As part of the modernization of all NATO's IFF identification systems (IFF = Identification-friend-or-foe) to the new "Mode 5" standard, sensor solution provider HENSOLDT is equipping the Air Force's 90 Tornado fighter aircraft with its Mode 5-capable LTR 400 transponder. An initial order for the delivery of 42 devices worth several million euros has been placed by Panavia Aircraft GmbH - the industrial consortium for the development of the Tornado; the conversion of over one hundred further pl...
Altronix, the provider of power and data transmission products for the professional security industry, introduces a new brand to its portfolio of Trove™ Access and Power Integration Solutions. Altronix now seamlessly integrates it’s power and sub-assemblies with S2 Security controllers in a streamlined package for systems with up to 14-doors. Providing maximum flexibility “Altronix prides itself on designing and manufacturing solutions that solve real-world installation chal...
Element AI, a developer of artificial intelligence-powered (AI) solutions and services, announces that it has published the AI Maturity Framework, which consists of a mapping tool and a whitepaper. The whitepaper provides in-depth insights on how organizations across all industries can become AI-ready faster and the tool helps organizations quickly map their AI-readiness. The tool and whitepaper address a knowledge gap in the AI industry, as few resources exist on how organizations can actually...
With Hub 2, a user will no longer need to live under round-the-clock camera surveillance to know why an alarm has gone off. Like the first generation of hubs, Hub 2 protects the user’s property against burglars, fire, and flood. But unlike its predecessors, it sends not only alarm notifications but also animated series of images from MotionCam motion detectors. Thanks to the optional Wings radio protocol, a built-in battery, and two SIM card slots, Hub 2 is independent of the guarde...
Videotec is proud to announce that is has released a “robust and smart” video analysis technology, integrated into ULISSE EVO cameras, that offers an end-to-end solution for preventative detection of intrusions in outdoor monitoring applications of critical infrastructures, industrial sites and perimeters. Videotec Analytics is the result of more than 10 years of research and design, carried out by a team of R&D professionals, cooperating together with prestigious international...
The Security Industry Association (SIA) announces the agenda and speaker lineup for the 2020 SIA GovSummit, its annual public policy and government security technology conference, taking place June 1-4. Due to concerns around the COVID-19 pandemic, SIA GovSummit will be held as a virtual event in 2020, and for the first time ever, the conference will be entirely free to all attendees from industry and government. Offering additional sessions “SIA GovSummit 2020 will explore how security...
Axis Security, the private application access company, unveils the Axis Security Partner Program (ASPP) for VARs, systems integrators, MSSPs, OEM partners and distributors. The program enables Axis channel partners to expand their security offerings to include a cloud-native security and analytics platform that offers organizations simple and secure control of private application access built on a zero-trust model. Securing private applications Axis also signed its first value added reseller, BlackLake Security, a full range cybersecurity services company based in Austin that serves the southwestern United States, to the program. “The channel represents a significant opportunity for Axis Security,” said Dan Parelskin, Vice President of Sales for Axis Security. The program equips a range of partners to introduce Axis Security’s Application Access Cloud" “The program equips a range of partners to introduce Axis Security’s Application Access Cloud™ to their customers and prospects and offers the easiest and fastest path to implementing a zero trust business. It enables organizations to secure private applications, accelerating partner and remote worker readiness, M&A activities and cloud migration.” Expanding the cybersecurity portfolio With industry analysts predicting that nearly two-thirds of all enterprises will move to a zero trust model by 2023, Application Access Cloud provides an alternate to dated VPN models. The App Access Cloud solves the issue of implicitly open network access and removes the pain points of network-based security associated with Virtual Private Networks (VPN’s) which can be complex, slow to deploy, hard to manage and inflexible. “Axis Security offers a great new platform to enhance and expand the cybersecurity portfolio we offer our clients,” said Mark Jones, CEO, BlackLake Security. “We know the founders and team very well and respect and appreciate their in-depth knowledge of this space.” Comprehensive cybersecurity portfolio Application Access Cloud is positioned to be part of a comprehensive cybersecurity portfolio “This is a game changer for companies that want to rapidly enable both their partners and employees with remote access to applications from anywhere, no client software required. Our customers need a zero trust solution that solves problems in hours, not months or years. Axis delivers that and more.” Application Access Cloud is positioned to be part of a comprehensive cybersecurity portfolio enabling resellers to bring incremental value to existing solutions. The Application Access Cloud connects users and their applications and mitigates many security risks exposed by legacy access solutions and vulnerable applications. Business development opportunities The solution is ideal for organizations across geographies and industries around the globe. The program offers partners a SaaS subscription model, strong end-user experience, fast proof of concept and lightning-quick deployments that easily integrate with and complement existing technology choices to deliver a strong return on investment. The Axis Security Partner Program offers support according to two tiers – Authorized and Premium. Based on level, this includes business development opportunities, training, joint marketing, partner resources (collateral, sales enablement, essential resources), marketing co-op funds, sales leads, website presence, and field account planning.
