Urban populations are expanding rapidly around the globe, with an expected growth of 1.56 billion by 2040. As the number of people living and working in cities continues to grow, the ability to keep everyone safe is an increasing challenge. However, technology companies are developing products and solutions with these futuristic cities in mind, as the reality is closer than you may think. Solutions that can help to watch over public places and share data insights with city workers and officials...
HiveWatch, a security fusion startup company that uses multi sensor fusion to help companies respond better and effectively to physical security threats, has emerged from stealth and announced a seed funding round led by CrossCut Ventures, with participation from Freestyle and SaaS Ventures. Centralizing event data HiveWatch’s platform pulls data from a company’s disparate monitoring systems and security sensors to provide operators a single-pane-of-glass to evaluate and respond to...
LenelS2 announced a strategic agreement with Bosch Building Technologies to resell Bosch IP cameras in North America and Europe. As a result of the agreement, end-users will have access to the complete Bosch IP camera portfolio through LenelS2’s Value-Added Resellers (VARs). The Bosch IP camera portfolio integrates with all LenelS2™ video management solutions to enhance critical video analytics capabilities that help protect people and assets and optimize building health and efficie...
The Security Industry Association (SIA) has named five young security professionals as the recipients of the 2021 SIA RISE Scholarship, a program offered through SIA’s RISE community, which supports the education and career development goals of young industry talent. Through this scholarship program, open to SIA student members and RISE members who are employees at SIA member companies each awardee will receive a $3,000 scholarship to use toward continuing education and professional devel...
This year has brought about changes in virtually every sector. As with other frontline industries, the security sector has been tested more than those able to move entirely to remote working. While the promise of a vaccine means an end is in sight, the post-COVID era will not bring with it a return to the ‘normal’ we knew before the pandemic. Organizations have adapted, becoming more resilient and agile and this will have lasting effects. The coming months will continue to be testi...
The explosion of artificial intelligence used to enhance business processes, propel innovative products, and further automation has touched essentially every industry to date. The security sector, notable for its maturity and complexity, is not exempt from the AI tidal wave. In fact, quite the opposite, the security sector and more specifically the domain of video surveillance have seen an emergence of AI-powered solutions both hardware and software. The widespread adoption of IP cameras, clou...
The Qatar Emiri Air Force’s NH90 helicopter program marked a major milestone last week with first flights performed in Italy and France. The first NH90 NATO frigate helicopter (NFH), assembled at Leonardo’s Venice Tessera facility, and the first tactical troop transport (TTH) over-land aircraft, assembled at Airbus Helicopters’ Marignane site, took to the air on 15th and 18th of December respectively. The flights allowed crews to evaluate general handling and basic systems and the helicopters performed as expected. NH90 helicopter program Qatar’s NH90 program includes 16 NH90 TTHs for land operations, 12 NH90 NFHs for naval missions, a comprehensive support, maintenance & training services package and associated infrastructure. The program has the potential to be extended in the future with the addition of 6+6 units in a mixture of TTH and NFH variants. Leonardo is prime contractor for the overall program and is also responsible for the final assembly and delivery of the 12 NH90 NFH helicopters from its Venice Tessera facility in Italy. The company is also supplying simulators, training aids and an extensive maintenance support and training services package for aircrews and maintenance technicians. Avionics and sensor payloads integration The NH90 is set to provide the Qatar Ministry of Defense an important and longstanding customer" Leonardo is providing, contributing to or supporting the integration of various avionics and sensor payloads, including the Leonardo LEOSS-T HD electro-optical system, HD Mission Video Recorder, Automatic Identification System, Tactical video link and Full HD display for cabin consoles. Airbus Helicopters is responsible for carrying out the final assembly of the 16 NH90 TTH aircraft. Acceptance of the first batch of NH90s by the Qatar Emiri Air Force is scheduled to start before the end of 2021, with the last helicopter planned to be delivered in 2025. Gian Piero Cutillo, Leonardo Helicopters MD, said “We’re extremely pleased to celebrate this important achievement as we continue to work to deliver this program. The NH90 is set to provide the Qatar Ministry of Defense, an important and longstanding customer, with outstanding operational capabilities suitable for a range of missions.” Cutillo adds, “Together with our industrial partners, we’re committed to completing and introducing this essential defense and security enabler for our customer.” Design and integration of critical NH90 components Leonardo is responsible for, or contributes to, the design, production and integration of a wide range of critical NH90 components and systems. These include the rear fuselage, main gear box hydraulic system, upper modes of the Automatic Flight Control System (AFCS), plant management system, power plant integration, NFH mission system (integrating sonar, radar, electro-optics, tactical link, electronic warfare system, Identification Friend or Foe (IFF) interrogator, mission video recording and weapon systems management, including air-to-surface missiles and torpedoes for Anti-Surface Warfare (ASuW) and Anti-Submarine (ASW) missions. LOAM system and LEOSS-T electro-optical system Leonardo also integrates additional capabilities such as the LOAM system and LEOSS-T electro-optical system Leonardo also integrates additional capabilities such as the Laser Obstacle Avoidance Monitoring (LOAM) system and the LEOSS-T electro-optical system, as well as pintle-mounted gatling-type guns, for specific customers. The largest military helicopter program in Europe, the NH90 is the optimal choice for modern operations thanks to its fully composite airframe with a large cabin, its excellent power-to-weight ratio and its wide range of role equipment. Quadruplex fly-by-wire flight control system It features a quadruplex fly-by-wire flight control system for reduced pilot workload and enhanced flight handling characteristics. The NH90 is available in two main variants: one specified for naval operations, the NH90 NFH (NATO Frigate Helicopter) and the TTH (Tactical Transport Helicopter) for land based operations. As of today, around 430 NH90 helicopters, a mixture of both variants, are in service worldwide. Aircraft on operations have logged over 270,000 flight hours in a wide range of weather and environmental conditions, over land and sea.
Check Point® Software Technologies Ltd., a foremost provider of cyber-security solutions globally, has announced that it has been chosen by NHS National Services Scotland, the publicly funded healthcare service in Scotland to secure and streamline the management of its public cloud data, and provide complete threat prevention for vital public services such as Scotland’s Test & Protect and vaccine management services. About NHS Scotland NHS Scotland provides public health and social care services to the country’s population and has been transitioning healthcare data and services to Microsoft’s Azure public cloud for the past 18 months. The start of the COVID-19 pandemic highlighted the need for security that seamlessly expands on-demand to hyperscale capacity. NHS Scotland’s cloud infrastructure powers the country’s Test & Protect services, which has over a million users, as well as the Protect Scotland proximity app, so it was critical these services were completely secured against threats and attacks. Vaccination management The organization is also developing systems for scheduling and managing Covid-19 vaccinations in Scotland as the vaccines become available. “Check Point’s CloudGuard has been key in enabling us to add new cloud workloads and services without needing to constantly review or deploy new security infrastructure. This means we can focus on the critical public-facing tasks where we can add real value, such as developing and running Scotland’s ‘Test & Protect’ services,” said Deryck Mitchelson, Chief Information Security Officer, NHS Scotland. “Right now, we are building our vaccination management systems, and our cloud-first approach gives us the agility and scalability we need to roll it out nationally while being sure that data and services are secured.” Securing healthcare data and services As it runs multiple essential healthcare systems, NHS Scotland also needs to have full visibility of who is accessing data, where it is being shared, and how it is used to comply with GDPR and national data security legislation. To secure its healthcare data and services to the public cloud, NHS Scotland has implemented: CloudGuard IaaS which delivers the same advanced threat prevention and data security in public clouds as the organization’s on-premises security gateways, through the same management interface Check Point Maestro orchestration delivers the hyperscale features that NHS Scotland requires, enabling it to seamlessly expand the capacity of existing security gateways to meet growing demands Implementing Check Point solutions “Health data is probably Scotland’s most valuable asset, so it’s essential that it remains absolutely secure wherever it is being stored or accessed. We now have much more visibility than we had before we implemented the Check Point solutions,” added Mitchelson. “We can really understand where the data is and who is accessing it, from where, and ensure it is protected at every point of entry.” SIEM solution NHS Scotland also uses a Security information and event management (SIEM) solution. “One of the things I liked with Check Point is its integration with the SIEM vendor we’re working with,” said Mitchelson. “That means that we don’t have to go and actually start writing and creating configurations, it just links to the SIEM system and automatically starts to work, giving us the information, we need in a single console.”
