India’s foremost shop window and business hub for the security industry, Secutech India, is set to return from 25 – 27 April 2019 against a backdrop of rising government investment in smart city projects. Jointly organized by Asian Business Exhibition and Conferences Ltd (ABEC) and Messe Frankfurt Trade Fairs India Pvt. Ltd, the 2019 edition of the fair will introduce a new smart home zone to accommodate India’s growing home automation sector. Indian Security IndustryOn top of the commercial security and fire safety sectors, home security solutions are also on the rise" The show is set to kick off within the context of a positive outlook for the Indian security industry. Just one of many causes for optimism is the government’s commitment to smart city projects, which include investments totaling USD 7.3 billion in 100 cities across the country. These investments are bolstering the already promising surveillance and access control markets, which are forecast to grow at an impressive CAGR of approximately 10% and 15% until 2021. “Thanks to positive market conditions and Secutech India’s track record of generating new business within the security industry, over 100 exhibitors have signed up to exhibit at this 8th edition of the fair,” said Ms Regina Tsai, Deputy General Manager, Messe Frankfurt New Era Business Media Ltd. “On top of the commercial security and fire safety sectors, home security solutions are also on the rise. To meet the sourcing requirements of this growing sector, we are delighted to have added a new ‘smart home zone’ to this year’s show floor. Visitors to the zone will find the very latest home video surveillance systems, alarm systems, access control systems and integrated home networks.” Fire And Safety India In total, trade visitors will have 15,000 sqm of exhibition space to explore during the fair. While the new smart home zone will be of great interest to these visitors, the show’s commercial security suppliers are likely to remain the largest attraction for buyers. Assa Abloy, Avigilon, CP Plus, ESSl, Hikvision and Veracity, are just a few of the well-known brands that will be displaying their latest video surveillance, analytics, biometrics and access control technologies for the commercial security sector during the fair. The show will also welcome the return of the concurrent ‘Fire and Safety India’ event In addition, the show will also welcome the return of the concurrent ‘Fire and Safety India’ event. The event provides coverage to the entire spectrum of fire safety products, including the likes of fire detection and alarm systems, emergency lighting, escape ladders, evacuation equipment and fire protection gear. Strong channel buyer turnout With so many crossover sourcing opportunities on offer between the security, fire safety and smart home sectors, fair organizers are anticipating a strong turn out from channel buyers. At the previous edition, the fair attracted over 18,000 visitors, including builders, developers, system integrators, distributors, consultants and project owners. Thanks to its extensive series of forums and seminars, Secutech India serves as the perfect occasion for industry players to gather the latest market intelligence. This year, fair organisers have collaborated with knowledge partners PwC India and MitKat Advisory to design a program that will tackle the most important issues facing the regional security industry. India's Smart City Projects The panel discussions will focus on the future of India’s smart city projects One of many highlights is the ‘Smart Urban Infrastructure – Monitoring & Surveillance Framework’ panel discussion, which will take place on the first day of the fair. The panel discussions will focus on the future of India’s smart city projects, as well as cyber security, emergency preparedness, and emergency response mechanisms. In addition, the third day of the program will be dedicated solely to the fire and safety sector, with a series of seminars covering safety solutions for India’s densely populated urban areas. A hands-on training experience for fire safety practitioners and corporate professionals will also feature, in the shape of the ‘Fire Safety Volunteer Training’ program. Run by the State of Maharashtra Fire Services, the training will give participants information on different types of fire-fighting equipment and how to use them correctly during fire incidents. Attendees will also learn about fire safety legislation, fire drills, evacuation procedures, fire safety precautions, and the most common causes of fire. Consultant Consortium On top of the fringe events, a number of new business matching programs will be introduced to connect exhibitors with the most appropriate stakeholders. The ‘Consultant Consortium’, for example, is a business matching and networking forum dedicated to connecting exhibitors with mechanical engineering and plumbing consultants, contractors, HVAC consultants, as well as façade and architectural consultants.
Senstar, a global provider of video management and perimeter intrusion detection solutions (PIDS), is pleased to announce the release of Symphony 7.2, the latest version of its intelligent video management software (VMS). The award winning Senstar Symphony delivers an all-in-one solution for video management, video analytics, PIDS integration, and alarm management for deployments of all sizes. Key Highlights: Securely share video clips with 3rd parties with integrated cloud video upload feature Revamped Alarm Console allows for better event management with simplified workflow Seamlessly navigate from camera to camera with Visual Tracking Links PostgreSQL database support Streamlining User Experience “The latest version of Symphony further streamlines the user experience by reducing task effort in common scenarios such as video export and alarm management," said Justin Schorn, Vice President of Product Management at Senstar. "With Symphony 7.2, we continue to build on our success as one of the industry’s most trusted and reliable video management software providers." Senstar Symphony 7.2 is available worldwide in Arabic, Chinese (Simplified), English, French, German, Portuguese, Spanish and Turkish. Senstar hardware appliances such as the R-Series can be upgraded to the latest version with a valid maintenance agreement.
In preparation for ISC West, the largest converged security and public safety industry trade show, the Security Industry Association (SIA) has identified the top technology advancements to look out for at ISC West 2019. The “Top 8,” presented with ISC Security Events, represent the key technology advancements impacting the converged security and public safety landscape. The “Top 8” Security Technologies At ISC West 2019: Cloud Artificial intelligence Robotics/autonomous systems Mobile credentials Security audio Facial biometrics 5G LTE Voice control Ever-Converging Physical And Cybersecurity As physical and cybersecurity continue to converge within the broader security industry, SIA and ISC West are regularly keeping a close pulse on the latest trends As physical and cybersecurity continue to converge within the broader security industry, SIA and ISC West are regularly keeping a close pulse on the trends driving this industry transformation. Together, they present what SIA has identified as the most significant technology-first issues impacting the industry and made recommendations for security professionals looking to further their education at the show. ISC West will be held April 9-12 (SIA Education@ISC: April 9-11, 2019 | Exhibit Hall: April 10–12, 2019) at the Sands Expo Center in Las Vegas, Nevada, drawing over 30,000 security professionals and over 1,000 exhibitors and brands. A more detailed look at the Top 8 security advancements at ISC West: Cloud: Video surveillance as a service (VSaaS) is a growth area this year, as more companies deliver solutions that move recording, storage, management, analytics and monitoring solutions to the cloud. As SIA director of standards Joseph Gittens notes, this is especially common in residential video solutions, which often have low camera counts. Artificial Intelligence (AI): AI is permeating many security product categories but is most visible at ISC West in video security systems. Attendees will see analytics applications for automated motion detection and trespassing detection, advanced algorithms performing identification and categorization of persons and objects within scenes and systems that can even analyse human behavior within scenes such as long line queues and crowded situations. AI is also being used more extensively in the intrusion and alarm systems categories AI is also being used more extensively in the intrusion and alarm systems categories AI is also being used more extensively in the intrusion and alarm systems categories, with the promise of AI being able to leverage combined data from multiple sensors to help reduce false alarms and enhance home automation. Other firms are even offering AI solutions to identify cyber threats and network intrusions. Robotics/Autonomous Devices: Driven primarily by advancements in AI, power storage and mobility, steady improvements are being made in robot and drone security solutions. SIA notes that many of the companies are taking a managed service approach, allowing users to “rent” the services that these robots and drones provide. Mobile credentials: While a true mobile credentialing explosion may be a few years away, SIA expects the public to become more comfortable using mobile devices to complete transactions outside of access control. Mobile credentialing may expand into more commercial security installations, and industries will increasingly migrate to systems that incorporate all facets of identity management into unified systems capable of granting and managing access rights. Security Audio: Audio has long been a component of security systems, particularly with intercoms, emergency notification platforms and public address systems, but the industry is now delivering specialized solutions which can actively monitor audio and apply analytics to the audio –enabling functions like automated alerts on possible aggression. SIA adds that audio is proving to be a value-added augmentation to video security systems. SIA adds that audio is proving to be a value-added augmentation to video security systems Facial Biometrics: Thanks to popular consumer efforts like Apple’s Face ID and Windows Hello for Microsoft Windows 10, facial recognition has become less of the curiosity from futurist movies and more of a common place logical and physical access solution. As facial biometrics have proliferated in consumer technology, so has the technology advanced in professional solutions. SIA expects to find more presence of this solution on the show floor, particularly as verification accuracy increases and competition makes solutions more affordable. 5G LTE: With the major telecommunications firms in the process of planning their networks to support 5G LTE, which could deliver nearly 10 gigabits of data per second to a cellular phone, IoT solutions that use cellular connectivity will no longer be limited to the throughput of today’s 4G speeds. Expect to see early glimpses of technology solutions, particularly mobile video security solutions with applications primarily in public safety and smart cities –even though full 5G LTE networks are still in development and are not widely available from most carriers. Voice Control: With smart speaker adoption growing dramatically in 2018 (up 24 percent in Q2 2018 according to Nielsen), these solutions are being integrated into residential technology ecosystems. Look for new products in the areas of home security and home automation to have existing or available integration with common voice control/smart speaker providers like Amazon and Google. Voice control and natural language processing will also likely augment video analytics Augmented Video Analytics Voice control and natural language processing will also likely augment video analytics. According to SIA, in today’s analytics, users still need operators with a level of database/querying skills to find a particular event or scene, but the ability to say “Show me all persons in red shirts carrying an object who entered through door three” will prove much faster than waiting on an operator to input that analytic query manually. “Each year at ISC West, the largest audience in the security industry gathers to strengthen business connections, learn and see the latest trends in security technology,” said SIA CEO Don Erickson. “SIA is proud to be the premier sponsor of ISC West and looks forward to engaging with influential attendees through our compelling SIA Education@ISC education and training sessions, networking events and the SIA New Product Showcase.” ISC West 2019 In addition to connecting with nearly a thousand companies on the show floor, ISC West attendees will have access to 85 top-quality training sessions led by SIA. SIA Education @ ISC West provides critical information on the newest technologies in security. “ISC West has been a driving force in bringing together and educating the security and public safety community for more than 50 years. As the industry moves towards a converged mindset for physical and cyber security, it’s critical we’re addressing the technology-specific trends our attendees are looking to learn more about,” said Will Wise, group vice president, security portfolio, Reed Exibitions. “With SIA’s collaboration, we’re able to put forth this cheat sheet so attendees can easily identify the topics they care about and all the ways we can help them learn more.”
Simon Barnes, Business Development Manager – Airports EMEA at Genetec commented on the news that Police believe a current or former employee was behind the Gatwick drone incident on December 19th, 2018: “Today’s drone-related suspension of flights at Dublin airport, and the news that an insider threat was maybe responsible for the chaos that ensued at Gatwick just before Christmas shows the range of threats the industry now has to navigate. We know from speaking to airports across the world that two of the most pressing challenges they face is how they secure their perimeters (as intruders become increasingly sophisticated) and identifying ‘Friend from Foe’ as operational needs must be maintained.” Technology To Address Drone Detection “When it specifically comes to drone detection, the short-term temptation can be to introduce a dedicated new technology to address this specific threat. However, the last thing a functioning airport needs is an independent system that isn’t unified with all of the other security measures in place such as PIDs, security cameras and access control." “Only when the data from all of these inputs is visualised in one place can an airport begin to make sense of its environment and enable a fast and efficient response to evolving challenges such as the insider threat and malicious drone activities. We fully expect airports to respond to this changing landscape, to help ensure a more comprehensive response.”
The access control industry tends to be more conservative when it comes to the adoption of new technology and services for end users, but that doesn't mean that 2019 won't provide a significant amount of progress through emerging trends taking shape in the industry. In addition to the increased adoption and acceptance of the cloud, mobile credentials and biometrics are becoming more mainstream, and integrations between manufacturers will take centre stage. Here, we take a look at these and other trends helping to shape the coming year. Cloud-Based Products We're continuing to see a demand by end-user customers for customized responses to certain actions within an access control system For many access control manufacturers, the core of the business is in more traditional products, with a high percentage of installs continuing to be these kinds of projects. However, over the last couple of years, cloud-based products have emerged as a viable option for customers. We've seen more of a willingness for end-user customers to inquire whether this is an option for them, citing ease of use, remote management, cybersecurity and more as part of their foray into this branch of access control. The cloud has established its reputation as being quicker to install, more flexible for customers to access and manage both their access points as well as the video associated with these doors, and placing less pressure on internal (or in some cases, non-existent) IT teams to help set up and manage an access control system. Mobile Credentials Applications We're continuing to see a demand by end-user customers for customized responses to certain actions within an access control system. For example, if there's an alarm set off during the day along a perimeter, the ability to automatically execute a lockdown and simultaneous email or message to everyone within the building alerting them to the issue is critical. The desire for this kind of flexibility within a system is prompting manufacturers to build new simple to use graphical tools into their systems that allow customized action responses that are proportional to the level of alarm. There's a strong desire by many of today's companies to be able to use mobile phones for access control and as such, manufacturers are either developing their own mobile credentials applications or integrating their systems with these kinds of products. Over the last couple of years, cloud-based products have emerged as a viable option for customers Future Of Biometrics As companies start to ask about whether their facilities are safe enough, they're often more willing to consider access control that takes security to a new level, such as the implementation of biometric readers. Biometrics is getting more usage in professional security applications and many customers want to move away from using physical cards for access control. Manufacturers that don't currently have biometric hardware in place are starting to integrate with readers designed to offer this functionality in an effort to meet the demands of customers. The dramatic rise in facial recognition biometrics is something that will likely shape the future of biometrics as costs start to decrease. While the access control industry is highly fragmented, we're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire. Video Management Platforms We're seeing a trend toward increased partnerships and open-platform technology that helps end users achieve the kind of comprehensive security that they desire For example, there are a number of access control providers that are providing paths toward full integration with lock manufacturers and vice versa in an effort to meet the needs of clients who may have purchased locks but a high powered access control system to properly manage them. There's also a large shift toward full integration with video management platforms and access control systems to fully integrate the two into a single, user-friendly experience and give end users more control over both. Additionally, manufacturers are looking to provide customers with a single system that meets the needs they have with regards to video, intrusion and access control. Right now, I don't think there's a system that can fully deliver on the promise of being exceptional at all three, so integrations and partnerships remain important to achieve that end goal. Access Control World An increasing number of end users are realising the holes in the current Wiegand protocols that have been in place since the 1980s, along with the large number of ‘off the shelf’ equipment that's now available to allow outsiders access through readers that operate under these protocols. As a result, in the last decade or so, OSDP has come onto the scene and is growing in popularity. One of the most important steps for access control manufacturers in 2019 will be to listen to customers who are concerned with this vulnerability and work toward fully supporting OSDP in an effort to protect these access control systems. It's an exciting time to be a part of the access control world, as we finally see results from all of the hype centred around the cloud, biometrics, mobile credentials, hacking protection and strong partnerships come to fruition. As 2019 begins, look for these trends to grow in popularity and for manufacturers to really listen to the end-user customer they serve and respond in kind.
In the age of massive data breaches, phishing attacks and password hacks, user credentials are increasingly unsafe. So how can organizations secure accounts without making life more difficult for users? Marc Vanmaele, CEO of TrustBuilder, explains. User credentials give us a sense of security. Users select their password, it's personal and memorable to them, and it's likely that it includes special characters and numbers for added security. Sadly, this sense is most likely false. If it's anything like the 5.4 billion user IDs on haveibeenpwned.com, their login has already been compromised. If it's not listed, it could be soon. Recent estimates state that 8 million more credentials are compromised every day. Ensuring Safe Access Data breaches, ransomware and phishing campaigns are increasingly easy to pull off. Cyber criminals can easily find the tools they need on Google with little to no technical knowledge. Breached passwords are readily available to cyber criminals on the internet. Those that haven’t been breached can also be guessed, phished or cracked using one of the many “brute-force” tools available on the internet. It's becoming clear that login credentials are no longer enough to secure your users' accounts. Meanwhile, organizations have a responsibility and an ever-stricter legal obligation to protect their users’ sensitive data. This makes ensuring safe access to the services they need challenging, particularly when trying to provide a user experience that won’t cause frustration – or worse, lose your customers’ interest. After GDPR was implemented across the European Union, organizations could face a fine of up to €20 million, or 4% annual global turnover Importance Of Data Protection So how can businesses ensure their users can safely and simply access the services they need while keeping intruders out, and why is it so important to strike that balance? After GDPR was implemented across the European Union, organizations could face a fine of up to €20 million, or 4% annual global turnover – whichever is higher, should they seriously fail to comply with their data protection obligations. This alone was enough to prompt many organizations to get serious about their user’s security. Still, not every business followed suit. Cloud Security Risks Breaches were most commonly identified in organizations using cloud computing or where staff use personal devices According to a recent survey conducted at Infosecurity Europe, more than a quarter of organizations did not feel ready to comply with GDPR in August 2018 – three months after the compliance deadline. Meanwhile, according to the UK Government’s 2018 Cyber Security Breaches survey, 45% of businesses reported breaches or attacks in the last 12 months. According to the report, logins are less secure when accessing services in the cloud where they aren't protected by enterprise firewalls and security systems. Moreover, breaches were most commonly identified in organizations using cloud computing or where staff use personal devices (known as BYOD). According to the survey, 61% of UK organizations use cloud-based services. The figure is higher in banking and finance (74%), IT and communications (81%) and education (75%). Additionally, 45% of businesses have BYOD. This indicates a precarious situation. The majority of businesses hold personal data on users electronically and may be placing users at risk if their IT environments are not adequately protected. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine Hacking Methodology In a recent exposé on LifeHacker, Internet standards expert John Pozadzides revealed multiple methods hackers use to bypass even the most secure passwords. According to John’s revelations, 20% of passwords are simple enough to guess using easily accessible information. But that doesn’t leave the remaining 80% safe. Hackers have developed a wide range of tools to crack passwords, and these are readily available within a couple of clicks on a search engine. Brute force attacks are one of the easiest methods, but criminals also use increasingly sophisticated phishing campaigns to fool users into handing over their passwords. Users expect organizations to protect their passwords and keep intruders out of their accounts Once a threat actor has access to one password, they can easily gain access to multiple accounts. This is because, according to Mashable, 87% of users aged 18-30 and 81% of users aged 31+ reuse the same passwords across multiple accounts. It’s becoming clear that passwords are no longer enough to keep online accounts secure. Securing Data With Simplicity Users expect organizations to protect their passwords and keep intruders out of their accounts. As a result of a data breach, companies will of course suffer financial losses through fines and remediation costs. Beyond the immediate financial repercussions, however, the reputational damage can be seriously costly. A recent Gemalto study showed that 44% of consumers would leave their bank in the event of a security breach, and 38% would switch to a competitor offering a better service. Simplicity is equally important, however. For example, if it’s not delivered in ecommerce, one in three customers will abandon their purchase – as a recent report by Magnetic North revealed. If a login process is confusing, staff may be tempted to help themselves access the information they need by slipping out of secure habits. They may write their passwords down, share them with other members of staff, and may be more susceptible to social engineering attacks. So how do organizations strike the right balance? For many, Identity and Access Management solutions help to deliver secure access across the entire estate. It’s important though that these enable simplicity for the organization, as well as users. Organizations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so Flexible IAM While IAM is highly recommended, organizations should seek solutions that offer the flexibility to define their own balance between a seamless end-user journey and the need for a high level of identity assurance. organizations’ identity management requirements will change over time. So too will their IT environments. organizations need an IAM solution that will adapt to both of these factors, providing them with the ability to apply tough access policies when and where they are needed and prioritising swift access where it’s safe to do so. Importantly, the best solutions will be those that enable this flexibility without spending significant time and resource each time adaptations need to be made. Those that do will provide the best return on investment for organizations looking to keep intruders at bay, while enabling users to log in safely and simply.
In my coverage of China Tariffs impacting the security industry over four recent articles, products on the tariff schedules routinely integrated into security solutions included burglar and fire alarm control and transmission panels, video surveillance lenses, HDTV cameras used for broadcast use cases and fiber optic media converters. The general ‘callout’ of ADP (Automatic Data Processing) devices and peripherals technically includes servers, workstations and microcomputers, all of which are commonly used to support security solutions. The underperformance, from June 15 to August 24, of U.S. stocks with high revenue-exposure to China, and that of Chinese stocks with high revenue-exposure to the United States was significant and almost identical at 3.2%, significant losses to some investors already involved in security industry M&A activity. Significant Public Safety Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety While it was not apparent that practitioners’ security program budgets kept pace with the growth of the more popular solution providers like video surveillance and cyber security, the ICT industries supporting the security economy continued to expand, especially in wireless and wired infrastructure, including preparations for 5G wireless rollouts. These omnipresent technologies drove significant public safety, smart city and public venue projects in 2018. Facial Recognition (FR) vendors leveraging AI expanded their market focus to retail and public safety. In 2018, virtually every public presentation, webinar and published Q&A on social media monitoring and facial recognition technologies I worked on, involved significant pushback from privacy advocates, almost to the point of alarmism. Massive Risk Reduction Several solution providers in these areas have made significant strides on data protection, accuracy, powered by AI and documented crime reduction cases; however, this real news is quickly shadowed by privacy advocates, seemingly ignoring massive risk reduction, especially in the case of active assailants and gang-related crime. Will FR become mainstream? The cautious security industry may take a cue from the maverick retail industry, sports venue and VIP verification solution providers that grew in 2018. 2019 trends: presupposition or repudiation; winners and losers. Chinese tariffs have had a huge impact on the security industry, which can be seen from changes to U.S and Chinese stocks Although technology adoption forecasting is inexact, there are definitive opportunities in the security industry born on necessity. With the widespread problem of false alarm transmission and inability for first responders to ‘be everywhere,’ developers of solutions that provide automated verification and alternative security incident detection are expected to become mainstream. Promising Detection Systems The use of AI, NLP, LiDAR, UAS (Unmanned Aerial Vehicles aka drones) with surveillance and thermal imaging will grow, mostly due to higher acceptance in other industries like autonomous vehicles, rail safety, terrain and post devastation mapping/rescue. However, legacy ‘listing’ or certification organizations will be forced to make an important decision for their own survival: work toward integrating these promising detection systems into acceptance by insurance, licensing and standards development organizations. 2019’s ‘true’ Industrial Philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants 2019’s ‘true’ industrial philanthropists will be needed to fund early warning tech for firefighters and the presence of active assailants. For these use cases, 5G infrastructure rollouts, FR acceptance, lower cost perimeter detection and long range object and fire recognition by LiDAR and Thermal imaging will all be watched closely by investors. Should public agencies and philanthropical solution providers in the security industry cross paths, we may just yet see a successful, lifesaving impact. Cyber Risk Profile The ‘Digital twin’ refers to a digital replica of physical assets (physical twin), processes, people, places, systems and devices that can be used for various purposes. Your ‘Security Digital Twin’ has a similar physical and cyber risk profile, either through common threats, similar assets or both. Good news: managing your risk, protecting assets and securing your facilities in 2019 will get easier as security digital twin profiles will grow in maturity, while keeping their data sources private. This will be accelerated by the maturity of AI-based, auto-generated visualizations and image recognition, that happens to also drive the FR solutions. The 5G wireless infrastructure market is emerging as far more of a quantum leap in connectivity, like ‘wireless fiber optics’ performance, than an upgrade to 4G LTE. The 5G infrastructure market will be worth $2.86 billion by 2020 and $33.72 billion by 2026, growing at a compound annual growth rate (CAGR) of 50.9%. Intelligent Applications The explosion of ingested voice, video, and meta-data, the interconnectivity of devices, people and places, and the integration of intelligent applications into expanding ecosystems all require faster communications. To be more accurate, 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity: 5G and FWA (Fixed Wireless Access). 5G rollouts will accelerate in 2019; however, current project funding will include and be impacted by future enterprise security connectivity Quite simply put, larger solution providers are gently coaxing practitioners into seemingly ‘open systems;’ the negative discovery during an M&A process, audit or integration with a smart city’s public/private partnerships will continue to be revealed, and related industries will force reform. Autonomous things will be enabled by AI and image recognition. With few affordable rollouts of security robots and outdoor unmanned ground vehicles (UGV) that leveraged platforms popular with research and even NASA, the autonomous security robot was mostly MIA from a security practitioner’s program in 2018. Perimeter Intrusion Detection One platform was even accused of intimidating homeless people in a public place, at a major city. Industries mutually beneficial are often unaware of each other; this will change gradually: one major domestic airport is currently evaluating a UGV platform performing perimeter intrusion detection, runway weather conditions and potential aircraft taxiing dangers. The platform is being used largely in transportation research, yet offers significant opportunities to the security industry. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR The ‘immersive experience’ of virtually any security or threat detection is a twist on virtual/augmented/mixed reality (VR/AR/MR) with additional sensory features. Although VR/AR/MR is well underway in other industries, there are several companies with solutions like VR-based active assailant training that could provide a fighting chance for practitioners, employees, visitors, faculty and children. Research firm Gartner estimates that 70% of today’s technology products and services can be enhanced with ‘multi-experience’-based VR/AR/MR. Security Ecosystem Members Not necessarily MIA, but of special mention is the need of security and safety practitioners to prioritize communications systems over ‘nice to have’ expansive video surveillance systems for mass casualty threats. This will eventually improve with 5G for Enterprise solution rollouts. At the past GSX and upcoming CES Technology trade shows, a new roundup of technologies is discovered: a wider diversity of protection promise to save ASIS members on their technical security program is realized. With each of the ‘winners,’ (5G, AI, NLP, LiDAR, UAS [Unmanned Aerial Vehicles aka drones], thermal imaging, digital security twins and smart-city-friendly technologies) it is both exciting and challenging work for both security practitioners and solution providers. All things equal and with the necessary technology acceptance testing processes, this is a truly great time for security ecosystem members.
Constantly optimizing deep learning algorithms yields better video analytics performance, even in complex applications such as facial recognition or in scenarios with variable lighting, angles, postures, expressions, accessories, resolution, etc. Deep learning, a form of artificial intelligence (AI), holds the potential to enable video analytics to deliver on long-promised, but not often delivered performance. Our AI series continues here with part 2. Adapting Existing Hardware Today, low-cost system-on-chip (SoC) camera components enable deep neural network (DNN) processing for the next generation of intelligent cameras, thus expanding the availability of AI processing to a broader market. AI software can even add learning capabilities by adapting existing hardware to AI applications AI software can even add learning capabilities by adapting existing hardware to AI applications. Today’s smartphones include cameras, gyroscopes and accelerometers to provide sufficient data to drive AI applications. Software can adapt existing hardware to transform them into AI devices capable of continuous learning in the field. Inside a video camera, real-time deep learning processing can be used to detect discarded objects, issue loitering alarms and detect people or objects entering a pre-defined field. Data capture form to appear here! Detect Anomalous Data Additional capabilities are applicable to demanding environments and mission-critical applications, such as the perimeter protection of airports, critical infrastructures and government buildings, border patrol, ship-tracking and traffic-monitoring (e.g. wrong-way detection, traffic-counts and monitoring roadsides for parked cars: all vital video security solutions). IoT is transforming the lowly security camera from a device that simply captures images, into an intelligent sensor that plays an integral role in gathering the kind of vital business data that can be used to improve commercial operations in areas beyond security. For example, cities are transitioning into smart cities. Deep learning enables systems to search surveillance footage, to detect anomalous data, and to shift surveillance from post-incident response to providing alerts during, or even before, an event. The ability of deep learning for video analytics is much more sophisticated and accurate Make Critical Decisions Deep learning can eliminate previous video analytics limitations such as dependence on a scene’s background. Deep learning is also more adept than humans at discerning subtle changes in an image. The ability of deep learning for video analytics is much more sophisticated – and accurate – than the programmed approaches previously employed to identify targets. AI is a timely solution in an age when there is more video surveillance than ever. There are too many cameras and too much recorded video for security operators to keep pace with. On top of that, people have short attention spans. AI is a technology that doesn’t get bored and can analyze more video data than humans. Systems are designed to bring the most important events and insight to users’ attention, freeing them to do what they do best: make critical decisions. Multiple Camera Streams AI can reduce information overload to enable humans to work with the data more efficiently The video benefits reflect the larger goal of AI to amplify human skills. AI can reduce information overload to enable humans to work with the data more efficiently. Another benefit is faster search, and new systems make searching video as easy as searching the internet. AI enables specific people or cameras to be located quickly across all the cameras at a site. Searching can be directed by a reference images or by physical descriptors such as gender or clothing color. Consider a scenario of a child missing from a crowded shopping mall: Every second can seem like hours, and artificial intelligence and neural networks can enable a rapid search among multiple camera streams using only one photo of the child. The photo does not have to be a full-frontal passport-type photos; it could be a selfie from a party as long as the face is there. Intrusion Detection Scenario AI can find her and match her face from among hundreds of thousands of faces captured from video, in nearly real time. AI can also continuously analyze video streams from the surveillance cameras in its network, distinguishing human faces from non-human objects such as statues and animals. Privacy concerns are minimal as there is no ID or personal information on the photo, and the image can be erased after use. And there is no database of stored images. In a perimeter security/intrusion detection scenario, an AI-driven video system can avoid false alarms by easily distinguishing different types of people and objects, e.g., in a region set up to detect people, a car driving by, a cat walking by, or a person’s shadow will not trigger the alarm. Part three coming soon. If you missed part one, see it here.
There is a new event on the calendar for the security industry in 2019: The Security Event 2019, 9-11 April, at NEC, Birmingham. For additional details and a preview of the new trade show and conference, we spoke with Tristan Norman, Founding Partner and Event Director, The Security Event. Q: It seems recently that some trade shows have been on the decline in terms of exhibit size and attendance. Why does the physical security industry need another trade show? Norman: I think there are numerous factors that play into the decline of trade shows in general and not something that is limited to the security industry. Those events that are suffering are no longer serving their target market or have failed to adapt to the changes in the industry they serve.However, what we are seeing now is the rise of focused, more “evolved” trade events which fulfill a gap in the industry event calendar and provide something new and fresh to a disillusioned audience. Q: What will be unique about The Security Event, and what role will it serve in bringing together buyers and sellers in the market? Where (geographically) will attendees come from?What we are seeing is a rise of trade events which provide something fresh to a disillusioned audience Norman: The driving ethos behind The Security Event is that we are “designed by the industry, for the industry.” We were able to start with a blank canvas and take on board all the feedback from stakeholders throughout the security buying chain and create an event that is sustainable and fit for purpose. We see the role of the event as a very important one – to truly reconnect the currently fragmented UK commercial security industry, back at the NEC in Birmingham. We had originally anticipated that this would be an almost-exclusively UK event in year one. However, we have seen significant interest from potential visitors from across the wider EMEA region who are keen to do business in the UK. We formed a strategic alliance with Security Essen to help facilitate and strengthen our reach in these regions through additional marketing and PR activities. Consequently, early registrations indicate that it will be approximately an 80% UK and 20% international split. Q: What conference programming is being planned to augment the trade show event? Norman: Content will be delivered across three focused theaters, serving the needs of our audience throughout the buying chain. Emphasis will be placed on the latest technology innovations impacting the industry, practical advice on the most pressing issues facing security technicians, and important industry updates and insights. All sessions are focused on delivering tangible benefits to ensure professionals are equipped to stay relevant and to grow their business and we’re excited to be working with key industry bodies, innovators and experts to deliver the program. We look forward to announcing those in coming weeks. Exhibitors want to re-engage with the thousands of industry colleagues who no longer attend other events on offer Q: Comparisons to IFSEC are inevitable. How will The Security Event be different than the IFSEC Security and Fire shows? What are the advantages of locating at Birmingham NEC? Norman: Both The Security Event and The Fire Safety Event, based at the NEC are completely different to any other trade show in the UK. We pride ourselves in creating a business platform that puts the exhibitors’ needs first, by limiting the size of stands and total number of exhibitors as well as creating a comprehensive CPD accredited educational program for the visitors. Q: Which big industry players are supporting the launch of The Security Event, and what feedback are you hearing in terms of why they signed up at the show's inception? If a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally Norman: Our founding partners are Assa Abloy, Avigilon, Anixter, Comelit, Dahua, Honeywell, TDSi, Texecom, Tyco and Videcon. The full list of exhibitors and supporting partners can be found on our website. The reasons why they have signed up are very simple. They all see the exact same gap in the industry event landscape as we do. We believe there is a need for a 3-day channel focused commercial security exhibition based at The NEC in Birmingham. Our exhibitors want to re-engage with the thousands of industry colleagues who no longer attend the other events on offer. Q: Your 2019 show will be the same week as ISC West in Las Vegas. Do you think the competitive calendar will be a factor? Norman: In terms of our both our audience and our exhibiting base there is very little overlap with ISC West. Generally, if a global manufacturer has a footprint in both the US and Europe, any tradeshow will be managed locally so we haven’t observed any issues so far. We do acknowledge that having two shows at the same time globally isn’t ideal and we have moved our dates in 2020 to the 28-30 April to mitigate this going forward. The Security Event 2020 will not clash with Las Vegas' ISC West 2020 as it will in 2019, says Norman Q: How will you measure success in the first year of the show? What measurements (show size, number of attendees, exhibitor feedback, etc.) will constitute a "successful" first year for the show?The Security Event will continue to evolve year after year, but will intent to stay true to the event's original concept Norman: Great question – the most important barometer of success for me and the team next April is the general industry reaction, after all, this show was created for them. Furthermore, it is vital to us that our exhibitors feel they have achieved their objectives for the show, whether it be quality, quantity of leads or raising awareness of a new product launch. We’ll also be keen to understand how satisfied visitors are with the event, including their views of the content, access to new products/services, effectiveness of the out of hours networking, etc. We are anticipating 6,000 visitors over the 3 days and I believe if we achieve this goal, we will have a strong rebooking on site, laying a great foundation for our 2020 event. Q: How would you expect/hope the show would continue to evolve in coming years? Norman: I hope over the next few years The Security Event cements itself as the industry’s favorite trade show and that exhibitors and visitors alike look forward to every year for both the business opportunities at the event and the networking outside of it. The Security Event will continue to evolve year after year, but I am determined that we stay true to our original concept and the principles on which the show was founded. After all, it is this formula that has proved to be so popular to date.
School shootings continue, as does a search for answers. What solutions are there to prevent school shootings and/or to improve the response (and thus minimize the death toll)? In the physical security industry, we like to think we have solutions that can help, if not “solve”, the problem, but realistically speaking, how effective are they at the end of the day? We like to think we have solutions that can help, if not “solve”, the problem: but how effective are they at the end of the day? The sad answer – even after dozens of school shootings and even in the wrenching aftermath of the latest one – is that we don’t know. There is a gaping lack of knowledge and research when it comes to measuring the effectiveness of preventative measures as they relate to school shootings. Scarce Resources For Preventative Measures The dearth of knowledge on the subject leaves schools at risk of spending scarce resources on measures that don’t have any real impact, or worse, that have a negative effect on education environments. The natural impulse following a school shooting is to do something – anything – to prevent the tragedy from happening again at any school, but especially at my school. But how is money best spent?Successful businesses are a good thing, but not at the expense of misspending education resources on solutions that don’t solve anything Congress has passed the Stop School Violence Act of 2018 to provide $50 million per year to develop programs to train students, teachers and law enforcement to prevent violence, and to create anonymous reporting systems, such as hot lines, for school violence threats. The bill authorizes another $25 million for improvements to school’s physical security infrastructures. Congress also provides $1.1 billion in Title IV block grants, which districts can use to pay for diverse needs such as security systems. Several states are providing additional funding for physical safety measures and campus police, and local districts are also stretching their budgets to address security concerns. But is that money being targeted to measures that will help the situation? What is the role of technology in preventing school violence, and are we as an industry at risk of over-selling our preventative capabilities and diverting money from other measures that might have more impact? Successful businesses are a good thing, but not at the expense of misspending education resources on solutions that don’t solve anything. More metal detectors, armed guards and police officers could cause anxiety in some students and even interfere with the learning process Studies On School Safety And Protection Researchers, advocates and educators gathered this fall at American University to consider the need for better research to inform decision-making on safety, reported Education Week.The field is in desperate need of more evidence on what works, and schools want this information presented to them" A 2016 study by the Rand Corp. points to the problem: Lack of data and research on what works and what doesn’t. “Despite growth in the school safety-technology sector, rigorous research about the effectiveness of these technologies is virtually non-existent,” according to Rand. “The field is in desperate need of more evidence on what works, and schools want this information presented to them in vetted, digestible ways to help them with procurement.” Jeremy Finn, a professor of education at the University of Buffalo, has pointed out the difficulty of assessing the effectiveness of measures designed to deter events that likely won’t occur anyway. “How do you know when you have deterred a school shooting?” he asks. “It didn’t happen.” The Effects On Our Students Might technologies aimed at making schools more secure have an adverse effect on the learning environment? More metal detectors, armed guards and police officers could cause anxiety in some students and even interfere with the learning process. The physical security industry should freely acknowledge that the technologies we offer are only part of the solution to school violence Do security measures aimed at preventing active shooting incidents absorb resources that might better be used to address a more general and/or likely security threat such as vandalism or student discipline? Theoretically, security measures in general should help to prevent the probability of an active shooter at the same time they are addressing a wider range of concerns and threats. But do they? At the very least, we in the physical security market should be aware, and should freely acknowledge, that the technologies we offer are only part of the solution to school violence. Schools should take the broadest possible approach to the range of security challenges, and technology should be one tool among many. Furthermore, better data to measure what works is sorely needed to illuminate the best path forward.
Tottenham based Lancasterian Primary School is focused on the delivery of a safe and welcoming learning environment, ‘where everyone is included and creativity is valued.’ The school is persistently seeking new ways to enhance and improve its offer to the children and the local community. The school had an established high-profile intruder alarm system on site and consulted with Amthal to create a maintenance program that could operate with no disruption to learning timetables. Safe Learning And Working Environment Proactively worked with us to create a maintenance schedule for our intruder alarm" Says Sam Judge, Lancasterian Primary School’s Assistant Site Manager: “The security of our school is naturally a top priority, to ensure staff and pupils can work and learn in a safe environment. We see a careful balance to ensure our focus on creation of a welcoming and nurturing school for pupils and the local community is not overwhelmed.” “It’s something we are consistently reviewing and when we approached Amthal, we were instantly impressed with their understanding of our objectives. They proactively worked with us to create a maintenance schedule for our intruder alarms, to ensure they continue to operate to maximum capacity for the ultimate protection of all who learn with us, and provide total peace of mind and assurance to the site management team.” Well-Maintained Security System An effective school building security alarm system for which users are fully trained" Mark Golding, Amthal Account Manager added: “Ensuring that pupils, buildings and equipment are protected requires an effective school building security alarm system for which users are fully trained, alarm systems that are regularly maintained and service inspections that are logged and documented.” A well-maintained system will ensure compliance with building safety regulations and also help to ensure the school passes OFSTED with flying colours. Amthal is thrilled to be working with schools such as Lancasterian Primary to ensure its security for the benefit of staff, pupils and visitors.” Satisfying User Needs Independently owned, Amthal Fire & Security is dedicated to satisfying end user needs for security safety and convenience offering design, installation, service and remote monitoring of advanced electronic fire & security solutions, including intruder, Fire, Access and CCTV systems. Amthal Fire & Security is accredited by the Security Systems and Alarm Inspection Board (SSAIB) United Kingdom Accreditation Services (UKAS) and British Approvals for Fire Equipment (BAFE.)
3xLOGIC, Inc., a provider of integrated, intelligent security solutions, and a three-time Deloitte Technology Fast 500 winner, working alongside Sonitrol of Fort Lauderdale, is pleased to announce the completion of a highly-anticipated security system upgrade for Junior Achievement of South Florida (JASF) at the organization’s JA World Huizenga Center at the Lillian S. Wells Pavilion (JA World). JA World is located on the Broward College North Campus in Coconut Creek, Florida. With over 60,000 square feet of learning areas, rentable meetings rooms, and the Huizenga Catering Kitchen, JA World is the largest Junior Achievement facility in the world. Each year, more than 21,000 5th grade and 20,000 8th grade students from Broward and south Palm Beach counties visit the facility. The 5th graders learn basic economic concepts, workplace skills, and personal and business finances in a simulated city built for young students; the 8th graders focus on how their educational choices will impact their future earning potential, managing a budget and learn about high growth industries to help spark their career exploration. The initial security system included remotely managed access control, verified audio intrusion detection, and analog camerasRequirement Of IP Camera Technology “Each day, 450 students participate in JA BizTown and JA Finance Park simulations at JA World. Their safety and the safety of our volunteers, staff, and guests is of the utmost concern to us,” said Laurie Sallarulo, President & CEO, JASF. Sonitrol of Fort Lauderdale started working with JASF in 2008, in the early design/build phase of the facility, and through its completion in 2009. The initial security system included remotely managed access control, verified audio intrusion detection, and analog cameras. At the time, IP cameras were considered too expensive. “Previously, we had 18 analog cameras on the system,” explained Leni Smith, Director of Operations for JASF. “As time went on, it was clear that we needed to bring more areas inside and outside the building under surveillance, we wanted to access more cutting-edge IP camera technology, and we wanted to have all our surveillance under one Video Management System (VMS).” Installation Of 3xLogic Hybrid NVR Sonitrol of Fort Lauderdale installed a 3xLOGIC hybrid NVR, enabling JASF to protect their analog camera investmentWorking in tandem, Sonitrol of Fort Lauderdale and 3xLOGIC designed a system upgrade that, through a combination of discounts and donations, JASF could afford. It also helped that John Ray, President of Sonitrol Fort Lauderdale, is a long-time, active JASF Board member. In order to fit JASF’s budget, Sonitrol of Fort Lauderdale installed a 3xLOGIC hybrid NVR, enabling JASF to protect their analog camera investment, while adding in higher-resolution IP cameras for expanded coverage. The hybrid solution also creates a migration path, allowing JASF to continue improving visibility with new IP cameras over time as their budget allows. “As part of ongoing security and safety improvements, our staff participates in an annual active shooter training,” explained Monica McNerney, VP Operations, “and during those trainings, two things became clear. We needed to cover more areas with surveillance, and we needed to partner more closely with local law enforcement to give them real-time access to our system in case of an emergency.” Viewing Discrete Areas With VIGIL Software JASF has a number of discrete areas under surveillance and manages to view them through use of the 3xLOGIC VIGIL server softwareJASF has a number of discrete areas under surveillance and manages to view them through use of the 3xLOGIC VIGIL server software. These include the reception area, two loading dock areas, other exterior doors, their large meeting rooms, and the student areas, known as JA BizTown and JA Finance Park, where 450 young people spend most of their time each day at JA World. The receptionist controls public access to the building by viewing who is requesting entry, and buzzing that person in. The receptionist also monitors the loading dock area and notifies the appropriate staff member when a delivery has arrived. Leni Smith, who manages day-to-day security matters, reviews video after an incident is reported to her. “I really like how with the upgraded system, I can use motion detection alarms to hone in on exactly the video I need to review—I bet we’ve cut the time for review easily in half, if not more. I also really value how I can draw a box in a camera view and zoom into that area easily and quickly to find out exactly what happened.” Working With Community Partners We work very closely with our community partners to help them understand and access our facility and security system"Monica McNerney expanded on how the upgraded system is positively impacting another aspect of the JASF security program. “We work very closely with our community partners like Broward College security and local law enforcement to help them understand and access our facility and security system. We also routinely ask for their expert feedback on whether we’re managing our security effectively. “So far, they’ve told us we’re doing exactly what we need to be doing, and they’re excited about the expanded access they have to our camera views, although we hope that no event ever warrants that need.” TotalGuard Solution For Emergency Situations Jennifer Thomas, Vice President of Operations for Sonitrol of Fort Lauderdale, also discussed continued improvements that are planned for JA World. “We are actively designing phase II of the camera upgrade, which will include improved coverage and image clarity for camera views outside the front doors. TotalGuard allows JASF personnel to alert the Sonitrol central station and transmit real-time audio and video to the monitoring center “We are also ready to deploy our latest technology for the main lobby area—TotalGuard. TotalGuard is a great solution for emergency situations, it allows JASF personnel to alert the Sonitrol central station and transmit real-time audio and video to the monitoring center, for prioritized verified police response.” Sallarulo had a final thought on how things have been going with the system upgrade, “As for Sonitrol of Fort Lauderdale, they always provide us an amazing response. As a non-profit, we could not do what we do without the help of partners like Sonitrol. We are very grateful for their support and service.”
A manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialization in some of the towns in Maharashtra while preserving their rich heritage. Wide Area Monitoring The company is spread across a wide area, employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing high resolution images and covering a greater area for monitoring was the primary requirement. The company is divided into various branches that are located at various places in Satara, Maharashtra. This gave rise to the need for a centralized solution at a centralized location from where all other sites can be monitored at a time. Matrix IP Bullet And Dome Cameras To cover the large monitoring area, Matrix provided IP bullet and dome cameras that have greater field of view when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images that aid in night time surveillance and provide enhanced security. For storing the streamed videos, Matrix offered network video recorders. These NVRs have features such as adaptive recording which aids in storing more data in a defined space. Moreover, it has intelligent video analytics such as intrusion detection and motion detection which were also applied. Instant notifications and alerts ensured real-time security of the premises.
A Manufacturing giant in Maharashtra has the distinct mark of making India’s 1st Diesel Engine and Iron Mold Ploughs. The company’s legacy dates to 1922. This company is the reason behind a new wave of industrialization in some of the towns in Maharashtra while preserving their rich heritage. Centralized Surveillance Solution Large area to monitor - The company is spread across a wide area employing more than three thousand people. Being an established and trusted brand, maintaining quality is crucial and therefore, every area needs to be under surveillance. For this reason, cameras producing good quality image and can cover a greater area for monitoring was the requirement. Matrix provided IP Bullet and Dome cameras that have greater Field of View when compared to other brands Centralized control - The company is divided into various branches which are located at various places in Satara. This gave rise to the need for a centralized solution at a centralized location from where all other sites can be monitored at a time. Low Light Images For Enhanced Security To cover the large monitoring area, Matrix provided IP Bullet and Dome cameras that have greater Field of View when compared to other brands. According to the requirement, various cameras were installed at different locations such as reception area, canteen, security area, entrance, production area, etc. These cameras also provide exceptional low light images which aid in providing high-class security. For storing the streamed videos, Matrix offered Network Video Recorders. These NVRs have features such as Adaptive Recording which aid in storing more data in a defined space. Moreover, it has Intelligent Video Analytics such as Intrusion Detection and Motion Detection which were also applied. Instant notifications and alerts ensured real-time security of the premises. Results: Centralized Control 24x7 Real-time Surveillance Higher Security with Intelligent Video Analytics
Round table discussion
The year ahead holds endless promise for the physical security industry, and much of that future will be determined by which technologies the industry embraces. The menu of possibilities is long – from artificial intelligence to the Internet of Things to the cloud and much more – and each technology trend has the potential to transform the market in its own way. We tapped into the collective expertise of our Expert Panel Roundtable to answer this question: What technology trend will have the biggest impact on the security market in 2019?
The new year 2019 is brimming with possibilities for the physical security industry, but will those possibilities prove to be good news or bad news for our market? Inevitably, it will be a combination of good and bad, but how much good and how bad? We wanted to check the temperature of the industry as it relates to expectations for the new year, so we asked this week’s Expert Panel Roundtable: How optimistic is your outlook for the physical security industry in 2019? Why?
We are living in the age of Big Data, and businesses are inundated with large volumes of data every day. Success depends on capturing, analyzing and ultimately transforming that data into information and intelligence that can be used to improve the business. So, it is with today's physical access control and video systems, too, which also generate unprecedented levels of data. But how can we make the data useful to end users and how can they realize its full value? We asked this week's Expert Panel Roundtable: Relating to physical security systems, what is the value of data and how can that value be measured?