With the need for security guard services growing worldwide, Montreal-based tech startup TrackTik Software Inc., an integrated security workforce management cloud-based software solutions provider, has announced US$ 45 million in financing from Toronto-based Georgian Partners and Montreal-based Caisse de dépôt et placement du Québec (la Caisse). Disruptive AI And Machine Learning Funds will be used to drive new product development — including disruptive artificial...
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. eFusion Security Management The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud...
Qognify - the trusted advisor and technology solution provider for physical security and enterprise incident management - announced that it has completed the acquisition of the IP video management software (VMS) company - On-Net Surveillance Systems (OnSSI), including the pioneer of IP video technology - SeeTec GmbH. Backed by the global investment firm Battery Ventures, Qognify announced the agreement on December 22, 2018 and the deal closed on December 28, 2018. Expanding Geographic Reach Wi...
Qognify - the trusted advisor and technology solution provider for Physical Security and Enterprise Incident Management - announces that it has signed a definitive agreement to acquire On-Net Surveillance Systems, Inc. (OnSSI) and the OnSSI company - SeeTec GmbH. In bringing these award-winning technology solution portfolios together under one roof - including Qognify VisionHub, OnSSI Ocularis and SeeTec Cayuga - Qognify becomes one of the largest VMS, Video Analytics, PSIM and critical inciden...
Maxxess will be at Intersec 2019 showcasing its latest advances in corporate risk reduction, improved people management and smarter hospitality access solutions - including new releases in its popular eFusion and Ambit solutions. The latest version of the VisitorPoint module within the eFusion security management platform will be showcased, offering a host of new streamlined functions for efficient people and visitor management. Harnessing current advances in cloud computing and mobile communic...
Edesix, UK-based provider of Body Worn Cameras, announces a partnership with Environment Agency enforcement teams in the East Midlands following a successful six-month trial. The trial, which was commissioned after a growing number of abusive incidents during site inspections to waste sites, found that wearing Body Worn Cameras helped to reduce incidents of anti-social behavior, assaults and threats against Environment Agency staff. Abusive Behavior Footage captured on a bodycam in the North-...
Global cybersecurity firm, GRA Quantum announces the launch of its Security Operations Center and Managed Security Services offering. Over the last 24 months, GRA Quantum has successfully partnered with clients in special requests to support managed security services functions. Offering these stand-alone services through an onsite Security Operations Center is new to the organization. 24/7 Cybersecurity Monitoring Earlier this year we built a state-of-the-art Security Operations Center" According to GRA Quantum’s President Tom Boyden, “Earlier this year we built a state-of-the-art Security Operations Center in response to growing requests from our clients to provide day-to-day 24/7 cybersecurity monitoring, alerting, and incident handling. Our clients want to strengthen their security stance while transferring the daily burden of security functions to a team of experts. And our tailored Managed Security Services offering is designed to do just that.” Jennifer Greulich joined the team to lead the Security Operations Center as the Director of Managed Security Services. She brings a passion for keeping high-risk organizations secure, with over 13 years of experience in IT and cybersecurity. Greulich shares, “I’m excited to be part of the GRA Quantum team. We’re offering a unique program with a technology-agnostic approach that will allow us to adopt the best-in-class-technology for our Security Operations Center and our clients, including Security Information and Event Management (SIEM) and Managed Detection Response and Remediation (MDR) capabilities.” In conjunction with the launch of the Managed Security Services Offering, GRA Quantum experts will be conducting complimentary security assessments for interested parties.
ISC East, in collaboration with premier sponsor, the Security Industry Association (SIA), reported strong growth results at the conclusion of this year’s industry event in New York City. The International Security Conference & Exposition is the Northeast’s largest security trade show, where close to 7,500 security and public safety professionals convened this month to meet experts from over 300 leading security brands, all the while co-locating with the launch of Unmanned Security Expo New York and Infosecurity North America, Europe’s global information security event. Welcoming 85 new companies and brands and close to 1,000 more industry professionals compared to 2017, the ISC East exhibit hall bustled and featured expanded in-depth content - including new technologies and product categories, more special events/networking opportunities, and a variety of all-new complimentary education through SIA Education@ISC and Unmanned Security Expo New York. Comprehensive Security for a Safer, Connected World The extensive variety of vendors and professionalism of the ISC staff make it one of the best shows out there" Mary Beth Shaughnessy, Event Director for ISC Security Events, noted, “It was exciting to see such a robust expo floor and high attendance growth with our New York event this year, all while matching up to our brand theme of Comprehensive Security for a Safer, Connected World. The top attended education sessions were formed around a diverse spectrum of topics including cyber-physical integration, converged security for smart cities buildings, the impact of IT and AI on video surveillance/intelligence, critical incidents prevention and mitigation, plus drones, drone-detection, drone-regulations and policies, and more. The present and future is bright for ISC East and we are committed to providing great solutions and education for this community.” Over the past 4 years, the ISC East Show Floor has grown by over 60% in square footage and has come to be known as ‘the highlight of the year,’ stated by Linda Esposito, Security Specialist of US Postal Inspection Service. “The extensive variety of vendors and professionalism of the ISC staff make it one of the best shows out there. In addition, Alex Pachikov of Sunflower Labs, a first-time exhibitor at Unmanned Security Expo, commented, “This was the perfect venue for us to introduce the Sunflower Labs drone-based security system. We had the perfect audience and fantastic exposure to potential customers, installation partners and system integrators.” Unmanned Security Expo Additionally, while Unmanned Security Expo presented 15+ sessions dedicated to the in-depth issues, policies and opportunities for UASs and UGVs, the SIA Education@ISC East program offered 25+ complimentary education courses and highlighted two distinct Keynote Speakers for the first time at ISC East - Philip Halpin, Senior Vice President & Head of Global Security for Brown Brothers Harriman, and James A. Gagliano, Retired FBI Supervisory Special Agent, CNN Law Enforcement Analyst, and Adjunct Assistant Professor at St. John’s University. SIA Education@ISC East 2018 SIA Education@ISC East 2018 was a great success, with hundreds of conference attendees participating in education sessions, engaging keynotes and hands-on workshops" “SIA Education@ISC East 2018 was a great success, with hundreds of conference attendees participating in our education sessions, engaging keynotes and hands-on workshops,” said Don Erickson, CEO of the Security Industry Association. “This year’s sessions highlighted cutting-edge topics like the move to smart cities, convergence in the security industry, the use of artificial intelligence in video analytics, and how some legacy connections leave modern access control data vulnerable to hacking.” With so much learning and knowledge-sharing happening on the show floor, security professionals still found time to participate and engage at the numerous special events that ISC East had to offer, including: the first-ever SIA Women in Security Forum Breakfast, the new Mission 500 Hygiene Kit Building, the ever-popular ASTORS Homeland Security Awards, ISC East’s Featured Product showcase featuring some of the most innovative product technologies, a high-profile celebrity appearance of former NY Yankees player Tino Martinez , the signature ISC East Grand Opening Ceremony, the Crack the Tap Cocktail Reception, and so much more. ISC Security Events As ISC East comes to a close, the ISC Security Events portfolio continues to provide comprehensive security for a safer, connected world through ISC West and Unmanned Security Expo, and Connected Security Expo taking place on April 9-12, 2019 (SIA Education@ISC: April 9-11 | Exhibit Hall: April 10-12) in Las Vegas.
Maxxess Systems introduces new enterprise software that combines security, communications, business intelligence and data integration into a single, easy-to-use platform called Maxxess InSite. Maxxess InSite, Unified Interface Platform Maxxess InSite sets a new benchmark for security and business intelligence software platforms by every standard of measure" Nothing operates, functions or looks like Maxxess InSite. It combines systems intelligence and human intelligence to detect and respond to unfolding events in real-time – all of which is queued, organized and displayed on a highly-intuitive user interface. In doing so, Maxxess InSite truly enables early action, allowing IT, Operational Technology and Physical Security departments within organizations to correlate data, improve response coordination, and deal with issues when they’re small – before they become large and costly. This new system is uniquely categorized as an Awareness and Response Coordination System. “Maxxess InSite sets a new benchmark for security and business intelligence software platforms by every standard of measure,” said Nancy Islas, President of Maxxess Systems. “It goes beyond basic detection and control. It empowers total awareness and provides users with unprecedented capabilities to help prevent incidents from happening. It also coordinates the activities of first responders and the people they are assisting from the moment a threatening event is detected. And best of all, is the simplicity of Maxxess InSite’s operation.” Security And Business Intelligence Software Maxxess Insite is a single system that harnesses the power of myriad system technologies Maxxess InSite features an open-architecture framework to accommodate virtually any security or business intelligence application with comprehensive functionality – from automated responses with database integration to mobile alert notifications with two-way communications. Hardware and software solutions from more than 50 different leading manufacturers are already integrated into Maxxess InSite, providing more combined capabilities and functionality than any other cross-platform solution available. This allows Maxxess InSite to be configured for virtually all applications, employing any combination of software modules and hardware to deliver each user with a highly customized solution and unparalleled efficiency. Myriad System Technologies Maxxess Insite is a single system that harnesses the power of myriad system technologies, effectively expanding their collective capabilities while also making human interaction more intuitive. It meshes the capabilities of the following systems and technologies, and more: video surveillance, access control, GPS/IPS location technologies, intrusion detection, fire safety systems, perimeter detection/protection, HVAC/building management, smart phones and tablets, ID/credential badging, two-way communications, guard tour, visitor management, time and attendance, license plate recognition, hotkey emergency notification, reporting/forensics, wireless sensors, elevator/escalator control and database integration. Kevin Daly, CEO of Maxxess Systems, added, “The beauty of the product is that even with these diverse integrations and functions, the system is very user friendly. Simplicity of use is truly the system’s ultimate sophistication.”
Exabeam, the next-gen SIEM company, has announced two new features: Exabeam Smart Timelines and a single user interface (UI), as part of its ongoing mission to improve security analyst productivity. The additions to the Exabeam security information and event management (SIEM) platform will offer improved detection, investigation and response to threats. The company also announced the general availability (GA) of its Threat Intelligence Service to its customer base. Smart Timelines Smart Timelines incorporate indicators of compromise (IOCs) from the Exabeam Threat Intelligence Service, including suspicious IP addresses, blacklisted IP addresses, known phishing URLs, and malicious file signatures. By automating the task of timeline creation and automatically stitching together normal and abnormal behaviors for users and devices, Smart Timelines put an end to a common problem for security analysts– known as ‘swivel chair’ incident response– in which workflows require multiple products with different interfaces and credentials. Now, investigators can accurately pinpoint anomalous events and improve their productivity for incident investigation and threat hunting. “Exabeam Smart Timelines allow us to quickly analyze and understand when there is a threat, so my team can spend their time acting on the evidence and outmaneuver our adversaries,” said Ryan Clarque, senior manager, Global Cybersecurity, Levi Strauss & Co. Exabeam Threat Intelligence Service The Threat Intelligence Service behind Smart Timelines is a curated cloud threat intelligence feed that provides context for potential attacks Ian Lee, manager, IT Security and Compliance, Hudbay Minerals, Inc., reiterated Clarque’s point: “Exabeam Smart Timelines stitch together events from various sources, making it easy for us to identify anomalous activity in our environment.” The Threat Intelligence Service behind Smart Timelines is a curated cloud threat intelligence feed that provides context for potential attacks, which SOCs need, by uncovering IOCs and malicious hosts. As part of the service, Exabeam aggregates IOC feeds and applies machine algorithms to remove false positives before downloading the feeds on a daily basis to Exabeam Data Lake and Exabeam Advanced Analytics. Exabeam Security Management Platform The Exabeam Security Management Platform now also has a single, unified UI for detection, investigation and response. Having fewer tools to master means that engineers have a significantly reduced learning curve. Additionally, the ability to easily and efficiently move from investigation to case management to response without needing to manually assemble information from multiple disparate systems reduces the chance for human error. By spending more time on investigation, teams decrease the mean time to detect (MTTD) and mean time to respond (MTTR). “We know that SOC teams are severely time constrained and under intense pressure, due to staffing issues and ubiquitous cyberthreats. Manual tasks like reviewing logs to understand the full scope of an attack can be unnecessarily burdensome,” said Trevor Daughney, vice president of Product Marketing at Exabeam. “Considering how overloaded the SOC team is, we want to end fragmented workflows and combine disparate systems and interfaces, so that critical alerts for distributed attacks aren’t missed.” Other new features include: SAML integration for quick and easy single sign-on (SSO) authentication with popular identity and access management (IAM) vendors like Okta, Ping and Google Granular role-based access control (RBAC) for watch lists to control access of sensitive user information by role and responsibility Eight new out-of-the-box response playbooks and over 20 additional prebuilt integrations connecting Exabeam Incident Responder to popular security tools
Hikvision, a security equipment manufacturer, announces that its Hikvision Security Response Center (HSRC) is now a member of the Forum of Incident Response and Security Teams (FIRST), a pioneer in incident response. FIRST is an international confederation of trusted computer incident response teams who cooperatively handle computer security incidents and promote incident prevention programs. Full membership in FIRST will augment Hikvision's ongoing efforts to enhance its incident response and communicate best practice, and enable HSRC to collaborate with more than 400 FIRST member teams from 90 countries. FIRST members include companies such as CISCO, Intel, IBM and Microsoft. Cybersecurity Global Effort "Hikvision is proud to join the concerted cybersecurity global effort and contribute our knowledge, skills and experience to promote a safer and more secure electronic environment worldwide," said Dr. Wang Bin, Chief Officer of Hikvision's Network Information Security Laboratory and Network Security Department. "Hikvision is committed to constantly improving its efficiency and performance in incident response, and to providing global customers with the safest products and services." Mr. Wan Li, head of HSRC, shared a case study on IoT Botnet in Post-Mirai Age and called for collaborative actions In October HSRC participated in the FIRST Regional Symposium Asia-Pacific in Shanghai. Mr. Wan Li, head of HSRC, shared a case study on IoT Botnet in Post-Mirai Age and called for collaborative actions of equipment manufacturers, security communities, regulators and other stakeholders to address the new challenges. Meet Industry Standards Hikvision takes cybersecurity seriously and abides by all applicable laws and regulations in the countries in which it operates. With a record of strict regulatory compliance, Hikvision products meet industry standards for safety and security that include ISO 270001, ISO 9001:2008, CMMI Level 5, and AICPA SOC. Additionally, Hikvision encryption module of IPCs and NVRs has been granted certification for Federal Information Processing Standard (FIPS) 140-2, a U.S. government standard established by the National Institute of Standards and Technology (NIST).
Matrix Comsec, a pioneer of technologically advanced security and communications solutions, is preparing to spread its footprints in the Canadian market. Security And Communication Solutions Matrix is renowned enterprise and each of their solutions are designed and manufactured in the company’s exclusive DSIR (Department of Scientific and Industrial Research) certified Research and Development Center. More than 40% of the company’s manpower is dedicated to the development of cutting-edge enterprise solutions. They also bear customer and market requirements in mind while designing our Security and Communication solutions to ensure that they turn out to be the perfect solution for modern enterprises. Additionally, we offer solutions that cater enterprises across various verticals such as Healthcare, Hospitality, Retail, Banking & Finance, and so on. Our solutions are carefully designed to meet individual requirements of each of these verticals’ market. IP Video Surveillance And Access Control Our range of solutions includes IP Video Surveillance, People Mobility Management and Access Control, Unified Communications and IP Endpoints Our range of solutions includes IP Video Surveillance, People Mobility Management - Time-Attendance and Access Control, Unified Communications and IP Endpoints. Matrix Comsec has successfully assisted leading brands to overcome their security and communication challenges with our proven and innovative solutions across diverse industries in the USA. We are aiming at having similar brand wins and earn customer loyalty in Canada as well. As part of our marketing strategy, we are going to penetrate the Canadian market and reach small & large enterprises of Canada with BTL marketing activities such as upcoming security and telecom exhibitions along with social and print media, etc. We see Canada as one of the potential countries to penetrate with our advanced solutions and make a mark among system integrators and end customers. We aim at becoming a name that believes in delivering substantial Security and Telecom products and solutions. Security Canada Central To further understand the Canadian market, we will also be participating in the Security Canada Central to be held on 24th - 25th Oct 2018. This event will serve as one of the greatest platforms for us to interact with the like-minded system integrators and project consultants of Canada sharing a similar vision like Matrix Comsec; i.e. to deliver world-class and advanced Surveillance, Access Control and Unified Communication solutions to modern enterprises. Interacting with the system integrators will give us greater insight into the enterprise demographics and challenges of the security and communications market in Canada, which will further assist us in understanding the niche requirements of enterprises in Canada and engineer solutions meeting their exact requirements. In our Managing Director, Ganesh Jivani’s words, “Matrix has a rich innovation lineage. The company has acquired a formidable reputation for quality and engineering of its products. Our solutions, with their value-added functionalities, will surely strengthen the communication and security requirements of enterprises. These solutions have already gained interest of system integrators and consultants offering technology solutions for small to large enterprises and projects. We look forward to a welcoming environment in Canada.”
Today’s security leaders encounter many challenges. They have to operate with reduced budgets and face challenging and evolving risks on a daily basis. Security leaders are often ignored and only called upon when needed or in disaster situations. Many don’t have an ongoing relationship with the C-suite because the C-suite doesn’t understand the value they bring to the whole business. In order to resolve these challenges, a security leader can apply a risk-based approach to their security program. According to dictionary.com, risk is “exposure to the chance of injury or loss; a hazard or dangerous chance”. Risk is broader than a security concern and involves the entire business. Through utilizing a 3R model - considering resources, risks and resolutions - a security leader can evaluate the output from the model to build the foundation of a strong plan. This allows the leader to make security decisions based on a quantified risk measure. A business determines what resources it wants to protect, what risks it needs to protect the resources from and what resolutions it can put in place to mitigate the risk. Decisions are based on measurable evidence. Free online risk assessment tools are available to provide a fast, easy way to determine an organisation's basic security risks through an investigative approach The 3 Rs The first step in the 3R model is to figure out what resources need protection. This could be physical - such as buildings, critical infrastructure or valuable equipment, knowledge-based - such as intellectual property, or organizational - such as people or governance structure. Understanding the business will help the security leader develop a list of critical elements. Look for tangible resources such as buildings and machinery, and intangible resources like reputation, knowledge and processes. Second, determine what the resources need to be protected from. Anything that threatens harm to the organization, its mission, its employees, customers, partners, its operations or its reputation could be at risk. These can include contextual risks (workplace safety or natural disasters), criminal risks (theft or cybercrime) or business risks (compliance or legal issues). Anything that threatens harm to the organisation, its mission, its employees, customers, partners, its operations or its reputation could be at riskFree online risk assessment tools are available to provide a fast, easy way to determine an organization's basic security risks through an investigative approach. The tools ask several questions and determine risk based on an organization’s location and the answers provided. Security leaders can also work with security companies and consultants that offer risk assessments to determine their company’s needs, and then offer solutions based on that assessment. The third objective is to determine how businesses can best protect the identified resource. The last of the 3 Rs - resolutions - are those security activities that enable the business to mitigate the impact of security risks. Resolutions can potentially prevent a security incident from occurring, contain the impact to resources if an event does occur and also assist the organization in recovering from an impact more quickly or easily. The first step in the 3R model is to figure out what resources need protection, this could physical such as buildings or critical infrastructure The Path Forward Understanding what risks a business faces in totality provides an opportunity for the security leader to collaborate with other department heads. This gives security leaders an opportunity to engage with functions outside their norm as well as a chance to demonstrate their subject matter expertise. A risk-based approach also helps security leaders fully understand an organization’s needs and concerns, which they can communicate to the C-suite to help them make better business decisions. Metrics can also help business leaders understand the cost/benefit of resolutions C-suite and executives help define an acceptable level of security risk tolerance to resources and make quality, educated decisions about mitigating security risks. Through collaborating with security leaders using a risk-based approach and the 3R model, metrics and reports show the impact of security expenses, and there is a transparent view of security risk. The final decision about how to mitigate and resolve risks is up to the business owner of the resource and the risk stakeholders. To obtain funding, show the risk and value of resources exposed to potential impact. Then present the recommended resolution that reduces the potential level of impact and the associated cost benefit savings. By providing this information, security leaders can ensure that the business owners can make an educated decision. Measuring Success A risk-based approach aligns the security mission with the organization’s mission. Security leaders should have these conversations with their business leaders on a regular basis. Understanding the thresholds of risk tolerance and showing when incidents or activities are trending outside of acceptable boundaries will help business leaders make educated decisions. The 3R model also helps a business to track occurrences, quantify the direct and ancillary impact and make continuous adjustments to the security program Determining a baseline of acceptance gives a foundation for security leaders to point out when the organization is not meeting its own requirements. Metrics can also help business leaders understand the cost/benefit of resolutions and demonstrate when costs may be trending outside of acceptable boundaries. The 3R model also helps a business to track occurrences, quantify the direct and ancillary impact and make continuous adjustments to the security program. It is important to note that this process is not stagnant, and needs to be constantly revisited. Examining risks, resources and resolutions in a systematic way will help security leaders understand what they are protecting Defining Risks And Vulnerabilities Continuous conversations using the 3R model also help business leaders understand what security risks could interfere with meeting business objectives. It also aligns the total cost of ownership for the security program with the business value of the resources at risk. The approach puts the security risk decisions in the hands of the ones impacted by those risksAnd it defines the security role as risk management, not just task management. The approach puts the security risk decisions in the hands of the ones impacted by those risks…the “owners” of the resources. Examining risks, resources and resolutions in a systematic way will help security leaders understand what they are protecting, what they are protecting it from, and how they can help prevent, contain or recover against a specific risk. Followers of this approach are in a better position to ask for funding because they can clearly define and quantify risks and vulnerabilities. Applying these principles will equip security leaders with the knowledge needed to have better dialogue with colleagues in other departments, encouraging more proactive discussions about security.
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognize that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unless they are quickly brought under control. Training Security Officers Governments and organizations across the world are increasingly encouraging businesses to re-assess risks and to plan for and conduct drills for major emergencies. This is driving different agencies and companies to invest in new skills, resources and systems, and encouraging businesses to routinely re-evaluate their emergency response strategies. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents For example: UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents, as part of the UK government’s Action Counter Terrorism program. And organizations including the Association of University Chief Security Officers (AUCSO) and Higher Education Business Continuity Network (HEBCoN) are developing customized training for their members to improve their own response and business continuity plans. Mass Notifications Systems Whether an organization is facing a terrorist attack or a severe weather event, follow up reports consistently identify that the same types of challenges are common to all crisis situations, with similar errors often occurring again and again. Typically, these are centered on three key areas: poor communications, fractured command and control structures, and delayed deployment of resources. Communications skills and technologies clearly play a pivotal role in how effective an organization is in responding to major incidents, particularly when it comes to assessing the situation and its implications, moving people towards safety and providing updates as an incident unfolds. However, when an organization is considering its technology options, emergency response and mass notification systems (MNS) are often touted as the ideal platform to deliver all the required critical communications and ongoing updates. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents Emergency Notification System All the incident reporting, command and control, and communications functions have been brought together on a single platform But, if an organization does not know exactly where all its staff or students are, and it cannot see the location and availability of its first responders and other emergency coordinators relative to them and the incident, then how useful is it to send a top-down alert to everyone? And what about fast moving or multi-centre incidents, where previously agreed evacuation procedures, recommended actions or mustering points may need to change if an incident takes an unexpected turn? Many organizations may have been lulled into believing that an emergency notification system will allow them to confidently handle all the communications aspects of virtually any crisis. In reality, too many businesses are still unaware that there are now much more sophisticated and proven technologies where all the incident reporting, command and control, and communications functions have been brought together on a single platform. Using Live Map Tracking The benefit of using these advanced and more integrated approaches – often categorized as mobile distributed command and control systems – is that they enable faster and better decision making in a crisis using real-time feedback and two-way dialogue with those closest to the emergency. And they avoid the risks of any potential delays, miscommunications or mistakes that can happen when an organization is under pressure to respond and often switching between multiple systems. Leading universities and multi-national corporations are already using new mobile/web-enabled platforms to improve their incident response These next generation emergency management platforms have been specifically designed to enable real-time mapping of an organization’s security assets and its users on a single screen and to fully integrate it with a highly targeted geo-fenced notification capability. The mass notification aspect of the system can then be used to advise specific groups on the best actions to take at their location as an incident develops. The use of live map tracking enables real time mapping of an organisation's security assets Segmented Messaging Many leading universities and multi-national corporations are already using these new mobile/web-enabled platforms to plan, manage and improve their incident response, leading to 50% faster reactions and more positive outcomes.During a crisis, users can receive push notifications so the security centre can immediately see their exact location and advise them accordingly The systems have been widely adopted within the higher-education sector, but they are equally applicable to any large company with multiple international sites or those situated in research or corporate campuses where the bulk of assets and people are based in one or more key locations. Typically, systems provide users with a smartphone app that they can use to call for immediate emergency or first aid support when at work, or to report something suspicious which could prevent an apparently minor incident from escalating into a full-scale emergency. During a crisis, users can receive push notifications, SMS and E-mails asking them to open the app if they are not already logged in, so the security center can immediately see their exact location and advise them accordingly. Supporting Dispersed Mustering Now that communications can be more nimble, responsive and flexible this can support the increasing numbers of planners are recognizing the advantages of dispersed mustering. This is a strategy that has been developed to reduce the risk of secondary attacks on unprotected people complying with instructions to evacuate from premises and gather in what are, effectively, exposed locations. It is now acknowledged that evacuees waiting outside for any length of time are more vulnerable to targeted attacks or to injury, from flying glass for example. With dispersed mustering – a strategy made more effective by these new mobile distributed command and control systems - a building’s occupants can be advised not to go outside, but to move to known safe internal locations. People in each specific area can then be kept regularly updated. Many corporations are now using new mobile/web-enabled platforms to improve their incident response Coordination Between Response Agencies The software platforms can be integrated with an organization’s fixed security infrastructure to take real-time sharing of information First responders are permanently logged in, so the emergency operations center can see their exact locations in real-time and can advise what actions to take in mustering people or in setting up and protecting security cordons. Bringing everything together on one platform, with real-time feedback and in a fully integrated system also removes what is often seen as the weakest communication link in managing any major incident: the need to rely on conventional two-way radio as the sole means of communication between the command and control center and its first responders and other team members on the ground. The software platforms can be integrated with an organization’s fixed security infrastructure to take real-time sharing of information to a new level for improved collaboration, coordination and communications between users, the incident management team and external agencies. Improving Emergency Response Strategies One of the most powerful features of some of these new systems is the ability to record and view all alerts, responses and the detailed conversations between first responders, emergency coordinators and other parties. This allows the systems to be used to simulate major incidents involving inputs from the emergency services and other key agencies and to ensure the organization’s crisis management plans have been fully tested against a range of possible incident scenarios.
In 1901 New York state made a pioneering regulation move and became the first US state to require automobile owners to register their vehicles. This marked the beginning of regulation on modern traffic, which - following decades of development - resulted in a multi-layer concept of regulation relating to vehicles and driver’s licenses, traffic signs and insurance mechanisms that we are all familiar with nowadays. While certain parallels can be drawn between the early days of cars and our contemporary experience with quadcopters, we are facing a new challenging era that is far more complex to organize and regulate. Integrating Drones In Existing Regulatory Ecosystem Similar to other pioneering technologies in the past, drones need to integrate into a long existing and well-balanced ecosystem, the rules of which have first been drafted some one hundred years ago and have evolved without taking vehicles such as drones into account. Yet the safety risks related to aviation hinder the quick integration of drones into that ecosystem, broadening the gap between existing regulatory landscape and the exponentially growing popularity and ever-advancing technology of drones. The safety risks related to aviation hinder the quick integration of drones into the legislative ecosystem For the past several years, governments and legislators have been trying to tackle this problem by trying to answer two questions: how to properly integrate drones into the airspace without creating a hazardous impact on existing airborne operations, and how to enforce regulations in order to prevent the side-effects related to careless or malicious drone flights, taking into consideration public safety and physical security. Counter-UAS Measures And Regulations Up until 2018, legislators tried to tackle these two questions as a whole by introducing bundled legislation drafts covering the entire landscape of gaps they needed to address, which resulted in multi-parliamentary committee efforts both in the US and abroad to review and approve each bill - a process that is very slow by design. It was only in the beginning of this year that the issues were starting to be addressed separately: legislation related to limitations and counter-drone measures on the one hand, and legislation related to integration into airspace on the other. Let’s take a closer look at Counter-UAS (unmanned aerial systems) measures and what makes them challenging in terms of regulation. Over the past years, various counter-drone technologies have been introduced to enable control over rogue drones in order to either stop them from achieving their flight purpose or prevent them from creating safety hazards to people or property. These measures can be grouped into 3 types of technologies: Military grade solutions - including lasers and surface-air missiles Kinetic solutions - including net-guns and autonomous drones set out to catch the rogue drone and disable it airborne Non-kinetic RF-based solutions - aimed at either disabling, disrupting or accessing the drone’s communications channels in order to trigger a return-to-home function, or guide the drone into a safe landing route Aside from combat military operations, the legality of using the above technologies is questionable as they tamper with an airborne aircraft, might be considered as wiretapping and/or violate computer fraud laws. Therefore, one can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones. One can conclude that unless changes to regulation are made, non-military facilities will continue to be defenseless from and vulnerable to rogue drones European c-UAS Legislation Next, let’s look at the state of c-UAS legislation in both Europe and US to better understand different legislative ecosystems and how they affect the possibilities of using counter drone measures. In the European Union, there is currently no uniform legislation, and the member countries rely on their own existing legal infrastructures. Roughly speaking, most countries use a method of exemptions to the communications and aviation laws to allow the use of counter drone measures after a close examination by the relevant authorities. Such exemptions are approved under scrutiny to particular sites, which provide some relief, but they do not allow broad use of countermeasures. Further discussion regarding a broader regulation change, on a country level or EU-wide, is only preliminary. US c-UAS Legislation Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ and DHS agenciesUnlike the EU, in the US exemptions are not possible within the existing legal framework, and the possible violation of US code title 18 means that the hands of both the government or private entities are tied when attempting to protect mass public gatherings, sports venues, or critical infrastructure. Therefore, it was more urgent to introduce legislation that would allow countermeasures to some extent. In September, US Congress approved the FAA-reauthorization act for the next 5 years (H.R. 302), which was shortly after signed by the President and came into effect. Division H of the act - Preventing Emerging Threats - provides an initial infrastructure for counter drone measures to be used by various DoJ (Department of Justice) and DHS (Department of Homeland Security) agencies under strict limitations. However, the act avoids determining which technology the agencies should use, yet it requires minimal impact on privacy and overall safety in order to strike the necessary balance. This is the first profound counter-drone legislation and is expected to be followed by additional measures both in the US and in other countries. Updating Counter-Drone Legal Infrastructure In summary, 2018 has been a pioneering year for counter-drone legislation, and while technology already allows taking action when necessary, legal infrastructure needs further updates in order to close the existing gaps: covering additional federal assets, state-level governments, and private facilities of high importance, such as critical infrastructure sites. Legislators in the US and around the world need to continue working in a rapid tempo to keep up with the growing threat of drones. As with cars a century ago, the number of accidents will rise with the increase in time taken to regulate.
The Global Security Exchange (GSX) seems smaller this year, which is not surprising given the absence on the show floor of several big companies such as Hikvision and Assa Abloy (although their subsidiary HID Global has a big booth). A trend affecting the number of companies exhibiting at GSX 2018, and other trade shows, is industry consolidation, which is impacting the show even beyond the fewer exhibitors this year in Las Vegas. GSX is the new branding for the trade show formerly known as ASIS. There was an impressive crowd of visitors waiting for the show floor to open Tuesday morning; the conference part of the program began on Monday. After the attendees filed through the doors, the foot traffic seemed brisk throughout the morning, and was somewhat steady until the end of the first day. Exhibitors as a whole seemed pleased with the first day and cautiously optimistic about the rest of the show. Acquisitions And Consolidation HID Global announced on the first day that they will acquire Crossmatch - emphasizing the impact of consolidationEmphasising the impact of consolidation on the industry as a whole, and on this show, was an announcement from HID Global on the first day that they will acquire Crossmatch, a biometric identify management and secure authentication solutions provider. It’s a comparatively large acquisition for the company specializing in trusted identity solutions. Just days earlier, another acquisition also seemed to confirm the trend when UTC Climate, Controls and Security — the owner of Lenel — announced an agreement to acquire S2 Security. The fruits of another recent acquisition was on display at the GSX 2018 hall, where Isonas took its place near the front entrance as part of the Allegion booth, just three months after the global security provider acquired the ‘pure IP access control company.’ Isonas is well positioned in two of the three fastest growing segments of the access control market — IP hardware, which is growing 41 percent per year globally, and access control as a service, or ‘cloud’ technology, which is also outpacing the overall access control market. Allegion also has the third fast-growing segment, wireless locks, covered with its Schlage brand. "New Avenues Of Growth" The early days of new ownership is opening fresh opportunities for both organizations as Allegion seeks to leverage Isonas’ intellectual property and the smaller company finds new avenues of growth in the larger organization, says Rob Lydic, Isonas Global Vice President of Sales. Motorola joined Avigilon in a higher profile role at their booth, emphasizing consolidation in the industry Lydic sees a likelihood of additional acquisitions in the near future in the security space, given the large amount of capital currently available to be deployed, and the large number of entrepreneurial companies looking to make the leap, as Isonas did, from a small booth at the back of the hall to front-and-center as part of a big industry player. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth. In addition to signage, ownership by Motorola is also impacting the Avigilon product offerings. For example, the Motorola Ally security incident management and communications system has been integrated with Avigilon’s analytics-based event detection, and is being positioned to serve the enterprise market. The system simplifies security operations with a single platform that allows access to critical data, including video and access control systems, directly from any web-enabled device. Another reflection of consolidation: Motorola Solutions is taking a much higher-profile role in the Avigilon booth Avigilon is displaying Motorola Solutions’ CommandCenter Aware integrated with Avigilon’s systems for use with public safety applications to provide dispatchers and intelligence analysts with video feeds, incident details, alerts, data mapping and responder location. Avigilon has also integrated its AI-driven Appearance Search technology with its Access Control Manager system, so video searches can be performed based on a badge credential. The system can automatically pull up any information, whether video or events in the access control system, based on the badge information. It can also be used to search for lost badges, or to view where a person is located in the building. Avigilon introduced an AI appliance that allows existing cameras to be integrated with Appearance SearchThe company introduced an AI appliance that allows existing (non-Avigilon) cameras (up to 20 two-megapixel cameras) to be integrated with Appearance Search. Also, the next generation of analytics allows detection of more things, such objects a person may be holding, or detection based on what they are wearing. The Growth Of The Cannabis Market Although attendees at GSX are generally understood to be more end users than integrators, Joe Grillo, CEO of ACRE, the parent company of Vanderbilt Industries and ComNet, says he sees little difference in attendees at GSX compared to the ISC West show in the spring. “We see all our resellers here,” he says. Grillo noticed that Day One booth traffic was “not consistently busy, but steady.” Grillo says ACRE expects to be active again soon in the mergers and acquisitions market. The company has grown through six acquisitions since its founding, and has had one divestiture (when it sold Mercury Security to HID last fall). Since selling Mercury, ACRE has been ‘back in the buying mode,’ just looking for the right opportunity, says Grillo. New markets are a theme at GSX, and one of the biggest new opportunities is the cannabis industry. Marijuana has been legalized in dozens of U.S. states, and Canada is on the verge of legalizing the drug. March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics March Networks is among the companies targeting the cannabis industry in a big way. Already across the U.S., March Networks works with multiple cannabis operators to provide video solutions, point-of-sale transaction data, and customer analytics. The business intelligence solutions also aid compliance in the highly-regulated industry. March Networks provides radio frequency identification (RFID) tag to track plants throughout the channel, and tracking is integrated with video systems to provide correlated video views. A couple of exhibitors mentioned to me the need for commercial companies to deploy a comparable level of automation as their employees are accustomed to in the smart home environment. That suggests a need for things such as smartphone integration and voice commands. One exhibitor putting its toe in the water is Hanwha Techwin, which showed an Amazon Echo device used to control a video management system (VMS) with voice commands. Could the simple integration be a preview of the future of control rooms, where security officers merely talk to their equipment rather than operating controls? We’ll be talking to more companies (and maybe a few machines) on Day Two of the show, and will be reporting what we hear.
When an active assailant strikes, it’s over fast, and most of the damage happens before help arrives. Responding appropriately can save lives, and it takes training and practice to know what to do as a tragedy unfolds: Where can I hide? Can I get out? Where do I run? If you hear shots or see someone with a knife, your training empowers the best response, and thorough and repetitive training avoids being paralyzed by panic. Standards On Workplace Violence ASIS International is a member of ANSI and an accredited standards developer ASIS International has been working for more than a year on a document to enable security professionals to develop an effective approach for prevention, intervention, response and recovery to an active assailant, whether he or she is acting alone or as part of a group. The Active Assailant Supplement is an annex to the ANSI Standard on Workplace Violence and Intervention; it is being developed as part of the current revision to the standard. ASIS International is a member of ANSI (American National Standards Institute) and an accredited standards developer. Security practitioners use the ANSI standard to develop their own processes, procedures and documentation related to workplace violence. The ANSI standard on workplace violence was created 10 years ago and already has been revised once. In that time, the standard has been quoted extensively and adopted and utilized by many corporations and security practitioners. Leading creation of the Active Assailant Supplement is Michael Crane, Security Consultant and Attorney at Securisks, and chair of the ASIS International Active Assailant Working Group. There are 17 individuals on the drafting committee on active assailants, each with their own specific areas of expertise, from big corporations, to psychologists, to the government. The committee will create a draft, which will be submitted to the technical committee (150 or so people) for review and comment. The ANSI standard on workplace violence has been quoted extensively and adopted and utilised by many corporations and security practitioners Active Assailant Supplement Elements Prevention - A key to preventing active assailant incidents is awareness, such as identifying behaviors that suggest a potential for violence. In addition to recognizing troubled behaviors, companies should have policies and procedures in place to report concerns to supervisors, and then policies to follow up. Intervention - Training equips companies to react effectively in the case of an active assailant attack. Repetition and practice ensure an appropriate reaction, and inform decisions about where to hide, the nearest exits, etc. Employees might hide in a washroom or a conference room that locks, or they might use furniture to block the door. Response - It also takes training for employees to understand what happens when first responders arrive. Private security and employees have specific roles when first responders show up. Recovery - After the incident, other issues include cleanup, providing a gathering place for employees and family members, and counseling. Addressing School Violence The workplace violence prevention plans in the Federal government are right in sync with private industry"Crane was an assistant state’s attorney in Chicago before going into private practice. He has also served as general counsel and vice president for security companies and combines law and security expertise to protect companies from liability. Crane has written and provided training on the topic of workplace violence prevention for many years for ASIS International and was among the first members of the Standards and Guidelines Commission in 2000. Although school violence is not addressed specifically in the Active Assailant Supplement, the protocols covered in the document apply to schools as well as other sites such as governments. “The workplace violence prevention plans in the Federal government are right in sync with private industry,” says Crane. “They are almost identical.” Workplace Violence At GSX 2018 Workplace violence, including active assailants, will be among the issues addressed at the upcoming GSX 2018 in Las Vegas. Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show, attended by more than 22,000 security professionals from 100-plus countries. There will be sessions addressing workplace violence and interest group discussions on a range of topics.
One factor aggravating concerns about workplace violence in corporate America is the easy availability of firearms. In many states, citizens, including employees, have the right to carry firearms onto a company’s property even though firearms are prohibited in the workplace. In effect, an employee prone to violence may have a firearm as near as their vehicle in the company parking lot. Currently, 23 states in the U.S. have so-called “parking lot storage” laws, which enable employees to store firearms in their vehicle’s trunk or glove compartment despite any corporate ban on weaponry. The laws have evolved as an expression of the Second Amendment “Right to Bear Arms” in the last decade or so. There is some variance in the laws from state to state, but they generally allow a citizen to carry a gun to and from work and keep it stored out of sight in their vehicle.Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show Employee Second Amendment Rights “The laws contend that employees should not have to give up their Second Amendment rights between home and the workplace and should be able to have a gun with them for protection from their front door at home to the front door of the workplace,” says Eddie Sorrells, Chief Operating Office/General Council of DSI Security Services. Sorrells will speak about the current state of the laws, how they came about, the nuances of state-to-state differences, and the possible impact on overall corporate security in a session titled “Employees Who Carry: Preventing Workplace Violence” at the upcoming GSX conference in Las Vegas, September 23-27. Global Security Exchange (GSX) is the new branding for ASIS International’s annual conference and trade show, attended by more than 22,000 security professionals from 100-plus countries. Sorrells’ session will be Sept. 24 from 10:30 to 11:45 a.m. Restrictions On Gun Visibility Employees may think the “right to carry” extends to the workplace, but the right only extends to the parking lot. The company still has the right to ban guns inside the premises. However, it is unlawful in some states for companies to search vehicles in parking lots, and companies who do so are violating the law, says Sorrells. Among the various state laws, some exempt public education institutions and other public venues. Depending on how the laws are written, there may be other exemptions, too. In Florida, for example, the law exempts any organizations that have explosives on site. With weapons on a company's property, a high-risk termination could potentially become violent Most laws require weapons to be stored securely out of sight. However, in Alabama, for example, it is legal to store validly permitted guns in full view during hunting season, Sorrells says. A resident of Alabama himself, Sorrells has been in the contract security business for 27 years, working mostly in multi-state operations. He has worked for 500 or so corporate security organizations throughout the country and is a practicing attorney who has studied issues of workplace violence and active shooters. “There is a political element to these laws, which were created with the goal of protecting Second Amendment rights,” says Sorrells, who says he sees arguments on both sides of the issue. However, political opinions aside, “if you’re a business owner, you have to contend with dozens of weapons on a company’s property,” he adds. “That could be an issue if a high-risk termination could potentially become violent. You have to assume there is a weapon in that person’s vehicle.” Sorrells' session will dive into the case law and illuminate some of the legal issues and how courts have addressed them GSX Education Program After the session, Sorrells hopes attendees will take away a good working knowledge of the state of the laws, how to comply with the laws, and issues such as posting of signs. The session will dive into the case law and illuminate some of the legal issues and how courts have addressed them. The timely session is an example of the valuable information attendees can gain by attending GSX. Sorrells has been attending the yearly ASIS International Conference and Exhibits for more than 20 years, at least since the mid-1990s. As the pre-eminent security organization around the world, ASIS International provides unrivalled educational and networking opportunities at the yearly conference, he says. “There is a vast amount of networking and educational offerings on a wide variety of topics, including technology, legal issues, risk management, workplace violence, consulting, and anything under the sun,” says Sorrells. The newly branded GSX education program is led by subject matter experts from ASIS International, InfraGard (a public-private partnership between U.S. businesses and the Federal Bureau of Investigation), and ISSA (Information Systems Security Association). Sessions will deliver valuable, actionable takeaways to help attendees shape their security strategies. There will also be an exhibition of 550-plus suppliers and manufacturers highlighting the latest security solutions.
Police in the Belgian city of Lokeren can now respond more effectively to criminal incidents – thanks to an upgraded video surveillance solution that features 120 Sony security cameras, including the rugged SNC-VM772R 4K minidome camera. Lokeren Video Security System Like all urban centers, Lokeren faces the challenges of crime, vandalism and antisocial behavior in its streets, public buildings and open areas. Until recently, the municipal police force relied on analog security cameras to assist with detecting and responding promptly to incidents. However, these cameras’ limited resolution and image quality often prevented efforts to prosecute individuals as they could not be successfully identified. In response to requests from citizens to maximize their safety, Lokeren police chiefs and city politicians pledged to upgrade their video surveillance capabilities. In particular, the urgent need was identified to improve the accurate recognition of suspects caught on camera – an even greater challenge at night or on dull, poorly-lit days. Full HD And 4K Network Surveillance Cameras Security specialists DS-Consulting therefore recommended upgrading Lokeren’s video security to a combination of Full HD and 4K network surveillance cameras. A competitive comparison by DS-Consulting saw Sony’s outdoor minidome and fixed box-type cameras compare favorably with other brands. The rugged SNC-VM772R 4K minidome camera delivered significantly better images in tough low-light conditions “There was only one choice when we compared the image quality of Sony’s security cameras against other market-leading brands” states Emiel De Smet of security specialist DS-Consulting. “They offer so much more detail and clarity – and that makes all the difference in critical surveillance applications.” SNC-VM772R 4K Minidome Camera In particular, the rugged SNC-VM772R 4K minidome camera delivered significantly better images in tough low-light conditions. The camera’s large-sized Exmor R CMOS image sensor allows it to capture more light than ordinary sensors. This allows it to ‘see’ suspicious activity clearly in conditions of almost complete darkness, where less sensitive cameras struggle. Installed by Belgian integrator Seris Technology, the complete surveillance solution features a video management platform by Genetec Security Center plus 120 strategically located Sony cameras, providing 24/7 coverage of city center streets as well as public buildings, including Lokeren’s police station, central library and city hall. Crime Prevention And 24/7 Video Monitoring The new cameras give police a clearer picture of criminal activity in the city streets, assisting with the positive identification of suspicious persons even at night and in low light conditions. Round-the-clock video footage is routed via an optical fiber network, where images are monitored in the central dispatch office at police headquarters. Since the cameras’ installation, city police have seen a reduction in crime levels, accompanied by greater peace of mind for residents and visitors.
Texas A&M University-San Antonio (A&M-SA) has become the first university in the world to deploy an Indoor Positioning Solution across its entire campus for the purpose of providing the safest possible environment. The SafeZone indoor positioning solution, provided by CriticalArc, provides the campus police with an unprecedented three-dimensional view of multi-story buildings. For example, instead of receiving an alert about ‘an incident somewhere in the student union building’, they get pinpoint specifics, such as ‘it’s on the fourth floor, west wing, outside room 410’. "With indoor positioning and SafeZone, we're able to provide a faster response time, whether it's a medical emergency or an active shooter,” says Roger Stearns, A&M-SA’s assistant chief of Police, featured in this video. The entire police department benefits from advanced features such as heat mapping and incident playback to optimize performance" Safer environment for students The university’s Chief of Police Ron Davidson wanted to innovate with this full-coverage system because the campus was expanding, including a newly completed residence hall, which meant having students around the clock for the first time in A&M-SA’s history. He was committed to ensuring a safer environment for students, staff and visitors. In addition, Chief Davidson was in search of a common operating view that would provide the Emergency Operations Center and all officers on patrol a real-time location of all available officers and volunteers, as well as showing the location of all incidents ̶ essential for coordinating first responders and the Campus Community Emergency Response Team (CCERT). Heat mapping and incident playback “SafeZone is essential technology to position your organization on the cutting edge of campus law enforcement. The real-time common operating view both enhances officer safety and acts a force multiplier. Plus, the entire police department benefits from advanced features such as heat mapping and incident playback to optimize performance,” Davidson said. Texas A&M-San Antonio has adopted the indoor positioning solution as a standard and will deploy it in all future buildings on campus. The solution is fully supported by the University’s Information Technology department and has been assessed for additional applications to enhance the student experience including wayfinding and research by academics in the newly completed Science and Technology building. Easy to maintain wireless installation The process to get the SafeZone indoor positioning solution deployed is a simple one, as it’s a wireless installation and easy to maintain"SafeZone was easy to deliver with no disruption to the campus. It was deployed in a matter of weeks during the summer break. “The process to get the SafeZone indoor positioning solution deployed is a simple one, as it’s a wireless installation and easy to maintain,” added Stearns. Organizations can install wireless, wearable duress alarms able to pinpoint anyone anywhere on campus as an alternative to fixed, expensive, wired panic alarms. Among other capabilities, SafeZone allows users to get the most rapid help simply by activating an alert, using an app or a wearable duress alarm. As soon as the alert is triggered, the location and details of the user are streamed to the monitoring team, allowing officers to coordinate a smarter, more targeted response. By enabling responders to visualize the precise location of an incident, anywhere on campus, SafeZone is much more powerful than traditional, fixed panic alarms and blue light telephones, which are more expensive to install and less accurate in operation. SafeZone public safety solution Glenn Farrant, Chief Executive Officer, CriticalArc, notes; “I’m delighted by the close partnership between A&M-SA and CriticalArc resulting in this ground-breaking implementation of the SafeZone public safety solution. Chief Davidson and his team are at the forefront of using this technology and we are pleased to be helping them improve the quality of life, and the learning experience, for everyone on their campus.” The SafeZone indoor positioning solution is commercially available worldwide for a range of university, hospital, enterprise and finance applications and is being deployed in more than 80 countries worldwide.
Wilson James has appointed SmartTask as preferred technology partner and awarded it a deal for the supply of a mobile patrol and electronic smart form solution for a new security contract with National Museums. Under the agreement, the company will now roll out the SmartTask workforce management software to 10 sites including the Natural History Museum, V&A and Science & Industry Museum. This follows a successful trial that achieved significant time savings by removing paperwork and streamlining operational processes. The new partnership between Wilson James and SmartTask will replace an incumbent supplier agreement that no longer met the business and operational requirements of the security, construction logistics and business services provider. Identify Potential Benefits In particular, the retender process for the security contract with Natural Museums required a single provider of a highly-configurable mobile patrol and electronic smart form solution. An initial trial at the Natural History Museum focused on use of electronic forms via SmartTask-enabled smartphones to reduce administration and increase productivity of operational staff. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms It was designed to identify potential benefits based on the precise requirements of the customer as well as create a suite of seven SmartForms and reports that could deliver standardized data capture and analysis. This included confiscated items and vehicle check SmartForms, scenario testing and incident reporting. The trial highlighted the clear benefits of using the SmartForms, most notably around confiscated items and vehicle forms. Required Monthly Reports Confiscated items, following bag searches carried out at point of entry, historically required between 10-15 minutes to complete and during that time the security officer was away from the floor resulting in lost productivity. Following the adoption of SmartTask, reports can now be created automatically using highly-accurate data, while paper usage and printing requirements have been dramatically reduced. The time savings achieved at the National History Museum by the Wilson James team have led to higher productivity, greater capacity to carry out bag searches and increased visibility of security staff. Management time saving have also been realised in production of required monthly reports, as well as administration savings of 12-hours per week for the Security Duty Managers. Ease Of Deployment Don McCann, Technology Systems Consultant at Wilson James commented: “SmartTask provided significant support throughout the contract bid and contributed to the successful re-signing for a further five years.” SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system" “The solution is now fully operational at five locations – Natural History Museum, National Science & Media Museum, National Railway Museum, Science & Industry Museum and a Wandsworth storage site – with the Science Museum and V&A to follow shortly. SmartTask has also handled a separate project for Bradford Science Festival, which further demonstrated the flexibility of the system, ease of deployment and its suitability for the security sector.” Enhance Customer Satisfaction Paul Ridden, CEO of SmartTask said: “This latest agreement demonstrates our ability to work closely with our customers to develop advanced workforce management solutions that support business development, customer retention and quality service delivery. We are now partner of choice for a growing number of security organizations based on our proven track record helping to tackle some of the most common and difficult operational challenges they face.” SmartTask is an advanced and simple-to-use employee scheduling and mobile workforce management solution that enables security companies to better plan and manage their workers, so they are at the right place, at the right time. The cloud-based software solution combines intelligent rostering, live monitoring and integrated proof of attendance across both static and mobile teams, making it the ideal tool to improve operational control, enhance customer satisfaction, and support duty of care to staff.
A two-year program to transform security at Heriot-Watt University campuses around the world, facilitated by CriticalArc’s SafeZone technology, has been recognized with one of the UK’s top security industry awards. The innovative partnership between Heriot-Watt and CriticalArc has been named as ‘Security Project of the Year’ in the 2018 Security & Fire Excellence Awards run in association with IFSEC International and Firex International. The award, sponsored by the British Security Industry Association, is highly competitive and a major accolade for the winners. Improving Service Response Two years ago, Les Allan, Heriot-Watt’s Director of Safety and Security Services and his team at the university embarked on a strategy to transform all aspects of their operations. They wanted to modernize their service across five campuses, in the UK, Dubai, and Malaysia to provide much greater care for students and staff. A key factor in the team’s success has been the way it uses CriticalArc’s SafeZone technology across all five international campuses It was an ambitious undertaking, but it has already delivered impressive results, measurably improving service response times by over fifty percent, upgrading security department capabilities and skills and raising the job status and remuneration for officers involved. A key factor in the team’s success has been the way it uses CriticalArc’s SafeZone technology across all five international campuses, making Heriot-Watt the first university department to take this global approach. Real-Time Incident Management SafeZone technology has transformed the way officers interact with students and staff wherever they are - on campus or and when traveling off-site – so they can provide assistance in case of emergencies or other incidents. Les Allan’s team has already responded to serious medical emergencies using the system and now they have the tools to manage a full range of live-incident risks. “SafeZone lets my team communicate quickly with individuals and groups,” explains Les Allan, Heriot-Watt, Director of Safety and Security Services. “Using it they can receive alerts and pinpoint the location of anyone needing assistance. They can deploy officers more quickly and keep track of ongoing situations as they develop. It’s really letting them do things they couldn’t have dreamed of before.” Better Support For Students & Staff The Heriot-Watt team is also using new technology to support staff and students on campus while traveling and during fieldwork. They can ‘geo-fence’ additional areas as required. Between 1 August 2017 and 31 July 2018, a total of 5398 security incidents were attended at the Edinburgh Campus The result has been a significant improvement in engagement between the security department – now restyled as Safeguarding Services – students and staff. Between 1 August 2017 and 31 July 2018, a total of 5398 security incidents were attended at the Edinburgh Campus (the first to adopt SafeZone); 3542 of these incidents (66%) involved assisting or interacting with students (rising from 33% in 2013). Efficient, Responsive And Capable Services The results have been impressive but Les Allan, who is currently also serving as Chair of the Association of University Chief Security Officers (AUCSO) in Scotland, says his ambition is to go much further. “We are delighted at our incredible success at the Security and Fire Excellence Awards as winners of the Security Project of the Year category. This joint award for Heriot-Watt University and our friends at CritcalArc is a testimony to the power of working in partnership for mutual benefit and delivery of excellence with a world-leading solution. We are committed to continuing development and enhancement of our partnership with CriticalArc.” Darren Chalmers-Stevens, CriticalArc, Managing Director, EMEA and APAC, noted: “I’m delighted that the forward-looking partnership between Heriot-Watt University and CriticalArc has been so clearly successful. This major award is further proof of how we work closely with all our customers and are leading the way in providing better protection and enabling more efficient, responsive and capable services.”
Edesix, a provider of Body Worn Cameras (BWC), announces that it has teamed up with retailer Asda to enhance in-store security. After a successful trial, which began in 2016, there are now over 900 Edesix VideoBadges being utilized in over 250 sites nationwide, with more growth expected in the near future. Edesix collaborated with CBES, Asda's preferred security installer, to design and install a tailored wearable CCTV deployment system perfectly suited to the retail giant's needs. Edesix and CBES worked closely at Asda's national security center and across four store deployments to provide them with the knowledge and expertise so the cameras could be rolled out in the remaining stores with minimum impact on store efficiency. Improved Colleague Security Asda has been able to improve colleague security, diffuse aggressive and volatile situations and reduce valued investigation time This system, which is intuitive to use and requires minimum training, has enabled staff to integrate the cameras into their daily working processes with minimal fuss. As a result of this partnering strategy, which relied on both the innovative nature of Edesix's technology and communication between all parties, Asda has been able to improve colleague security, diffuse aggressive and volatile situations and reduce valued investigation time, thus reducing costs. Since the deployment, Asda has proven the viability of these cameras by securing numerous convictions relating to theft and violence against staff. Confrontation preventer Richie McBride, managing director of Edesix, explains: "Asda, along with CBES, identified the need to re-think its key security policy around challenging aggressive behavior towards staff. In searching for a technology partner, CBES chose Edesix as their BWC provider, to deploy initially to the most affected stores, eventually rolling out to over 250 sites across the UK. The aim was to improve the safety of colleagues in public facing roles and shoppers within the stores, while producing compelling evidence when needed." The Body Worn Cameras act as a confrontation preventer, as it is proven that members of the public are far less aggressive to staff members" McBride adds: "The Body Worn Cameras act as a confrontation preventer, as it is proven that members of the public are far less aggressive to staff members if they know they are being filmed." Winning major contracts Edesix, which was recently acquired by US-based security specialists Vigilant Solutions, has enjoyed a great deal of success lately, ranging from winning some major contracts with the likes of UK prisons, Scotrail and South Australian Police, to being named in the Sunday Times Hiscox Tech Track 100 league table. Edesix currently supplies markets across the globe, through direct sales and international partners, to geographies including the UK, Europe, USA, Canada, the Middle East and Australasia.
In order to improve security standards, in the last few months and since the beginning of the 2018/2019 season the Panomera camera system has been installed and tested in the Generali Arena in Prague, home ground of AC Sparta Praha. This technology is also used by many football clubs in the German Bundesliga and the English Premier League. After successful completion of the test phase, the club then switched the system into operational mode. AC Sparta Praha has launched a modernisation project for its security system with the objective of providing fans greater comfort and a feeling of increased security in their home arena, and to help prevent the occurrence of unwelcome incidents. Substantial Financial Investment If the rules are violated while a match is being played, this technology makes it possible to bring charges against individual offenders The system is also used for incident analysis, to deliver better video material so that the involvement of specific individuals can be proven accurately when offences occur. If the rules are violated while a match is being played, this technology makes it possible to bring charges against individual offenders or a larger group of fans. The system records continuously and stores what is happening at all locations on the tribunes. This in turn enables the direct display and investigation of incidents and their causes, which is made simpler by the simultaneous, time-synchronized playback of multiple video streams. The installation of this new camera system is not a reaction to what took place during the Europa League qualifying round match against Subotica, but a strategic measure for which the ACS club management decided earlier despite the substantial financial investment. Evidentiary Procedure By the time of the game against the Serbian team Subotica, which was played on 2 August 2018, the CCTV system was already in the final stage of testing, which meant that the material recorded could be used for the investigation and evidentiary procedure. The club is prosecuting fans who engaged in unacceptable behavior during the match extremely vigorously, and long stadium bans and fines have already been imposed. The club cooperated successfully with three companies to achieve the implementation of this CCTV solution: with Dallmeier – manufacturer of the Panomera technology, with T-Mobile – data infrastructure provider – and with Made in PUBLICITY, which was responsible for integrating the system and installation. Unambiguous Facial Identification The video material recorded with Panomera far surpasses the standard 1080-HD format, while capturing up to 30 images per second in real time The Panomera camera system has already been installed successfully in most stadiums in the Bundesliga (e.g., Allianz Arena - Bayern Munich, Signal Iduna Park - Borussia Dortmund, Commerzbank Arena - Eintracht Frankfurt) and in the English Premier League (e.g., Old Trafford - Manchester United, Emirates Stadium - Arsenal London) as well as in modern stadiums in Russia, host nation to the 2018 World Cup competition. The video material recorded with Panomera far surpasses the standard 1080-HD format, while capturing up to 30 images per second in real time. Recording is performed in a resolution of up to 320 pixels per meter, enabling unambiguous facial identification. For comparison: typically only half of this resolution, 125 pixels per meter is needed for normal facial recognition.