Hikvision’s Miami office co-sponsored an event in partnership with nonprofit Mission 500 and other security industry pioneers to support local students who attend the Title 1 Crosspointe Elementary School in Boynton Beach, Florida. Participants built and donated 700 backpacks filled with school supplies and other essential items. On Friday, Aug. 9, Hikvision Miami logistics and facility manager, Anthony Martinez, and Florida & Puerto Rico sales director, Shane Nikov, convened at Cross...
Camden is proud to introduce its newest innovative offering - Kinetic by Camden. This advanced 900 Mhz. ‘power harvesting’ wireless system uses the energy created by the operation of the switch to power the wireless transmitter. There are no batteries to maintain or replace and no hazardous waste entering landfill. Kinetic by Camden is the only ‘power harvesting’ wireless system to feature an ultra-compact receiver (easily installed in automatic door operator cabinets),...
Antaira Technologies is a global developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the LMP-2004G-SFP and LMX-2004G-SFP series. Antaira Technologies’ LMP-2004G-SFP and LMX-2004G-SFP series are industrial-grade equipment that is Ethernet ready to fulfill various markets’ edge-level networking applica...
ThreatQuotient™, a security operations platform innovator, announces new partnerships with global distributors Ectacom, Nihon Cornet and StarLink. Following international expansions into Central Europe and Australia in 2018, ThreatQuotient’s latest value added distributor (VAD) agreements leverage an extensive network of channel partners and solution providers to broaden the reach of their security operations platform across the Middle East, Asia-Pacific, Japan and China. Additional...
Security-Net, Inc., a network of security system integrators, is welcoming two new members, providing the organization with important geographic reach in the New York, New Jersey and Illinois areas. These two new additions increase Security-Net’s membership to twenty. New members include FE Moran Security Solutions, headquartered in Champaign, Illinois and Care Security Systems, based out of New York City. Their addition to Security-Net will bring extensive expertise in a diverse array of...
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announces that it is partnering with Cylance, a business unit of BlackBerry, Limited, to bring AI-based antivirus protection to its appliances customers. Through this partnership, Genetec will offer additional cyber security protection to its Streamvault™ family of infrastructure solutions by including CylancePROTECT out-of-the-box at no additional cost to its customers. Predictive security technology Cyber security is at the core of our development process and we see that cyberthreats are evolving faster" Genetec Streamvault™ all-in-one and rackmount appliances, storage, and workstations are expected to be shipped pre-installed and optimized with CylancePROTECT in September 2019. “Genetec is committed to creating secure solutions from the ground up and have practices in place to help identify and mitigate risk for our customers. Cyber security is at the core of our development process and we see that cyberthreats are evolving faster than ever. With CylancePROTECT, Genetec is delivering the latest in prevention-first, predictive security technology to Streamvault customers and providing them with up-to-date protection, without compromising appliances guaranteed performance,” said Francis Lachance, Director, Video and Appliances at Genetec. Additional security controls CylancePROTECT protects endpoints and organizations from compromise by combining the power of artificial intelligence to block malware infections with additional security controls that safeguard against script-based, file-less memory, and external device-based attacks. The software delivers prevention against common and unknown threats without an internet connection Unlike traditional endpoint security products that rely on signatures and behavior analysis to detect threats in the environment, CylancePROTECT uses machine learning, not signatures, to identify and block known and unknown malware from running on endpoints. The software delivers prevention against common and unknown (zero-day) threats without an internet connection. It continuously protects an endpoint without disrupting the end-user and provides minimal impact on system resources. Physical security industry “For years, traditional antivirus prevention products relied on signatures as their primary threat protection method. Assuming all attacks on a business had been seen before, using signatures made sense. However, today, malware mutates daily, even hourly, making signature-based prevention tools obsolete. In mission-critical industries, such as the physical security industry, organizations need to think beyond traditional antivirus. We are pleased to partner with Genetec as we share the same passion for protecting our customers against cyber-attacks,” said Steve Rossi, Global Director of OEM sales at Cylance. Because it uses very little computing power, CylancePROTECT will not affect the smooth running of Genetec appliances, allowing customers to benefit from proactive threat detection without monopolizing crucial resources. In addition, with no Internet connection or signature updates required, CylancePROTECT will protect remote endpoints connected to the Genetec system.
Marking its European debut, Northrop Grumman Corporation’s Firebird product line will be showcased at the Royal International Air Tattoo at RAF Fairford, in the United Kingdom, July 19-21. The company is also announcing signed agreements with Tenax Aerospace and Grand Sky Development Company, LLC (‘Grand Sky’) for rights to purchase Firebird, the company’s new, optionally piloted intelligence, surveillance, and reconnaissance (ISR) aircraft system. Unmanned aerial vehicle Firebird is designed to deliver critical ISR capability to meet customer mission needs “Flexibility, whether in cockpit configuration, payloads, or in owning and purchasing Firebird, is at the core of what makes this aircraft such an attractive ISR option for government partners and private industry,” said Brian Chappel, vice president, autonomous systems, Northrop Grumman. “Having flown over two dozen sensors on Firebird’s proven architecture, we are ready to offer Firebird to a wide range of nations, U.S. government and civilian agencies, and businesses with critical data collection needs.” Northrop Grumman’s Firebird product line delivers medium altitude, long endurance multi-mission flexibility and an unbeatable value. Available in manned, autonomous and optionally piloted configurations, Firebird is designed to deliver critical ISR capability to meet customer mission needs. Grand Sky is the nation’s first commercial unmanned aerial vehicle testing and training center. Located in Grand Forks, North Dakota, Grand Sky is home to one of Northrop Grumman’s North Dakota locations. Meeting critical information Tenax Aerospace is a provider of special mission aircraft and related aviation services to the U.S. government and commercial customers. Both companies see Firebird as meeting critical information gaps for their businesses. “We are excited to bring Firebird to Grand Sky and to utilize its long-endurance and variable payload capabilities for commercial customers. Our goal is to support energy infrastructure monitoring and humanitarian and disaster relief operations by leveraging Firebird’s range, altitude and endurance,” said Thomas Swoyer Jr., president and partner with Grand Sky. “We see the incredible efficiencies to be gained in the market with technology like Firebird, enabling affordable data gathering on a scale not previously available to the commercial market space.” Extremely affordable price Firebird provides a unique flexibility and responsiveness that we feel is essential for the critical missions" “Firebird allows Tenax Aerospace to bring industry leading adaptability and flexibility in data collection at an extremely affordable price point to meet the needs of our sophisticated U.S. government and global security customers,” said Tom Foley, chairman, Tenax Aerospace. “Firebird provides a unique flexibility and responsiveness that we feel is essential for the critical missions we support today and in the future.” Firebird is equipped with wide band Line-of-Sight (LoS) and/or Beyond-Line-of-Sight (BLoS) data links, onboard storage and accessible processing for rapid data exploitation to ensure timely completion of missions for industry and government customers. Tailored mission suitability The system’s unique design allows sensors to be changed rapidly as plug-and-play devices, reducing first time payload integration time from months to days and enabling rapid field changes in less than an hour to increase operational availability and tailored mission suitability. Firebird delivers 30-plus hours of endurance and up to 25,000 feet, providing customers near real-time actionable intelligence. Northrop Grumman is a global security company providing innovative systems, products and solutions in autonomous systems, cyber, C4ISR, space, strike, and logistics and modernization to customers worldwide.
