ADT, a provider of monitored security and interactive home and business automation solutions in the United States and Canada, unveils its new ADT Commercial brand and positioning video, as part of its multi-year expansion plans. Since the merger with Protection 1, ADT has built upon its commercial capabilities and customer focused approach combining more than ten strategic acquisitions, bringing decades of experience to commercial and national account customers. ADT’s announcement is part...
Johnson Controls announces that the Tyco Visual Intelligence from Software House, a unique metric-based reporting tool for C•CURE 9000, receives the award for Best New Product in the Convergence and Integrated Software and Solutions category. The award was presented at the 2019 SIA New Product Showcase, during ISC West in Las Vegas. Sponsored by the Security Industry Association, the annual awards program is one of the most prestigious recognitions in the security industry. The program rec...
The Security Industry Association (SIA) announced its 2019 executive committee and welcomed five new members to the SIA Board of Directors at The Advance, SIA’s annual membership meeting, during ISC West 2019 in Las Vegas, Nevada. New Voting Members At The Advance – held Tuesday, April 9, at the Sands Expo Center – the SIA Board of Directors ratified the selection of five new voting members of the Board of Directors to serve two-year terms from 2019 to 2021: Greg Hill, dir...
Security and Safety Things (SAST) - A Bosch IoT startup, hosts the first-ever live hackathon at ISC West on the 10th and 11th of April in the Sands Expo Center, Las Vegas. The two-day event featured three teams racing against the clock to create the most deployable application for an American football stadium using the new Security and Safety things system, SAST OS (Operating system). Teams were provided with Google pixel phones, reference cameras and appropriate APIs and development kits, incl...
LenelS2, a provider in advanced security systems, and Milestone Systems, an international open platform developer of networked video management software (VMS), announces a 10-year agreement for LenelS2 to distribute Milestone products globally. The companies had a previous agreement for North America. LenelS2 is a part of Carrier, a global provider of innovative heating, ventilating and air conditioning (HVAC), refrigeration, fire, security and building automation technologies. Founded in 1998,...
Dahua Technology, a video-centric smart IoT solution and service provider, is highlighting its latest innovative industrial products as well as the related cutting-edge solutions of machine vision at Automate 2019, one of the biggest automation solutions convention in North America, during April 8th to 11th at booth #8831 in Chicago. Focused on the theme of ‘Win the Future’, the biennial show collected the latest innovative automation solutions, covering robotics, vision, motion con...
March Networks, a global video security and video-based business intelligence pioneer, is pleased to introduce March Networks Insight. The new, hosted service provides March Networks customers with unmatched video network visibility, asset control, system health, and service level agreement (SLA) performance management. It offers a visual overview of an organization’s entire video network, and valuable reporting capabilities accessible via a secure, cloud-based platform. Leveraging the proven expertise of March Networks’ dedicated Network Operations Center (NOC) team, which already provides daily managed services to more than 35,000 sites across North America, Insight leaves customers free to focus on their business while ensuring optimum video system performance. Recurring Revenue Stream For March Networks certified solution partners (CSPs), Insight delivers the tools needed to serve customers more efficiently For March Networks certified solution partners (CSPs), Insight delivers the tools needed to serve customers more efficiently. It reduces costly truck rolls, and enables partners to easily document and track product warranty status, software versions and other information. The service is also an opportunity for CSPs to build a new recurring revenue stream, working together with March Networks’ professional services team. With Insight, customers enjoy complete, end-to-end support – from system monitoring, performance optimization and issue diagnosis, to remote resolution where possible. When onsite service is required, the NOC team generates a service ticket for customers or their certified partner along with valuable information on the likely issue, for faster, more efficient resolution. Cloud-Based Management Platform That complete support is just one of the benefits enabled by this industry-first service. Insight offers unique features and reporting capabilities that save customers time and costs, including: Easy, self-service access to the cloud-based management platform via a web browser, enabling customers and/or their certified partner to securely access critical video network information, create customized reports, and generate and track their own service tickets. Comprehensive health reporting, for at-a-glance views of a customer’s video network health, problematic areas and more. Closed-loop field service workflows so customers know that escalated issues have been resolved successfully. SLA reporting on items including outstanding service tickets and time to resolution, validating that SLA commitments are being met. Scheduled software upgrades, ensuring timely updates that help protect the video network from possible security vulnerabilities and enable feature enhancements. Inventory and product warranty reporting, providing an invaluable audit of a customer’s entire video network, including device configuration, model number, firmware version and warranty status. Optional, third-party device health monitoring employing Simple Network Management Protocol (SNMP) scanning tools, leaving customers worry-free even when it comes to non-March Networks IP devices in the video network. Optional Field of View (FOV) reports, so customers and/or their certified partner can move quickly to fix any camera FOV that’s been changed or obstructed. Geographical and network topology views, for a more intuitive overview of a customer’s video deployment, as well as the ability to quickly spot trends by region or area. Physical Access Controls To ensure customer data is well protected, March Networks enforces strict security and management controls To ensure customer data is well protected, March Networks enforces strict security and management controls. The NOC runs on a dedicated network, has its own firewall, and uses sophisticated visibility rules to segregate customer data at multiple levels. It also incorporates state-of-the art physical access controls and restrictions, including a retinal scanner and 24/7 video monitoring. March Networks conducts cybersecurity audits and penetration tests regularly, and mandates regular employee training so NOC staff are always current on cybersecurity best practices. In addition, the company backs up NOC data frequently and systematically, and has an established disaster recovery process and redundant power sources in place to mitigate power and system downtime. March Networks Insight is currently available in the U.S. and Canada, with flexible one, three or five-year service terms, and monthly, quarterly or annual invoicing options. The company is demonstrating the new, hosted service in Booth 26041 at the International Security Conference & Exposition (ISC West), April 10-12, 2019 in Las Vegas, NV.
Security innovator IndigoVision is set to introduce a range of new features that will lead to faster security investigations and drive down industry storage costs as part of its presence at ISC West 2019 in Las Vegas. Trusted in installations across the world, and with 25 years of experience in developing complete end-to-end security surveillance solutions, IndigoVision’s latest innovations will be unveiled as part of an array of new features being introduced to Control Center, its intuitive Security Management Solution. Faster Security Investigations Focusing on advanced analytics, cyber-security and ease of use, Control Center v16.0 will offer operators a powerful new line-up of features to help combat security threats. Faster security investigations – users will be able to save time and instantly zero in on specific events with the introduction of timeline preview, which provides a thumbnail of the recorded video timeline. Lower storage costs – users will benefit from improved compression and longer retention times thanks to Control Center’s support for the latest video compression standard, H.265. Reduced eyestrain for users – Control Center v16.0 now adds to its core grey/white view with a new Dark Mode, which has been specifically designed to reduce eyestrain in darker control room environments. Deliver Enhanced Performance Operators will also be able to access next level detection and cyber-security Appearing at booth 23031 from 10th to the 12th April, IndigoVision will add to its Ultra and BX camera ranges with the introduction of an exciting new line-up which offers users multiple form factors, low light sensitivity, augmented analytics and wide dynamic range (WDR) giving operators improved image clarity. The new HD Ultra X Cameras will deliver enhanced performance through the company’s ground breaking SMART.core and CyberVigilant in-camera technology which give users the ability to detect and respond quickly to potential cyber-threats. NDAA compliance also means these cameras are pre-approved for installation in government sites within the United States and other areas of the world where this legislation has been adopted. Operators will also be able to access next level detection and cyber-security with IndigoVision further expanding its advanced Analytics Metadata and its award-winning CyberVigilant technology to select cameras from its BX Camera range. The BX420 4K Minidome, BX430 4MP Microdome and BX630 HD/4K Bullet and Fixed Cameras will now have an enhanced intruder detection enabling Control Center to safeguard against an increased range of threats.
SilverShield Safety & Information Systems, providers of the industry’s most advanced cloud-based, multi-platform solution, is featuring their new Self-Service Visitor Management Kiosk at ISC West this week. The kiosk is integrated with the SilverShield Visitor and Incident Management System to enable unmanned registration for visitors and guests. “Our Self-Service Kiosk helps organizations secure all of their entry points so they know who is on premises at all times, even those entry points that are unmanned,” said Robin Baker, CTO, SilverShield. “Even a single uncontrolled entrance could otherwise compromise the safety of the facility.” Silent Alert Notifications Visitors can self-register with the SilverShield Kiosk (SS Kiosk) using a Mac or PC computer, iOS or Android device. The process is fast and easy; users enter their credentials manually, scan their valid IDs, or scan a SilverShield Quick Badge. Once a visitor’s details are entered, SS Kiosk notifies a Kiosk Monitor (e.g., system administrator or security guard) that a visitor has completed check-in; they can then initiate access or deny access if the visitor’s details match any watchlist or sex offender entries. If a visitor’s details are matched with any watchlist or sex offender entry, the Kiosk Monitor may initiate silent alert notifications to any stakeholders the organization chooses. Also, if the visitor that is denied access becomes a further threat, the Kiosk Monitor can initiate any additional internal or external alarms they feel are needed (e.g., Alert Security, Hard Lockdown, etc.) which produce mass emergency notifications. “The SilverShield Self-Service Kiosk ensures that all visitors are correctly checked-in, screened and badged,” said Baker. “It’s one more way that SilverShield Systems helps keep your facility safe and secure.”
As part of the NJESA´s (New Jersey Electronic Security Association) 50th Anniversary celebration, plans are underway to organize a special gala dinner to honor ‘pioneers’ of the association. The NJESA is seeking individuals, alarm companies, manufacturers, distributors and central stations that have played an important role in the growth of our industry and the origins of the association. These Pioneers, many now living across the country, will have the opportunity to share about their involvement in the industry. Archived For Future Generations “We are now in the planning stages of organizing a formal dinner to recognize and honor these individuals. If you have been part of the NJ association for at least 35 years, we want you!” explained Ken Gould, President-elect of the NJESA and Chairperson of the Pioneer Event, along with Joe Cioffi III. The NJESA has a rich history. Fifty years ago, three men from the alarm industry, Joseph Cioffi Jr, John Belleque and William C. Pollock, formed the New Jersey Alarm Association. Each of the three founding members reached out to friends and brought in other alarm companies they knew. Membership was $50 and the New Jersey Alarm Association grew from there, as members from the entire state joined. “This is a once in a lifetime event,” added Cioffi. “We plan on giving out awards, plaques and trophies, as well as documenting the reminiscences of our Pioneers in pictures, video, and the written word that will be forever cherished by those attending and archived for future generations.” The gala is currently planned for October 5 at Caesar´s Palace in Atlantic City.
Larson Electronics, a Texas-based company with over 40 years of experience spearheading the industrial lighting and equipment sectors, announced the release of a solar powered security tower to quickly deploy equipment to elevations of up to 20 feet. This unit features a telescoping tower that folds and a rotating boom allowing for 360-degree rotation with a removable mast head. This unit features three outdoor cameras, router/wireless 4G hotspot access, two 265W solar panels and a 400aH battery bank. 1080p Full-HD Outdoor Cameras The SPLT-.53K-LM20-EW-TLR7-ACC-2XPTZ.23X-1XFE-4TB-W4G solar powered security tower comes equipped with a 120V battery charger and 25 feet of 16/3 SOOW cord terminated with a 5-15P waterproof shore power cord cap.The cameras have 23x optical zoom levels and a 4.7-94mm varifocal lens that automatically adjusts This unit is trailer mounted with a solar generator that has a 12” by 12” by 6” junction box and three 1080P full-HD outdoor cameras mounted to the top of the mast, which supports cameras for a 360-degree field of view. The cameras have 23x optical zoom levels and a 4.7-94mm varifocal lens that automatically adjusts. Features 8-Channel NVR Larson Electronics’ solar powered security tower features an 8-channel NVR that can be used with network cameras. The tower includes two 265-watt solar panels, solar charging system, battery bank and electric mast mounted on a trailer with outriggers. This three-stage mast is made of square steel tubing with a 12-foot lower section, eight-foot middle section and six-foot top section each with a two-foot overlap. The mast is extended using an 850-watt 600lb capacity electric winch with 3/16” galvanised steel cable. All electrical components are housed in a NEMA 3R job box bolted to the trailer.