Mitie Security has launched new fever-screening solutions, using thermal imaging to identify individuals potentially suffering from COVID-19. The solutions are designed to support both businesses on the frontline of the coronavirus pandemic such as hospitals, and those preparing to return to business post lockdown, such as retailers, venues and buildings with a significant number of employees. Mitie Security is helping businesses mitigate against the spread of Coronavirus with the launch of a new suite of fever-screening solutions. The solutions, which have been developed by adapting existing thermal imaging technology, quickly and easily identify individuals with a fever that may be symptomatic of COVID-19. This fever-screening technology is able to detect human temperatures to within an accuracy of 0.3ºC, raising the alarm to monitoring teams should it identify an individual with a fever. Identifying potential COVID-19 sufferers These solutions have been designed to support the wide range of industries on the frontline of the nation’s fight against coronavirus, as well as those looking to prepare for when current restrictions are eased. Applications for the technology include: Healthcare: Identifying potential COVID-19 sufferers as they enter hospital which will allow healthcare professionals to take precautions, such as limiting contact with other patients and ensuring all staff they encounter are wearing appropriate PPE. Public spaces: Scanning people’s body temperature on entry to public spaces, such as railroad stations, airports and large venues. This will allow individuals potentially suffering from COVID-19 to be isolated and reduce the further spread of the virus in crowded places. Thermal imaging technology Retail: Thermal imaging technology will support the safety of staff and customers in supermarkets or other shops in identifying individuals with fevers and potentially diverting them away from the stores. Business Headquarters: For businesses preparing for the return of large number of employees to their Head Offices. These fever-screening solutions will detect any employees or visitors who are potentially infected with COVID-19, preventing it from spreading further within the office. To enable use in different situations, the technology has been developed in several formats from hand-held units to mounted cameras. Wearing appropriate PPE For example, locating the thermal cameras at site entrances allows a larger number of people to be checked at one time, such as in public areas or when a large number of employees are entering a building at the same time, for instance, during shift changes at manufacturing site, or employees arriving for work at a large office block. The portable hand-held solution meanwhile can be used to check individuals, enabling the detection of anyone showing an elevated body temperature. Potential COVID-19 sufferers could be further checked by an employee wearing appropriate PPE Mitie’s specialist Fire and Security Systems’ Team has also developed a process guide to be used alongside the fever-screening solutions, including best practice guidelines and procedures to manage individuals with a high body temperature, depending on the scenario. For instance, potential COVID-19 sufferers could be diverted to a safe area for further checks to be performed by an employee wearing appropriate PPE, before determining if access to the site will be granted or denied. Harnessing thermal technology The fever-screening solutions, alongside these guidelines, will allow businesses to protect their employees and customers, by minimizing the risk of spreading COVID-19 infections. Jason Towse, Managing Director of Business Services, Mitie, said, “Ensuring the safety of our clients’ employees and customers has always been our priority, and this is even more important during the Coronavirus pandemic. As many businesses start planning a return to work after lockdown, we must ensure that we all play our part in limiting the spread of COVID-19 as much as possible." "As the UK’s leading technology-led security provider, we are evolving to meet this new threat. By harnessing thermal technology, we can support businesses in keeping people safe – be that those at the coal face of the pandemic or others looking to find safe ways to return to daily life as and when restrictions begin to ease.”
Bosch announces the launch of INTEOX, a new camera platform designed to modernize the security and safety industry. The first-fully open platform of its kind, INTEOX gives users, system integrators, and application developers’ unlimited freedom for innovation and customization. As the world becomes increasingly connected, the Internet of Things (IoT) presents new opportunities for individuals and businesses. However, to take full advantage of the opportunities that the IoT brings, the safety and security industry must embrace change. Bosch is demonstrating the vast potential of the IoT with INTEOX. Developing unlimited software apps The INTEOX open camera platform combines built-in Intelligent Video Analytics from Bosch with superb performance, a commonly used open OS, and the ability to add software apps securely. The new powerful platform supports the latest technologies, such as neural network based analytics, the next step in machine learning and Artificial Intelligence. INTEOX enables app developers and integration partners to take advantage of its built-in intelligence and capabilities to easily develop unlimited software apps based on a common language. At the same time, system integrators can customize their security solutions to meet specific and changing customer requirements by adding apps and deploying them into INTEOX cameras. Intelligent video analytics Bosch supports the platform with the highest levels of data security and privacy protection" “As sophisticated sensors with Intelligent Video Analytics built-in as standard, INTEOX cameras can provide valuable data that can be analyzed and used in a wide variety of new and beneficial ways, many of which the industry can only imagine. Bosch supports the platform with the highest levels of data security and privacy protection, and the quality and simplicity that comes with working with Bosch”, says Michael Seiter, Senior Vice President, responsible for the Bosch Video Systems & Solutions business. An open platform approach has already proven successful in the computer and mobile phone market, where software and apps have become an integral part of daily life. For example, apps provide immediate information, instant communication and connection, improved work productivity, and simplified daily tasks. These benefits extend to security cameras. By having an open platform, developers can work with integrators to address their customer’s business challenges. Device management portal The INTEOX camera platform will power an entirely new line of MIC, AUTODOME, FLEXIDOME, and DINION fixed and moving cameras supported by an open IoT infrastructure. Developed by Security and Safety Things GmbH, a Bosch start-up company, this IoT infrastructure is based on four pillars: An open OS based on Android Open Source Project and strengthened for increased security An application store to access relevant app information, browse the public store and purchase ready-to-use apps for all INTEOX cameras A web portal for app developers and designers that offers information and tools to develop and test apps A device management portal that shows app and device health statistics and enables easy management of apps The INTEOX cameras, together with the IoT infrastructure, enable app developers, system integrators, integration partners, and other market players to create customer-specific apps and insert them easily into INTEOX cameras. “INTEOX will fuel innovation that is beyond the scope of any single company today. The introduction of this open camera platform will accelerate the future growth of the entire security and safety industry,” Seiter says.
