At GSX 2019, Bosch will announce a significant expansion of its video portfolio with the introduction of more than 50 new products, including fixed and moving cameras, and recording and management solutions. Bosch now offers intelligent video solutions for all segments of the security market – from those that need simple, cost-effective surveillance to those that demand the highest performance in all lighting and environmental conditions. “Intelligent devices with on-board Video Analytics are creating new possibilities for smart data capture and connected IoT applications that improve security and help organizations make smarter business decisions," said Brian Wiser, Regional President of Bosch Security and Safety Systems – North America. The cameras offer built-in Video Analytics as standard – a first for competitively priced cameras"With our expanded portfolio, users in environments of all sizes can benefit from the tremendous value Video Analytics brings by delivering data for business intelligence purposes, by enabling customized solutions that solve business challenges, and by notifying people and triggering other systems to take action based on security and safety risks." FLEXIDOME and DINION IP 3000i cameras At GSX, Bosch will expand its portfolio of intelligent ‘i’ series cameras with the launch of the FLEXIDOME and DINION IP 3000i cameras that extend smart video surveillance to small security applications. The cameras offer built-in Video Analytics as standard – a first for competitively priced cameras. They are built for high quality performance and designed for easy installation. In addition, new FLEXIDOME IP panoramic 6000 and 7000 outdoor cameras feature a fish eye lens to deliver a 180- or 360-degree overview of an area – eliminating blind spots by showing everything in a single image. The cameras resist vandalism with an IK10 rating and feature an IP66 rating to protect against dust and water ingress in challenging weather conditions. AUTODOME IP starlight 7000i cameras The MIC IP ultra 7100i delivers 4K ultra HD resolution for mission critical applicationsWith built-in Intelligent Video Analytics, the ability to track and zoom in on moving objects at a distance and to deliver color images in extreme low light, the AUTODOME IP starlight 7000i cameras capture high-quality video and informative data. As with the entire ‘i’ series from Bosch, this latest AUTODOME camera includes intelligent bitrate management techniques combined with H.265 compression to reduce bitrate by up to 80 percent. Bosch will also demonstrate the new MIC IP starlight and MIC IP ultra 7100i cameras. These rugged cameras are made with anti-corrosive metal and can function at temperatures ranging from -40 to +140 degrees Fahrenheit. The MIC IP ultra 7100i delivers 4K ultra HD resolution for mission critical applications, such as city and highway surveillance, making them ideal for monitoring highways, bridges, ports, perimeters, and more. Improved data security with BVMS 10.0 The new DIVAR IP all-in-one 5000, 6000, and 7000 combines recording and video management for a complete ready-to-use solution. They have the option to come pre-equipped with the Bosch Video Management System that offers viewing, recording, and playback, as well as advanced management features, including event and alarm handling and forensic search. Dealers and integrators can also configure the recording solutions for video storage only. BVMS version 10.0 adds improved levels of data security and privacy, greater flexibility with ONVIF Profile S certificationBosch Video Management System (BVMS) version 10.0 will also be introduced at the show. It adds improved levels of data security and privacy, greater flexibility with ONVIF Profile S certification, and enhanced monitor wall functionality. Integration for enhanced capabilities At GSX 2019, Bosch will highlight how its video, intrusion, access control and communication products integrate together and with other systems to provide powerful solutions for common security, safety and business concerns while reducing complexity. Bosch will show how integrated solutions can protect sensitive areas, improve management of video and security data, and automate announcements and alerts. The Bosch booth will also feature a new exhibit that demonstrates how customers can harness machine learning capabilities to teach Bosch intelligent cameras to detect the things that matter most.
Allied Universal, global security and facility services company in North America, has recently announced a broad array of new all-inclusive capabilities and divisions, which will be showcased at the Global Security Exchange (GSX) conference (Booth #523) slated for September 8 – 12 at Chicago’s McCormick Place. Allied Universal recently launched HELIAUS, an advanced artificial intelligence platform, and announced new divisions such as Allied Universal Technology Services, Allied Universal Risk Advisory and Consulting Services, and Allied Universal Event Services. Allied Universal Smart Services “We are proud to be ahead of the curve in a rapidly evolving industry by delivering all-encompassing capabilities to our clients with the ultimate goal of providing top-notch security services,” said Steve Jones, CEO of Allied Universal. “Our tech solutions are the most highly advanced, comprehensive and integrated in the security industry.” For more than 60 years, Allied Universal has been offering manned guarding services that include armed and cleared security professionals, vehicle patrol, visitor management/concierge, K-9 services and guarded touring and management software. HELIAUS advanced AI platform HELIAUS focuses on creating an ecosystem around the company’s manned guarding security services" HELIAUS: The Power of Insight into Action - “HELIAUS focuses on creating an ecosystem around the company’s manned guarding security services that brings together rich data and advanced artificial intelligence to predict not only what's going to happen but to give recommendations on how to prevent it from happening and drive better outcomes,” said Mark Mullison, CIO of Allied Universal. “The sophisticated location-aware workflow engine ensures that these recommendations are acted upon.” “Allied Universal Technology Services offers clients electronic access control, video surveillance, fire/life safety, alarm monitoring, emergency communications, technological threat management and response, and other smart tech innovative solutions, including a broad array of hosted /managed services via Allied Universal’s Monitoring and Response Center (MaRC), and the Global Security Operating Center (GSOC-as-a-Service),” said Carey Boethel, President, Allied Universal Technology Services. Risk assessment and prevention Allied Universal Risk Advisory & Consulting Services – “We have combined risk assessment, prevention, and investigative practices, developed over more than four decades, with the extensive experience and knowledge of industry-leading consultants into a centralized practice with strategic focus on reducing risk,” said Ty Richmond, President, Allied Universal Risk Advisory & Consulting Services. “We help customers determine where and when risk is most likely to turn into threat and the most effective means to combat threat—arming organizations with the knowledge to make critical business decisions that ensure better risk management outcomes. We also have a network of more than 10,000 armed and unarmed high-level off-duty officers located throughout the country to respond to any threat, disaster or emergency.” Single-source security solution Allied Universal Event Services is a single-source solution for staffing, consulting and security for all events"Allied Universal Event Services - “Allied Universal Event Services is a single-source solution for everything from temporary staffing, consulting and security for all events,” said Steve Claton, President, Allied Universal Event Services. “Our event services team has a successful formula for addressing convention and trade show's complex challenges from a security and staffing perspective. “ Allied Universal is proud to present sessions at GSX 2019 which include: Brent O’Bryan, Vice President of Training & Development is scheduled to be on the following panel: "Are the Lines Blurred? Transforming the Human Factor“ on Tuesday, September 10 from 11AM to 12:20 PM, Location: X Learning - X1 - Booth 3601. Paul Caruso, Vice President, is scheduled to present a session, titled “Balancing Culture Against Control,” with Keith Moser, Manager of Security Operations, Housing and Residential Services, Massachusetts Institute of Technology, on Tuesday, September 10 from 11 a.m. to 12:15 p.m., Room S403 A Brent O’Bryan, Vice President of Training & Development will discuss “How to Use Emotional Intelligence to Build a World-class Security Presence” on Wednesday, September 11 from 3:45 to 4:45 p.m., Room S405 B Mark Mullison, CIO will discuss The Change Driver: AI on Wednesday, September 11 from 11:30 to 11:45 AM, Expo Floor/X Stages. Paul Caruso, Vice President, will discuss “On the Witness Stand,” with Kevin Davis, CPP, Assistant Director of Public Safety, Harding University, on Wednesday, September 11 from 2:15 to 3:15 p.m., Room S404 D. Caress Kennedy, CPP, Regional President, Northeast Region, is scheduled to participate on a panel discussion titled “ASIS Certifications and Your Career” on Wednesday, September 11 from 12:45 to 1:45 p.m., ASIS Career HQ - Booth 2115.
PetroCloud, a provider of security, monitoring and automation solutions for customers with remote operations, announced that it has changed its name from PetroCloud to Twenty20 Solutions. “We’ve studied how to best represent ourselves to our customers, and this name transition is the perfect solution,” said Peter Shaper, interim CEO, Twenty20 Solutions. “Our new name better reflects who we are today and how we serve customers across many different industries.” Integrating security, monitoring and automation Twenty20 delivers real-time vision, intelligence and control into the remote operations of its customers, who work in a range of industries including energy, utilities, agriculture, construction and critical infrastructure. As the company continues expanding into new industries, the name change enables Twenty20 to reflect its broader market appeal and the level of clarity it gives customers into their remote operations. Twenty20 will continue to integrate real-time security, monitoring and automation in one place While the company name has changed, its commitment to serving its customers has not. Twenty20 will continue to integrate real-time security, monitoring and automation in one place and provide customers with unprecedented control of their remote operations. Industrial Internet of Things platform Founded in 2012, the company specialises in delivering surveillance, threat detection, access control and monitoring and automation of operations to customers via its advanced Industrial Internet of Things (IIoT) platform. Whether it’s providing clients with the ability to control who enters and exits remote facilities, protecting in-field assets from theft or vandalism, remotely detecting other threats to the environment or operations, or presenting a dashboard that provides customers with one place where they can see and control everything on their remote sites, Twenty20 is committed to supplying customers with breakthrough solutions to protect and improve their operations, no matter how remote the environment may be.
NuTech National, is a 38-year national security alarm technology company based in Maitland, Florida with government clearances, securing government and military contractors (Lockheed Martin, Embraer, Brinks, Dunbar). NuTech’s second division includes some of the largest national retail chains (Ascena Retail Group, Estee Lauder, Finish Line, Walmart) and ecommerce groups (Amazon) in North America. Aviation security expert Greg DeTardo, CEO of NuTech National, announced Wayne joining NuTech as CFO. The addition of Kalish will assist in NuTech reaching further financial goals and advancing immediate partnerships that have been in the works. Wayne is well qualified for this role, is a licensed Certified Public Account and brings his unique blend of financial and business management to NuTech National and will serve as the company’s Chief Financial Officer (CFO). He served as Senior Vice President, Accounting and Finance Group Chief Financial Officer at Tavistock Group (US and UK, 3 years) and Vice President, Accounting and Corporate Planning at Darden Restaurants (12 years). An alumnus of KPMG (11 years), Wayne received a Master’s in Business Administration honors degree from Rollins College.
