Everbridge, Inc., global supplier in critical event management and enterprise safety software applications to help keep people safe and businesses running, has announced that it has achieved a FedRAMP Agency Authorization for its Everbridge Suite solution. FedRAMP (Federal Risk and Authorization Management Program) is a government-wide program that provides a standardized approach to security assessment, authorization and continuous monitoring for cloud products and services. Federal Risk And A...
One factor aggravating concerns about workplace violence in corporate America is the easy availability of firearms. In many states, citizens, including employees, have the right to carry firearms onto a company’s property even though firearms are prohibited in the workplace. In effect, an employee prone to violence may have a firearm as near as their vehicle in the company parking lot. Currently, 23 states in the U.S. have so-called “parking lot storage” laws, which enable em...
Code Blue Corporation, the industry pioneering manufacturer of emergency communication solutions, has promoted Katie Petre to Director of Distribution. In the newly created role, Petre will be responsible for leading sales, marketing and customer service projects with non-enterprise business partners for the organization. Her objectives will include unifying the processes and policies utilized by each department to increase efficiency and enhance Code Blue’s relationships with custo...
If you’re responsible for a medium or large-sized office, it’s more important than ever that you have access to a means of ensuring people’s safety, managing risks and fraud, and protecting property. Any security system that you employ must therefore meet the most demanding commercial requirements of today’s offices, and tomorrow’s. This means thinking beyond a basic intrusion system and specifying a comprehensive solution that integrates smart features like access...
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete...
Video cameras are everywhere, and hundreds more are installed every day. Our society appears to be reaching a point of perpetual surveillance. It certainly feels as if we are always being watched even though it is not yet the case. But as cameras are becoming more common than ever, we are also entering a new era of privacy concerns and sensitivities, as evidenced by GDPR and other such initiatives. We presented this quandary to this week’s Expert Panel Roundtable: Surveillance cameras can...
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?
The upgraded Rave Guardian app now integrates with Rave Alert and allows college communities to easily connect through a custom mobile app. Rave Mobile Safety (Rave), a trusted partner for safety software protecting millions of individuals, revealed updates to its Rave Guardian platform to better equip students and staff to communicate vital campus updates. Rave Guardian, a safety app available for students to stay connected with campus safety officials, faculty and other students, now integrates into Rave Alert, allowing higher education institutions access to both offerings in a single platform. Rave Guardian has been updated to better reach and engage students on mobile devices since they find email and phone calls to be outdated. Students aren't interested in Facebook and Twitter; rather they prefer closed messaging apps like Snapchat and WhatsApp. In fact, Generation Z students are three times more likely to open a chat message through a push notification. However, in a recent survey of higher education institutions, Rave found only 38% of respondents offer a mobile safety app for their campus communities. The lack of institution-backed app adoption on campus shows the opportunity for colleges to implement innovative technology, like Rave Guardian, to better connect with students. Integrated geo-targeting notifications The updated Rave Guardian platform ensures that all tools, from two-way texting features to content directories with information such as specific safety procedures, are united in a single application. Unlike any other communications application available, Rave Guardian provides geo-targeting notifications so campus safety officials can target certain areas of campus with specific alerts. Those alerts are even available when students and faculty may not have cell signals. The app also allows for students to share a live stream of their location with campus safety if they feel they're in a dangerous situation. "Since adopting Rave technology, the ability to quickly and accurately share information has made all three of our campuses safer," said Charles S. DiSalvo, Emergency Manager at Monroe Community College in Rochester, N.Y. "We have seen a 22% increase in the use of Rave Guardian, so it's become integral to how we communicate public safety information." With a push of a button, students can either directly connect to 9-1-1 or campus safety in an emergency Rave Guardian campus communication app With one app to access campus communication tools, resources and key contacts, colleges don't have to rely on outdated communication methods to interact and engage with students. Additional benefits and features in this version of Rave Guardian include: One platform: In two steps, anyone in your campus community is instantly authenticated and can register. Students can update their Rave Alert profiles and always keep their contact information up-to-date. Content portal: Emergency procedures, shuttle schedules and other key resources can be shared with the campus community in a configurable content library to help them stay safe and informed. Call directory: Enable students and staff to easily find assistance and resources through a call directory of important numbers that can be updated and added to in real time. Routable chats: Two-way communications can now be routed to different departments to ensure they're only seen by the appropriate officials. In addition, departments can enable custom auto-responses when their offices are closed. Push notifications: Alongside SMS text and email capabilities, push notifications allow schools to provide messages to students and staff even without cell service and capture more attention. App customization: Schools can customize Rave Guardian's interface and features in real time to create a user experience that will drive more interaction with their community. Emergency call button: With a push of a button, students can either directly connect to 9-1-1 or campus safety in an emergency. Even when they dial 9-1-1 from the app, the school is notified through the incident management console. "The update to the Rave Guardian platform offers our university and college customers with essential tools to promote safety across their campuses," said Todd Piett, CEO of Rave Mobile Safety. "These latest features will drive greater adoption by students and will promote more participation with campus safety."
Artificial intelligence and machine learning are the rage in tech right now and not surprisingly, many cyber companies are beginning to automate an increasing amount of their operations. Some of this is great, particularly when it assists cybersecurity professionals to automate mundane tasks and focus more of their attention on higher level analysis. But so far, machine learning is more hype than helpful for cybersecurity, but that does not mean you can’t automate some tasks to keep your organization safe. Effective Machine Learning Applications At its most basic, machine learning technology is supposed to enable cybersecurity companies to predict the nature of future attacks based on past behavior, similar to how Netflix displays what you want to watch based on what you’ve previously viewed. According to Jack Gold, president and principal analyst at J. Gold Associates, this innovation can assist cyber companies to transition away from a “signature-based” system to detect malware. Instead, he sees more companies adopting a machine learning approach that aims to analyze past incidents in a broader manner and aggregate information from a multitude of sources. Machine learning technology is supposed to enable cybersecurity companies to predict the nature of future attacks Specifically, some machine learning applications for cybersecurity are effective at doing the following: detecting malicious activity, helping security officers determine what tasks they need to complete in an investigation process, analyzing mobile endpoints, decreasing the number of false positive threats, automating repetitive tasks like interrupting ransomware, and potentially closing some zero-day vulnerabilities. A number of tech giants have invested in these capabilities recently, including Google, which is employing machine learning to help protect Android mobile endpoints. Amazon also bought a startup called harvest.AI to help it aggregate and better understand data located on the S3 cloud storage service. Limitations Of AI For Cybersecurity That said, the signal-to-noise ratio for threat intelligence-type automation events isn't effective for most organizations at the moment. The reality is automating threat intelligence - or in other words, identifying adversaries automatically - is difficult to execute within an organization because every company’s threats, vulnerabilities, and risks are unique. Ultimately, machine learning can help cybersecurity outfits, but it can’t replace many important functions. In an article for Forbes, Alexander Polyakov explains well why machine learning’s applications for cybersecurity are limited. He writes, “There will always be a person who tries to find issues in our systems and bypass them. Therefore, if we detect 90% [of] attacks today, new methods will be invented tomorrow.” Cybersecurity outfits can pair their human intellect with machine technology to catch hackers before they do too much damage Put in another way, there is a reason that machine learning is very good at predicting events like the weather. As McAfee CTO Steve Grobman described at McAfee MPOWER, their annual security conference, the weather abides by laws of physics. So even with phenomena such as global warming, the weather will largely act in the future based on how it has been in the past. Pairing Human Intellect And Machine Technology Cyber attacks, meanwhile, are the complete opposite. Hackers become smarter, and are always one step ahead of cybersecurity officers, inherently and frequently shifting their strategies so that CISOs will not detect them. For all the incidents machine learning technology can identify, which is helpful, there will always be sophisticated attacks that no machine learning algorithm will be able to find. It is also worth stating a simple fact: Humans hack. While they may use fancy technology to deploy these attacks, it is a human-led effort. Therefore, at the highest level, cybersecurity officers will be the only force able to stop hackers from penetrating critical networks. Machines don’t fully understand us. Only humans can still (and probably always) comprehend hackers’ larger strategy. Instead, cybersecurity outfits can pair their human intellect with machine technology to sort through data faster and catch hackers before they do too much damage. No cybersecurity company should be led by robots -- and that’s a good thing.
The Chertoff Group, a global security advisory firm that provides risk management, business strategy and merchant banking advisory services, today announced that its Security Risk Management Consulting Methodology has been approved as a designated SAFETY Act “qualified anti-terrorism technology.” The Chertoff Group is one of the only professional services companies in the world to have achieved SAFETY Act designation across all industries for its proven Security Risk Management Consulting Methodology. The Chertoff Group developed its SAFETY Act-approved methodology to enable organizations to assess, mitigate and monitor physical and cyber security risks Security risk management According to the Global Terrorism Database, there were 5,367 terrorist attacks directly targeting businesses between 2001 and 2016. The Chertoff Group developed its SAFETY Act-approved methodology to enable organizations to assess, mitigate and monitor physical and cyber security risks to their people, facilities and technology assets as well as to the business operations they support. The service helps clients assess current security measures and, as appropriate, build out a security risk management program to deter, protect against, respond to and recover from key threat scenarios, as appropriate. Additionally, the firm provides a risk monitoring service to evaluate the effectiveness of controls being implemented. The methodology is flexible and modular, allowing it to be applied to address risks specific to an organization’s unique operating environment. “Achieving SAFETY Act designation is a key milestone in the continued advancement of our firm’s thought leadership and advisory services capabilities,” said Chad Sweet, co-founder and CEO of The Chertoff Group. “It puts us in a unique position to help our clients buy down security risk while also addressing liability protection.” To obtain SAFETY Act-approval, The Chertoff Group had to prove that its methodology demonstrated substantial utility and effectiveness Effective anti-terrorism capabilities In 2002, the U.S. Congress enacted the Support Anti-Terrorism by Fostering Effective Technologies (SAFETY) Act to foster development of effective anti-terrorism capabilities by providing important legal liability protections to sellers of capabilities that could save lives in a terrorist attack. The SAFETY Act creates liability limitations for claims arising out of, relating to, or resulting from an act of terrorism where Qualified Anti-Terrorism Technologies (QATTs) have been deployed. The statute has been interpreted to apply to a broad range or combination of technologies, including both products (hardware and software), services and programs. To obtain SAFETY Act-approval, The Chertoff Group had to prove that its methodology demonstrated substantial utility and effectiveness, as well as availability for immediate deployment, among other factors.
The Chertoff Group, a global security advisory firm that enables clients to navigate changes in security risk, technology and policy, today announced the appointment of Robert Anderson as a principal in its Strategic Advisory Services practice. As a recognized expert in cybersecurity, incident response, cyber hacking, counterintelligence and economic espionage, Anderson will advise C-suite clients on strategies to help them grow, manage security risks and protect their commercial businesses. “We enthusiastically welcome Robert Anderson to our award-winning Strategic Advisory Services team,” said Chad Sweet, co-founder and CEO of The Chertoff Group. “Robert possesses unique expertise in industry-leading cyber security threats and incident response strategies. He served as executive assistant director of the FBI in a very distinguished public career. In addition to his more than 20 years of honorable service to our nation, Robert has a successful track record collaborating with clients to tackle their most critical security issues, making him the ideal executive for this leadership role at our firm. Anderson held several senior level positions at the Federal Bureau of Investigation, where he spent more than 20 years rising through the ranks Information Security Expert Prior to joining The Chertoff Group, Anderson served as managing director and practice leader at Navigant Consulting Inc., where he led the initiative to build out their information security practice, exponentially growing the business and offering new services such as “CISO-as-a service.” Before Navigant, Anderson held several senior level positions at the Federal Bureau of Investigation, where he spent more than 20 years rising through the ranks from a special agent in charge to executive assistant director of the criminal, cyber, response and services branch. His top achievements include upgrading the FBI’s technology infrastructure - positioning the bureau as a global leader in complex national security, criminal and cyber investigations - as well as establishing a new, second branch within the international operations division which focuses on intelligence driven international operations, to name a few. “The Chertoff Group is a globally respected advisory services firm that brings unparalleled industry expertise to help clients understand the implications of changes in security risk, technology and policy,” said Anderson. “It is an honor to be a part of this elite team of security experts who are helping clients build resilient organizations, gain competitive advantage and accelerate growth.” The Chertoff Group applies industry insights around security technology, global threats, strategy and public policy to enable a more secure world Cyber Security Solutions An internationally recognized leader in security and risk management advisory services, The Chertoff Group applies industry insights around security technology, global threats, strategy and public policy to enable a more secure world. Through its Strategic Advisory Services practice, The Chertoff Group leverages a trusted approach, proven methodology and deep understanding for security effectiveness to enable clients to reduce cyber and physical risk, protect critical assets and position their enterprise for growth.
Audio is often overlooked in the security and video surveillance industry. There are some intercom installations where audio plays a key role, but it’s not typically thought about when it comes to security and event management. Audio takes a back seat in many security systems because audio captured from a surveillance camera can have a different impact on the privacy of those being monitored. Audio surveillance is therefore subject to strict laws that vary from state to state. Many states require a clearly posted sign indicating audio recording is taking place in an area before a person enters. Analytic information derived from audio can be a useful tool and when implemented correctly, removes any concerns over privacy or legal compliance. Audio analytics on the edge overcomes legal challenges as it never passes audio outside of the camera Focused Responses To Events Audio analytics processed in the camera, has been a niche and specialized area for many installers and end users. This could be due to state laws governing audio recording, however, audio analytics on the edge overcomes legal challenges as it never passes audio outside of the camera Processing audio analytics in-camera provides excellent privacy since audio data is analysed internally with a set of algorithms that only compare and assess the audio content. Processing audio analytics on the edge also reduces latency compared with any system that needs to send the raw audio to an on-premises or cloud server for analysis. Audio analytics can quickly pinpoint zones that security staff should focus on, which can dramatically shorten response times to incidents. Audio-derived data also provides a secondary layer of verification that an event is taking place which can help prioritise responses from police and emergency personnel. Microphones And Algorithms Having a SoC allows a manufacturer to reserve space for specialized features, and for audio analytics, a database of reference sounds is needed for comparisonMany IP-based cameras have small microphones embedded in the housing while some have a jack for connecting external microphones to the camera. Microphones on indoor cameras work well since the housing allows for a small hole to permit sound waves to reach the microphone. Outdoor cameras that are IP66 certified against water and dust ingress will typically have less sensitivity since the microphone is not exposed. In cases like these, an outdoor microphone, strategically placed, can significantly improve outdoor analytic accuracy. There are several companies that make excellent directional microphones for outdoor use, some of which can also combat wind noise. Any high-quality external microphone should easily outperform a camera’s internal microphone in terms of analytic accuracy, so it is worth considering in areas where audio information gathering is deemed most important. Surveillance cameras with a dedicated SoC (System on Chip) have become available in recent years with in-built video and audio analytics that can detect and classify audio events and send alerts to staff and emergency for sounds such as gunshots, screams, glass breaks and explosions. Having a SoC allows a manufacturer to reserve space for specialized features. For audio analytics, a database of reference sounds is needed for comparison. The camera extracts the characteristics of the audio source collected using the camera's internal or externally connected microphone and calculates its likelihood based on the pre-defined database. If a match is found for a known sound, e.g., gunshot, explosion, glass break, or scream, an event is triggered, and the message is passed to the VMS. If a match is found for a known sound, e.g., gunshot, explosion, glass break, or scream, an event is triggered, and the message is passed to the VMS Configuring A Camera For Audio Analytics Audio DetectionThe first job of a well-configured camera or camera/mic pair is to detect sounds of interest while rejecting ancillary sounds and noise below a preset threshold. Each camera must be custom configured for its particular environment to detect audio levels which exceed a user-defined level. Since audio levels are typically greater in abnormal situations, any audio levels exceeding the baseline set levels are detected as being a potential security event. Operators can be notified of any abnormal situations via event signals allowing the operator to take suitable measures. Finding a baseline of background noise and setting an appropriate threshold level is the first step. Noise ReductionA simple threshold level may not be adequate enough to reduce false alarms depending on the environment where a camera or microphone is installed. Noise reduction is a feature on cameras that can reduce background noise greater than 55dB-65dB for increased detection accuracy. Installers should be able to enable or disable the noise reduction function and view the results to validate the optimum configuration during setup. With noise reduction enabled, the system analyzes the attenuated audio source. As such, the audio source classification performance may be hindered or generate errors, so it is important to use noise reduction technology sparingly. Audio Source ClassificationIt’s important to supply the analytic algorithm with a good audio level and a high signal-to-noise ratio to reduce the chance of generating false alarms under normal circumstances. Installers should experiment with ideal placement for both video as well as audio. While a ceiling corner might seem an ideal location for a camera, it might also cause background audio noise to be artificially amplified. Many cameras provide a graph which visualises audio source levels to allow for the intuitive checking of noise cancellation and detection levels. Messages And EventsIt’s important to choose a VMS that has correctly integrated the camera’s API (application programming interface) in order to receive comprehensive audio analytic events that include the classification ID (explosion, glass break, gunshot, scream). A standard VMS that only supports generic alarms, may not be able to resolve all of the information. More advanced VMS solutions can identify different messages from the camera. Well configured audio analytics can deliver critical information about a security event, accelerating response times and providing timely details beyond video-only surveillance. Analytics take privacy concerns out of the equation and allow installers and end users to use camera audio responsibly. Hanwha Techwin's audio source classification technology, available in its X Series cameras, features three customizable settings for category, noise cancellation and detection level for optimum performance in a variety of installation environments.
Located one hour outside of London, the borough of Runnymede is a local government district with over 80,000 residents in the county of Surrey. It is one of the most prosperous parts of the London commuter belt and home to some of the UK’s most expensive real estate. In order to enhance public safety, the borough council contracted service provider Safer Runnymede. Working with Nottinghamshire-based systems integrator Central Security Systems, the experts installed a platform combining public safety technology with personal safety services such as care solutions for the elderly. Bosch Video Security System Today, Safer Runnymede coordinates all connected solutions in a Control Room in the town of Addlestone, where a staff of three operators monitor security feeds from over 500 security cameras deployed around various boroughs within Surrey. Next to public streets in the area, the flexible system also monitors schools, hospitals and other public buildings around the clock. Every year, the team responds to 20,000 incidents from cameras, and the video security system has proven an asset in monitoring traffic, preventing crime, as well as providing evidence and following suspects after incidents. But achieving this level of integration was a challenge. Connecting the solutions via the BVMS allowed Runnymede to become one of the first councils to invest in a fully IP-based infrastructure Initially, the video security system consisted of hardware from several different manufacturers including Bosch – making updates or replacements a time-consuming process – that was networked on a Bosch Video Recording Management (VRM) solution. Looking for a future-proof and scalable system built on an integrated software platform, the officials in Runnymede tasked Bosch to design a fully IP-based security camera architecture. IP Video Surveillance System Since the Safer Runnymede system already included a Bosch monitor wall plus encoders, cameras, VRM and storage devices, system integrators could leverage the initial investment into a full suite of Bosch solutions. The system now combines new high-resolution AUTODOME IP 4000, AUTODOME IP 7000, MIC IP 7000 moving cameras, and FLEXIDOME IP 7000 fixed cameras, plus older Bosch and third-party analog cameras paired with encoders, decoders, and DIVAR IP 3000, 5000, 6000, and 7000 recorders. Connecting these solutions via the Bosch Video Management System (BVMS) allowed Runnymede to become one of the first councils to invest in a fully IP-based infrastructure. The flexible system design and management has provided an integrated approach to our business delivery" As a result, Safer Runnymede has benefitted from superior image quality delivered by the added network video security cameras, without the need of replacing the complete existing analog video security infrastructure; all in a resilient, easily expandable system at a reduced total cost of ownership (TCO). What’s more, the customer has used the flexibility of Bosch solutions in a deployable video surveillance camera at remote locations. Installed in a custom-built enclosure provided by Central Security Systems, it streams video data from an AUTODOME IP 4000 camera via 4G and sends alerts via SMS to the Control Room upon detecting activity such as illegal waste dumping. Bosch Video Management System Migrating from a fragmented, analog system to an integrated IP network managed via BVMS (Bosch Video Management System) has proven a forward-facing decision. “The flexible system design and management has provided an integrated approach to our business delivery, allowing us to make better operational decisions and become more dynamic and competitive in the video surveillance marketplace, “says Les Bygrave at Safer Runnymede.
Major events require a major security operation, and the recent Royal Wedding was one of the biggest operations in recent times. Security was heightened due to the importance of the occasion due to the potential threat of terror to such a major event. There was a drone no-fly zone put in place, however this measure does not necessarily stop drones from entering the area. This kind of measure is put in place to ensure the safety of the attendees, and to limit the threat posed by drones, but it doesn’t prevent it. Drone License Plate Detection System How can you ensure that these measures are adhered to? Drone detection systems are becoming more prominent. DJI’s recently released Aeroscope is ground-breaking Commercial drone experts COPTRZ supplied a number of units to law enforcements agencies involved in security at the Royal Weddingtechnology. It’s a purpose-built drone detection system that allows the operator to track telemetry data from DJI aircraft in surrounding airspace within a radius of up to 20km. It’s in effect, a drone license plate detection system, as well as a data provider. Commercial drone experts COPTRZ recently supplied a number of units to law enforcements agencies and made the technology available to various agencies involved with the security at the Royal Wedding. Monitoring And Intercepting Drone Intrusion The Aeroscope will be used by the law enforcement agencies to protect high profile events. Particularly following the recent Royal Wedding’s no-fly-zone, Aeroscope is a useful tool to ensure that drones in the air near the zone are monitored and if needed are intercepted to ensure the security of the wedding attendees and the royal family alike. Steve Coulson, Managing Director and Founder of COPTRZ has commented on the deal: “We are absolutely delighted to be able to supply drone detection systems to law enforcement agencies. Particularly with big events such as the Royal Wedding and the upcoming World Cup, it’s imperative agencies take advantage of the technology available to them. It’s only a matter of time until technology like the Aeroscope become a necessity for law enforcement agencies worldwide.”
To provide a practical solution to the monitoring of transportation infrastructure, where maximum situational awareness is paramount, Bosch Building Technologies has combined the innovation behind its video security cameras with the video management expertise of Intelligent Security Systems (ISS). ISS is a global developer of video management and video intelligence solutions. The video management platform, SecurOS, focuses on securing large mission-critical applications, such as industrial and manufacturing sites, transportation systems, banks, sports arenas, retail locations, and campuses and office complexes. ISS’ differentiating video intelligence and image analytics solutions, whether it is Face Capture & Recognition (SecurOS FACE), License Plate Recognition (SecurOS AUTO License Plate Recognition), or Container Character Recognition (SecurOS CARGO), provide effective monitoring solutions to the transportation sector. The capabilities stretch to large-scale entry and exit points such as ports, borders and airport car parks Surveillance Challenges Transportation security provides surveillance challenges in varying degrees of situation and scale, so effective license plate recognition is crucial. From tunnels and bridges, where a situation can change in seconds, to regulating traffic flow into a city and capturing a profile of each vehicle, Bosch and ISS can provide answers to the questions that matter. Has a particular vehicle been permitted access to a specific area? Has that vehicle been stolen? What’s the insurance or toll subscription status? Has that vehicle been authorized to operate as a taxi? The capabilities even stretch to large-scale entry and exit points such as ports, borders and airport car parks. Vehicle Monitoring Monitoring which vehicles are entering an area, and checking their legitimacy to be there, has never been more critical. Having the capability to capture license plates of every vehicle moving in the designated area gives users complete awareness of traffic flows and usage patterns, allowing them to configure and manage their monitoring preferences efficiently and permit secure data exchanges with other operational management systems and services for efficient infrastructure alignment. If driving conditions were perfect all-year round, the job of an operations manager, for example, would be quite straightforward. But the reality is quite the opposite. That is why the ISS certified Bosch cameras responsible for capturing this data are incredibly robust and built to produce usable images 24/7 in the harshest conditions, including after dark by employing a supplementary infrared light. The selected cameras have a special License Plate Recognition (LPR) mode which is developed in collaboration with ISS to deliver accurate information even when faced with the challenges of glaring headlights and fast-moving vehicles. Interpreting video data directly at source helps to improve levels of security substantially and can also offer clear business advantages SecurOS AUTO License Plate Recognition High standards are applied to the quality of the images captured. By incorporating the SecurOS AUTO License Plate Recognition (LPR/ANPR) solution, Bosch and ISS can provide several unique benefits for users, including the ability to accurately capture license plate information at 210 km/h (130 mph) in all kinds of weather conditions, including light fog, rain, and snow. Furthermore, utilizing advanced algorithms results in a level of accuracy that can distinguish letters from numbers (so an “8” is not mistaken for a “B,” for example) which is a crucial advantage, particularly in emergency situations. The partnership with ISS supports Bosch’s belief that the logical next-step for security is to enable customers to repurpose the vast amounts of video data that they now can capture. Interpreting video data directly at source helps to improve levels of security substantially and can also offer clear business advantages.