Moxa, an internationally-renowned provider of industrial Internet of Things (IIoT) solutions, has extended its connectivity portfolio with the new EDS-2000 series of unmanaged Ethernet switches featuring up to 16 Ethernet ports and two Gigabit combo ports to meet increasing needs for additional nodes and bandwidth. Slim enough to fit into crowded control cabinets and machines, these plug-and-play switches allow for easier deployment and upgrading of existing devices without configuration hassles. Moxa EDS-2000 switches are inexpensive solutions for implementing industrial control and data acquisition over a LAN and require virtually no IT skills. Serving as a network's backbone, the switches connect a wide variety of data devices, such as meters, sensors and cameras, so that organizations can gain greater visibility into core processes. Critical industrial protocol data Moxa is making its EDS-2000 Series available in five unique designs within two families Long distance fiber uplinks of over 100 meters are made possible by the two Gigabit combo ports available on several EDS-2000 models. The Moxa EDS-2000 Series is designed to push IIoT innovation beyond the performance limitations of current switch technology. For example, network operators can simply flip the DIP switches on the top panel to enable Quality of Service (QoS) and Broadcast Storm Protection (BSP) and help achieve more efficient data streams by reducing delays and failures. QoS guarantees high priority for critical industrial protocol data, while a relay alarm keeps field workers alerted of power disruptions or port disconnections. Moxa is making its EDS-2000 Series available in five unique designs within two families: the EDS-2000-EL and the EDS-2000-ML. Mission-critical automation The EDS-2000-EL Series is an entry-level model ideal for general automation, while the EDS-200-ML is a mainstream switch for mission-critical automation that complies with industry standards in hazardous locations, including process automation, oil and gas, transportation and marine applications. Both feature high EMC resistance and an IP40-rated housing to withstand harsh environments, extreme temperatures (-40 to +75° C), vibrations, and shocks. By raising innovation to the next level, Moxa can now provide its customers with a more agile means to keep pace with growing bandwidth requirements in industrial networks.
As communities nationwide plan to begin lifting COVID-19 ‘shelter in place’ orders, Allied Universal, a security and facility services company in North America, is helping clients plan and prepare for a return to the workplace. Recently, President Donald Trump gave state governors guidance on reopening state economies in the coming months. These guidelines for ‘Opening up America Again’ outline specific phases for states to gradually ease their lockdowns. “Now is the time to start thinking, preparing and launching a ‘return to workplace’ plan,” said Steve Jones, Chairman and CEO of Allied Universal. “Without a cure or vaccine for COVID-19, preventing further exposure and transmission will continue to be essential.” How to return to work with COVID-19 Allied Universal is sharing best practices, guidance and tools during this crisis to help businesses provide a safe, virus-free environment. This guidance includes: Risk mitigation planning and resources to support businesses’ return to workplace strategy. Best practices on workplace signage, employee and visitor traffic flow and maintaining a clean and disinfected workplace. Temperature pre-screening services for occupants entering the property that is tailored to the facility. “Some of our clients need to be prepared for employee and visitor screenings, which require varying levels of equipment (temperature gauges, physical barriers) and personnel protective equipment,” said Jones. “There is no time to waste since some elements of a Return to Workplace plan may require advanced lead time.”
Backstreet-Surveillance, a national on-line DIY CCTV surveillance system provider launches a nationwide program to provide local high quality installation services for security and surveillance camera systems. Scott McQuarrie CEO of the company and a 28 year veteran of the professional security industry leads the effort. The program is the brain child of Mr. McQuarrie and based on his decades of experience designing, managing and installing thousands of large commercial, retail and residential video security systems. Expert project management The program provides a fast track path to be successful in the industry Earn $45-60 hour, protected territories, ready to go installations, weekly pay, factory support, training, marketing, dealer discounts and expert project management support. While other companies are shedding employees weekly. Backstreet Surveillance is hiring qualified installers nationwide. There are tens of thousands of skilled IT techs, electricians, sub-contractors and AV pros that possess the skills required to install CCTV systems, but lack the know-how to develop a local presence in the market. The program provides a fast track path to be successful in the industry. The program provides an onramp into the CCTV installation industry for similarly skilled professionals who otherwise would not have the knowledge and support to enter and compete in the industry. Providing installation services As Mr. McQuarrie states, "There are tens of thousands of skilled IT techs, electricians, sub-contractors and AV pros that possess the skills required to install CCTV systems, but lack the know-how to develop a local presence in the market. Our program provides a fast track path to be successful in the industry.” “In this day and age of viruses and uncertainty, our program can be critically important for industry similar contractors to stabilize and add to their income by providing installation services in our very lucrative industry." Mr. McQuarrie continues, "The average technician enrolled in our program can expect to earn $45-60 per hour." Camera system installation Any home or business in any state pays the same price for a turnkey installation For the installer, the program offers protected territories, ready to go installations, weekly pay, factory support, training, marketing, dealer discounts and expert project management support. For the consumer, the program breaks the old school pricing rules and provides unheard of savings. Backstreet Surveillance quotes a fixed installation price nationwide. Any home or business in any state pays the same price for a turnkey installation. For example, a 4 camera system installation price is quoted nationwide for homes and businesses. No matter the building type, structure, or the camera locations, the company offers one fixed low price Completing hundreds of installations Mr. McQuarrie states "We are not aware of any other national company with the ability to provide a fixed installed price nationwide. We offer the same installation price in LA and New York that we offer in Idaho and Wyoming. The savings and simplicity of the purchase has been very popular. So popular that we are expanding our installer support base at an unprecedented rate. Installation purchases continue to flow in making this program a natural extension of our DIY products and services." This new program has been in development since November 2019, and the company has successfully completed hundreds of installations nationwide since its inception. The company is rare in this moment in time. They are hiring support people at an accelerated rate, while other companies are shedding employees weekly.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Growing up, I was surrounded by the military way of life as my father was a Captain in the Marine Corps during the Vietnam War and my grandfather and uncles all served in the military. Even from a young age, I knew I was going to serve our country. My 22-year career in the military includes serving in the United States Air Force, the California Air National Guard and as a reservist assigned to an active-duty Air Force unit. Training and development operations Over the course of my military career, I held a variety of assignments from starting out as a Gate Guard to becoming a Flight Chief and Non-Commissioned Officer in Charge (NCOIC) of a Security Forces section. I retired from the military as a Master Sergeant. After my deployment to Afghanistan, I joined Allied Universal as a security director. My 17-year career at Allied Universal encompasses roles including Service Manager and General Manager at the West Los Angeles Branch and leading the Training and Development operations and Fire Life Safety Division. In 2008, I was tasked to develop and implement the company’s Healthcare Division. Attaining meaningful employment opportunities Below are just a few reasons why the physical security sector is a natural fit for military veterans: Self-Discipline and Organization Coveted in Security Sector - I believe that the skills learned in the military, such as self-discipline and organization, have provided the necessary tools to be successful. I truly enjoy working with other veterans at my company as we all know that we can count on each other to get the job done right. This bond and sense of commitment to each other is always there. Multi-faceted Career Paths Available - The security sector also offers veterans the ability to attain meaningful employment opportunities with multi-faceted career paths. A veteran’s background and experience are highly valued in this sector and there are many positions to match our skill sets and expertise. The responsibility we have for those in our charge is really not any different than what we have learned in the military. Team Players - Teamwork is a lesson all military veterans learn. In the military, you live and work together, and are taught to support your team members and efficiently collaborate with the people around you. This is an invaluable skill in the security sector whether you are seeking an entry level or management position. No Military to Civilian Decoder Needed - Veterans need a ‘military to civilian decoder’ system to help explain the significance of their military skills and how they translate to the general employment landscape. The physical security sector, however, understands the language of the military and don’t generally require that military responsibilities be coded into language that non-military can understand. Securing mid-Level appointments The physical security sector features a wide variety of jobs from entry level, middle management to senior positions. A retired veteran with a pension may look to the security sector for part-time or full-time entry level work. Other former military, who are not eligible for retirement benefits, may secure mid-level appointments with the goal of climbing the ladder to the highest rungs. The flexibility and opportunity are unparalleled in the security sector. Veterans generally enter the workforce with identifiable skills that can be transferred to the physical security world and are often skilled in technical trends pertinent to business and industry. And what they don't know, they are eager to learn - making them receptive and ready hires in physical security environments that value ongoing learning and training.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organization's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organizations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realizing it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyze a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analog technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organization open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organization is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organization is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organizations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Nigel Waterton recently joined cloud video company Arcules to lead the sales and marketing efforts as Chief Revenue Officer (CRO). He brings to the task the benefit of 22 years of experience building and managing large, high-growth technology organizations. Waterton joins Arcules from Aronson Security Group, an ADT Commercial Company, where he served as Senior Vice President of Corporate Strategy and Development. We caught up with the new CRO to discuss his position and to reflect on how industry changes are impacting integrators and manufacturers. Q: What fresh insights do you bring to Arcules from your previous positions? Waterton: Generally, most manufacturers don’t understand the business model of the integrator. And if they do, their programs don’t necessarily help achieve their goals. Since most manufacturers use integrators to get to the end user, they are often disconnected from truly understanding the customer, their organization’s business and its impact on the value of the security program. In my previous role, I spent most of my time bridging the gap between these two worlds. It gives me a great platform for understanding how to achieve that with Arcules. Q: How is ‘Chief Revenue Officer’ different from your previous jobs? I have the responsibility of driving innovation for the companyWaterton: While the title is different, the ultimate role I’m in isn’t too different from previous roles that I’ve held in my career. I have the responsibility of driving innovation and strategy for the company, as well as serving as a leader for the sales and marketing team and developing a sales and marketing strategy for the company. This position allows me to build on what I’ve learned throughout my career from an end-user and integrator partner perspective and brings that expertise into the fold of this young, fresh, innovative company that’s paving the way for cloud-based innovation in the marketplace. Q: Is there an industry-wide ‘culture clash’ between the IT-centric nature of cloud systems and the physical security market? How can it be managed? Waterton: Adopters from the IT and physical security worlds are a little at odds over the software-as-a-service (SaaS) offerings as a result of a disconnect with how the cloud is defined in both spaces. A lot of people and companies are creating their own notion of what cloud and SaaS mean. And without a common nomenclature in place, there is a lot of confusion among all users. Similarly, there is a clash among integrators around how to monetize the SaaS offering. This gap can be closed through increased awareness, education and the reiteration of how ubiquitous the cloud already is in our everyday lives. Q: From the integrator perspective, what is the impact of a transition to a cloud/SaaS model on how revenue is managed in the increasingly service-oriented security market? Waterton: Transitioning to a cloud/SaaS model shifts the mindset of the integrator significantly, as the focus changes from project-centric to more customer service-based impact. Becoming more service-minded creates a greater awareness of what the client’s needs are on a day-to-day basis and how that can be improved over time. When operating with a per-project focus, it can be difficult to create a more long-term impact on an organization. With a cloud-based, service-oriented model, integrators now have the ability to manage client expectations in real-time, which greatly increases their value proposition. Q: What about from the end user perspective? Waterton: There are so many benefits from the end user perspective, including the ability to remove the process of a large investment in capital expenditures (CapEx) and shift to a more manageable, predictable operational expenditure (OpEx). Not only does this allow organizations to adjust as needs change; it also prevents being locked into a long-term solution that might not be able to move with the speed of the company as it scales. That being said, the main benefit is the ability of SaaS/Cloud services to drive innovation and introduce new features as they’re introduced without additional investment from the end user. Q: What impact does the recurring monthly revenue (RMR) model have on the operations/management/cashflow of a supplier/manufacturer company? Waterton: Traditional manufacturers struggle with the introduction of a SaaS modelTraditional manufacturers struggle with the introduction of a SaaS model for many of the same reasons integrators struggle. They must sell the board and possibly their investors on a new valuation model as well as revenue recognition model. That is constraining their innovation in the market. Oddly enough RMR from a manufacturer’s perspective is very similar to the integrator model in that cash flow is more predictable in nature. An RMR model allows a company to grow strategically and innovate constantly, expanding and adjusting to cater to client needs on a daily basis while also providing the ability to look ahead and ensure we’re meeting the needs communicated to us in the market now and into the future. Q: What will be the biggest challenge of your new position at Arcules (and how will you meet the challenge)? Waterton: One of the biggest challenges we’re seeing — and one that will have a significant impact on my role — is the challenge of market adoption of SaaS/cloud services, as well as the awareness about why cloud is a significant part of the future of the industry. There’s also an opportunity to shift the conversation within Arcules from tech-focused outcomes to becoming practitioners of risk-based outcomes. We have to focus on the risk model for organizations, not technology. If we truly understand the risks to the organization, the tool will become apparent. Answering the questions: Why does a retailer lose product? Why does a facility experience vandalism? We have to understand the sociology of it because that’s how we can address what the service does in the marketplace. Q: Taking the various elements into consideration, what will the ‘physical security industry’ look like five years from now? Waterton: In sum, wildly different. It’s much different than what it was five or even 10 years ago, and with each leap, the industry has moved forward. Products are maturing, bandwidth is improving and the knowledge that we have is exponentially more advanced. There is increasing use of outside perspectives aimed at shaking up the ‘this is how it has always been done’ mentality that many organizations have suffered from. It’s going to look very different five years from now, and cloud-based initiatives will be the key to the success of many organizations.
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernize legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
Haier Group, China’s renowned home appliance manufacturer, has built a new industrial park in Russia to cope with the growing demand in Europe. Covering a total area of about 124.9 hectares, the new site is located in Naberezhnye Chelny, an important industrial city in Tatarstan, Russia. Intelligent system With the gradual completion of its factories in the industrial park, Haier is looking for an intelligent system to realize multiple tasks within the whole industrial park. Firstly, the smart system should be able to prevent theft and timely detect people climbing over the perimeter fence. Secondly, the intelligent security system should provide comprehensive monitoring in the whole industrial park and inside the factory unit, which includes, monitoring of production line and employees’ smoking behavior during working hours at office areas, efficient employee attendance management, vehicle identification at the entrance and exit areas of the park, and the overall management of all the devices, data report outputs, and other facilities at the industrial park. Total smart solution The Dahua Russia team designed a complete smart solution incorporating AI cameras, perimeter cameras, ANPR system The Dahua Russia team designed a complete smart solution incorporating AI cameras, perimeter cameras, ANPR system, access control, time attendance system, face recognition barrier, DSS PRO platform and EVS storage for Haier’s industrial park. Notably, all of the devices were integrated in one central management platform, making it easier for operators to control and manage the system. In addition, the intelligent system also supports further device upgrade based on customer’s future plan for the next several years. Dahua 5MP WDR IR Bullet AI Network Cameras To help Haier solve the first problem, Dahua 5MP WDR IR Bullet AI Network Cameras were chosen to safeguard the perimeter of the Haier industrial park. Featuring active deterrence, the cameras are able to proactively warn intruders to leave before users take action. Once an intrusion is detected, a white light will turn on, accompanied by a buzzer to warn off the intruder. Additionally, its AI-powered perimeter protection function can greatly reduce false alarms caused by irrelevant objects. AI-powered perimeter protection The combination of advanced AI analytics and real-time alerts to desktop or mobile clients reduces system requirements and resources, thereby improving the efficiency of the surveillance system. The office areas and the interior of the washing machine factory are covered with Dahua 4MP WDR IR Dome Network Cameras, while public areas are monitored by 2MP 25x Starlight IR PTZ Network Cameras. As a member of Dahua Eco-savvy product family, the Dahua 4MP WDR IR Dome Network Cameras adopt upgraded H.265 encoding technology to provide starlight, Smart IR technology, as well as intelligent image analysis techniques. It saves bandwidth and storage, with energy-saving design to enhance monitoring performance of the system. Intelligent Video System analytic algorithm As for public areas, Dahua 2MP 25x Starlight IR PTZ Network Cameras have powerful optical zoom With built-in Intelligent Video System (IVS) analytic algorithm, these dome cameras also support intelligent functions to monitor a scene for tripwire violations, intrusion detection, and abandoned or missing objects. In the future, it can respond quickly and accurately to events in the monitored areas. As for public areas, Dahua 2MP 25x Starlight IR PTZ Network Cameras have powerful optical zoom and accurate pan/tilt/zoom performance that can provide a large monitoring range and rich details. Through the latest Starlight technology, the cameras can achieve excellent low-light performance. In addition, these cameras are equipped with smooth control, high quality image and good protection, which meet the requirements of most industrial parks. Dahua face recognition barriers Dahua face recognition barriers were deployed at the entrance of the Haier industrial park and its office building, allowing quick and touchless passage of registered Haier employees without using employee cards or other identification documents. The system is based on a deep learning algorithm powered by AI, which compares facial images captured by the camera with those stored in the library to verify a person’s identity and grant permission. Access will be denied for unregistered people. 2 Megapixel Full HD AI Access ANPR cameras The industrial park’s entrance and exit use 2 Megapixel Full HD AI Access ANPR cameras to identify entering and exiting vehicles. Boasting a capture rate of over 99%, the cameras can automatically recognize the number plate of a vehicle in low speed less than 40 kmph, and capture vehicle data such as vehicle direction, vehicle size and vehicle color detection (in daytime) based on deep learning algorithm. Aside from these capabilities, the cameras can also control the barrier according to the whitelist set by users and let registered vehicles pass without stopping. Dahua DSS PRO management platform The Dahua DSS PRO management platform integrates all cameras and the stated devices At the management center, all the information collected by font-end cameras will be transferred to a 16-HDD Enterprise Video Storage. With Seagate HDD, the device offers unparalleled capacity performance for users to store massive videos and obtain evidence when needed. The Dahua DSS PRO management platform integrates all cameras and the aforementioned devices, allowing operators to easily control and manage the system. Smart industrial park solution Dahua Technology’s smart industrial park solution has assisted Haier in creating a modern intelligent industrial park in Russia. The up-to-date Dahua AI equipment provides Haier a long-term smart security system with upgraded security level and enhanced management efficiency. “The traditional personnel management system requires manual registering of employee information and cards to enter and exit office areas, which is inefficient and difficult to manage, and often high in cost,” said Zhao Shengbo, Regional Director of Dahua CIS. Upgrading access verification system Zhao adds, “Upgrading the access verification system is crucial for modern companies like Haier in order to increase the security level of its industrial park and office building. We look forward to our future cooperation.” “During the requirement discussion, solution design, and engineering survey, Dahua shows professionalism and excellent communication skills. Haier is satisfied with the first step cooperation and looking forward to the second step of the project,” said Liu Wei, Overseas Regional Project Manager of Haier Group.
Delta Scientific, the manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, announces that Bradley Air National Guard Base in East Granby, Connecticut., has installed a Delta Scientific HD300EM shallow mount wedge barricade system at the home of the ‘Flying Yankees,’ the 103rd Airlift Wing, the third-oldest Air National Guard unit in the country. Installed by American Barrier and Controls LLC, Foxboro, Massachusetts., the ‘Stop Control Safety’ ACP (Access Control Point) provides security at this constrained location with a relatively low traffic volume of less than 800 vehicles per hour per lane. Extensive history of electronic integration "Security forces and the engineering firm at Bradley chose the Delta Scientific HD300EM because of Delta's proven leadership and quality in the vehicle barrier industry," explains Dave Abromson, vice president of American Barrier and Controls. "They chose American Barrier and Controls LLC as the installer of the barrier and ACP system because of our 20-plus years as a Delta installer and service provider and our extensive history of electronic integration at such facilities as the US Army, US Navy, FBI field offices and multiple NASA locations." With only a 24 in (61 cm) foundation and a fully electric control unit, the HD300EM barrier stops a 15,000 lb (6800 kg) truck impacting at 50 mph (80 km/h) dead in its tracks with zero penetration. Fiber optic communication lines The HD300EM obviates the concerns of interference with buried pipes Upon impact, the barrier remains in its foundation and the opening stays blocked, providing a multiple hit capability. The barrier is independently test lab certified to 1 million cycles. In its M50 crash test, the HD300EM completely disabled the test vehicle, causing severe damage to the occupant compartment and power train. The maximum penetration recorded was an outstanding -1.8 m. A solid road plate design permits multiple hits and will handle low speed bumps and corner strikes for day to day reliability. The design is ideal for heavy vehicle traffic as it is rated at 66,000 lbs per axle load. The HD300EM obviates the concerns of interference with buried pipes, power lines and fiber optic communication lines. The shallow foundation also reduces installation complexity, time, materials and corresponding costs. Total protection against dust The HD300 is perfect for high water table locations and areas with corrosive soils. It provides low maintenance as all components are accessible from the sides or top of the barrier. For increased security, the HD300EM leverages Delta's proprietary counter-balanced technology to provide a 1.5 second emergency fast operation (EFO), responding to attacks very quickly. The electric actuator provides IP67 protection, meaning that the unit is totally protected against dust and the effect of immersion between 15 cm and 1 m. The HD300EM barricade provides foundation space in which maintenance personnel can easily work. There is space for heaters and sump pumps. Access is available from either the top plate or front.
STANLEY Security, one of the UK’s renowned security providers, has completed a major CCTV installation for Bridgnorth Aluminum Limited, the UK's only manufacturer of aluminum flat rolled products. At 27 hectares, Bridgnorth Aluminum’s site in Bridgnorth, Shropshire is extensive. It is home to a casthouse, rolling mill, two litho centers, a multi-slitting line and finishing lines. IP CCTV system The IP CCTV system is critical to our business in terms of health and safety of our employees and site security" The company had previously been using three separate CCTV systems, each covering different parts of this large site, one of which was over 15 years old, had very poor image quality and was starting to show signs of failure. Furthermore, none of the CCTV systems had any level of redundancy, so if one failed access to those particular cameras were lost, along with any recorded footage. Steve Denton, IT Manager at Bridgnorth Aluminum, explains the decision to upgrade, stating “We needed to consolidate everything into one single CCTV system, including all of the cameras from the other three systems, and we needed to add a level of redundancy. The IP CCTV system is critical to our business in terms of health and safety of our employees and site security.” IP video surveillance Following detailed discussions with Bridgnorth Aluminum, STANLEY Security designed a new site wide IP based CCTV system, covering external areas and the perimeter of the site, along with internal areas including key indoor production spaces. The system takes advantage of Bridgnorth Aluminum’s existing IP network which is deployed in most areas of the site, negating the need to install COAX cable. Opting for an IP-based CCTV system has also enabled Bridgnorth Aluminum to make use of newer technology with better quality images, which was the key. STANLEY 2MP bullet cameras and dome cameras The cameras feed is stored in two Milestone Husky M500 Advanced Network Video Recording hardware platforms The new IP CCTV system features STANLEY 2MP bullet cameras and dome cameras, including 360⁰ dome models. The cameras feed is stored in two Milestone Husky M500 Advanced Network Video Recording hardware platforms; one of which is used in case of redundancy. Bridgnorth Aluminum is pleased with the new CCTV system as Steve Denton comments, “The image quality of the new system is streets ahead of the old system. The area of coverage is also far greater thanks to the addition of 180-degree wide angle and 360-degree cameras. The software is very easy to use and has some very useful features to aid with playback of recorded footage. The software has already helped us to retrieve footage that we would have had little chance of retrieving before.” Enhanced site security STANLEY Security has been working with Bridgnorth Aluminum since 2017 when it took over the support of the company’s existing CCTV systems. “The transition period had proved successful” states Steve, commenting on their decision to appoint STANLEY Security for this project. He adds, “The service from STANLEY has been excellent, our account manager Amber is one of a kind and always goes above and beyond for us to ensure that we receive the best service possible.”
Wintec (The Waikato Institute of Technology), established in 1924 is a major New Zealand Government-funded tertiary institution, which has three Hamilton campuses; a city site overlooking the central business district, Avalon campus on the northern outskirts of the city, and a horticultural campus at Hamilton Gardens. In addition, it has regional operations at Te Kuiti and Thames and also an office in Beijing. The Avalon campus, a ten-minute drive from the city, is home to specialist trades training facilities, a state-of the-art sport and exercise complex and custom designed facilities for the School of International Tourism, Hospitality and Events. The third Hamilton campus, the Horticultural Education Centre, is situated amidst the 58 hectares of Hamilton Gardens. On-Line distance education Wintec’s programs and qualifications are nationally and internationally recognized Wintec is one of the largest institutes of technology in New Zealand, and has more than 35,000 full-time and part-time students, more than 500 full and part time staff and eleven schools within its academic faculty. International enrolments exceed 1000 from 47 countries. A range of student services provide its domestic and international students with a high level of support so they enjoy a positive, safe and secure study experience. Wintec’s programs and qualifications are nationally and internationally recognized and its degrees have equal status to those from universities. The degree programs include Media Arts, Midwifery, Nursing, Occupational Therapy, Early Childhood Education, Business Studies, Engineering, Technology, Information Technology, and Sport and Exercise Science and a wide range of full and part time courses for those already in the workforce. Wintec is also recognized nationally in the delivery of on-line distance education for those unable to attend regular classes for reasons of geographical access or other constraints. Electronically controlled doors Wintec strives for a balance of unobtrusive yet robust control of site activity, essential for maintaining an open campus environment. Shane Goodall, Security Manager at Wintec, describes the approach to security as highly proactive and collaborative: “by focusing on preventing issues arising, we now have a minimal policing role and the crime resolution rate is high”. This environment is underpinned by Gallagher’s security system, a core access control, intruder alarms and integration platform. Wintec first installed the Gallagher system (formerly Cardax FT) in 1999 and has since migrated this legacy system to Gallagher’s latest security technology platform. Security for the entire organization, including satellite sites, is managed and monitored centrally from Wintec’s single Gallagher security system. Since initial installation, Wintec’s Gallagher access control system has grown from 7 to 240 electronically controlled doors in 2009, with another 40 planned - testimony to the scalability and flexibility of the system. Network friendly system communications The organization first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras Wintec has integrated its imaging system to the Gallagher system delivering a visual record which can be matched to the audit trail of events in Gallagher Command Centre software. The organization first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras (both analog and IP). Another compelling aspect of the system for Wintec is the scalability and TCP/IP network friendly system communications. As well as monitoring and controlling staff and student access, equipment including computers, TVs, printers, audio visual resources at Wintec are also monitored through the Gallagher system. The ‘Gallagher Hub’, a new computer laboratory offering comprehensive IT resources is open 24 hours. The Hub contains 125 workstations, and there are plans to extend that number. Active monitoring of equipment though the Gallagher system has significantly reduced theft. Students and staff have scheduled access to shared IT resources, classrooms and lecture theatres. Manage cardholder data ‘Cardholder Import’, an XML Interface, supports the importation of cardholder data including course enrolments from their student record system to Gallagher Command Centre. Shane comments, “Student card issuing is an automated process which is enrollment-driven – a student’s access privileges are assigned according to their enrolled courses.” “To implement this, we defined a rules-based allocation of access groups in the Gallagher system using the XML interface. The interface is ‘live’ so that changes in the student enrolments database are immediately reflected in the Gallagher system. The student’s updated access privileges come into effect without delay.” Staff that interact directly with students are now empowered to manage cardholder data enabling the security team to focus on security. Students and staff utilize Mifare SmartCard functionality extensively, embracing them as an integral multiapplication tool in their modern educational environment – SmartCards are used to issue resources from the library and as pre-stored value cards enabling prepaid printing and photocopying. In the near future they will also be used in Wintec’s Pay and Display car-park and potentially as passes onto city council buses. Electronic access control At Wintec, security is not viewed as a discrete functional activity relegated to security staff only Stewart Brougham, Director of Internationalisation at Wintec, says students have given very positive feedback about their ID cards. In particular, the ability to verify the identity of staff members from their ID access cards provides peace of mind for students. The end result is a people-friendly campus. Future enhancements of Wintec’s security may include the utilization of the CommCard solution from Gallagher to manage and monitor access to student accommodation. CommCard is a unique high level integration between the Gallagher Command Centre software and Salto off-line readers, delivering offline, non-monitored electronic access control for lower security doors. An overriding philosophy of collaboration has seen Wintec take a lateral approach to security, the value of which many organizations have yet to realize. At Wintec, security is not viewed as a discrete functional activity relegated to security staff only. The ongoing management of security is a joint effort between the security services team and the information services team. Increasing operational security The security services team manages the Gallagher system while IT looks after back end functions such as installation on the network and backup. Wintec has leveraged the convergence of security (access control) and other operational business functions recognizing the tremendous potential for reducing risk and increasing operational security, safety, performance and efficiency. Looking beyond simply controlling and monitoring who goes where and when on site, Wintec is harnessing the reporting capabilities of Gallagher Command Centre to meet regulatory requirements. The Gallagher system enables the institution to report on actual space utilization (not just space booking). Decisions are made for best use, and also to substantiate funding, based on these reports. “The key to space utilization reporting are the frequency of reporting and the integrity and reliability of information,” states Stewart Brougham. It’s a national issue for educational institutes in New Zealand. Extending external partnerships “For Wintec, reporting is about ensuring compliance with regulatory requirements and is also a staff time management issue – reducing the administration load on lecturers, who would otherwise have to track student attendance manually.” Brian Fleming, Director of Gallagher Channel Partner, Concord Technologies, sites this lateral application of a security system as key to maximizing the value of Gallagher to Wintec. Wintec has a strong relationship with Gallagher in the ongoing development of its technologies This collaborative philosophy extends to proactive external partnerships with their Gallagher Channel Partner, Concord Technologies, for the installation and maintenance of the Gallagher system, and with system designer and manufacturer, Gallagher. Having signed an agreement to continue in the capacity of a Gallagher field test site, Wintec has a strong relationship with Gallagher in the ongoing development of its technologies. Wintec’s success, in the last 5 years, as a test site reflects the competence of both its IT and security staff and the institute’s commitment to edge student services. Minimal training has been required. Software maintenance agreement There is open communication and information sharing between all internal and external parties involved, which means any issues that arise can be quickly addressed. Wintec has committed to a site maintenance plan with their security partner, Concord Technologies. The plan incorporates both software and hardware maintenance to ensure the system is maintained on the latest operating platforms within a known cost structure. A Software Maintenance Agreement also ensures enhanced ongoing system performance and reliability of the Gallagher system. Acknowledgements Gallagher would like to acknowledge the support of Wintec and security partner, Concord, with the development of this in-site study. Gallagher would also like to particularly acknowledge and thank Shane Goodall for the pivotal role he plays in championing the collaboration of these parties and for his outstanding support of the Northern Region Cardax User Group (NZ) in the capacity of Chairman of the group.
With the ability to power over 590,000 UK homes from a total capacity of 660 MW, Walney Extension is set to be the biggest offshore wind farm in the world when it is commissioned at the end of 2018. The new onshore substation covers an area of reclaimed marsh land and required an innovative perimeter and internal fencing package to be designed to offer the highest levels in security and electrical safety. Design work started in 2017 and looked at how existing fencing systems could be used to create a bespoke solution. Challenges faced by utilities industry Protecting critical national infrastructure in the utilities industry presents a number of challenges: External perimeter to offer guaranteed delay against attack All fencing to be earthed or offer non-conductive features Internal fencing to include multiple systems including rigid mesh and GRP in same fence line External perimeter and access control to be compatible with monitored pulse fencing (electric fencing) to meet security requirements Internal fencing to be base plated Prevention of unauthorized access The substation installed five systems in total from the CLD Fencing Systems range of rigid mesh fencing and security gate solutions and combined this with a Gallagher Monitored Pulse Fence to add an extra layer of security to the site. The Gallagher solution provides reliable detection and prevention of unauthorized access to the site, protecting the public from accidental or intentional entry to the site. The solution ensures operational continuity, avoiding significant costs associated with loss of supply, while protecting the site's assets from theft and damage. The system has been so successful that they want to use the same solution for all its electrical substations.
The FeeMaster Smart Console from people and vehicle access control specialist Nortech provides a simple and cost-effective way of managing access to car parks and facilities for vehicles and pedestrians. All the access control data is encoded onto a Mifare card using the FeeMaster Smart Console. As a standalone system, there is no wiring between the access control point and the console, making it easy and cost effective to install. Parking management system The console can print customer receipts and/or barcode exit tokens Part of the popular FeeMaster range, the FeeMaster Smart attendant console is a compact, elegant and easy-to-install device that reads barcode tickets issued at an entry station, calculates the fees payable based on pre-programmed tariff details, and encodes reusable Mifare access control cards with validity data. If necessary, the console can print customer receipts and/or barcode exit tokens. It is also able to control a till drawer and can optionally provide a relay output signal which can be used by third equipment i.e. barrier control whenever a card has been encoded or an exit ticket printed. The FeeMaster Smart time-based parking management system is designed to provide information about the initial arrival time of each visitor and uses cards to strictly control customers’ access rights to car parks and facilities as well as the validity period. Fee calculation system Popular applications that have used the FeeMaster attendant’s console to control visitor access include Bristol Aquarium and Edinburgh Castle, where an easy to install and operate and an automatic fee calculation system with tariff and grace period settings included was required. Bristol Aquarium required a cost-effective and efficient product that would not only save money but would also make the constant stream of visitors easy to monitor. The barcode reader connects to a barrier/turnstile/gate at each site and opens once a valid barcode has been scanned by a visitor using easy to program modes of operation. New security products Nortech has supplied products and solutions to the security industry for over 25 years The simple to use design makes the console ideal for reducing queues and keeping the flow of people moving during busy periods, is extremely versatile and can simultaneously support several methods of revenue generation. Edinburgh Castle has been benefiting from the FeeMaster system for a number of years, using it to control and manage the strict parking at its site. The console allows the staff to control any misuse of the car park and ensures that there are enough parking spaces without the need for expensive cabling or disruption. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
Round table discussion
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.
The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
Fire and security systems are two elements of the same mission: To keep buildings and their occupants safe. However, the two systems often operate independently and may not be integrated. Should there be more integration and what are the pitfalls? We asked this week’s Expert Panel Roundtable: What are the challenges and opportunities of integrating security and fire systems?
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload