The French authorities have renewed the maintenance contract of the French Coastal Surveillance System, SPATIONAV, building on an over 20 yearlong successful collaboration between the French Navy and Airbus for safer oceans. Since 2002, Airbus develops, deploys and maintains the SPATIONAV system, under the supervision of the DGA (French General Armament Directorate) for the program direction and the SSF (Service de Soutien de la Flotte) for the sustainment, to support the French authorities gath...
Hikvision, an IoT solution provider with video as its core competency, has announced a brand-new addition to its DeepinView camera line: the Dedicated Subseries. This unprecedented new addition loads a batch of AI-powered deep learning algorithms into each unit, boasting stunning performance and cost-effective pricing. Dedicated DeepinView Cameras Over the last few years, Artificial Intelligence (AI) has been applied in many ways in security markets. As technology advances, AI chipset performa...
Everbridge Inc., the global provider in critical event management (CEM), announced that Siemens, one of the world’s producers of energy efficient technologies and #62 on the 2020 Forbes Global 2000, will adopt the Everbridge CEM Platform to help protect Siemens’ workforce and operations against critical events of all kinds, from the COVID-19 pandemic and political unrest to sudden economic changes and more. The two companies have also formed a technology alliance in which Siemens wi...
Qognify - the trusted advisor and technology solution provider for physical security and enterprise incident management - announced the launch of Cayuga R15. The new release of Qognify’s video management system (VMS) for multi-site corporate and enterprise projects focuses on enhanced usability and connectivity, improved maintainability and intelligent analytics. Help security personnel One of the main goals while developing Cayuga R15 was to help security personnel quickly identify, loc...
VPR Brands, LP, a globally renowned edge innovation and technology products company, has announced the launch of its fully automated infrared body temperature screening device, dubbed VPR Verified system. The US Food and Drug Administration (FDA) issued guidance expanding the use of tele-thermographic systems for triage use during the ongoing public health crisis owing to the COVID-19 pandemic spread. tele-thermographic systems The FDA says that tele-thermographic systems can be deployed to u...
Help is immediately on hand for businesses who are urgently seeking to safely re-open their doors following the easing of COVID-19 related restrictions. Hanwha Techwin’s license-free Occupancy Monitoring application provides retailers, places of worship and museums, as well as leisure facilities, pubs, clubs and restaurants, with highly accurate data on the number of customers on their premises at any particular time. Edge-based Occupancy Monitoring Compatible with the recently introduc...
BriefCam, the industry’s provider of Video Content Analytics and VIDEO SYNOPSIS® solutions, announced significant new capabilities to its product portfolio with v5.6.1 of its innovative and extensible video content analytics platform. The new capabilities will help to prevent the spread of COVID-19 and support the safe and responsible re-opening across the globe. Face Recognition and Appearance Similarity New features available in v5.6.1 include: Proximity Identification: For effective contact tracing and enforcing social distancing, v5.6.1 offers the ability to forensically review video to identify individuals who were in proximity to another individual for a determined duration of time, and to combine with Face Recognition and Appearance Similarity capabilities to determine if a person has been in contact with COVID-19 infected individuals. This enables users to quantify the proximity of people across time and location, compare across days and correlate with external data sources to ensure compliance with social distancing mandates. Face Mask Detection: Provides the ability to search for people with or without a face mask, as well as detect and alert on face mask violations in real-time. Occupancy Controller: Enables users to maintain building occupancy requirements by setting rules to count people as they enter and exit a premises across multiple cameras and entry and exit points. When the threshold is met, an alert can be sent to access control solutions, security staff, VMS, or any other destination. Users can understand occupancy detail over time and location through business intelligence dashboards and prove compliance. Accelerating video investigations “Our video analytics platform has greatly expanded in its ability to offer new use cases for accelerating video investigations over the last year,” said Tomer Saar, BriefCam VP, Product. “During this pandemic we are proud to be able to offer organizations and businesses the critical tools through our proximity identification, face mask detection and occupancy controller capabilities to help them reopen their organizations and places of businesses while protecting their employees and customers.” The new innovation available in BriefCam v5.6.1 complements the already powerful and robust analytic capabilities that support additional public health use cases for identifying crowding hotspots and enforcing building or space sanitization practices with a unique combination of people counting, heatmap visual layers, line crossing and real-time alerting. BriefCam v5.6.1 is to be available in June 2020. Proximity Identification with real-time alerting as well as Face Mask Detection analysis and trending capabilities is planned for August 2020.
Cyber Management Alliance, the global frontrunner in cyber crisis management and training, is delighted to announce that its highly popular course, Cyber Incident Planning & Response (CIPR) has become the first course to be certified by the recently-rebranded NCSC’s certified training scheme, provided by APMG International. The Cyber Management Alliance course was first certified by the Government Scheme in 2016 and is also accredited by the Chartered Institute of Information Security (CIISec). Interactive, practical, and immersive, the entire course can be conveniently completed by attending a virtual classroom or via a self-paced e-learning environment. Besides gaining imperative insights into key cyber risk-reducing controls for their business, course participants also have the advantage of being trained by Amar Singh, renowned across the globe as one of the top cybersecurity practitioners and the founder and CEO of Cyber Management Alliance. Online delivery program Speaking on the launch, Amar said, “I am delighted that APMG has awarded NCSC Certified Training status for the CIPR course, including its online delivery program. The updated and comprehensive course is accessible for all levels of management and technical audiences. The CIPR course is a complete guide to planning and responding to a cyber crisis or a data breach.” APMG-International’s COO, Nick Houlton, said, “Protecting individuals, teams and organizations from the financial and reputational damage of Cyber Incidents is at the heart of the Information Security Agenda. APMG is delighted to certify this course on behalf of the UK National Cyber Security Center and looks forward to its continuing success in the market.” Online training Over 300 organizations in 20 different countries have benefitted from the course and internal workshops" Cyber Management Alliance’s co-founder, Bal Rai, said, “We are pleased to have received NCSC Certified Training certification status. Over 300 organizations in 20 different countries have benefitted from the course and internal workshops and with the launch of the online training it means every organization, globally, can access the knowledge and skills at any time.” Previous participants of the NCSC-Certified CIPR workshop have come from organizations including the United Nations, UK Ministry of Defense, several UK Police Forces, NHS Trusts, European Central Bank, Swiss National Bank, Microsoft, Ernst and Young and many others. Responding to a cyber incident One of the course attendees, Wayne Parkes, Head of ICT - Warwickshire Police UK, had this to say: "Quite a difficult subject to get over sometimes but I think Amar presented it really well. Nice mixture of technical knowledge and practical examples. Good for a very mixed audience as it wasn’t overly technical. I highly recommend it in terms of bringing a mixed group up to speed with the importance of responding to a cyber incident, and what the essentials are, about dealing with it."
