro, Principal Analyst, 451 Research. “Amazon VPC traffic mirroring is just the latest example. ExtraHop’s Reveal(x) Cloud fits within this trend, as it allows customers to use traffic monitoring to achieve better network visibility, detection and response, and to do that as a service. This is likely to assist SecOps teams making the transition to support cloud deployments. At ePlus, we believe the right technology transforms IT from a cost center to a business enabler,” said Justin Mescher, Vice President of Cloud and Data Center Solutions, ePlus. Evolving business models Pervasive enterprise digital transformation efforts are dramatically expanding the attack surface" “We’re building Reveal(x) Cloud into our CyberSecurity and Cloud practices to allow us to act quickly and accurately to improve our customers’ cloud readiness and security posture. Pervasive enterprise digital transformation efforts are dramatically expanding the attack surface, but many organizations are failing to transform their cybersecurity approaches to keep pace, continuing to use the same cybersecurity methods they have always used while attempting to support continuously evolving business models,” said Joe Vadakkan, Global Cloud Security Leader, Optiv. “Combining industry-leading technologies such as ExtraHop’s Reveal(x) with Optiv’s end-to-end services, enables us to provide clients with an approach to cybersecurity that is aligned to new business models and centered on client-focused outcomes. We believe that ExtraHop Reveal(x) Cloud will deliver great value to cloud workloads by providing the necessary visibility to more efficiently detect and respond to incidents.”
With the rising number of active shooter events in the United States, Johnson Controls has released the new Detect360 Active Shooter Response (ASR) system. The system combines reliable gunshot detection with industry-leading notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the threat up to 60 percent faster. Detect360 ASR system “During active shooter incidents, witness communication with law enforcement is often confusing and erratic, leading to longer incident duration,” said Thomas Connell, senior manager, Life Safety, Johnson Controls. “With the ever-increasing threat of active shooter events, having a system that provides early and accurate gunshot detection combined with clear, precise communication is now a necessary part of a life safety strategy for any building.” Detect360 Active Shooter Response uses acoustic sensors with multiple microphones to detect the sound of gunfire Detect360 ASR gives first responders information as it develops at the scene, including shot location, number of shots, location of the shooter in near real-time and the ability to remotely monitor the situation through integrated security systems. It also collects forensic information that can later be used by law enforcement. The system supports multiple integration options, including video feeds from existing CCTV and intrusion systems, mass notification systems, access control systems and panic button/manual initiation systems. Acoustic sensors with multiple microphones Detect360 Active Shooter Response uses acoustic sensors with multiple microphones to detect the sound of gunfire. Advanced algorithms then analyze the acoustic signature to confirm the sound was produced by a gun. Using information from the sensor closest to the gunshot, the system displays the location of the shooter on a map-based graphical user interface (GUI), which can also display audio and video of the incident. Detect360 ASR provides building occupants with safety and evacuation instructions while automatically communicating with emergency services and mass notification systems, prompting a quick response by law enforcement. While no technology or planning can eliminate the possibility of active shooter events, Detect360 Active Shooter Response can help shorten the duration and lessen the impact of the event.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
The healthcare sector is a crucial part of a functioning society as it provides life-saving care and reassurance to the population. A key part of ensuring the professionals in this industry have the best work environment is the ongoing security of the facilities. Overcoming environmental challenges Hospitals are challenging environments for security integrators. There is little room for mistakes because staff, patients and assets cannot be compromised. Medical centers and their facilities can be vast complexes and security teams must be confident in their ability to identify and nullify threats as soon as possible. Chubb provided Queensland Children’s Hospital's security team with a simple and easy-to-use tool Chubb Fire & Security offers a range of intelligent video and access control systems to solve these challenges. The Queensland Children’s Hospital in Australia, formerly named Lady Cilento Children’s Hospital, is the major specialist children’s hospital for families living in Queensland and Northern New South Wales. The facility not only provides care to the local families but also the state’s sickest and most critically injured children who need highly specialized care. This state-of-the-art hospital, coupled with a leading academic and research facility and the high calibre staff, provides a platform to continue to develop as a leader in pediatric health care, education and research. comprehensive security solution Chubb developed a solution for Queensland Children’s Hospital that included access control, video management, communications and asset tracking. By creating a common infrastructure for all security systems managed through a comprehensive user interface, Chubb provided the hospital’s security team with a simple and easy-to-use tool that enables them to resolve situations as they happen and action events automatically on command. Chubb also developed a 3D model of the building that allows the security team to respond quickly to a wide variety of events. The protection of patients and staff is naturally a hospital's number one priorityAlso crucial to the implementation of security systems in a hospital is minimal disruption to its everyday operations. Professionals in hospitals are working 24/7 so there is little time when it comes to disabling security systems for maintenance or repairs. Continued maintenance and upgrades are vital elements to Chubb’s work and key to this is a great deal of collaboration with clinical and operational stakeholders. Securing mission-Critical environment Hospital facilities are not always state-of-the-art and often face the slow upgrade process that a limited budget imparts. However, through the audit and update of security systems, steps can be taken to ensure continued operations without external disruption. The protection of patients and staff is naturally a hospital's number one priority and Chubb shares the same commitment to making sure the environment is safe and secure. Carrying out a technically demanding project in a large, mission-critical environment like a hospital takes strong teamwork, including expert strategic partners, and collaboration between stakeholders.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilized in the education arena. Historically, video has been used as a forensic tool in the education market, providing critical information about an incident after the fact. But that generalization is changing. Today, networking enables video images to be shared throughout a school system, traveling over existing networks, empowering a more centralized security management structure, and making video more valuable. In particular, higher education institutions are more likely to view live video, given the larger campuses, greater number of buildings, and more public areas where staff and students congregate. Challenges for securing a school environment Panoramic cameras are one tool to address challenges, as a single 360-degree camera can replace between 4 and 5 PTZ camerasMultiple challenges in the education market for security goods and services (from a video perspective) include wide open spaces that make securing schools with video surveillance cameras difficult since the vast amount of coverage required can be cost-prohibitive. Second, state and federal regulations must be taken into account and balanced with the need to protect student privacy. Finally, schools and colleges face dwindling budgets, which means security solutions must deliver more coverage and functionality, while also being cost-effective to deploy. Panoramic cameras are one tool to address these challenges, as a single 360-degree camera can replace between four and five traditional pan-tilt-zoom cameras, resulting in fewer cameras and more coverage – all at a lower cost for hardware and licensing. Data capture form to appear here! Intelligent cameras with video analytics Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search The goal in a potentially dangerous situation is to speed up response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly. Video cameras with low-Light capability There are video cameras available with extreme low-light capability to see in near-dark or complete darknessIt’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Facing above-average student incident rates and student disciplinary concerns at some schools, a school system in the United States sought to upgrade its video surveillance system to allow better local and remote monitoring in important areas. Avigilon high-definition cameras with self-learning video analytics and access control solutions were installed in 101 schools, and ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search. A deep learning artificial intelligence search engine can sort through hours of footage and allow operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently.
Workforce management systems gather and analyze information and anomalies from security officers in the field. The information ranges from direct observations entered via mobile or desktop apps by officers on duty to reports from cleaning staff, the maintenance department, and CCTV operators. Taken together, the information yields business intelligence and data analytics at no additional cost. Trackforce is a provider of workforce management solutions specific to the security industry and its unique operational requirements. From tracking guard tours to managing incidents and officers remotely, the platform improves officer accountability, optimizes operations, and delivers actionable insights via a live dashboard to reduce vulnerabilities and enhance efficiencies. The platform is customizable and scales to each client’s business. Platform to control and identify risks “Corporate security teams deal with issues related to operational risk, facility security levels and design basis threats, and must contend with manmade, naturally occurring, and technological events,” says Guirchaume Abitbol, CEO and founder of Trackforce. “We provide them a platform that enables them to control and identify risks, deliver their service, and maintain security best practices.” Trackforce uses live monitoring to ensure quality control and to upgrade situational awareness, delivers real-time incident notifications Trackforce serves large security guard companies and global organizations in diverse vertical market sectors and is expanding in facilities management. More than 200,000 professionals at over 20,000 customer sites in 45 countries use the platform. Trackforce uses live monitoring to ensure quality control and to upgrade situational awareness, delivers real-time incident notifications, and generates data-rich analysis and key performance indicators (KPIs) that enhance monitoring and reporting. Reduces corporate risk Better management of corporate risk is a benefit of security workforce management. The Trackforce platform reduces corporate risk in four areas by: Managing multiple sites, located anywhere, with various threat levels, cultural differences, operating procedures, and regulations. Supporting a security budget and investment in new solutions by providing data necessary for budget approval. Keeping management informed about outsourced security services partners with relevant data, analytics, and transparency. Providing real-time data on risks and incidents so operations can be quickly optimized to ensure top-level security services. Identifying potential threats and risks The platform rapidly and accurately collates data (implied data or trends) based on user-selected parameters. Data- and intelligence-rich reports become available to managers from any location via a dashboard. All necessary information is displayed on a single screen in an uncluttered format.The ability to analyze current and historical data in real time empowers security managers to track patterns Reports can be downloaded and shared with stakeholders. The ability to analyze current and historical data in real time empowers security managers to track patterns, identify potential threats and risks, and implement preventative actions and strategies. Using data intelligence as benchmark Security teams will use data intelligence as a performance benchmark for resources required to accomplish site goals. They will also use this information to pilot and rationalize resource needs for impending contracts based on historical, descriptive (what happened), diagnostic (why did it happen), predictive (what will happen) and/or prescriptive data (how can we can make it happen). “For example, when a large company incurs incremental computer equipment theft, a supervisor can use the platform to review historical reports and identify patterns and anomalies,” says Abitbol. “The supervisor could then identify and proactively implement targeted strategies to mitigate the theft, such as modifying security routes, increasing patrols, or adjusting asset management protocols.” Enhanced control of security resources The Trackforce platform has been designed to serve clients at multiple regional and national locations and is available in many languages. The Command Center allows a security supervisor based at a central location to easily manage officers on multiple sites. The Command Center provides greater oversight and enhanced control of security resources The Command Center provides greater oversight and enhanced control of security resources. Management can compare locations and evaluate security with a customizable reporting dashboard for each site. The uniform platform uses the same reporting templates and processes for each secured and managed location, thus ensuring consistency and accurate benchmarking. Trackforce’s workforce management solution has low cost and presents a low barrier to entry, with systems that can be implemented in a short time.
Artificial intelligence (AI) is expanding the capabilities of license plate readers and vehicle identification systems. Within a smart/safe city scenario, automatic license plate reader solutions are used to help analyze real-time video streams for site surveillance, inspection and public safety, and to offer actional information through a network of connected camera systems. Outside of law enforcement, this can include other public safety initiatives such as traffic tolls, car counting, and parking security. Vehicle recognition systems Rekor Systems is a provider of vehicle recognition systems in more than 60 countries Using AI to enable video cameras, Rekor Systems is a provider of vehicle recognition systems in more than 60 countries. Applications include security and surveillance, public safety, electronic toll collection, brand loyalty, parking operations, banking and insurance, logistics, and traffic management. AI allows Rekor’s products to recognize and read license plates, while also providing information about each vehicle, including color, make, year, and model. Rekor’s products are powered by OpenALPR software, an AI-based solution that enables any IP (internet protocol) surveillance camera to scan license plates and provide vehicle data including tag number, make, model, and color in real time with 99% accuracy, according to the company. Rekor’s products are powered by OpenALPR software Integrated solutions “Rekor's software started as an open source project, and we have done our best to keep the commercial software as open as possible,” says Rod Hillman, Chief Operating Officer, Rekor Systems. “One of the challenges we see with others in our space is a tendency to ‘close off’ and ‘silo’ their solutions. Our goal is to make it as simple as possible to deploy, integrate, and ultimately use.” Rekor has numerous application programming interfaces (APIs) and ways the solution can be integrated into partners' solutions with a software development kit (SDK). Rekor solutions can be purchased directly or through a worldwide partner network of integrators, wholesalers, and within integrated solutions such as Nokia's smart city platform. Electronic toll collection Rekor’s solutions have viable applications within multiple markets While many systems are hardware-based, Rekor’s software-as-a-solution offering can turn an IP camera into an automatic license plate reader. Rekor’s solutions have viable applications within multiple markets, including law enforcement, security and surveillance, electronic toll collection, parking operations, banking and insurance, logistics, traffic management, and customer experience. “Rekor offers a cost-effective alternative to traditional LPR systems with a much higher accuracy rate at 99% allowing more cameras to be present and active at any given time,” says Hillman. “Traditional LPRs need someone to go through hours of footage to find what they are looking for while Rekor’s technology will send alerts in real time, resulting in much quicker response times.” Move Over Camera mounts onto roadside worker’s vehicles to capture ‘Move Over’ violations Two-Part authentication Rekor’s products include: NUMERUS, a cloud-based solution for high-volume vehicle recognition, designed to reduce costs and increase efficiencies for the electronic toll collecting industry. Two-part authentication instantly identifies the vehicle’s make, model, color and body type along with the license plate read. Machine-learning-enabled software recognizes license plates from all 50 U.S. states, in addition to plates from more than 70 countries on six continents. Edge, an all-in-one camera and vehicle recognition system that instantly reads vehicle license plates, along with the vehicle’s make, model, color and body type. Move Over Camera, which mounts onto roadside worker’s vehicles (police, tow truck, etc.) to capture ‘Move Over’ violations. ‘Move Over’ laws state that vehicles must move over one lane and/or slow down if they cannot move over to avoid incident while roadside workers are in the shoulder lane. The camera can detect what lane vehicles are in and how fast they are moving. Violators are flagged in the system for law enforcement’s review.
Siemens Mobility and globally renowned mission critical communications (MCX or MCC) enabler, Softil have jointly announced an agreement that will see a range of next generation communications solutions come to market for use in Long Term Evolution-Railway (LTE-R) railways as well as Mission-Critical Push-To-Talk (MCPTT) metro applications like underground/tram buses, etc. Siemens Mobility adopts Softil's BEEHD client framework to bring best-of-breed mission critical communications solutions to LTE-R rail networks; solutions will also support the UIC's FRMCS strategy to build a Global Rail Traffic Management System for the entire rail industry MCX solutions The MCX solutions will support the Future Railway Mobile Communications Systems of the UIC The MCX solutions will support the Future Railway Mobile Communications Systems (FRMCS) of the International Union of Railways (UIC) to build a Global Rail Traffic Management System (GRTMS) for the entire rail industry, bringing significant economic and operational benefits and efficiencies to operators in the process. "The rail industry is at the forefront of the mission-critical communication revolution and GSM-R based systems have already been replaced by LTE-R solutions in Asia Pacific (APAC) and the trend is expected to widen across other markets in 2019/20," says Pierre Hagendorf, Softil's CEO. "With Softil's BEEHD client framework at the heart of Siemens Mobility's next generation LTE-R offerings, the rail industry will have a range of supremely reliable solutions packed with rich communication features." The new radio system for the Railway industry has to guarantee the interoperability with GSM-R while delivering on these three main areas: Critical communications - Secure voice communication between driver and signaller, provision for emergency and group calls, real-time video imagery for any occurring incidents and the intelligent bearer for European Train Control System (ETCS) and Automatic Train Operation (ATO) operation; Performance communications - Track condition monitoring, Connected Driver Advisory System (C-DAS), on-train telemetry, maintenance of non-critical infrastructure, non-critical real-time video, wireless communication for on-train-staff; Business communications - passenger information system, passenger entertainment and passenger communication connections. Siemens Mobility will enable existing GSM-R users to develop a migration plan that will enable all of the above. BEEHD client technology LTE-R is the foundation for the railway variant of the 3GPP MCC over LTE/5G (MCPTT) standard "The rail industry is facing unprecedented challenges in handling increasing numbers of passengers and freight traffic loads," says Russell Clarke, General Manager, Mobile Communications at Siemens Mobility. "After careful analysis of market options, Siemens Mobility chose Softil's BEEHD client technology as the outstanding Software Development Kit (SDK) for our developers to build best-of-breed LTE-R communications solutions for the rail industry in the shortest timeframe." LTE-R is the foundation for the railway variant of the 3GPP MCC over LTE/5G (MCPTT) standard. What sets the LTE-R technology apart from the currently used GSM-R is that it brings the full power of broadband networks including voice, video, text, images, location and more and not just simple voice. LTE-R technology The Softil BEEHD framework is LTE-R compatible and will enable Siemens Mobility's solutions to deliver stable voice as well as data communications on trains running at speeds in excess of 400km/h. LTE-R technology makes possible live tracking of a train and transmitting railroad information to engine drivers, and also enables multimedia-based group calling and SMS services on top of voice call services. Additionally, real-time group/individual communication is made possible between train engineers and control centers. BEEHD IP communications solution is a cross-platform framework designed for system integrators BEEHD IP communications Softil's BEEHD IP communications solution is a cross-platform framework (SDK) designed for chipset vendors, device manufacturers, system integrators, application developers and service providers looking to accelerate the development of IP-based voice and video over LTE (VoLTE, ViLTE and MCPTT/MCX) solutions. The quality of the award-winning SDK is unmatched within the communications industry and BEEHD was proven to satisfy all required key performance indicators (KPIs) set by the 3GPP MCX standard, as well as often even stricter KPIs required by global carriers and service providers.
Upon hearing Pablo Picasso’s famous praise of art’s ability to clear ‘the dust of everyday life’, one’s thoughts could easily turn to one of Arizona’s newest landmarks, the Mesa Arts Center. Set proudly amidst the dust of the Sonoran Desert, the Mesa Arts Center is a striking complex of buildings, art installations, and public throughways, offering a rich blend of visual impressions in glass, water, stone, and metal, with splashes of vibrant color and metallic reflection. At more than 21,000 sq. feet, the award-winning $95 million campus is the largest and most comprehensive performing, visual and educational arts complex in Arizona, serving as a gathering point for the citizens of Mesa and region alike, seeking to enjoy the indoor and outdoor spaces, public events, classes, and art exhibitions. Ensuring safe, family friendly environment Ensuring a safe, family friendly environment is essential to fulfilling the role the Center plays as a gathering pointThe presence of an adjacent light rail station and hosting of multiple festivals throughout the year further increase traffic to, from, and through the open planned site at various hours of the day, and on weekends and even holidays. The heart of the Mesa Arts Center complex is a grand promenade that knits together all of its pieces, while providing places for group gatherings, performances, and quiet reflection, comfort and relaxation. Ensuring a safe, family friendly environment is essential to fulfilling the role the Center plays as a gathering point for all walks of life. In addition to welcoming visitors to the Center, the open configuration of the complex invites commuters coming off the nearby light rail line to stroll through on their way to and from the station, and draw loiterers, would-be vandals, and itinerant populations (attracted to the semi-secluded spaces created by outdoor art installations and the complex’s fountains and water elements). Surveillance system for crime prevention Particularly outside of traditional hours of operation, such factors can increase the risk of nuisance crimes, vandalism, and petty theft, and potentially more serious crimes against visitors and staff, without a vigilant and comprehensive security and surveillance operation. Additionally, complex spaces, varied materials, and water elements increase risk for incident and accident without proper prevention and/or prompt response. A technical solution with proven power, performance, and reliability was paramount to ensure protection of property While customary approaches to similar venues have typically relied heavily on a combination of CCTV and human security guards, the size and complexity of the Mesa Arts Center campus makes a traditional manned guarding solution, even when supported by a typical surveillance technology, both cost prohibitive and potentially inadequate. Protection of property and campus safety The Mesa Arts Center is an architectural showpiece and regional destination, requiring comprehensive surveillance at all hours, every day of the year, under highly variable conditions. A comprehensive technical solution with proven power, performance, and reliability was paramount to ensure protection of property and the safety of everyone on campus. The City of Mesa, who operates the Center, in partnership with Scottsdale’s Surveillance Acquisition Response Center (SARC) and IDIS technology, provided a mix of surveillance cameras and network video recorders (NVRs) able to meet the varied requirements of a campus housing multiple art galleries, studios, performance spaces, walkways and cut-throughs, and outdoor gathering spaces; and support SARC’s innovative approach to virtual guarding, which incorporates military, police, and intelligence best practices and personnel to enhance traditional remote monitoring models and outcomes. Using Direct IP NVRs and cameras SARC monitors use IDIS’s powerful, modular, and feature-rich VMS, IDIS Solution SuiteThe City of Mesa’s previous successes implementing SARC and IDIS technology at the Mesa Grande Cultural Park made the integration of technology and monitoring selected for the Mesa Arts Center a natural fit. Featuring multiple IDIS DirectIP [model number] network video recorders (NVRs), and IDIS Direct IP [model number] cameras, with [feature set], at the heart of a comprehensive security posture, SARC monitors use IDIS’s powerful, modular, and feature-rich VMS, IDIS Solution Suite, and their unique military, law enforcement, and intelligence-derived protocols and best practices to support on-site personnel and cover the campus comprehensively at night and during other off-hours. Additionally, the IDIS solution also seamlessly integrates with, recording and managing footage from other camera installations, demonstrating the IDIS dedication to eliminating the common frustrations and complexities of security systems. SARC’s virtual guard protection The implementation of SARC’s virtual guard protection and protocols to support on-site personnel, and the highly visible, but seamlessly integrated, presence of IDIS surveillance cameras, as part of a total IDIS solution, have contributed to the Mesa Arts Center’s reputation as one of the region’s most welcoming and inviting community spaces among the area’s art lovers, families, and neighborhood’s workers (who regularly use the space without fear or discomfort as a gathering place for lunch or pathway to and from the local light rail station). The integrated on-site and virtual guarding professionals identify, deter, and document threats to the campus 24/7, the integrated on-site and virtual guarding professionals identify, deter, and document threats to the campus and those within it, using innovative surveillance application bringing together IDIS’s highest quality remote viewing and VMS offerings and SARC’s remote ‘voice down’ virtual guarding protocol, which informs those under surveillance, in real time, that they are being watched and should leave the property immediately or face consequences. Keeping people and property safe The successful implementation of this solution has placed the City of Mesa and Mesa Arts Center management at the forefront of innovation in keeping the people, places, and property under their protection safe and secure, and marked them as leaders in responsible stewardship of taxpayer, grant, and donor dollars, through the implementation of a system that provides more comprehensive coverage, measurably better outcomes, and enhanced visitor experiences 24/7, year-round for a fraction of the cost of previous manned guarding solutions.
AlertEnterprise Inc., the physical-logical security convergence software company, announced that its Airport Guardian software has been selected by Los Angeles World Airports (LAWA) as the new Identity Management and Credentialing System (IMCS) at Los Angeles International Airport (LAX). Airport Guardian cyber-physical security software will be deployed to deliver a new level of converged security, identity and access intelligence, and enhanced customer experience across IT, physical and OT systems. “At LAWA, we work hard to provide a high level of safety, security, and service for our customers, communities, and stakeholders,” said Aura Moore, Deputy Executive Director - CIO of LAX. “We’ve selected AlertEnterprise software as our new Identity Management and Credentialing System for its integrated, configurable, and futureproof design. This new system will enable us to improve security, enhance customer experience, minimize risk, and proactively enforce compliance for many years to come.” Ensuring real-Time compliance With Airport Guardian software, LAX will be able to streamline and automate their entire badge lifecycle processWith Airport Guardian software, LAX will be able to streamline and automate their entire badge lifecycle process, from application to badge printing, and access provisioning. By automating core processes with role-based workflow and active policy enforcement, the airport can ensure compliance in real-time, which helps to eliminate costly auditing efforts. The deployment of Airport Guardian software will include a secure, web-based portal that will enable LAX personnel to manage employees, vendors, and visitors across their enterprise landscape. Applicants and Authorized Signatories will be able to start, save, and submit applications, including requesting access to critical areas that require additional approval. Streamline application processes With built-in schedule management, Airport Guardian software will help the LAWA Badge Office streamline application processes and enhance customer experience, including reduced wait times, and application status visibility to applicants and authorized signatories. The aviation content pack features DACS, STA, CHRC, Rap Back, and LMS integrations as part of the Airport Guardian software Airport Guardian software includes an aviation specific content pack comprised of Tenant Management, Incident Management, Asset Governance, built-in airport compliance, industry reporting, badge auditing, and process automation best practices. The aviation content pack features DACS, STA, CHRC, Rap Back, and Learning Management Systems (LMS) integrations as part of the Airport Guardian software. Airport Security Awareness training The Airport Guardian software’s powerful LMS integration feature is designed to assist LAX administration teams in tracking and enforcing mandatory training for personnel including active shooter, Airside Vehicle Operating Permit, and Airport Security Awareness training. “LAX is one of world’s premier and busiest airports, and we are thrilled that they have selected AlertEnterprise as part of their security modernization and digital transformation,” said Ruby Deol, AlertEnterprise Chief Operating Officer. “Our game-changing approach of converged cyber-physical security is helping to make airports and critical infrastructure around the world more secure while creating a positive workforce and customer experience.”