The cyber security threat is constant and real. Entire businesses, large enterprises and even whole cities have been vulnerable to these attacks. Growing threat of cyber attacks The threat is not trivial. Recently, two cities in Florida hit by ransom ware attacks – Rivera Beach and Lake City – opted to capitulate and pay ransom totaling more than $1.1 million to hackers. The attacks had disrupted communications for first responders and crippled online payment and traffic-ticketing systems. It was reminiscent of the $4 billion global WannaCry attacks on financial and healthcare companies. A full two years after the WannaCry attack, many of the hundreds of thousands of computers affected remain infected. And hackers are continuously devising new techniques, adapting the latest technology innovations including machine learning and artificial intelligence to devise more destructive forms of attack. Indeed, AI promises to become the next major weapon in the cyber arms race. For enterprises, there is no choice but to recognize the threat and adopt effective countermeasures Enterprise security For enterprises, there is no choice but to recognize the threat and adopt effective countermeasures. Not surprisingly, as the number, scale and sophistication of cyber-attacks has grown, so has the significance of the Chief Information Security Officer, or CISO, who owns the responsibility of sounding the alarm to the C-suite and the board – and recommending the best defense strategies. Consider it a grim irony of the digital economy. As companies have migrated to the cloud to gain scale and efficiency and integrated new channels and touch points to make it easier for their customers and suppliers to do business with them, they have also created more potential points of entry for cyber-attacks. IoT Increases Threat of cyber-attacks Amplifying that vulnerability is the trend of allowing employees to bring their own laptops, smartphones and other digital devices to the office or use to work remotely. And thanks to the Internet of Things, as more devices connect to enterprise systems – from thermostats to cars – the threat surface or targets of intrusion are multiplying exponentially. According to the McAfee Labs 2019 Threats Predictions Report, hackers will increasingly turn to AI to help them evade detection and automate their target selection. Companies will have no choice but to begin adopting AI defenses to counter these cybercriminals. Importance of cyber security This escalation in the cyber arms race reflects the sheer volume of data and transactions in modern life. In businesses like financial services and healthcare it is not humanly possible to examine every transaction for anomalies that might signal cyber snooping. Even when oddities are glimpsed, simply flagging potential problems can create so-called threat fatigue from endless false alarms. What’s more, attacks like those from Trickbots are specifically designed to go undetected by end users. The fact is, even if throwing more people at the problem were a solution, there aren’t enough skilled cyber security workers in the world. By some estimates, as many as 10 million cyber security jobs now go unfilled. AI is being used to conduct predictive analysis at a scale beyond human means Deploying AI As a result, AI is being deployed on multiple cyber-defense fronts. So far, it is mainly being used to conduct predictive analysis at a scale beyond human means. AI programs can sift through petabytes of data, identifying anomalies and even helping an organization recognize and diagnose intrusions before they turn into catastrophic attacks. AI can also be used to continually monitor and allocate levels of access to a network’s multitude of legitimate users – whether employees, customers, partners or suppliers – to ensure that all parties have the access they need, but only the access they need. Countering cyber security threats To harden defenses, some AI programs can be configured to perform simulated war games To harden defenses, some AI programs can be configured to perform simulated war games. Because cyber attackers have stealth on their side, organizations might need dozens of experts to counter only a handful of attackers. AI can help even the odds, scoping out the potential permutations of vulnerabilities. As CISOs – and the CIOs they typically report to – advise C-suites and boards on their growing cybersecurity risk, they can also help those leaders recognize an enduring truth: AI programs cannot replace experienced cybersecurity professionals. But the technology can make staff smarter, more vigilant and more nimbly responsive. AI-based cyber security tools Financial and healthcare companies are leading this charge because of the sheer volume and variety of transactions they handle and because of the value and sensitivity of the data. Organizations like the U.S. Department of Defense and the space agency NASA, as well as governments around the world are also implementing AI-based tools to address the cyber threat. For businesses of all types, the threat stretches from the back office to the supply chain to the store front. That is why recognizing and countering that threat must involve everyone from the CISO to the CEO to the Chairman of the Board. The AI arms race is underway in security. To delay joining it is to risk letting your enterprise become one of the grim statistics.
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
Critical infrastructure facilities that must secure large areas with extended outer boundary and numerous entry points, present a particularly difficult challenge when it comes to perimeter protection. As such, true end-to-end perimeter protection calls for the utilization of a sophisticated, multi-layered solution that is capable of defending against anticipated threats. Integrated systems that incorporate thermal imaging, visible cameras, radar and strong command and control software are crucial for covering the various potential areas of attacks. Let’s look at these technologies and the five key functions they enable to achieve an end-to-end solution that provides intrusion detection, assessment and defense for the perimeter. 1. Threat Recognition The first step in effectively defending against a threat is recognizing that it’s there. By combining state-of-the-art intrusion detection technologies, facilities can arm themselves with a head start against possible intruders. An exceptionally important aspect of effective perimeter protection is the ability to conduct 24-hour surveillance, regardless of weather conditions, environmental settings, or time of day. Visible cameras do not perform as well in low light scenarios and inclement weather conditions. However, thermal imaging cameras can provide constant protection against potential intruders, regardless of visual limitations, light source or many environmental factors. In fact, facilities such as power stations located near bodies of water can use thermal cameras to create what is known as a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool Critical infrastructure applications require not only continuous video surveillance and monitoring, but also a solution that yields highly reliable intrusion detection, with fewer false alarms. This need makes advanced video analytics a must for any adequate surveillance system. Features like dynamic event detection and simplified data presentation are game changing in supporting accurate intrusion analysis and facilitating a proactive response. Advanced analytics will provide multiple automated alarm notification options, including email, edge image storage, digital outputs or video management software (VMS) alarms. Incorporating high quality, unique and adaptive analytics can virtually eliminate false alarms, allowing security personnel to respond more efficiently and effectively, while also lowering overall cost for the end user. While surveillance technologies such as radar, thermal imaging and visible cameras, or video analytics work well on their own, utilizing all of these options together provides an advanced perimeter detection system. For example, ground surveillance radar can detect possible threats beyond the fence line as they approach and send a signal to pan-tilt-zoom (PTZ) cameras, triggering them to slew to a specific location. From there, embedded analytics and visible cameras can further identify objects, notify authorized staff, and collect additional evidence through facial recognition or high-quality photos. 2. Automatic Response Systems Once an intrusion attempt is discovered, it is important to act fast. Organizing a response system that can initiate actions based on GPS location data, such as the slewing of PTZ cameras, automated intruder tracking or activated lighting sensors, greatly increases staff’s situational awareness while easing their workload. For instance, thermal imagers deployed in conjunction with video analytics can be used to generate an initial alarm event, which can then trigger a sequence of other security equipment and notifications for personnel to eventually respond to. Having all of this in place essentially lays the entire situation out in a way that allows responders to accurately understand and evaluate a scene. Power stations located near bodies of water can use thermal cameras to create a “thermal virtual fence” in areas where they are unable to utilize the protection of a physical fence or wall 3. Deterring Suspicious Activity After the designated auto-response mechanisms have activated and done their job, it is time for responders to acknowledge and assess the situation. From here, authorized personnel can take the next appropriate step toward defending against and delaying the threat. Deterring suspicious activity can be achieved through real-time two-way audio, a simple but powerful tool. Often, control room operators can diffuse a situation by speaking over an intercom, telling the trespasser that they are being watched and that the authorities have been notified. This tactic, known as ‘talk down’, also allows officers to view the intruder’s reaction to their commands and evaluate what they feel the best next step is. If individuals do not respond in a desired manner, it may be time to take more serious action and dispatch a patrolman to the area. 4. Delay, Defend, Dispatch And Handle The possible danger has been identified, recognized and evaluated. Now it is time to effectively defend against current attacks and slow down both cyber and physical perpetrators’ prospective efforts. Through the use of a well-designed, open platform VMS, security monitors can manage edge devices and other complementary intrusion detection and response technologies, including acoustic sensors, video analytics, access control and radio dispatch. A robust VMS also enables operators to control functions such as video replay, geographical information systems tracking, email alerts and hand-off to law enforcement. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level The primary purpose of the delay facet of the overall perimeter protection strategy is to stall an attempted intrusion long enough for responders to act. Access control systems play a key role in realizing this objective. When a security officer sees a non-compliant, suspicious individual on the camera feed, the officer can lock all possible exits to trap them in one area all through the VMS. 5. Intelligence: Collect Evidence And Debrief More data and intelligence collected from an event equals more crucial evidence for crime resolution and valuable insight for protecting against future incidents. With the right combination of technologies, facilities can take monitoring and evidence collection to the next level. One innovative resource that has become available is a live streaming application that can be uploaded to smart phones and used for off-site surveillance. This app gives personnel the power to follow intruders with live video anywhere and allows operators to monitor alarm video in real-time. Geographic Information System (GIS) maps are computer systems utilized for capturing, storing, reviewing, and displaying location related data. Capable of displaying various types of data on one map, this system enables users to see, analyze, easily and efficiently. Multi-sensor cameras, possessing both visible and thermal capabilities, provide high-contrast imaging for superb analytic detection (in any light) and High Definition video for evidence such as facial ID or license plate capture. Integrating these two, usually separated, camera types into one helps to fill any gaps that either may normally have. Still, in order to capture and store all of this valuable information and more, a robust, VMS is required. Recorded video, still images and audio clips serve as valuable evidence in the event that a trial must take place to press charges. Control room operators can use data collection tools within their VMS to safely transfer video evidence from the field to the courtroom with just a few clicks of their mouse. More advanced video management systems can go a step further and package this data with other pertinent evidence to create a comprehensive report to help ensure conviction.
A week of mass shootings this summer has again spotlighted the horror of gun violence in public spaces. A 19-year-old gunman opened fire at the Gilroy Garlic Festival in California on July 28, injuring 13 and killing four (including the gunman). In El Paso, Texas, less than a week later, a lone gunman killed 22 people and injured 24 others. In Dayton, Ohio, a day later, a gunman shot 26 people during a 30-second attack, killing 9 and injuring 17. Rising active shooting incidents Beyond the grim statistics are three distinct incidents, linked only by the compressed timeline of their occurrence. Still, there is a tendency to want to find a pattern: Why do these incidents happen? How can we prevent them? In total, 91 people were killed and 107 more were injured in locations such as workplaces, schools, and public areas One attempt to analyze trends and commonalities among mass shooting incidents is a research report published by the U.S. Secret Service National Threat Assessment Center (NTAC) titled “Mass Attacks in Public Spaces – 2018.” Looking at the totality of major mass attacks last year, the report seeks to find patterns that can shed light on the attacks and suggest strategies to prevent and mitigate future incidents. Mass shootouts Between January and December 2018, 27 incidents of mass attacks – in which three or more persons were harmed – were carried out in public spaces within the United States. In total, 91 people were killed and 107 more were injured in locations such as workplaces, schools, and other public areas. The National Threat Assessment Center report considered all the mass attack incidents in 2018 and analyzed some trends and statistics: Over half (59%) took place between the hours of 7 a.m. and 3 p.m., and 63% of the attacks ended within 5 minutes of when they were initiated. Most of the attackers were male (93%); the youngest was a 15-year-old student and the oldest was 64. Nearly a fourth of the attackers (22%) had substance abuse problems, and half (48%) had a criminal history, whether violent or non-violent. About two-thirds (67%) experienced mental health symptoms, commonly depressant and psychotic symptoms such as paranoia, hallucinations or delusions. Almost half (44%) had been diagnosed with a mental illness prior to the attack. The main motives were domestic, personal or workplace grievances (52%); followed by mental health/psychosis (19%); 22% had unknown motives. Most (85%) of attackers had at least one significant stressor in their lives in the last five years; 75% had experienced stressors that occurred in the previous year before the attack. Personal stressors included the death of a loved one, a broken engagement of physical abuse. Work- or school-related stressors included losing a job, being denied a promotion, or being forced to withdraw from classes. More than half of attackers (56%) experienced stressors related to financial instability. Personal issues such as homelessness or losing a competition were also stressors. Nearly all the attackers (93%) engaged in prior threatening or concerning communications. Most of the attackers (78%) also exhibited behaviors that caused concerned in others. For the majority of the attackers (70%), that concern was so severe that others feared specifically for the safety of the individual, themselves, or others. The Secret Service report also analyzed the overall impact of several factors: Mental health and mental wellness - Mental illness, alone, is not a risk factor for violence, and most violence is committed by individuals who are not mentally ill. Two-thirds of the attackers in this study, however, had previously displayed symptoms indicative of mental health issues, including depression, paranoia, and delusions. Other attackers displayed behaviors that do not indicate the presence of a mental illness but do show that the person was experiencing some sort of distress or an emotional struggle. The importance of reporting - Since three-quarters of the attackers had concerned the people around them, with most of them specifically eliciting concerns for safety, the public should be encouraged to share concerns they may have regarding coworkers, classmates, family members, or neighbors. Need for a multidisciplinary threat assessment approach - There is a need to standardize the process for identifying, assessing, and managing individuals who may pose a risk of violence. Law enforcement and others are taking steps to ensure that those individuals who have elicited concern do not “fall through the cracks.” Law enforcement personnel should continue developing close partnerships with the mental health community, local schools and school districts, houses of worship, social services, and other private and public community organizations. Threat assessment Threat assessment refers to a proactive approach to violence prevention, an investigative model Many of the resources to support the threat assessment process are already in place at the community level, but require leadership, collaboration, and information sharing to facilitate their effectiveness at preventing violence, according to the report. ‘Threat assessment' refers to a proactive approach to violence prevention, an investigative model originally developed by the U.S. Secret Service to prevent assassinations. It has since been adapted to prevent all forms of targeted violence, regardless of motivation, including K-12 school shootings and acts of workplace violence. When implemented effectively, a threat assessment generally involves three key components: Identify, Assess and Manage. Identify, Assess and Manage Public safety entities rely on people who observe concerns to identify the individual to law enforcement or to someone else with a public safety responsibility. In educational settings or workplaces, concerns may be reported to a multidisciplinary threat assessment team that works in conjunction with law enforcement when needed. The responsible public safety entity is then tasked to assess the situation to determine how they can manage any risk of violence posed by the individual.
Intelligent solutions, such as those derived from artificial intelligence, help critical infrastructure organizations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command center technologies, fusing critical data input from emergency calls and responder activity to enhance situational awareness. Electrical substations are particularly vulnerable (and in need of extra security) due to their role in power distribution and the nature of their equipment. The challenge power utilities worldwide are facing is finding an affordable solution, which can help detect, deter and facilitate an informed response to a substation security event. Data capture form to appear here! U.S. regulations In the United States, this need is furthered by the physical security mandate CIP-014 issued by the North American Electric Reliability Corporation (NERC), calling for identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address. CIP-014 identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address CIP-104 specifically calls for implemented security plans that include measures to deter, detect, delay, assess, communicate, coordinate and respond to potential physical threats and vulnerabilities. Manufacturers of video and other systems are designing products to serve the critical infrastructure market. For example, Dahua Technology offers explosion-proof cameras with a combination of rugged reliability and superior optics that is a fit for surveillance of explosive and corrosive environments, including chemical plants, refineries, and other facilities in the oil and gas industry. This explosion-proof series of cameras are housed in enclosures that are certified to the ATEX and IECEx standards for equipment in explosive atmospheres. Each explosion-proof camera features Dahua’s Starlight technology for ultra low-light sensitivity and high-definition sensors that deliver clear images in real-time. They are IP68-rated to prevent water and dust ingress. Each explosion-proof camera features Dahua’s Starlight technology for ultra low-light sensitivity and high-definition sensors that deliver clear images in real-time Video footage in extreme temperatures Another manufacturer, Videotec, offers a range of cameras and housings that provide video footage regardless of aggressive external factors, such as ice cold, scorching heat, desert sand, the force of sea or wind, total darkness, pollution, corrosion and even explosive agents. SightSensor thermal systems enable a utility to detect and respond to substation security incidents across multiple sitesSightLogix smart thermal camera systems have been deployed to protect substations for electric utilities and other critical infrastructure facilities. SightSensor thermal systems enable a utility to detect and respond to substation security incidents across multiple sites, ranging from copper theft to vandalism while also meeting regulatory compliance. At each substation facility, Thermal SightSensors are positioned along the perimeter, and are paired with a high-resolution pan-tilt-zoom camera for alarm assessment. When a Thermal SightSensor detects an intruder, the target’s location information is sent over the network to a SightTracker PTZ controller, which automatically zooms and steers PTZ cameras to follow the intruder. The target’s location is also displayed on a topology site map to provide real-time situational awareness. Alarms are sent to the utility’s 24-hour security operations center, which will contact law enforcement in real time when unauthorized intrusions are detected. Integrated intrusion detection and lighting systems The Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system is simplifying security at one U.S. electrical utility company. For years, the utility company had integrated its perimeter intrusion detection and lighting systems. The company has now installed the Senstar LM100 which provides detection and lighting in one product and saves them over $80,000 per site. The savings are a result of the reduction of electrical requirements, conduit, grounding, and associated labor, as well as the removal of certain equipment from project scope that are required for the two-system integration. The Senstar LM100’s perimeter LED-based lighting acts as an initial deterrent. If an intruder persists and an attempt to cut, climb or otherwise break through the fence is detected, the closest luminaire begins to strobe, and an alert is sent via a security management system. The intruder knows immediately they have been detected and that their exact location is known by security and others in the vicinity.
From New York to California, city and state governments throughout the United States are second-guessing the use of facial recognition technologies by police departments and other government entities. San Francisco was among the first major cities to issue a ban on ‘secret surveillance’ tools such as facial recognition. Now backlash against public use of facial recognition appears to be gathering steam, and some technology trials have faced additional scrutiny. Oakland, California, has joined San Francisco in banning use of facial recognition. Oakland’s diverse population has led to concerns about facial recognition systems that are prone to misidentify people of color. Limiting the use of facial recognition technology The policy would limit use of live facial recognition to situations of credible terrorism threatsNearby Berkeley, California, is considering its own prohibition of facial recognition systems by city government. Somerville, Massachusetts, has banned city departments from buying or using facial-recognition technology for any purpose. A Detroit civilian oversight board and the Board of Police Commissioners are reviewing a formal policy that would require other evidence to be used along with biometric search results to confirm a suspect’s identity. The policy would also limit use of live facial recognition to situations of credible terrorism threats. At the state level, Massachusetts and Michigan are considering moratoriums on use of facial recognition, and a bill in California would forbid police use of facial recognition in body cameras. There is a law in Illinois that requires companies to get consent from customers before collecting biometric information. Installing cameras and facial recognition system Lockport Schools in western New York state have recently drawn attention to their planned use of facial recognition. The school system plans to install dozens of surveillance cameras and a facial recognition system using $1.4 million of a state grant. The Aegis system (by SN Technologies in Canada) creates an ‘early warning system’ that informs staff if it detects individuals who are not allowed in the schools. The school system plans to install dozens of surveillance cameras and a facial recognition system The system will screen every door and also use object recognition to detect 10 types of guns. An initial implementation of the program this summer is meant to troubleshoot the system, train officials on its use, and discuss procedures with law enforcement in the event of an alert. Full implementation is planned in the fall. Abuse of facial recognition system However, New York State Education Department has asked Lockport Schools to delay use of facial recognition technology on students pending further evaluation, and a bill introduced in the New York State Assembly would halt use of the technology for a year for further study. The city of Orlando and Orlando Police Department are testing facial recognition technology to address public safety Abuse has also been a concern. A report from Georgetown Law’s Center on Privacy and Technology details widespread abuse of the New York Police Department’s facial recognition system, including image alteration and use of non-suspect images. The charges raise questions about the propriety of how expanding technical capabilities of facial recognition systems are implemented. Testing facial recognition for public safety The city of Orlando, Florida, and Orlando Police Department are testing facial recognition technology to address public safety, partnering with Amazon Web Services. One pilot ended in June 2018, and the most recent ended on July 18, 2019. Orlando has no immediate plants regarding future pilots. Light bulb-sized cameras were affixed to traffic signal poles along the city’s palm-tree-lined avenues. If a camera ‘sees’ someone, it sends a live video feed to Amazon’s facial ‘Rekognition’ system, cross-referencing the face against persons of interest. Only images of Orlando police officer volunteers were used for the test. Recently Congress has become attentive to privacy concerns and, now, the Senate is considering a bill that would limit businesses from collecting and tracking facial recognition data without consent.
It’s no surprise that a growing number of people are turning to motorbikes as their primary method of transport due to Spanish cities becoming increasingly congested. In fact, according to a 2016 study by the Institute of Environmental Science and Technology (ICTA-UAB) and the UAB Department of Geography, Barcelona is now the European city with the highest number of motorbikes per inhabitant. The research found that 372,278 trips are made on motorbikes every day in the city. Motorbikes began to experience a boom in 2004 when the Spanish government enacted a regulatory measure that allowed car drivers with three years of experience to switch to motorbikes with capacity up to 125cc. The ability to avoid congestion and complete journeys more quickly promoted exponential growth. Protecting motorbikes from thieves Unattended motorbikes are vulnerable to theft and vandalism, so protecting them has become a key concernAlthough this has brought many benefits, it has also created a significant problem for users – where to park their motorbikes. Unattended motorbikes are vulnerable to theft and vandalism, so protecting them has become a key concern. Similarly, city councils are cracking down on illegally parked motorbikes that obstruct access, and are removing them from pavements and other areas. It’s this situation that prompted Alicante-based motorcyclist, Alejandro Martin, to create Mimoto Parking, along with two other biking friends. As the company’s managing director, he takes up the story and explains, “We want our customers to be able to keep their motorbikes secure and avoid the fines associated with illegal parking. By creating conveniently located facilities that can be accessed at street level, without the need to negotiate dangerous ramps, we have reinvented the parking concept. “We offer a revolutionary service where owners can safely park and also store belongings such as helmets, jackets and gloves in lockers. Users can access our parking lots on a 24/7 basis and go about their business without worrying about their motorbike’s security.” Access code to obtain a parking space Although it only operates a few sites at the moment, the response has been incredible and Mimoto Parking has plans to operate over 40 facilities by 2021 and, in order to finance this rapid expansion, Alejandro Martin and his team is looking to attract additional funding from interested parties. By registering online for free, a user is sent a six digit personal and non-transferable access code to obtain a parking space The company’s success is down to the fact that Mimoto Parking has simplicity at its heart. By registering online for free, a user is sent a six digit personal and non-transferable access code to obtain a parking space. They then identify the facility that is most convenient, key in the six-digit code via a keypad when they arrive, and enter and park. Remote monitoring via Ralset’s ARC Utilizing a ‘pay as you go’ concept, leaving users simply re-enter the same six digit code at which point Mimoto Parking automatically charges them for the duration of their stay. Each facility is remotely monitored at all times via Ralset’s alarm receiving center (ARC) and a full intercom system offers user assistance when they need it. Alejandro Martin says, “When developing Mimoto Parking we knew that our success would hinge on our ability to implement access control and intrusion detection technology that could not only guarantee the highest levels of security but also be intuitive, straightforward to roll-out across multiple sites, and be as reliable as possible. “In order to find out more about what we could do, we invited leading security integrator and PACOM approved partner, Cettec Seguridad, to come in and hear about our requirements.” integrated access and alarm controller Doors and alarm points can be partitioned into different areas of security and controlled by multiple keypads"Cettec Seguridad configured a solution based around the PACOM 8002 integrated access and alarm controller – an all-in-one platform that integrates the functionality required for a remote security system. PACOM 8002 supports auto-discovery of peripheral devices for simplified installation and all doors can be individually configured to operate via card only, PIN only, or card and PIN, with access schedules providing additional control. Furthermore, doors and alarm points can be partitioned into different areas of security and controlled by multiple keypads. The PACOM 8002 system would have to integrate seamlessly with Mimoto Parking’s mobile app and allow the ARC to monitor events at all times. Alfonso Lorenzo Robledano, business development director for Southern Europe at PACOM, states, “Cettec Seguridad asked us to make some adaptations to the PACOM Graphical Management System (GMS), which is based on a data communications platform that successfully integrates access control, alarm monitoring, video surveillance and many other building services into a single, remotely accessible system. “PACOM’s technical experts were able to modify the software’s algorithms and design new schematics to meet Mimoto Parking’s exact requirements and, in addition, deliver uninterrupted system operation, intelligent self-testing and multiple back-ups.” Manages the parking occupancy status Signs can be operated to indicate availability and the system can even be remotely reset when necessaryAs well as allowing customers to communicate directly with personnel at the ARC, the modified PACOM GMS can also manage the parking occupancy status at each site. Signs can be operated to indicate availability and the system can even be remotely reset when necessary. This level of scalability also means that new technologies can simply be added to as they are developed, offering Mimoto Parking the ability to further develop the system as required and future proof its investment. Just as importantly, PACOM and Cettec Seguridad collaborated to ensure that the system can be quickly and easily rolled out across any new sites as they are acquired. Each system controls one entry and one exit door using a single controller and keypad, which means minimal wiring and allows minor adjustments to be made as necessary. Meeting the objective of securing bikes Mimoto Parking’s Alejandro Martin is delighted with what has been achieved and praised PACOM’s willingness to work closely with his team and Cettec Seguridad to devise a unique solution. He concludes, “Our ability to keep customers’ motorbikes secure is fundamental to our success and therefore we needed to be 100 per cent confident that the technology we installed was able to meet this objective. “PACOM’s experts were a pleasure to deal with and as keen as we were to optimize our entire security and access control infrastructure. I’m looking forward to working together in the future as we expand Mimoto Parking and introduce new sites to our portfolio.”
He is man’s best friend, but the bad guys’ worst enemy. That is why technology-based security specialist Safer Scotland backed up its state-of-the-art crime prevention precautions at a troublesome site in West Lothian recently with a canine capability which has sent the local predators packing. The Paisley-based company brought in what Safer Scotland Director Ryan Clark said is the ‘last line of defense’ – a trained dog handler and his German Shepherd companion – to police the challenging housebuilding site. And since the guard dog took up station on site, it has enjoyed its first weekend without incursions in two months. Audio warnings to deter intruders Ryan said: “Normally, on an extensive construction site such as this, we would secure everything with closely-monitored CCTV cameras backed up by voice warnings to deter intruders. However, this was a particularly challenging arena. The site was within the bounds of a difficult area which had been widely troubled by anti-social behavior. It was also adjacent to a ‘hang-out’ area for local teenagers. Audio warnings were deployed, with a satisfactory deterrent effect and a significant minimizing of damage" “In the space of one month, we had to call the police out to no fewer than 20 incursions. Audio warnings were deployed, with a satisfactory deterrent effect and a significant minimizing of damage.” However, Safer Scotland, in consultation with its client and the Scottish Police, took the view that, with lighter nights, hotter weather and the school holidays, the number of incursions might well escalate. It took the decision increase the level of presence at the site with a licensed, professional dog handler whose Alsatian dog used to work with the police. Securing high value assets in remote locations Ryan said: “He took up station at 5pm on the Friday and, about 9.45pm, a large group of late teens came on site. The handler escorted them off the site and detailed to them the risks that they were at trespassing onsite. Since then, there has been no trouble.” Safer Scotland has created a niche in a competitive business environment by its emphasis on reliable technology which allows corporate clients to secure high value assets in remote or temporary locations. It is expanding this year into the North of England under the trading name Safer England.
The National Health Insurance Fund (NHIF) is a Social Health Insurance Scheme established by CAP 395 with the main objective of ensuring accessibility of health care services to all Tanzanians. The Fund has managed to expand its coverage to include councils, private companies, religious and educational institutions, private individuals, children under 18 (TOTO Afya) as well as mutual groups, whereby all members can equally access health services in all accredited health facilities. The Fund is also administering the Bunge Health Insurance Scheme, on behalf of the National Assembly. NHIF is a prestigious public institution that serves people all over Dar es Salaam and Tanzania. It has multiple sites spread over these regions. Their current surveillance platform had a few limitations of integrating third-party cameras and was not facilitating centralized monitoring for multiple locations. Matrix Sataya Samas is designed to meet diverse needs of large enterprises connected to a central location or a single site This posed a problem in managing and monitoring all sites from a single location. For this, they needed a surveillance platform that could easily integrate with multi-brand cameras as well as facilitate multi-location monitoring. Moreover, they needed a system with monitoring capacity of over 500 cameras with the facility of remote management for real-time security. Specifically designed solutions To the above challenges, Matrix Offered Sataya Samas Video Management System. It is a Video Surveillance management solution specifically designed to meet the diverse and complex needs of large enterprises having multiple sites connected to a central location or a large, single site. The system was able to integrate with 56 AXIS cameras available at its Head Quarters and other 16 cameras available at its district branch offices. All the cameras were managed at a single central server located at the NHIF HQ office. Matrix VMS provided real-time security with Intelligent Video Analytics such as Motion Detection, Intrusion Detection, Trip Wire etc. Additionally, VMS enabled monitoring and managing video surveillance from mobile phones and tablets remotely by using Matrix Mobile Application: SATATYA VISION. These features made monitoring much more reliable and easier for them. Project highlights : VMS Simultaneous User Licence - 3 Qty Mobile App (SATATYA VISION) Intelligent Video Analytics Benefits : Retention of existing Security infrastructure Reduces storage consumption with cost-saving features Centralized monitoring and management Real-time security
Delta Scientific, globally renowned manufacturer of counter-terrorist vehicle control systems used in the United States and internationally, has announced that its innovative DSC1000 portable barrier and TB100 portable bollard systems were rented from Australian-based Knight Brothers to help protect the 85,000 entrants in the world's largest run on 11 August. Both a fun run and a competitive contest, the City2Surf Run covers a 14 kilometers (8.7 miles) course that begins in Sydney's Central Business District (CBD) and culminates at scenic Bondi Beach. Vehicle access and control system This annual event needs a vehicle access and control system that can be deployed temporarily and quickly" "This annual event needs a vehicle access and control system that can be deployed temporarily and quickly to secure vehicle check points into the main event area for the mobilization, execution and demobilization phases," explains Matthew Knight, director of Knight Brothers Pty Ltd, Australian partner of Delta Scientific. Knight adds, "At the same time, they did not want to purchase units that would only be used once a year. For such applications, a lease plan has been created where organizations can simply lease the portable barriers and bollards, use them, pack them up and return them." DSC1000 portable barrier system "Pre-packed in a 20 foot container, the DSC1000 barrier and TB100 bollard array package was delivered to site and deployed within an hour to provide effective perimeter protection while maintaining the required pedestrian and vehicle thoroughfares into the event grounds." The DSC1000 is a self-contained unit that is stored and towed on its own trailer. Light enough to be pulled by a golf cart and set up in only 10 minutes, the DSC1000 portable barrier's crash test stopped a 2300 kg vehicle going 64 km/p, providing it with an ASTM rating of P40. With no foundation or electrical hook-up needed, two people can set up and take down the DSC1000 special event barrier. TB100 portable bollard system The patent pending crash rated TB100 portable bollard system lets security providers promptly block access to temporary venues. Individual portable bollards provide vehicle safety in applications such as heavily traveled narrow walkways and roadways or any area that a vehicle can get through. Certified testing demonstrates that a TB100 portable bollard system will stop and disable a 6,804 kg vehicle traveling at 48 kph, resulting in an ASTM M30, P3 rating. A single TB100 bollard absorbs 400,000 foot pounds of kinetic energy.
Round table discussion
The definition of a standard is “an authoritative principle or rule that usually implies a model or pattern for guidance, by comparison with which the quantity, excellence, correctness, etc., of other things may be determined.” In technology markets, such as physical security, standards are agreed-upon language, specifications or processes that are used across the board by multiple stakeholders to enable easier interconnectivity and smoother operation of systems. We asked this week’s Expert Panel Roundtable: How are standards shaping change in the physical security market?
Cybersecurity has become the ultimate buzzword in the physical security market. And it also represents one of the industry’s most intractable challenges. Several years ago, the problem with cybersecurity was lack of awareness among physical security practitioners. It’s now safe to say that awareness has increased. Everyone today talks about cybersecurity, but has it helped the larger problem? We asked this week’s Expert Panel Roundtable: Is greater awareness helping to increase the cybersecurity of physical security systems?
Our Expert Panel is an opinionated group on a wide variety of topics, and we are dedicated to providing a useful and flexible forum to share those opinions. This week, our panelists address a range of opinions about several self-selected topics, culled from the large number of Expert Panelist responses we have collected in the last year. In this Expert Panel Roundtable article, we will share these varied and insightful responses to ensure they are not lost to posterity!
Intrusion detection: Manufacturers & Suppliers
- DSC Intrusion detection
- Optex Intrusion detection
- Vanderbilt Intrusion detection
- Bosch Intrusion detection
- NetworX Intrusion detection
- Climax Technology Intrusion detection
- RISCO Group Intrusion detection
- Visonic Intrusion detection
- Texecom Intrusion detection
- Pyronix Intrusion detection
- Honeywell Security Intrusion detection
- Gallagher Intrusion detection
- Senstar Intrusion detection
- Enforcer Intrusion detection
- CIVINTEC Intrusion detection