FlytBase, Inc., an enterprise drone automation company, releases a white paper highlighting the factors critical to large-sale deployment of autonomous drones for security and surveillance applications. The journey from the ‘early adopter’ phase to the ‘early majority’ phase of the adoption curve for drone deployments in industrial & commercial security will require: a) reliable, off-the-shelf hardware b) cloud-based, hardware-agnostic software, and c) faster time-to-value, driven by low capex and seamless integration. Security and surveillance Unmanned aerial vehicles (UAVs) can be deployed in a multitude of 24/7 security and surveillance use-casesUnmanned aerial vehicles (UAVs) can be deployed in a multitude of 24/7 security and surveillance use-cases - the pace of which is determined by the intensity of user/customer pain points - such as high turnover of security guards, operations at night and in hostile scenarios, surveillance of hard-to-reach locations, liabilities associated with human and helicopter patrols, CCTV blind spots, need for real-time situational awareness in emergencies, etc. The time for aerial security is now ripe because the prosumer drone market has matured so rapidly in the last few years that commercial-off-the-shelf drones can be used commercially, instead of (expensive, monolithic, low reliability) custom drones, in all but the most demanding security and surveillance use-cases. Real-Time incident response Nitin Gupta, FlytBase CEO, commented, “The physical security market is primed for drone automation and scaling - the time, cost and safety benefits of autonomous drone fleets can create significant business value for this industry.” “Drone patrols will augment human guards and enable security agencies, risk managers, security directors, system integrators and other stakeholders to make faster, better decisions for real-time incident response, remote security operations, event management, disaster response and more.”
According to Ms Regina Tsai, the Deputy General Manager of Messe Frankfurt New Era Business Media Ltd, the key for exhibitors is to tap into the diverse pool of trade visitors that will be filtering through the halls of the fair next month: “As Vietnam’s largest business platform for safety, security, fire and smart building products, the fair is able to attract the right mix of decision makers and purchasing managers from across the region’s growing vertical markets. From the standpoint of exhibitors, the fair is an ideal place to showcase new solutions.” She added: “We are delighted to be setting a new record for exhibitor participation and we are looking forward to hosting a productive three days of business at next month’s show.” Another strong turnout Last year, the fair achieved its highest ever visitor turnout as over 13,800 buyers journeyed to the show Last year, the fair achieved its highest ever visitor turnout as over 13,800 buyers (2017: 12,097) journeyed to the show. Thanks to this year’s uptick in exhibitor numbers, fair organizers are anticipating another strong turnout from channel players, including distributors, systems integrators and end users from factories, industrial zones, hotels and construction projects. Exhibitors will hail from 21 countries and regions, including industry pioneers in their respective fields such as Avigilon, Bosch, Hanwha Techwin, Hitron, KPS, LILIN, PHUC BINH, Nha An Toan (a distributor of Hikvision and ABB products), and ZKTeco. Strong distribution channels Algatec, a renowned brand name in the global security lock sector, after exhibiting consecutively at Secutech Vietnam for seven years, commented that, “Secutech Vietnam has always been an effective platform for us to network and interact with our local channel partners as well as industry players from surrounding countries. Through the show, we can showcase our products and develop our presence in this region. This will eventually enable us to build strong distribution channels,” said Ms Shirley Ng from the company’s sales and marketing division. Secutech Vietnam this year, held concurrently with SMAbuilding, will bring together best-in-industry systems and solutions, including product categories from surveillance cameras and video analytics software to access control and management platforms. For added value, and to meet demands from the smart factory and smart building sectors, the solutions not only focus on security, but also management efficiency and energy savings. Smart factory sectors Fire and Safety Vietnam will return at the fair for its 12th edition While the smart building and smart factory sectors are recurring themes at the show, the fair will also provide coverage to the smart city, smart transportation and smart hotel sectors. The Singapore Pavilion will accommodate leading-edge suppliers in the shape of Kedacom, Force21, Multron, Servo Dynamic, Worldtags, Ubergard and Teleradio, who will showcase a variety of network cameras, management platforms, RFID products, biometric solutions and more. With support from the Fire Department, Ministry of Public Security, Fire and Safety Vietnam will return at the fair for its 12th edition. A supplier of specialist rescue and fire fighting equipment, Pacific and Fire AEC, will be exhibiting at the event following a successful first participation in 2018. “At last year’s show, we gathered more than 100 relevant contacts from sectors such as public and industrial safety as well as fire rescue,” said Mr Dirk Bloxham, the Managing Director of the company. Firefighting equipment “This helped us to develop additional sales channels for our fire hoses, fire nozzles and firefighting equipment. We take a long-term approach to building relationships with dealers and end users from Southeast Asia. The relationship building process will begin again at the upcoming edition of Secutech Vietnam.” The company will be exhibiting alongside D&C Vina, Funayama, Himax, Masflow, Naffco, Nittan, Secom, Sffeco, Yun Yang, VT Plus, Quoc Nam and many more. Besides rescue and firefighting equipment, trade visitors will also be able to locate extinguishing systems, alarms, valves, personal protection equipment (masks, specialist clothing, and gloves), CPR solutions, and fire dust detection systems at the event. Making a welcome debut will be the NFES Japan Fire Pavilion, while the Korea Fire Institute will also be represented at a dedicated pavilion. There will also be a fire truck display from VT Plus, and a rescue boat showcased by local company Tan Vien Dong.
