Everbridge, Inc., the global provider of critical event management and enterprise safety software applications to help keep people safe and businesses running, announced the launch of its Crisis Management solution, a new software application designed to help organizations dynamically manage the lifecycle of a critical event and accelerate response and recovery times. Crisis Management, which is fully integrated with the Everbridge Critical Event Management (CEM) suite, centralizes incident res...
Wrike, the collaborative work management (CWM) platform for high-performance teams, continues to remove the security barriers preventing enterprise companies from adopting a cloud-based CWM platform. The company announced today that it is has earned the ISO/IEC 27001:2013 certification from the British Standards Institution. This recognition demonstrates Wrike’s relentless commitment to protecting customer data and supporting the most rigorous security standards. Wrike also announced the...
Casino operators are looking intensively for solutions to transform the multitude of process data into useful business intelligence information. With its 'Smart Casino Solutions', Dallmeier is pursuing a unique approach in which the manufacturer's video technology is linked to AI systems. At G2E Asia from 21.05.2019 - 23.05.2019, Stand A301, Dallmeier will present solutions for the three main casino areas of gaming, surveillance and marketing. Many casino operators are still struggling with und...
Avigilon Corporation (“Avigilon”), a Motorola Solutions company, announced that the Avigilon H4 IR PTZ (Infrared Pan-Tilt-Zoom) camera has been selected as one of the recipients of Asmag’s Buyer’s Choice Awards for 2018. Winning in the network cameras category, the Avigilon H4 IR PTZ camera line combines patented Avigilon self-learning video analytics with zoomable infrared (IR) technology to provide broad coverage and exceptional image quality in a range of lighting con...
AlgoSec, the network security management vendor, announced a new integration with the IBM Resilient Incident Response Platform (IRP), enabling organizations to tie security incidents and attacks directly to the business processes that could be impacted. AlgoSec’s integration provides security analysts with the ability to enrich the Resilient IRP with critical business and network context to immediately assess an incident’s potential business impact, and to prioritize and autom...
In preparation for ISC West, the largest converged security and public safety industry trade show, the Security Industry Association (SIA) has identified the top technology advancements to look out for at ISC West 2019. The “Top 8,” presented with ISC Security Events, represent the key technology advancements impacting the converged security and public safety landscape. The “Top 8” Security Technologies At ISC West 2019: Cloud Artificial intelligence Robotics/autono...
At ISC West, in booth # 26061, Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence will unveil a new version of Security Center, the company’s open-architecture platform that unifies video surveillance, access control, automatic license plate recognition (ALPR), communications, and analytics. With customisable live dashboards, enhanced privacy protection features, a brand-new map-driven mobile app, and new functionalities that help users actively monitor the health of their system and ensure compliance with cybersecurity best practices, version 5.8 will ensure that users can optimize their physical security environment while benefiting from greater visibility into their operations. Valuable Contributing Sensor Security Center 5.8 will introduce a brand-new collaborative mobile app to provide operators complete access to their Security Center system Security Center 5.8 will enable users to create custom dashboards that will display real-time data, such as video feeds, alarms, reports and charts in a way that is meaningful to them and their specific job function (security, operations, IT etc.). Users can set up their dashboards using simple point-and-click tools, and instantly combine data from the entire Genetec portfolio (video, access control, ALPR, etc.) in one screen to gain a new perspective on the evolution of events and key metrics across their operations. Security Center 5.8 will introduce a brand-new collaborative mobile app to provide operators complete access to their Security Center system when they are on the move and allow them to turn their smartphone into a valuable contributing sensor to their security system. Map-Oriented Interface In addition to recording incidents, accessing nearby video, access control, and ALPR devices as well as sharing video from their phones to Security Center, the new mobile app will let operators share their location with colleagues in the operations center, send in-app messages and share live and recorded video through an intuitive map-oriented interface. Key features will include: Video (live and recorded playback, PTZ controls, bookmarking, time- and event-based reports) Access control (check door status, lock/unlock doors, override schedule, set maintenance mode etc.); ALPR (live reads/hits, plate reports, and access hotlists); Interactive maps that increase local awareness and put critical information much closer to the operators, enabling them to easily visualise their environment and respond quickly. Built-in messaging allows for instantaneous sharing of information between operators and personnel in the field. This extends to sharing live or recorded video clips, text messages and other security information. Physical Security Devices With the new KiwiVision Camera Integrity Monitor feature, the system will also automatically detect potential camera position changes System administrators are acutely aware of the critical nature of security systems, but often lack the tools to assess the potential exposure of their software, operating systems and physical security devices. Security Center 5.8 will introduce a new Security Score feature to track each system’s compliance with hardening guidelines, firmware availability and updates, password strength, as well as several other dimensions of cybersecurity. Available through the built-in System Health dashboard, the Security Score will measure individual cybersecurity processes and verify that they are followed by the system. This will enable users to get a better understanding of the cyber security risks they face and enable them to take the necessary steps to harden their system. With the new KiwiVision Camera Integrity Monitor feature, the system will also automatically detect potential camera position changes, loss of image quality or tampering, and alert administrators immediately. This allows them to get ahead of problems and take the necessary corrective action immediately, rather than wait to find out there is a problem when they need footage and it is not available.
FIREX International, alongside the co-located IFSEC International, Safety & Health Expo and Facilities Show, has announced that the Protection & Management series of events will be moving to a new dateline of 19-21 May for the 2020 edition at ExCeL, London. FIREX International 2019 Dates Unchanged Gerry Dunphy, Exhibition Director, FIREX, explains: “Major business decisions are made at FIREX every year, and the event has been in huge growth in its home in London, as we anticipate seeing for the June 2019 event. Expanding on this, we’re thrilled now to have worked even more closely with the fire safety community and with our venue, ExCeL, to organize the 2020 edition on a May timescale. The customer is at the heart of the much-loved FIREX exhibition, and this will allow exhibitors and visitors alike to maximize this essential time in the buying cycle.” FIREX sees organisations across a host of industries, from construction to government and legislative bodies FIREX welcomes an international audience of installers, integrators, specifiers, distributors and end-users from over 70 countries. In the wake of the number of fire tragedies the community has witnessed on a global scale, the conversation around fire safety has never been more important; FIREX sees organizations across a host of industries, from construction to government and legislative bodies, mark the three days as a key date on their calendars. Fire Protection And Prevention In moving to May 2020, ExCeL also welcomes the Security & Counter Terror, Ambition and Forensics Europe Expos to run alongside FIREX and its neighboring IFSEC, Safety & Health Expo and Facilities Show. With fire prevention and protection playing a major role in developments in the security and safety industry, the move further strengthens FIREX’s position as the industry leader in the life safety conversation. This strategic co-location of events will see 38,000 professionals working across fire and security come together at ExCeL London. Exhibiting companies will have access to the entire end-to-end fire protection supply chain under one roof, with visitors able to source products and technology from an unrivalled showcase of solutions. This year’s FIREX International will keep its June dateline from 18–20 June 2019.