Exabeam, the Smarter SIEM™ company, announces updates to the Exabeam Partner Program, including the rollout of a formalized practice for managed security service providers (MSSPs) and managed detection and response (MDR) providers, both key segments of its partner ecosystem. The program will provide structure and support for multiple MSSP and MDR provider business models for its managed service practice, which contributed to 12% of the company’s overall business revenue in 2019. The enhanced program includes custom, flexible pricing models, training and accreditation, dedicated account and technical management teams, customized go-to-market and support. Partner-Focused software company Coupled with the Exabeam Security Management Platform (SMP), the program will empower managed service partners to expand their offerings whether they resell, manage or host Exabeam deployments for their customers. “The Exabeam Partner Program supports a rich diversity of security-focused partners, including solution providers, professional services firms and managed service providers,” said Ted Plumis, Vice President of channels, business and corporate development, Exabeam. “We’ve seen strong growth in recent years from our service provider partners who are leveraging Exabeam in multiple deployment models to serve our joint customers. We are excited to make this sizable investment and offer dedicated resources to this important partnership segment, further demonstrating our commitment to being a 100% partner-focused software company.” Incident response automation MSSP and MDR partners can utilize the Exabeam SMP to help customers lower operational costs MSSP and MDR partners can utilize the Exabeam SMP to help customers lower operational costs and increase the productivity of SOC analysts associated with providing detection and response capabilities. Offered in the cloud or on-premises, the Exabeam SMP provides a data lake, behavioral analytics, case management, security orchestration and incident response automation, which drastically reduces time to investigate and contain threats by 51 percent. In addition, its analytics feature uses data science to identify employees’ behavioral patterns and abnormalities that may be indicative of security threats, in contrast to outdated signature-based detection methods. These providers can also leverage the Exabeam SaaS Cloud platform, which reduces SIEM deployment, maintenance and operational overhead by delivering the Exabeam SMP as a hosted cloud service, for their entire customer base, from small and mid-sized companies to the largest enterprises. Enhanced access to training programs Exabeam’s next-generation SIEM approach has brought more than 30 MSSPs to its longstanding partner program since its founding in 2013, spanning 17 countries in North America, Latin America, EMEA, Asia Pacific and Australia. MSSP partners around the world are strong supporters of the Exabeam program: “Many of our customers use Exabeam Data Lake or Exabeam Advanced Analytics, which gives our analysts a comprehensive view of the timeline of an attack, helping us scope security incidents more quickly, as well as providing more streamlined access to a customer’s security signals,” said Justin Bajko, co-founder and vice president of strategy and business development at Expel. “We’re supportive of Exabeam’s efforts to provide its partners -- and our joint customers -- with greater customization opportunities, more flexibility and enhanced access to training programs.” Integrated managed security solution Our customers leave nothing to chance by choosing a fully integrated managed security solution from our team" “As a leading European MSSP, our customers leave nothing to chance by choosing a fully integrated managed security solution from our team,” said Garath Lauder, director at Cyberseer. “The Exabeam SMP Integrated into the Cyberseer ASPECT automation platform optimizes the protection we provide our customers while giving our SOC analysts the visibility they rely on to resolve acute security problems immediately.” “At CyZen, we pride ourselves on delivering thoughtful and practical guidance that brings our customers peace of mind when it comes to securing their organization from cyberthreats,” said Jake Lehmann, managing director at CyZen. Cost effective solution “By partnering with Exabeam and leveraging the Exabeam SaaS Cloud Essential offering, we are able to deliver on our mission while providing a cost effective solution for our customers.” “We conducted an exhaustive review of solutions in the marketplace, and we're excited to help Exabeam’s launch in the Latin America market,” said Carlos Alanis, CEO at Banyax. “We found the flexibility we required in the Exabeam product and discovered pricing models that have allowed us to achieve success across our customer segments, from small to mid-size businesses up to larger organizations with thousands of users,” added Jorge Melendez, CFO at Banyax.
SmartRent, a globally renowned provider of smart home automation solutions for property owners, managers, developers and residents, has announced the release of its in-house perimeter and common area access control solution, Alloy Access. Perimeter access control solution The first vendor to offer a single-software solution combining enterprise smart home and perimeter access control, SmartRent's Alloy Access will enable building access controls for residential and multi-family communities. In addition, it will expand SmartRent's Self-Guided Tour platform for properties looking to lease or sell, an increasingly important feature amid social distancing recommendations. Alloy Access Alloy Access will provide a seamless, contactless experience for property staff and residents into perimeter locations Beyond remote access for guests and deliveries, Alloy Access will provide a seamless, contactless experience for property staff and residents into perimeter locations and common areas like pools, gyms, and clubhouses. Alloy Access will also address a common industry pain point, which is traditional access control systems are neither cloud-based nor integrated with property management systems, forcing property staff to manually add and remove user records and credentials in separate software systems. Real-time integration with property management system SmartRent's solution offers real-time integration with property management and active directory systems, automatically adding and removing credentials based on administrative workflows such as moving residents in and out. On move-in day, residents remotely receive their access to the perimeter access points, common areas and their unit without the need to meet anyone, which accommodates social distancing measures and increases operational efficiency. Additionally, when work orders are performed or prospects conduct a self-tour, temporary credentials are granted to the appropriate path of doors. Hardware and credential solutions The platform offers a wide variety of hardware and credential solutions for communities of all types from suburban garden-style to urban high-rises. It is also designed for use in either new construction or retrofitting existing access control systems without the need to replace any hardware. Anyone who lives, works or visits the property is able to use their mobile phone, pin codes or traditional fobs for entry. "At SmartRent, we are focused on creating a frictionless, best-in-class experience for property managers, residents and visitors through our mobile, cloud-based technology," said Mitch Karren, Chief Product Officer at SmartRent. Enterprise home automation and perimeter protection Alloy Access is easy to implement, highly flexible and solves a variety of operational challenges" Mitch adds, "Alloy Access is easy to implement, highly flexible and solves a variety of operational challenges such as package delivery, on-demand services and self-guided tours. Providing enterprise home automation and perimeter access control within a single platform unlocks enormous value for our existing customers and the industry as a whole." SmartRent is also launching a channel partner network, which will allow third-party regional dealers to sell SmartRent's full suite of products directly to property developers, another first-to-market solution for the physical security industry. Mobile access Installers will also be able to use SmartRent's new mobile iOS and Android app as an alternative to a computer when provisioning hardware, increasing the speed of installations and overall revenue for partners.