ONVIF®, the standardization initiative for IP-based physical security products, hosted its 20th ONVIF Developers’ Plugfest in early June in Tokyo, a milestone that emphasises the continued growth and demand for interoperable solutions. Developers and engineers from 22 ONVIF member companies gathered at the three-day event to test their implementations of ONVIF Profiles with other ONVIF Profile-conformant products. Developers can test their products independently for profile conformance, as well as test for interoperability between their devices and those from other manufacturers. Changing market needs With 47 members testing their implementations of the six ONVIF profiles, attendees logged nearly 250 hours of testing. In addition to Profile interoperability tests, all ONVIF clients had the opportunity to test using the ONVIF Device/Client Test Tool. From there, attendees were able to discuss with Test Tool developers any issues that arose during conformance testing. “The continued level of engagement from our member companies at what is now our 20th Developers’ Plugfest showcases the importance of interoperability to the industry at large,” said Per Björkdahl, chair of the ONVIF Steering Committee. “As new profiles are developed to meet changing market needs, it is more important than ever for companies to collaborate and exchange ideas to create the best new conformant technologies possible.” Physical security products ONVIF Developers’ Plugfests are held twice each year around the world to enable the global ONVIF membership to gather for testing of their implementations. The next Developers’ Plugfest is scheduled to be held in November 2019 in Rome, Italy. Founded in 2008, ONVIF is a well-recognized industry forum driving interoperability for IP-based physical security products. The organization has a global member base of established camera, video management system and access control companies and more than 13,000 profile conformant products. ONVIF offers Profile S for basic streaming video; Profile G for edge storage and retrieval; Profile C for door control and event management; Profile Q for quick installation, Profile A for access control configuration and Profile T for advanced video streaming. ONVIF continues to work with its members to expand the number of IP interoperability solutions ONVIF conformant products can provide.
Cobalt Robotics is a physical security service provider that builds indoor autonomous robots to make security and facility operations more effective. The company announces that it has raised $35 million in Series B financing. The financing was led by global technology investment firm, Coatue, and is intended for geographic expansion of services throughout the domestic United States. “Security is fundamentally about trust and reputation, and it needs to be reinforced across all aspects of the company: founders, employees, technology, and financial backers. Our financial backers—such as Bloomberg Beta, Sequoia Capital, and now Coatue—have been instrumental to our success so far, and they will be instrumental in our next phase of growth too,” said Dr. Travis Deyle, Cobalt CEO. Enhance security programs The physical security market is predicted to reach nearly $119.4 billion in 2023 “Our goal is to combine the best parts of machines (unwavering attention, perfect recall, and super-human sensing) with the best aspects of people (warmth, responsiveness, and adaptability) to create service robots that dramatically improve the quality of life for everyone and fundamentally redefine the modern workplace.” The physical security market is predicted to reach nearly $119.4 billion in 2023. Security robots are an innovative new tool within the industry that enhance security programs by bridging the gap between traditional technologies and services such as cameras, access control, and manned guards. Cobalt’s Robots-as-a-Service model combines autonomous patrolling robots with human specialists, enabling organizations to provide a 24-hour security solution that complements existing security assets like manned security guards and access control systems (ACS). The result is a highly effective security program with significant cost-savings and robots that remain up-to-date with the latest and greatest software. New door integration Since its $13 million Series A funding announcement in March 2018, Cobalt has deployed security and facilities management services to clients in various sectors (technology, defense, finance, and manufacturing) across a variety of organizational sizes (small startups to marquee Fortune 50 companies). This year, Cobalt introduced its new door integration capability that enables robots to seamlessly pass through areas closed off by a door using wireless technology to communicate with access control readers—a first for the industry. In addition to its client base, Cobalt has expanded its engineering and operations teams and enhanced its security and facilities teams, bringing its unparalleled customer service and performance to new markets. Today’s organizations face several physical security challenges—cost-effectively protecting people, assets and intellectual property while ensuring the seamless flow of operations. Trained remote personnel We believe Cobalt’s robotic security guards are revolutionizing the security services space" Cobalt combines its autonomous mobile robots with highly trained remote personnel to provide a new level of situational awareness and real-time response. Cobalt’s robots patrol the workplace, leveraging AI to detect anomalies—open doors, environmental risks or malicious intruders—and then Cobalt’s security specialists can respond in real-time to address any event—whether it’s related to security, facilities or customer service. This unique human-in-the-loop model has enabled Cobalt to position itself as a key player in the physical security arena. “We believe Cobalt’s robotic security guards are revolutionizing the security services space and providing an unmatched experience for customers,” said Kris Fredrickson, Partner at Coatue. “In addition, we have been thoroughly impressed with the team’s philosophy that a great physical security service should positively impact not only the company’s operations but its culture as a whole.”