Airbus has expanded the range of its application portfolio for the Tactilon Dabat and partnered with new professional application developers. The aim is to better serve the communications markets in the field of public safety, transportation and healthcare. At the CCW exhibition in Berlin from 15 to 17 May 2018, Airbus is showcasing selected applications for professionals that combine multimedia real-time functions with highest standards of security. “The apps that we showcase at the CCW work in various areas, whether it is industry, public safety or the health sector. They meet specific customer needs and requirements for different regions in the world,” explains Rahim Zaknoun, Head of Innovation & Developer Ecosystem at Secure Land Communications of Airbus. "We selected these apps for our customers and created them for the hybrid Tactilon Dabat.” For instance, the digitalized Triage application from Exomi helps first responders (paramedics) to send complex health data of patients from the ambulance on the scene to the hospital. The delivery of the constantly updated information is standardized and reliable. It can easily be shared not only via the Tactilon Dabat, the Android smartphone and Tetra radio in one device, but also on other platforms in control rooms or in the field. Thus, the application streamlines processes and accelerates a more accurate treatment for the patients. Commanders and group members (Tetra and smartphone users) can easily follow each other on the Dabat’s display based on a map configuration with GPS Live Video Sharing Platform The application ES-Core features a live video sharing function that is secure and supports external video sources, such as from drones or vehicles. Even with little radio coverage the transmission is of high quality. Moreover, footing can be stored as evidence or for the purpose of analysis. “Clearly, this is a tool for police officers. However, paramedics work increasingly with this app on the scene and companies can also master situations by transmitting a live video stream,” says Rahim Zaknoun. Another application can fill frequently the gap of non-existing radio coverage in many public buildings: the ‘indoor positioning’ system for large sites creates a real-time situational awareness when communication groups move around in- and outdoors. Based on a map configuration with a GPS function, commanders and group members (Tetra and smartphone users) can easily follow each other on the Dabat’s display. The application serves especially security personnel in airports, train stations, or event sites: no configuration is needed, a seamless in- and outdoor positioning is put in place and the app works without broadband connection. Track Worker Protection In order to save lives of railway track workers and minimize the risk of collisions, the company Intelligence on Wheels invented the app ‘Track Worker Protection’. This application with a clear map display receives permanent train location updates. Our SmarTWISP application developer programme is the key reference point when it comes to creating secure apps" The signals will be sent from the train operator’s control room and the train itself, which is equipped with a Train Collision Avoidance System. Critical scenarios can now be easily managed with the Tactilon Dabat and the ‘track worker protection’. “Our SmarTWISP application developer programme is the key reference point when it comes to creating secure apps,” says Rahim Zaknoun. “It enables the innovation and professional application development on the top of Airbus’ existing communication technology. It boosts our strong developer ecosystem."
Vicon Industries, Inc., designer and manufacturer of video surveillance and access control software, hardware and components has announced that The Cathedral of Saint John the Divine, the largest Cathedral and fifth largest church building in the world, recently completed installation of a Vicon Valerus video management system to secure the Cathedral and surrounding 11.3-acre complex in Manhattan. Valerus VMS As the seat of the Episcopal Diocese of New York, the Cathedral is the site of daily religious services, community programing and social outreach. It also plays host to a busy schedule of art exhibitions, concerts, receptions, public and private events and visiting dignitaries, who have included Nelson Mandela, The Most Reverend Desmond Tutu and President Bill Clinton.The new Valerus system combines over 70 Vicon high-resolution IP cameras, a Valerus application server and multiple recording servers The new Valerus system, installed by the Long Island office of ITsavvy, an IT products and technology solutions provider, combines over 70 Vicon high-resolution IP cameras, a Valerus application server and multiple recording servers. The system’s wide range of cameras include models with powerful zoom that provide detailed coverage of surrounding city streets, and others chosen for their ability to perform well in the low and challenging light inside the Cathedral. Vicon IP Cameras Cameras also provide coverage of the Cathedral’s’ exterior, administrative and residential buildings that support the Bishop, clergy and Diocese, a world-class textile conservation laboratory, visitor center, information booths and surrounding grounds and gardens. The Valerus system is vital for providing safety for all visitors, staff, residents and students, as well as protecting the property and its many valuable artifacts. Cameras are particularly helpful in protecting the Cathedral from liability in slip-and-fall incidents Cameras are particularly helpful in protecting the Cathedral from liability in slip-and-fall incidents. They also document, for the police, any incidents that arise from the Cathedral’s service to the mentally unstable and indigent. Live and recorded video from the Valerus system is frequently shared with NYPD and local security forces from Columbia University and other neighboring institutions. Crime Prevention and Incident Management Keith Hinkson, Director of Security at The Cathedral of Saint John the Divine, says, “The searching feature is so much easier on Valerus, and we can see up to 99 cameras on one screen. This is huge for an institution like ours. I can go from one camera to the next with no trouble whatsoever.” “Vicon is incredibly proud that a world-class institution as prestigious as The Cathedral of Saint John the Divine has entrusted its security to an end-to-end Vicon solution, including our latest Valerus software. Our participation in this project illustrates that Valerus can deliver security effectively to the most high-profile of installations,” said Bret McGowan, Vicon’s Senior V.P. of Sales and Marketing.
The Security Industry Association (SIA) has expressed strong support for MI HB 5828 and HB5830, two bills designed to improve school security across the state of Michigan. Michigan Legislation In a letter to Michigan House of Representatives Committee on Appropriations Chairwoman Laura Cox and Vice-Chair Rob VerHeulen, SIA CEO Don Erickson praised the bills’ creation of a comprehensive school plan and fund to enable local districts to procure security solutions to protect students from malicious perpetrators and update building code requirements to include security measures. “Sadly, our nation’s schools have increasingly become a soft target for mass violence – at Sandy Hook Elementary, recently at Stoneman Douglas High School and in many other attacks,” said Erickson. “We support holistic approaches to improving school safety and security in response to these tragedies – recognizing there is no single action that can be taken that will, by itself, make our schools safe.” SIA is a co-founder of the Partner Alliance for Safer Schools (PASS), a consortium of school security experts Improving School Security SIA represents about 900 security and life safety solutions providers – companies that develop, manufacture and integrate technologies that help keep people and property safe from hazards. These industry leaders strive to introduce robust security solutions integrated into our nation’s K–12 public schools, private academic institutions, colleges and universities. In addition to serving member organizations working to improve security in schools and other environments, SIA is a co-founder of the Partner Alliance for Safer Schools (PASS), a consortium of school security experts that developed threat- and income-based guidelines for schools housing grades K–12 to implement appropriate, layered security measures. These guidelines are available to help guide school investments. Additionally, PASS provides integrators with risk assessments and white papers that can be used when working with schools to evaluate and establish the best security protections for their buildings. SIA believes state assistance like that in the Michigan legislation is a start to addressing key security gaps in schools and is especially critical to high-risk school districts or those with limited budgets.