St Peter’s School, Cambridge, is an independent, co-educational secondary school in New Zealand. With over 1,000 students, 450 students living on site, and approximately 350 staff, St Peter’s is one of the largest boarding schools in the country. Around the clock site security and facilities management is imperative to ensure safety and deliver optimum operational efficiency. St Peter’s originally contacted Gallagher more than ten years ago for main gate security and access control for their gymnasium to assist with facility hire. “We needed a system that was modular, discreet, scalable, SQL based, and that allowed us to add and retrieve information via OPC,” said Gareth Pryce, ICT Manager at St Peter’s School. Since installation, the scale of the Gallagher system has grown considerably. St Peter’s has now integrated the Gallagher Security solution as their building management system on an impressive scale and the return on this investment has been significant. Central management software solution In buildings where we have purely installed the Gallagher system and nothing else, we are achieving a 30% energy saving"Gallagher’s central management software solution Command Centre is utilized to control all aspects of facilities management at St Peter’s School. The Gallagher solution monitors and controls heating, lighting, air conditioning, PIR’s, windows, read status and doors open/closed within all St Peter’s rooms. The installation of smart electricity meters, which can identify and quantify savings, is being utilized to measure and report energy savings across the site. “In buildings where we have purely installed the Gallagher system and nothing else, we are achieving a 30% energy saving,” said Gareth. “Return on investment is being seen within 6 to 24 months of a complete solution being installed, dependent upon the type of heating system and the staff within the building.” As a direct result of the Gallagher installation, an additional saving for the school on plant investment has been identified. Specifically, this can be seen in an increase in the life span of air conditioning units due to their reduced usage and the removal of time clocks on site due to the system’s ability to control all individual systems. Monitoring swimming pool temperature Command Centre helps to automatically facilitate health and safety protocols within the swimming pool complexSt Peter’s School’s continued commitment to fully utilizing the capabilities of the Gallagher system is evident in their most recent additions of an indoor swimming pool facility and Junior School building. The Gallagher system for the indoor pool has been configured to monitor the pool temperature, humidity, chlorine and wind direction. Business rules have been added to deliver appropriate responses, including the determination of whether to engage extractor fans, increase water filtration, or open the windows for passive ventilation. With complete control over all systems, Command Centre helps to automatically facilitate health and safety protocols within the swimming pool complex. An example of this can be seen in the way in which chlorination is monitored. Should the system detect a high level of chlorine in the water or atmosphere, windows are automatically opened for ventilation, the pump speed is increased to help restore chlorine levels in the water, and the access control system denies entry to the pool area until the monitors identify that the chlorine level has reduced. Integrating database with Command Centre St Peter’s has integrated their student database with Gallagher’s Command Centre software management platformSt Peter’s has integrated their student database – Synergetic – with Gallagher’s Command Centre software management platform, providing a single source of data and one central point of reference. This interface allows St Peter’s to create, update and remove individuals and their access groups within Synergetic and this information automatically updates the access control system. This ensures that any updates made in Synergetic are reflected in real-time in the Gallagher system, proving invaluable in terms of time efficiency, administration and reducing the margin for error. St Peter’s has an impeccable reputation for safety and security. Through the Command Centre platform, the school has managed to implement a highly efficient one-touch system to deliver enhanced site security for Assistance, Critical Incidents, and Full Site Lockdown. Contacting campus security team Utilizing any computer on site, both staff and students are able to quickly and easily contact the campus security team for assistance including an escort to their car after hours. Controlled by Command Centre, an Assistance request sends an SMS and email to security personnel identifying through the access control system the name and exact location of the staff member or student. Selected personnel on site have system permissions to initiate a full site lockdown across the campus Again, utilizing any computer on the campus, a Critical Incident can be registered in a single, simple, action. The system then alerts the Critical Incident team (including registered nurses, and staff trained in Critical Incident Stress Management) via SMS and email, providing information on the location where the incident has occurred. Initiating full site lockdown Selected personnel on site have system permissions to initiate a full site lockdown across the campus. This action can be achieved via any computer on site. Command Centre also sends an immediate notification to local police that the school is in lockdown. Simultaneously, all buildings across the site automatically respond to the lockdown by closing windows, locking doors, and initiating air conditioning to maintain the temperature. St Peter’s is committed to further reducing their carbon footprint through reducing energy use. During 2015, the school will invest even further control in their Gallagher system by installing heat recovery units which will eliminate the need for air conditioning at certain times of the year. “It’s about seamless system management,” said Gareth, “because of that control, we’ve experienced very real energy and cost savings.”
Village Roadshow Theme Parks (VRTP), Australia’s largest theme park operator, provides some of the most thrilling entertainment rides and slides available anywhere in the world. With its headquarters located on the Gold Coast, Australia’s holiday playground, it operates: Warner Bros. Movie World Wet ‘n’ Wild Water World Australian Outback Spectacular Sea World Paradise Country Sea World Resort and Water Park Over 5 million visitors per year, from families to thrill seekers, flock to this world of fun with action-packed shows and rides, marine and animal attractions, and adventure across seven large scale properties. Monitoring from Command Centre This enables monitoring from the Command Centre in the Gold Coast over all seven sites streamlining operationsWhen it comes to security, VRTP have always chosen access control and perimeter solutions supplier Gallagher as their long-term partner. A relationship that began in the mid-1980s, has grown to meet the expanding demands of each park. VRTP recently opened a new Wet ‘n’ Wild in Sydney, New South Wales, in December 2013. Two new parks based on Sea World and Wet ‘n’ Wild are currently under construction in Hainan, China. Wet ‘n’ Wild Sydney, opened to the public in December 2013, demonstrates Gallagher’s ability to extend security coverage across States, with its scalable and flexible solution. This enables monitoring from the main Command Centre in the Gold Coast over all seven sites streamlining operations. In the event of power loss from the main controller in the Gold Coast, Sydney sites have their own server backups to continue operations as normal. RFID wrists bands for staff access The model that VRTP and Gallagher have designed enables various operator levels to have separate divisions for creating cardholders. Different operator levels have authorized access to develop card holders for their sections. There are approximately 3,000 cardholders at all parks and growing. Wet ‘n’ Wild Sydney is the first Village Roadshow park to deploy staff RFID wrists bands that give them access to areas restricted by the public. Command Centre technology has given VRTP total site security across all parks VRTP’s guard workforce has been complimented by the Gallagher system working seamlessly together. Command Centre technology has also given VRTP total site security across all parks; within a year saving park operations approximately 20 hours a day in labor costs. Better visibility of services Gallagher delivers building automation and control through a high-level interface that provides strong communication between Gallagher Command Centre and the theme parks’ building systems. This has enabled integration to seven main panels and sub panels across the group giving security staff better visibility of all services, at all times. Efficiencies in alarm generation have improved with automatic escalation to the necessary staff member in a timely manner. Key industry challenges Health, safety, risk mitigation, and public relations Preserving assets and ambience Using integration to save costs and improve security efficiencies Gallagher technology used Gallagher Command Centre Gallagher T-Series Access Control Readers Gallagher high level video integration – more than 250 cameras Protection of marine animals Gallagher’s integrated security solution provides continuous surveillance across the parksAnimal safety and care is critical. Sea World is Australia’s premier marine park, with over 25 hectares (55 acres) of land. With a range of dolphins, seals, sharks, polar bears, and other marine life – their safety, and the reputation of Sea World, must be preserved. This also includes protecting Australian Outback Spectacular and Paradise Country animals and wildlife. Alongside video and alarm integration, Gallagher manages all primary entry points into parks. Once inside the parks, it manages restricted zones which include secured enclosures, particularly important for Sea World. Gallagher’s integrated security solution provides continuous surveillance across the parks, capturing any incidents which may occur on site. This is particularly important for Wet ‘n’ Wild water park which faces increased risk due to the nature of the environment. Wet ‘n’ Wild has been one of the group’s most successful theme parks with a growing attendance of approximately 1 million visitors every year. Investing in robust integrated system The VRTP security team has the ability to monitor and control from one locationVRTP are continually looking for ways to improve park operations, infrastructure, and processes to meet the needs of visitors and staff. With security taking a precedence in the last five years, VRTP made the decision to invest in a robust integrated system that to the public eye would go unseen. Gallagher’s strong history of service and the scope of their integrated security solutions gave VRTP confidence in selecting Gallagher for their upcoming internal infrastructure developments. With 250 cameras located discretely around all seven of VRTP’s properties, integrated back to the central control platform Gallagher Command Centre, the VRTP security team has the ability to monitor and control from one location. Intruder alarm management solution The integrated system plays an important role in securing the site overnight from would-be intrudersIn the Village Roadshow Studios, much importance is placed on securing assets, and protecting the privacy of high-profile guests. The Studios have attracted projects with a combined budget of around 2.5 billion dollars. There are eight large sound stages covering 10,844m2 (116,727 sq. ft), confirming it as one of the largest studios in the Southern Hemisphere. With intellectual property and assets that must be protected, the Gallagher 24-hour camera integration and intruder alarm management solution play a key role in protecting staff, visitors, and monitoring employee cash handling and service. The integrated system also plays an important role in securing the site overnight from would-be intruders. Duress alarm monitoring is a central integration used by security staff with 70 alarm zones across all parks. In the event of an emergency, a wireless help-call system can identify back to the Command Centre the name, description, and location via a detailed site plan for each park. This is a vital security element for protecting captive mammals and animals, and IT infrastructure.
The high-performance Predator Ultra HD PTZ video surveillance camera from UK CCTV manufacturer, 360 Vision Technology, has entered service at the National Coastwatch Institution’s (NCI) Felixstowe lookout station, to help protect lives along the coastline of the River Deben estuary. Felixstowe Coastwatch is a charity funded, volunteer-based organization with over 50 highly trained volunteers available to man lookout shifts. It’s also part of the NCI, a voluntary organization established in 1994 to restore a visual watch along UK shores, after many small Coastguard stations had been closed. Maritime navigation Felixstowe Coastwatch took over operations at the Lookout in April 1996 Under Felixstowe Coastwatch’s territory is the Deben estuary, whose treacherous shifting shingle banks and bar can present quite a challenge for maritime navigation, as Ian Clarke of Felixstowe Coastwatch explains: “Half of all call outs from the RNLI Harwich Lifeboat Station during 2016/17 were to attend incidents in this area, so it was clear that additional observation of the area would be beneficial and help to make it safer.” Felixstowe Coastwatch’s Lookout is built on top of Martello Tower ‘P’, one of the famous ‘Martello Towers’, built in the early 1800s as a defense against a possible invasion by Napoleon. The first lookout was originally built by HM Coastguard (replaced in 1979 by the current structure), who operated the Lookout until 1994. Felixstowe Coastwatch took over operations at the Lookout in April 1996. Experiencing CCTV cameras “Originally, the first idea to tackle the maritime issues at the River Deben estuary was to build an additional lookout tower,” says Ian. “That would have been a prohibitively costly exercise for a charity-based organization. However, after a visit to the NCI Station at Portland Bill, I was inspired by the use of CCTV there and interested to establish if video surveillance could be deployed to monitor the remote Deben estuary from our existing lookout station.” “The first task was to experience CCTV cameras in action, so we visited the Port of Felixstowe, the Felixstowe Town CCTV system and the Great Yarmouth Port Authority, where we saw the 360 Vision Predator in action. Impressed by the quality of its images, I contacted 360 Vision Technology for a demonstration, at which we were able to record video from the proposed location of the camera mast.” Comprehensive business case 360 Vision Technology had just launched their Predator equipped with a 40x optical zoom" “After the demonstration of the camera’s capability, I was able to prepare a detailed report to our trustees, setting out a comprehensive business case as to why a CCTV camera would offer the best solution to the issues we were facing at the mouth of the River Deben. I was able to use the recorded footage of the demonstration to produce a video highlighting the impressive capability of the imaging technology.” From Ian’s report, approval of the project was granted and the 360 Vision Predator Ultra HD was installed by STC Solutions Ltd, after funds were raised from council-allocated budget and fundraising events organized by Felixstowe Coastwatch volunteers. “When we placed the order, 360 Vision Technology had just launched their Predator equipped with a 40x optical zoom,” Ian continues. Wireless transmission solution “This was an important factor for us, as the entrance to the River Deben is expansive, and identifying vessels and individuals there would be greatly assisted by the optical zoom of the 360 Vision Predator camera.” With no line of sight from the camera to the lookout tower, an innovative wireless transmission solution was employed, using a belfry tower at a midway point in Felixstowe, where the signal is relayed to enable control and recording of the high definition images back at the lookout station. “Now operators can view superb live images of the River Deben, to confirm the identity, position and situation of vessels in the mouth of the river and if necessary, contact HM Coastguard if we observe any problems,” Ian explains. Seamless ONVIF integration Thanks to the broad integration capability of 360 Vision’s Predator Ultra HD, all surveillance video is archived for retrospective investigation, and controlled via a QVIS Viper NVR recorder. In addition, seamless ONVIF integration into Cambridge Pixel’s ‘RadarWatch’, a flexible client display application for radar display and target tracking, allows Felixstowe Coastwatch’s operators to set up virtual tripwire lines across dangerous areas of the river and shallow waters close to the main shipping channel. The trip alarms instantly alert operators and provide immediate verification of a vessel’s precise location Once crossed by a vessel, the trip alarms instantly alert operators and provide immediate verification of a vessel’s precise location, along with high-definition visual verification from the Predator camera. Also displayed as an overlay on screen, via the Predator Ultra camera and Cambridge Pixel technology integration, is Automatic Identification System (AIS) ship transponder information for each vessel, including a compass bearing supplied by the Predator camera’s head, which indicates which way the camera is pointing. Innovative installation “This means we can instantly identify and position any specific vessel we’re seeing with the camera,” says Ian. “We can also view the banks of the river and its beaches, to ensure that no members of the public are in danger.” Taking advantage of 360 Vision Technology’s any color and any finish design offer, the Predator Ultra camera was supplied in a Marine Grade white paint finish, and along with its powerful 40x zoom lens, is equipped with a ½” Ultra camera module to ensure maximum imaging performance, even in low-light conditions. This innovative installation has been so successful that Felixstowe Coastwatch are currently looking at other areas of the coastline where high-definition 360 Vision Predator Ultra HD cameras could assist with their daily operations, to protect the public and maritime traffic.
Round table discussion
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase the cybersecurity of physical security systems?
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
The beginning of the school year and upcoming seasonal changes remind us that demand for security systems, like almost everything else, is seasonal to some extent. Making improvements to educational facilities during the summer months – including installation of security systems – is the most obvious example of seasonal demand, but there are others. We asked this week’s Expert Panel Roundtable: Which vertical markets for security are impacted by seasonal changes in demand?