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organization's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organizations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realizing it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyze a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analog technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organization open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organization is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organization is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organizations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
Edge devices (and edge computing) are the future. Although, this does seem a little cliché, it is the truth. The edge computing industry is growing as quickly as technology can support it and it looks like we will need it to. IoT Global Market The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 according to a recent Forbes article titled, “10 Charts That Will Challenge Your Perspective of IoT’s growth”. IoT devices are not the only edge devices we have to deal with as the total number of connected edge devices includes the likes of devices like security devices, phones, sensors, retail sales devices, and industrial and home automation devices. The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 The sheer number of devices begins to bring thoughts of possible security and bandwidth implications into perspective. The amount of data that will need to be passed and processed with all of these devices will be massive. There needs to be consideration taken by all business owners and automation engineers into how this amount of data and processing will be conducted. Ever-Expanding Edge Devices Market As the number of edge devices in the marketplace and their use among consumers and businesses rises, the need to be able to handle the data from all of these devices is no longer going to be suitable for central server architectures. We are talking about hundreds of billions and even trillions of devices. According to IHS Markit researchers’ study, there were 245 million CCTV cameras worldwide. One has to imagine there are at least 25% of that many access control devices (61.25 million devices) based on a $344 million market cap also calculated by IHS Markit’s researchers. If all the other edge devices mentioned earlier are considered then one can see that trying to route them all through servers for processing is going to start to become difficult if it hasn’t already, -which arguably it already has, as is evidenced by the popularity of cloud-based solutions amongst those businesses that already use a lot of edge devices or are processing a lot of information on a constant basis. Cloud Computing The question is whether cloud computing the most effective and efficient solution as the IoT industry grows The question is this; is cloud computing the most effective and efficient solution as the IoT industry grows and the amount of edge devices becomes so numerous? My belief is that it is not. Taking the example of a $399 USD device that is just larger than the size of a pack of cards and runs a CPU benchmarked at the same level as a mid-size desktop. This device has 8GB RAM and 64GB EMMC built-in and a GPU that can comfortably support a 4K signal at 60Hz with support for NVMe SSDs for add-on storage. This would have been unbelievable five years ago. As the price of edge computing goes down, which it has done in a dramatic way over the last 10 years (as can be seen with my recent purchase), the price to maintain a central server that can perform the processing required for all of the new devices being introduced to the world (due to the low cost of entry for edge device manufacturers) becomes more expensive. This introduces the guarantee that there will be a point where it will be less expensive for businesses, and consumers alike, to do the bulk of their processing at the edge as opposed to in central server architectures. Cloud computing is now being overtaken by edge computing, the method of processing data at the edge of the network in the devices themselves Edge Computing There are a plethora of articles discussing and detailing the opposition between the two sides of the computing technology coin, cloud computing and edge computing. The gist of it is that “cloud computing” was the hot new buzzword three years ago and is now being overtaken by “edge computing.” The truth is that cloud computing is a central server architecture hosted at someone else’s location. Edge computing is going to be a necessary development in the technology industry Edge computing is the method of processing data at the edge of the network (in the devices themselves) and allowing for less resources required at a central location. There is certainly a use case for both, however the shift to edge computing amongst the general public and small to mid-sized businesses will not be a surprise to those players, who have been paying attention. One article titled, “Next Big Thing In Cloud Computing Puts Amazon And Its Peers On The Edge” by Investor’s Business Daily takes the stance that edge computing is going to completely displace centralized cloud computing and even coins the phrase, “Cloud computing, decentralized” to explain edge computing. It speaks for the stance that most experts in technology seem to be taking, including Amazon Web Services’ VP of Technology, Marco Argenti according to the same article. We know that edge computing is going to be a necessary development in the technology industry, and it is happening as I write this, and quickly at that. Cost Efficiency Of Edge Processing As time goes on, the intersection between the prices of network bandwidth, edge processing and maintaining super powerful central servers will cause edge processing to be the most efficient and cost-effective way to maintain a scalable network in any environment, including datacenters. Owning a central server or utilizing edge computing become the better options As it currently stands, most residential users can only achieve a 1Gbps WAN (internet) connection, and small to medium-sized business can’t get much more but seem to get much less, based on my personal experience. When more than 1Gbps needs to be processed, cloud computing becomes very expensive at which point, owning a central server or utilizing edge computing become the better options. Then you look a total cost of ownership and when the cost of edge computing is less expensive than the cost of maintaining central server architectures, edge computing becomes the single best option. So, I’ll say it again, edge devices (and edge computing) are the future.
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant Public Safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive Risk Reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising Detection Systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organizations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organizations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber Risk Profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualizations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent Applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter Intrusion Detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security Ecosystem Members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritize communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realized. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
Panasonic is selling off 80% of its video surveillance business to a private equity firm but will retain 20%, and the new company will continue to use the well-known Panasonic brand. The move is aimed at reinvigorating a business challenged by new competition from large Chinese companies and lower prices of video surveillance equipment. Strategic business alliances Panasonic is establishing a new company made up of its security systems business, and Polaris Capital Group Co. will acquire 80% of the outstanding shares of the new company. The decision was approved by the board of directors on May 31, and the transaction is expected to be completed by Oct. 1.The new company’s security cameras and software will be sold under the Panasonic brand Polaris has experience in strategic capital alliances with manufacturers and large-scale companies. Based on that experience, Polaris expects to smoothly and rapidly build the structure necessary for an independent business while preserving the strengths and unique characteristics of the business. The goal is to 'maximize corporate value as an independent company toward IPO (initial public offering) in the future.' Panasonic brand name to continue The new company – named Panasonic i-PRO Sensing Solutions Co., Ltd. – will encompass the Panasonic Connected Solutions Company’s Security Systems Business Division and the industrial and medical vision compact camera R&D department of its Innovation Center. The Public Safety sales and development functions of Panasonic System Solutions Company of North America (PSSNA), and the security camera manufacturing factory in China – Panasonic System Networks Suzhou Co., Ltd. (PSNS) – will become subsidiaries of the new company. Polaris expects to smoothly and rapidly build the structure necessary for an independent business After establishment, the new company’s security cameras and software will be sold under the Panasonic brand. Sales will be handled directly by the new company in the U.S. market; through Panasonic System Solutions Japan Co., Ltd. (PSSJ) in the Japanese domestic market; and through existing Panasonic sales companies in other regions including Europe, China, Southeast Asia, Oceania and Canada, which will all sign sales agreements with the new company. Future outlook An announcement from Panasonic details plans for the new company: “It will build on the strengths of the Division while benefitting from management and resources of Polaris to seamlessly implement the necessary structure to operate as an independent organization. Strengthening its solutions capabilities with proactive alliances and M&As, the new company will aim to enhance its revenue and profitability globally centered on the North American market. With new and next-generation products and services, and a strategic growth plan to expand sales of medical camera modules, the new company will build a solid foundation as an independent entity.” The core business of video surveillance equipment is more competitive than eveThe Security Systems Business Division of Panasonic has a roughly 60-year history of developing security cameras and advanced edge devices and combining these with unique software such as facial recognition to meet the needs of the market. It has established itself as a top brand. Effect on U.S. market Panasonic in the U.S. broadened its business approach to increase systems sales with the acquisition of Houston, Texas-based Video Insight in 2015. The developer of video management software especially helped to boost business opportunities in the education market in North America. More recently, Panasonic has sought to differentiate itself with an emphasis on R&D and new product developments, including artificial intelligence. Last year, the company highlighted its FacePro deep learning facial recognition system using extreme sensing and enhanced detection technology to identify persons of interest and alert authorities of their presence in real-time. Developments in the offing The Security Systems Business Division of Panasonic has a roughly 60-year history of developing security camerasIn the near future, Panasonic is also looking to apply AI-based capabilities to vehicle recognition, with the ability to identify vehicle characteristics such as color, type of vehicle and direction of travel. On the VMS side, Panasonic announced last year its intent to transition its Video Insight software to a modular approach, tailoring solutions for a growing range of vertical markets, such as transportation and retail, all using “plug-ins” that enhance operation of Video Insight software. No additional license fees are involved. Still, the core business of video surveillance equipment is more competitive than ever. As Panasonic looks to regain its former dominance, it will face an uphill battle. A sharper focus and new management, resulting from the acquisition, may help to turn the tides.