The Security Industry Association (SIA) has named Dr. Elizabeth (Elli) Voorhees as its new director of education and training. In this role, Voorhees – who previously served as director of certifications and compliance for the National Center for Spectator Sports Safety and Security (NCS4) – will drive all education and certification program activity for SIA and through SIA’s partners in support of the SIA membership and larger industry goals. Provide Learning Opportunities The areas of education, training and certification have exponential growth potential in today’s rapidly evolving security industry" As director of education and training, Voorhees will spearhead the SIA Education@ISC conference programs for ISC West and ISC East and Certified Security Project Manager (CSPM) certification and expand SIA’s portfolio of key education, training and career development initiatives. “The areas of education, training and certification have exponential growth potential in today’s rapidly evolving security industry,” said Voorhees. “I look forward to working with SIA’s global network of security professionals to develop educational programs and provide learning opportunities for SIA’s membership and the greater security industry.” In her most recent role at NCS4, Voorhees led the Certified Sport Security Professional (CSSP), Certified Sport Venue Staff (CSVS) and Sport Event Security Aware (SESA) certification and assessment programs; oversaw all aspects of program development, maintenance and compliance for individual and organisational performance assessment programs; and maintained accreditation through the American National Standards Institute for the CSSP certification program. Security Management Workforce Elli has an incredible understanding of proven methods for delivering exceptional learning and development content" She holds a Ph.D. in human capital development from the University of Southern Mississippi, where her dissertation identified core competencies for sport and event security management professionals and proposed various human resource development strategies to equip the current and future security management workforce with the knowledge, skills and abilities needed for an effective job performance. “Elli has an incredible understanding of proven methods for delivering exceptional learning and development content that will help professionals at all levels of security businesses become stronger contributors to their company’s success.” “Elli shares our vision to grow and expand SIA’s education offerings into a true SIA Center of Excellence that provides resources to address existing educational gaps while also preparing our members to stay ahead of future marketplace and technology trends,” said SIA CEO Don Erickson. From educational offerings at the ISC shows to the CSPM program, SIA’s workforce development initiatives and scholarships, SIA helps shape the talent of our industry.
ExtraHop, provider of enterprise cyber analytics from the inside out, announces new capabilities designed to help Security Operations Center (SOC) and Network Operations Center (NOC) teams identify and safeguard critical assets, rapidly detect late-stage and insider threats, and transform security analysts into threat experts with streamlined investigation workflows. Demand for business agility and uptime have accelerated the rapid modernization of IT, which is now highly dynamic and distributed - from the data center, to cloud infrastructure and SaaS, to remote sites and device edges. Advanced Detections These changes introduce complexity and expand the attack surface, contributing to high rates of false positives and obscuring true threats. Analysts constantly waste time, through no fault of their own, working to validate the constant flow of alerts to determine if investigation is warranted. Senior analysts get timely detail on users and devices to support rogue device detection, insider threat investigations, threat hunting, and forensics The Winter 2019 release of ExtraHop Reveal(x) improves SOC and NOC analyst productivity through contextual discovery of the enterprise attack surface, full-spectrum detection, and one-click guided investigation for incident response. Advanced detections incorporate device and user context to identify known and unknown threats using an array of machine learning, rule-based, and custom techniques. Detections incorporate suggested next steps and are made actionable through clear evidence, enabling front-line analysts to validate, close, or escalate prioritized events with confidence. Senior analysts get timely detail on users and devices to support rogue device detection, insider threat investigations, threat hunting, and forensics. Better Prioritize Monitoring Significant features of the Winter 2019 release include: User-to-Device Mapping: Easy correlation between users and devices allows analysts to investigate quickly, expediting validation without the need to cross-reference with other tools. OS Auto-discovery: Operating system (OS) auto-discovery confirms and compares the OS each device is using with known behaviours of those systems to identify spoofing. Enhanced Role Classification: Expanded role auto-classification uses behavior to automatically infer more device types (e.g., mobile device, DHCP server, domain controller or DNS server), and then maintains groupings to keep analysts focused on what matters most. Dynamic Device Grouping: Sophisticated device grouping permits users to define complex rules for extensive attributes and behavior to better prioritize monitoring, detection, and triage. Advanced Rules Engine: The advanced rules engine immediately detects known threats, policy violations, and risk-based detections. Guided Investigation Workflows: One-click guided investigations link each detection to the right next steps, as well as the most relevant device's transaction and behavior details, for instant validation of threats and faster MTTR. Expanded Integrations: ExtraHop now integrates with ServiceNow CMDB, QRadar SIEM, and Palo Alto Networks firewalls. Contextual workflow With ExtraHop, security and IT teams can detect threats up to 95 percent faster, reduce resolution time by nearly 60 percent “Forcing analysts to switch between tools or manually pull together disparate data for an investigation increases cognitive load, delay, and the chance of missing a critical piece of evidence,” said Jesse Rothstein, CTO and Co-Founder, ExtraHop. “Our focus in this release is to bring authoritative data about every device's communications, OS, users, and network behavior into a contextual workflow that guides analysts to the right answer immediately.” With ExtraHop, security and IT teams can detect threats up to 95 percent faster, reduce resolution time by nearly 60 percent, and decrease unplanned downtime by as much as 86 percent. The innovative ExtraHop approach has been recognized by numerous organizations including Credit Suisse, JMP Securities, and independent analyst firms including Enterprise Management Associates.
With the need for security guard services growing worldwide, Montreal-based tech startup TrackTik Software Inc., an integrated security workforce management cloud-based software solutions provider, has announced US$ 45 million in financing from Toronto-based Georgian Partners and Montreal-based Caisse de dépôt et placement du Québec (la Caisse). Disruptive AI And Machine Learning Funds will be used to drive new product development — including disruptive artificial intelligence (AI) and machine learning (ML) technologies Funds will be used to drive new product development — including disruptive artificial intelligence (AI) and machine learning (ML) technologies — that will enable security guard firms or in-house security teams to simplify their operations and maximize profitability. TrackTik will also nearly double its staff of 120 in the next year to help bring to market the new state-of-the-art tools and increase support and provide best practices for customers as the company expands its operations internationally. “This investment is in effect good news for the security workforce management industry as a whole as it is enabling us to reimagine every aspect of the industry, helping users of our technology to perform at unprecedented levels of intelligence and efficiency as they obtain their key business objectives,” said TrackTik Founder and CEO Simon Ferragne in making the announcement. “These unique tools will not only add value to our users but will in turn enable our clients to add value to their own customers,” he said, revealing that the new products are planned to start rolling out in early 2019. TrackTik Security Workforce Management Software Applauding the investors for their vision, Ferragne explained that both Georgian Partners and la Caisse are aligned with TrackTik’s commitment to transform the security workforce management market. In particular, Georgian Partners — a firm that invests in growth stage companies using AI and ML to solve real business problems, with a roster that includes players such as Shopify, Cority, Flashpoint and True Fit — has dedicated a group of technical experts to help TrackTik accelerate the development of its new products. “TrackTik's unique end-to-end security workforce management software is advancing the security industry to improve services and make smarter, data-driven decisions,” said Steve Leightell, Partner at Georgian Partners. “They've built a powerful solution that is solving their customers’ greatest business needs and are truly leading the industry. We are thrilled to be working with the TrackTik team to develop their software’s cutting-edge artificial intelligence capabilities. Georgian’s core philosophy is that businesses utilizing applied AI will enable superior service levels in terms of capability, delivery, availability, accuracy and convenience, and so we look forward to be a part of this phase of their growth.”TrackTik's unique end-to-end security workforce management software is advancing the security industry to improve services and make smarter, data-driven decisions" Applied Artificial Intelligence Citing a good cultural fit between the two companies, Leightell added that the timing was right to engage with TrackTik because there is a strong market pull for TrackTik’s first-of-its-kind, all-in-one enterprise software solution that delivers all of the mission-critical components required to run a professional security service firm on a single integrated platform, including real-time guard management and incident reporting, back office administrative functions, and business intelligence. In addition to Applied AI, Georgian Partners’ thesis-led approach to investing also focuses on Conversational AI – including the use of text-based messaging, chatbots and voice assistants – and Digital Security, two areas that TrackTik is well positioned to capitalize on, he added. Based on TrackTik’s substantial growth in 2018, Thomas Birch, Managing Director Venture Capital and Technologies at la Caisse stated that “this new investment will enable TrackTik to continue its international development and reaffirms la Caisse’s support for technology companies, which represent a promising sector of Québec’s economy. One of the fastest growing technology companies in Canada, TrackTik will use the proceeds of this transaction to pursue its strategic expansion plan, which includes developing more machine learning technology.” Automated Scheduling This is an exciting time for the security guard workforce management space as the industry grows and evolves" Among some of the advanced AI capabilities to be featured in TrackTik’s new software are an automated scheduling tool that uses predictive analysis and ML to streamline the scheduling of large, diverse and mobile security workforces, reducing the number of human interactions and simplifying day-to-day business, Ferragne said. TrackTik’s innovations have helped propel the company’s exponential growth since its inception in 2013, with the company receiving multiple recognitions for its solutions. Last year alone, TrackTik ranked No. 11 on the Deloitte Technology Fast 50 list, was included on the LinkedIn list of Top 25 Startups in Canada, placed 36th on the Canadian Business 2018 Startup 50 ranking of Canada’s Top New Growth Companies, and received a 2018 SaaS Award for Customer Success by San Diego-based APPEALIE. “This is an exciting time for the security guard workforce management space as the industry grows and evolves,” Ferragne said. “We at TrackTik are proud to support its advancement by providing the best products possible in the hopes of helping those in the industry propel their business forward. We want to thank both Georgian Partners and la Caisse for believing in our vision and mission, and we look forward to working together on achieving our goals.”
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. eFusion Security Management The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud computing and mobile communications, VisitorPoint is being used at premises from hotels and campuses to corporate headquarters. It allows the whole process of visitor management to be streamlined in a way never previously possible. For example, it lets guests’ phones be used as access credentials, making it a perfect alternative to room keys in the hospitality sector. Compatibility of the VisitorPoint system with ASSA Abloy Hospitality products has proved to be particularly popular with hotels. VisitorPoint System VisitorPoint is also ideal for busy hotel reception teams who need to keep across who is entering the premises VisitorPoint is also ideal for busy hotel reception teams who need to keep across who is entering the premises. With the latest version of VisitorPoint, users can easily view pre-registered visitors in advance; manage and sign-in large groups in seconds; book meeting rooms; manage visitor car parking; and automate notifications and messaging. Now organizations can go even further in streamlining their people and diary management processes, thanks to integration with Outlook and Google calendars. A new VIP feature allows automatically tailored welcomes for specified guests and/or groups; and a QR Scan App allows visitors and VIPS to be immediately verified. In addition, a new, sleek self-service kiosk will be unveiled at the show, which is ideal for positioning in hotels and high-end corporate lobbies. Open-Technology Systems Integration Meanwhile, with its versatile, open-technology software eFusion is proving a practical alternative to costly or complex conventional PSIM solutions. It offers the advantages of a modular, building block approach and gives users the freedom to integrate, customize and adapt their security systems to meet both current needs and emerging risks. Ensuring compatibility with leading surveillance, intruder, access and fire detection systems, eFusion now supports more than 60 off-the-shelf integrations and several important additions are confirmed for the show. These latest integrations include Jaquies IP intercom hardware; the mobile phone app GuardPoint; and the Metra locker system hardware. “For users who want control and better value from their security investments, eFusion with its expanding choice of integrations is the ideal management platform”, says Lee Copland, Managing Director, Maxxess EMEA. Smart, Open Infrastructure The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment" “The eFusion platform allows legacy systems to be transformed into a smart, open infrastructure and extends the life of equipment. Our technology is proving particularly popular because it gives users all the advantages of advanced PSIM without the associated cost or complexity.” eFusion can be easily scaled from one site to multiple sites globally and it can connect stand-alone systems for easy upgrades such as retro-fits with existing hardware. Network Monitoring For Public Safety Also on show, Ambit allows security controllers to communicate directly with both individuals and groups and to monitor the safety of everyone on site (or on multiple sites), for example employees, residents, visitors, or contractors. Now Ambit users will benefit from direct notification of a wide range of risks thanks to a new integration with the NC4 incident alert service. NC4 monitors risks and issues alerts in real time, covering potential threats ranging from terrorist incidents to weather events, from civil disruption to cyber-attacks. With this new integration, as N4C alerts arise they will be filtered by proximity/relevance and directly sent to Ambit users. Lone Worker Monitoring Visitors to the Maxxess stand will also learn how Ambit’s latest life-saving technology comes with a choice of applications tailored to the user’s needs. For example, it can allow lone-worker monitoring; courtesy communications and remote escorting after-hours; panic alarm features; and individualized messaging during incidents. It can help security teams co-ordinate and work more effectively with emergency responders too as well as improving the efficiency of day-to-day operations. We are well positioned to further capitalize on major infrastructure projects across the region such as hotels and leisure" With new customers and projects including Bluewater Island, TAJ Hotel & Residences JLT Dubai, TAJ Hotel & Palace on Palm Jumeirah, the Emirates Nuclear Energy Corporation, Emirates Flight Catering Extension, the Jewel of the Creek and Yahsat, 2019 will be an exciting year of growth for Maxxess in the Middle East. Maxxess Expands Middle East Reach “We are well positioned to further capitalize on major infrastructure projects across the region such as hotels and leisure. The demand for increased operational efficiencies across the MENA region has seen many organizations look to automate tasks and at the same time mitigate against the potential for human error. This is evident in the demand we’re seeing for streamlined visitor management, the elimination of keys and better optimized workforces across security and facilities management functions.”, said Lee Copland, Managing Director, Maxxess EMEA. He adds, “And as real-world applications for artificial intelligence become a reality, we are continuing to collaborate with our world leading video surveillance partners to bring these advanced analytics into the eFusion platform. Meanwhile, we will continue to support our customers in complying with revised fire and safety codes and new security regulations.”
Public spaces in cities and suburbs are important places for community development and promoting outdoor recreation. These areas may include main streets, parks, promenades, band shells and fields. Such locations are often utilized by public event planners for community activities, including summer festivals, wintertime ice skating rink installations, music concerts and art fairs. As the year drew to a close, holiday and Christmas markets as well as major New Year’s Eve events, presented cities with constant public event security needs. The public nature of these events increases risks of incidents with high-speed vehicles that put attendees in danger. Fortunately, there are three ways for public space managers to prevent casualty-causing collisions and further promote the use of local public areas. Developing An Effective Action Plan When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring It is important to have a plan developed before an incident or accident occurs. Warning systems, utilizing doppler radar and digital loop technologies, alert guards to abnormal vehicle velocity changes in the surrounding area. Managers of public areas should organize a meeting with public safety authorities and local agencies to discuss what must immediately occur when a high-speed vehicle is approaching a public event. When strategizing how to react to an alert, think about what time of the year and time of day the event is occurring. Having such a reaction plan in place combines technology and strategic planning to ensure everyone is on the same page to effectively target a threat and promote overall event safety. Securing Public Areas Ideally, there will be no need to implement a well-conceived action plan. After all, taking preventive measures to secure public areas where events take place is important to keep people safe from accidental vehicle collisions and intentional attacks. Protect attendees by clearly separating pedestrian and vehicle locations using security devices such as – Barricades Portable barriers Bollards Install Guard Booths Avoid the risk of vandalism and theft, making sure people are safe when walking back to the cars at night by keeping parking areas illuminated with flood lights. Install guard booths with employees who monitor activity in the parking area and who are prepared to react if an alert is triggered. Furthermore, prevent accidental collisions by clearly marking the parking area with informative warning signs and using barricades to direct traffic. These three tips can be used by public area managers to promote security at the next community event. Additionally, the technologies used to secure an event can also be used as infrastructure for year-round security. Installing gates that shut when the public space is closed or using aesthetically pleasing bollards are steps any public area manager can take to promote community safety.
According to the reports of not-for-profit organization Gun Violence Archive, the year 2018 has seen 323 mass shooting incidents as of November 28 in the United States. This number is 346 for the year 2017 and 382 for 2016 (more statistics are available here), with “mass shooting” defined as cases where four or more people are shot or killed in the same time period and location. While definitions of mass shooting vary with organizations in the US, the count of over 300 incidents per year, or about once per day on average, is simply alarming. It raises public safety concerns, ignites debates and protests, which in turn lead to public unrest and potentially more violence, and increases costs for governments from the regional to federal level. Most importantly, the loss of lives demands not only improvement in post-incident handling and investigation, but also new prevention technologies. Gunshot Detection Solutions AI weapon detection offers a more efficient alternative to prevent active shooting There are several gunshot detection solutions in the security market, commonly used by law enforcement agencies to detect and locate gun fires. These systems function based on acoustic recordings and analyses and often in combination with signals detected by sensors of the optical flash and shockwave when a gun is fired. However, gunshot detection by nature dictates that the law enforcement can only react to a shooting incident that has occurred. With fast action, law enforcement can prevent the incident from escalating, but lives that are lost cannot be recovered. With the development of artificial intelligence in object recognition, AI weapon detection offers a more efficient alternative to prevent active shooting: AI can visually detect guns based on their shapes before they are fired. The AI is trained to recognize firearms in different shapes, sizes, colors, and at different angles in videos, so that the AI weapon detector can be deployed with existing cameras systems, analyze the video feeds, and instantly notify security staff when a gun is spotted. Comparison of the advantages for law enforcement and public security agencies Legacy gunshot detection using sensors AI weapon detection Reactive measure: detect after guns have been fired Proactive measure: detect before guns are fired Time to action: within 1 second Time to action: within 1 second Unable to provide visual data about shooter(s) Can provide data about shooter(s) based on the camera recording: clothing, luggage (backpack, handbag, etc.), facial features, vehicle Unable to track the location of the shooter(s) before and after shooting because of the lack of sound Can track the shooter(s) using AI Person & Vehicle Tracking, AI Face Recognition, and AI License Plate Recognition False detection caused by similar sound such as fireworks and cars backfiring Minimal to no false detection, as AI can distinguish different types of handguns and rifles from normal objects (umbrella, cellphone, etc.) Require physical deployment of gunshot detection sensors Can be used with existing camera systems, do not require special hardware Complicated to deploy, require highly trained professional Easy to deploy as an add-on to existing video surveillance system - Can integrate with gun-shot detection to create a “double knock” audio and video active shooter alert system Gun-Shot Detection Advantages In addition to advantages for law enforcement and public security agencies, this type of visual-based pre-incident detector has three-fold advantages for the public: Save lives by spotting the shooter before the shooting event. Minimize the chaos entailing an incident: panic and chaos caused by a shooting incident often adds to injury, as people run, fall, trample on others… With an AI weapon detector, when a gun is spotted, the system sends an alert to security staff, who can quickly control the situation in an organized manner and apprehend the intending shooter. Can be added as a SaaS (Security as a Service) component to small business and home surveillance systems, e.g., intrusion detection alerts (home invasion incidents with firearms number over 2500 per year nationwide). For a complete active shooter detection system, video-based AI detector can operate in conjunction with gunshot detectors for enhanced security. Traditional X-ray based weapon detection or metal detection entrance systems are complicated and expensive; with AI video technology, active shooter detection system can be cost-effective, and after all, what price tag can one put on a life? Written by Paul Sun and Mai Truong, IronYun
Today’s security leaders encounter many challenges. They have to operate with reduced budgets and face challenging and evolving risks on a daily basis. Security leaders are often ignored and only called upon when needed or in disaster situations. Many don’t have an ongoing relationship with the C-suite because the C-suite doesn’t understand the value they bring to the whole business. In order to resolve these challenges, a security leader can apply a risk-based approach to their security program. According to dictionary.com, risk is “exposure to the chance of injury or loss; a hazard or dangerous chance”. Risk is broader than a security concern and involves the entire business. Through utilizing a 3R model - considering resources, risks and resolutions - a security leader can evaluate the output from the model to build the foundation of a strong plan. This allows the leader to make security decisions based on a quantified risk measure. A business determines what resources it wants to protect, what risks it needs to protect the resources from and what resolutions it can put in place to mitigate the risk. Decisions are based on measurable evidence. Free online risk assessment tools are available to provide a fast, easy way to determine an organisation's basic security risks through an investigative approach The 3 Rs The first step in the 3R model is to figure out what resources need protection. This could be physical - such as buildings, critical infrastructure or valuable equipment, knowledge-based - such as intellectual property, or organizational - such as people or governance structure. Understanding the business will help the security leader develop a list of critical elements. Look for tangible resources such as buildings and machinery, and intangible resources like reputation, knowledge and processes. Second, determine what the resources need to be protected from. Anything that threatens harm to the organization, its mission, its employees, customers, partners, its operations or its reputation could be at risk. These can include contextual risks (workplace safety or natural disasters), criminal risks (theft or cybercrime) or business risks (compliance or legal issues). Anything that threatens harm to the organisation, its mission, its employees, customers, partners, its operations or its reputation could be at riskFree online risk assessment tools are available to provide a fast, easy way to determine an organization's basic security risks through an investigative approach. The tools ask several questions and determine risk based on an organization’s location and the answers provided. Security leaders can also work with security companies and consultants that offer risk assessments to determine their company’s needs, and then offer solutions based on that assessment. The third objective is to determine how businesses can best protect the identified resource. The last of the 3 Rs - resolutions - are those security activities that enable the business to mitigate the impact of security risks. Resolutions can potentially prevent a security incident from occurring, contain the impact to resources if an event does occur and also assist the organization in recovering from an impact more quickly or easily. The first step in the 3R model is to figure out what resources need protection, this could physical such as buildings or critical infrastructure The Path Forward Understanding what risks a business faces in totality provides an opportunity for the security leader to collaborate with other department heads. This gives security leaders an opportunity to engage with functions outside their norm as well as a chance to demonstrate their subject matter expertise. A risk-based approach also helps security leaders fully understand an organization’s needs and concerns, which they can communicate to the C-suite to help them make better business decisions. Metrics can also help business leaders understand the cost/benefit of resolutions C-suite and executives help define an acceptable level of security risk tolerance to resources and make quality, educated decisions about mitigating security risks. Through collaborating with security leaders using a risk-based approach and the 3R model, metrics and reports show the impact of security expenses, and there is a transparent view of security risk. The final decision about how to mitigate and resolve risks is up to the business owner of the resource and the risk stakeholders. To obtain funding, show the risk and value of resources exposed to potential impact. Then present the recommended resolution that reduces the potential level of impact and the associated cost benefit savings. By providing this information, security leaders can ensure that the business owners can make an educated decision. Measuring Success A risk-based approach aligns the security mission with the organization’s mission. Security leaders should have these conversations with their business leaders on a regular basis. Understanding the thresholds of risk tolerance and showing when incidents or activities are trending outside of acceptable boundaries will help business leaders make educated decisions. The 3R model also helps a business to track occurrences, quantify the direct and ancillary impact and make continuous adjustments to the security program Determining a baseline of acceptance gives a foundation for security leaders to point out when the organization is not meeting its own requirements. Metrics can also help business leaders understand the cost/benefit of resolutions and demonstrate when costs may be trending outside of acceptable boundaries. The 3R model also helps a business to track occurrences, quantify the direct and ancillary impact and make continuous adjustments to the security program. It is important to note that this process is not stagnant, and needs to be constantly revisited. Examining risks, resources and resolutions in a systematic way will help security leaders understand what they are protecting Defining Risks And Vulnerabilities Continuous conversations using the 3R model also help business leaders understand what security risks could interfere with meeting business objectives. It also aligns the total cost of ownership for the security program with the business value of the resources at risk. The approach puts the security risk decisions in the hands of the ones impacted by those risksAnd it defines the security role as risk management, not just task management. The approach puts the security risk decisions in the hands of the ones impacted by those risks…the “owners” of the resources. Examining risks, resources and resolutions in a systematic way will help security leaders understand what they are protecting, what they are protecting it from, and how they can help prevent, contain or recover against a specific risk. Followers of this approach are in a better position to ask for funding because they can clearly define and quantify risks and vulnerabilities. Applying these principles will equip security leaders with the knowledge needed to have better dialogue with colleagues in other departments, encouraging more proactive discussions about security.
In the physical security industry, the advent of artificial intelligence (AI) and deep learning is most commonly associated with potential improvements in video analytics performance. However, AI is also applicable to a variety of content analytics beyond video. It will be interesting to watch how companies that take the next step beyond proving viability for security purposes to deliver true business applications to the market. Right now, we’re seeing organizations working hard to develop content analytics that perform in an effective, efficient and accurate manner. Enterprise Software Companies This shift will create a huge disruption in our industry and cause further consolidation Many of these organizations are true AI and/or computer vision companies, and they are spending a lot of money developing very advanced algorithms. However, there’s still work to be done identifying the real benefit of these analytics for customers as part of comprehensive business intelligence solutions. Until that happens, and customers understand how those benefits apply to them directly, adoption will continue to be lower than all the marketing hype would suggest. Data capture form to appear here! Because data analytics are becoming such a significant component of today’s ‘big data’ solutions, watch for a number of large, enterprise software companies to start focusing on the security industry. This shift will create a huge disruption in our industry and cause further consolidation. Analyzing Mobile Endpoints There is also a potential for machine learning to enable cybersecurity companies to predict the nature of future attacks based on past behavior, similar to how Netflix displays what you want to watch based on what you’ve previously viewed. According to Jack Gold, president and principal analyst at J. Gold Associates, this innovation can assist cyber companies to transition away from a ‘signature-based’ system to detect malware. Instead, he sees more companies adopting a machine learning approach that aims to analyze past incidents in a broader manner and aggregate information from a multitude of sources. A main function of AI is to analyze past incidents in a broader manner and aggregate information from a multitude of sources Specifically, some machine learning applications for cybersecurity are effective at doing the following: detecting malicious activity, helping security officers determine what tasks they need to complete in an investigation process, analyzing mobile endpoints, decreasing the number of false positive threats, automating repetitive tasks like interrupting ransomware, and potentially closing some zero-day vulnerabilities. Android Mobile Endpoints A number of tech giants have invested in these capabilities recently, including Google, which is employing machine learning to help protect Android mobile endpoints. Amazon also bought a startup called harvest.AI to help it aggregate and better understand data located on the S3 cloud storage service. Machine learning can help cybersecurity efforts, but it can’t replace many important functions Ultimately, machine learning can help cybersecurity efforts, but it can’t replace many important functions. There will always be sophisticated attacks that no machine learning algorithm will be able to find. Pairing human intellect with machine technology is the best approach. In another application, AI-driven robots can be deployed for security in places where it may not be feasible to have a human patrol, such as the outskirts of a vital electric substation located hundreds of miles from the nearest town. Evolution Of Artificial Intelligence A robot can easily traverse the harsh terrain and notify authorities when something is amiss. Another use is during disaster recovery efforts. Robots don’t get tired, and they don’t have to use the bathroom, eat or take a break. With the abilities afforded by AI, robots can also navigate any designated area autonomously to keep an eye out for suspicious behavior or alert first responders to those who may need aid. In situations where health and safety concerns preclude the ability of having a human to watch the site, such as at toxic waste dumps, robots can be deployed. Although drones still largely require a human operator to chart their flight paths and control their movements, the evolution of artificial intelligence is also revolutionizing the capabilities of machines to work autonomously. If you missed part two, see it here. Or, to start from part one, click here.
The Global Security Exchange (GSX) seems smaller this year, which is not surprising given the absence on the show floor of several big companies such as Hikvision and Assa Abloy (although their subsidiary HID Global has a big booth). A trend affecting the number of companies exhibiting at GSX 2018, and other trade shows, is industry consolidation, which is impacting the show even beyond the fewer exhibitors this year in Las Vegas. GSX is the new branding for the trade show formerly known as ASIS. There was an impressive crowd of visitors waiting for the show floor to open Tuesday morning; the conference part of the program began on Monday. After the attendees filed through the doors, the foot traffic seemed brisk throughout the morning, and was somewhat steady until the end of the first day. Exhibitors as a whole seemed pleased with the first day and cautiously optimistic about the rest of the show. Acquisitions And Consolidation HID Global announced on the first day that they will acquire Crossmatch - emphasizing the impact of consolidationEmphasising the impact of consolidation on the industry as a whole, and on this show, was an announcement from HID Global on the first day that they will acquire Crossmatch, a biometric identify management and secure authentication solutions provider. It’s a comparatively large acquisition for the company specializing in trusted identity solutions. Just days earlier, another acquisition also seemed to confirm the trend when UTC Climate, Controls and Security — the owner of Lenel — announced an agreement to acquire S2 Security. The fruits of another recent acquisition was on display at the GSX 2018 hall, where Isonas took its place near the front entrance as part of the Allegion booth, just three months after the global security provider acquired the ‘pure IP access control company.’ Isonas is well positioned in two of the three fastest growing segments of the access control market — IP hardware, which is growing 41 percent per year globally, and access control as a service, or ‘cloud’ technology, which is also outpacing the overall access control market. Allegion also has the third fast-growing segment, wireless locks, covered with its Schlage brand. "New Avenues Of Growth" The early days of new ownership is opening fresh opportunities for both organizations as Allegion seeks to leverage Isonas’ intellectual property and the smaller company finds new avenues of growth in the larger organization, says Rob Lydic, Isonas Global Vice President of Sales. Motorola joined Avigilon in a higher profile role at their booth, emphasizing consolidation in the industry Lydic sees a likelihood of additional acquisitions in the near future in the security space, given the large amount of capital currently available to be deployed, and the large number of entrepreneurial companies looking to make the leap, as Isonas did, from a small booth at the back of the hall to front-and-center as part of a big industry player. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth. In addition to signage, ownership by Motorola is also impacting the Avigilon product offerings. For example, the Motorola Ally security incident management and communications system has been integrated with Avigilon’s analytics-based event detection, and is being positioned to serve the enterprise market. The system simplifies security operations with a single platform that allows access to critical data, including video and access control systems, directly from any web-enabled device. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth Avigilon is displaying Motorola Solutions’ CommandCenter Aware integrated with Avigilon’s systems for use with public safety applications to provide dispatchers and intelligence analysts with video feeds, incident details, alerts, data mapping and responder location. Avigilon has also integrated its AI-driven Appearance Search technology with its Access Control Manager system, so video searches can be performed based on a badge credential. The system can automatically pull up any information, whether video or events in the access control system, based on the badge information. It can also be used to search for lost badges, or to view where a person is located in the building. Avigilon introduced an AI appliance that allows existing cameras to be integrated with Appearance SearchThe company introduced an AI appliance that allows existing (non-Avigilon) cameras (up to 20 two-megapixel cameras) to be integrated with Appearance Search. Also, the next generation of analytics allows detection of more things, such objects a person may be holding, or detection based on what they are wearing. The Growth Of The Cannabis Market Although attendees at GSX are generally understood to be more end users than integrators, Joe Grillo, CEO of ACRE, the parent company of Vanderbilt Industries and ComNet, says he sees little difference in attendees at GSX compared to the ISC West show in the spring. “We see all our resellers here,” he says. Grillo noticed that Day One booth traffic was “not consistently busy, but steady.” Grillo says ACRE expects to be active again soon in the mergers and acquisitions market. The company has grown through six acquisitions since its founding, and has had one divestiture (when it sold Mercury Security to HID last fall). Since selling Mercury, ACRE has been ‘back in the buying mode,’ just looking for the right opportunity, says Grillo. New markets are a theme at GSX, and one of the biggest new opportunities is the cannabis industry. Marijuana has been legalized in dozens of U.S. states, and Canada is on the verge of legalizing the drug. March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics March Networks is among the companies targeting the cannabis industry in a big way. Already across the U.S., March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics. The business intelligence solutions also aid compliance in the highly-regulated industry. March Networks provides radio frequency identification (RFID) tag to track plants throughout the channel, and tracking is integrated with video systems to provide correlated video views. A couple of exhibitors mentioned to me the need for commercial companies to deploy a comparable level of automation as their employees are accustomed to in the smart home environment. That suggests a need for things such as smartphone integration and voice commands. One exhibitor putting its toe in the water is Hanwha Techwin, which showed an Amazon Echo device used to control a video management system (VMS) with voice commands. Could the simple integration be a preview of the future of control rooms, where security officers merely talk to their equipment rather than operating controls? We’ll be talking to more companies (and maybe a few machines) on Day Two of the show, and will be reporting what we hear.
When an active assailant strikes, it’s over fast, and most of the damage happens before help arrives. Responding appropriately can save lives, and it takes training and practice to know what to do as a tragedy unfolds: Where can I hide? Can I get out? Where do I run? If you hear shots or see someone with a knife, your training empowers the best response, and thorough and repetitive training avoids being paralyzed by panic. Standards On Workplace Violence ASIS International is a member of ANSI and an accredited standards developer ASIS International has been working for more than a year on a document to enable security professionals to develop an effective approach for prevention, intervention, response and recovery to an active assailant, whether he or she is acting alone or as part of a group. The Active Assailant Supplement is an annex to the ANSI Standard on Workplace Violence and Intervention; it is being developed as part of the current revision to the standard. ASIS International is a member of ANSI (American National Standards Institute) and an accredited standards developer. Security practitioners use the ANSI standard to develop their own processes, procedures and documentation related to workplace violence. The ANSI standard on workplace violence was created 10 years ago and already has been revised once. In that time, the standard has been quoted extensively and adopted and utilized by many corporations and security practitioners. Leading creation of the Active Assailant Supplement is Michael Crane, Security Consultant and Attorney at Securisks, and chair of the ASIS International Active Assailant Working Group. There are 17 individuals on the drafting committee on active assailants, each with their own specific areas of expertise, from big corporations, to psychologists, to the government. The committee will create a draft, which will be submitted to the technical committee (150 or so people) for review and comment. The ANSI standard on workplace violence has been quoted extensively and adopted and utilised by many corporations and security practitioners Active Assailant Supplement Elements Prevention - A key to preventing active assailant incidents is awareness, such as identifying behaviors that suggest a potential for violence. In addition to recognizing troubled behaviors, companies should have policies and procedures in place to report concerns to supervisors, and then policies to follow up. Intervention - Training equips companies to react effectively in the case of an active assailant attack. Repetition and practice ensure an appropriate reaction, and inform decisions about where to hide, the nearest exits, etc. Employees might hide in a washroom or a conference room that locks, or they might use furniture to block the door. Response - It also takes training for employees to understand what happens when first responders arrive. Private security and employees have specific roles when first responders show up. Recovery - After the incident, other issues include cleanup, providing a gathering place for employees and family members, and counseling. Addressing School Violence The workplace violence prevention plans in the Federal government are right in sync with private industry"Crane was an assistant state’s attorney in Chicago before going into private practice. He has also served as general counsel and vice president for security companies and combines law and security expertise to protect companies from liability. Crane has written and provided training on the topic of workplace violence prevention for many years for ASIS International and was among the first members of the Standards and Guidelines Commission in 2000. Although school violence is not addressed specifically in the Active Assailant Supplement, the protocols covered in the document apply to schools as well as other sites such as governments. “The workplace violence prevention plans in the Federal government are right in sync with private industry,” says Crane. “They are almost identical.” Workplace Violence At GSX 2018 Workplace violence, including active assailants, will be among the issues addressed at the upcoming GSX 2018 in Las Vegas. Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show, attended by more than 22,000 security professionals from 100-plus countries. There will be sessions addressing workplace violence and interest group discussions on a range of topics.
Genetec Inc., a technology provider of unified security, public safety, operations and business intelligence solutions, announces its solutions have been selected by the Royal Borough of Windsor and Maidenhead (RBWM) for region-wide CCTV monitoring and community safety purposes. The new system will result in better coverage across the borough and enable information to be quickly shared with regional police as and when required. At the heart of the program is a completely refurbished monitoring center, equipped with the Genetec flagship unified security platform Security Center and other complementary Genetec security solutions. KiwiVision Privacy Protector The open federated architecture of the Genetec infrastructure provides the foundation for a system that can scale and evolve as needs change These include the KiwiVision Privacy Protector to simplify GDPR compliance, Genetec Mission Control to guide operators in providing a consistent response to incidents and Genetec Clearance for the easy and secure sharing of evidence with local law enforcement. The open federated architecture of the Genetec infrastructure provides the foundation for a system that can scale and evolve as needs change. It also allows RBWM to protect its past investments by retaining the majority of its existing cameras, alongside the 200 that will be added, upgraded or relocated. “The safety of residents and visitors in the borough is a priority, and we are pleased to be installing a new-state of the art system that delivers this,” said Cllr. Mike Airey, cabinet member for environmental services. Improved Information Sharing “We not only benefit from reduced operating costs and improved information sharing with local police, but we also gain access to cutting edge privacy controls that make it far simpler for us to maintain our compliance with the EU GDPR and other data protection regulations.” The project began when specialist town center video surveillance consultancy firm Global MSC Security (MSC) was called in to assess the Royal Borough’s existing analog video surveillance system, its fitness for purpose and how it could be cost-effectively improved. This resulted in a competitive tendering exercise won by Computerised & Digital Security Systems Ltd. Cost-Effective Response (CDS) who designed a state-of-the-art wireless camera system to support the Genetec open architecture video management system (CDS) who designed a state-of-the-art wireless camera system to support the Genetec open architecture video management system. Some of the key technical benefits delivered by CDS include full HD recording, advance graphical mapping, advanced incident response, customisable and extended video storage retention, and various features to aid data protection regulation compliance such as automated pixelisation of images and end-to-end encryption to enhance privacy controls “Genetec is delighted to see our solutions chosen by the Royal Borough of Windsor & Maidenhead for this well thought out upgrade that will benefit the council, local police and citizens”, added Dan Meyrick, Regional Sales Manager, Genetec Inc. “I would like to thank and congratulate our partner CDS for producing a high quality and cost-effective response that delivered against the customer’s requirements.”
Three leading Australian universities are introducing SafeZone technology from CriticalArc in a drive to improve safety, increase their security teams’ capabilities and provide better care for students and staff. With 30% of Australian universities now using SafeZone, this latest wave of roll-outs confirms CriticalArc’s position as the most comprehensive safety and security management solution provider in the Australian market. Adding to CriticalArc’s growing network of customers, the University of Tasmania (UTAS), the University of Southern Queensland (USQ) and the University of the Sunshine Coast (USC) have more than 75,000 students and staff working in 33 campuses and associated facilities across four States, meaning that SafeZone now serves the needs of 1.5 million students and staff at more than 500 locations across the world. Ensuring Best Safety Standards SafeZone is a key tool in enabling campus security to be more effective, more relevant and more approachable"“UTAS, USQ and USC each have their own unique character and particular priorities but ensuring the best standards of care for students and staff is top of the list for all of them,” says Robert Christie, CriticalArc’s Customer Success Manager, Asia Pacific. “Preventing crime, managing public safety and handling emergencies are still the top concerns of university security teams, yet SafeZone is also enabling those teams do much more to address issues that are increasingly important. "From improving support around mental well-being to tackling sexual harassment and making campuses inclusive environments where everyone can feel safe and welcome, security and response teams are playing a much bigger role than they traditionally did. SafeZone is a key tool in enabling campus security to be more effective, more relevant and more approachable.” Notifications In The Event Of Emergencies SafeZone puts individuals directly in touch with response teams at universities, hospitals, government departments and similar large organizations, making it easy for them to use their mobile phones to request help, trigger an emergency response, receive rapid notifications in the event of emergencies and benefit from a wide range of customer-care services. With the ability to ‘geo-fence’ any location, each of the universities’ security teams can now monitor care and safety of users wherever they areThe technology also lets students and staff share their situation with response team members by checking-in when working alone outside hours or in higher-risk environments such as laboratories and workshops. With the ability to ‘geo-fence’ any location, each of the universities’ security teams can now monitor care and safety of users wherever they are – including those working out-of-hours on campus, those traveling between campuses locally or on field projects, or traveling overseas for study or research placements. Precise Location Of Vulnerable Individuals With its global reach combined with its ability to precisely locate vulnerable individuals, SafeZone is helping universities around the world to better meet their duty of care obligations, says Darren Chalmers-Stevens, CriticalArc, Managing Director. “SafeZone offers all the functions that university teams want, in one easy package. It is not only helping them to deliver better care, it is letting them demonstrate this fact in an accountable way.”
CNL Software, a provider of Physical Security Information Management (PSIM) software, is pleased to announce that its award-winning PSIM technology was used to support a multiagency security program for Super Bowl LIII. The company’s IPSecurityCenter PSIM solution is installed in the Atlanta Police Department’s Video Integration Center (VIC) and helps secure the city and surrounding metro area, keep the metro area’s transportation networks and systems safe, and to help law enforcement personnel make sense of the huge volume of video intelligence that is generated day-to-day and during large-scale events like Super Bowl. Provide Law Enforcement Atlanta is no stranger to hosting large-scale events, which includes a previous Super Bowl, and has invested in a multitude of surveillance, analytic, data fusion, and communications systems and technologies in recent years. The City has also established an innovative public-private partnership, known as Operation Shield, that effectively leverages the surveillance assets and infrastructure of other participating Atlanta metro area departments and agencies, including the City’s Metro Atlanta Rail and Transit Authority (MARTA) and Hartsfield Jackson International Airport, and the City’s business community, while also bridging communication gaps between and across them. IPSecurityCenter by CNL Software integrates these disparate systems in the Atlanta Police Department’s VIC to provide law enforcement IPSecurityCenter by CNL Software integrates these disparate systems in the Atlanta Police Department’s VIC to provide law enforcement and other public safety professionals with the data and video intelligence they need to effectively respond to incidents before they arrive on scene. Crowd Size Monitoring “Estimates are that nearly one million people traveled to Atlanta for Super Bowl Week. As with all major events, ensuring public safety and security is a big job and huge concern,” comments Mike Mostow, General Manager – Americas at CNL Software. “IPSecurityCenter was installed in the VIC by the Atlanta Police Department to provide the real-time situational awareness and decision support they need to ensure public safety and security during large-scale special security events like Super Bowl LIII.” IPSecurityCenter PSIM is installed in some of the largest public safety and security programs in some of the world’s largest cities. The platform enables the most intelligent integration of the widest range of disparate public safety, security, emergency management, and homeland defense system and sensor technologies, including video and video analytics, facial recognition, license plate recognition, crowd size monitoring, gunshot detection, chemical, biological, radiological/nuclear and explosives detection, geospatial mapping, and asset tracking.
Exabeam, the next-gen SIEM company, announces that NTT DATA Corporation (NTT DATA), its partner and one of the providers of technology and services for government and business, has chosen to secure its global operations using Exabeam’s Security Management Platform (SMP), which provides unlimited data collection, machine learning and analytics for modern cyber threat detection and response. NTT DATA’s internal system is used throughout more than 50 countries and regions, 210 cities and by 34,500 employees in Japan and 75,500 employees overseas. It is a fast-moving company that has acquired many businesses over the last five to 10 years, resulting in the inheritance of a number of different legacy SIEM platforms. However, these solutions were lacking, and NTT Data wasn’t obtaining the visibility it needed to keep pace with modern cyberthreats. Disparate Legacy Systems Exabeam was already our valued partner, and we were so confident in the company’s security solution" “Exabeam was already our valued partner, and we were so confident in the company’s security solution, we decided to use it ourselves, to remove complexity and unify our disparate legacy systems that were ineffective at protecting against modern threats,” said Hiroshi Honjo, head of Cyber Security and Governance at NTT DATA. “Having Exabeam’s unlimited data lake and attractive pricing model made the difference for our large organization.” Exabeam’s SMP provides NTT DATA with scalable, behavioral modeling, machine learning, and advanced analytics for comprehensive insider and entity threat detection throughout Japan, APAC, North America, and Europe. This functionality was vital to the NTT DATA team because they required greater visibility into potential cyberthreats throughout the organization and in all locations around the world. Automated Incident Response “NTT DATA’s journey was a unique one, since they had multiple legacy logging platforms in use globally. Exabeam was able to replace or consolidate each system using our next generation platform, and we accomplished the initial rollout in a matter of months,” said Nir Polak, CEO, Exabeam. “The swiftness of that transition is critical to maintaining secure operations, especially when dealing with such a geographically dispersed enterprise.” Automated incident response allows teams to respond to security incidents rapidly and with less effort Automated incident response allows teams to respond to security incidents rapidly and with less effort. At the SMP’s foundation is the Exabeam security data lake, designed to store all event logs at a predictable and flat price. This frees the NTT DATA security team from manually analyzing data logs – and instead they can focus on quickly identifying and responding to security threats. SIEM Solution According to Honjo, “The second phase of our project will be to look at use cases and fine tune the SIEM solution to work for our business needs. Overall, we are very happy with how well Exabeam met our stated deadlines and how quickly we are able to realize value from the product. We look forward to introducing Exabeam to our global customers.” Recently, Exabeam was identified by Gartner, Inc. in the 2018 Magic Quadrant for Security Information and Event Management. The company was positioned as a Leader based on completeness of vision and ability to execute.
An integrated security system that includes new IP cameras and two-way audio technology has seen the rate of injuries as a result of attacks on Post Office staff decline by 36% in just three years. This follows the deployment of a sophisticated monitoring and intelligent threat detection platform from Morphean, a Video Surveillance-as-a-Service (VSaaS) innovator, which has not only helped to keep staff safe but has also protected ATMs from attack, helping to keep Post Office doors open. Post Office is responsible for the safety and well-being of 14,500 workers in 11,600 branches. The very nature of their combined service offering and the fact they are often located in rural areas, means branches are prime targets for thieves. Threat Intelligence Opportunistic attacks on staff and equipment, and the use of expanding gas to break open ATM machines is not uncommon Opportunistic attacks on staff and equipment, and the use of expanding gas to break open ATM machines is not uncommon. In rural communities, attacks on equipment can leave branches out of operation for long periods. In the last year alone, there were 13,437 violent attacks on convenience store workers, 27% of which involved a weapon and 39% led to injury, according to The Association of Convenience Stores (ACS) annual Crime Report. The Post Office security team wanted to build on its existing threat intelligence and response system, Grapevine, with a network of IP cameras and two-way audio into branches. Axis Communications cameras, microphones and speakers, connected to the Morphean Platform and hosted in the cloud, were installed in pilot branches by Kings Secure Technologies. Security Automation Now that trial implementations have been completed successfully, the security team plans to expand coverage rapidly. In addition to the cameras, the networked speakers enable control centre staff to speak directly to customers and suspected criminals, alerting them to the fact they are under surveillance. The solution is also optimised to use low bandwidth dataFurther integrations are under way to bring security automation to other branches, such as providing the ability for remote agents to lock on-site safes in the event of an attack. Because of the challenges around connectivity in the areas where the most vulnerable branches are situated, the solution is also optimized to use low bandwidth data and is capable of streaming video over a 3G mobile network. Built-In Intelligence The built-in intelligence of the Morphean Platform means staff are able to monitor footage for suspicious behavior, such as individuals loitering near an ATM, and issue an alert to security teams who can then decide on the appropriate course of action. If it’s someone trying to find their wallet, no action is taken; if a crime is in progress, police will be notified along with video footage. In addition, staff are able to trigger an alert manually using an under-the-counter activation button, which can be investigated immediately by control center staff at the alarm receiving centre (ARC). “The safety of our staff is our number one priority,” says Physical Security Manager for Post Office, Mark Dinsdale. Make Significant Differences Footage goes straight to the Morphean cloud, and the platform compresses video and is fully encrypted end-to-end"“We’ll never completely eliminate crime in our branches, but we are also not powerless against it and we are able to make significant differences to the safety of our people, as demonstrated by the new technology we are deploying.” “Post Officers, particularly those in remote areas without access to a nearby police station, value the easy access to help and now report feeling much safer at work,” he concludes. Paul Ottley, Account Director at Kings Secure Technologies, says there are more subtle benefits to the Morphean Platform. “Footage goes straight to the Morphean cloud, and the platform compresses video and is fully encrypted end-to-end. This means that even if criminals attempt to destroy cameras or on-site storage appliances, recordings of any incidents are secured in a manner that is admissible as evidence. This eliminates the challenge of sending out an engineer to collect footage. It’s a simple solution that is flexible and fully compliant with regulations such as the GDPR.”
Police in the Belgian city of Lokeren can now respond more effectively to criminal incidents – thanks to an upgraded video surveillance solution that features 120 Sony security cameras, including the rugged SNC-VM772R 4K minidome camera. Lokeren Video Security System Like all urban centers, Lokeren faces the challenges of crime, vandalism and antisocial behavior in its streets, public buildings and open areas. Until recently, the municipal police force relied on analog security cameras to assist with detecting and responding promptly to incidents. However, these cameras’ limited resolution and image quality often prevented efforts to prosecute individuals as they could not be successfully identified. In response to requests from citizens to maximize their safety, Lokeren police chiefs and city politicians pledged to upgrade their video surveillance capabilities. In particular, the urgent need was identified to improve the accurate recognition of suspects caught on camera – an even greater challenge at night or on dull, poorly-lit days. Full HD And 4K Network Surveillance Cameras Security specialists DS-Consulting therefore recommended upgrading Lokeren’s video security to a combination of Full HD and 4K network surveillance cameras. A competitive comparison by DS-Consulting saw Sony’s outdoor minidome and fixed box-type cameras compare favorably with other brands. The rugged SNC-VM772R 4K minidome camera delivered significantly better images in tough low-light conditions “There was only one choice when we compared the image quality of Sony’s security cameras against other market-leading brands” states Emiel De Smet of security specialist DS-Consulting. “They offer so much more detail and clarity – and that makes all the difference in critical surveillance applications.” SNC-VM772R 4K Minidome Camera In particular, the rugged SNC-VM772R 4K minidome camera delivered significantly better images in tough low-light conditions. The camera’s large-sized Exmor R CMOS image sensor allows it to capture more light than ordinary sensors. This allows it to ‘see’ suspicious activity clearly in conditions of almost complete darkness, where less sensitive cameras struggle. Installed by Belgian integrator Seris Technology, the complete surveillance solution features a video management platform by Genetec Security Center plus 120 strategically located Sony cameras, providing 24/7 coverage of city center streets as well as public buildings, including Lokeren’s police station, central library and city hall. Crime Prevention And 24/7 Video Monitoring The new cameras give police a clearer picture of criminal activity in the city streets, assisting with the positive identification of suspicious persons even at night and in low light conditions. Round-the-clock video footage is routed via an optical fiber network, where images are monitored in the central dispatch office at police headquarters. Since the cameras’ installation, city police have seen a reduction in crime levels, accompanied by greater peace of mind for residents and visitors.
Round table discussion
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
The beginning of the school year and upcoming seasonal changes remind us that demand for security systems, like almost everything else, is seasonal to some extent. Making improvements to educational facilities during the summer months – including installation of security systems – is the most obvious example of seasonal demand, but there are others. We asked this week’s Expert Panel Roundtable: Which vertical markets for security are impacted by seasonal changes in demand?
Video cameras are everywhere, and hundreds more are installed every day. Our society appears to be reaching a point of perpetual surveillance. It certainly feels as if we are always being watched even though it is not yet the case. But as cameras are becoming more common than ever, we are also entering a new era of privacy concerns and sensitivities, as evidenced by GDPR and other such initiatives. We presented this quandary to this week’s Expert Panel Roundtable: Surveillance cameras can go anywhere, right? Where is it “not OK?”