Asia’s security industry is once again beginning to shift its attention towards Taipei, as preparations continue ahead of the 22nd edition of Secutech. As anticipation continues to build, the fair’s organisers announce details of six pavilions that will allow buyers to easily locate high quality products as well as the most relevant OEM and ODM partners for their businesses. Speaking about the benefits that the pavilions will bring, Ms Regina Tsai, Deputy General Manager of Messe Frankfurt New Era Business Media Ltd, said: “Technologies such as artificial intelligence, the internet of things, robotics and biometrics have applications across many different vertical markets. The six pavilions will encourage cross-sector partnerships and highlight real-world business applications of some of these technologies.” Ideal Starting Point Best-in-class building, factory and mobility products will be on offer across the zones as well as pioneering cybersecurity and surveillance solutions “The market for tailor made security solutions in verticals such as transportation and factory is also continuing to grow, so we are delighted that we will be welcoming established brands with strong R&D capabilities that can accommodate the market.” The coming edition of the show will take place from 8 – 10 May 2019 at the Taipei Nangang Exhibition Centre. In 2018, the fair attracted 427 exhibitors to over 22,000 sqm of exhibition space. With similar numbers expected at the upcoming edition, the six pavilions will provide an ideal starting point for trade visitors to carry out their sourcing and networking. Best-in-class building, factory and mobility products will be on offer across the zones as well as pioneering cybersecurity and surveillance solutions. Details of the six pavilions are listed below: AI And Software Pavilion As artificial intelligence continues to offer greater accuracy and operational efficiencies, the global demand for video analytics and recognition technologies has grown. With this market in mind, the AI + Software Pavilion will host the latest related innovations from a variety of AI specialists, including AiUnion, eRay, Lips, SkyREC, and TDV. Among the technologies to be showcased are facial recognition systems, license plate recognition systems, behavior and gesture recognition systems, speech recognition systems, big data analytics software and more. Cyber Security Pavilion A growing number of endpoint devices including security cameras and access control panels are being interconnected through the IoT A growing number of endpoint devices including security cameras and access control panels are being interconnected through the IoT. This has in turn created a need for adequate cybersecurity provisions to ensure network security. Cutting-edge solutions that achieve this goal will be housed at the Cybersecurity Pavilion, including the likes of cloud security, risk remediation solutions, and network & endpoint security systems. Smart Factory And Industrial Safety Pavilion The applications of machine vision systems in factory and industrial settings are growing. Not only can the systems secure site perimeters and ensure worker safety, but they can also reduce labor costs and improve productivity. The Smart Factory & Industrial Safety Pavilion will allow trade visitors to delve into the latest developments in this field, by connecting them with top-notch suppliers of workplace monitoring systems, personnel identification systems, access control systems, smart patrol systems and more. Smart Living Pavilion Utilising the IoT to establish smart communities is a growing concept across Asia. Subsystems in buildings and homes can now be interlinked and controlled from centralized hubs in order to create smart homes and buildings. An international line up of brands with expertise in this field, including the likes of Full Enterprise, Jinlong, Link Savvy, Silicon Labs, Sonas, TUTK, Uhikari Technology, and Umbo CV have confirmed their participation at the Smart Living Pavilion, to showcase a selection of facial recognition, voice command, and deep learning technologies for smart living, elderly care and the smart hotel sector. Smart Parking Pavilion These products have been in increasing demand because of crowded urban environments placing a premium on parking spaces AMTK, D-Link, Nietzsche, Smartway and Smart Living will join other suppliers at the Smart Parking Pavilion with the latest number plate recognition systems, parking management systems and real-time street parking solutions. These products have been in increasing demand because of crowded urban environments placing a premium on parking spaces. Mixed-use buildings such as shopping complexes, commercial buildings and hospitals are also requiring increasingly sophisticated car park management systems. Smart Transportation Pavilion Cities around the world are adopting smart transportation systems to overcome traffic congestion, increase road safety, and improve public transportation efficiency. To accommodate this growing sector, a selection of innovative ‘smart’ solutions for road, railway, petrol stations, and fleet management will be available at the Smart Transportation Pavilion from brands such as Axiomtek, D-Link, Korenix, Lantech and TIBBO. Protection Of Buildings Secutech will take place from 8 – 10 May 2019 at the Taipei Nangang Exhibition Centre. The fair is organized by Messe Frankfurt New Era Business Media Ltd and is part of a global network of Safety Security and Fire trade fairs. Safety and security are increasingly important basic needs and, therefore, stand for a growing global market. With thirteen trade fairs, congresses and forums around the world, Messe Frankfurt brings together demand and supply worldwide with progressive, connected products, applications and services focusing on commercial security and the protection of buildings, spaces and people. The Safety, Security & Fire business cluster offers access to the dynamic markets of the Arabian Peninsula, Asia, Europe and South America.
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant Public Safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive Risk Reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising Detection Systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organizations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organizations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber Risk Profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualizations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent Applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter Intrusion Detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security Ecosystem Members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritize communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realized. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
Consolidation persisted in the physical security industry in 2018, and big companies such as Motorola, Canon and UTC continued to make moves. Also among the mergers and acquisitions (M&A) news in 2018 was a high-profile bankruptcy (that ended well), continuing consolidation in the integrator market, and the creation of a new entity called “LenelS2.” Here’s a look at the Top 10 M&A stories in 2018: 1. Motorola Acquires Avigilon Motorola Solutions announced in February that it had entered into a definitive agreement to acquire video surveillance provider Avigilon in an all-cash transaction that enhances Motorola Solutions’ portfolio of mission-critical communications technologies. Avigilon products are used by a range of commercial and government customers including critical infrastructure, airports, government facilities, public venues, healthcare centers and retail. The company holds more than 750 U.S. and international patents. 2. UTC Climate, Control & Security Buys S2 Security UTC Climate, Controls & Security agreed in September to acquire S2 Security, a developer of unified security and video management solutions. UTC subsequently combined S2 with its Lenel brand to create LenelS2, “a global leader in advanced access control systems and services” with “complementary strengths.” 3. Costar Technologies Acquires Arecont Vision After Bankruptcy Arecont Vision, the provider of IP-based megapixel camera and video surveillance solutions, announced in July that the acquisition by Costar Technologies, Inc. of its assets had been approved by the bankruptcy court. After the closing of the sale, the company began operating as Arecont Vision Costar, LLC and is part of Costar, a U.S. corporation that designs, develops, manufactures, and distributes a range of products for the video surveillance and machine vision markets. 4. Allegion Acquires Access Control Company ISONAS Allegion plc, a security products and solutions provider, agreed in June to acquire ISONAS through one of its subsidiaries. ISONAS’ edge-computing technology provides access control solutions for non-residential markets. ISONAS' devices – like its integrated reader-controllers – utilize power over ethernet, making them easy to install and cost effective as they utilize existing customer infrastructures. The company is based in Boulder, Colo. 5. HID Buys Crossmatch for Biometrics HID Global announced that it had acquired Crossmatch, a provider of biometric identity management and secure authentication solutions, from Francisco Partners. Crossmatch’s portfolio of products includes biometric identity management hardware and software that complement HID’s broad portfolio of trusted identity products and services. 6. BriefCam Announces Acquisition by Canon BriefCam, a global provider of video synopsis and deep learning solutions, announced its acquisition in May by Canon Inc., a global digital imaging solutions company. The addition of BriefCam to Canon’s network video solutions products portfolio complements the Canon Group’s previous acquisitions of Axis Communications and Milestone Systems. 7. Allied Universal Acquires U.S. Security Associates Allied Universal, a security and facility services company, finalized its acquisition of U.S. Security Associates (USSA) in October, further building on its position in the security services industry. This acquisition includes Andrews International (including its Government Services Division and Consulting and Investigations and International Division) and Staff Pro. 8. Johnson Controls Acquires Smartvue Corp. Johnson Controls announced in April that it had acquired Smartvue, a global IoT and video provider that empowers cloud video surveillance and IoT video services. The addition of the Smartvue cloud-based video platform will enhance Johnson Controls’ offering of an end-to-end, smart cloud-based solution that can provide superior business data and intelligence to customers and added value to partners. 9. ADT Acquires Red Hawk Fire & Security (and Others) ADT Inc.’s acquisition of Red Hawk Fire & Security, Boca Raton, Fla., was the latest move in ADT Commercial’s strategy to buy up security integrator firms around the country and grow their footprint. In addition to the Red Hawk acquisition, announced in mid-October, ADT has acquired more than a half-dozen security system integration firms in the last year or so. 10. Convergint Technologies Continues to Acquire Convergint Technologies announced in August the acquisition of New Jersey-based Access Control Technologies (ACT), bringing further electronic security systems experience to Convergint's service capabilities. Convergint has strategically grown its service footprint across the United States, Canada, Europe and Asia Pacific through strong organic growth and the completion of 18 acquisitions since early 2016. And it continues: Convergint announced acquisition of SI Technologies, Albany, N.Y., in November and Firstline Security Integration (FSI), Anaheim, Calif., in December. (And Convergint itself was acquired in February by private equity group Ares Management.)
Terry Gold of D6 Research has been giving “cyber in physical security” presentations at a variety of conferences, including ISC West and the Cyber:Secured Forum. We caught up with him for some insights about the intersection of cybersecurity and physical security. Q: Tell us a little bit about your background, specifically in the context of its relevance to cyber security in physical access. Gold: I started out in information security and then got involved in physical security along the way. I started really focusing on physical from a cyber standpoint about 10 years ago. I got into ethical hacking about 8 years ago, and then worked on putting it all together. There wasn’t a roadmap, so I had to build a methodology which I now share with other hackers, end users and law enforcement. I spend all my time either in the lab building success models, methods, and testing them out in some of the largest customers or agencies in the world for validation and improvement. Also, a chunk of my time is spent re-engineering security assessment and controls for end users or validating vendors on their behalf from a unique viewpoint that’s not (yet) typical in the industry. Q: How well prepared is physical security overall against cyber threats? Gold: Not well at all. While security is imperfect anywhere, much of the practices and designs have critical defects and overlook either best practice or fundamental application security principles. I’d say that the industry is very wide open for exploitation that doesn’t take much sophistication to execute. Breach disclosure laws are focused on mandatory reporting for personally identifiable information (PII) Q: What things stand out to you along your journey regarding the changes that you are seeing on this topic? Gold: Culture. Over the years, the industry (and most end users) have been dismissive of my findings. Industry culture hasn’t been aligned to embrace the topic and make requisite improvements that are needed to achieve “good security.” However, I’m finally starting to see that change – quickly and at scale. It doesn’t mean that we’re close to “good,” but rather reached the inflection point of change – and I’m rather pleased about it. Breach disclosure laws has resulted in IT getting a lot of media attention in comparison to hacks made against physical security Q: D6 does a lot of research in this area. What is the analysis behind the recent push for cyber security in physical security? Gold: First, it must be recognized that the threat isn’t new, but rather that the industry is only now coming to the table on it. Industry sentiment has been that breaches in physical security don’t happen or that there’s little impact. It must be recognised that the threat isn’t new, but rather that the industry is only now coming to the table on itBoth are false. Mainly, IT gets all the media attention with breaches for two reasons; 1) breach disclosure laws are focused on mandatory reporting for personally identifiable information (PII), and 2) there is really poor detection (mostly non-existent) against hacks in physical security, so they go unrecognized. On the other side, as physical security systems increasingly resemble an IT architecture, so does their risk profile. As it expands to mobile, cloud, IOT and intelligence - InfoSec and auditors are taking a look and are alarmed at what they’re seeing. Before you know it, the scrutiny is cutting pretty deep, pressure for alignment becomes intense, and vendors feel the pinch on the sales cycles. It’s not a comfortable position for anyone. Q: What will be the projected impact? Are practitioners seeing the whole picture? Gold: No, and this area is probably the most important takeaway of this interview. The industry is where InfoSec was about 15 years ago in their journey, except we have an additional headwind to deal with – culture change. This industry tends to rely more on trusted relationships than validating the recommendations are being provided. There are too many prevailing misconceptions, that unless remediated, investments won’t be as effective as expected. Q: What do you believe are the top misconceptions? Gold: Well, this is a longer topic, but here’s a sampling that cuts across different areas. Regarding hackers: A misconception is that they’re generally not interested. Hackers are increasingly very interested. When I teach a workshop at a hacker conference, it’s usually the quickest to fill up and go to wait list (within a couple hours). Regarding attacks: A misconception is that attacks are executed directly against the target system. Example, their goal is to get into VMS and attack it directly. The reality is that they’re more commonly dynamic where physical is part of a larger attack and its role is an easier gateway to another system (or vice versa, with many hops). Regarding protective measures. The most prevalent mistake that the industry is currently making is too much focus and reliance on air-gapping networks or locking ports. This is only a slice of the attack surface and there are various ways to get around it. There’s a heavy price to pay for those that that rely too much on this strategy since its often accompanied by few mechanisms to deal with actors once they do get in (and they definitely will). Regarding the value of exploiting physical security. Too often perceived as low value. In our white paper we review many of the things that hackers can do, what they gain, and how it can impact the overall organization. It’s far broader and deeper than most. Q: What are the top things that need to change in the industry? Gold: First, culture. This can be answered by adopting the same principles as InfoSec. From an execution standpoint, the industry needs to change how they perform risk assessments. At D6, we’ve developed a stepwise methodology from ground up and it’s a huge differenceIndustry practices, including certifications, are significantly outdated and don’t reflect a methodology that accurately considers cybersecurity, actors, methods, and proactive remedy. At D6, we’ve developed a stepwise methodology from ground up and it’s a huge difference. End users that don’t re-engineer their practice, will be very limited for meaningful cybersecurity improvement. One of the changes needed in the industry includes how risk assessments are performed Q: Generally, what advice do you give to clients on steps to move their cyber security to the next level? Gold: Don’t operate like a silo anymore. Transition from industry “common practices” to best practices that can be validated. Rely less on previous relationships and more toward domain competence. Collaborate with the CISO to a principled, goal-oriented and metrics-based approach. Embed an InfoSec person on the physical team. Present priorities and risks jointly to the board within an overall risk portfolio. Invite scrutiny from auditors. Get a red team performed once a year. Until you do the last step, you don’t really know where you stand (but don’t do it until the other things are done). Last, set the bar higher with vendors to support these improvements or their products will just end up being weak link. Q: What type of challenges do you see and any advice on how end user and integrators can overcome them? Lessons learned? Gold: There are too many specific domains across cybersecurity – it’s not just a network security resourceFeedback I get from integrators is that they’re struggling to figure out how to deliver expertise to their clients in their area. They’re somewhat overwhelmed with the complexity, becoming an expert or how expensive it is to hire and maintain those skilled resources. My best advice is not to do either. There are too many specific domains across cybersecurity – it’s not just a network security resource. Not even the large integrators have the right bench, and unfortunately, they’re just further down a doomed path than smaller integrators. Form a partnership with boutique cybersecurity firms that have multiple specialists. Negotiate rates, margins, scope, and call on them when needed. It won’t come out of your bottom line, the results will be better, and the risk will be extremely low. You’ll learn along the way too. Q: Anything notable that your research is uncovering in this area that might not be on people’s radar yet? Gold: Yes, quite a bit. Our Annual Industry Assessment Report goes through every segment. We’re making pretty bold statements about the future and impact, but we’re confident. One thing that stands out is how intelligence (and the swath of subsets) will impose stringent demands on physical security due to attribute and data collection (for analysis) which will absolutely require privacy compliance, integrity, and controls. It will even shape organizations that might not care about cybersecurity but are prioritizing function. Q: Where can readers learn more about your perspectives on this topic? Gold: Blogs on the D6research.com website. Our annual report. Val Thomas of Securicon and D6 have collaborated on a three-part cybersecurity in physical white paper series. It goes into all of this in detail, as well as remedy.
Attendance has been growing steadily year-over-year for ISC West, and the 2018 show exceeded 30,000 total industry visitors for the first time. So it’s safe to expect ISC West 2019, April 10-12 at the Sands Expo in Las Vegas, will be bigger than ever. Preregistration for the 2019 show is on track to bring even more visitors than last year. “This is a show for everyone, for converged security,” says Mary Beth Shaughnessy, Event Director for Reed Exhibitions. “We bring a lot of different verticals together with IT and network security, physical security and robots and drones. It’s one-stop shopping and the number one security show in North America.” Identifying Buying Influencers The event organisers of ISC West make a concerted effort to bring the industry’s top buyers to the show The event organisers of ISC West make a concerted effort to bring the industry’s top buyers to the show. The ISC West Executive’s Club is a ‘top buyer program’ created to welcome high-level buying influencers who have current projects in the pipeline. The program works throughout the year, networking, researching and identifying buying influencers among end users, integrators, dealers/installers and consultants who are working on current projects. Approximately 1,300 attendees are participating in the program this year. An Executive’s Club member might be an integrator working with several large projects or represent a school system that is building a new campus or retrofitting their systems. During the trade show, these guests get the VIP treatment with a variety of benefits, including a lounge, cocktail receptions, and continental breakfasts. Personalized Matchmaking Programs ISC West also provides personalized matchmaking programs to bring together these buyers with companies that can meet their needs. The Executive Club members are also led on guided exhibit hall tours, based on product interest, that highlight new and innovative solutions. The program also contributes to ISC West’s goal to grow its end user audience. In this case, it is a group of eager buyers with immediate needs. Another growing aspect of ISC West is its role shaping exhibiting companies’ technology roadmaps, in particular the timing of new product releases. Many new products and technologies are announced at ISC West, and attendees are conditioned to attend the show to see what’s new in the marketplace. “Vendors try and work to get whatever solutions they are promoting together in time for ISC West,” says Shaughnessy. “Vendors know that attendees have fresh budgets and new initiatives early in the year.” Network Security Products ISC West will partner with the Security Industry Association (SIA) to make educational sessions available April 9-11 ISC West showcases the latest products, services, and technology including access control, video surveillance, disaster recovery, IT security products, network security products, wireless security products, and thousands more helping ensure safety by giving attendees the right tools and defenses to protect against security risks. In addition to the exhibition, ISC West will partner with the Security Industry Association (SIA) to make educational sessions available April 9-11. SIA Education@ISC will kick off the day before the start of the exhibition. The comprehensive program includes 85+ accredited sessions covering a range of industry topics aimed at providing the critical knowledge attendees need to protect and defend against developing threats in today's security landscape.
ISC West in Las Vegas is the first of several major security trade shows planned for 2019 as part of the Reed Exhibitions ISC Security Events portfolio. Next up will be Expo Seguridad México in May in Mexico City, followed in June by ISC Brasil in Sao Paolo, and ISC East this fall in New York. Expo Seguridad México, May 7-9, will serve the important Mexican market for security goods and services. In Mexico City alone, a large population translates into plenty of buildings and facilities that need protection; security is a big concern and a large market. Concerns about information security, cybersecurity and convergence are also dominant topics. Benefitting from a revised trade agreement with the United States, Mexico offers a favorable business climate and low costs. In addition to video and other hardware products familiar at the U.S. show, Expo Seguridad also includes a large public safety/police component, a workplace, environmental and industrial safety sector, and fire products, offering a broad range of additional product categories. Developing Knowledge Of Attendees The FISSE (Innovation and Solutions of Security) conference room will have cybersecurity and electronic security speakersOn the exhibition floor will be the VIII International Conference for the Administration of Security and Law Enforcement, which will bring together renowned specialists in the security and public safety sector. Free conference track rooms will be provided on the exhibition floor to develop knowledge of attendees in various business areas. The FISSE (Innovation and Solutions of Security) conference room will have cybersecurity and electronic security speakers. Manufacturers, distributors, integrators, and national and international end users have come together at Expo Seguridad since 2002 to interact and exchange knowledge during the three days dedicated to the security industry. Expo Securidad México provides access to more than 350 exhibitors and the opportunity to interact, connect and develop face-to-face relationships with more than 16,300 security and public safety decision-makers. This year, Daniel Linskey, former Boston police chief, will provide a welcome speech at the opening ceremony and will share his experience and thoughts about the 2013 Boston Marathon bombing. Exhibition Of Public Safety Equipment The exhibit encompasses a selection of public safety equipment and vehicles, body armor, and counter-terrorism solutionsISC Brasil, June 25-27, offers a combination of physical security and emerging information and cybersecurity elements. An Infosecurity pavilion on the show floor and related conference track sessions highlight growing concerns in the marketplace. A large meeting of Brasil’s law enforcement commanders is collocated with ISC Brasil, and the exhibit encompasses a selection of public safety equipment and vehicles, body armor, and counter-terrorism solutions. A strong VIP attendee program ensures attendance by high-level decision-makers with money to spend. The ISC Brasil Congress is an educational program for continuing professional education and technical training for corporate end users, police commanders, distributors, integrators, law enforcement officials, security consultants, IT and public safety managers. Of the expected 18,000 attendees, some 53% come from corporate end users in several vertical industries. Some 21% of attendees are commercial system integrators, with 9% central monitoring systems and 5% law enforcement and public authorities’ safety. Security For Oil And Gas Companies Brasil’s economy has been improving steadily after a rough patch, and the ISC Brasil show has seen an uptick for the last two yearsBrasil’s economy has been improving steadily after a rough patch, and the ISC Brasil show has seen an uptick for the last two years. Brasil’s huge economy includes big industries that need lots of security – oil and gas companies, and automotive production are among the contributors to economic growth. Attendee and exhibitor satisfaction is strong for ISC Brasil, and the show is on a new growth path as the economic situation in Brasil continues to improve under a new president. Large exhibitors at ISC Brasil include Bosch, Genetec, Hikvision, Dahua, HID Global, Honda, Yamaha, and Microsoft. Large Reed Exhibition offices in Mexico City and São Paulo manage the Latin American events and work with local partners, marketing organizations and clients. Emerging Technology Zone ISC East in New York, Nov. 20-21, continues to build momentum in 2019 after a successful 2018 show that saw double-digit growth both in exhibition space and attendance. Reed Exhibitions’ Infosecurity/ISACA North America Expo and Conference will again be collocated with ISC East, expanding information security and cybersecurity horizons for attendees. (ISACA is an international professional association focused on IT governance.) New at ISC East in 2019 will be an Emerging Technology Zone, providing a high profile for emerging technology companies at the show New at ISC East in 2019 will be an Emerging Technology Zone comparable to the one at ISC West, providing a high profile for emerging technology companies at the show. The Unmanned Security Expo, a big success last year, will be even bigger in 2019 with more exhibits than ever. There are good signs on the horizon for greater use of drones and robotics. Protection For Enterprises ISC East has traditionally focused on the ‘tri-state’ area around New York City – New York, New Jersey and Connecticut – an area rich in end user companies, especially in financial services, retail, entertainment and the media. In New York City alone, there are almost endless numbers of big enterprises that need protection, so a localized show is a natural, and doesn’t require the large pool of potential customers to travel away from their businesses. New York also has a large and active law enforcement community, and there are many large systems integrators that operate in and around the New York area. ISC East is a growing show that serves a large, unique audience. Growth of ISC East also suggests it is becoming more of a ‘super-regional’ event, drawing good attendance from the Southeast and Midwest in addition to the tri-state area.
In a layered approach to security, the outermost layer increasingly might refer to an area outside a fence line. The sooner a facility is alerted to a possible threat, the better, and when a threat reaches inside a facility’s fence, it may be too late to mitigate it. Security directors need situational awareness that extends outside the facility and provides the ability to intercept intruders before they become a threat. Zones of interest, or buffer zones, outside a facility’s fence line are particularly important for security professionals at facilities such as refineries, electrical stations, chemical plants and other elements of critical infrastructure. Ground-based radar systems are expanding the capabilities of buffer zone surveillance at economical prices and with low false alarm rates. Use of multiple radar streams and “behavior filters” to analyze moving targets has demonstrated its capability in such applications to provide an early warning of intruders and/or to guide pan-tilt-zoom cameras (based on GPS coordinates) to provide real-time images of intruders before they get inside a facility. “What we’re seeing is an upswell in interest and implementation,” says Logan Harris, CEO of radar system supplier SpotterRF. “Security managers are saying it isn’t enough to have sensors on the fence line. Now we need situational awareness of what’s going on around a facility, and to intercept it before it becomes a threat.” The flexibility of behavior filters allows adjustments to define specific behaviors and ignore irrelevant data. The technology has particularly gained attention in the utility industry, which is looking for a means to mitigate risks such as an attack last year on PG&E Corp.'s Metcalf electric power transmission station near San Diego, Calif., involving a sniper who fired a high-powered rifle for 19 minutes and knocked out 17 giant transformers that supply electricity to Silicon Valley. This August, the same electrical substation was breached for a second time, despite the utility’s efforts to bulk up security after the initial attack. “A lot of security risks, especially internationally, may be a matter of life and death, and two minutes’ advance warning can make all the difference,” says Harris. “That’s where we come in, giving them that extra early warning.”The simplified system could be installed by anyone with experience setting up an IP camera, Harris says. "Security managers are saying it isn’t enough to have sensors on the fence line. Now we need situational awareness of what’s going on around a facility, and to intercept it before it becomes a threat" SpotterRF has teamed with Sensei Solutions to provide a perimeter security approach for electric utilities. Combining SpotterRF radar with Sensei’s sensor fusion software enabled false alarms to be reduced to zero after processing 77,000 events during an eight-week trial period, according to Harris. Displaying its technology at ASIS, SpotterRF saw a lot of interest among utilities and oil and gas companies, and there were some other applications mentioned, too. For example, Harris says SpotterRF can help prevent remotely controlled quadcopters (or drones) from delivering contraband over a fence and into a prison. “They need something that can detect small objects in the air, and our radar is suited for that,” he says. SpotterRF is also a component of the perimeter protection of Mount Rushmore National Memorial in South Dakota, where it helps to protect wide open spaces and rough terrain. Mount Rushmore covers more than 1,200 acres that require constant monitoring, and SpotterRF radar amplifies the effectiveness of existing systems, which include infrared (IR) cameras, video analytics and other intrusion detection technologies. The company’s newest, widest-coverage radar system – the SpotterRF C950 – is a trim five pounds and provides 300-acre coverage (twice the previous area). There are no moving parts to maintain as with rotating radar that provides similar coverage potential. Weather conditions such as rain and snow can negatively impact the effectiveness of video analytics systems, and low temperature differentials (such as when a human walks across hot pavement) can undermine the effectiveness of thermal cameras for early detection. “Radar uses a completely different method, transmitting RF waves, bouncing off targets and then being evaluated. It’s all solid-state, we scan an entire area seven times a second. We collect more data and use efficient algorithms to identify and rule out objects that are not of interest (such as the wind blowing trees). This reduces false alarm rates.” A SpotterRF mobile kit can be used to protect a smaller substation in less than an hour, and weighs less than 50 lbs. Magnetic clamps make installation quick; the system plugs into the wall, uses a cellphone modem and can be operating in less than an hour. Security system manufacturers are integrating their systems with SpotterRF; for example, Honeywell highlighted its Vindicator system’s integration with SpotterRF at the ASIS 2014 trade show.
A manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialization in some of the towns in Maharashtra while preserving their rich heritage. Wide Area Monitoring The company is spread across a wide area, employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing high resolution images and covering a greater area for monitoring was the primary requirement. The company is divided into various branches that are located at various places in Satara, Maharashtra. This gave rise to the need for a centralized solution at a centralized location from where all other sites can be monitored at a time. Matrix IP Bullet And Dome Cameras To cover the large monitoring area, Matrix provided IP bullet and dome cameras that have greater field of view when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images that aid in night time surveillance and provide enhanced security. For storing the streamed videos, Matrix offered network video recorders. These NVRs have features such as adaptive recording which aids in storing more data in a defined space. Moreover, it has intelligent video analytics such as intrusion detection and motion detection which were also applied. Instant notifications and alerts ensured real-time security of the premises.
A Manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialization in some of the towns in Maharashtra while preserving their rich heritage. Centralized Surveillance Solution Large area to monitor - The company is spread across a wide area employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing good quality image and can cover a greater area for monitoring was the requirement. Matrix provided IP Bullet and Dome cameras that have greater Field of View when compared to other brands Centralized control - The company is divided into various branches which are located at various places in Satara. This gave rise to the need for a centralized solution at a centralized location from where all other sites can be monitored at a time. Low Light Images For Enhanced Security To cover the large monitoring area, Matrix provided IP Bullet and Dome cameras that have greater Field of View when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images which aid in providing high-class security. For storing the streamed videos, Matrix offered Network Video Recorders. These NVRs have features such as Adaptive Recording which aid in storing more data in a defined space. Moreover, it has Intelligent Video Analytics such as Intrusion Detection and Motion Detection which were also applied. Instant notifications and alerts ensured real-time security of the premises. Results: Centralized Control 24x7 Real-time Surveillance Higher Security with Intelligent Video Analytics
An integrated security system that includes new IP cameras and two-way audio technology has seen the rate of injuries as a result of attacks on Post Office staff decline by 36% in just three years. This follows the deployment of a sophisticated monitoring and intelligent threat detection platform from Morphean, a Video Surveillance-as-a-Service (VSaaS) innovator, which has not only helped to keep staff safe but has also protected ATMs from attack, helping to keep Post Office doors open. Post Office is responsible for the safety and well-being of 14,500 workers in 11,600 branches. The very nature of their combined service offering and the fact they are often located in rural areas, means branches are prime targets for thieves. Threat Intelligence Opportunistic attacks on staff and equipment, and the use of expanding gas to break open ATM machines is not uncommon Opportunistic attacks on staff and equipment, and the use of expanding gas to break open ATM machines is not uncommon. In rural communities, attacks on equipment can leave branches out of operation for long periods. In the last year alone, there were 13,437 violent attacks on convenience store workers, 27% of which involved a weapon and 39% led to injury, according to The Association of Convenience Stores (ACS) annual Crime Report. The Post Office security team wanted to build on its existing threat intelligence and response system, Grapevine, with a network of IP cameras and two-way audio into branches. Axis Communications cameras, microphones and speakers, connected to the Morphean Platform and hosted in the cloud, were installed in pilot branches by Kings Secure Technologies. Security Automation Now that trial implementations have been completed successfully, the security team plans to expand coverage rapidly. In addition to the cameras, the networked speakers enable control centre staff to speak directly to customers and suspected criminals, alerting them to the fact they are under surveillance. The solution is also optimised to use low bandwidth dataFurther integrations are under way to bring security automation to other branches, such as providing the ability for remote agents to lock on-site safes in the event of an attack. Because of the challenges around connectivity in the areas where the most vulnerable branches are situated, the solution is also optimized to use low bandwidth data and is capable of streaming video over a 3G mobile network. Built-In Intelligence The built-in intelligence of the Morphean Platform means staff are able to monitor footage for suspicious behavior, such as individuals loitering near an ATM, and issue an alert to security teams who can then decide on the appropriate course of action. If it’s someone trying to find their wallet, no action is taken; if a crime is in progress, police will be notified along with video footage. In addition, staff are able to trigger an alert manually using an under-the-counter activation button, which can be investigated immediately by control center staff at the alarm receiving centre (ARC). “The safety of our staff is our number one priority,” says Physical Security Manager for Post Office, Mark Dinsdale. Make Significant Differences Footage goes straight to the Morphean cloud, and the platform compresses video and is fully encrypted end-to-end"“We’ll never completely eliminate crime in our branches, but we are also not powerless against it and we are able to make significant differences to the safety of our people, as demonstrated by the new technology we are deploying.” “Post Officers, particularly those in remote areas without access to a nearby police station, value the easy access to help and now report feeling much safer at work,” he concludes. Paul Ottley, Account Director at Kings Secure Technologies, says there are more subtle benefits to the Morphean Platform. “Footage goes straight to the Morphean cloud, and the platform compresses video and is fully encrypted end-to-end. This means that even if criminals attempt to destroy cameras or on-site storage appliances, recordings of any incidents are secured in a manner that is admissible as evidence. This eliminates the challenge of sending out an engineer to collect footage. It’s a simple solution that is flexible and fully compliant with regulations such as the GDPR.”
A Japan based technological enterprise is working towards the formation of a technology corporate group. The company’s technologically advanced products include a diverse range of products that are used on land, sea, air and even space. The company offers a range of environmental and recycling plants, industrial plants to automobile and infrastructure equipment. And at every step, Kawasaki pays the utmost attention to humankind and the environment. This century old company has been able to establish a firm foundation as a technological enterprise. The company’s automobile division, which makes it one of the pioneer automobile companies, is spread on a global scale. Crystal Clear Images They also wanted to monitor how the employees interacted with customers, cleanliness of the premises The company having franchise stores operated by respective owners in India was concerned about the consistency in branding and customer service across these stores. They wanted a solution that could enable them to view the stores from a central location, specially the front end where their premium vehicles were displayed. They also wanted to monitor how the employees interacted with customers, cleanliness of the premises, whether the products were displayed in the right order, branding in the store and other process compliances. But at the same time, they did not want to invest in recorders as the numbers of cameras at individual locations were very limited. Matrix installed high resolution IP cameras at each store. These cameras provided crystal clear images of every corner of the store. This enabled the company to monitor every aspect of brand management such as order of vehicles, customer service, cleanliness, behavior of employees, etc. Geographically Separated Locations A Matrix NVR was placed at the central location, and all the cameras from different locations were connected to itCameras were installed at each location based on the requirement and connected to a network switch with the help of CAT6 cables. Since there was a private connectivity between all the geographically separated locations of the company, all cameras at various locations were configured locally with VPN functionality (same class of IP address), and were viewed at a central location without port forwarding. A Matrix NVR was placed at the central location, and all the cameras from different locations were connected to it. This allowed streams from all twelve locations to be viewed on a single screen. In this way, Matrix helped the automobile giant maintain process compliance in its stores throughout the country. Centralized Control Better Brand Management Elimination of Compliance Check Costs Enhanced Security Employee Discipline Matrix products used: SATATYA CIBR13FL40CW: 1.3MP IP BULLET CAMERA SATATYA CIDR13FL40CW: 1.3MP IP DOME CAMERA SATATYA NVR24P: 24-CHANNEL NETWORK VIDEO RECORDER WITH 6TB STORAGE SUPPORT
The Hong Kong-Zhuhai-Macao Bridge relies on customized security solutions from Bosch to ensure safe operations. The world’s largest sea-crossing bridge was opened by Chinese officials late October 2018. Spanning 55 kilometres in length, the Hong Kong-Zhuhai-Macao Bridge directly connects Hong Kong to Macao and then to the Chinese city of Zhuhai for the first time. At a total cost of USD 20 billion, it is a major boost for China’s Greater Bay Area, an emerging industrial and technological hotbed that is home to 68 million people and a showcase project for Bosch Building Technologies. Equipping Critical Infrastructures The large-scale project was built over the course of eight years using 400,000 tons of steel and includes underwater tunnels and two artificial islands that serve as customs ports. Ensuring the security of these two islands, where drivers need to present special permits to use the new bridge and pass customs checkpoints, was a priority from the start. Bosch Building Technologies won the contract to provide the artificial islands with video surveillance, intrusion alarms With a proven track record of equipping critical infrastructures such as airports, hotels, commercial buildings and underground metros, Bosch Building Technologies won the contract to provide the artificial islands with video surveillance, intrusion alarms, as well as public address and voice evacuation systems. On the island between Zhuhai and Macao, the Bosch partner Shanghai SAGA Electronic Technology Co., Ltd. installed more than 5,700 Bosch loudspeakers and over 260 amplifiers which are all managed via the PRAESIDEO Digital Public Address and Emergency Sound system. Custom-Ordering Solutions Fulfilling a key customer request, the installation incorporates 15 different models of ceiling, wall mount, and line array speakers to blend in with the facility’s modern interior. Furthermore, Bosch was able to match Macao’s local standards by custom-ordering solutions with British power cord, programmed with graphic interfaces in traditional Chinese lettering. On the island outside of Hong Kong, which is home to a customs clearance port, Bosch partner Pro-United Co., Ltd. installed 2,200 public address speakers of various models, including outdoor speakers for the travel inspection building. Experts also adjusted 200 vari-directional array loudspeakers to balance sound variations from different building materials. Live Voice Announcements “The Bosch technical team and partners used professional software to simulate the sound pressure level of a specific area and comprehensively simulate the entire project to ensure that the selected products can meet the requirements of different areas in the actual application,” said Lin Lizhi, Bosch Building Technologies. Bosch also covered the island with more than 2,000 HD cameras including the FLEXIDOME, DINION, and AUTODOME series. The PRAESIDEO systems on both islands enable security staff to broadcast live voice announcements via security call points Monitored from a security control center on the Hong Kong-side of the island, these cameras support 24/7 surveillance of the customs clearance port, travel inspection building, Immigration Department and Hong Kong Customs Office. The PRAESIDEO systems on both islands enable security staff to broadcast live voice announcements via security call points, while multiple sets of intrusion alarm systems protect personnel and property. Broad Customization Options “We added the supporting intelligent call station PRAESIDEO, which is usually used for airport projects, in order to ensure that the staff can directly perform voice broadcasts throughout the call station during operation, thus making the security management more convenient,” said Wang Yiping, Deputy General Manager of Shanghai SAGA Electronic Technology Co., Ltd. The high-profile infrastructure project highlights the flexibility and broad customization options offered by Bosch Building Technologies as a one-stop solutions provider. Now that it is fully operational, the Hong Kong-Zhuhai-Macao Bridge is already considered a key asset in the Greater Bay Area, also known as ‘China’s Silicon Valley’. The bridge reduces the travel time between Zhuhai and Hong Kong from four hours to a mere 30 minutes. It also creates a new gateway for travellers between vital transportation hubs such as Shenzhen and Hong Kong airports with the integrated Bosch security solutions ensuring a safe passage.
Property is one of the biggest targets for crime in the UK, especially open land. There are thousands of acres worth of property across the UK which aren’t effectively secured, as a result of which they have become hot-beds for crime, anti-social behavior, and not least fly-tipping. Security therefore must be a top priority for property owners, too many of whom tend to favor traditional methods such as fencing or hiring security guards. But, these methods come with a premium budget, with manned security running at a cost typically of some £300 per day. Nor is it possible to guarantee that every inch of a property is monitored. An increasingly adopted solution is Ad Hoc Property Management’s Smart Tower Security System and Smart Alarm System. Ad Hoc’s Smart Camera Security Tower sits six metres tall with a 36x optical zoom magnifying distances of up to 150 yards Ad Hoc Smart Camera Security Haringey Council contacted Ad Hoc Property Management after one of its industrial sites, Rosebery Industrial Estate in London, was repeatedly being targeted by fly-tippers over the course of many years. Every time the property was dumped with waste, it was costing the council hundreds of pounds to have their waste contractor called out to clean-up. By November 2017, they had expensed literally hundreds of thousands of pounds. By the end of the month the first Ad Hoc Smart Camera Security Tower was deployed, since then costs and incidents have plummeted. In fact, there have been no major incidents and local residents and tenants alike are delighted, welcoming the improved local environment. Ad Hoc’s Smart Camera Security Tower sits six meters tall with a 36x optical zoom magnifying distances of up to 150 yards, and a 12x digital zoom to enhance optical performance. Using state-of-the-art SMART technology (the same technology used in monitoring US Defense Center, The Pentagon), the tower boasts a 360 degree camera which can be programmed to move zones at set intervals for 24/7 monitoring. Utilizing wireless technology, the camera is able to filter large objects from those that are small, ensuring the alarm is only triggered when there is a clear threat. Ad Hoc’s Smart Cameras have been deployed successfully by numerous property owners around the UK" Ad Hoc's Property Security Solutions “Open land is one of the biggest targets for waste dumping, but it doesn’t have to be. Ad Hoc’s Smart Cameras have been deployed successfully by numerous property owners around the UK, preventing anti-social behavior and, more importantly, reducing opportunity for property-related crime,” said Darren Tubb, General Manager, Ad Hoc Security UK Limited. Land owners aren’t the only ones who can benefit from Ad Hoc’s security solutions; property owners of retail spaces, industrial buildings and homes who traditionally look at hiring in security guards, can benefit too, deterring fly-tipping and other anti-social crimes. As it stands, if a property is fly-tipped and no one is caught, it is the responsibility of the property owner to remove the waste legally at their own expense, which means hiring in a company licensed to remove these materials. However, as more property owners become aware of the technology available to them through Ad Hoc, not just in protecting the property but in helping police to identify the culprits, we could see property damage and fly-tipping become a thing of the past.
Round table discussion
They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than for any other market. We asked this week’s Expert Panel Roundtable: What are the security challenges of critical infrastructure facilities?
Even the most effective technologies usually require some level of human involvement. What new technologies do, generally speaking, is change the nature of a human’s role. Most jobs in today’s world are vastly different than 50 years ago, in many cases because of the changing role of technology. In the physical security world, what specific impact does technology have on the human element of systems? We asked this week’s Expert Panel Roundtable: Have recent developments in security systems made manpower more, or less, important to the equation? Explain.