Attendees strolling the exhibit hall at IFSEC International, 18-20 June, 2019, at ExCel London, will be hearing a lot about artificial intelligence, convergence and GDPR. These industry hot topics are representative of major trends in the industry, from new technologies to new ways of designing systems to new privacy requirements. The education sessions at IFSEC International will also address these timely subjects – and provide a welcome chance to sit down and consider the ‘bigger picture.’ Here are some sessions to consider: Artificial Intelligence The session will examine the ‘connectionism’ aspect of AI with reference to machine learning and neural networks A session on artificial intelligence asks: ‘Will AI change the face of the Electronic Security Industry?’ The session will examine the ‘connectionism’ aspect of AI with reference to machine learning and neural networks. Connectionism, or neuronlike computing, developed out of our understanding of how the human brain works at the neural level. Each neuron in the brain is akin to a simple digital processor, and the brain as a whole is like a computing machine. Has the time come for artificial intelligence and machine learning for security? That’s the focus of another session that will explore where AI is headed and if it can help move security practice from prevention to real-time threat detection. Is AI a technology looking for a problem to solve? Is it mature enough for mainstream usage in security scenarios? Does AI present a ‘double-edged risk’ (i.e., because enterprises and attackers have access to the same tools)? Convergence A combined security approach – unifying physical security and cybersecurity – is a real and immediate need in today’s high-risk and high-threat environment. By leveraging disparate sources of data, organizations can effectively manage a situation in real-time without having to go to multiple individual subsystems to get the job done. A panel session at IFSEC will discuss the concept, reality, and evolution of both physical and cybersecurity teams collaborating in the same Security Operations Centre. Here are some other sessions related to convergence of physical and cybersecurity: How converged security centers respond in real-time to physical and online threats How converged technologies ease prevention and response to unauthorized physical/logical access to corporate facilities and networks How chief security officers can benefit from data analytics and converged platforms to understand the complex physical and cyber risks posed to transport systems. GDPR Whilst the regulations provide a more comprehensive basis in law for the management of personal data The introduction in 2018 of the EU General Data Protection Regulations (GDPR) and Data Protection Act 2018 have elevated compliance requirements for video surveillance systems. That’s the subject of the session ‘GDPR – Video Surveillance: Balancing Privacy and Security.’ Whilst the regulations provide a more comprehensive basis in law for the management of personal data, they are part of a wider legal consideration for security technologies. Transparency, accountability and impacts on privacy must be actively integrated into security systems from the outset to retain the trust of those they affect. The work of the Information Commissioner (ICO) and the Surveillance Camera Commissioner (SCC) with their respective Codes of Practice provide a bedrock for effective governance. The 2018 Biometrics Strategy for the Home Office and their partners addresses the need for clear and transparent arrangements to ensure risks to privacy are weigh alongside the benefits. The session will examine these complexities and look at what owners and operators of security systems must consider when striving to balance privacy and security.
Cybersecurity has become a major element – and a major source of discussion – in the physical security marketplace as a result of the rise in networked systems. And we may still not be talking enough about cybersecurity. Here is part one of our Cybersecurity series. “Cybersecurity requires everyone in the security industry to be playing offense and defense at the same time, every single day,” says Bill Bozeman, President and CEO of PSA Security Network. “It needs to just become part of the standard conversation when we are talking about physical security because they are so intertwined.” Creating New Industry Leaders Cybersecurity and physical security can be seen as two parts of a single entity, and increasingly the two will be combined at the enterprise level over the next several years. “This convergence of physical security and cybersecurity will create new industry leaders that will emerge to lead a new segment of the combined market through strong investment and leadership,” says Rob Lydic of ISONAS, now part of Allegion. Data capture form to appear here! Cybersecurity issues dominate almost every discussion in today’s physical security industry, and the clear message is that “manufacturers and integrators must continue to create robust and scalable cybersecurity offerings to protect customer data and facilities,” says Lydic. He contends that cloud services providers (such as ISONAS) are more cybersecure and reliable ‘by orders of magnitude’ than non-cloud solutions. Cybersecurity is linked to cloud-based systems and managed security service provider models Cloud-Based Services The Security Industry Association (SIA) has listed cybersecurity as one of 2019’s ‘Top Megatrends’ in the physical security market. SIA says it is important to prioritize cybersecurity among security businesses, for customers’ businesses, and for vendors. The trend calls for continual process improvement and investment. Bill Bozeman of PSA Security Network agrees: “Cybersecurity has definitely taken a strong foothold in the industry.” With the continued expansion of cloud-based services, cybersecurity will be more important than ever to integrators, manufacturers and end users alike, he says. Notably, cybersecurity is directly linked to two other important industry trends listed by Bozeman: cloud-based systems and the rise in recurring monthly revenue (RMR) and managed security service provider (MSSP) models, whose focus will include cybersecurity. Loss Prevention Executives The days when cybersecurity was exclusively the domain of the information technology (IT) department are gone. “Cybercrime is one of the biggest threats organizations of all sizes and types face today,” says Michael Malone, CEO of ADT Cybersecurity (formerly known as Datashield). “Considering the magnitude of these crimes, it now falls on the entire organization, including the traditional security or loss prevention executives, to band together to combat these threats.” Cybercrime is one of the biggest threats organizations of all sizes and types face today Malone favors (and his company offers) a managed detection and response (MDR) service, which combines advanced technology and human analysis. Using packet capture on the network, an MDR analyst can ‘replay’ a cyber security event and dig deeper into the incident and determine remediation steps. It’s an approach that significantly cuts through false positive ‘noise’ so security teams can focus on what matters. Helping Security Officers Interestingly, cybersecurity is poised to benefit from another major trend in the physical security market – the rise of artificial intelligence. Specifically, machine learning applications for cybersecurity include: detecting malicious activity, helping security officers determine what tasks they need to complete in an investigation process, analyzing mobile endpoints, decreasing the number of false positive threats, automating repetitive tasks like interrupting ransomware, and potentially closing some zero-day vulnerabilities. But AI in this case is not a panacea. Christopher McDaniels of Mosaic451 recommends pairing human intellect with machine technology to sort through data faster and catch hackers before they do much damage. See part two of our Cybersecurity series here.
Wintec (The Waikato Institute of Technology), established in 1924 is a major New Zealand Government-funded tertiary institution, which has three Hamilton campuses; a city site overlooking the central business district, Avalon campus on the northern outskirts of the city, and a horticultural campus at Hamilton Gardens. In addition, it has regional operations at Te Kuiti and Thames and also an office in Beijing. The Avalon campus, a ten-minute drive from the city, is home to specialist trades training facilities, a state-of the-art sport and exercise complex and custom designed facilities for the School of International Tourism, Hospitality and Events. The third Hamilton campus, the Horticultural Education Centre, is situated amidst the 58 hectares of Hamilton Gardens. On-Line distance education Wintec’s programs and qualifications are nationally and internationally recognized Wintec is one of the largest institutes of technology in New Zealand, and has more than 35,000 full-time and part-time students, more than 500 full and part time staff and eleven schools within its academic faculty. International enrolments exceed 1000 from 47 countries. A range of student services provide its domestic and international students with a high level of support so they enjoy a positive, safe and secure study experience. Wintec’s programs and qualifications are nationally and internationally recognized and its degrees have equal status to those from universities. The degree programs include Media Arts, Midwifery, Nursing, Occupational Therapy, Early Childhood Education, Business Studies, Engineering, Technology, Information Technology, and Sport and Exercise Science and a wide range of full and part time courses for those already in the workforce. Wintec is also recognized nationally in the delivery of on-line distance education for those unable to attend regular classes for reasons of geographical access or other constraints. Electronically controlled doors Wintec strives for a balance of unobtrusive yet robust control of site activity, essential for maintaining an open campus environment. Shane Goodall, Security Manager at Wintec, describes the approach to security as highly proactive and collaborative: “by focusing on preventing issues arising, we now have a minimal policing role and the crime resolution rate is high”. This environment is underpinned by Gallagher’s security system, a core access control, intruder alarms and integration platform. Wintec first installed the Gallagher system (formerly Cardax FT) in 1999 and has since migrated this legacy system to Gallagher’s latest security technology platform. Security for the entire organization, including satellite sites, is managed and monitored centrally from Wintec’s single Gallagher security system. Since initial installation, Wintec’s Gallagher access control system has grown from 7 to 240 electronically controlled doors in 2009, with another 40 planned - testimony to the scalability and flexibility of the system. Network friendly system communications The organization first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras Wintec has integrated its imaging system to the Gallagher system delivering a visual record which can be matched to the audit trail of events in Gallagher Command Centre software. The organization first installed 6 cameras in 2004 which has increased to 7 DVRs and 85 cameras (both analog and IP). Another compelling aspect of the system for Wintec is the scalability and TCP/IP network friendly system communications. As well as monitoring and controlling staff and student access, equipment including computers, TVs, printers, audio visual resources at Wintec are also monitored through the Gallagher system. The ‘Gallagher Hub’, a new computer laboratory offering comprehensive IT resources is open 24 hours. The Hub contains 125 workstations, and there are plans to extend that number. Active monitoring of equipment though the Gallagher system has significantly reduced theft. Students and staff have scheduled access to shared IT resources, classrooms and lecture theatres. Manage cardholder data ‘Cardholder Import’, an XML Interface, supports the importation of cardholder data including course enrolments from their student record system to Gallagher Command Centre. Shane comments, “Student card issuing is an automated process which is enrollment-driven – a student’s access privileges are assigned according to their enrolled courses.” “To implement this, we defined a rules-based allocation of access groups in the Gallagher system using the XML interface. The interface is ‘live’ so that changes in the student enrolments database are immediately reflected in the Gallagher system. The student’s updated access privileges come into effect without delay.” Staff that interact directly with students are now empowered to manage cardholder data enabling the security team to focus on security. Students and staff utilize Mifare SmartCard functionality extensively, embracing them as an integral multiapplication tool in their modern educational environment – SmartCards are used to issue resources from the library and as pre-stored value cards enabling prepaid printing and photocopying. In the near future they will also be used in Wintec’s Pay and Display car-park and potentially as passes onto city council buses. Electronic access control At Wintec, security is not viewed as a discrete functional activity relegated to security staff only Stewart Brougham, Director of Internationalisation at Wintec, says students have given very positive feedback about their ID cards. In particular, the ability to verify the identity of staff members from their ID access cards provides peace of mind for students. The end result is a people-friendly campus. Future enhancements of Wintec’s security may include the utilization of the CommCard solution from Gallagher to manage and monitor access to student accommodation. CommCard is a unique high level integration between the Gallagher Command Centre software and Salto off-line readers, delivering offline, non-monitored electronic access control for lower security doors. An overriding philosophy of collaboration has seen Wintec take a lateral approach to security, the value of which many organizations have yet to realize. At Wintec, security is not viewed as a discrete functional activity relegated to security staff only. The ongoing management of security is a joint effort between the security services team and the information services team. Increasing operational security The security services team manages the Gallagher system while IT looks after back end functions such as installation on the network and backup. Wintec has leveraged the convergence of security (access control) and other operational business functions recognizing the tremendous potential for reducing risk and increasing operational security, safety, performance and efficiency. Looking beyond simply controlling and monitoring who goes where and when on site, Wintec is harnessing the reporting capabilities of Gallagher Command Centre to meet regulatory requirements. The Gallagher system enables the institution to report on actual space utilization (not just space booking). Decisions are made for best use, and also to substantiate funding, based on these reports. “The key to space utilization reporting are the frequency of reporting and the integrity and reliability of information,” states Stewart Brougham. It’s a national issue for educational institutes in New Zealand. Extending external partnerships “For Wintec, reporting is about ensuring compliance with regulatory requirements and is also a staff time management issue – reducing the administration load on lecturers, who would otherwise have to track student attendance manually.” Brian Fleming, Director of Gallagher Channel Partner, Concord Technologies, sites this lateral application of a security system as key to maximizing the value of Gallagher to Wintec. Wintec has a strong relationship with Gallagher in the ongoing development of its technologies This collaborative philosophy extends to proactive external partnerships with their Gallagher Channel Partner, Concord Technologies, for the installation and maintenance of the Gallagher system, and with system designer and manufacturer, Gallagher. Having signed an agreement to continue in the capacity of a Gallagher field test site, Wintec has a strong relationship with Gallagher in the ongoing development of its technologies. Wintec’s success, in the last 5 years, as a test site reflects the competence of both its IT and security staff and the institute’s commitment to edge student services. Minimal training has been required. Software maintenance agreement There is open communication and information sharing between all internal and external parties involved, which means any issues that arise can be quickly addressed. Wintec has committed to a site maintenance plan with their security partner, Concord Technologies. The plan incorporates both software and hardware maintenance to ensure the system is maintained on the latest operating platforms within a known cost structure. A Software Maintenance Agreement also ensures enhanced ongoing system performance and reliability of the Gallagher system. Acknowledgements Gallagher would like to acknowledge the support of Wintec and security partner, Concord, with the development of this in-site study. Gallagher would also like to particularly acknowledge and thank Shane Goodall for the pivotal role he plays in championing the collaboration of these parties and for his outstanding support of the Northern Region Cardax User Group (NZ) in the capacity of Chairman of the group.
With the ability to power over 590,000 UK homes from a total capacity of 660 MW, Walney Extension is set to be the biggest offshore wind farm in the world when it is commissioned at the end of 2018. The new onshore substation covers an area of reclaimed marsh land and required an innovative perimeter and internal fencing package to be designed to offer the highest levels in security and electrical safety. Design work started in 2017 and looked at how existing fencing systems could be used to create a bespoke solution. Challenges faced by utilities industry Protecting critical national infrastructure in the utilities industry presents a number of challenges: External perimeter to offer guaranteed delay against attack All fencing to be earthed or offer non-conductive features Internal fencing to include multiple systems including rigid mesh and GRP in same fence line External perimeter and access control to be compatible with monitored pulse fencing (electric fencing) to meet security requirements Internal fencing to be base plated Prevention of unauthorized access The substation installed five systems in total from the CLD Fencing Systems range of rigid mesh fencing and security gate solutions and combined this with a Gallagher Monitored Pulse Fence to add an extra layer of security to the site. The Gallagher solution provides reliable detection and prevention of unauthorized access to the site, protecting the public from accidental or intentional entry to the site. The solution ensures operational continuity, avoiding significant costs associated with loss of supply, while protecting the site's assets from theft and damage. The system has been so successful that they want to use the same solution for all its electrical substations.
The FeeMaster Smart Console from people and vehicle access control specialist Nortech provides a simple and cost-effective way of managing access to car parks and facilities for vehicles and pedestrians. All the access control data is encoded onto a Mifare card using the FeeMaster Smart Console. As a standalone system, there is no wiring between the access control point and the console, making it easy and cost effective to install. Parking management system The console can print customer receipts and/or barcode exit tokens Part of the popular FeeMaster range, the FeeMaster Smart attendant console is a compact, elegant and easy-to-install device that reads barcode tickets issued at an entry station, calculates the fees payable based on pre-programmed tariff details, and encodes reusable Mifare access control cards with validity data. If necessary, the console can print customer receipts and/or barcode exit tokens. It is also able to control a till drawer and can optionally provide a relay output signal which can be used by third equipment i.e. barrier control whenever a card has been encoded or an exit ticket printed. The FeeMaster Smart time-based parking management system is designed to provide information about the initial arrival time of each visitor and uses cards to strictly control customers’ access rights to car parks and facilities as well as the validity period. Fee calculation system Popular applications that have used the FeeMaster attendant’s console to control visitor access include Bristol Aquarium and Edinburgh Castle, where an easy to install and operate and an automatic fee calculation system with tariff and grace period settings included was required. Bristol Aquarium required a cost-effective and efficient product that would not only save money but would also make the constant stream of visitors easy to monitor. The barcode reader connects to a barrier/turnstile/gate at each site and opens once a valid barcode has been scanned by a visitor using easy to program modes of operation. New security products Nortech has supplied products and solutions to the security industry for over 25 years The simple to use design makes the console ideal for reducing queues and keeping the flow of people moving during busy periods, is extremely versatile and can simultaneously support several methods of revenue generation. Edinburgh Castle has been benefiting from the FeeMaster system for a number of years, using it to control and manage the strict parking at its site. The console allows the staff to control any misuse of the car park and ensures that there are enough parking spaces without the need for expensive cabling or disruption. Nortech has supplied products and solutions to the security industry for over 25 years as an independent British company. The company uses extensive experience and expertise to create new security products to fit their clients’ needs and designs everything with the customer in mind.
Avigilon Corporation (“Avigilon”), a Motorola Solutions company, announced it was selected to help protect the security of Independent Express Cargo Ltd. (“Independent Express Cargo”) in Dublin, Ireland. Independent Express Cargo is one of Ireland’s largest pallet delivery operators, serving as a national transport network hub and full third-party logistics supplier with 25 depots across the country and over 1,000 active clients. Avigilon Control Center VMS To improve security throughout its Dublin site, which consists of 180,000 square feet of warehouses on a nine-acre site, Independent Express Cargo worked with integrator Usee.ie to install a complete Avigilon security solution. The new system features Avigilon Control Center (ACC) video management software, which provides security operators with a more efficient way to manage video from a central location. ACC software also includes advanced artificial intelligence (AI) and video analytics capabilities ACC software also includes advanced artificial intelligence (AI) and video analytics capabilities, including Avigilon Appearance Search and Unusual Motion Detection technologies. Additionally, a combination of Avigilon cameras — including the H4 Pro, the H4 Multi-sensor and the H4A Bullet with self-learning video analytics — were deployed to achieve optimal coverage while allowing security operators to leverage the benefits of real-time analytics. Incorporating advanced AI technologies By implementing a complete Avigilon security solution that leverages advanced AI technologies, Independent Express Cargo has seen an increase in operational efficiencies and improved security of its sites, assets and resources. “With complete security solutions from Avigilon, we have been able to increase the speed at which we can detect events across our sites,” said Owen Cooke, director of Independent Express Cargo. “In the fast-paced environment of transportation logistics, this has dramatically increased efficiencies so that we can continue to focus on our number-one priority: our customers.” Intelligent video security system “Avigilon AI and analytics allow our customers to improve operations while maintaining system flexibility and ease of use,” said Bernard Pender, chief executive officer of Usee.ie. “Choosing Avigilon helps us meet our client’s goal of deploying a highly intelligent and user-friendly video security system.”
PotashCorp is the world’s largest fertilizer company by volume. They have facilities and business interests in seven countries and are dedicated to the challenges of feeding the world’s growing population. PotashCorp produces three primary crop nutrients – potash, phosphate, and nitrogen. Recognized as the world’s leading potash producer, they are responsible for 20 percent of the global capacity. Their facility in Lima, Ohio is one of four locations whose primary function is to create a range of products including ammonia, urea, nitric acid, and nitrogen solutions. Safety is PotashCorp’s number one priority, and this is evident in the number of awards they’ve received. Management are committed to providing a healthy work environment where employees have a strong personal safety ethic, rooted in awareness and focused on incident prevention. Implementing a cost-Effective solution We found that no other product could compare to Gallagher – its feature set, open API, competencies, and price"Security concerns and the need to implement a more cost-effective solution led PotashCorp to discover Gallagher. “We were looking for a system that would allow for seamless integration. After thorough research, we found that no other product could compare to Gallagher – its feature set, open Application Programming Interfaced (API), competencies, and price. The choice was easy,” says Jeff Johnston, Network Administrator for PotashCorp. “The cost of the product along with its capabilities is incomparable in the market.” It made sense for PotashCorp to replace their entire security system rather than updating an outdated and deteriorating system. Safe and secure working environment Driven to providing a best-in-class, safe, and secure working environment, PotashCorp partnered with the Digital C.O.P.S. Division of Perry proTECH, a business technology solutions company, and Gallagher, to develop a customized security solution. The system needed to be fully integrated, scalable and expandable, digitally based, and user-friendly. Benefits of PotashCorp’s new security solution include: Video integration, for safety precautions and oversight Wireless lock integration, utilizing Salto locks out in the field on network cabinets User-friendly report generation, creating cost and time savings PotashCorp will soon implement Gallagher Mobile Connect, a secure and convenient access solution that allows people to use their smart phone in place of an access card. Greater efficiency in plant turnaround Gallagher Command Centre provides the flexibility to easily add cardholders to the existing databasePotashCorp is required to undertake a plant turnaround every four to five years. A turnaround, or shutdown, is a scheduled period of non-production, during which day-to-day plant operations cease. All focus shifts to maintenance, cleaning, inspection, and repair, with employees and contractors working around the clock preparing the plant to resume its regular operations. Turnarounds are one of the most crucial events in the routine operation of a chemical industrial plant and are extremely costly, due to production time lost, increased labor costs and equipment expenses. Speed and efficiency is vital as the turnaround process has the ability to strongly affect a company’s bottom line. PotashCorp can have an additional one thousand contractors and staff onsite during a turnaround. Gallagher Command Centre provides the flexibility to easily add cardholders to the existing database, while enabling management and video operators to monitor cardholder movement throughout the plant. Executing a timely turnaround that stays within budget makes a huge contribution to the plant’s efficiency and drives the company’s future success. Immediate headcount in event of emergency Mike Resar, PotashCorp’s Safety, Health and Environmental Manager at the Lima site noted, “The safety of our employees and contractors is of the highest concern for us. We are now able to generate muster reports that provide an immediate headcount in the event of an onsite emergency. We can also produce time reports easily and without the need for external programming help.” By upgrading legacy system and performing the interface with Gallagher, PotashCorp realized a $20,000 savingOne of the world’s largest chemical companies and a leading manufacturer of petrochemicals resides on the PotashCorp site and shares several turnstiles. Both companies selected Gallagher, and a system-to-system integration was developed, allowing control of the turnstiles and several doors to be shared between the two companies. Tangible cost savings By upgrading their legacy system and performing the interface with Gallagher, PotashCorp realized an immediate $20,000 saving. As the system expands, the savings have continued. After thoroughly vetting their options, PotashCorp has found that the cost per door will be one-quarter less than that of their previous system. They are still witnessing a substantial return on their investment. With the recent addition of four controllers and twelve readers, selecting Gallagher has saved PotashCorp nearly $70,000. “The open integration, cost savings, and ease of reporting is truly remarkable. The difference and quality of the system is undeniable in comparison to what we had prior to Gallagher Command Centre,” says Jeff.
A multi-division and multi-location conglomerate in Kutch (Gujarat, India), engaged in manufacturing, trading, exporting and supplying a finest assortment of Roofing Accessories Roofing Sheets, Metal Coils, Roofing Accessories, Metal Roofing Sheets, Coated Roofing Sheets and Tiled Sheets for Roofing has trusted Matrix with providing top grade security solutions for its site. Matrix IR bullet cameras and VMS VMS Software with Inbuilt Weighbridge Application Module: SATATYA SAMAS PLT IPC Channel Wise ANPR/LPR License (ANPR1) Cameras installed at the site: 2 MP Varifocal IR Bullet Camera with 2.8-12 mm Lens- SATATYA CIBR20VL12CWS 2 MP Fixed Lens IR Bullet Camera with 3.6 mm Lens- SATATYA CIBR20FL36CWS The company was using conventional Weighbridge system that performed basic functionalities. This traditional system had certain limitations, such as Data spoofing due to manual system Lack of centralized solution for multiple branches Dependency on more than one system Lack of evidence for auditing purpose Matrix Weighbridge integration solution Looking at all the challenges that the company was facing, Matrix offered an optimized solution with Weighbridge Integration. Matrix Weighbridge Integration solution provides the following functionalities: Vehicle Number Snapshot (ANPR) Driver Snapshot (Evidence) Material Snapshot (Auditing) Weighbridge Snapshot (Avoid Data Spoofing) Safeguard Evidence Bookmark Video Recordings Print Evidence Record Periodic Report Generation Benefits Client will be able to track in-bound and out-bound material movement by capturing the details of respective material weight. Enables the client to make easy comparison of weights between supplying plant and receiving plant with the help of captured screenshots. Record weight of the material and then use the data to post good’s receipts, production bookings and dispatch documents, etc. Limits Weighbridge Vendor dependency by providing interoperability without depending much on other APIs.
Round table discussion
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
The ability to treat patients in a secure environment is a base requirement of hospitals and other healthcare facilities. Whether facilities are large or small, security challenges abound, including perimeter security, access control of sensitive areas, video surveillance, and even a long list of cyber-risks. We asked this week’s Expert Panel Roundtable: What are the security challenges of hospitals and the healthcare industry?
Technology advancements often come with new terms and definitions. The language of our marketplace evolves to include new words that describe innovations in the industry. In the skilled hands of marketers, terms intended to be descriptive can also take a new element of ‘buzz,’ often presaging exciting developments that will drive the future. We asked this week’s Expert Panel Roundtable: What new buzzword have you heard, and what does it mean for the industry?