Energy is the pulse of day-to-day life, but the drive for net zero will require a massive change in the way one creates and use it. With new technologies and complex integration needed, it is increasingly clear that there is one important factor in making the future integrated energy systems work: data. That is the thinking behind the 14 January All-Energy/Dcarbonise webinar sponsored by UK Research and Innovation (UKRI) and chaired by Laura Sandys CBE, Chair of the Government’s Energy Data Taskforce and Non-Executive Director, SGN & Energy System Catapult and with an impressive panel of speakers from BEIS, Ofgem, UKRI, Grid Edge and Kaluza. Distributed energy Already, smart technology is entering our homes, and companies are using big data to respond better to consumer preferences. In the new energy future, distributed energy will clearly play a role. People are learning that digital technologies can make distributed energy the cheapest and cleanest form of energy. Local energy systems UKRI’s Prospering from the Energy Revolution program is pioneering the data-enabled systems approach to unlock the benefits of smart local energy systems. These systems improve the efficiency of existing infrastructure, capture value, and provide local jobs, helping to distribute prosperity; while society gains clean, cheap energy delivered in ways that suit modern net zero lives, lived locally. Speakers Dinker Bhardwaj, Head of Data Policy, Smart Energy, Department for Business, Energy and Industrial Strategy (BEIS) Steven Steer, Head of Data, Ofgem Rob Saunders, Challenge Director, Prospering from the Energy Revolution, UKRI Dr. Jim Scott, Co-founder and Chief Product Officer, Grid Edge Valts Grintals, Senior Flexibility Analyst, Kaluza Discussion panel and topics “Having held 26 webinars in a six-month period in 2020, viewed live or on-demand 17,100 times, we are breaking our followers in gently with just one webinar in January,” explained Portfolio and Event Director, Jonathan Heastie of Reed Exhibitions. The session brings together the government, the energy disruptors, and the regulators to discuss: How could better energy data satisfy both households and industry? What policies and regulations are needed to support innovative data-based solutions to provide new services? How can one ensure these innovations benefit diverse consumers, and protect everyone against emerging risks? What data frameworks are needed to enable local infrastructure investment and innovation at scale and pace in different places? Acknowledgment Jonathan Heastie continued, “We are grateful to UKRI for their on-going sponsorship. Their earlier webinar, ‘UKRI’s Road to Net Zero: Investing for Innovation’ held as part of our November All-Energy/Dcarbonise Virtual Summit is available for on-demand viewing.” “We look forward to welcoming their speakers and our audience on 14 January and, in the meantime, wish you all a happy holiday period and hope for some degree of normality to return in the New Year.” “We will be staging All-Energy and the co-located Dcarbonise at Glasgow’s SEC on 18 and 19 August. The Call for Papers is open on the All-Energy website at www.all-energy.co.uk with a closing date of 31 March 2021.”
Paxton has produced a new series of Net2 tutorials to support installers with the latest features in the innovative access control software. The short, informative videos provide guidance on how to make buildings more COVID-secure with Net2. The unprecedented nature of the coronavirus has led many businesses and building developers around the world to consider how people can move safely around their sites and maintain social distance while ensuring their business remains economically productive in the months ahead. In what seems to now be the new normal, varying degrees of social restrictions are likely to remain in place across many countries. Access control role Jonathan Lach, Paxton’s Vice President Sales explains, “We recognize the role that access control has to play in making buildings safer and limiting the spread of the coronavirus.” “As a technology company, we want to provide solutions that address the problems posed by the pandemic and help people to safely return to work.” Since the start of the pandemic, Paxton has introduced several updates to its flagship access control system, Net2. The system is installed globally in a variety of commercial and public sector buildings, as well as critical sites such as schools, hospitals and laboratories. Increase in demand Lach further explains, “Net2 is installed in many different types of buildings around the world. Making those sites safer for people during the pandemic means a lot to our installers and their end-users.” “Because of this, we have seen an increase in demand for contactless and thermal scanning technology. So, we have developed the features of Net2, and created some extra functionality that really does help make a difference.” Tutorial videos To roll out these updates quickly and efficiently, as well as provide simple and useful information for our installers and end-users, Paxton has produced five easy to digest tutorial videos. Each of these videos showcases the new features and the potential to reduce contamination among users on site. Contactless access control: Hygienic access via touchless entry and exit points, moving away from touch-based devices Flexible access permissions: Meeting social distancing guidelines, limiting access to high traffic areas and implementing a one-way flow of movement Occupancy management: Assigning visitors and staff to designated areas and monitoring people numbers with alerts to further support social distancing Thermal scanning: Using thermal cameras to support health and wellbeing in high-security areas and identifying people that could be at risk Checkpoint Control: Setting designated checkpoints in specific areas of a building where users must be validated before they can access other areas Alongside the software updates and tutorials, Paxton’s on-demand webinar is also available to help new and existing installers identify how access control can help make their specific sites more secure and in line with current guidelines.
Technology has always stepped in to shorten distances between individuals. Whether through using electronic communications, such as email or video messaging, it has united people across different geographical locations and circumstances. Recent events have presented a unique challenge, where the ability to observe people and events in person has been restricted. This has had a knock-on effect on a variety of sectors, including healthcare, sports, and education. Broadcast cameras have offered a much-needed solution, by providing an objective method of viewing and recording events remotely. This article will outline the different ways that broadcast cameras can assist in doing this across a range of use cases. Teaching the teachers Remote learning has become a firm fixture of education systems due to current restrictions around social distancing. However, even before the pandemic, education authorities were looking for ways to improve how teachers are trained. Lesson observation has been a firm staple of the process, but the presence of an assessor in the classroom could affect behaviors, leading to a result that was non-representative. Solutions that can monitor classrooms remotely prove more effective, especially if they provide the option for playback. The University of Regensburg faced this challenge with lesson observation and chose a system using broadcast cameras to either livestream the images or record them for later viewing. As a result, observers could view the footage remotely in real-time and share insights directly with the teacher to help improve their training. Training in healthcare Broadcast cameras could be used to live stream doctor’s rounds to remote locations, without risking the patient or students In addition to teacher training, medical universities have had to adapt the way they deliver the curriculum to support remote learning for medical students. In the past, students would typically follow doctors on rounds to discuss patient conditions, treatment, and potential outcomes. This was an essential part of their education, as it demonstrated practical and real-life applications of the theory they were taught. However, this could not happen in the same capacity due to social distancing and hygiene restrictions. In this case, broadcast cameras could be used to live stream doctor’s rounds to remote locations, without increased risk to the patient or students. Remote patient monitoring Within the healthcare facility, patient monitoring is a critical part of providing high standards of care and treatment. Patient conditions can change quickly and monitoring enables medical professionals to intervene, potentially improving outcomes. In situations where personal protective equipment conservation and minimizing viral spread is a top priority, broadcast cameras can be used to remotely monitor patient vitals. Broadcast cameras from Axis offer extreme PTZ/resolution capabilities which are essential for patient monitoring situations. There is also an associated cost-benefit, as the investment needed for the hardware is minimal compared to other medical supplies or resources. Sports analysis software As proven by the two previous sector use cases, observation is a key part of assessing performance. For any sports discipline – whether it’s individual or group activities, improving performance relies on the ability to accurately analyze past games and training sessions. Using this information, decisions can be made to tweak and update the approach, informed by solid feedback. This was particularly true for track and field athletes, who constantly analyzed their movements to achieve results. Historically, they recorded their motion using handheld cameras, but this method came with limitations, such as filming angles, starting and stopping recordings, and changing memory cards. Working with Spiideo, an Axis partner providing sports analysis software, teams were able to use broadcast cameras mounted in the stadium to record training sessions and analyze them afterward on a mobile device. Security and entertainment in stadiums Cameras continuously monitor areas within the venue for intruders, mischievous, and illegal behavior Safety and comfort are key to enjoying sporting activities and security at stadiums is a high priority. In fact, it is a legal requirement for venues to have an effective solution in place and networked cameras play a critical role. These solutions must continuously monitor areas within the venue for intruders, mischievous, and illegal behavior, allowing security teams to quickly intervene if necessary. In Slovakia, all first league stadiums are required to operate a permanent specified camera system, which continuously monitors the individual visitor sections, stadium access gates, and entrances, and all the public areas inside the stadium. Spartak Myjava Stadium were looking for a solution that complied with legal regulations and secured the premises. In addition to providing high-quality video surveillance, the venue operators also discovered that they could use the footage to replay views of the game. Installed broadcast cameras Calling a foul can be one of the most controversial decisions, sometimes affecting the final score. Players and fans often argue with the referee’s decisions, but eyewitness accounts can be incorrect due to the speed or an event of position of the observer. An independent account of the incident helps to determine whether the referee’s decision was justified. This can be especially tricky for fast-paced games such as hockey. The Ontario Hockey League already used cameras to confirm goals and penalties but found that these lacked the resolution they needed. They installed broadcast cameras from Axis directed at the nets and another camera directed at the clock. This allowed officials to zoom in frame-by-frame on the video, improving their confidence in referees’ calls and enabled them to quickly make decisions regarding outcomes. Looking to the future The ability to broadcast, record, and replay events will continue to be important across a range of sectors. This is especially true for healthcare, education, and sports, as social distancing guidelines and hygiene concerns prevent close contact and the gathering of crowds. Technology will have an increasing role in virtually closing this distance and there is an opportunity for more use cases to emerge in other sectors, such as transportation and critical infrastructure. Broadcast cameras will prove to be a key part of this, due to the ability to produce high-resolution images in real-time, which will be a critical component to maintaining and enabling processes now and in the future.
LenelS2 has announced a global distribution agreement to resell Invixium’s contactless biometric solutions through the LenelS2 OnGuard and NetBox value-added reseller (VAR) channels. The agreement also includes a new interface with the OnGuard and NetBox systems to enhance access control and proactive screening to help protect people and optimize building health and efficiency. The solutions are offered as part of Carrier’s Healthy Buildings Program, an expanded suite of advanced solutions to help deliver healthier, safer, more efficient and productive indoor environments. LenelS2, an internationally renowned company in advanced security systems and services, is a part of Carrier Corporation, a global provider of healthy, safe and sustainable building and cold chain solutions. IXM TITAN solution with Enhancement Kit LenelS2 will now offer the IXM TITAN solution with Enhancement Kit: an intelligent dual-camera biometric solution LenelS2 will now offer the IXM TITAN solution with Enhancement Kit: an intelligent dual-camera biometric solution that performs contactless facial recognition authentication with no mask removal required, and mask detection and elevated body temperature detection measured at the tear duct. The Invixium TITAN solution offers an API interface with the NetBox access control system and an interface with the OnGuard security management system through a certification in the LenelS2 OpenAccess Alliance Program (OAAP). Flexible configuration of workflows The interface enables flexible configuration of workflows utilizing any permutation combination of card, biometric fingerprint, facial recognition, temperature screening and mask detection access parameters. “The collaboration with Invixium provides our users with a versatile access control and proactive screening solution that can help them navigate today’s complex safety and security requirements,” said Jeff Stanek, President, LenelS2, adding “The advanced biometrics and built-in mask detection add new functionality to our Healthy Buildings portfolio.” TITAN solution and LenelS2 access integration “The powerful interface between the TITAN solution and LenelS2 access control systems provides very relevant biometric solutions that meet the world’s most pressing demands,” said Shiraz Kapadia, the Chief Executive Officer (CEO) and President of Invixium. Shiraz adds, “Our health-focused portfolio combines temperature screening with mask detection for contactless access control and workforce management in one elegant device, allowing businesses in key industries to easily create healthy business environments.” Touchless biometric security and access control TITAN solution delivers touchless biometric security through face recognition via a 21-megapixel camera The TITAN solution delivers touchless biometric security through face recognition via a 21-megapixel camera and adding the Enhancement Kit transforms the TITAN solution into a health kiosk capable of measuring temperature for biometric access control. Not only can the TITAN solution authenticate 12 to 18 users’ faces in one minute with high accuracy, but it can also screen each of those users’ temperatures at the tear duct in the same amount of time. Bolstering entrance controls The TITAN solution features an easy, one-piece installation and installs just like a traditional reader. In addition to its touchless access and proactive screening capabilities, the TITAN solution can be easily used to bolster entrance controls. These readers, purchased through LenelS2, do not require any additional licensing fees. TITAN readers and Enhancement Kits must be purchased individually or as part of a kit from LenelS2.
Insider threat programs started with counter-espionage cases in the government. Today, insider threat programs have become a more common practice in all industries, as companies understand the risks associated with not having one. To build a program, you must first understand what an insider threat is. An insider threat is an employee, contractor, visitor or other insider who have been granted physical or logical access to a company that can cause extensive damage. Damage ranges from emotional or physical injury, to personnel, financial and reputational loss to data loss/manipulation or destruction of assets. Financial and confidential information While malicious insiders only make up 22% of the threats, they have the most impact on an organization Most threats are derived from the accidental insider. For example, it’s the person who is working on a competitive sales pitch on an airplane and is plugging in financial and confidential information. They are working hard, yet their company’s information is exposed to everyone around them. Another type of insider, the compromised insider, is the person who accidentally downloaded malware when clicking on a fake, urgent email, exposing their information. Malicious insiders cause the greatest concerns. These are the rogue employees who may feel threatened. They may turn violent or take action to damage the company. Or you have the criminal actor employees who are truly malicious and have been hired or bribed by another company to gather intel. Their goal is to gather data and assets to cause damage for a specific purpose. While malicious insiders only make up 22% of the threats, they have the most impact on an organization. They can cause brand and financial damage, along with physical and mental damage. Insider threat program Once you determine you need an insider threat program, you need to build a business case and support it with requirements. Depending on your industry, you can start with regulatory requirements such as HIPAA, NERC CIP, PCI, etc. Talk to your regulator and get their input. Everyone needs to be onboard, understand the intricacies of enacting a program Next, get a top to bottom risk assessment to learn your organization’s risks. A risk assessment will help you prioritize your risks and provide recommendations about what you need to include in your program. Begin by meeting with senior leadership, including your CEO to discuss expectations. Creating an insider threat program will change the company culture, and the CEO must understand the gravity of his/her decision before moving forward. Everyone needs to be onboard, understand the intricacies of enacting a program and support it before its implemented. Determining the level of monitoring The size and complexity of your company will determine the type of program needed. One size does not fit all. It will determine what technologies are required and how much personnel is needed to execute the program. The company must determine what level of monitoring is needed to meet their goals. After the leadership team decides, form a steering committee that includes someone from legal, HR and IT. Other departments can join as necessary. This team sets up the structure, lays out the plan, determines the budget and what type of technologies are needed. For small companies, the best value is education. Educate your employees about the program, build the culture and promote awareness. Teach employees about the behaviors you are looking for and how to report them. Behavioral analysis software Every company is different and you need to determine what will gain employee support The steering committee will need to decide what is out of scope. Every company is different and you need to determine what will gain employee support. The tools put in place cannot monitor employee productivity (web surfing). That is out of scope and will disrupt the company culture. What technology does your organization need to detect insider threats? Organizations need software solutions that monitor, aggregate and analyze data to identify potential threats. Behavioral analysis software looks at patterns of behavior and identifies anomalies. Use business intelligence/data analytics solutions to solve this challenge. This solution learns the normal behavior of people and notifies security staff when behavior changes. This is done by setting a set risk score. Once the score crosses a determined threshold, an alert is triggered. Case and incident management tools Predictive analytics technology reviews behaviors and identifies sensitive areas of companies (pharmacies, server rooms) or files (HR, finance, development). If it sees anomalous behavior, it can predict behaviours. It can determine if someone is going to take data. It helps companies take steps to get ahead of bad behavior. If an employee sends hostile emails, they are picked up and an alert is triggered User sentiment detection software can work in real time. If an employee sends hostile emails, they are picked up and an alert is triggered. The SOC and HR are notified and security dispatched. Depending on how a company has this process set-up, it could potentially save lives. Now that your organization has all this data, how do you pull it together? Case and incident management tools can pool data points and create threat dashboards. Cyber detection system with access control An integrated security system is recommended to be successful. It will eliminate bubbles and share data to see real-time patterns. If HR, security and compliance departments are doing investigations, they can consolidate systems into the same tool to have better data aggregation. Companies can link their IT/cyber detection system with access control. Deploying a true, integrated, open system provides a better insider threat program. Big companies should invest in trained counterintelligence investigators to operate the program. They can help identify the sensitive areas, identify who the people are that have the most access to them, or are in a position to do the greatest amount of harm to the company and who to put mitigation plans around to protect them. They also run the investigations. Potential risky behavior Using the right technology along with thorough processes will result in a successful program You need to detect which individuals are interacting with information systems that pose the greatest potential risk. You need to rapidly and thoroughly understand the user’s potential risky behavior and the context around it. Context is important. You need to decide what to investigate and make it clear to employees. Otherwise you will create a negative culture at your company. Develop a security-aware culture. Involve the crowd. Get an app so if someone sees something they can say something. IT should not run the insider threat program. IT is the most privileged department in an organization. If something goes wrong with an IT person, they have the most ability to do harm and cover their tracks. They need to be an important partner, but don’t let them have ownership and don’t let their administrators have access. Educating your employees and creating a positive culture around an insider threat program takes time and patience. Using the right technology along with thorough processes will result in a successful program. It’s okay to start small and build.
Growing up, I was surrounded by the military way of life as my father was a Captain in the Marine Corps during the Vietnam War and my grandfather and uncles all served in the military. Even from a young age, I knew I was going to serve our country. My 22-year career in the military includes serving in the United States Air Force, the California Air National Guard and as a reservist assigned to an active-duty Air Force unit. Training and development operations Over the course of my military career, I held a variety of assignments from starting out as a Gate Guard to becoming a Flight Chief and Non-Commissioned Officer in Charge (NCOIC) of a Security Forces section. I retired from the military as a Master Sergeant. After my deployment to Afghanistan, I joined Allied Universal as a security director. My 17-year career at Allied Universal encompasses roles including Service Manager and General Manager at the West Los Angeles Branch and leading the Training and Development operations and Fire Life Safety Division. In 2008, I was tasked to develop and implement the company’s Healthcare Division. Attaining meaningful employment opportunities Below are just a few reasons why the physical security sector is a natural fit for military veterans: Self-Discipline and Organization Coveted in Security Sector - I believe that the skills learned in the military, such as self-discipline and organization, have provided the necessary tools to be successful. I truly enjoy working with other veterans at my company as we all know that we can count on each other to get the job done right. This bond and sense of commitment to each other is always there. Multi-faceted Career Paths Available - The security sector also offers veterans the ability to attain meaningful employment opportunities with multi-faceted career paths. A veteran’s background and experience are highly valued in this sector and there are many positions to match our skill sets and expertise. The responsibility we have for those in our charge is really not any different than what we have learned in the military. Team Players - Teamwork is a lesson all military veterans learn. In the military, you live and work together, and are taught to support your team members and efficiently collaborate with the people around you. This is an invaluable skill in the security sector whether you are seeking an entry level or management position. No Military to Civilian Decoder Needed - Veterans need a ‘military to civilian decoder’ system to help explain the significance of their military skills and how they translate to the general employment landscape. The physical security sector, however, understands the language of the military and don’t generally require that military responsibilities be coded into language that non-military can understand. Securing mid-Level appointments The physical security sector features a wide variety of jobs from entry level, middle management to senior positions. A retired veteran with a pension may look to the security sector for part-time or full-time entry level work. Other former military, who are not eligible for retirement benefits, may secure mid-level appointments with the goal of climbing the ladder to the highest rungs. The flexibility and opportunity are unparalleled in the security sector. Veterans generally enter the workforce with identifiable skills that can be transferred to the physical security world and are often skilled in technical trends pertinent to business and industry. And what they don't know, they are eager to learn - making them receptive and ready hires in physical security environments that value ongoing learning and training.
In 2017, IoT-based cyberattacks increased by 600%. As the industry moves towards the mass adoption of interconnected physical security devices, end users have found a plethora of advantages, broadening the scope of traditional video surveillance solutions beyond simple safety measures. Thanks in part to these recent advancements, our physical solutions are at a higher risk than ever before. With today’s ever evolving digital landscape and the increasing complexity of physical and cyber-attacks, it’s imperative to take specific precautions to combat these threats. Video surveillance systems Cybersecurity is not usually the first concern to come to mind When you think of a video surveillance system, cybersecurity is not usually the first concern to come to mind, since digital threats are usually thought of as separate from physical security. Unfortunately, these two are becoming increasingly intertwined as intruders continue to use inventive methods in order to access an organization's assets. Hacks and data breaches are among the top cyber concerns, but many overlook the fact that weak cybersecurity practices can lead to physical danger as well. Organizations that deploy video surveillance devices paired with advanced analytics programs often leave themselves vulnerable to a breach without even realizing it. While they may be intelligent, IoT devices are soft targets that cybercriminals and hackers can easily exploit, crippling a physical security system from the inside out. Physical security manufacturers Whether looking to simply gain access to internal data, or paralyze a system prior to a physical attack, allowing hackers easy access to surveillance systems can only end poorly. In order to stay competitive, manufacturers within the security industry are trading in their traditional analog technology and moving towards interconnected devices. Due to this, security can no longer be solely focused on the physical elements and end users have taken note. The first step towards more secured solutions starts with physical security manufacturers choosing to make cybersecurity a priority for all products, from endpoint to edge and beyond. Gone are the days of end users underestimating the importance of reliability within their solutions. Manufacturers that choose to invest time and research into the development of cyber-hardening will be ahead of the curve and an asset to all. Wireless communication systems Integrators also become complicit in any issues that may arise in the future Aside from simply making the commitment to improve cyber hygiene, there are solid steps that manufacturers can take. One simple action is incorporating tools and features into devices that allow end users to more easily configure their cyber protection settings. Similarly, working with a third party to perform penetration testing on products can help to ensure the backend security of IoT devices. This gives customers peace of mind and manufacturers a competitive edge. While deficient cybersecurity standards can reflect poorly on manufacturers by installing vulnerable devices on a network, integrators also become complicit in any issues that may arise in the future. Just last year, ADT was forced to settle a $16 million class action lawsuit when the company installed an unencrypted wireless communication system that rendered an organization open to hacks. Cybersecurity services In addition, we’ve all heard of the bans, taxes and tariffs the U.S. government has recently put on certain manufacturers, depending on their country of origin and cybersecurity practices. Lawsuits aside, employing proper cybersecurity standards can give integrators a competitive advantage. With the proliferation of hacks, malware, and ransomware, integrators that can ease their client's cyber-woes are already a step ahead. By choosing to work with cybersecurity-focused manufacturers who provide clients with vulnerability testing and educate end users on best practices, integrators can not only thrive but find new sources of RMR. Education, collaboration and participation are three pillars when tackling cybersecurity from all angles. For dealers and integrators who have yet to add cybersecurity services to their business portfolios, scouting out a strategic IT partner could be the answer. Unlocking countless opportunities Becoming educated on the topic of cybersecurity and its importance for an organization is the first step Physical security integrators who feel uncomfortable diving headfirst into the digital realm may find that strategically aligning themselves with an IT or cyber firm will unlock countless opportunities. By opening the door to a partnership with an IT-focused firm, integrators receive the benefit of cybersecurity insight on future projects and a new source of RMR through continued consulting with current customers. In exchange, the IT firm gains a new source of clients in an industry otherwise untapped. This is a win for all those involved. While manufacturers, dealers and integrators play a large part in the cybersecurity of physical systems, end users also play a crucial role. Becoming educated on the topic of cybersecurity and its importance for an organization is the first step. Commonplace cybersecurity standards Below is a list of commonplace cybersecurity standards that all organizations should work to implement for the protection of their own video surveillance solutions: Always keep camera firmware up to date for the latest cyber protections. Change default passwords, especially those of admins, to keep the system locked to outside users. Create different user groups with separate rights to ensure all users have only the permissions they need. Set an encryption key for surveillance recordings to safeguard footage against intruders and prevent hackers from accessing a system through a backdoor. Enable notifications, whether for error codes or storage failures, to keep up to date with all systems happenings. Create/configure an OpenVPN connection for secured remote access. Check the web server log on a regular basis to see who is accessing the system. Ensure that web crawling is forbidden to prevent images or data found on your device from being made searchable. Avoid exposing devices to the internet unless strictly necessary to reduce the risk of attacks.
An impact of the COVID-19 pandemic has been to accelerate change. In 2020, the security industry was among many others that sought to adapt to shifting norms. In the process, we grabbed onto new opportunities for change and, in many cases, re-evaluated how we have done business for decades. If necessity is the mother of invention, perhaps crisis is the mother of acceleration. This article will reflect on how these themes impacted the physical security industry in 2020, based on content we published throughout the year, and with links back to the original articles. Sensitive data leakage Since the lockdown came into effect, organizations globally have undergone years' worth of transformations in a matter of months. Whether it has been to transition their operations online or moving their IT infrastructure to the cloud, there’s no denying that the face of business has changed permanently, experiencing a seismic shift, both operationally and culturally. As we enter the ‘next normal’ there remains a great deal of uncertainty around what the next 12 months holds and how organizations can navigate turbulence in the face of a possible recession. One of the most notable and widely reported trends has been the switch to remote methods of work, or home working. With so many employees logging on from residential networks, through personal devices that may be more easily compromised, the overall attack surface has greatly increased, raising the risk of potential corporate and sensitive data leakage in their new home office settings. Security and data protection are larger issues than ever. Good cybersecurity hygiene Criminals will use the crisis to scam people for money, account information and more" With a majority of the world working from home, businesses had to respond to this changing landscape. While it used to be that in-person networking events and sales pitches secured new projects or opportunities, the current landscape pushes businesses to be more creative in how they reach their customers. For example, with ISC West being postponed, many companies have turned to online resources to share new product demonstrations and other company news. Others are hosting webinars as a way to discuss the current climate and what it means for the industry. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Work-Life balance In a typical office with an on-premise data center, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. There are many benefits of working remotely with productivity right up the top of the list There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and traveling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working. Video conferencing platforms Trade shows have always been a basic element of how the security industry does business - until the year 2020, that is. This year has seen the total collapse of the trade show model as a means of bringing buyers and sellers face to face. The COVID-19 pandemic has effectively made the idea of a large trade show out of the question. The good news is that the industry has adapted well without the shows. A series of ‘on-line shows’ has emerged, driven by the business world’s increasing dependence on Zoom and other video conferencing platforms. The fact is, 2020 has provided plenty of opportunities for sellers to connect with buyers. Some of these sessions have been incredibly informative – and conveniently accessible from the comfort of a home office. Online training courses Online training has grown in popularity this year, and the change may become permanent Online training has grown in popularity this year, and the change may become permanent. “We have seen unprecedented international demand for our portfolio of online training courses ranging from small installation companies to the largest organizations, across a wide range of sectors,” says Jerry Alfandari, Group Marketing Manager of Linx International Group, a UK training firm. “More than ever, businesses are looking to ensure they have the skills in-house to coordinate their response to the changing situation. Individuals are also taking this time to upskill themselves for when we return to ‘normal’ by bringing something with them they didn’t have before. Perhaps unsurprisingly, people are still seeking to better themselves for what will be, eventually, a competitive market.” Virtual trade show ‘Crisis and the Everyday’ was part of Genetec’s Connect’DX virtual trade show last spring. The virtual conversation – emphasizing both in form and content the topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry. In the middle of this pandemic, there is an opportunity to help security reinvent itself “In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security.” Cloud-Based platform As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected. “We moved quickly to establish work-from-home protocols to protect our employees and minimize impact on our partners,” says Anne Ferguson, VP of Marketing at Alarm.com. The Customer Operations and Reseller Education (CORE) team has operated without interruption to provide support to partners. Sales teams are utilizing webinars and training resources to inform and educate partners about the latest products, tools, and solutions. Alarm.com’s partner tools are essential for remote installations and support of partner accounts.
The cloud is here to stay. Its resilience and ability to connect the world during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at our articles in 2020 about the growing popularity of cloud solutions for physical security, with links to the original content. Product offering While most people agree on the definition of “cloud,” there are several points about the terminology that may require clarification. Private cloud or public cloud? VSaaS or unlimited storage for video? Beyond the basics, the terms become foggy, reflecting a variety of notions about how cloud services fit into the broader physical security marketplace. As cloud usage becomes more popular, it’s important that marketers be precise in their terminology, and that integrators and end users be diligent in understanding the specifics of available product offerings. Different meanings “The cloud has many different possible connotations, depending on the context,” says Yu Hao Lin of Rasilient Systems, one of our Expert Roundtable panelists. For example, corporate CIOs will more likely understand the cloud to be a private cloud platform. As such, the public cloud is a ubiquitous term while the private cloud is more specified. Cloud system security Security of cloud systems is an ongoing discussion in the industry, especially how cloud system cybersecurity compares to that of on-premise systems. Our Expert Panel Roundtable weighed in on this question. “While both kinds of security systems serve their purpose, it can be argued that the streamlined updates that are commonplace with cloud-based solutions may put them at more of an advantage when it comes to data security,” says panelist Eric Widlitz of Vanderbilt Industries. “Also, most reputable cloud-based solutions are running in secured data centers by companies such as Google, Microsoft, or Amazon, so you also get to take advantage of all the security layers they have protecting your data.” Hybrid cloud video security solution A growing list of cloud players reinforces the importance of the cloud in the future of physical security There are several relatively new companies pushing cloud in a big way. Verkada is fast-growing company currently currently focusing to deliver an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. The growing list of cloud players reinforces the importance of the cloud in the future of physical security. Combining AI and cloud video One company investing in the cloud is Eagle Eye Networks, which has raised $40 million of Series E funding from venture capital firm Accel to finance the realization of their vision to combine AI and cloud video. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end-users,” says Ken Francis, President. Eagle Eye offers an application programming interface (API) to enable the integration of best-in-breed third-party AI and analytics systems to leverage the video. Eagle Eye is also investing in its own AI development and hiring additional development and customer service personnel. Hirsch Velocity Cirrus and MobilisID Identiv introduced the Hirsch Velocity Cirrus cloud-based Access Control as a Service (ACaaS) solution and MobilisID smart mobile physical access control solution. Hirsch Velocity Cirrus is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. Advantages and disadvantages Advantages of cloud-based physical security technologies are many, when supporting staffThe advantages of cloud-based physical security technologies are many, and have wide-ranging applications for all areas of the transport sector; across stations, transport hubs, and vehicles. When used to support staff and complement existing processes, such systems can prove invaluable for transport professionals in helping to create a safer working environment, promoting confidence among personnel and passengers, and assuring passengers who are fearful about the current pandemic that all possible precautions are being taken during their journey. 5G supporting cloud-based applications 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Increasing use of IoT Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate.
Across the security industry, power supplies are too often an afterthought and the first item in an access control system to be value-engineered. However, when the power supply fails on a high-end access control device, the system becomes a very expensive paperweight. Fortunately, there are now power supply units available that can enhance system reliability by providing remote diagnostics and real-time reporting and analytics. There is also a mistaken perception that all power supplies are the same, says David Corbin, Director of ASSA ABLOY’S Power Management Strategic Business Unit. Access control and security applications Power supplies today are more important than ever for access control and security applications The fact is, a properly designed unit for today’s market must have a wide input range, a myriad of features, interface to network, have adequate transient protection, good surge capability and a demonstrated quality level for mission critical reliability, he says. “Power supplies today are more important than ever for access control and security applications,” says Corbin. “From heavy snowstorms in the Midwest and East Coast to the two million Californians that experienced unprecedented power outages, extreme weather conditions have created chaos for millions over the past few months. These events have resulted in students being locked out of schools, hospitals darkening and electronic keypads or card readers shutting down. With events like these on the rise, and an increased reliance on the technology we use to get in and out of the spaces we occupy, power supplies are critical for keeping systems up and running and people safe and secure.” ASSA ABLOY's LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems Installing right power supplies ASSA ABLOY has a range of products within the power supplies category, including LifeSafety Power’s FPO Intelligent Power Supplies and Helix Redundant Power Systems. ASSA ABLOY’s acquisition of LifeSafety Power in September expanded the company’s offering of smart integrated access control power solutions for OEMs, integrators and end-users. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies, and eco-friendly, linear, plug-in and solar power supplies, as well as Power over Ethernet (PoE). Access control is crucial to security and life safety, says Corbin. And without power, any protective system is useless. When the right power supplies are installed correctly, the system will have built-in backup power that will be triggered during an outage. Dependable power supplies, with regularly replaced and appropriately sized backup batteries, are critical to keeping occupants safe in an emergency event. Other ASSA ABLOY power supply products include Securitron AQ Series Switching Power Supplies Periodic testing of the battery When it comes to extreme weather conditions, the result of a power outage can lead to hazardous situations for employees, patients, residents and students, he says. Buildings that require power to gain access can leave people stranded outside or locked inside. “When access controls are disabled, intruders can easily enter buildings without notice, affording the opportunity for interruptions to power distribution, water supplies and other necessary public utilities,” says Corbin. Preparation for the next big power outage should include the sizing of power supplies to the system requirement with a reasonable safety factor for foreseeable system expansion and a battery set that is sized for operating the system for a period of time greater than the planned requirement, he says. Using a ‘smart’ power supply provides early warning of an impending failure; and consistent, periodic testing of the battery set keeps the system in peak operating condition. Predictive maintenance of access control Predictive analytics and data harvesting can help with predictive maintenance of access control Redundancy ensures that power remains available in the event of a failure, regardless of whether it is a blackout situation or a failure of the power supply itself, says Corbin. “In critical power installations where redundancy is vital, the system must have a properly sized and maintained backup battery,” says Corbin. “Additionally, further redundancy can be achieved via products like our Helix systems that provide for seamless switching between two different power supplies in the event of an electrical failure of one of the power supplies.” Corbin also notes there is a growing want and need for more data and analytics in the access control field. End users increasingly expect access control systems to be able to integrate with building information systems. Predictive analytics and data harvesting can help with predictive maintenance of access control and building systems. For example, intelligent power supplies can identify problems before they happen – such as performing periodic, automated battery tests and then notifying a central monitoring location and/or a facility manager of a battery that needs replacement. Lock operation can also be monitored on a real-time basis for failure or impending failure of a secured door opening, he says.
Harper Security Systems, which specialises in specifying and installing smart security solutions for residential and private properties, has selected OPTEX’s range of Intelligent Passive Infrared (PIR) sensors for their reliability in detecting external threats, especially in rural environments. Three properties in the Home Counties and Lincolnshire are using a combination of OPTEX’s proven PIR sensors to protect property, people, and other important assets including horses from the dangers of vandalism and theft. OPTEX’s range includes sensors which offer panoramic 180-degree detection coverage and 12m/40ft radius to detect any intrusion around a residential or commercial building. Commercial business environments They are ideally suited for protecting larger residential grounds and flat roofs typical with outbuilding on farms and stables. “We have worked with OPTEX for a number of years and have found their range of PIR sensors to be extremely accurate and reliable, which is critical when specifying external detection,” says Alan Harper, Director at Harper Security Systems. The flexibility and versatility of the sensors is such that they are ideal for multiple environments" “The flexibility and versatility of the sensors is such that they are ideal for multiple environments,” Alan continues. “For example, we have recently installed them at a private stables in Lincolnshire to protect horses and valuable equestrian equipment, residences in rural villages in both Bedfordshire and Hertfordshire to protect property and personal items, as well as in commercial business environments.” Innovative security solutions Ben Linklater, Sales Director at OPTEX Europe, says that while the focus is often on towns and cities, crime in the countryside is a huge issue, costing the rural community in the UK more than £9 million this year alone: “Reliable external protection is becoming increasingly important not only to secure equipment and assets, but also livestock and other animals like horses. The earlier the detection the better chance there is to prevent intruders." "External intrusion detection is essential in rural environments as most assets, many of which are expensive to replace (and some are irreplaceable), are stored outside. We are very pleased to work with Harper Security who understand the benefits of early detection to keep premises, assets, people and animals secure, delivering innovative security solutions to their customers.”
Kumbh Mela is one of the most sacred pilgrimage festivals of India and is organized at a grand scale at Nashik, Haridwar, Ujjain, and Prayag. As Kumbh Mela is being celebrated after a period of 12 years in Nashik, 100 million people are expected to visit, security is a major concern for the Government bodies. Nashik will be getting an opportunity to host these guests from July 14 to September 25 and no stone will be left unturned in hosting the massive gathering. Challenges Nashik Railway Station authorities wanted video surveillance devices that would not consume larger areas when it comes to installing them as the railway station had congested platforms. Moreover, they wanted a surveillance solution that gave them superior image quality and at the same time did not consume heavily on the bandwidth. Furthermore, the authorities wanted to monitor the whole place centrally and gain central control of the entire place. Installing devices and control room in the congested platforms Restricted allotted bandwidth for the video surveillance solution Requirement Prompt and smooth installations of cameras and hybrid video recorders within 30 days Setting up the control room for monitoring railway station entrance, platforms, and connecting bridges High reliability of the solution for utmost security Storage of the entire 4-month period as evidential proof Matrix offering Installation was completed within 20 days with highly skilled manpower. Cascading of all the connected devices with sequencing for central monitoring on TVs in the control room to reduce the overall solution cost. 4 months scheduled backup of all cameras is configured centrally for storing all the streams. Matrix being an Indian brand, efficient pre-and post-sales support is a part of the solution. Results Secured entry and exit from the city with 24x7 video surveillance of the railway station Installation of the solution done within the defined time frame Products offered SATATYA HVR1624P SATATYA CIBR13FL40CW SATATYA CIDR13FL40CW SATATYA CIDRP20VL130CW SATATYA Centralized Monitoring Software (CMS)
Ipsotek, a pioneer in artificial intelligence (AI) powered video analytics, has announced that it has been awarded a security systems project at the Katara Culture Village in Doha, Qatar, in partnership with Mannai Trading Co, a Qatari based company listed on the Qatar Stock Exchange. Ipsotek’s highly scalable VISuite AI platform and advanced VISuite FR facial recognition system have been selected and approved by the Qatar Ministry of Interior to improve the security and safety as well as provide business intelligence at the iconic cultural village of Katara. VISuite AI enables users to efficiently manage automatically generated alarms in real-time, resulting in reduced operator response times and the ability to track chosen behaviors of interest in complex environments. Security threat VISuite FR automatically detects and informs operators of people that have visited a site multiple times in a configurable timeframe and could pose a security threat. It is optimized for use in busy and security-sensitives scenarios where the highest level of recognition is required. In addition to the project at Katara in collaboration with Mannai ICT, Qatar’s renowned Systems Integrator and the Information & Communication Technology Division of Mannai Corporation, Ipsotek has a number of other major projects across Qatar. The company has also announced that it has appointed Mr Jihad Marei as Country Manager for Qatar and is in the process of opening a new office in one of Qatar’s Free Zones. Key strategic partners We are very proud to have been awarded the Katara Heritage Village project with Mannai Trading Co." Also known as ‘The Valley of Cultures’, Katara is one of the main cultural destinations in Qatar, featuring a museum, open amphitheatre, opera house, movie theater, conference hall, beach, Souq and multiple restaurants. Katara hosts hundreds of events and attracts over 10 million visitors each year. Charlie Bennett, Ipsotek Head of Sales for EMEA said: “We are very proud to have been awarded the Katara Heritage Village project with Mannai Trading Co. Mannai has become one of our key strategic partners in Qatar and we have enjoyed collaborating on several projects together this year, which is why we have also chosen to grow our presence in country further by employing Jihad Marei as Country Manager and open a dedicated office in Qatar.” Artificial intelligence video analytics Shamnad Karuvadi, Deputy Manager ELV Physical Security at Mannai Trading Co said: “We are very pleased to be working with Ipsotek as our solution partner for Artificial Intelligence Video Analytics. Ipsotek has added a great deal of value to the Mannai solution portfolio and together we look forward to providing the highest levels of safety and security to protect critical infrastructure. We would like to extend our sincere thanks to Charlie Bennet & Mr. Jihad Marei at Ipsotek for their extensive support.”
The 100 Mount Street premium-grade office tower completed in May 2019, is the tallest (152m) building in North Sydney. With an innovative cross-braced exoskeleton structure and a soaring glass curtain wall, the tower celebrates Sydney‘s history of excellence in architecture and structural engineering. The 35-story office tower offers panoramic views of Sydney Harbor, Sydney Opera House, and Sydney Harbor Bridge, and is occupied by some of Sydney’s best-known companies. The site also benefits from its proximity to key transport infrastructures with a train station, bus stops, ferry wharf, and taxi stand all within walking distance. This high traffic location required a convenient and secure way to ensure controlled access for the 2,000 people entering the building everyday, while maintaining the aesthetics of the 8 meters-high ceiling lobby. Efficient control access to the building In order to efficiently control access to the building, the security contractor supplied top quality COMINFO EasyGate SPT entrance control gates equipped with IDEMIA’s MorphoWave™ Compact high-end biometric contactless devices. COMINFO is an experienced manufacturer of turnstiles and speed gates. EasyGate SPT models were installed, equipped with the latest MDD motor technology (Magnetic Direct Drive: no gearbox, no oil, no brush) and advanced infrared optical sensors which ensure safe passage and detect tailgating and cross-over, to ensure that only authorized people can pass through the gates. MorphoWave Compact™ is the flagship biometric device for physical access control from IDEMIA, the front-runner in Augmented Identity. The terminal performs a 3D scan and verification of 4 fingerprints in less than 1-second, in a quick and easy touchless wave gesture. Aesthetic integration The features of the product are particularly well-suited for high traffic locations with the capability to authenticate up to 50 people per minute thanks to advanced algorithms based on Artificial Intelligence. COMINFO carried out an aesthetical integration of MorphoWave™ Compact into EasyGate SPT, resulting in a powerful solution that brings the latest physical access control system using only a simple wave of a hand. This project was deployed by Centaman, COMINFO’s partner for Australia/New Zealand First to implement biometric technology Dexus and Dexus Wholesale Property Fund who owned the building were the first to implement this biometric technology in office buildings and have now more than 2,000 people registered with their biometrics, removing the need for physical access cards or touching anything when entering or leaving the secured premises. The installation is highly acclaimed by employees who appreciate the frictionless and hygienic use of MorphoWave™ Compact and EasyGate SPT.
Located 40 kilometers outside the Russian capital, the new Mercedes-Benz passenger car factory is a showcase for Industry 4.0 automotive manufacturing. To ensure the safety of more than 1,000 employees at the massive facility, Bosch provided a fire alarm and security system, replete with voice evacuation capabilities to meet the specific safety needs of modern-day car factories. Future of car manufacturing Walking into the main manufacturing hall of the new Mercedes-Benz Cars plant in the Moscow region is to see the future of automotive production. Amid glass walls and high ceilings, robots and humans work side-by side to assemble the company’s most popular limousines for the Russian market. From chassis welding to windshield installation to painting, the plant combines all production steps in the same building as part of a ‘one-roof concept’. But from a fire safety perspective, the ‘one-roof concept’ with its tall factory ceilings and open floorplan poses challenges. The reason: Conventional, point-type fire detectors exceed their performance limit when it comes to detecting smoke particles inside such a vast, air-conditioned space. Working closely with the client, experts of Ateksis, the system integrator who lead this project, realized that early fire detection would take a solution just as innovative as the futuristic car factory itself. Safety for automotive factories They can detect fires in the beginning stages (called the “smoldering” phase) even before visible smoke is released Additionally, Mercedes-Benz required a centrally controlled combination of intrusion alarm and video security to guard the entire perimeter of the 85-hectare facility with its total of seven buildings. And could the solution be ready within a few weeks for the plant’s grand opening featuring international dignitaries? Working on a tight timeline, the team of Bosch and Ateksis experts selected a fitting smoke detection technology: aspirating smoke detectors. Perfectly suited for large warehouses, the detection units are located within a pipe system that constantly ‘inhales’ samples of air, which are checked for smoke particles via intelligent signal processing technology. As a result, the light-based detectors achieve smoke sensitivities as precise as 0.05%. They can detect fires in the beginning stages (called the “smoldering” phase) even before visible smoke is released. electrical interference for reliability Aspirating detectors also pinpoint the exact location of fires, thus reliably preventing major damage in most cases. The system also suppresses environmental factors that typically cause false alarms in car factories, including dust, flying sparks and electrical interference for maximum reliability. “The Mercedes-Benz project is an important reference for us. It shows the level of integration and customer focus made possible by Bosch solutions. Our system has succeeded in meeting the specific needs of automobile manufacturers in the next generation of car production facilities”, said Ivan Konukhin, Bosch Security and Safety Systems Russia. audio sound quality The ceiling loudspeakers are equipped with a metal fire dome to adapt to the in-air handling spaces Amid the acoustic conditions inside the vast production plant, a total of 650 horn and ceiling loudspeakers from Bosch deliver sufficient volume and intelligibility. The horn speakers offer a wide opening angle to broadcast sound across factory floors while offering protection from water and dust, as well as the corrosive effects of industrial environments. What’s more, the ceiling loudspeakers are equipped with a metal fire dome to adapt to the in-air handling spaces of the automotive plant. The cabinet loudspeakers are certified according to the fire evacuation EN54-24 standard for reliable performance under emergency conditions. Overall, this level of audio sound quality directly serves to keep workers secure and informed, especially if evacuation becomes necessary. automatic fire detectors In the bigger picture, the total of 248 aspirating detectors inside the main production hall are centrally networked via Modular Fire Panels 5000 series and connected to more than 2,500 automatic fire detectors installed throughout six additional administrative buildings on the premises. For maximum employee safety, clear voice and audio alarm is provided by the PRAESIDEO Digital Public Address and Voice Alarm System. With Smart Safety Link, the interfaced fire and voice alarm system offers a full control in case of emergency, including the customization of the fire verification time and the automatic process that can ensure a safe phased evacuation. To ensure full visibility of the premises and around-the-clock safety, the video security solution consists of 112 high-definition cameras from Bosch. While bullet and moving cameras secure the perimeter, dome cameras monitor inside spaces. Video Management System Integrated on the Bosch Video Management System, all cameras can be controlled by the on-site security team Integrated on the Bosch Video Management System (BVMS), all cameras can be controlled centrally by the on-site security team inside the control room. Bringing security full-circle, the video system has a direct interface with intrusion alarm system containing over 200 detectors. This seamless integration of all solutions on the Building Integration System (BIS) from Bosch enables a host of additional functions: for instance, the system alerts the control room when a fire detector is triggered and sends live images from the nearest camera for full situational awareness. Aspiration smoke detector As Ivan Konukhin at the Regional Representative Center North-West and South Russia at Bosch Security Systems explains: “The cooperative functionalities between BIS and BVMS components were programmed according to customer requirements in an uncomplicated manner via macros, which also supported a timely installation.” Bosch Security System’s solution consists of: FPA-5000 Modular Fire Panel Solution Smart Safety Link License key for voice alarm Aspiration smoke detector 2 pipe systems AVENAR detector 4000 PRAESIDEO Digital Public Address and Voice Alarm System Metal Fire Dome Cabinet loudspeaker, metal, rectangular Horn loudspeaker, 10W, 6x10" Ceiling loudspeaker, 6W, ABS MAP 5000 family IP4000i, 5000i and 6000 cameras AUTODOME IP Cameras Access Control System Bosch Video Management System Building Integration System
Generally, the Less Than Load (LTL) industry is always looking to increase the amount of product shipped per truck. A lesser amount of product on a truck equates to a lower amount of billable product per trip. Raw Load Average (RLA) Raw Load Average (RLA) is the percentage of product on a truck – 100% is a completely full trailer. As the name implies, LTL averages less than 100%. In the fast- paced world of logistics, delivering millions of packages per day, than how do companies maximize the RLA? Most shipping managers are responsible for inspecting each trailer, before it leaves for several additional items. They make sure that the packages are secure and then evaluate whether the truck can handle any more inventory. There might be 200+ dock doors in a 400,000 sq. ft. facility and dozens of trucks waiting to leave and get on with their trips. At peak times, inspections will require several individuals running all over the facility. Less Than Load (LTL) Industry experts estimate that only about 80% of trucks are actually inspected Industry experts estimate that only about 80% of trucks are actually inspected. The missed trucks are now at risk for unsecured packages arriving damaged. More importantly, they are leaving 74% full. If the truck had waited another 30 minutes for inspection, they could have added another one skid of products to increase the load to 75%. That 1% difference does not sound like much. However, considering the volume of shipments that the top 10 LTL companies deliver, the 1% will amount to somewhere between US$ 6 million and US$ 12 million per year, which goes directly to the bottom line. Role of video security systems So, what is the role of security video systems here? Well most people say that security video does not have a real Return on Investment (ROI) in its traditional role. It’s hard to disagree. One exception might be when security companies have used video systems to reduce the number of guards. Using video, one guard can see as much as 3 or 4 guards could see in the past, without ever having to leave their post. This certainly reduces cost, but at the end of the day, guarding is still an overall cost to the bottom line. This case study will highlight how a couple of Salient’s very resourceful customers have transformed video into cash generating systems. Operational efficiency with video In the guarding scenario, video can put one person in several places at once. This operational efficiency can also be applied to how many people are needed to inspect trailers. But the ROI doesn’t come from removing a couple of salaries from the payroll. The real money comes into play because now inspecting 100% of the trailers leaving the dock are possible versus 80% and get that RLA up by 2 or 3%. Then, it’s about the big bucks. And that’s just the tip of the iceberg, when looking at the overall operational efficiencies available by utilizing video. Using video for misclassified products or shipment validation In logistics, there is a huge revenue miss every year when it comes to products being ‘accidentally’ misclassified In logistics, there is a huge revenue miss every year when it comes to products being ‘accidentally’ misclassified when shipped. All products being shipped have a classification, and each classification has a specific associated cost. These per-pound costs fluctuate based on the value of the product, required insurance, risk and other factors. An example would be a sporting goods manufacturer shipping ammunition and firearms, under the code for clothing. In this example, a 200-pound load would be billed at about US$ 100, when it should be billed at closer to US$ 300. Multiply this by hundreds of packages a day and the total of the missed revenue is astronomical. So how would a video surveillance system correct this problem? Certainly, security cameras cannot see though a box, but one would expect a box with 200 pounds of clothes to be a fairly large box. But if the box were full of firearms or ammunition, the video would reveal a much smaller box. This anomaly when noticed would prompt an operator to investigate the contents of the box and contact the manufacturer to rectify the billed amount. This process might seem a bit hypothetical, but already a current customer of Salient Systems is capturing over US$ 40 million a year with the right system components. Using video to reduce OSHA violations and false claims The logistics industry requires a tremendous amount of labor in order to operate. The more labor hours, the greater the propensity for on-the-job injuries, OSHA violations, insurance payouts, lawsuits and business interruption. False claims are also a consideration. Let’s look at some real-world examples of using video to reduce or eliminate these issues: OSHA reports that 5,250 workers died on the job in 2018 (3.5 per 100,000 full-time equivalent workers), on average, more than 100 a week or more than 14 deaths every day. The loss of an employee is one of the most emotionally devastating situations a business can encounter. There are several benefits of video that can increase safety. One result of a fatality is typically an OSHA investigation. An action item that could result from this investigation would be to increase security guards. This is a perpetual cost that could continue for several months to years. Video systems enhance guards’ efficiency Video systems have been shown to improve the efficiency of guards, allowing them to have eyes on multiple areas Video systems have been shown to improve the efficiency of guards, allowing them to have eyes on multiple areas at the same time. The systems can be coupled with the use of video analytics to alert guards to specific situations such as motion in areas that should be unoccupied or traffic proceeding in an unauthorized direction. In these ways, video systems can reduce the quantity of physical guards, thereby reducing the cost. One of Salient’s customers is saving almost US$ 20,000 per month with the reduction of two guards and it has OSHA’s approval. The end result is that the safety of the employees has been increased and operational cost is lowered by implementing technology. Inadvertently, this same type deployment at another facility helped mitigate a US$ 900,000 slip-and-fall lawsuit, which could have also been a possible cause for an OSHA investigation. Validation of safety policy Validation of safety policy can also be a drain on resources. Auditing seatbelt use for forklift drivers, pedestrians using appropriate marked walking paths, and proper social distancing in work spaces are a few examples among many. Assigning an individual to monitor this activity is costly and people typically obey the rules only when that individual is present. However, video can capture this information all the time without huge labor cost. This information can then be audited and used for education processes. OSHA statistics indicate that there are roughly 85 forklift fatalities and 34,900 serious injuries each year, with 42 percent of the forklift fatalities from the operator's being crushed by a tipping vehicle. The safest place for the driver to be is strapped. A facility that used video to audit seatbelt usage showed a 65% compliance rate. After the information was presented to the manager and employees, the next audit resulted in a jump to 87% compliance rate. In the event of an injury, this type of verifiable data can go a long way to prove that the employer is serious about employee safety and investing in ways to improve the safety culture within the company. Using video to increase sales LTL is a very competitive business and it is viewed primarily as a commodity type operation LTL is a very competitive business and it is viewed primarily as a commodity type operation. A few pennies per pound can typically sway a decision-maker. Already some great operational efficiencies and benefits from video to lower cost and to making LTL more competitive has been discussed. But these ideas still don’t move LTL out of the ‘dog-eat-dog race to the bottom on price’ world. Now, let’s look at how to use the implementation of these same video systems to provide value propositions and competitive advantages for customers. Many LTL customers have sensitive merchandise for which the safety and security of its delivery might outweigh cost differences. An example is freight regulated by government agencies, such as Drug Enforcement Agency (DEA), Alcohol, Tobacco and Firearms Agency (ATF), and Dept. of Energy (DOE). For example, the DEA reported ‘The overall trend of incidents of Controlled Prescription Drugs lost in transit increased in 2018 with the highest number since 2010.’ Extra layer of security And the ATF’s Interstate Theft Program states that ‘Under the program, hundreds of reports of thefts and losses from interstate shipments are received each year’. With statistics like these, customers in these categories have a heightened sense of vulnerability. Offering systems such as surveillance video can add that extra layer of security and added confidence. This is a marketable differentiator to help LTL companies set themselves apart from the traditional companies that only offer a lower cost. This, bundled with some of the other cost-saving measures outlined above, could be the icing on the cake needed for security departments to convince C-Level executives in their organization to invest in video.
Round table discussion
As a subset of the larger economy, the security industry is bound to feel the effects of an economic downturn. Such was the case in 2020 when the COVID-19 pandemic undermined economic growth and presented a brand new set of challenges to business. The security industry has been able to pivot toward emerging opportunities, but that success has been offset by broader economic challenges. We asked this week’s Expert Panel Roundtable: What impact, positive or negative, has the larger economy had on the security marketplace in 2020?
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.
The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?