Internet of Things (IoT)
Companies are following government guidance and getting as many people as possible working from home. Some companies will have resisted home working in the past, but I’m certain that the sceptics will find that people can be productive with the right tools no matter where they are. A temporary solution will become permanent. But getting it right means managing risk. Access is king In a typical office with an on-premise data center, the IT department has complete control over network acce...
Arcules, innovators in integrated video and access control cloud services, announces the appointment of Bruce Nisbet as Senior Director of Sales. In this role, Nisbet will help guide the regional sales teams and develop strategic initiatives for expanding the reach of the company’s cloud-based services in key markets. With more than 30 years of security, video surveillance, sales and management experience, Nisbet has executed successful sales strategies and business development initiative...
GlobalPlatform, the standard for secure digital services and devices, publishes a new specification that simplifies the communication between embedded Secure Elements (eSEs) and connected devices. The specification now supports the serial communication interfaces – Serial Peripheral Interface (SPI) and Inter-Integrated Circuit (I2C) – that are widely deployed in smartphones, wearables and other internet of things (IoT) devices. Biometrics matching on SE The standardization of the...
AAEON, a provider of IoT and AI edge computing solutions, is helping to power the pandemic response with the BOXER-6638U rugged embedded box PC. Featuring Intel Core i3 processors, the BOXER-6638U brings the power of industrial computing to mobile X-ray machines, used to perform chest X-ray scans of suspected COVID-19 patients. This vital equipment helps increase the speed and accuracy of diagnosis, and prevent the spread of the pandemic. The spread of Coronavirus disease 19 (COVID-19, previous...
Accellion, Inc., provider of the enterprise content firewall that consolidates, controls, and secures sensitive third party communications, announces key capabilities that protect the sensitive data remote employees access, share and collaborate on while working from home. Hackers tap into a treasure trove of PII, PHI, and IP when they leverage home network vulnerabilities like weak passwords, unpatched software, and connected IoT devices such as smart TVs and virtual assistants. Now, confident...
Morphean’s CEO, Rodrigue Zbinden, explores the benefits of hosted video surveillance and access control, and what the growing interest from the IT community might mean for the physical security sector. Digital transformation continues to have an impact on every industry. In the physical security sphere, traditional CCTV and access control systems that once sat outside the connected world, are being replaced by their intelligent, cloud-enabled equivalents. The tired stand-alone legacy solu...
Arecont Vision Costar (AV Costar), a globally renowned IP-based megapixel camera technology and video surveillance solutions provider, has unveiled multiple high performance cameras for the ConteraIP megapixel (MP) series. The four new models build upon the high performance, superior image quality, outstanding reliability, ease of installation, and competitive pricing that are the hallmarks of ConteraIP. “We’ve taken the most in-demand form factors from our proven MegaIP single, dual, and multi-sensor camera families to bring similar choices to our expanding ConteraIP series,” said Brad Donaldson, Vice President of Product Development at Arecont Vision Costar. “ConteraIP will now address an even wider variety of challenging customer requirements as these new NDAA-compliant cameras roll out in coming weeks.” ConteraIP MicroDome LX cameras Indoor models feature a built-in microphone, while the outdoor MicroDome LX includes integrated IR illuminators The newly unveiled ConteraIP MicroDome LX IP cameras offer customers the choice of indoor ultra-low profile flush mount models for discreet surveillance or compact surface mount versions for indoor/outdoor use. Indoor models feature a built-in microphone, while the outdoor MicroDome LX includes integrated IR illuminators. All MicroDome LX cameras deliver up to 30fps of megapixel video and include a motorized remote focus lens for rapid setup, with choice of 1080p (2.1MP) or 5MP resolution. The new ConteraIP MicroDome Duo LX offers twin, independent domes with motorized remote focus lens, each capable of up to 30fps of megapixel video. The Duo is ideal for indoor/outdoor applications such as coverage of hallways, walkways, and corners, or for monitoring ATMs or POS terminals where a 4-sensor Omni or panoramic camera may not be suitable. The compact platform brings models with 4 (2x1080p), 10 (2x5MP), or 16 (2x8MP) MP resolution choices, each with twin remote focus motorized lenses. ConteraIP Omni LX cameras AV Costar continues to build upon its legacy of surveillance industry leadership in adjustable-view multi-sensor models with the unveiling of the new ConteraIP Omni LX. The highly flexible remote-focus camera series offers 4 high resolution megapixel sensors with motorized remote focus lenses for easy installation and setup. Omni LX offers the choice of 8 (4x1080p) or 20 (4x5MP) megapixel resolution with the customer’s choice of interchangeable lenses. Each sensor can be adjusted to the perfect individual view then remotely focused. The Omni LX delivers up to 360-degrees of non-stop coverage of virtually any scene for complete situational awareness. The Omni LX reduces complexity and cost, using a single PoE IP cable, IP address, and VMS license (on most VMS systems) instead of multiples of each being required for individual single-sensor cameras. NightView low light technology and H.265 compression ConteraIP cameras offer enhanced WDR up to 120db for varied lighting conditions, NightView low light technology, and H.265 with SnapStream+ & M-JPEG support. Other common features are high frame rates, defog technology, on screen display, MicroSD card support (most models), and multi-streaming capability. Just as in the entire MegaIP camera family, all four of the new ConteraIP models include both NDAA (National Defense Authorization Act H. R. 2500) and ONVIF compliance, plus are IP66 environmental and IK10 impact resistance rated. 360-degree Fisheye Panoramic and multi-sensor cameras Existing ConteraIP models include compact single sensor 360-degree Fisheye Panoramic cameras With the addition of these newest megapixel models, the ConteraIP camera series covers an even wider range of video surveillance and security system needs for a wide range of applications. Existing ConteraIP models include the compact single sensor 360-degree Fisheye Panoramic cameras with built-in microphone and two award-winning multi-sensor cameras - the 4-sensor 180-degree Panoramic with integrated IR and the Omni LX Remote Setup, which features 4 remotely positioned and focused motorized sensors for the ultimate ease of installation and configuration with non-stop surveillance across up to 360 degrees of coverage. ConteraIP Indoor Dome and Micro Bullet cameras The ConteraIP family further includes single-sensor ConteraIP Indoor Dome and award-winning indoor/outdoor Micro Bullet, Bullet, and standard Outdoor Dome models. EX series Bullet and Dome models complete the ConteraIP lineup, offering choice of standard and optional advanced analytics. Visitors can see the newest ConteraIP series in action at the Costar booth, #8045, at ISC West 2020, which has now been rescheduled to July 20-22 in the Sands Convention Center, Las Vegas, Nevada, USA.
Malwarebytes, a globally renowned advanced endpoint detection and remediation solutions provider, has announced that it has hired Adam Hyder as its new Senior Vice President of Engineering. In this role, Hyder will drive Malwarebytes’ product development, innovation strategy, technical vision, and cloud operations. “Adam is known for being a gifted technology strategist with a contagious energy. He has built many successful products and propelled companies during critical growth periods,” said Marcin Kleczynski, CEO of Malwarebytes. SaaS solutions expert Marcin adds, “I knew immediately when I met Adam that his drive and creativity would be the perfect addition to our engineering team to help us stay ahead of a consolidating market and build the right products for our customers both today and in the future.” Hyder joins the Malwarebytes team with over 20 years of experience in engineering and a reputation for skilled management and strategic expertise. He has a proven track record of successfully bringing large-scale consumer and SaaS products to market and accelerating growth. Importance of cyber security In a digitized world, cyber security is the backbone we need to build tomorrow’s technology responsibly" “In an increasingly digitized world, cyber security is the backbone we need to build tomorrow’s technology responsibly. Enterprises and consumers alike are taking advantage of the convenience and efficiency offered by the Internet of Things and new mobile tools, but neither can ignore the risks that these technologies inherently expose us to,” said Adam Hyder. He adds, “I look forward to ensuring Malwarebytes continues to make the world more secure through innovations on its cutting-edge cyber security solutions.” Nebula and OneView cloud platforms Among Hyder’s first projects at Malwarebytes, he was instrumental in the launches of Malwarebytes Nebula cloud platform and OneView, a cloud-based operations console designed for MSP Premier Partners. Malwarebytes Nebula provides cloud delivery and management across the entire Malwarebytes’ product portfolio including Incidence Response, Endpoint Protection, and Endpoint Detection and Response. OneView enables MSPs to grow their revenue through streamlined delivery of high-value security solutions to their small-to-medium enterprise customers. Prior to Malwarebytes, Hyder was EVP of Engineering at BlueJeans Network. He also served as the CTO of Jobvite and as the CTO of Yahoo HotJobs. Hyder started his career with Sun Microsystems, where he worked on Java technology in its early days.
Cybersecurity specialists and decision makers from all over Europe gathered to Helsinki, Finland on 13th of February to discuss what the new 5G technology means to cybersecurity, digital infrastructure and user-centric services. Forum’s keynote speakers included leading global experts of the field such as Jakub Boratyński from the European Commission, Steve Purser from ENISA and Timo Harakka, Finland’s Minister of Transport and Communications. Reasonably priced connections The Finnish Transport and Communications Agency Traficom, and The National Cyber Security Centre Finland operating as part of Traficom arranged the event. Traficom is a modern wide-scoped agency, which promotes the transport system and traffic safety, and boosts digitalisation and trusted digital services. Traficom supports sustainable development and ensures that everyone in Finland has access to high quality, secure and reasonably priced communications connections and services. Changing the future of the society starts from vision and courage, and it starts today" Safeguarding the future digital society and working on 5G cybersecurity form one essential part of Traficom's cutting-edge future-oriented work on improving via innovation. It focuses on the phenomena of the digital society, seeks solutions, builds networks and helps companies and other authorities to prepare for the future. "Changing the future of the society starts from vision and courage, and it starts today", says Kirsi Karlamaa, the Director-General of Traficom. Fifth-generation wireless communication technology The forum was preceded by the world’s first open 5G cybersecurity hackathon where 70 cybersecurity specialists and whitehat hackers from 15 different countries got a chance to test their skills on 5G technology provided by Ericsson, Nokia and Oulu University. Finland and Traficom as a visionary authority received praises for progressing and initiating the work focusing on 5G cybersecurity during Finland’s Presidency of the Council of the European Union in 2019. Mr Jakub Boratyński, Head of Unit for Cybersecurity and Digital Privacy from the EU Commission presented the EU Toolbox for 5G cybersecurity and emphasized Finland´s proactive role in the EU work around 5G cybersecurity. This decade will see the expansion of 5G-based services and infrastructure, and cooperation between different players developing the fifth-generation wireless communication technology is essential. Cybersecurity community Focus on end-to-end thinking were recurring themes in the keynotes and presentations" The first ever Leading Edge 5G Forum organized in Helsinki draw together companies, cybersecurity influencers and industry members, EU representatives and authorities, academics and members of the cybersecurity community to discuss the future opportunities and challenges concerning 5G. "The Leading Edge 5G Forum indicated that there is a strong will within the community and industry to share experiences and discuss the future of 5G and cybersecurity. Going forward, Traficom will continue this cooperative work with all stakeholders and organize discussions where exchange of ideas is possible", says Kalle Luukkainen, the Deputy Director-General of The National Cyber Security Centre Finland. Security and privacy risks “We initiated this work but our vision is that going forward the cybersecurity hackathons and the Leading Edge 5G Forum could be a collaborative European wide activity. Therefore, we challenge all interested parties to get in touch with us and to join the effort of putting together the next cooperative actions and a cybersecurity hackathon in 2021. Our common aim is to safeguard the future digital society. Building digital trust globally, strengthening the existing ecosystem and focus on end-to-end thinking were recurring themes in the keynotes and presentations heard during the event.” Forum speakers also emphasized that 5G is designed to be more secure than its predecessors and cybersecurity has received a massive focus in 5G’s development. However, there is work to be done as the diversity and volume of novel IoT devices and their control systems will continue to increase and pose a new kind of security and privacy risks and additional threat vectors as we move to 5G and beyond.
Pulse Secure, the provider of software defined Secure Access solutions, announces that growing demand for hybrid IT and Zero Trust resulted in over 110% annual increase in sales of its Advanced Access Suites. Additionally, the company announces continued achievements in new business, product offerings, customer service and corporate growth. Enterprises are taking advantage of workforce mobility and Internet of Everything connectivity while managing rising security risks and data protection obligations. According to a 2020 Zero Trust Progress Report, 40% of IT organizations surveyed will increase their access management budgets through 2020, with more than half planning to move Zero Trust access capabilities to a hybrid IT (on-premises and cloud) implementation. Delivering continuous user and device authentication “Growth in our secure access suites validates that organizations see value in consolidating disjointed tools and disparate policies in favor of more integrated platforms designed for hybrid IT. The results of which fortify their security posture and deliver demonstrable productivity, visibility and compliance benefits,” said Sudhakar Ramakrishna, CEO of Pulse Secure. Pulse Secure’s Zero Trust value proposition is realized through its award-winning Access Suites “We remain focused on providing the easiest, most comprehensive portfolio of secure access solutions that allow enterprises and service providers the greatest flexibility, efficacy and scale as they advance their digital transformation and cloud computing interests.” Pulse Secure’s Zero Trust value proposition is realized through its award-winning Access Suites. The Suites deliver continuous user and device authentication, protected connectivity, and extensive visibility and threat response across mobile, network and cloud environments. Single-Pane-Of-Glass management The integrated Suite provides easy access for end users and single-pane-of-glass management for administrators. Organizations can centrally orchestrate Zero Trust policy to enable compliant access to applications, resources and services no matter where they reside; on-premises, in private cloud and public cloud environments. Key annual milestones of the company’s outstanding growth in Secure Access include: Access Suites sales grew by 43% and account for half of all sales Access Suite, Advanced edition sales grew by 112%, aligned to increased multi-cloud IT adoption New customer acquisition grew by 67% with subscription sales growing by more than 20% Managed Service Provider (MSP) sales grew by 42% as MSPs leverage new program benefits Activating software defined perimeter Pulse SDP is an access suite add-on which activates software defined perimeter (SDP) featuresPulse Secure is uniquely positioned to bring together core secure access functions with required interoperability for hybrid IT and multi-cloud. Purchased separately or as part of a Suite, the company’s portfolio includes remote access, Mobile Device Management (MDM), Multi-factor Authentication (MFA), Single Sign-on (SSO), endpoint and IOT device security, Network Access Control (NAC) and virtual Application Delivery Controller (ADC) solutions. Introduced last year, Pulse SDP is an access suite add-on which activates software defined perimeter (SDP) features within existing suite components to provide direct device-to-application trusted connectivity only after successful user, device and security state verification. Security posture validation Pulse Secure continues to invest in its Secure Access portfolio and customer service initiatives. The company delivered hundreds of new and enhanced features in 2019, including: Enriched user experience with always-on and per-app multiple L3 tunneling and intelligent load balancing Enhanced user and device security posture validation via native agent and agentless Client Provisioning automation via DHCP and OpenStack support and extended CLI and REST-API functions New Entity and User Behavior Analytics (EUBA) leveraging machine learning (ML) Broader conditional access controls and third-party integrations across NGFW, SIEM, MFA, SSO, endpoint security, and Industrial Control System (ICS)/IoT connectivity Offering remote access software To complement solution innovations, Pulse Secure also rolled out new training and certification programs through its global network of authorized training partners. To date, hundreds of customers and partners have attended the company’s training programs and more than 350 professionals have achieved certification. Pulse Secure wants to help businesses continue to run while keeping employees, friends, and family safe Additionally, the company recently announced offering remote access software to organizations as they support employees working from home during the Coronavirus health crisis. In a world where natural and man-made disasters occur, Pulse Secure wants to help businesses continue to run while keeping employees, friends, and family safe. Institutionalized professional development Pulse Secure’s attention to employee empowerment, engagement and corporate culture continues to attract top talent globally. Pulse Secure increased its global workforce by 6% in 2019 across support, engineering, sales and marketing, and institutionalized professional development for all departments. Pulse Secure was distinguished as a ‘Great Place to Work Certified Company’ this past fall. The certification was based on independent survey results of employee experience and culture measured against global benchmark data. The company was also recognized among the top Workplaces by the Bay Area News Group for the second year in a row.
Dahua Technology, a video-centric smart IoT solution and service provider, successfully launched its brand new solution for smart night surveillance, the WizSense Full-Color Series Network Camera. Unparalleled night surveillance This new camera series embraces Dahua Technology’s four major technological innovations: Large Aperture Lens - Features F1.0 super large aperture that collects 2.5 times amount of light compared with F1.6 aperture, creating brighter image. High-Performance Sensor - Offers 30% photosensitive capacity increase through its larger sensors. Advanced ISP - Dahua ISP 4.0 greatly improves Signal-to-Noise Ratio (SNR) and color reproduction. Warm Light - The weighted radiance of blue light is 40% below European Union standards, which presents lower light pollution and less harm to human eyes. With these four technological advancement, Dahua Full-Color Camera delivers unparalleled performance at night. It achieves 24/7 monitoring by capturing vivid details and presenting colored images in low light conditions. General IR Camera vs. Full-Color Camera At the same time, it provides warm and smart auxiliary light to guarantee image clarity and quality even in total darkness. Thanks to its built-in AI functions, higher monitoring accuracy at night is guaranteed. Dahua Technology delivers both SMD and Full-Color for night surveillance advantages to its customers. On one side, SMD can easily process visual information collected by Full-Color Camera. On the other side, the Full-Color Camera significantly increases the accuracy of SMD at night (see table below). SMD Accuracy In addition, Dahua SMD has the ability to effectively filter false alarms triggered by pets, leaves, branches, raindrops, lights and other irrelevant objects, and only focus on real threats, human and vehicle. SMD Accuracy at Night Product Human Accuracy Vehicle Accuracy Traditional Camera ≥90% ≥90% Full-Colour Camera ≥98% ≥98% *Figures are affected by different lab conditions. Utilizing the two advanced technologies, Dahua WizSense Full-Color Camera can accommodate a wide range of application scenarios, such as museums, cinemas, factories, villas, schools, etc. Users no longer need to worry about the high cost of patrolling or leaving their property unguarded at night. This solution is fully capable of meeting the demands of ordinary users, delivering a safer and cost-effective solution for night surveillance.
The new open and modular video system platform MOBOTIX 7 changes the way video surveillance and video analytics are used. With an ever increasing portfolio of hardware, software and intelligent solutions, MOBOTIX applications are not only solutions for current requirements but also scalable for the future needs of various industries. MOBOTIX 7 video system platform The main areas of focus are the utilities, energy and mining industries. MOBOTIX 7 is the latest addition to the MOBOTIX family and enables deep learning and AI tools in addition to the standard for which MOBOTIX is known; reliability and performance. MOBOTIX sets new standards in the market - Extremely robust, extremely sensitive, and incredibly secure The MOVE models, the proven Mx6 and the new MOBOTIX 7 series cover all industry requirements, from high-quality industry standard to AI-based IoT video systems developed for innovative and future applications. MOBOTIX sets new standards in the market - Extremely robust, extremely sensitive, and incredibly secure - Beyond Human Vision. Need for reliable, sustainable solutions With complex applications needed in utilities, mining, energy and treatment plants not to mention oil and gas, the need for powerful, reliable and sustainable solutions is more important than ever. Whether it is due to Health and Safety, cost management, efficiency, asset recovery or just simply security MOBOTIX can deliver in any environment to any standard. The robust MOBOTIX video systems 'Made in Germany' are designed to reliably cope with the extremely demanding external influences in the energy, utility and mining sectors: they can withstand even the most extreme conditions over a long period of time. Highly sensitive optics, thermal sensors, infrared emitters and intelligent apps master the most difficult optical conditions, such as fog, haze and darkness. Preventing unauthorized access and elementary damage "The cameras' Mean Time Between Failure (MTBF) average service life is 80,000 hours (> 9 years)," explains Hartmut Sprave, Chief Technology Officer (CTO) of MOBOTIX AG. "We offer exactly the right overall solutions that are tailored to the respective company in the industry." Critical infrastructure must be secured at all times. Intelligent MOBOTIX video systems recognize dangers before they can spread and with their early fire detection Thermographic solutions, preventative measures can be taken. Cybersecure video surveillance solutions For MOBOTIX, a complete solution does not only mean covering today's needs" "For MOBOTIX, a complete solution does not only mean covering today's needs. We demand that our solutions are future-proof and offer our customers from the utilities, energy and mining industries comprehensive, robust and at the same time sensitive and cybersecure video surveillance solutions that help them to protect their systems, their employees and the environment and to meet future requirements," emphasizes Thomas Lausten, Chief Executive Officcer (CEO) of MOBOTIX AG. All industries and verticals have been subject to cyber-attacks. This is why MOBOTIX solutions, which are as robust as they are intelligent, have strict cyber security protocols which are constantly being increased to maintain the highest level of security we can offer. MOBOTIX only uses powerful and high-quality electronic components. This principle is consistently applied right into the digital world. Cyber security is a top priority at MOBOTIX and is strictly adhered and maintained through the MOBOTIX Cactus Concept. MOBOTIX IoT cameras for enhanced data security MOBOTIX cameras are high-performance computers with eyes and focus on data security and protection. The entire video analysis - and optionally also the recording - takes place in the camera. The self-sufficient IoT cameras transmit images - securely encrypted end-to-end to the highest standards The self-sufficient IoT cameras transmit images - securely encrypted end-to-end to the highest standards - to the network only when relevant events occur. Transmitting less data also means fewer opportunities for cyber-attacks. Edge computing eliminates the need for central video servers and recording devices. CNPP certification for enhanced cyber security MOBOTIX has been certified for cyber security by the internationally renowned French testing institute CNPP (Centre National de Prévention et de Protection) as the first European manufacturer in CCTV as well as Secure by Default from the UK and also penetration tested by SYSS in Germany. MOBOTIX is also committed to data security in compliance with the German Data Protection Act (DSGVO). Both access rights and camera settings can be adjusted according to the application and sensitivity. MOBOTIX cameras are 100% ‘Made in Germany’ for the highest possible cyber security reliability.
As New York City hip hop group Non Phixion boldly proclaimed in their 2002 debut album: The Future Is Now. From drone fleets and autonomous transportation systems to smart homes with computer-controlled lighting, heating, media and security systems, a new group of highly-automated technologies is gripping the popular imagination. These technologies – known collectively as the Internet of Things (IoT) – form advanced ecosystems of interrelated devices with the capacity to monitor, detect, communicate and act on the real world independently of human intervention. Promising to fulfill all of our wildest technological dreams and needs, the IoT age has arrived – and it looks like its here to stay. While the consumer applications of IoT tend to receive the most attention, one area that is seeing strong growth in the uptake of IoT devices is workplace safety. Workplace safety costs businesses billions every year, and industries with especially hazardous working environments – Construction, Oil & Gas, Mining, Utilities, Rail, etc. – are beginning to adopt IoT technology to help minimize risk and address preventable threats. Before exploring these IoT solutions, however, let us first consider some of the key threats faced by workers in these industries. Workplace safety Construction is one of the world’s most dangerous occupations, accounting for 1 in 5 worker deaths in the US and incurring tens of thousands of short- and long-term injuries each year. In construction, the major risk is falling from a height, which accounts of 26 per cent of fatal injuries in the workplace. Additional risks come from being struck by vehicles and heavy moving objects, proximity to overhead/underground high voltage power lines, confined spaces, high noise environments, and exposure to dust and fumes. In underground mining operations, hazards include respiratory health problems In Mining & Quarrying, sustained overexertion is the most common threat to workplace safety, accounting for 24 per cent of nonfatal injuries. In surface mining operations, specifically, the leading hazards come from geological instability (i.e. falling rocks), blast debris and collisions with large and heavy plant equipment. In underground mining operations, hazards include respiratory health problems (e.g. Black Lung), explosions and gas leaks (particularly in coal mines), heat stress, confined spaces and ionising radiation. Other industries are often faced with some combination of the above, or similar, threats. In the Rail sector, for instance, there is high risk from collisions with vehicles, objects and machinery and vulnerability to electric shock. In Utilities, the number one risk is slips, trips and falls, accounting for 30 per cent of Lost Workday Injuries (LWIs) in 2016. And in Oil & Gas extraction, exposure to flammable gas, chemical emissions and oxygen-deficient atmospheres creates vulnerability to explosions and chemical poisoning. Tackling threats in a high-tech world What, then, is being done to tackle these threats? In a high-tech world, many safety measures currently in use – hardhats, earplugs, gloves, gas masks, guardrails, harnesses, protective goggles and high visibility clothing – appear decidedly primitive. Therefore, whilst these measures are still useful in minimizing risk, companies have started to integrate IoT technologies to enhance their application. These technologies bring together real-time analytics, machine learning, advanced sensors and embedded systems to offer a number of key functionalities: Physiological monitoring Wearable technology is used to monitor a worker’s physiological state in real-time. Japanese wearable tech company Mitsufuji is active in this space, creating smart clothes woven from silver-metallised fibres that collect a range of data about its wearer, including heart rate and body temperature. Other examples include wristbands with bio-sensors to accurately measure stress levels and glasses that detect eye movements to identify fatigue and periods of micro-sleep. Environmental monitoring Sensors used to measure temperature, radiation, gas leaks, carbon monoxide and other harmful chemicals can automatically alert workers to unsafe external conditions. Additionally, visual imaging software can map 3D representations of a worker’s environment, facilitating effective two-way communication between supervisors and personnel in the field, and remote guidance technologies provide live assistance to workers caught in serious danger (e.g. guide a miner trapped in a tunnel to the best way out). Situational awareness, training and behavioral data Augmented Reality (AR) technologies offer new ways to support decision making in the field by providing holographic representations of physical equipment, while Virtual Reality (VR) technologies offer immersive situational training without the risks associated with real-life procedures. These technologies also offer up valuable behavioral data, which can be used to gauge a worker’s risk tolerance level and tendency to respond to danger. Proximity detection Proximity detection systems utilize wearable sensors to monitor workers’ location, map their movements, and alert them to nearby hazards. One example of this are radio-frequency identification (RFIDs), which can measure a worker’s proximity to moving equipment and alert them to possible collisions and near misses. Another piece of kit is the ‘smart helmet’, which can immediately detect an accident, determine the worker’s location and send an alert containing coordinates to a safety control centre. The centre is able to make video and audio contact and communicate with the worker until help arrives. Exoskeletons Exoskeletons can assist with heavy lifting and the prevention of musculoskeletal disorders (MSDs) by analyzing worker movements and providing the necessary support. The Chairless Chair, for example, used by factory floor workers, fixes around the back and legs to provide support whenever the worker sits or crouches. Exoskeletons are also used to monitor worker movements, identifying repetitive movements and sustained periods of overexertion. IoT technologies and innovations IoT innovations are helping to improve workplace safety on multiple fronts Taken together, these IoT innovations are helping to improve workplace safety on multiple fronts. Firstly, they are preventative. By closely monitoring one’s environment – both internal and external – IoT technologies can pre-empt and alert workers to potential dangers. Secondly, they are responsive. In the case of an accident, IoT technologies can alert supervisors and help coordinate a quick and effective response. Thirdly, they are informative. By accumulating and analyzing rich pools of data, IoT technologies can help optimize work in the field and find improved ways to limit risk. While IoT certainly cannot eliminate all risk from the workplace – it cannot prevent rocks falling in quarries, explosions on oil rigs or gas leaks in mines – it can go a long way to make these environments safer and better places to work. Because when it comes down to it, workplace safety is certainly no accident!
Many industries are, to a greater or lesser extent, in the throes of digital transformation. As with any change program, digital transformation efforts often under-perform against expectations. Yet, the number of digital transformation programs continue to increase, as commercial pressures intensify. As security professionals we need to embrace our role in digital transformation, as security is everybody’s business. For all those people weary of hearing about digital transformation and believe it’s a business fad, consider your own behaviours. If you use a smartphone to search, find, order, buy, message, watch, learn, play, bank, pay, enter, exit, navigate, communicate and more then you are part of the reason that digital transformation is a commercial necessity. The way we live our lives has changed significantly over the past twenty years and this needs to be reflected into how we rethink the way we do business. Digital transformation is about more than technology, it allows people to solve their traditional problems in new and better ways than before. Better can mean faster, at lower cost, using fewer resources, easier to maintain, more compliant and/or easier to report insights. IoT, criminal activity and security The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billion. Internet of Things (IoT) means digital transformation converges physical and digital for security professionals. Criminals use smarter digital tools such as malware, drones, key cloners, signal readers and more, which impact both physical and cybersecurity. To counter this, digital transformation provides security professionals with As security professionals we need to embrace our role in digital transformation, as security is everybody’s businessaccess to valuable actionable insights to identify and deter threats to people and assets. All transformation starts with an idea generated by people and ends with people experiencing the output. Therefore, digital transformation starts and ends with people. To ensure a solid foundation to any digital transformation agenda, people need to have a clear purpose to engage. This is where security leaders can inspire their colleagues with a laudable purpose of embracing disruption at the same time as focusing on safeguarding people and assets. Non-security colleagues should understand that security risks are advancing at a faster pace than enterprises can adapt. As a security leader, you are advocating a movement where your colleagues adopt relevant enterprise security risk management practices in their daily thinking and working. The message is clear that digital transformation presents abundant opportunities and these need to be evaluated alongside the proliferating security threats that can become a business continuity failure. Security professionals and digital influence The number of internet connected devices worldwide is increasing at an exponential rate; by the end of 2025 there are expected to be 75.44 billionSecurity professionals can influence digital transformation success by translating an enterprise’s strategy into secure operational reality. The security narrative should emphasize the people side of digital transformation and how technology can act as an enabler of a safe and secure experience, both for employees and customers. Operationally, digital transformation is about agility, adaptability and navigating uncertainty. Old ways of thinking and working will be blockers to transformation, so security leaders ought to identify the rapid enablers of a ‘secure’ digital transformation. Better people, processes and overall technology People generally don’t want more in their lives, they want better. Better people. Better data. Better technology. Better processes. Digital transformation creates significant ‘better’ benefits for security: For example, connected (IoT) sensors, video analytics at the edge and machine learning identify threats faster; workflow technologies and automation detect, investigate and remediate routine responses; cloud provides many benefits such as agility, scale and mobility; and, smartphones/digital devices provide real-time communication and collaboration. Tackling all the ‘better’ needs within a security approach is necessary – focusing on the prioritised commercial needs first. Think about how to drive radical simplification into digital transformation agendas to ensure complexity doesn’t create too many unmanageable risks. Designing enterprise security risk management into the business operating model will facilitate colleagues to be empowered for safe and secure change. Communicating security successes and breaches with commercial impact insights in a timely and concise manner across the enterprise will prove the value of active security engagement throughout digital transformation programs. Transforming the world Digital technology is transforming the world around us, in a way that impacts every area of security. Security professionals are now businesspeople and technologists, in addition to their traditional security remits. Embracing this impacts security recruitment, training and employee engagement, within the security team and with non-security colleagues. Without a doubt, security professionals are integral to digital transformation programs.
Being in the physical security industry for almost two decades has been an exciting journey, with significant changes that have impacted the world of security. Companies today must be proactive when it comes to securing their facility and are lucky to have so many choices when it comes to security technology. From the beginning, the ISC West show was always at the forefront of new technology and brought together the very best technology and industry professionals in the “City of Lights”. Back in 2001 when I first entered the security world, video surveillance was the key driver, and transitioning from analog cameras to IP video cameras was the talk of the town. In the early 2000s, the ISC West show was filled with video manufacturers showcasing their new IP cameras and the IT folks were just starting to get involved with the security decisions. Back then the ISC West show consisted of a myriad of video manufacturers exhibiting their camera lines. Where now in 2020 the high-profile enterprise-level camera manufacturers dominate the show floor. Over the last two decades, keeping up with the technology advancements of IP cameras was a difficult feat for most camera manufacturers and the high-profile manufacturers who had the funds to invest in R & D were the only ones that survived. Changing the game in video surveillance and access control In the early 2000s, the ISC West show was filled with video manufacturers showcasing their new IP cameras Another huge change that our industry has seen over the years was the increase in the number of acquisitions. Smaller security manufacturers started being acquired by the larger ones, which changed the game in video surveillance and access control. In addition to manufacturers, large security integrators like Convergint Technologies & Anixter were also buying smaller commercial integrators and dominating the market. At ISC West today, you will see predominately high profile – big name manufacturers and integrators where the smaller companies were either acquired or went out of business. Revolutions in the industry The security industry also faced a huge revolution with three major technologies driving growth in the security market – Network-based technologies (IoT enabled solutions), Access Control as a Service (ACaaS) and Mobile Credentials. ISC West saw this evolution coming and created specific educational seminars dedicated to these topics. Another big push that came into play in the last few years was being able to integrate a host of technologies like video and access control by using an open architecture platform. Many partnerships were formed in the security industry due to this massive push for integration. At ISC West, we now see many companies having their partners sharing booth space. This helps reduce costs for exhibitors in addition to giving smaller companies credibility by being recognized with the bigger players in the industry. In addition, ISC West makes it easy for attendees to plan out their show schedule in advance with the mobile app; creating a convenient way to access show information from mobile devices. From the beginning, the ISC West show was always at the forefront of new technology Emerging excitement Today, ISC West continues to be an exciting show that is jammed packed with educational sessions, networking events, and new pavilions that help segment the security industry into different sectors. An example of some new technology pavilions includes drones & robotics, loss prevention & supply chains, and emerging tech. All new start-up companies that are 5 years old or less can be part of the emerging tech section of the show. Here entrepreneurs can unveil new and upcoming security technologies; creating a win win situation for any size business looking to make its name known in the industry. New technology, innovations and rising trends Another huge focus at the ISC West show is public safety. A full range of solutions are offered at the Public Safety Pavilion including barriers/bollards/gates/perimeter security, surveillance, access control, and alarms - along with innovative technologies for gunshot and drug detection, license plate recognition, acoustics, facial recognition and AI, connected vehicles, communication systems and devices, alerts and monitoring, and active shooter solutions Today, ISC West continues to be an exciting show that is jammed packed with educational sessions, networking events, and new pavilions and training. Virtual reality demonstrations have also been available at the show to help attendees with preventative measures when it comes to school and public safety. Some new vape and metal detection technology built on the IoT concept will be featured at ISC West 2020 to help combat the vaping epidemic in our country. With active shooter incidents on the rise, metal detection and perimeter protection at schools will be an important part of the show. Awards and showcases When it comes to show press, we have also seen an influx of awards for security manufacturers that are exhibiting at the show. The major security publications have been offering manufacturers the opportunity to submit a product in distinct categories and win a prestigious award at the show. This creates “buzz” about your product and great for social media postings. Live video interviews at an exhibitors’ booth has also become a very popular tool to increase brand awareness and thought leadership for exhibitors. The ISC West show offers numerous ways to drive traffic to your booth and promote new product launches seamlessly. Over the years, the show has created a conduit The ISC West show offers numerous ways to drive traffic to your booth and promote new product launches seamlesslyfor manufactures and integrators to showcase new products and technologies to end users across multiple vertical markets. At the top of the game While the security industry continues to evolve, the one thing that stays constant is the wealth of information that ISC West offers to its attendees. The show always brings together the latest technologies and thought leaders that will continue to change the game in security for years to come.
As security embraces IT-centric solutions, it can provide business value over and above security. Now in charge of managing a variety of data – e.g., from video platforms – a company’s security function has access to a range of new metrics. While security may use video to analyze a security event, machine learning can analyze the same data for other business capabilities, such as quality control or when a policy has been breached. “It’s the same camera, but with dual purpose,” says Matt Kushner, President of STANLEY Security. STANLEY Security, one of the largest integrators with a global footprint, has positioned itself at the center of the industry’s transformation by information technology (IT) and the Internet of Things. “Security will become an expanded business partner with corporations,” Kushner comments. In response to the trend, STANLEY is hiring more IT-oriented technicians and salespeople within the IT community and who can “speak at the C-level,” Kushner comments. Sonitrol is the most recognised brand by law enforcement for verified response Data centers, higher education and logistics STANLEY manages very large, multi-national clients. As a consequence, the STANLEY security organization has some of the best and brightest minds for enterprise-class security. To maintain that level of talent, STANLEY is committed to education. “We bring them into the family and focus on education, such as IT and IoT training. That’s critical in a world where unemployment is less than 3%. Finding good people, growing good people, and retaining good people – we do that exceptionally well at STANLEY,” says Kushner. STANLEY’s strong vertical markets including data centers, higher education, and logistics. They are also strong in multi-location installations (such as banking.) STANLEY has a big footprint throughout North America and Europe. PACOM access control and 3xLOGIC cloud-based solutions In addition to STANLEY’s core integrator business, the company also manages several manufacturing brands such as PACOM access control and 3xLOGIC cloud-based solutions. Mergers and acquisitions have been commonplace in the integrator spaceBeyond its company-owned integrator locations under the STANLEY brand, the company also owns Sonitrol, the strongest brand in the market for verified response with 65 franchises in North America. Sonitrol is the most recognized brand by law enforcement for verified response. Mergers and acquisitions have been commonplace in the integrator space, and Kushner says that STANLEY is “open and actively looking for properties that fit our commercial growth strategy.” He notes that STANLEY focuses on the commercial side of the market, where there are good margins and continuing growth. They pay less attention to the residential side which is “being heavily disrupted.” Strong partnerships with manufacturers STANLEY has strong partnerships with several manufacturer partners, through which they bring new breakout technologies to market from emerging companies. An example is Evolv Technology, a manufacturer of gun and bomb detection technology. “We see them as a leading provider of the technology, and they are, in my mind, a very disruptive provider,” says Kushner. STANLEY is also collaborating with a company – to be announced – that provides a unique gunshot detection technology, he says. STANLEY is also cooperating with dormakaba to implement Switch Tech, a Bluetooth wireless core that can replace any standard mechanical lock core. Existing locks can be transformed into electromechanical locks in minutes. STANLEY is also developing a tight integration with Lenel’s mobile credentialing system. STANLEY is also cooperating with dormakaba to implement Switch Tech GSX 2019 and ISC West 2020 At the recent GSX 2019 show in Chicago, Kushner says STANLEY heard a lot about cybersecurity, especially customers wanting to make sure they are investing in cyber-hygiene and who are looking to expand into providing cyber protection. “In concert with cyber-hygiene, they are looking for health monitoring or assurance that network devices are operating properly,” he says. “They want to ensure their security platforms are cyber-secure and up to date with the latest software versions.” STANLEY is also a big proponent of cloud offerings, and Kushner hints at a big announcement at the upcoming ISC West show in Las Vegas of additional cloud offerings and/or partnerships. “There will be a variety of new solutions to be introduced, including hosted solutions and applications that benefit both security and that add new value to businesses overall.”
Securing New Ground, the security industry’s annual executive conference this week in New York, offered food for thought about current and future trends in the security marketplace. Highlights from SNG 2019 included keynote remarks from security leaders at SAP, Johnson Controls and the Consumer Technology Association, discussions on how CSOs mitigate security risks, topic-focused thought leadership roundtables and a lively networking reception. Top trends observed at the event include cybersecurity, data privacy, facial recognition and artificial intelligence. A "View from the Top" session covered the need for companies to consider responsible use and ethics around technology; responsibility should extend throughout the organization. A panel of security leaders emphasized the need to understand the diversity of risks that end users face. As the Internet of Things (IoT) expands connectivity, the inputs, outputs and "attack surface" also expand. It's critical to have security "baked" into products themselves, and also to undertand the mission of the organization being protected, the context and correlation. Technologies transforming security market Keynote speaker Gary Shapiro, President and CEO of the Consumer Technology Association, listed the many technologies that will impact the consumer electronics market – and the security market – in the near future: artificial intelligence (AI), voice recognition, the transition to 5G and self-driving cars.As the Internet of Things expands connectivity, the inputs, outputs and "attack surface" also expand “What we're seeing today is a huge turning point in where the world is going,” said Shapiro, whose organization presents the giant CES trade show each year in Las Vegas. “It’s not just about jobs and technology, but who we are and how we address fundamental human rights.” Privacy is a component of human rights, but “in the world of AI, there is a tradeoff between innovation and privacy”. Balance between security standards Shapiro sees Europe as representing one extreme of privacy, epitomized by General Data Protection Regulation (GDPR), which he sees as stifling innovation. Meanwhile, China is pushing innovation using massive amounts of data with no regard to privacy. The United States, therefore, should look for a balance that acknowledges the inevitability of innovation while respecting privacy and realizing it is “always situational.”With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place" Too much concern for privacy comes at a cost, Shapiro said. “Privacy zealots are killing facial recognition, step by step by step,” he said. “Regulators should not throw away the baby with the bathwater. Every technology in history has been used to cause evil and to do good. Throughout history any new technology could have been banned and made illegal.” Shapiro offered encouraging words to the security marketplace, even in the wake of large tech firms such as Amazon entering the market. “With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place,” he said. “There is opportunity. There will be increasing new things people want, and always new threats. People will want what you're providing, which is physical and technology security in their facility.” Scott Schafer, Chairman of the Board of the Security Industry Association (R), interviewed Steve Jones, CEO, Allied Universal, on stage about the importance of merging technology with security officers Allied Universal CEO Steve Jones discussed holistic approach Steve Jones, CEO, Allied Universal, was interviewed on stage about the importance of merging technology with security officers for a holistic approach to securing a facility. “Today, customers are asking us to look at their facility holistically and asking: What is my best approach?” said Jones. A holistic approach includes protecting people, the facility, intellectual property (IP), and how to handle visitors. Manguarding perspective on security Allied Universal looks at security from a manguarding perspective and also from a technology perspective, based on their daily experience managing security for 40,000 customer sites across the United States and Canada.Allied Universal has a new handheld technology platform that uses AI “We are in a unique position in the channel,” said Jones. “We know the stats at any customer site. We know the last time there were repairs on cameras, which card reader is malfunctioning, how long the systems company takes to respond to a call. We are at these locations 24/7 and have an intimate relationship with customer. We are a significant influencer in the decision-making process. We have an opportunity to have a voice, and to build a business around it.” Predictive security “We are looking for technology that will enhance the security of the customer,” said Jones, including situational awareness and analysis of data to predict patterns. Allied Universal has a new handheld technology platform that uses artificial intelligence (AI) to analyze data, predict outcomes, and prescribe optimum responses. Workforce development – hiring and training new employees – is a big issue for Allied Universal, which last year interviewed more than a million applicants to find around 100,000 employees. They are targeting every demographic, and last year hired 33,000 veterans. The company is using technology to help with the massive recruiting effort, including AI to analyze applicant qualifications and a computer-generated avatar to conduct the first online interview. Future security challenges Jones sees the rapid increase in the homeless population in the United States as one of the biggest security challenges of coming years. The rapid increase in the US homeless population is one of the biggest security challengesMany businesses face the prospect of homeless individuals living in front of their buildings, possibly using drugs or approaching customers. “It has become a real threat,” he said. “When they are living in front of your buildings, in many cases, there are ordinances that allow them to be there so the police will not get involved. It falls on the facility owner and private security to address the problem. Given the large homeless population we have now during good economic times, I don’t know what it will look like in an economic downturn.” Human side of security An SNG session on the human side of security observed that people are the biggest source of vulnerability. Companies should foster a "safety climate" in which security is integral to operations and viewed as something that helps employees rather than create hassles. Human resources is now a technology field and should work together with security to achieve shared goals. At the consumer and small business level, cybersecurity must also be top-of-mind and built into a security companies' DNA. SNG attendees heard about opportunities to move beyond providing products and devices to providing experiences, by partnering with customers to protect what matters most to them. While a bit of inconvenience comes along with security, products should be built in a way that is easy to use, with security baked in. The results are systems people are comfortable engaging with every day. Securing New Ground is presented by the Security Industry Association (SIA).
The boundaries between the smart home market and security market at large are narrowing. Amidst a wave of expansion, suddenly everything is becoming digital. Home automation has been around for close to 30 years but hasn’t really hit it big because integration hasn’t been that simple. Now that the Internet of Things has stepped into the market, home automation is really taking off. As technology in the smart home market advances, the gap between the residential and professional security markets is growing smaller. Additional revenue for security industry There will continue to be more opportunity for interoperability, and home automation will continue to grow and eventually become a norm. Growth in the residential security market and its position as the channel for smart home solutions, have attracted numerous new entrants. Telecoms, cable operators, and CE (consumer electronics) manufacturers are joining traditional security players as they compete to fulfill consumer demand for safety and security. Connected products also provide a layer of competition as consumers must decide whether having category devices such as doorbell video cameras, networked cameras and other products suffice for their security. Smart home services can provide additional revenue streams for the security industry. In Parks Associates’ 2017 survey of U.S. security dealers, 58% report that smart home service capabilities enable extra monthly revenue. Almost half of dealers also note they have to offer smart home devices and services in order to keep up with their competition. Data capture form to appear here! Residential security solutions Growth is going to be slow and steady. Everyone needs to be realistic about that" The trend has no doubt accelerated in the last couple of years. New collaborations are being made between audio-video (AV) suppliers and security solution providers. The clientele of high-end AV products is becoming increasingly concerned with home security and property protection. So, in recent months, the requirement for residential security solutions has been increasing as technical solutions can go hand in hand with AV installers’ capabilities and client base. “One of the big mistakes many make is that they assume – based on some of the hype and big market investments – that the smart home market is set to explode,” says Michael Philpott, Senior Practice Leader, Consumer Services at Ovum. "This is not the case – growth is going to be slow and steady. Everyone needs to be realistic about that, rather than expecting some rapid ramp up simply because some big names have entered the market.” Pressure to upgrade security standards Surprisingly for what has historically been something of a grudge purchase, in the context of home automation, security is seen as a solution some consumers are looking for. Another security aspect of home automation is cybersecurity, in particular how it applies to various IoT devices in the home. Now as connected devices gather personal information from realms long considered private and protected – the bedroom, the kitchen counter, the nursery – the risks are higher than ever. All of the data that various devices and sites have collected can be combined, shifted and then exploited by marketers or even stolen by hackers. Both manufacturers of smart home products and the companies that install them are feeling pressure to upgrade security standards. They are moving to set policies that will regulate who has access to data and how it is used. Ease of installation Advances in the home market are increasing customers’ expectations as well as adoption of newer technologies A recent revelation that some “smart TVs” might be listening to conversations and transmitting them to "third parties" caused an uproar. These sets have voice activated features that enable users to change channel, turn on a DVD or browse the internet by speaking to the screen or remote. The fine print in privacy policies contains warnings that general conversations are also being heard, and one company even told owners to turn off this function if they were concerned. Another impact of smart homes on the security marketplace is to raise expectations about the capabilities of commercial systems. Products made today for residential applications are very high quality, easy to install (do-it-yourself, or DIY), and have very rich feature sets. End users expect their commercial solutions to have a similar ease of use and ease of installation. Geofencing in commercial applications The quality of video that people are seeing at home is motivating some legacy commercial customers to finally move to IP video from lower resolution analog cameras. A higher percentage of commercial customers use cellphone applications to view integrated video and access control data. People’s experience with smart thermostats has them asking for geofencing in some commercial applications. In short, advances in the home market are increasing customers’ expectations as well as adoption of newer technologies. Read part two of our smart home mini series here.
The year 2020 is bound to be a special year with the outbreak of coronavirus disease 2019 (COVID-19) globally. The highly contagious disease has taken away many lives and counting, especially in China, South Korea, Japan, and some countries in Europe and Middle East. Dahua Technology, globally renowned video-centric smart IoT solutions and services provider, has been an early participant in the epidemic prevention and control in Asia, joining the global efforts in combating the virus to minimize the impact on mankind. Dahua Thermal Solution Since sending its first batch of thermal cameras to the hardest-hit area Wuhan on January 24th, 2020 Dahua Thermal Solution has been deployed in thousands of sites in China, including transportation hubs, commercial complexes, banks, and other places, and some are on the way to multiple countries in Asia. Hong Kong, a financial capital in Asia, also suffers from the COVID-19 epidemic situation. Dahua Thermal Solution has been applied in some local business complexes, banks, company parks, and other places. To enable safe and smooth work resumption recently, quite a few major corporations have been using Dahua Thermal Solution in their headquarters and subsidiaries to improve their workplace safety. Dahua Thermal Solution measures the body temperature of their employees, handling thousands of staff flow every day. Thermal cameras deployed at virus-hit zones Using Dahua Thermal Solution will significantly improve speed and accuracy in body temperature measurement Compare to the traditional way of body temperature measurement – a forehead thermometer, using Dahua Thermal Solution will significantly improve speed and accuracy, and at the same time, help reduce cross-infection via non-contact measurement. To measure the temperature of 5,000 people, it will take about 4.2 hours using a forehead thermometer, as it takes at least 3 seconds to measure a person. However, it takes only 30 minutes if using the Dahua Thermal Solution, which measures 3 person per second. It also features a high accuracy of ±0.3℃ . Epidemic prevention and control “Dahua Thermal Solution helped us detect a couple of suspected cases in just a few hours of operation, which we greatly appreciate,” a Hong Kong user commented. Dahua Thermal Solution has been on the front line since the very beginning, helping with the epidemic prevention and control in airports, railway stations, hospitals, schools, and other sites all over Asia. Featuring high accuracy, high efficiency, strong adaptability and easy deployment, Dahua Thermal Solution can also be applied to all kinds of entrances and exits, kitchens and kindergartens.
Oman Airports manages and operates all civil airports in the Sultanate of Oman. As a result of the growing aviation sector in the Middle East, Salalah, Duqm and Muscat International airports were all recently redeveloped with new state-of-the-art terminal facilities and technologies. Access control solution To protect Oman Airport’s growing number of passengers and new hi-tech terminal buildings, Oman Airports required an advanced access control solution that not only incorporated the latest advances in technology but also had proven resilience within the aviation industry. With 30 years’ experience of securing airports around the world, the CEM Systems’ AC2000 Airport security management system was the ideal match. As the largest airport in Oman, Muscat International’s upgrade was a landmark $1.8 billion expansion project. Phase one involved the construction of a new state-of-the-art 580,000 sqm Terminal 1 building, which was officially inaugurated for operations in March 2018. CEM intelligent card readers additionally feature a large internal database for offline card validation" Airport edition access control system “Oman Airports required a proven, fully integrated security solution to secure Muscat Airport’s new hi-tech Terminal 1 building, as well as a number of its external peripheral buildings. At the same time we were also awarded the contract to secure the new Salalah and Duqm Airports in Oman. “This allowed all three airports to use the CEM Systems’ AC2000 Airport Edition access control system and share a commonality of security infrastructure for operational excellence. We congratulate Oman Airports in their achievement and are delighted to be part of such an important leading infrastructure project for the development of Oman.” said Philip Verner Regional Sales Director, Security Products, Johnson Controls. Intelligent IP card readers CEM Systems’ range of intelligent IP card readers with integrated controllers (S610e, S700 readers) were installed throughout Oman Airports to provide the highest possible level of on-board smart card technology. CEM intelligent card readers additionally feature a large internal database for offline card validation and can store up to 200,000 cardholder records and 50,000 transactions offline. This ensures zero system downtime, prevents any loss of transaction data and delivers the highest possible level of system reliability within airports. Over 3,000 CEM IP card readers were installed throughout Muscat Airport’s new Terminal 1 to protect airside and landside locations, including 45 arrival and departure gates, 29 jet-bridges and 82 immigration counters. Emerald touchscreen terminals CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport A large number of outlying annex buildings (spread out over 30,000 m2) were also secured with CEM intelligent card readers. These included a new 97m high Air Traffic Control (ATC) tower, aircraft hangars, cargo and crew facility buildings and the new pivotal headquarters building for the Public Authority for Civil Aviation (PACA). CEM Systems’ emerald touchscreen terminals have also recently been chosen by Duqm airport for heightened security. Emerald is a combined access control card reader and controller featuring fully integrated Voice over IP (VoIP) intercom, onboard Power over Ethernet technology and a range of smart airport applications and operational modes, all in one single, powerful terminal. Integrated biometric and access control solution For areas of heightened security, over 1,300 CEM fingerprint card readers (S610f & emerald fingerprint terminals) have also been installed throughout all three Oman airports. As an all-in-one advanced IP card reader, controller and integrated biometric solution combined, CEM fingerprint readers uniquely provides three layers of security (card, PIN and biometric verification) via one hardware device and one integrated software enrolment process. This eradicates the need for a separate biometric enrolment solution, provides a quick and accurate biometric read time and ultimately creates less biometric verification errors at the door/gate. Intelligent IP readers critically provide Oman Airports with aviation specific door modes Gate room management CEM Systems’ intelligent IP readers also go beyond security by helping airport operations. Intelligent readers are used to enable air-bridge monitoring, provide check-in-desk enabling, control baggage belts and assist with airport passenger flow and gate room management. Intelligent IP readers critically provide Oman Airports with aviation specific door modes such as ‘Passenger mode’ which enables the efficient management of gate rooms for departing and arriving passengers. Passenger mode controls the open times of single or interlocking doors, ensuring Gate Room doors are opened or closed depending on the configuration set for a specific flight. The user-friendly LCD screen on CEM card readers effectively acts as a smart information point for ID staff and flight agents and allows staff to easily manage the Gate Arrivals process on the ground. S3040 portable hand-held readers Oman Airports now utilise portable card readers to enable random ID checks on personnelCEM Systems’ S3040 portable hand-held readers uniquely protected Muscat International Airport during its initial construction phase in December 2014. Portable readers enabled ID card validation at temporary airport site entrances and gates, which at the time of construction had no power or comms. Oman Airports now utilise portable card readers to enable random ID checks on personnel throughout all three airports. Designed specifically for airports, CEM Systems’ AC2000 Airport security management system provides powerful aviation-specific access control throughout airside and landside areas. Using a range of powerful AC2000 Airport software applications, Oman Airports benefit from sophisticated ID badging, airport visitor management and high levels of airport systems integration. Open architecture integration tools CEM Systems’ open architecture integration tools successfully enabled the AC2000 access control system to be seamlessly linked with other airport security systems including video, perimeter detection and Oman Airport’s central ‘Airport Operating System’ for the resolution of maintenance faults. This ensures that system maintenance faults and alarms are dealt with promptly, efficiently and with full accountability. Oman Airports use the CEM Systems’ AC2000 VIPPS application to manage airport pass applications and biometrics To provide the highest possible level of smart card security to over 30,000 authorised card holders, all three Oman Airports utilise highly secure CEM DESFire smart card technology with multiple layers of encryption. Oman Airports use the CEM Systems’ AC2000 VIPPS (Visual Imaging Pass Production) application to successfully manage airport pass applications and biometrics. AC2000 Visitors application The AC2000 Visitors application also provides a powerful tool for Oman Airports to monitor and control ID card access for visitors and temporary airport staff. Information such as ‘name of airport sponsor’ can be recorded and once visits have been completed, cards can then be recycled, creating efficiency savings within the airport ID centre. Moving forward, CEM Systems will continue to work together in partnership with Oman Airports and their chosen system integrators as all three airports move into their next development phases. It is understood that airport security needs and legislation requirements change over time and thus CEM Systems will remain flexible to help meet their evolving project needs.
BI-City Tokyo is located in Nur-Sultan (Astana), the capital city of Kazakhstan. It is a high-end residential complex of BI Group – a renowned construction holding company in the Kazakhstan real estate market. At present, three apartment buildings with public areas and more than 400 apartment units have been completed. Aiming to create modern high-end intelligent buildings and residential areas, the BI Group wanted to upgrade the existing analog video intercom system of BI-City Tokyo. Replacing analog intercom system The original analog intercom system in this community is outdated and cannot meet the diverse security requirements of high-end residential areas. First, the original analog intercom does not support retaining images and leaving messages. Second, this system only supports access cards to open doors, which is inconvenient for residents in case they forgot their card. Third, the original system cannot add IP cameras to monitor public areas such as children's playground, fitness areas, etc. Fourth, the cold winter temperature in Nur-Sultan requires high-performance equipment capable of operating in extreme environments. Faced with the abovementioned challenges, BI Group was also looking for a trustworthy brand that can provide not only modern smart system but also technical support and reliable after-sales service. Meeting all the above requirements, Dahua smart residential solution was chosen to be the security solution provider of BI-City Tokyo. Dahua Smart Residential Security Solution The complete solution deployed more than 300 pieces of Dahua equipment, including IP cameras The complete solution deployed more than 300 pieces of Dahua equipment, including Indoor Monitor, Apartment Outdoor Station, IP Camera, Access ANPR Camera, Video Recorder, etc. The solution supports two-way audio intercom, real-time video and messaging feature. In addition, a variety of door opening methods were also implemented: door opening via remote calling, door opening using access card, and remote door opening via APP. Additionally, all the equipment can be visualized and integrated in the Dahua DSS platform for centralized management, operation and maintenance. Moreover, the temperature in Nur-Sultan can reach up to negative 40 degrees in winter season. This requires high-performance outdoor devices featuring dust and water resistance, and explosion-roof capability. In response to this pressing challenge, Dahua apartment outdoor station VTO1210C-X-S1 and access ANPR camera ITC237-PW1B-IRZ that support wide working temperature were installed at the entrance of the apartment building for a more effective visitor and vehicle management. ANPR and IP cameras installed When a visitor arrives at the entrance of the apartment building and dials a resident’s room number through the Dahua apartment outdoor station, the camera installed at the entrance will synchronize the video with the visitor’s image captured in the resident’s indoor monitor. Once the visitor’s identity is confirmed, the resident just needs to press the button on the indoor monitor to open the door remotely. With Dahua app, users can even answer calls and open doors remotely when they are out for work or traveling. As for vehicles, Dahua access ANPR camera ITC237-PW1B-IRZ is designed for extreme temperature environments (temperature range of -40°C to +60°C). With built-in intelligent video analytics, the camera has the ability to detect and recognize moving vehicle's plate number within low speed. Vehicle tracking and identification For both approaching and departing vehicles, the access ANPR camera takes a snapshot of the number plate and vehicle overview picture, as well as records corresponding surveillance videos. By setting a whitelist, the camera can automatically control the barrier or gate to open if a plate number recorded in the whitelist has been recognized. The public areas including children's playground, fitness areas, as well as the lobby are covered by 2MP IR Mini Dome Network Camera IPC-HDBW4231E-ASE, 2MP and 3MP IR Mini-Bullet Network Camera. The Starlight Ultra-low Light Technology of IPC-HDBW4231E-ASE offers industry-leading light sensitivity, capturing color details under low light condition up to 0.002lux. The camera uses a set of optical features to balance light throughout the scene, resulting in clear images in dark environments. Integrated management platform Dahua smart residential solution provides an integrated management platform for the personnel of BI-City Tokyo Dahua smart residential solution provides an integrated management platform for the management personnel of BI-City Tokyo. It assists in the remote and visual management of the property and improves the services and facilities they offer. Security guard at the entrance is not needed anymore to manage entering and exiting vehicles, which saves labor costs, reduces the waiting time of vehicles and improves traffic efficiency. In addition, the all-round monitoring of the public areas within BI-City Tokyo greatly improves the safety level of the entire community. The video intercom system of the building provides a variety of convenient door opening methods, enhancing the resident’s living experience. IP video intercom solution “We adopted analog solution in the first phase. From the second phase, we replaced all of analog system with Dahua’s IP video intercom solution. We hope that Dahua will help us complete the solution planning of the three, four, five, and six phases,” said Arman Lesbekov, General Manager of BI Group. Dahua Technology is an internationally renowned video surveillance and security solutions provider with more than 6000 professionals in their R&D team, dedicated to providing cutting-edge products in technologies like AI, IoT, Cloud services, video, cyber security, and software reliability with high quality and performance. Video surveillance systems expert Since 2014, Dahua has ranked second in the global video surveillance equipment market according to an IHS report, and in 2017 Dahua ranked third in the A&S International "Security 50". The company believes in investing and building strong R&D capabilities for new technology and innovation.
Device and application security solutions provider, Trustonic has announced that OPTOLANE has selected Trustonic Secured Platform (TSP) to bring security and trust to the company’s new connected medical diagnostic device. The product is primarily used at the point-of-care for early diagnosis and preventative healthcare, particularly for diagnosing cancer, infectious diseases and congenital abnormalities. Healthcare devices have become top targets for cybercriminals due to their critical nature, the valuable intellectual property they employ and the sensitive personal information that they collect and store. Research shows that there were 8.2 attempted cyber-attacks per connected healthcare endpoint in each month of 2018. Smart diagnostic platform OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform To ensure security, privacy and high performance, OPTOLANE’s simple, fast and smart diagnostic platform is based on Nexell’s system on chip (SoC) platform, which integrates Trustonic’s Trusted Execution Environment (TEE). OPTOLANE’s in vitro diagnostic (IVD) platform, called LOAA (Lab on an Array) Analyzer, examines blood and tissue samples for multiple targets, including DNA, RNA, proteins and metabolites, in real-time. It was developed to satisfy market demand for ‘sample to answer’ IVD tools and enables sample extraction through to analysis with a single cartridge. “Investment in connected healthtech is increasing and IVD is an important segment in the global diagnostics industry,” comments Ben Cade, CEO of Trustonic. “These solutions add significant value to diagnosis and treatment, enhancing the well-being of the general public while increasing productivity and reducing costs. But, where personal data this sensitive is being captured, processed, and transmitted, the appropriate steps must be taken to protect it from malicious actors.” Trustonic security platform Trustonic’s hardware-backed security platform, TSP, enables secure and private data extraction, processing, storage and transmission. The technology: Enables a secure image processing channel from the sensor to the application processor; Provides cryptographic tools to protect individuals’ sensitive medical data; Ensures data integrity; Creates a secure environment to run algorithms analyzing raw data from the sensor; Encrypts sensitive data when being shared with the cloud. Do Young Lee, CEO of OPTOLANE, says “There is clear demand for innovative new diagnostics solutions that go from ‘sample-to-answer’ in real-time. Importantly, though, we fully understand our responsibility to protect patient data." Enhanced data security To deliver connectivity while protecting the sensitive personal data collected by diagnostic devices, we needed a proven hardware-backed security foundation. Trustonic’s experience protecting smartphones, wearables and IoT hardware, and securing critical mobile applications in the financial and automotive sectors, is assurance that our devices and patient data are secured to the highest standard.” OPTOLANE expects to receive FDA certification for the new device in the first quarter of 2020. Once certification is achieved the product will be available to clinicians in healthcare facilities around the world.
Located in Eastern China, Hangzhou is the capital and most populous city of Zhejiang Province. It has registered population of 9,800,000, with total area of 16,596 km². Jianggan District is one of the five main urban areas of Hangzhou. With a floating population of about 1.06 million, Jianggan District ranks first among Hangzhou's main urban areas. As the new administrative center of Hangzhou, it boasts the most important CBD and the largest train station and car hub in Hangzhou, bringing together various traffic elements such as highway junctions and bridges across the river. The entire Jianggan District is promoting vital transformation in urban areas Intelligent surveillance system Covering 8 streets, 141 communities and 4 villages, the entire Jianggan District is promoting vital transformation in urban areas. Nevertheless, the non-registered population, accounted for about 40% of the total population, makes it hard for the local government to improve urban management in the district. Every policeman needs to manage 1,700 citizens on average. The shortage of police force affected their work precision and led to difficulties in providing timely police response. In addition, insufficient surveillance coverage and limited intelligence system in the area resulted in inactive security measures, making it difficult for the police to achieve their goals Integrating DoT, IoT and the internet Based on the Dahua Heart of City (HOC) architecture supported by "Full Sensing, Full Intelligence, Full Computing and Full Ecosystem (4 Full) capabilities, Dahua Technology firmly focused on the construction needs of the area and built the overall plan of establishing an ‘online police’. Integrating the Internet, DoT and IoT, Dahua Technology has successfully assisted the Hangzhou Jianggan Public Security in building a multi-dimensional network that targets customer value, and combines AI, big data, and cloud computing in order to obtain accurate real-time data and strengthen the current technology of “online police” operations. Sensors and monitoring products Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network Moreover, Dahua Technology deployed 19 sensors, hundreds of monitoring products and a sophisticated network. It also set up 46 actual police investigation models to provide accurate instructions for Jianggan police, including property crimes analysis, situation analysis, vehicle management, people management, psychiatric control, online apprehension of violators, as well as missing person search, etc. Compared with traditional police operation, Dahua HOC Safe City Solution has built an “Online Police” mechanism to obtain the most authentic real-time data through information technology, and carry out accurate computer applications for a more scientific service deployment, efficient police force and powerful security control. Dahua HOC Safe City Solution It ensures that the Jianggan police can perform properly at a given time. It also promotes the transformation of police affairs from passive to active, from extensive to subtle, from imprecise to accurate, and from offline to online, gradually carrying out the prediction, early-warning, and prevention measures of police operations. Since 2016, the Dahua HOC Safe City Solution has helped Jianggan Public Security achieve outstanding results including enhanced police intelligence, reduced crime cases, increase in case closure rate and efficiency, improvement in public service, and speedy recovery of missing individuals, opening a new chapter for intelligent police operations.
Located at the very heart of Amman, Jordan, Landmark Amman Hotel is one of the most renowned 5 star hotels in the city, as well as a true local landmark in more than one ways. Boasting seventeen flexible event spaces for everything from small intimate meetings to large-scale exhibitions and 258 rooms that are among the largest hotel accommodation in Jordan, Landmark Amman Hotel is an ideal choice for high-end customers of many types. Dahua Technology, a video-centric smart IoT solution and service provider, is trusted, for the first time in Amman, with the job of keeping Landmark Amman Hotel safe in its phase 2 CCTV improvement. Need of a competent surveillance system The other challenge concerned old system’s storage, which couldn’t meet the requirement of local policeIt is difficult for a large-scale hotel like Landmark Amman to patrol the grounds and premises of the hotel relying only on security personnel. Moreover, there might be no standardized evidence for the police to check without a competent surveillance system when an accident happens. There are two aspects of the old system to be improved. The analog system the hotel was using was not easy to manage, the problem which was exacerbated by the condition that a great number of cameras were broken. The other challenge concerned old system’s storage, which couldn’t meet the requirement of local police. IP camera and NVR solution Dahua Technology’s CCTV solution comprising IP camera and NVR solves the problems just right. IPC-HDW1431S, the 4MP WDR IR Eyeball Network Camera, supports Smart Coding (H.265+ & H.264+), Intelligent Video Analysis(IVS), Wide Dynamic Range(WDR), Smart IR Technology, etc., which is fully capable of smartly capturing the 4MP resolution images in hotels. NVR4216-4KS2, the 32 Channel 1U 4K&H.265 Lite NVR can be served as edge storage, central storage And NVR4216-4KS2, the 32 Channel 1U 4K&H.265 Lite Network Video Recorder, which supports 4K and H.265 encoding technology, can be served as edge storage, central storage or backup storage with an intuitive shortcut operation menu for remote management and control. Compatible with ONVIF 2.4 protocol Easy to install, it is compatible with numerous third-party devices making it the perfect solution for surveillance systems that work independently of video management system (VMS). It features an open architecture that supports for multi-user access and is compatible with ONVIF 2.4 protocol, enabling interoperability with IP cameras. Dahua surveillance system has helped Landmark Amman Hotel find a new way to enhance the guest experience through improving the level of security with reduced property damage and thefts in hotel. It also improved team cohesion and work efficiency of the hotel employees. Furthermore, the hotel could increase revenue by monitoring and invoicing according to actual numbers of guests, and be compliance with local authorities’ security and safety regulations.
Round table discussion
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
2019 was a big year for the Expert Panel Roundtable. The range of topics expanded, and we had more participation from more contributors than ever before. In closing out the year of contemplative discussions, we came across some final observations to share. They can serve both as a postscript for 2019 and a teaser for a whole new year of industry conversations in our Expert Panel Roundtable in 2020.
RFID and Smartphone Readers in Physical Access ControlDownload
Access Control & Intelligent Vehicle ScreeningDownload
How Plate Reader Technology Increases Your Perimeter SecurityDownload
Genetec To Host Its First Virtual Tradeshow Connect’DX 2020 To Connect With Physical Security Professionals