Conversa, a globally renowned company in automated personalized patient engagement, has announced a new offering for businesses and other organizations, COVID-19 Employee HealthCheck. As businesses plan to get back to work, organizations need to create a safe environment for returning employees and visitors. Screening people to identify those who may be infected with coronavirus (COVID-19) is an important part of any plan to create and maintain a safe workplace. COVID-19 Employee HealthCheck COVID-19 Employee HealthCheck engages employees’ each workday in a brief automated chat to assess exposure risk to coronavirus and its symptoms. Employees can complete the chat on their phone, tablet or computer before they travel to work. Those employees who are cleared for the day receive a ‘digital badge’ they can display at access control points, and employers are instantly notified. Employees who are not cleared for work are instructed to stay at home, and are provided guidance for self-care, monitoring, testing or additional care.Employee HealthCheck is kept current with the continuously changing screening protocols Employee HealthCheck is kept current with the continuously changing screening protocols and is designed to accommodate the needs of large organizations. Ensuring employees’ safety “While the pace of reopening varies across the United States, there should be no question that businesses resuming operations need to do so safely,” said Murray Brozinsky, Chief Executive Officer (CEO) at Conversa. Murray Brozinsky further stated, “Employers and employees have a responsibility to keep this pathogen out of the workplace. We believe our COVID-19 Employee HealthCheck is a great first line of defense and instills confidence in returning to a healthy and safe environment. Ultimately, this is about helping people stay connected without getting infected.” Suite of COVID-19 solutions Conversa’s COVID-19 Employee HealthCheck is a part of a suite of proven COVID-19 solutions being used by renowned health organizations all over the world, including Northwell Health, UCSF Health, UNC Health and Prisma Health. Over the last two months, this suite of COVID-19 solutions have been shared with millions of patients globally, providing services including symptom checking and triage, check-ins with quarantined patients and delivering of lab results. Collaboration with UCSF Health Conversa developed the COVID-19 Employee HealthCheck with UCSF Health in San Francisco Conversa developed the COVID-19 Employee HealthCheck with UCSF Health in San Francisco, consistently ranked as one of the top 10 healthcare systems in the U.S. UCSF had been using a paper-based process, asking employees a series of screening questions as they arrived, but this caused significant wait times, up to 30 minutes, putting employees at risk of exposure to COVID-19 while waiting in line. Within five days of working with UCSF, Conversa launched its solution, cutting wait times for employees entering workplace by 80 percent, thereby saving nearly 250 hours per week of waiting time. Widespread adoption by health systems, enterprises The solution has performed over 400,000 safety screens to date and that number is growing rapidly as it is being adopted by numerous health systems and employers. “We needed to safely screen while minimizing delays for our employees, visitors and others caring for patients,” said Aaron Neinstein, MD, Director of Clinical Informatics, UCSF Center for Digital Health Innovation. Virtual care and communication solution He adds, “Conversa’s virtual care and communication solution was flexible and scalable to help us create a user-centered solution, while modernizing our processes for how we engage and care for our employees.” Aaron Neinstein further said, “It's been working great for us, and we’re extending use to our employees across the UCSF campus. I think employers across many other industries will find themselves wanting to use a tool like Conversa to help create a safe workplace and ensure they have healthy employees.”
To limit the spread of COVID-19, many governments, municipalities and enterprises world-wide are introducing new health and safety measures to ensure that all entrants to public buildings are screened for above average temperatures. In response to these new measures, Pangea, a global supplier of digital identity and security solutions is announcing the integration of thermal imaging technology as part of its biometric access control and incident management solution. The thermal imaging technology implemented by Pangea, was first introduced during the SARS outbreak in Asia in 2002 and enables security personnel to scan a continuous flow of people entering a public space or building. Thermal Imaging Access Control technology is faster and more suitable for the movement of masses of people as it does not require people to stop and line in line while their temperature is taken. Thermal imaging technology Biometric and Thermal imaging technology initiatives have been implemented as part of South Korea’s response to COVID-19, helping the country to ‘flatten the curve’. South Korean government ministries have been working together using a ‘Coronvirus Data Hub’ to provide accurate data about those infected by COVID-19, which has helped manage the spread and reduce new incidences of COVID-19. South Korea’s experience shows that “diagnostic capacity at scale is key to epidemic control,” says Raina MacIntyre, an emerging infectious disease scholar at the University of New South Wales, Sydney. Automated thermal imaging technology This technology offers a non-intrusive, non-contact solution for controlling the spread of viral infections “Our Geriatric Hospital serves residents with a high risk of contracting COVID-19,” said Deborah Goldberg, Head Nurse, Beit Hadar Geriatric Medical Center. “The installation of the Pangea Bio-Thermal Imaging Access Control solution gives us and our residents another solution for protection against the virus in these troublesome times.” For Pangea, a company with over 25 years’ experience in the deployment of complex large-scale digital identity and security projects, the integration of automated thermal imaging technology is an obvious next step. This technology offers a non-intrusive, non-contact solution for controlling the spread of viral infections in large-scale public spaces including office buildings, shopping malls, educational campuses, sports arenas and cultural centers. Security infrastructure solution For the enterprise organization, Pangea can integrate these digital heat sensors with other corporate digital security mechanisms such as biometric face recognition to create a more robust security infrastructure for corporate facilities. “The outbreak of COVID-19 has changed the world and is expected to have a significant impact on our daily lives, today and in the future,” says Rafi Kaminer, CEO and founder of Pangea. “We think government and enterprise organizations need to take on a new “social role and responsibility” to keep people safe from potential COVID-19 individuals who may infect others." "In Israel, only Pangea has the expertise and technology to help public and private sector organizations roll out an automated bio-thermal imaging solution as part of our broader safety and security infrastructure solution for any type of facility, at any scale, anywhere in the world.”
Two of the most familiar names in the physical security market – Pelco and Panasonic – underwent ownership changes during 2019. Consolidation continued on multiple other fronts. Security service companies, video companies and access control companies were all among the entities involved in merger and acquisition (M&A) activity during the last 12 months. In short, the industry landscape continues to transform in response to a changing market. Here's a look at the Top 10 M&A stories in 2019: 1. Pelco Acquired by Private Equity Firm Transom Capital Pelco Inc. was acquired in May by Transom Capital Group, a private equity firm, from Schneider Electric. Since the acquisition, Transom Capital has been working with Pelco’s management and employees to define and direct the next chapter of the iconic company. Pelco maintains its headquarters in Fresno, Calif., and has a presence in Fort Collins, Colo., near Denver, and a sales office in the New York area, not to mention many global employees who work remotely. 2. Panasonic Spins Off Security Business Electronics giant Panasonic sold off 80% of its video surveillance business to a private equity firm but is retaining 20%, and the new company will continue to use the well-known Panasonic brand. The move is aimed at reinvigorating a business challenged by competition from Chinese companies and lower video prices. Polaris Capital Group Co. acquired 80% of the outstanding shares of the new security systems business. 3. Qognify Acquires OnSSI and SeeTec 2019 began with the acquisition of IP video management software (VMS) company On-Net Surveillance Systems (OnSSI), including SeeTec in Europe. Backed by the global investment firm Battery Ventures, Qognify completed the acquisition in the final days of 2018. With Qognify, OnSSI and SeeTec operating under one umbrella, the company provides VMS, video analytics, PSIM and critical incident management for mid-market and enterprise organizations. 4. Busy Year for Acquisitions at Allied Universal Security services company Allied Universal had an active year in acquisitions, beginning in April with the acquisition of integration company Securadyne Systems in Dallas. There was an additional acquisition announced in each of the next four months: Point 2 Point Global Security, Dallas, in May; security services company Cypress Private Security in June, services company Shetler Security Services in July , and Midstate Security in August. Allied Universal announced two more acquisitions in November – low-voltage integrator Advent Systems Inc. in Chicago and Vinson Guard Service in Louisiana. Also in November, Allied announced a transformational merger with SOS Security. In December, Allied Universal acquired APG Security, South Amboy, N.J. 5. Motorola Continues Video Push with VaaS Acquisition Following its acquisition of Avigilon in 2018, Motorola Solutions continued to build its presence in the security market in 2019 with the acquisition of VaaS International Holdings, Inc. (VaaS), a data and image analytics company. Motorola Solutions paid $445 million in a combination of cash and equity for the company, which includes fixed and mobile license plate reader cameras driven by machine learning and artificial intelligence. 6. ACRE Acquires Access Control Companies Open Options and RS2 Open Options is an open architecture access control company headquartered in Addison, Texas; and RS2 is an open systems access control provider in Munster, Ind. ACRE, global provider of security systems, wrapped up acquisition of both firms in 2019, after announcing the Open Options deal in the waning days of 2018 and following it up with the RS2 announcement in the spring. ACRE’s portfolio now consists of Vanderbilt, Open Options, RS2 and ComNet. 7. Assa Abloy Expands Capabilities with LifeSafety Power Lock and access control giant ASSA ABLOY acquired LifeSafety Power in September, providing a complement to the access control portfolio. The plan is to incorporate LifeSafety Power’s knowledge of power supply and consumption throughout the ASSA ABLOY access control line. LifeSafety Power was established in 2009 and has some 65 employees. The main office is located in Libertyville, Illinois. 8. Distributor Anixter Going Private and Selling to CD&R Anixter International Inc., a distributor of network and security solutions, electrical and electronic solutions and utility power solutions, entered into a definitive agreement with an affiliate of Clayton, Dubilier & Rice (CD&R) to be acquired in an all cash transaction valued at approximately $3.8 billion. The transaction will result in Anixter becoming a private company and is expected to close by the end of the first quarter of 2020. Under the terms of the merger agreement, CD&R-managed funds will acquire all the outstanding shares of Anixter common stock for $81.00 per share in cash. (It has been reported that a new bidder has also emerged, although Anixter is resisting – stay tuned.) 9. Alarm.com Expands Commercial Offering with OpenEye Acquisition Alarm.com has announced a majority-stake acquisition of OpenEye, a provider of cloud-managed video surveillance solutions for the commercial market. OpenEye is optimized for enterprise-level commercial customers requiring expansive video recording capabilities, in addition to remote viewing, administration and diagnostic reporting. Combined with the Alarm.com for Business offering, service providers partnered with Alarm.com now have solutions to accommodate commercial accounts of any size. 10. ADT Makes Multiple Acquisitions, Sells Canadian Operation Another North American security giant, ADT Inc., also had a busy year in mergers and acquisitions. In February, ADT acquired LifeShield, a pioneer in advanced wireless home security systems. In June ADT continued expanding capabilities and geographic reach via Red Hawk Fire & Security, ADT Commercial with the asset purchase agreement of Security Corporation, a commercial security integrator headquartered in Detroit, Mich. In November, ADT Commercial purchased Critical Systems, which specializes in enterprise-class fire alarm, fire suppression, life safety and integrated building security solutions for high-rise properties, healthcare campuses and data, manufacturing and distribution facilities in Atlanta. In October, ADT announced an agreement to sell its Canadian operations to TELUS Corp.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Today, the world is connected like never before. Your watch is connected to your phone, which is connected to your tablet and so on. As we’ve begun to embrace this ‘smart’ lifestyle, what we’re really embracing is the integration of systems. Why do we connect our devices? The simplest answer is that it makes life easier. But, if that’s the case, why stop at our own personal devices? Connection, when applied to a business’ operations, is no different: it lowers effort and expedites decision making. Integrating security systems Systems integration takes the idea of connected devices and applies it to an enterprise Systems integration takes the idea of connected devices and applies it to an enterprise, bringing disparate subcomponents into a single ecosystem. This could mean adding a new, overarching system to pull and collect data from existing subsystems, or adapting an existing system to serve as a data collection hub. Regardless of the method, the purpose is to create a single, unified view. Ultimately, it’s about simplifying processes, gaining actionable insights into operations and facilitating efficient decision-making. Although integration is becoming the new norm in other areas of life, businesses often opt out of integrating security systems because of misconceptions about the time and resources required to successfully make the change. So, instead of a streamlined operation, the various security systems and devices are siloed, not communicating with each other and typically being run by different teams within an organization. Time-Intensive process When systems are not integrated, companies face a wide range of risks driven by a lack of transparency and information sharing, including actual loss of property or assets. For example, a team in charge of access control is alerted to a door being opened in the middle of the night but can’t see what exactly is taking place through video surveillance. Without integrated systems they have no way of knowing if it was a burglar, an equipment malfunction or a gust of wind. Without integration between systems and teams, the ability to quickly put the right pieces in front of decision makers is missing. Instead, the team would have to go back and manually look for footage that corresponds with the time a door was open to figure out which door it was, who opened it and what happened after, which can be a time-intensive process. Integrating access control and surveillance systems Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it This slowed response time adds risk to the system. Theft and vandalism occur quickly, meaning systems and users must work faster in order to prevent it. Security systems can do more than communicate that theft or vandalism occurred. Properly integrated, these systems alert users of pre-incident indicators before an event happens or deter events altogether. This gives teams and decision makers more time to make effective decisions. Integrating access control and surveillance systems allows for a more proactive approach. If a door is opened when it’s not supposed to be, an integrated system enables users to quickly see what door was opened, who opened it and make a quick decision. Integrated solutions are more effective, more efficient and help drive cost-saving decisions. Ideally, companies should establish integrated solutions from the start of operations. This allows companies to anticipate problems and adjust accordingly instead of reacting after an incident has occurred. Security camera system Although starting from the beginning is the best way to ensure comprehensive security, many companies have existing security systems, requiring integration and implementation to bring them together. Typically, companies with established security systems worry about the impact to infrastructure requirements. Is additional infrastructure necessary? How and where should it be added? What financial or human resources are required? These concerns drive a mentality that the benefits gained from an integrated solution aren’t worth the costs of implementation. Thankfully, this is becoming less of a problem as security providers, like Twenty20™ Solutions, work to offer adaptable solutions. With flexible options, operators don’t worry about adding or replacing infrastructure to align with a provider’s model. This allows users to monitor camera footage and gate traffic from one system If a company has an existing security camera system, but identifies a need for access control, a modern integrated solution provider can supply the gates for access points and equip the gates and cameras with the technology to connect the two. This allows users to monitor camera footage and gate traffic from one system. This model also spares operators additional costs by using a sole vendor for supplemental needs. Overall management of security While a single, unified system is beneficial for cost saving, it can also help the overall management of security. The ability to view all operating systems in one dashboard allows security personnel to manage a site from any location, reducing the expense and effort required to manage a system. The mobile world today means security directors no longer need to be in a centralized operations center to see alerts and make decisions. This simplifies processes by allowing users to quickly see an alert, pull up a camera, delete a user or check an access log from a phone. Modern networks are secure and accessible to those with permissions, without requiring those users to be physically present. Consolidating security systems is the first step companies can take toward streamlining work, information and costs. The next step is integrating all sites, both remote and on-grid. Energy and communication technology The integration of sites and systems turns mountains of data and information into actionable intelligence Traditional methods demanded two systems: one for on-grid facilities and another for off-grid locations. With advancements in energy and communication technology, the need for multiple systems is gone. Data from remote sites can be safely and securely fed into an existing system. These remote locations may gather, distribute and manage data in a different manner than a connected system due to the cost of transmission via remote connections (i.e., cellular or satellite connection). The end result, however, is a consistent and holistic view of operations for the decision maker. The integration of sites and systems turns mountains of data and information into actionable intelligence. With connected devices monitoring occurrences at individual sites, as well as events across locations, the data tells a story that is unhindered by operational silos or physical space. Identifying patterns and trends Instead of providing 10 hours-worth of footage that may or may not be relevant, system analytics can provide users with the specific set of information they need. Incidents once discarded as ‘one-off’ events can now be analyzed and data-mapped to identify patterns and trends, directing future resources to the most critical areas first. Consumers are increasingly expecting everything they need to be right where they need it – and businesses are right behind them. The current generation of security professionals are increasingly expecting the simplicity of their everyday personal tasks to be mirrored in enterprise systems, which means giving them the ability to see what matters in one place. A unified system can provide just that, a single view to help simplify processes, promote cost saving and accelerate decision making.
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-Time access control security updates Furthermore, once healthcare facilities are able to digitize all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorized staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-Level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more .Missed the rest our healthcare mini series? Read part one here and part two here.
Gunshot detection today is part of more physical security systems than ever before, and many manufacturers are developing interfaces to the latest gunshot detection technologies. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform, Security Center. Thanks to this integration, police departments and security professionals will be able to receive more actionable information, gain rapid access and detailed location insights when a gunshot situation occurs. Cloud-Based analysis software ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs ShotSpotter uses wide-area acoustic surveillance that automatically gets activated when gunfire occurs, providing comprehensive outdoor coverage on campuses and in complex urban geographies. ShotSpotter sensors and cloud-based analysis software triangulate and pinpoint the precise location of each round fired within seconds, the number of shots fired and provide an immediate gunfire alert with an audio clip. Data capture form to appear here! Detailed incident data is immediately sent to SST’s Incident Review Center (IRC), a secure data processing and alert validation facility, where acoustics experts analyze the data and qualify the incident in real-time 24/7. Once validated, an alert is sent directly into Genetec’s Security Center, all in under a minute. Once the alarm is triggered within Security Center upon gunshot detection, operators can quickly access video and other related data surrounding the location of a gunshot alert, and immediately visualize it on Security Center maps, leveraging the dynamic visualization capabilities of the Security Center Plan Manager. Genetec has integrated ShotSpotter gunshot detection technology into its unified IP security platform Gunshot identification software Stanley Security has announced a partnership with Shooter Detection Systems LLC (SDS), gunshot detection solutions provider. As an authorized dealer, STANLEY Security is now certified to sell, install and service SDS products and services. SDS’s Guardian Indoor Active Shooter Detection System combines acoustic gunshot identification software with infrared gunfire flash detection for a fully automated gunshot detection and alerting solution. The Guardian System immediately detects gunshots and simultaneously alerts building occupants The Guardian System immediately detects gunshots and simultaneously alerts building occupants and first responders within one second and with zero false alerts. Johnson Controls has announced that its exacqVision video management system now integrates with Databuoy Corp.’s ShotPoint acoustic gunshot detection and localization system to speed response time and heighten the decision-making process for local responders during active shooter situations. Integrated security systems Johnson Controls has also released the Detect360 Active Shooter Response (ASR) system, combining reliable gunshot detection with notification technology to provide immediate warning when a gunshot is fired within a building. By providing early notification and precise location of the shooter, the ASR system gives occupants time to find safety and allows police and security personnel to mitigate the threat up to 60 percent faster. Detect360 ASR gives first responders information as it develops at the scene, including shot location, number of shots, location of the shooter in near real-time and the ability to remotely monitor the situation through integrated security systems. It also collects forensic information that can later be used by law enforcement. The system supports multiple integration options, including video feeds from existing CCTV and intrusion systems, mass notification systems, access control systems and panic button/manual initiation systems. Detect360 ASR gives first responders information as it develops at the scene Public safety access points Listed as one of the most important new technologies debuted at CES 2019 by the Wall Street Journal and NBC News, Safe Zone also showcased its Safe Zone Gunfire Detector (GFD) at ISC West 2019. Priced at $149 per unit, the Safe Zone Gunfire Detector combines infrared and sound detection technologies with immediate cloud-based data analysis that can analyze more than 3,000 data points of each loud noise that exceeds ambient levels by a certain threshold. The system determines the location of shots fired, the number of shots, and the type Utilizing the data from multiple detectors simultaneously, the system determines the location of shots fired, the number of shots, and the type and caliber of gun being used. Within 10 seconds of the trigger pull, an alert is sent to Public Safety Access Points in the appropriate dispatch center, giving local 911 dispatchers all critical information on their computers. Reseller recruitment program Shot Tracer has launched a reseller recruitment program with a highly attractive on-boarding proposition for qualified dealers. Qualifying resellers can receive a Gunshot Simulator Kit valued at $1,000 when they commit to becoming a Shot Tracer dealer. Shot Tracer’s Eagle Gunshot Detection System easily integrates with virtually any security, alarm, surveillance and access system via contact closure – or wirelessly via IP integration. In fact, Shot Tracer gunshot detection sensors are as easy to install as a smoke detector, so there’s virtually no learning curve for installing dealers. The new Shot Tracer Reseller Recruitment Program includes an exclusive offer for installing dealers to receive a free Gunshot Simulator Kit, valued at over $1000, which is essential for demonstrating Shot Tracer Eagle Gunshot Detection sensors. Terms and conditions apply for qualifying resellers.
Video surveillance cannot address all the security challenges in education, but it is a valuable tool and among the least obtrusive options available. And the list of security challenges that video can address grows every day. Video systems can provide real-time monitoring of school premises and facilitate rapid response to incidents. New advances such as video analytics are currently underutilized in the education arena. Historically, video has been used as a forensic tool in the education market, providing critical information about an incident after the fact. But that generalization is changing. Today, networking enables video images to be shared throughout a school system, traveling over existing networks, empowering a more centralized security management structure, and making video more valuable. In particular, higher education institutions are more likely to view live video, given the larger campuses, greater number of buildings, and more public areas where staff and students congregate. Challenges for securing a school environment Panoramic cameras are one tool to address challenges, as a single 360-degree camera can replace between 4 and 5 PTZ camerasMultiple challenges in the education market for security goods and services (from a video perspective) include wide open spaces that make securing schools with video surveillance cameras difficult since the vast amount of coverage required can be cost-prohibitive. Second, state and federal regulations must be taken into account and balanced with the need to protect student privacy. Finally, schools and colleges face dwindling budgets, which means security solutions must deliver more coverage and functionality, while also being cost-effective to deploy. Panoramic cameras are one tool to address these challenges, as a single 360-degree camera can replace between four and five traditional pan-tilt-zoom cameras, resulting in fewer cameras and more coverage – all at a lower cost for hardware and licensing. Data capture form to appear here! Intelligent cameras with video analytics Video surveillance with video analytics can be deployed to monitor areas at certain times of day. For example, once school starts, there shouldn’t be a lot of activity in the parking lot or in particular areas around the school. For these situations, intelligent cameras with video analytics can be used to detect activity in those areas of interest to alert school security that something may need their attention. Radar detection is ideal for perimeters, where a device can be set up unobtrusively to alert when someone enters a particular area. ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search The goal in a potentially dangerous situation is to speed up response times. The faster you’re able to detect something using technology, the faster you’re able to respond. Therefore, being able to identify something happening in a parking lot and alert school resource officers could provide 30 seconds or a minute head start for response, which can get the school into a lockdown situation and get first responders on site more quickly. Video cameras with low-Light capability There are video cameras available with extreme low-light capability to see in near-dark or complete darknessIt’s been shown that using lighting at night can deter crime. However, it can be expensive to keep a building and grounds illuminated all night, every night. To mitigate these concerns and potential costs, there are video cameras available with extreme low-light capability that allows them to see in near-dark or in some cases complete darkness. This allows a school to save money by turning lights off while achieving a level of surveillance performance similar to daytime deployments. Facing above-average student incident rates and student disciplinary concerns at some schools, a school system in the United States sought to upgrade its video surveillance system to allow better local and remote monitoring in important areas. Avigilon high-definition cameras with self-learning video analytics and access control solutions were installed in 101 schools, and ACC 6 video management software with Avigilon Appearance Search technology provides advanced video analytics search. A deep learning artificial intelligence search engine can sort through hours of footage and allow operators to click on a button and search for all instances of a person or vehicle across all cameras on a site, quickly and efficiently.
When it comes to airport security, there is a critical need for technologies that detect exterior threats and protect the perimeter. By using an advanced FLIR perimeter intrusion detection system, airports receive unmatched threat recognition, target tracking, perimeter defense and response capabilities. The result is greater efficiency, exceptional safety and enhanced customer experience for passengers, employees, aircraft and facilities. Norman Y. Mineta San Jose International Airport (SJC) is the gateway to Silicon Valley, providing transportation to 15 million passengers annually. SJC is recognized within the industry as one of America’s fastest‐growing major airports over the past four-year period, based on percentage increase in passenger seat capacity. Perimeter security upgrade Located in San Jose California, SJC is a robust engine of economic stimulus, transportation and international commerce. The airport is within an 18-mile radius of 6,600 technology companies in Silicon Valley and serves travelers employed by many of the world’s Fortune 500 enterprises, including Apple, Google, Facebook and Intel. Ensuring secure operations is critical to the success and customer experience of SJC users. The airport occupies 1,050 acres of land and its perimeter spans six miles. With such a vast property and a high throughput of traffic, protecting the perimeter from external threats is essential. Driven by high-profile intrusion incidents, perimeter security has become a top priority for airports in recent years. From 2004-2016, there were 345 perimeter breaches at 31 major U.S. airports, according to a report by the Associated Press. Like many airports around the country, SJC also faced challenges and crises of illegal trespassing of unauthorized individuals, despite the airport meeting all federal security regulations. This raised concerns about passenger safety. Mineta San Jose International Airport With a heightened need for better perimeter protection, SJC launched a multi-million dollar, three-phase initiative to upgrade its entire outdoor perimeter security system. The first two phases focused on physical upgrades to the fence line, raising 10,000 linear feet of fence from seven feet to 11 feet in critical areas of the airport. FLIR Elara FC-Series ID, ioi HD Analytics, Triton PT-Series cameras with FLIR Latitude Network Video Management System FLIR Elara FC-Series ID, ioi HD Analytics and Triton PT-Series cameras with FLIR Latitude Network Video Management System provide multiple layers of protection. Phase three was designated for fence technology enhancements through state-of-the-art video surveillance and detection systems. “In response to the cluster of perimeter breaches within a relatively short time period, our evaluation showed that the airport perimeter, with its seven-foot-tall fence, was indeed technically in compliance with current federal security requirements,” said Airport Deputy Director of Operations Bob Lockhart. “However, we also recognized some opportunities to improve the effectiveness of our perimeter, both from a perception perspective, as well as an actual strengthening of some of our perimeter,” he continued. Trial with various security solutions To find the best fence line analytic detection technology, SJC consulted National Alliance for Safe Skies, Inc. (Safe Skies), which is a federally funded non-profit organization that assists airports in the research, testing and evaluation of security technologies. SJC’s partnership with Safe Skies began in 2014 when the non-profit first discussed the airport’s perimeter security needs. Safe Skies was later tasked to review a variety of perimeter defense systems to determine what solutions would be most effective at SJC. Safe Skies tested and evaluated six different types of technology on-site including, thermal cameras, thermal cameras with video analytics, behavioral video analytic systems, pressure sensor buried cables, laser detection systems and wireless cameras. Each system was tested for two weeks, and Safe Skies presented a performance report to SJC for each one. After a detailed analysis, SJC selected an end-to-end perimeter intrusion detection system (PIDS) from FLIR Systems Inc. FLIR PIDS solution The FLIR PIDS solution is composed of 57 FLIR Elara FC-Series ID thermal analytic cameras and 50 FLIR ioi HD Analytics Bullet cameras along the fence line. The system also includes four FLIR Triton PT-Series dual sensor cameras with thermal and visible light sensors with pan-tilt tracking. For the SJC deployment, Latitude VMS integrates with the Software House’s C-CURE access control platform All of this technology fully integrates into the existing FLIR Latitude Network Video Management System, which is part of the FLIR United VMS family of products. As an ONVIF Profile S compliant platform, Latitude VMS enables seamless integration with edge devices and third-party systems. For the SJC deployment, Latitude VMS integrates with the Software House’s C-CURE access control platform. Distinguishing between an animal and human “The additional thermal and infrared camera coverage has greatly enhanced our abilities to detect unauthorized activities around the perimeter of our airfield,” Lockhart explained. Ken Castle, Vice President of business development at Ojo Technology, the systems integrator for the project, also described the advantages of the FLIR thermal technology. “Thermal cameras provide the data and visual confirmations that are lacking from so-called traditional fiber-based ‘shaker fence’ systems, which generate alarms when objects strike a fence or something creates vibration,” Castle explained. “The problem is that such alerts could be caused by dogs, wildlife, bicyclists bumping into the fence, tree branches or winds—none of which pose security threats.” Castle continued, “With thermal cameras, the embedded analytics can immediately distinguish between an animal at 50 yards and a human at 300 yards, following their direction of movement. The viewing trajectory can be narrowed to cover just the fence, or widened to include territory in front of or behind the fence. The bottom line is that thermal analytics provide definitive visual information and virtually eliminate unnecessary or inconsequential alerts.” Thermal cameras continue to be the industry standard for 24/7 perimeter monitoring and the technology is a key part of SJC’s PIDS solution. Installation of a perimeter fence technology system In September 2016, the U.S. Department of Transportation and the Federal Aviation Administration awarded SJC an $8.1 million grant for the design, purchase and installation of a perimeter fence technology system. Deployment of the FLIR PIDS solution began shortly thereafter. The project had an initial 150-day or a five-month turnaround with work beginning around the holidays in December 2016. As the systems integrator, Ojo Technology oversaw the phased commissioning of the project. Ojo engineers preconfigured the cameras and servers, programmed the analytics for all thermal cameras, tested the functionality of each camera under a variety of lighting conditions, and worked with the airport security command center and its systems subcontractor to incorporate the new cameras into the existing network. Installation was completed in the fall of 2017, and, afterward, Ojo worked closely with FLIR and SJC to fine-tune the system for optimal functionality. Integrator for PIDS “With such an aggressive schedule, Ojo Technology was instrumental in seeing the PIDS solution deployment through,” said Daniel Gundlach, Vice President and General Manager of security at FLIR. “Likewise, the collaboration, technical skill and ingenuity among the FLIR, SJC and Ojo teams was remarkable and a key reason why the project is such a success.” Upon detection of an object approaching the fence line, the FC-Series ID thermal camera, initiates an analytic alarm hand-off “The success of a technical solution like the San Jose Airport PIDS project is dependent upon a strong partnership among all participants—from FLIR as the manufacturer to the integrator to the end user,” said Neil Roberts, FLIR security director for the PIDS deployment. “In this case, all parties were committed to seeing this project through to the end and addressing any technical needs that arose along the way.” Threat recognition and response The advanced FLIR PIDS solution is designed to deliver superior threat recognition and response. Upon detection of an object approaching the fence line, the FC-Series ID thermal camera, initiates an analytic alarm hand-off to the PT-Series camera for auto-tracking. The FLIR HD cameras provide a color visual of the target for identification and verification. Through Latitude VMS, security operators manage response capabilities such as alarm functions, notifications and real-time interactive alarm maps. Video monitoring with perimeter intrusion detection “SJC has used FLIR cameras and Latitude products for many years,” said Lockhart. “We appreciate our FLIR end-to-end solution and the ability to expand our current camera system with new perimeter cameras to enhance our current video monitoring and provide additional perimeter intrusion detection.”The safety of passengers, airline employees and service workers is greatly enhanced" A defining feature of the airport’s PIDS solution was that all technology components were provided by FLIR, which created an advantage for integration and solution performance. Open platform software management system “An all-FLIR system provided a tight integration to accomplish the goal of heightening security for the airport,” Castle said. Castle continued, “In theory, an open platform software management system can accommodate a variety of camera manufacturers and models in addition to ancillary security systems such as access control, intrusion alarms, public address and intercom systems, and blue light emergency phones. However, in actuality, the integration of various third-party components can be challenging as different brands of firmware in varying camera models and manufacturers don’t always provide consistent levels of performance, such as resolution and other features. This can be avoided entirely by deploying one end-to-end solution from a single manufacturer.” “The upfront and early design services that FLIR offers through sales support engineers and through our Raven Site Planning Tool help reduce the risk of non-conformance and ensure design stays on budget. The end result is optimal system performance and peace of mind,” Roberts from FLIR explained. “At FLIR, we strive to be the airport’s trusted partner not just for today’s security needs, but also for the future.” Enhanced security and safety at the airport “The solution provides ongoing visibility of vehicle and cycling traffic along the outer fence line, as well as the movement of aircraft, cargo loaders, delivery trucks and service vehicles within the perimeter,” Castle said. He added, “Bottom line is that the safety of passengers, airline employees and service workers is greatly enhanced, and the expanded situational awareness gives the airport more options for responding to potential areas of concern.” Having successfully implemented a robust FLIR PIDS solution to protect the airport perimeter, SJC plans to execute more security improvements on the interior side of the airport. Future upgrade SJC has a robust network of security cameras throughout ticketing areas, Transportation Security Administration entry points, terminals, concourses and additional newly built airport areas. The airport is continually evaluating camera locations for upgrades to newer equipment to provide increased coverage or higher resolution camera views. Storage archivers and updated client workstations are also planned for as budgets get approved. By partnering with FLIR, SJC is able to utilize the advanced technology available on the market to provide safety and security and ensure the airport remains a thriving transportation hub that attracts new travelers.
OPTEX Teams up with Mobile Pro Systems to create a Rapid Security Deployment Solution for a high-end condominium builder in Extreme Weather Conditions. The solution was required for a large construction site for Cove Properties, one of Alberta, Canada’s premier luxury condo builders. Weather conditions With many developers and construction companies building throughout the year, they're forced to battle a myriad of different weather conditions including rain, sleet, snow and extreme cold. On top of this, they still face the inevitable problem of theft and vandalism. Theft of tools, machinery, new materials and scrap material cost contractors millions of dollars per year and leaves the construction companies and their sub-contractors with the effect of having to deal with their losses. The general contractors and developers feel the chain reaction as well, as they have to deal with higher insurance premiums and weeks and months of project delays. To avoid the major effects of construction site theft, Cove Properties turned to 2020 Digital Security Solutions of Alberta, Canada for help. Cove’s requirements included a mobile solution capable of wireless communication that could be moved from site to site with surveillance, motion detection, lighting and remote monitoring capabilities. In addition, it had to survive the harsh outdoor elements of Northern Canada. Powering network and surveillance solution 2020 Digital Security Solutions took all of Cove’s requirements into consideration and found the perfect solution in the PowerSentry by Mobile Pro Systems. The PowerSentry is a self-sufficient, temporary, semi-permanent or permanent surveillance solution. Cove is using 6 Redscans with 2 fixed cameras on six poles, and ran power to each pole Built as a “power platform”, it can power anything from surveillance, security, communications and/or network technologies. And with its universal mounting options, the PowerSentry can be mounted to a pole, a wall or tripod or can be easily hooked over a fence or roof parapet for superior mobility. It accepts 90-277VAC to minimize re-wiring and is equipped with a high quality Lithium-Ion battery pack as a backup power source due to loss of power or power outages. In addition, the PowerSentry has a unique remote system status and control software called Power Broker, which monitors the PowerSentry’s battery voltage, current power usage, displays active map GPS monitoring, intrusion detection reporting, warning and flood lighting control and horn/speaker control. Motion-activated floodlights To help solve the limited daylight obstacle, 2020 DSS had two 8,000 lumen LED flood lights mounted to the chassis of the PowerSentry. The LED floodlights are motion activated and have a pre-determined setting of how long they will stay on. The lights can also be turned on and off manually through the Power Broker software. “Due to the short amount of daylight during the winter months, the flood lights will help light the site in the evening hours and after hours if there is a breach in the perimeter,” said Gene Telfer, president of 2020 DSS. The perimeter and the interior of the construction site is protected by an Optex RedScan laser perimeter detection device which was connected to the PowerSentry and mounted 8’ below providing a 200’ horizontal area of detection. “We decided to mount the RedScan below the PowerSentry instead of on it because we will get a wider detection range and a firmer detection trigger,” Telfer said. Optex Redscan laser detectors With abnormal cold temperatures hitting the Northern United States and almost all of Canada, the first test was in late December into early January when normal temperatures fell to -40°F and -60°F with the wind chill. “The systems are working great and we haven’t had a system go down at all,” Telfer said. According to Telfer, Cove is using 6 Redscans with 2 fixed cameras on six poles, and ran power to each pole that made installation very quick and easy. They are using Milestone video management software that integrates with the cameras and Redscan laser detectors for visual verification and event response in one platform.
Renowned consultants have specified OPTEX's REDSCAN laser detector as their choice for securing medical marijuana Grow Op facilities. U.S. retail cannabis sales will rise more than five-fold over the next five years, from an estimated $2.2-$2.6 billion in 2014 to $7.4-8.2 billion in 2018, according to new financial data released in the 2014 edition of the Marijuana Business Factbook. Because of this growth, local governments are setting strict regulations including detailed security specifications to prevent theft or diversion of medical marijuana at “Grow Op” facilities. In addition, security specifications outline how companies communicate, assist and alert local law enforcement of unlawful activities. Part of this specification outline focuses on perimeter intrusion and surveillance systems. Video Management Software REDSCAN’s state-of-the-art motion detection technology meets state-by-state security specifications To meet perimeter intrusion and surveillance system requirements, the renowned consultants have specified OPTEX’s REDSCAN Laser Detectors as their choice for securing medical marijuana Grow Op facilities. With large deployments across North America, REDSCAN has proven to be highly effective due to its flexible motion detection capabilities, IP integration into leading Video Management Software (VMS) and its ability to be deployed across multiple perimeter applications utilizing indoor and outdoor functions. REDSCAN’s state-of-the-art motion detection technology meets state-by-state security specifications and is both UL and FDA approved. Effective IP intrusion REDSCAN can detect an object's size, speed and distance with precision accuracy. It provides a number of flexible detection applications within the Grow Op's perimeter. It can be mounted horizontally to actively detect and track objects or vertically mounted to create invisible laser walls triggering cameras to preset positions. Because all remotely monitored security systems rely on a motion trigger, REDSCAN works seamlessly with surveillance cameras preventing and/or recording theft and diversion of medical marijuana. Because Redscan is integrated with all the popular video management software, its users now have highly effective IP intrusion, surveillance and security event management options.
viisights, the developer of innovative behavioral understanding systems for real-time video intelligence based on AI, announced that it has deployed a smart city traffic monitoring system in the city of Ashdod, leveraging the NVIDIA Metropolis intelligent video analytics framework. “This project signifies how smart cities like Ashdod increase safety, mobility and quality of life by state-of-the-art traffic monitoring driven by computer vision-based on AI,” said Asaf Birenzvieg, co-founder and CEO of viisights. “viisights traffic monitoring capabilities are based on our revolutionary video understanding technology that helps in analyzing hundreds to thousands of real-time traffic video streams and alerting on complex traffic situations, including accidents, hazards and predicting and managing traffic congestion. We see this project as an example of how a city can be really smart and as a validation of the growing demand for our behavioral understanding solutions.” Intersection blocked Using NVIDIA GPUs and the DeepStream SDK within NVIDIA Metropolis, viisights’ innovative traffic monitoring system provides highly scalable and cost-effective solutions for real-time analysis of thousands of video streams. viisights video intelligence system deployed in Ashdod provides real-time advanced behavioral understanding of traffic actions and events in live video streams by monitoring intersections, crossroads, roads and streets. This enables municipalities to quickly address events of interest such as accidents, disturbances to traffic (for example, vehicles stopping in a junction or on a sidewalk), road hazards (for example, people getting in and out of vehicles in dangerous areas) and monitor traffic flows and report on various statistics. viisights technology protects public privacy by only analyzing general behavior patterns of individuals, groups, vehicles and traffic-flows. It does not identify faces or license plates. Car collision information This cutting-edge, first-of-its-kind technology from viisights assists municipalities to secure traffic flow, prevent blockage and attend to road hazards, while also enhancing their essential role in securing the life and safety of inhabitants; first responders can arrive faster at scenes of life-threatening situations, minimize injuries, and attend to dangers in traffic and more. “We are extremely proud to be at the forefront of smart city technology by being the first city in Israel to define and use this behavior recognition technology for the benefit of Ashdod citizens,” said Gamliel Edri, technologies & CCTV control room department manager for the city of Ashdod Municipality. “The viisights’ system strengthens our ability to ensure the safety and security of our citizens and even save lives. We look forward to broadening our successful collaboration with viisights to other parts of the city.”
In 2014, when Siete24 began working with the bank, it was operating 800 branches, 27 offices and 3200 ATMs, all requiring round-the-clock protection. Their security infrastructure included more than 90,000 sensors, 15,000 surveillance cameras, 3,000 DVRs and 1,500 access points. To manage this expansive enterprise the bank was operating five independent systems, using legacy software and was heavily reliant on the knowledge of its operators. Julio highlights the scale of the challenge: “In 2014 the bank was receiving two-million alerts per month, which was far more than it could effectively handle.” With the bank planning major expansion, they needed a solution that would not only deliver immediate benefits but have the ability to scale significantly. The solution that met this need was the enterprise incident management system - Qognify Situator from Qognify. Reduction in false alarms The fact that Situator was already tried, tested and proven in the banking sector was an important consideration in selecting the system. Having been in use by Millennium BCP in Portugal since 2011, Situator was able to reduce false alarms from more than 20,000 to 1,200 per annum. Since Siete24 began its work with the bank six years ago, the scope of the project has grown. The number of sites being monitored has doubled and the volume of sensors has increased by 50%. “Today, Situator is handling up to 18 million alerts per month, of which 71,200 are verified and 109 confirmed as incident, each managed using best practice procedures we have defined in the system,” explains Julio. “Despite this dramatic increase in the size of the project, our average response time to critical events has fallen from five minutes in 2016 to just 50-seconds in 2020. We have found that the more alerts we process the more efficient and effective we become.” Qognify Situator has created a positive impact on operational performance, that the bank has recently extended its contract with Siete24 for a further three-years. Julio concludes: “The bank requires that we have 99.9% availability, and we are financially accountable for any losses. Situator has enabled us to not only meet our service level obligations, but has given the bank far more than it anticipated.”
Synectics has secured a multi-site protection contract for a customer whose infrastructure assets are considered critical to national security. Responsible for maintaining an energy network that supplies over 3.9 million homes and businesses, the customer required a centralized system to guard against both physical and cyber threats at five key sites – each recognized as a national asset with corresponding levels of access clearance. The Synectics solution, driven by its Synergy 3 command and control platform, integrates third-party sensors, analytics, cameras, systems, personnel databases, and edge devices. The resulting level of situational awareness gives the team – based at the customer’s state-of-the-art Alarm Receiving Center (ARC) – complete oversight and control of security, safety, and site-management systems at each facility. Electrified perimeter-fence systems As part of the contract, Synectics will also provide a redundant ARC solution for failover scenarios. The core integrations included as part of the project ensure alerts and responses are linked to, and can implement direct control of, door-access systems, intrusion-detection systems, intercom technology, and the electrified perimeter-fence systems deployed at each location. Synectics will conduct a complete system FAT, which includes all specified third-party software and hardware, at its dedicated UK testing facilities. Given the high-risk, high-security nature of the project, the provider’s ability to system-test at such scale was a crucial factor in the contract being awarded. The five locations to be monitored from the ARC are government-authorized to trigger armed response units to deal with imminent or actual threats. Command and control system In addition to meeting technical resiliency specifications, Synectics will be providing cybersecurity consultation The solution will, therefore, employ customized workflows to support incident (alarm) validation and protocol-compliant responsive action. The solution will also see each site equipped with its localised command and control system for on-site management, with the ability to manually and automatically escalate incidents to the ARC team as required. Cybersecurity was a specific focus of the brief. In addition to meeting technical resiliency specifications with authentication and encryption solutions, Synectics will be providing ongoing cybersecurity consultation, working in partnership with in-house specialists to ensure the continuous development of protective measures. Third-Party system Martin Bonfield, UK Sales Manager at Synectics, commented: “The perfect alignment between customer requirements and Synectics’ track record in CNI meant the lead integrator came directly to us with this exciting project. Our credentials and expert team, coupled with Synergy 3’s ability to remotely integrate and interoperate with any third-party system vital to effective operations, meant we ticked multiple boxes." "We are regarded in the industry as a safe pair of hands with the relevant experience, and an innovator with the forward-focused technology required to meet all aspects of the brief.”
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload