Bosch has introduced the new Autodome IP starlight 5100i IR moving camera with a new 1/1.8 inch sensor offering 4-megapixel resolution and 30x optical zoom. It offers HDR X combined with starlight technology and dual illumination – integrated IR and white light – to capture images that can distinguish individuals or objects for identification or proof. Complemented with built-in Artificial Intelligence (AI), the camera, when idle, supports operators with object detection in areas of...
IDIS has announced powerful and affordable options for integrating video, access control, life safety, and building management systems between its end-to-end video technology solutions with Gallagher’s access control solutions. This powerful off-the-shelf integration, from Korea’s renowned video manufacturer, gives systems integrators and end users everything that they need for complete, future-proofed site control. It enables straightforward integration of powerful security managem...
Alcatraz AI, the developer of secure frictionless access control solutions, has announced that its Alcatraz AI Rock solution now has capabilities that can detect and prevent tailgating at entrances and in a variety of industries. Countering the menace of tailgating Tailgating is one of the most common and innocent security breaches – an employee opening a door and holding it open, sometimes inadvertently, for a colleague, visitor, or vendor who should not have access. The problem is tha...
VXG, a globally renowned cloud video surveillance provider, is excited to integrate with Seagate Technology’s recently launched Lyve Cloud, a frictionless storage-as-a-service cloud service. The collaboration enables a simple, scalable and cost-optimized solution for companies in need of a white-label cloud video surveillance system or VSaaS solution. Cloud video surveillance Cloud video surveillance is a booming industry with an expected market value of US$ 52.98 billion in 2026 up from...
Checkpoint Systems, a vertically integrated supplier of RFID solutions for retail, has again demonstrated its commitment to innovation by becoming the first manufacturer to have an RFID inlay, featuring the new NXP UCODE 9 IC certified by Auburn University’s ARC Laboratory. Impinj M700-based RFID inlays The exciting announcement follows news that Checkpoint Systems recently became the first company to achieve ARC certification for its Impinj M700-based RFID inlays. By setting another ne...
Offering enhanced security and personalized access control, Nortek Control has launched its new Linear BT135-W Access Control Reader and Linear BT125-W Access Control Reader. The new readers integrate Bluetooth Low Energy (BLE) technologies, providing users intelligent, contactless and secure access control in a slim design, which fits seamlessly into any office or building environment. Furthermore, the new Linear readers provide dealers and end-users several options to customize access control...
U.S. specialist insurance brokerage and risk management firm, Risk Strategies is to roll out CyberCube's Broking Manager, the cyber risks analytics platform for insurance intermediaries. In addition, Risk Strategies will also be using Application Programming Interface (API) components from CyberCube's solutions for analytics. Founded in 1997, Risk Strategies is a globally renowned specialty insurance broker and risk management consultancy. The firm has over 25 specialty practices, more than 2,500 employees and over 100 offices across North America. Broking Manager SaaS application Broking Manager is the first software-as-a-service application that CyberCube has built specifically for the insurance broking community. It offers a streamlined approach to generating financial exposure impact that helps clients make informed decisions on coverage and limits. Broking Manager will allow the Risk Strategies' team to quantify and explain to their clients the sources and financial impact of cyber risk exposure. The platform also produces reports that can be used to educate prospects and clients on potential sources of loss, recent and relevant cyber events, and peer-to-peer benchmarking. CyberCube APIs CyberCube's APIs provide access to the scalable, secure platform that houses CyberCube models, signals, and data CyberCube's APIs provide access to the scalable, secure platform that houses CyberCube models, signals, and data. These external APIs enable the integration of CyberCube's models into a company's business workflow, delivering operational efficiency and streamlining its cyber risk modeling ecosystem. CyberCube's API will play a key role in providing greater insight to clients of Risk Strategies' Cyber Resolute offering that delivers industry-renowned proprietary coverage and 24/7 access to best-in-class cyber response forensics and legal teams, and proactive remediation services. Data-driven, API-enabled commercial insurance Pascal Millaire, the Chief Executive Officer (CEO) for CyberCube, said “This partnership with Risk Strategies is a great example of the incredible innovation occurring in the cyber insurance space." He adds,"Not only is Risk Strategies delivering cutting edge analytics to its clients, drawing on the immense data from the CyberCube platform, but it is also reshaping how insurance institutions can transact efficiently through the power of APIs. Streamlined, data-driven, API-enabled commercial insurance is the future of this market and Risk Strategies is leading the way with CyberCube.” Robert Rosenzweig, Cyber Liability Practise Leader at Risk Strategies, said “As a leader in specialty risk and liability insurance, we're focused on helping clients understand the evolving threat that cyber exposures pose to their businesses. This partnership with CyberCube will let us present our clients with the information we need to help them develop strategies to effectively mitigate their cyber risk.” Portfolio Manager and Account Manager Broking Manager complements CyberCube's two other products: Portfolio Manager and Account Manager, which are designed for risk carriers and are used by renowned companies across the insurance ecosystem.
With resistance to attack and extreme weather, wire-free installation, and battery-powered operation, the new SMARTair i-gate Electronic Padlock is built for use almost anywhere. This new device in the SMARTair wireless access control range enables facility managers to add real-time control to non-electrified gates, cupboards, cabinets, closets, crates, and more, wherever they are and whatever the climate. SMARTair i-gate Electronic Padlock For many organizations, security and access needs to not stop at the perimeter door. Yet, finding reliable locking devices that are easy to operate with an electronic access system can be difficult. Gates and outbuildings are hard to reach with cabling. Access devices may not have the resilience required for reliable operation outdoors. The i-gate is built to meet these challenges. “The new SMARTair i-gate Electronic Padlock helps our customers extend wire-free control to new access points,” said Félix Morán, SMARTair Product Manager at ASSA ABLOY Opening Solutions EMEA. Adaptable locking devices It can be instantly moved to wherever a resistant, adaptable locking device is needed" Félix Morán adds, “It can be instantly moved to wherever a resistant, adaptable locking device is needed. Site managers no longer need to worry about outbuildings, gates, cupboards and more, because they can monitor and control access to them electronically, remotely and in real time, when needed.” Upgrading an existing padlocked closure involves simply swapping the devices and integrating i-gate Padlock into an existing or new SMARTair wireless access control system. No drilling or wiring is required. The SMARTair i-gate Padlock is available in a contemporary black finish with stainless steel shackle. Remote control via SMARTair Web Manager Exterior and interior openings previously unsuited to electronic access control can now be controlled and monitored from a familiar software interface, including remotely from the SMARTair Web Manager. The SMARTair i-gate is compatible with any SMARTair system management option – Standalone, for basic access control functionality, Update on Card, Openow, for access management and unlocking via smartphone, and Pro Wireless Online, for real-time management of every door and system user. Compatible with standard proximity credential technologies The new SMARTair i-gate padlock is robust enough for almost any climate conditions. It has a watertight cover (IP68 rating) and an internal cylinder with Durability EN 15684 Class 6 Certification. It is battery-powered and works with all standard proximity credential technologies, including MIFARE, DESFire, and iCLASS, as well as Bluetooth Low Energy (BLE). When combined with Openow, the mobile solution for SMARTair, users no longer need to carry separate card or fob credentials. Instead, their phone stores secure virtual keys that can be issued, amended, or canceled at any time. Mobile access No one wastes time collecting or validating an access card, because they can unlock the new SMARTair i-gate Padlock with a smartphone. With Openow, if one is carrying a phone, they are already carrying their keys.
Camden Door Controls is pleased to launch its CV-603 2 Door Bluetooth Access Control System. This app-based access control system is designed to provide ‘best-in-class’ security of doors and gates, with up to 2,000 users. The intuitive programming app is Apple and Android compatible, with easy-to-use system setup, user administration, downloadable audit trail and data backup. CV-603 two door controller The CV-603 two door controller includes inputs for readers, door position switch and REX device, and (2) outputs for electrified locking or alarm signal devices. A built-in 433Mhz. receiver supports two button wireless key fobs, providing an ideal solution for parking garage and gate control applications. The CV-603 two door controller is 26, 30 & 37 bit Wiegand reader compatible and features anti-pass back, schedules, first person-in delay, and operator security levels.
A new Code Handle digital PIN lock can be fitted to a standard interior door in less than half a minute. In this short space of time, security for private offices, stock rooms, staff toilets, equipment stores, consulting rooms, home offices, boardrooms and more can get a major security upgrade, with no wires, no keys and no need to run an access control system. Code Handle Code Handle is a locking handle with a built-in digital PIN keypad. It adds keyless electronic security to almost any interior door. The battery-powered handle is designed for fast, easy installation by almost anyone, with no expertise required. But exactly how fast? ASSA ABLOY Opening Solutions launched a competition to find out. Locksmiths, security installers and access experts were invited to enter their installation videos using the hashtag - #ReadySetCode. The winning entry, Jiri Van Hoyweghen from Belgium, completed a Code Handle installation, from start to finish, in just 26 seconds. Easy installation and keyless door security upgrade Installing a new Code Handle is easy, with no wires, no specialist tools, and no drilling Installing a new Code Handle is easy, with no wires, no specialist tools, and no drilling. Two screws attach a Code Handle to almost any interior door, up to 80mm thick. A Code Handle can secure any interior door facing a heavily trafficked space — subtly and with zero hassle. Slim and attractive, it’s brushed steel and chrome exterior looks like any stylish handle. Enhanced door security Keyless entry via up to 9 different user PINs (4 to 6 digits) secures doors, without creating unnecessary key-handling workload. “The main advantage for us is that users can go to the office with no keys, as it provides enough security for our needs,” said Augusta29’s Chief Executive Officer (CEO), Miguel Ángel Villota Mocho. Barcelona’s Augusta 29 locks their flexible office rentals and meeting rooms with 40 Code Handle devices. Auto-locking feature Users enter a PIN code on the handle’s keypad and the door to their rented workspace unlocks. Code Handle’s optional auto-locking feature further enhances office safety. When the door closes, Code Handle locks it automatically. Code Handle also blocks automatically when an intruder enters the wrong PIN code 5 times. It offers a major door security upgrade — in exchange for 26 seconds’ work, or just a little more.
SKIDATA, the globally renowned company in parking access and revenue management, has announced a new technology integration partnership with Openpath, an international company in touchless and modern access control, and workplace safety automation. SKIDATA – Openpath partnership Through this partnership, Openpath’s ground-breaking touchless and mobile access control technology will be integrated into SKIDATA’s parking access and revenue control equipment, in order to permit drivers to enter and exit SKIDATA-equipped parking facilities, using their Openpath credentials. “We are excited to be partnering with Openpath,” said Darrell Smithson, President for North America region at SKIDATA, adding “SKIDATA already makes the world’s most reliable and user-friendly parking equipment. The addition of Openpath’s technology will improve the customer experience by providing seamless entry into parking facilities.” Touchless and mobile access control This partnership will help ensure that SKIDATA will continue to lead the way in providing smart city infrastructure" “SKIDATA has always led the way when it comes to introducing new technological capabilities to the parking industry,” continued Darrell Smithson, adding “This partnership will help ensure that SKIDATA will continue to lead the way in providing smart city infrastructure.” The addition of Openpath’s technology, which provides touchless and mobile access via Bluetooth, Wi-Fi, and LTE technologies, to SKIDATA equipment, will permit drivers to access SKIDATA-equipped parking facilities with their smartphones and other personal devices, as well as via license plate recognition (LPR), allowing drivers to enter and exit parking garages quickly and conveniently, without having to stop and swipe a card, or reach out of their vehicle to validate parking access. Mobile access for parking facilities When drivers approach the parking facility, they can gain access via the SKIDATA app on their personal devices. Bluetooth, Wi-Fi, and LTE connectivity access are most useful for managing permit parking and the technology is perfect for parking owners and organizations, which offer permit parking, including residential facilities, office complexes, universities, hospitals, airports, special events parking, and stand-alone parking garages. James Segil, President and Co-Founder of Openpath, “With this integration, we are excited to further demonstrate how Openpath’s seamless user experience extends beyond just the four walls of a building. Providing safety and simplicity for users throughout their day; from the moment their vehicle enters the parking garage, to the doors, elevators, and turnstiles they use in repetition. End-to-end security solution James Segil adds, “Openpath’s technology enables a completely touchless experience for tenants and guests, and eliminates the need for users to juggle multiple apps or credentials to get where they are going. Our mission is always to deliver end-to-end security, while reducing friction and this integration is another great example of that.”
Security stakes are high at healthcare premises. Patients expect and deserve privacy and safety. Yet, most medical buildings must remain welcoming spaces, many open around the clock. The protection of drugs and confidential data is critical, and every breach demands thorough investigation. Such needs go way beyond what mechanical security was designed to meet. Real-time control and monitoring Hospitals, for example, are often large and spread out. Their locks may need to integrate with fire detection, CCTV, and other building systems. Labs and pharmacies are safer when access is managed with time-limited ‘keys’, which can be revoked. In care homes, security must be matched by convenience for a client group, who may have limited dexterity or learning skills. Here, real-time control and monitoring can help managers to react quickly. Too much is asked of a traditional metal key, if it is expected to do all this. Yet, wired security doors can be an expensive retrofit option. Fortunately, there is a solution: wireless access control. Wireless access control solutions Wireless devices provide the easiest upgrade or replacement for any access control system Wireless devices provide the easiest upgrade or replacement for any access control system, based on mechanical or magnetic locks. Credentials, including RFID smartcards, programmable keys, or secure mobile keys stored on a smartphone, replace cumbersome physical keys. Wireless components make it a cost-effective option to add electronic control to many more areas of a building. With online locking systems, facility managers can monitor and manage premises at any time of day or night, even viewing the status of medicine cupboards or server racks from the same administration software interface. Integrating wireless locks Swapping existing locks for battery-powered cylinders or escutcheons can link a door to an access control system. In one recent survey of access control professionals, 95% of respondents judged system integration with other building/security management functions to be ‘somewhat’ or ‘very’ important. To meet this challenge at the Haute Savoie region’s new hospital, managers selected Aperio locking integrated online with an ARD access management system. Because Aperio locks are wireless, the hospital could introduce more layers of security and secure doors without incurring excessive installation or operating costs, including for sensitive offices and drugs stores. Staff no longer carry big bunches or waste time hunting down keys. Individual permissions are all stored on a single, programmable RFID credential. Battery-powered Aperio devices All battery-powered Aperio devices integrate natively with the central system, so wired and wireless access points at Center Hospitalier Métropole Savoie (CHMS) are managed together, with real-time logs, remote door opening, and free time-slot management. “Having just a single badge, and not having to carry around heavy keys, has been a major advantage for us,” said Béatrice Dequidt, Health Executive at Center Hospitalier Métropole Savoie. “We have implemented internal HR management procedures, creating badges that are automatically integrated into ARD's operating software,” adds Alain Gestin, CHMS’s IT Systems Architect. Powerful, real-time access control Aperio and ARD also maintain compatibility of credentials with the French government’s electronic CPS Aperio and ARD also maintain compatibility of credentials with the French government’s electronic Health Professional Card (CPS), for added staff convenience. Multiple key systems and varied openings, including fire doors, glass doors, offices, pharmacies, car parks, and lifts, plus hundreds of workers and contractors needing different, constantly changing permissions. Faced with these challenges, managers at Hospital MAZ, in Zaragoza, knew mechanical keys could not provide the 21st-century security they needed. SMARTair Wireless online access control Hospital MAZ upgraded locks to SMARTair Wireless Online electronic access control, which keeps facility managers updated in real time. A unified access system is controlled by intuitive software, installed at the central server, and managed via client servers in different departments. Because the SMARTair Wireless Online system updates via communications hubs in real time, security managers implement all changes via the central system, without needing to waste time walking through the hospital, changing rights one door at a time. Employee convenience is greatly enhanced. Staff and contractors carry a single MIFARE smart card programmed with individual access permissions. Cards are personalized to double as employee IDs, so 625 staff and approximately 100 contractors only carry a single card. "We have achieved all our objectives with the installation of the system,” said Miguel Angel Hernández Jerez at Hospital MAZ. Intelligent keys Programmable electronic key systems put the advantages of access control into a familiar form. They reinvent the key for the 21st century, making it more flexible, powerful, and better equipped to handle modern security demands. Lost keys and departed employees are no longer a problem, because their access rights are canceled with a click. The key’s familiarity is welcome to a user group who are not experts — at least, not in access control. CLIQ electro-mechanical locking system CLIQ offers easy-to-use access control, based on high-security mechanical disc cylinders Managing physical keys can impact nursing care, as pharmacy managers at the UK’s Queen Elizabeth Hospital, Birmingham discovered. An older, mechanical system made it difficult to keep track of who held the right keys. Searching for that person wasted valuable time. They identified a better solution for convenient secure access to controlled medicines: CLIQ electro-mechanical locking. CLIQ offers easy-to-use access control, based on high-security mechanical disc cylinders, combined with encrypted electronic locking and identification. With CLIQ, power to the lock is supplied by a standard battery inside every CLIQ key, so no wires are required — making it an ideal retrofit solution for doors, cabinets, and mobile drug trolleys. Each employee carries a single programmable CLIQ key to open any authorized CLIQ lock. No CLIQ device unlocks without the key first being authorized by the software. Remote key management QE Birmingham’s new CLIQ system allows for remote key management. Audit trails for locks and padlocks are available on-demand, so nurse managers can instantly see who has accessed particular cabinets or drug trolleys. “Programmable key solutions really boost medicine safety in hospitals,” said Stephan Schulz, CLIQ Product Manager at ASSA ABLOY Opening Solutions EMEA, adding “Nurses at Queen Elizabeth, Birmingham, carry their own key with personalized access rights, so they don’t waste time finding out who has the key to every cupboard. Patients benefit.” “The message from all nursing staff is that patients are getting medicines much easier and in a more timely fashion,” said Inderjit Singh, Chief Pharmacist at QE Birmingham, adding “For us, the key return on investment is the quality of service we’re providing.” Simple, effective door control without software When installing a Code Handle electronic PIN lock, users need never worry again In any busy medical facility, however small, it is easy to leave a door unlocked. With expensive equipment or controlled drugs on the other side, an opening invites opportunist trouble. But, when installing a Code Handle electronic PIN lock, users need never worry again. A Code Handle fits right over an existing cylinder, users can simply swap the current handle for a low-profile Code Handle, and fix it in place with two screws, to instantly add PIN security to a consultation room, medicine store, or equipment cupboard. It adds electronic security without a bulky push-button door unit, which disrupts interior aesthetics. Code Handle electronic PIN lock solution In Spain’s Basque Country, Fylab sought this easy solution for their consulting rooms. Requirements were straightforward: secure, keyless access around a facility with a lot of daily traffic from professionals and the public. They needed a device that is easy to retrofit, with a design to chime with Fylab’s contemporary medical workplace. Code Handle added this security to three consulting-room doors, without wires or cables. “I am no artist or handyman, but I managed to fit the handles within 10 minutes,” said Fylab’s Founder, Borja Saldias Retegui. Their Code Handle devices lock both wooden and glass doors, keeping equipment and personal belongings safe. “Code Handle provides the simplest solution for access control in a small facility,” Borja Saldias Retegui adds.
The Annual Fraud Indicator estimates that fraud costs the United Kingdom approximately £190 billion every year. The private sector is hit the hardest and loses around £140 billion a year, while the public sector loses more than £40 billion, and individuals lose roughly £7 billion. The effects of fraud can be devastating on both individuals and organizations. Companies can suffer irreversible damage to reputation and be forced to close, and individuals can experience significant personal losses. Everyone should be aware of the risks and take steps to protect themselves against fraudulent activity. Fraud detection technology Fraud detection technology has advanced rapidly, over the years and made it easier for security professionals to detect and prevent fraud. Here are some of the key ways that Artificial Intelligence (AI) is revolutionising fraud detection - with insight from Tessema Tesfachew, the Head of Product at Avora. An anomaly can be described as a behavior that deviates from the expected An anomaly can be described as a behavior that deviates from the expected. According to Tessema Tesfachew, “Autonomous monitoring and anomaly detection specifically, have made detecting fraudulent activity faster and more accurate. Machines can monitor data 24/7 as it comes in, build patterns of behavior that take into account seasonality and shifting trends, and identify events that don’t fit the norm.” For example, banks can use AI software to gain an overview of a customer’s spending habits online. Having this level of insight allows an anomaly detection system to determine whether a transaction is normal or not. Suspicious transactions can be flagged for further investigation and verified by the customer. If the transaction is not fraudulent, then the information can be put into the anomaly detection system to learn more about the customer’s spending behavior online. Accurate root cause analysis Root cause analysis goes one step further than anomaly detection, by allowing security professionals to pinpoint what caused the anomaly. Tessema explains how an example of this would be if a system detects that the rate of fraudulent transactions has increased. Root cause analysis would pinpoint the specific ATM or point of sale, where this increase is occurring. Swift action can then be taken to prevent fraudulent activity at that location in the future. Fewer false positives As mentioned, false positives can occur if a fraud detection system identifies behavior that goes against the norm, for instance, if a customer makes a transaction in a new location. In many cases, customers are required to complete identity verification to prove that a transaction is not fraudulent. Digital customer identity verification can help brands build a strong and reputable image. That said, forcing users to complete identify certifications regularly can cause frustration and harm the customer experience. AI anomaly detection AI fraud detection systems can carry out accurate data analysis in milliseconds and identify complex patterns in data AI anomaly detection is far more accurate and results in fewer false positives. Increasing the accuracy of anomaly detection helps companies improve customer relationships and build a strong reputation. This will have a positive impact on brand image and sales revenue. AI fraud detection systems can carry out accurate data analysis in milliseconds and identify complex patterns in data. Machines are more efficient than even the most skilled fraud analysts and make fewer errors. This is why AI fraud detection software is the preferred option in larger organizations. Importance of fraud analysts However, fraud analysts still play an important role in fraud prevention. Using a combination of human intervention and AI is usually the most effective approach when it comes to fraud detection. According to pymnts.com, innovative organizations now use a variety of AI and supervised and unsupervised machine learning to identify and protect against fraud. AI systems can complete time-consuming and repetitive tasks, such as data collection and analysis. This means that fraud analysts can focus their time and attention on critical tasks that require human intervention, e.g. monitoring risk scores. AI can automate processes and enhance the quality of the fraud analysts’ work. Conclusion In to Tessema Tesfachew’s opinion, “Fraud detection has become vastly more efficient and effective with the introduction of Artificial Intelligence (AI). Previously, methods for detecting fraudulent activities were still data-rich, but relied more on human intervention and expert bias, and were thus, more time consuming and prone to error.” AI technology, particular anomaly detection, has streamlined fraud detection and created a more efficient, and accurate system for detecting and preventing fraud. Covid-19 has increased the number of online transactions, which creates more opportunities for fraudulent activity. However, it also allows businesses to gain more information on their customers and enhance the capabilities of AI security software. It is more important than ever for organizations to utilize AI technology in fraud detection strategies.
Enclosures containing electronics, communications or cabling infrastructure offer a simple attack point for cyber breaches and an opportunity for a physical attack on the hardware. Yet, many of these assets are housed within enclosures that provide minimal security features to offer a deterrent to any would-be attacker. This has always just been a pet hate. Walking down the high street of a town anywhere in the United Kingdom, you can often see open street communication cabinets. You can actually look directly inside at the equipment. And if I was a bad guy, I could quite easily just put my foot into their enclosure and quite quickly take out their infrastructure. Charged service for enclosures This seems crazy when a US$ 2 magnetic contact on a door can quickly tell you whether your enclosure is open or shut, and can be vital in keeping your network alive. Moreover, the operators of these systems, whether it is telecoms or internet providers, are providing a charged service to their customers, so they should really be protecting their enclosures. Why has that security level not been so readily taken into the outside world, into the unprotected environment? More sobering, if you contrast this security approach to the approach taken in the data center world, an environment that already has multiple stringent security protocols in place, you get a very different picture. For instance, security devices can capture snapshots of anyone who opens a cabinet door in a data room, so it is recorded who has opened that door. While that is just one simple example, it begs the question. Why has that security level not been so readily taken into the outside world, into the unprotected environment? In my mind, a lot of it boils down simply to education. Network connection, easy point of cyber attacks Our preconceived idea about cyber security is some big corporation being knocked out or held to ransom by, again in our mind, someone sitting at a laptop, probably with their hood up over their head, typing away in the darkness, attacking us through the internet. But how the would-be criminal is going to come at us is just like in sport. They attack at the weakest point. Networks can be deployed in the outside world in many ways, such as cameras monitoring the highways. That means those locations will have a network connection. And that can be a point of attack in a non-secure outside world. Enclosures can be broken into by attackers Many people think, ‘That is okay because I’m going to take that ethernet device that my cameras are connected to and I’m going to put it inside an enclosure.’ However, what people do not realize is that the only thing that the enclosure is doing is protecting the ethernet device from Mother Nature. Because, without proper security, those enclosures can be broken into pretty easily. Many of them are just a single key that is not in any way coded to the device. Twofold cyber security People need to realize that cyber security is twofold. It can be carried out by hacking the network or physically breaking Therein lays the problem. People need to realize that cyber security is twofold. It can be carried out by hacking the network or physically breaking into the weakest physical point. And so, a simple boot through the open door of an enclosure can vandalise the devices inside and take down a small or large part of a network. And by definition, this meets the criteria for a cyber-attack. So, how do we go about tackling this problem? Well, security is a reaction marketplace. And for enclosures, there’s not, at present, a plethora of solutions out there for to counter these types of attacks. It can be challenging to find what you’re looking for through a quick Google search compared to searching for more traditional security protection measures. Deploying smart sensors and detectors But, under Vanderbilt and ComNet, we are currently taking our knowledge and experience from system installation and compiling it together. We’re bringing different products from different parts of our business to make a true solution. For instance, we have sensors for enclosures that detect anything from gas or smoke to open doors, detectors that will tell you if someone is trying to smash open your enclosure with a sledgehammer, or that someone is trying to lift your enclosure off of its mount. More importantly, as is not really a one-size-fits-all solution, we have developed a menu structure available that allows customers to pick and choose the ones that will best fit their own requirements.
While the application of facial recognition within both public and private spheres continues to draw criticism from those who see it as a threat to civil rights, this technology has become extremely commonplace in the lives of iPhone users. It is so prevalent, in fact, that by 2024 it is predicted that 90% of smartphones will use biometric facial recognition hardware. CCTV surveillance cameras Similarly, CCTV is a well-established security measure that many of us are familiar with, whether through spotting images displayed on screens in shops, hotels and offices, or noticing cameras on the side of buildings. It is therefore necessary we ask the question of why, when facial recognition is integrated with security surveillance technology, does it become such a source of contention? It is not uncommon for concerns to be voiced against innovation. History has taught us that it is human nature to fear the unknown, especially if it seems that it may change life as we know it. Yet technology is an ever-changing, progressive part of the 21st century and it is important we start to shift the narrative away from privacy threats, to the force for good that LFR (Live Facial Recognition) represents. Live Facial Recognition (LFR) We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition Across recent weeks, we have seen pleas from UK organizations to allow better police access to facial recognition technology in order to fight crime. In the US, there are reports that LAPD is the latest police force to be properly regulating its use of facial recognition to aid criminal investigations, which is certainly a step in the right direction. While it is understandable that society fears technology that they do not yet understand, this lack of knowledge is exactly why the narrative needs to shift. We understand the arguments from those that fear the ethics of AI and the data collection within facial recognition, we respect these anxieties. However, it is time to level the playing field of the facial recognition debate and communicate the plethora of benefits it offers society. Facial recognition technology - A force for good Facial recognition technology has already reached such a level of maturity and sophistication that there are huge opportunities for it to be leveraged as a force for good in real-world scenarios. As well as making society safer and more secure, I would go as far to say that LFR is able to save lives. One usage that could have a dramatic effect on reducing stress in people with mental conditions is the ability for facial recognition to identify those with Alzheimer’s. If an older individual is seemingly confused, lost or distressed, cameras could alert local medical centers or police stations of their identity, condition and where they need to go (a home address or a next of kin contact). Granted, this usage would be one that does incorporate a fair bit of personal data, although this information would only be gathered with consent from each individual. Vulnerable people could volunteer their personal data to local watchlists in order to ensure their safety when out in society, as well as to allow quicker resolutions of typically stressful situations. Tracking and finding missing persons Another possibility for real world positives to be drawn from facial recognition is to leverage the technology to help track or find missing persons, a lost child for instance. The most advanced forms of LFR in the market are now able to recognize individuals even if up to 50% of their face is covered and from challenging or oblique angles. Therefore, there is a significant opportunity not only to return people home safely, more quickly, but also reduce police hours spent on analyzing CCTV footage. Rapid scanning of images Facial recognition technology can rapidly scan images for a potential match Facial recognition technology can rapidly scan images for a potential match, as a more reliable and less time-consuming option than the human alternative. Freed-up officers could also then work more proactively on the ground, patrolling their local areas and increasing community safety and security twofold. It is important to understand that these facial recognition solutions should not be applied to every criminal case, and the technology must be used responsibly. However, these opportunities to use LFR as force for good are undeniable. Debunking the myths One of the central concerns around LFR is the breach of privacy that is associated with ‘watchlists’. There is a common misconception, however, that the data of every individual that passes a camera is processed and then stored. The reality is that watch lists are compiled with focus on known criminals, while the general public can continue life as normal. The very best facial recognition will effectively view a stream of blurred faces, until it detects one that it has been programmed to recognize. For example, an individual that has previously shoplifted from a local supermarket may have their biometric data stored, so when they return to that location the employees are alerted to a risk of further crimes being committed. Considering that the cost of crime prevention to retailers in recent years has been around £1 billion, which therefore impacts consumer prices and employee wages, security measures to tackle this issue are very much in the public interest. Most importantly, the average citizen has no need to fear being ‘followed’ by LFR cameras. If data is stored, it is for a maximum of 0.6 seconds before being deleted. Privacy Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story Privacy is ingrained in facial recognition solutions, yet it seems the debate often ignores this side of the story. It is essential we spend more time and effort communicating exactly why watchlists are made, who they are made for and how they are being used, if we want to de-bunk myths and change the narrative. As science and technology professionals, heading up this exciting innovation, we must put transparency and accountability at the center of what we do. Tony Porter, former Surveillance Camera Commissioner and current CPO at Corsight AI, has previously worked on developing processes that audit and review watch lists. Such restrictions are imperative in order for AI and LFR to be used legally, as well as ethically and responsibly. Biometrics, mask detection and contactless payments Nevertheless, the risks do not outweigh the benefits. Facial recognition should and can be used for good in so many more ways than listed above, including biometric, contactless payments, detecting whether an individual is wearing a facemask and is therefore, safe to enter a building, identifying a domestic abuse perpetrator returning to the scene of a crime and alerting police. There are even opportunities for good that we have not thought of yet. It is therefore not only a waste not to use this technology where we can, prioritising making society a safer place, it is immoral to stand by and let crimes continue while we have effective, reliable mitigation solutions.
Growth is accelerating in the smart cities market, which will quadruple in the next four years based on 2020 numbers. Top priorities are resilient energy and infrastructure projects, followed by data-driven public safety and intelligent transportation. Innovation in smart cities will come from the continual maturation of relevant technologies such as artificial intelligence (AI), the Internet of Things (IoT), fifth-generation telecommunications (5G) and edge-to-cloud networking. AI and computer vision (video analytics) are driving challenges in security and safety, in particular, with video management systems (VMSs) capturing video streams and exposing them to various AI analytics. Adoption of disruptive technologies “Cities are entering the critical part of the adoption curve,” said Kasia Hanson, Global Director, Partner Sales, IOT Video, Safe Cities, Intel Corp. “They are beginning to cross the chasm to realize their smart city vision. Cities are taking notice and have new incentives to push harder than before. They are in a better position to innovate.” “Safety and security were already important market drivers responsible for adoption of AI, computer vision and edge computing scenarios,” commented Hanson, in a presentation at the Milestone Integration Platform Symposium (MIPS) 2021. She added: “2020 was an inflection point when technology and the market were ripe for disruption. COVID has accelerated the adoption of disruptive technologies in ways we could not have predicted last year.” Challenges faced by cities Spending in the European Union on public order and safety alone stood at 1.7% of GDP in 2018 Providing wide-ranging services is an expanding need in cities of all sizes. There are currently 33 megacities globally with populations over 10 million. There are also another 4,000 cities with populations over 100,000 inhabitants. Challenges for all cities include improving public health and safety, addressing environmental pressures, enabling mobility, improving quality of life, promoting economic competitiveness, and reducing costs. Spending in the European Union on public order and safety alone stood at 1.7% of GDP in 2018. Other challenges include air quality – 80% of those living in urban areas are exposed to air quality levels that exceed World Health Organization (WHO) limits. Highlighting mobility concerns is an eye-opening statistic from Los Angeles in 2017: Residents spent an average of 102 hours sitting in traffic. Smart technology “The Smart City of Today can enable rich and diverse use cases,” says Hanson. Examples include AI-enabled traffic signals to help reduce air pollution, and machine learning for public safety such as real-time visualization and emergency response. Public safety use cases include smart and connected outdoor lighting, smart buildings, crime prevention, video wearables for field agents, smart kiosks, and detection of noise level, glass breaks, and gunshots. Smart technology will make indoor spaces safer by controlling access to a building with keyless and touchless entry. In the age of COVID, systems can also detect face mask compliance, screen for fever, and ensure physical distancing. 2020 was an inflection point when technology and the smart cities market were ripe for disruption, Kasia Hanson told the MIPS 2021 audience. Video solutions Video workloads will provide core capabilities as entertainment venues reopen after the pandemic. When audiences attend an event at a city stadium, deep learning and AI capabilities analyze customer behaviors to create new routes, pathways, signage and to optimize cleaning operations. Personalized digital experiences will add to the overall entertainment value. In the public safety arena, video enables core capabilities such as protection of people, assets, and property, emergency response, and real-time visualization, and increased situational awareness. Video also provides intelligent incident management, better operational efficiency, and faster information sharing and collaboration. Smart video strategy Intel and Milestone provide video solutions across many use cases, including safety and security Video at the edge is a key element in end-to-end solutions. Transforming data from various point solutions into insights is complicated, time-consuming, and costly. Cities and public venues are looking for hardware, software, and industry expertise to provide the right mix of performance, capabilities, and cost-effectiveness. Intel’s smart video strategy focuses around its OpenVINO toolkit. OpenVINO, which is short for Open Visual Inference and Neural network Optimization, enables customers to build and deploy high-performing computer vision and deep learning inference applications. Intel and Milestone partnership – Video solutions “Our customers are asking for choice and flexibility at the edge, on-premises and in the cloud,” said Hansen in her presentation at the virtual conference. “They want the choice to integrate with large-scale software packages to speed deployment and ensure consistency over time. They need to be able to scale computer vision. Resolutions are increasing alongside growth in sensor installations themselves. They have to be able to accommodate that volume, no matter what causes it to grow.” As partners, Intel and Milestone provide video solutions across many use cases, including safety and security. In effect, the partnership combines Intel’s portfolio of video, computer vision, inferencing, and AI capabilities with Milestone’s video management software and community of analytics partners. Given its complex needs, the smart cities market is particularly inviting for these technologies.
Following its recent acquisition, Vidsys will continue to operate, now as an ‘An ARES Security Company’. The Vidsys brand is known worldwide for its PSIM (physical security information management) solution and the acquisition will accelerate the next generation of products that incorporate Artificial Intelligence (AI) to enhance their value to Vidsys clients and the overall market. ARES Security Corporation has developed and deployed security and public safety software solutions for the past 20 years, solving complex physical security challenges. Their AVERT security software solution supports the full lifecycle of physical security operations: risk and technology assessment and design, training, and intelligent real-time incident response. AVERT security software AVERT security software helps clients by increasing security effectiveness and reducing cost AVERT security software helps clients by increasing security effectiveness and reducing cost. Clients are in many market segments including Corporate, Military, Government, Power, Data Centers, Transportation and Ports. Vidsys’ PSIM will immediately be improved by incorporating AVERT C2 (Command & Control), allowing clients access to expanded capabilities and an advanced technical roadmap. “Over time we will migrate the Vidsys technology to our state-of-the-art, multi-tenant SaaS architecture that includes secure, multi-site data sharing, an updated library of connectors, and integration to the AVERT digital twin, artificial intelligence/machine learning and automation capability,” said Ben Eazzetta, ARES Security Corporation’s Chief Executive Officer (CEO). Technical roadmap for upgrading to AI-PSIM platform “We are a client-centric company, and we will continue to support Vidsys clients,” stated Ben Eazzetta, adding “We will focus initial efforts towards closing any required and promised capability gaps and offer a significantly improved technical roadmap for the platform to be upgraded to AI-PSIM.” Additional AVERT products will be made available to Vidsys clients in a ‘cost-effective way’. They include technology for assessment and design, virtual tabletop and virtual reality training and enhanced AI and robotics capability surrounding the digital twin. A ‘digital twin’ is a digital representation of a physical object. Rapid incident response and robotic sentries interfaces ARES/Vidsys solution offers capabilities with extremely high levels of automation for rapid incident response ARES has a strong market position in several verticals that require a robust and automated next-generation AI-PSIM. The ARES/Vidsys solution offers capabilities with extremely high levels of automation that enable rapid incident response and incorporate advanced features, such as interfaces to robotic sentries. “These capabilities, along with a more automated deployment process, will allow Vidsys to scale their acquisition of customers across key verticals in which ARES is already active. This automated deployment process will also open new opportunities to work with system integrators who have shied away from PSIM projects in recent years,” stated Ben Eazzetta. Optimizing security operations ARES believes the physical security market is underserved by technology that optimizes operations. Ben Eazzetta adds, “All of our products are designed to optimize security operation, and the acquisition of Vidsys allows us to accelerate the development of the next generation PSIM that is adaptive and intelligent, powered by AVERT’s AI, and Modeling and Simulation system.” Vidsys pioneered PSIM in the security industry and created a robust library of connectors, providing an integrated real-time incident response system powered by a rules engine. Together, the AVERT/Vidsys solution seeks to transform the way security operations centers (SOCs) operate and respond to emergencies. Vidsys pioneered PSIM in the security industry and created a robust library of connectors Managing security at multiple sites Ben Eazzetta said, “There’s no denying that some in the security industry see PSIM as a four-letter word. But PSIM exists because it meets a need in the security operations center that cannot be met by either video management or incident management systems. It is critical that PSIM evolves to meet the rapidly changing demands of enterprise clients.” He adds, “Our clients need to manage security at multiple sites, each with different security plans and threats, they need adaptive rules engines to manage complex incidents and emergency responses, and they need automation to seamlessly command and control all security assets, including robotic assets.” Flexible and intelligent software Future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation “The future of command-and-control will need to be flexible, intelligent software with extremely high levels of automation that enables very rapid incident response and incorporates advanced capabilities such as interfaces to robotic sentries,” said Ben Eazzetta. He adds, “To achieve this, we are replacing the brittle, difficult-to-configure rules engine of today’s PSIM with machine learning and AI capabilities that can produce automated/optimized responses or recommendations in near real time.” SaaS-enabled and remotely hosted system The systems will be SaaS-enabled, remotely hosted and easily configurable to reduce the cost and time of deployments for large enterprise implementations and easily supported by end-users, and system integrators. In a post-Covid-19 world, it is critical that enterprise security software solutions be adaptive, intelligent, automated and offer the ability for disparate teams to share information and collaborate in a meaningful way, while responding to incidents and emergencies in real-time. The ARES/Vidsys offering is a lifecycle solution that meets the needs of enterprise security operations. Next-generation of AI-PSIM “ARES has always pushed the needle of what is possible with our AVERT solution, ever since development of our digital twin technology began in 1999 to protect our nation’s nuclear stockpiles,” said Ben Eazzetta, adding “Today, we continue to innovate with the next generation of AI-PSIM.” So what’s ahead for ARES and Vidsys in 2021? “A lot of Zoom calls!” laughs Eazzetta, adding “We are excited to leverage the decades of hard work that both teams have put into our solutions. We all realize the fantastic opportunity we have been given to create a next-generation AI-PSIM and to open new markets for all of our products and solutions.” He adds, “Combining the two companies will lead to improved development/support capability and significantly improved roadmaps for our clients. We will provide immediate ROI for clients by lowering deployment costs and leveraging the entire suite of products to provide more immediate value while continuing to deliver as promised, like ARES always does.”
Video, access control and visitor management are among the technologies that are enabling greater safety and security at hospitals and other healthcare facilities. Video surveillance systems enable hospital management and security professionals to know what goes on in and around a medical facility. Recording images in high resolutions (megapixels and gigapixels) is becoming more and more important in healthcare, says Jason Ouellette, Product Line Director – Access Control, Tyco Security Products. Video event management software Video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes If an incident occurs in a medical facility, the security staff has to be able to identify faces easily and accurately. Storage and costs have to be considered, of course. With technology improving and prices decreasing, video solutions can even be used for purposes beyond traditional security. For example, video analytics are now being leveraged for patient tracking, asset tracking, and operational purposes, and captured video can be used to defend against liability claims. What’s next? Video analytics will continue to be a valuable addition to any surveillance infrastructure due to its ability to address patient needs, operational efficiencies and early risk detection, says Brandon Reich, Senior Director of Surveillance Solutions, Pivot3. Through video event management software (VEMS), hospitals can customize the statistics that are relevant to their individual buildings or campuses without having to spend extra time or money on rigorous employee training. Data capture form to appear here! Real-Time access control security updates Furthermore, once healthcare facilities are able to digitize all of their patient records, secure any of their ingress and egress points with real-time access control security updates, and fully transition from analog to IP video surveillance cameras, VEMS systems that house analytical software will be able to multiply the benefits offered to hospitals, not just in real time, but in planning ahead for future risk, expansion and safety protocols. It is vital to implement integrated and innovative access control solutions With large, complex facilities, directors of security at hospitals struggle with controlling access to various levels of the facility, according to Eric Widlitz of Vanderbilt Industries. To manage the risks that hospitals face and ensure a comprehensively protected atmosphere for patients and staff, it is vital to implement integrated and innovative access control solutions. For example, ease of access with controlled entrances is vital to medical crash teams, as is the need for a zonal access control lockdown in the event of a contagious disease outbreak. Strict access limitations Different hallways, rooms, floors and waiting areas within a hospital require different amounts of restriction, and sensitive materials, such as medical files, controlled substances and sterile environments (such as operating and procedure rooms) all necessitate an additional layer of protection. Access control in particular has advanced significantly to offer healthcare facilities the ability to control access remotely, through mobile applications, confirm identity quickly and easily and program varying levels of access for visitors, patients, doctors and staff. One area that is recently experiencing rapid growth – and drastic change –is the securing of narcotics within healthcare facilities, says Robert Laughlin, CEO and Chairman, Galaxy Control Systems. In the past, all medicine was controlled in a central pharmacy located somewhere in the hospital or health facility. These pharmacies were highly secured areas, with strict access limitations; only authorized staff could get near the medicine stocks. Fiber optic communication lines For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers To improve the speed of delivery, and to have the necessary medicines ready at hand for in-patients without retaining a large delivery staff, the current trend is to have distributed pharmaceutical closets or carts that hold medicines much closer to the intended patients. For vehicle access control, medical centers and hospitals prefer beam barricades and shallow foundation barriers, according to Gregg Hamm of Delta Scientific. Manual beam barricades are installed at the Fort Bragg Veterans Administration Hospital in North Carolina to shut down certain areas of the facility when a higher alert is sounded. They will stop a 15,000-pound vehicle traveling 50 mph. The Navy Hospital in San Diego uses high speed, high security and very shallow foundation barricades to control all vehicles going in and out of the facility. With their extremely shallow foundation, they obviate the concerns of interference with buried pipes, power lines and fiber optic communication lines. They will stop a 15,000-pound vehicle traveling 50 mph. At the National Institute of Health in Bethesda, Maryland, even stronger shallow foundation barriers are used for traffic control and protection. These barriers will destroy a 65,000-pound (5.4 million foot-pounds) dump truck traveling 50 mph and continue to stand. Physical access control systems Controlling visitors to hospitals and healthcare facilities can directly impact security Controlling visitors to hospitals and healthcare facilities can directly impact security. Traditional methods of visitor management, such as paper visitor logs and handwritten badges are insufficient given today’s variety of security challenges. A hospital using paper-based systems cannot easily cross-check information, confirm patient information, check visitor names against up-to-date watch lists, or visually confirm identity. An increasingly popular and important application is secure and simplified visitor management, integrated with the physical access control systems (PACS). Today’s visitor management systems enable the screening, badging and tracking all visitors or, at a minimum, those visiting critical areas or during ‘after hours’ periods, Quickly identify inappropriate visitors One other growing technology is the ability to link to internal or governmental watch lists, to quickly identify inappropriate visitors before they gain access to the facilities. For example, Visitor Management systems can be configured to perform a Sex Offender search in both Children’s Hospitals and Pediatric areas, further decreasing the likelihood that someone of the list could gain access. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination HID Global and Phunware Inc. are addressing the need of healthcare institutions to deploy standardized technology to provide a better wayfinding and visitor engagement experience inside the hospital, across campus and even in parking lots. The companies are collaborating to improve the experience for hospital patients and visitors to find their way within medical facilities, using wayfinding on their mobile phones. Wayfinding is indoor navigation to guide a person step-by-step on the way to a desired destination. Enterprise-Level mobile wayfinding “It’s easy for visitors and patients to get lost in hospitals, and every time they do it puts appointment times and patient satisfaction at risk,” says Rom Eizenberg, Vice President of Sales, Bluvision, part of HID Global “With our location-aware app on a mobile device, we equip the visitor to get instant, turn-by-turn navigation that creates a better experience than that which is currently available on the market.” HID’s healthcare IoT solution-enablement platform simplifies the delivery of real-time location of clinicians, patients and devices. The platform is enabled by Bluvision (part of HID Global). Phunware’s Multiscreen-as-a-Service (MaaS) platform also provides enterprise-level mobile wayfinding, engagement, data and more for other vertical markets, including retail, residential, hospitality, media and entertainment and more .Missed the rest our healthcare mini series? Read part one here and part two here.
Two renowned systems integrators have improved their ability to more effectively specify and design advanced physical security systems, using the dedicated tool, AXIS Site Designer. AXIS Site Designer AXIS Site Designer is a unique and free web application from Axis Communications, a market renowned company in network video solutions, which makes the specification and design of complex security systems quicker and easier. Having recently deployed the solution, two of Axis partners, Southern Fire & Security Ltd. and Acctive Systems, have been able to evidence a more sophisticated process and have won clients as a result. Security devices and sensors As physical security technology continues to advance, in order to keep up with the ever-evolving threat landscape, coupled with more security devices and sensors being added to IT networks, the task of specifying such systems has become more complex. The principal challenges for those working in the industry are to be able to properly illustrate to buyers the capabilities of such devices and also to demonstrate how they can work together to secure a site. This web application holds the solution. Powerful and versatile design tool AXIS Site Designer revolutionizes the specification and design process AXIS Site Designer revolutionizes the specification and design process, by allowing an entire solution to be mapped out to the finest detail. The powerful and highly versatile tool removes any guesswork or element of trial and error, making it easy to create the right system to fit the exact operational requirements and needs of a prospect or client. The application even allows floor plans of the target site to be added, and virtual placement of cameras and devices enables viewing of the coverage they will provide, once installed. Partner with Southern Fire & Security and Acctive Systems Sean Mcnaboe, Axis Communications’ Key Account Manager, explains “The benefits of AXIS Site Designer are numerous. It helps streamline design workflow, simplify demos of security products and accessories, and even generate quotations and change items in a bill of materials within minutes.” Sean Mcnaboe adds, “Axis has been working closely with two partners, Southern Fire & Security and Acctive Systems, to help them drive their businesses forward while meeting, and often exceeding, the evolving requirements of customers.” Security and surveillance systems specification Southern Fire & Security has recently taken on the specification of security and surveillance systems for several high value properties around the London area, so being able to accurately specify dedicated solutions is critical to secure ongoing business. Acctive Systems, a renowned integrator of electronic security systems, needed a method of specifying security systems that would allow it to demonstrate an entire setup and its component parts via digital means. Efficient designing of surveillance systems AXIS Site Designer is an empowering leap forward in the design of surveillance systems Steve Wilson, Director at Southern Fire & Security, explains “Being able to make only basic recommendations around the use of appropriate technologies has been a key challenge for us. It’s very difficult to plan some of the more involved projects in detail, so we desperately needed a way to be able to visualize an entire estate and how a solution would operate.” AXIS Site Designer is an empowering leap forward in the design of surveillance systems, allowing for greater speed and efficiency, and enabling more effective management of any project. Enhancing customer satisfaction High quality designs and other outputs create a level of professionalism that is a major plus point when vying for business, ultimately improving customer satisfaction and pointing towards greater revenue prospects. Gerry Numa, the Chief Technical Officer (CTO) of Acctive Systems, said “AXIS Site Designer delivers everything we anticipated, and more, setting us ahead of our competitors when it comes to slick, professional looking project design. I would encourage other businesses to reach out to Axis to find out how the application can benefit them too.”
Adani Group is a multi-national conglomerate headquartered in Ahmedabad, Gujarat, India and has a diversified portfolio of businesses, including resources, logistics, energy sectors and agriculture business. Adani Group is the largest port developer and operator in India, with Mundra being the country's largest commercial port. With multiple ports, branches, manufacturing units and corporate offices at various locations, Adani Group is one of the largest business units. In all, this business group has 15,000+ employees and 50,000+ workers (with 900+ third-party contractors), who are involved in the incorporation of various work orders across 25+ business units. Managing staff attendance and diverse shifts Adani Group is widely engaged in multiple business units and ports with 50,000+ workers under 900+ contractors, employed at various locations. Maintaining and managing entire attendance, diverse shifts and leave policies for the various locations, and numerous workers at a central place was critical for them. Moreover, task allotment to workers based on its requirements, skills under a contractor and its verification against the respective contractor's report were tedious tasks for the management. To provide approved and appropriate induction of each worker at a defined level, monitor the progress status of each work order and its segregation based on reports were quite challenging. Report generation to eliminate the fraudulent and erroneous payment of wages at contractors' end had been the need of the hour. Moreover, their requirement of timely and error-free payroll processing was arisen to improve overall productivity. COSEC Contract Workers Management COSEC Contract Workers Management offers centralized attendance management solution for various branches After comprehensive discussion regarding problems and requirements, Matrix offered COSEC Contract Workers Management solution for their 50,000+ workers, who have been employed under 900+ contractors, spread across four locations in India. COSEC Contract Workers Management offers centralized attendance management solution for various branches, spread across multiple locations, which automates all processes, right from recording entries and exits up to processing salaries. Enrolment of the worker credentials COSEC Contract Workers Management facilitates enrolment of the worker credentials, along with a photograph, documents, and induction details. It helps contractors to manage workers efficiently, using contractors' self-service portal. The solution provides multiple connectivity possibilities via Ethernet, Wi-Fi and mobile broadband. It eases the tracking of work order progress. It offers seamless integration with SAP using the database to database linking and offers the feature of real-time notifications, in cases of exceptional situations via email and SMS. Results: Enhanced security with effective worker's enrollment process abiding by various induction levels. Increase in productivity of admin by 20%. Easy decision making due to the generation of customized reports. Smooth and effective monitoring of work orders. Improved security with centralized control and monitoring - Reduced time spent by the security department. Error-free man hours' computation for quick & effective wages' calculation. Minimized manual interventions. Matrix products and solutions Offered: COSEC CENTRA LE - Application Software Platform expandable up to one million users. COSEC LE CWM - Contract Workers Management Module for COSEC CENTRA LE. COSEC DOOR FOW - Fingerprint and RF Card-based Door Controller with Wi-Fi connectivity. COSEC PATH DCFM - Fingerprint, Mifare Card and NFC-based Door Controller. COSEC VEGA FAX - Fingerprint and RF Card-based Premium Door Controller with Touch Sense LCD, IP65, Wi-Fi, PoE. COSEC DOOR FOP - Fingerprint and RF Card-based Premium Door Controller with LCD and Keypad.
Digital Barriers, a globally renowned provider of edge-intelligent surveillance and security technologies, reveals its collaboration with the Future Farms Cymru project, run by North Wales Police. Real-time surveillance solutions Digital Barriers has equipped a farm in North Wales with its real-time surveillance solutions, to demonstrate the role that sophisticated technologies can play in cutting the cost of rural crime, estimated by the National Farmers Union to have reached 54 million pounds in 2019. Rural areas and farmland can be inherently difficult environments to secure. However, Digital Barriers’ scalable and flexible solutions are designed to work in demanding conditions, such as remote and vulnerable locations. AI-based edge analytics Digital Barriers’ video streaming capability and AI-based edge analytics can provide reliable and secure monitoring Proven and trusted within the military and defense domain, Digital Barriers’ state-of-the-art video streaming capability and AI-based edge analytics can provide reliable and secure monitoring, thereby protecting people, places, and assets. The first technology being showcased as part of Future Farms Cymru project is a live streaming body worn camera for the enhanced protection of lone workers. If an incident occurs, the wearer can press the urgent assistance button, which transmits video and a live GPS location back to a designated monitoring center, providing immediate response. EdgeVis Shield The second is EdgeVis Shield, a combination of easy-to-deploy ground sensors that can be used to secure vast perimeters, including farmland containing high value assets. The autonomous system automatically detects when irregular behavior occurs around a perimeter, sending alerts and live video, if a trespasser or vehicle approaches. PC Dewi Evans of the North Wales Police Rural Crime Team commented on the announcement, “In recent years, we are increasingly seeing rural communities and businesses being targeted by criminals. Therefore, it is vital that rural businesses employ the right security methods to protect their assets. Criminals need to know that the farm they’re targeting could be equipped with this cutting-edge technology and they will be almost certainly caught.” Countering rise in rural crime Neil Hendry, Vice President EMEA at Digital Barriers, said, “I am happy that our technology is being used on the front line in the fight against rural crime. The COVID-19 pandemic has adversely affected businesses of all shapes and sizes, with farmers struggling to protect themselves against criminal activity.” Neil Hendry adds, “Future Farms Cymru is an important initiative, and we are delighted to be able help shape and support the future food and farming policy, with our robust video surveillance technology.”
March Networks, a global video surveillance and video-based business intelligence solutions provider, is pleased to announce that one of California’s busiest transportation authorities will standardize its entire bus fleet on the company’s RideSafe mobile solution. RideSafe solution The US$ 4 million contract will see more than 400 buses deployed with March Networks’ complete end-to-end RideSafe solution. The contract includes cloud-based monitoring of all of the transportation authority’s mobile cameras and recorders, a services contract providing annual and recurring revenue for March Networks for up to 7 years. RideSafe solution enables transit operators to maintain the highest security for passengers and employees, respond quickly to emergency situations, and resolve liability claims faster with integrated surveillance video and vehicle metadata. It also provides peace of mind with sophisticated monitoring through March Networks’ Insight Monitoring and Resolution Service. Insight Monitoring and Resolution Service With Insight, March Networks’ managed services professionals proactively monitor all video devices and troubleshoot issues remotely, saving customers’ time and money by eliminating unnecessary truck rolls. If a physical update is required, March Networks immediately dispatches a technician to conduct onsite repair services. All activity is logged online, giving customers a complete view of their network via a secure web browser. RideSafe GT Series Hybrid Transit NVRs Fully integrated with Insight is March Networks’ RideSafe GT Series Hybrid Transit NVRs Fully integrated with Insight is March Networks’ RideSafe GT Series Hybrid Transit NVRs (Network Video Recorders), the backbone of the RideSafe solution. The highly reliable, Linux-based recording platforms are purpose-built for transportation environments, with industry-recognized SAE J1455-standards and tamper-proof enclosures that protect against dust and moisture. They allow operators to quickly access live and recorded video and search for incidents based on vehicle information, such as GPS location, when managed by March Networks Command for Transit video management software (VMS). Mobile cameras deployed As true hybrid appliances, the NVRs support a mix of analog and IP cameras, allowing transportation agencies to migrate to IP video cost-effectively and at their own pace. The California transportation authority will also deploy March Networks’ ruggedized mobile cameras, including its new SE2 Fleet Dash Camera and SE2 Fleet Wedge Camera. Both cameras deliver 2MP resolution and feature industry-first LED flicker mitigation technology, which suppresses the strobing in the recorded video caused by LED light sources. Eliminating flicker in surveillance video ensures brake lights and other light sources are not mistaken for flicker and allows for more accurate post-incident investigations. Cloud-based monitoring solution “By offering the most reliable video surveillance technology and secure cloud-based monitoring services, March Networks is meeting the needs of transportation customers and rapidly growing the services side of our business,” said Net Payne, March Networks’ Chief Sales & Marketing Officer. Net Payne adds, “Almost 27 million people rely on this transportation authority’s buses each year. We are proud that our RideSafe solution was chosen to help safeguard this ridership.”
The Thiepval Museums, in northern France, needed trusted, secure entry and exit control to reduce theft from their premises. User-friendly management of access rights was essential, for both internal and external users. The museums needed a system that will be able to cope easily with changes, site extensions and two-site operation, and a solution that would remove the need to change all cylinders, when an employee loses a key. eCLIQ locking cylinders installed Now, the Historial and Thiepval Museums are equipped with 52 eCLIQ locking cylinders, across the two sites. ASSA ABLOY’s eCLIQ key-operated solution offers them simplified access management, incorporating easy activation and deactivation of keys and simpler administration of access rights, and schedules for external providers and contractors. A unified system manages access to both locations. Every authorized key holder carries one battery-powered key programmed with only their tailored access permissions. With eCLIQ, missing keys are quickly de-authorized, cutting risks associated with key loss or theft. At any time, facility managers can generate an audit trail to verify who has accessed which locks. Designed for museum security Installing an eCLIQ system has allowed security teams to better monitor service providers Across the two sites, the museums have 40 durable, compact, and waterproof eCLIQ keys, of which 19 are already allocated to regular users. These Bluetooth-enabled keys are available to employees and contractors, helping the latter to improve their responsiveness when they are needed on-site. Installing an eCLIQ system has allowed security teams to better monitor service providers, along with their movements around and between the two sites. It is straightforward for museum managers to limit contractors’ access rights to the duration of a task, whether recurring or one-off. eCLIQ locking system Fitting eCLIQ locking system was a simple and wire-free task, and the museum staff, performed the installation themselves. One training session, with the admin software, was sufficient, to put them at ease with their new system. Looking after eCLIQ components is also easy, an integrated lubricant reservoir ensures cylinders, don’t require maintenance for up to 200,000 cycles. AES encryption, rapid processing, and efficient energy management is built into the eCLIQ chip. When a key’s battery runs out, it is easily replaced without tools. Easy and effective access control “I am very happy with the eCLIQ solution,” said M. Guyot, Technical and Security Manager at the Historial and Thiepval Museums, adding “Today, I promote the solution to those around me. I have also given a demonstration to the Somme General Council, to show the effectiveness and simplicity of the eCLIQ solution.” Guyot adds, “Normally, as a user client, we try to help you improve your products, but there was nothing to say in this case!”
Videosoft's adaptive low bandwidth video streaming technology has been selected and installed on the Mayflower Autonomous Ship (MAS), in order to help relay high-quality footage of the ship’s various missions, back to humans on land. On its maiden voyage this spring, the Mayflower Autonomous Ship will trace the route of the famous 1620 Mayflower ship, sailing from Plymouth, in the United Kingdom to Plymouth, in Massachusetts, USA. Only this time, there will be no human captain or crew on board, as the 15 meters, lightweight, hybrid-electric powered trimaran (multi-hull vessel) crosses the Atlantic Ocean. Real-time feedback and visuals Videosoft’s technology will help capture footage from the Mayflower's six onboard cameras at sea. Using satellite connectivity and compression technologies, footage will be transmitted back to AI developers and research scientists, providing them real-time feedback and visuals, during the mission. It will also be used to provide the media and public with updates about interesting events that occur during the ship’s ocean adventures. “The ability to receive live video feed from the ship using minimal communication bandwidth is a game changer for us,” said Don Scott, the Chief Technology Officer (CTO) of the Mayflower Autonomous Ship for Marine AI. Reliable monitoring of the live situation Videosoft provides real-time telepresence, allowing us to reliably monitor the live situation" Don Scott adds, “Videosoft provides real-time telepresence, allowing us to reliably monitor the live situation and give us confidence in the vehicle’s operation at sea. It has already been an invaluable tool during sea trials and we look forward to having the live feed during the voyage itself.” The international grassroots project is led by marine research organization, ProMare, alongside IBM, which is acting as both lead technology partner and lead scientific partner, with other key design and construction partners, including MSubs, Aluship (Aluship Technology) and Marine AI. AI Captain with computer vision technology With an AI Captain at the helm, MAS is able to operate for long distances and durations at sea collecting critical data about the ocean. Powered by IBM’s computer vision, automation, and machine learning technologies, the AI Captain maintains constant situational awareness and makes decisions about what to do next in line with collision regulations. Small, lightweight edge devices from NVIDIA provide local computer power for operational independence, relying on IBM Cloud connectivity when available. Cutting-edge video streaming solution Videosoft was selected for its cutting-edge video streaming solution and its ability to reliably stream video from onboard cameras and computer vision systems, which scan the horizon for hazards, as the Mayflower Autonomous Ship sails. Videosoft's software runs on IBM's platform, which skippers the vessel and is linked via satellite. Videosoft's Chief Executive Officer (CEO), Stewart McCone said, “This project is designed to transform humanity’s relationship with the ocean. To say we're totally thrilled to be involved in the Mayflower Autonomous Ship project would be an understatement.” Stewart McCone adds, “By working alongside innovative and specialist companies, who are experts in their field and have an intimate knowledge of what they are doing, Videosoft is enabling the ambitions of this multi-million-pound project. Streaming live video from ocean-going vessels is not straightforward and you really need to know what you're doing to pull it off successfully.” Intelligent transmission protocol An intelligent transmission protocol is required to maintain connectivity" He further stated, “An intelligent transmission protocol is required to maintain connectivity. In addition to switching between satellite and cellular networks, variable signal strength, the topography of network masts, atmospheric conditions, satellite capabilities, speed, and variables all impact the available bandwidth.” Stewart McCone said, “Videosoft, which has developed software specifically for the satellite and cellular industry, to negate the typical issues that arise when using such networks, has made it possible to have eyes on the ocean 24/7. The unique protocols that the Videosoft team has built into our software mean that any video delay from the Mayflower will be dramatically reduced, with any streamed video automatically adapting to the amount of available bandwidth, while retaining good quality.” Real-time situational awareness Stewart continues, “Even in our knowledge-rich industry, not many people realize that this can be done, but it can and is relatively simple to put in place, thanks to our easy-to-use software platform. As with CCTV, IoT and surveillance applications, Videosoft's ability to provide reliable video streams creates a real-time situational awareness that is critical to the operational success of projects, such as the Mayflower Autonomous Ship.” He further adds, “The Videosoft vision has always been to get involved in pioneering projects, such as the Mayflower and serves to underpin Videosoft's mission statement of deploying technology to solve real-world problems at the highest global level, using video and remote services, to make the world be a better, safer place. We're showing that this specialist tech does exist and that we can enable all Internet of Things (IoT) applications for the common good. If that interests you, come and talk to us.”
Round table discussion
When technology performs a required task effectively, there is little reason to upgrade to the ‘next big thing’. In this regard, the physical security market is notoriously slow to change. Much of yesterday’s most robust and dependable equipment is still in place at thousands of customer sites, still performing as well as the day it was installed. However, there comes a point when any technology becomes outdated. We asked this week’s Expert Panel Roundtable: Which security technologies are becoming outdated or obsolete?
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Video analytics are undergoing a fundamental change in the market as machine learning enhances their accuracy while expanding their capabilities. But what are those expanded capabilities and how are they impacting the operation of security and video systems? We asked this week’s Expert Panel Roundtable: What new video analytics are having an impact in the market and how?
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload