IP security solutions
Digital Harmonic, an innovative signal and image processing company founded by Paul Reed Smith, announces the appointment of Mason Baron as Chief Technology Officer. AI, surveillance reconnaissance Baron brings 18 years of software development, large team leadership, artificial intelligence, machine learning, surveillance reconnaissance systems design, and imagery, signal, and radar processing experience to Digital Harmonic. Most recently, he served as Minotaur Chief Naval Architect at...
As part of its 50th anniversary celebration Viking Electronics is revealing a brand mascot named “Vin”. Vin is a tough but fun representation of the Viking brand and the 500+ products that bear its name. Viking Electronics “We’re grateful for the opportunity to serve the security and communications industry for 50 years. We wanted to celebrate this milestone with a fun and personable representation of Viking Electronics. Vin represents the tough and battle-tested legacy...
Radiflow, global provider of industrial cybersecurity solutions for industrial automation networks, has announced that the company has been recognized as the Global Customer Value Leader in IT/OT Security for Smart Buildings by the leading analyst firm, Frost & Sullivan. Cybersecurity protection This award from Frost & Sullivan highlights the growing importance that Radiflow is playing in providing cybersecurity protection for smart building operations as dramatically increasing number...
Using AI to bring focus to security, Avigilon Corporation, a Motorola Solutions company, has announced that it will once again be showcasing some of its latest and most innovative products and technologies at GSX 2019. Avigilon will showcase the next generation of video analytics, artificial intelligence, access control and cloud solutions, as well as some of the integrations with Motorola Solutions. Cutting-edge video analytics and AI Avigilon will be demonstrating how these latest technologi...
ShotSpotter, Inc., global provider of security solutions that help law enforcement officials identify, locate and deter gun violence and active shooter incidents, has announced an updated version of ShotSpotter Missions – an AI-driven crime forecasting and patrol management software tool. Acquired from HunchLab in late 2018, today’s product release represents ShotSpotter’s first set of enhancements as it extends its penetration into this emerging category. ShotSpotter Mi...
The Kwikset brand of Spectrum Brands, Inc. – Hardware & Home Improvement Division, announces the launch of SmartCode 955. Functioning as a commercial grade electronic lever, SmartCode 955 provides advanced security, strength and durability. It is the first commercial grade electronic lever from Kwikset - U.S door hardware manufacturer - designed to serve the security needs of facility managers, residential and commercial property owners, and small business owners. SmartCode 955 electr...
Aqua Security, global platform provider for securing container-based and cloud native applications, has announced a new Private Offer capability enabling software licensing and procurement directly through Microsoft Azure Marketplace, allowing customers to utilize existing purchasing methods in place for Azure services. Aqua now offers a choice of flexible software acquisition models that allow customers to purchase licenses on Azure the way that works best for them. Software purchased directly from Aqua can easily be installed on Azure while still taking advantage of streamlined deployment through the Azure Marketplace. Aqua Cloud Native Security Platform The Aqua Cloud Native Security Platform (CSP) now offers full support for the widest range of Microsoft cloud native technologies The Aqua Cloud Native Security Platform (CSP) now offers full support for the widest range of Microsoft cloud native technologies including Azure Kubernetes Service (AKS), Azure Container Instances (ACI) and the Azure Functions serverless compute service. Out-of-the-box integration with Azure DevOps development tools, Azure Container Registry (ACR) and Azure Vault for secrets management further simplify and speed deployment. Indicative of the deeper collaboration, Microsoft recently co-sponsored KubeSec Enterprise Summit, an event produced by Aqua and held in conjunction with KubeCon in Barcelona, Spain this past May. In addition, Aqua and Microsoft are jointly conducting a series of regional marketing programs to educate customers on cloud native technologies and providing the opportunity to interact with local technical resources from both companies. Recent events have included: Kubernetes DevSecOps Summits on March 14 in San Francisco and June 4 in New York City Azure Kubernetes / Aqua Security Hands-on Workshop in Atlanta on June 18 Aqua-to-Azure integration “The tight Aqua-to-Azure integration enables us to work closely with Microsoft in co-selling and joint marketing activities that educate enterprises on how they can leverage emerging security technologies like Aqua to mitigate the security concerns of running applications in the public cloud,” said Upesh Patel, Vice President of Business Development for Aqua Security. “The Aqua-Microsoft collaboration in the field optimizes the evaluation and production rollout processes, enabling IT security teams to harden their organizations’ security postures, and DevOps to quickly realize the benefits of working within these powerful Azure environments.” Jeana Jorgenson, GM, Cloud and AI for Microsoft Corp. said, “The availability of Aqua’s enterprise class security solution through the Microsoft Azure Marketplace simplifies the process of building out a secure infrastructure for cloud applications. Customers deploying containers on Azure can utilize the Private Offer process to quickly get a quotation and complete their purchasing cycle.” Aqua CSP integrations The Aqua CSP integrations with Azure Container Services, Azure Functions and Azure DevOps environments are available now. Customers wishing to receive a quote via the Private Offer process should contact their Aqua account manager.
Cobalt Iron Inc., global provider of cloud-based data protection and security solutions, has announced that it has received a patent for its techniques related to electronic discovery (e-discovery) when searching for data in backup storage. Solidifying Cobalt Iron's advanced enterprise-data discipline capabilities and providing further proof of it, this patent represents the company's unique approach to managing backup data sets to facilitate e-discovery requests. As a result, CIOs, data custodians, compliance officers, systems administrators, backup administrators, and other IT professionals who use Cobalt Iron's Adaptive Data Protection platform can fulfill e-discovery requests more quickly and cost-effectively, with verifiable data discipline. Adaptive Data Protection platform Among the largest data targets for e-discovery searches in most enterprises are backup data sets In today's business and regulatory climate, it is essential for enterprises to be able to respond to e-discovery requests in a timely, comprehensive, and cost-efficient manner. Among the largest data targets for e-discovery searches in most enterprises are backup data sets, which typically contain copies and versions of all key corporate data. Performing e-discovery data searches on these enterprise backup data sets can be complex, time-consuming, and very costly. Enterprise data custodians struggle with balancing the demands of legal e-discovery requests against the challenges and costs of performing the searches. e-discovery in backup data This Cobalt Iron patent unveils novel techniques for facilitating electronic discovery in backup data including: - Extracting metadata from a backup data set for e-discovery - Efficiently identifying a subset of data within a backup data set associated with an e-discovery request - Performing data reduction on data targeted by an e-discovery request - Preserving a native file format and a chain of custody for each data item in a backup data set identified by an e-discovery request - Applying e-discovery and backup policies to data identified by an e-discovery request - Automatically copying e-discovery data that is about to be deleted or modified within a backup data storage e-discovery techniques "Cobalt Iron's new electronic discovery techniques bring insights and efficiencies to corporate data custodians, allowing them to manage e-discovery requests more effectively and introduce new levels of data discipline," said Richard Spurlock, CEO and founder of Cobalt Iron. "Preserving native file formats, maintaining a chain of custody, and applying e-discovery policy for each data item identified by an e-discovery request greatly simplifies the arduous tasks associated with regulatory compliance."
Qognify, the trusted advisor and technology solution provider for physical security and enterprise incident management, has announced that it will share its expertise of how metropolitan areas can make the shift from being safe and smart to fully cognitive cities, at the 5th National Summit on 100 Smart Cities India 2019. Qognify is the Presenting Partner of the Summit which takes place August 22, 2019 at The LaLiT in New Dehli. Safe & Smart City Solution Qognify, with its Safe & Smart City Solution, is one of the leaders in safe and smart cities in India. It is currently involved in more than 20 safe and smart city projects throughout the country that include high profile award-winning projects such as: Navi Mumbai - Qognify is used to monitor all critical points within the city including public transportation, schools, heavily traveled traffic junctions, city entrances and exits, open-air markets and utility infrastructure. Nanded City has an integrated command, control and communication center (C-Cube) that is powered by Qognify’s Safe City solution that includes Qognify’s Situator, video management and analytics solutions. Kohlapur is using Qognify’s video management and analytics to assist law enforcement and city management in coping with the influx of increased tourism. Regional VP, India at Qognify, Dilip Verma, will present at the Summit and he comments: “Many cities have taken steps to become safe cities, while a smaller but growing number are breaking ground as truly smart cities. At the Summit, we will use our experience, working on some of the most innovative projects in India and around the world, to look to the horizon, where we envisage urban environments becoming truly cognitive.” Safe, smart and cognitive cities Cognitive cities are much better positioned to thrive in the face of significant challenges" Verma makes the distinction between safe, smart and cognitive cities: “A safe city aims to ensure the safety and security of its residents, while smart initiatives go further, improving the operations of city. Cognitive cities take things to the next level by keeping citizens engaged and contributing to the gathering of the relevant data. The insights from which can be used not only to improve security, safety and city operations, but also the lives of residents.” He adds: “Cognitive cities are much better positioned to thrive in the face of significant challenges such as clean water scarcity, climate change, and providing functional and efficient mass transportation at mega-city scales. It is an ambitious goal that not only holds the promise of being more resilient, but at the same time promotes civic participation, sense of community and the health and wellbeing of citizens.” 5th National Summit on 100 Smart Cities India 2019 The 5th National Summit on 100 Smart Cities India 2019 will bring together global thought leaders to focus on aspects of a smart city including urban development, surveillance, power, energy, transport, technology, smart building, smart grid, smart health, network and communication technology.
TrackTik Software, provider of the No. 1 security workforce management software solutions internationally, has announced that its Vice President, Security Industry Mark Folmer has been selected as the third most influential thought leader on the IFSEC Global Influencers in Security and Fire 2019 list. Driving technology innovations This list, unveiled by the UK-based International Fire and Security Exhibition and Conference, the premier integrated security event – features executives who have significantly influenced the security sector. This includes individuals who have played a key role in driving technological innovation and best practices, shaping debate around industry issues, propelling the success of their organization, and helping to raise the industry’s profile. Folmer made it on to the list after being judged by a leading panel of industry experts - which he will be joining next year. Folmer, who took third spot on the 2019 thought leadership list – up from placing 19th in 2018 – was recognized as a security leader and forward-thinking influencer, committed to shaping the future of the industry as a practitioner, consultant, technology disruptor and university instructor. In his role at TrackTik Software alone, he is a trailblazer in advocating for the professionalisation of the industry Importance of data to drive security In his role at TrackTik Software alone, he is a trailblazer in advocating for the professionalization of the industry and reinforcing the importance of data to drive security organizations forward. By so doing, he has helped security organizations globally transform their operations to unprecedented levels of intelligence and efficiency. Within TrackTik, he also serves as an industry evangelist ensuring that the company stays up-to-date with the industry’s best practices and standards. A business school graduate with Certified Protection Professional (CPP) and The Security Institute (FSyI) certifications, Folmer gained status as a security services specialist through two decades of operations and volunteer experience. A Senior Regional Vice President for ASIS International’s Region 6, Canada, and Chair of the ASIS Security Service Council — an international group focused on security service delivery standards — he is a keen industry speaker and media spokesperson, committed to sharing his knowledge with the next generation of security professionals in his teaching role at Université de Montréal. Data protection expert Folmer’s selection follows a long list of recognitions attained by TrackTik Software. Most recently, the company’s CEO Simon Ferragne was presented an award for the Next Generation Executive Leadership by the Canadian Advanced Technology Alliance (CATAAlliance) and was named a Top 10 under 40 Security Leader by Canadian Security Magazine. In 2018, TrackTik Software was ranked No. 11 on the Deloitte Technology Fast 50 list, was named one of LinkedIn’s Top 25 Startups in Canada, placed 36th on the Canadian Business 2018 Startup 50 ranking of Canada’s Top New Growth Companies, and received a SaaS Award for Customer Success by San Diego-based APPEALIE.
Sargent and Greenleaf, Inc. (S&G), a global manufacturer of high-security locks and locking systems for safes, vaults and high-security cabinets, has appointed Mark LeMire to Chief Executive Officer. LeMire comes to Sargent and Greenleaf with over 25 years of experience in executive management, new product development and engineering. Most recently, LeMire held leadership positions at Loma Systems and Buehler, both divisions of Illinois Tool Works (ITW). As a Global Director of Marketing and Product Development for Buehler, he managed and led the product portfolio encompassing lifecycle management, innovation and new product development. As CEO, LeMire will provide strategic leadership and day-to-day operational management for Sargent and Greenleaf, guiding the company to exceed its business objectives. Security and communication expert Mark will be a great asset as he takes on this role to help further S&G’s long-standing reputation" “We are proud to welcome Mark to the S&G executive team,” said Paul Bridwell, Managing Director at OpenGate Capital, who is responsible for overseeing all North American investments for the firm. “With his extensive product development knowledge, Mark will be a great asset as he takes on this role to help further S&G’s long-standing reputation as a trustworthy and dependable manufacturer of high-quality, innovative products.” OpenGate Capital acquired S&G in June 2019 and the business joins the firm’s global portfolio of lower middle market businesses operating across North America and Europe. Asset security “I am excited to work with the S&G team to build upon the successful and respected legacy that those before me have built over the last 160-plus years,” states LeMire. “As technology evolves, S&G will continue to provide products that secure our customers’ most valuable assets, while building even stronger customer relationships.” LeMire graduated from Purdue University with a B.S in Mechanical Engineering Technology and received his M.B.A in Marketing from DePaul University in Chicago.
ProSource, the audio, video, and integration buying group in the United States, has announced the addition of eight new Custom Integrator (CI) members and one new PRO level member in the second quarter of 2019. New members in Q2 represent $44 million in new revenue for the group. Networking and integration firm "ProSource continues to grow by welcoming outstanding operations into the organization," said Dave Workman, CEO and President of ProSource. "Members benefit from the excellent programs with our vendor partners, exceptional educational opportunities, and peer-to-peer networking." The new CI members are: Advanced Tech Systems, Inc., Greensboro, NC ATTYWON, Great Neck, NY Chameleon Technologies, Inc., Los Angeles, CA HD2020, Tampa, FL Force AV, West Palm Beach, FL Glabman Technology Solutions, Costa Mesa, CA Show and Tell AV Solutions, Bountiful, UT Untangled, LLC, Wilton, CT The new Power member approved by the ProSource board of directors is: Upscale Audio, La Verne, CA "We are excited to welcome all of our new members," said Sherry Dantonio, Director of Membership at ProSource. "We are proud to offer our members a vast array of resources to grow their businesses."
We live in an information and data-led world, and cybersecurity must remain top-of-mind for any organization looking to both protect business operation critical assets. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - from cybercriminals conducting targeted spear-phishing campaigns - like the 2018 Moscow World Cup vacation rental scam, to nation-state actors looking to collect intelligence for decision makers - no organization is safe from innovative cyber threats. Security solutions enterprises Organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe The evolving threat space means organizations need to ensure they have the most innovative prevention and detection frameworks in order to withstand adversaries using complex and persistent threats. When implementing new security solutions enterprises must start by assuming that there is already a bad actor within their IT environment. With this mindset, organizations can then set the groundwork necessary to stop malicious activity and keep their business’ data safe. As there is no one silver bullet that truly stops all cyberattacks, organizations must adopt a multipronged approach to be widely adopted to stop adversaries. This must include tracking, analyzing and pinpointing the motivation of cyber actors to stay one step ahead through global intelligence gathering and proactive threat hunting. In addition, deploying new technologies leveraging the power of the cloud give a holistic view of the continuously evolving threat landscape and thereby secure data more efficiently. Traditional security approach In today’s landscape, the propagation of advanced exploits and easily accessible tools has led to the blurring of tactics between statecraft and tradecraft. Traditional security approaches are no longer viable when it comes to dealing with the latest trends in complex threats. To make defending against these threats even more complicated, adversaries are constantly adapting their tactics, techniques and procedures (TTPs), making use of the best intelligence and tools. CrowdStrike’s latest Global Threat Report tracked the speed of the most notable adversaries including Russian, Chinese, North Korean and Iranian groups. As the adversaries’ TTPs evolve into sophisticated attack vectors defenders need to recognize we are amidst an extreme cyber arms race, where any of the above can become the next creator of a devastating attack. Russian efficiency is particularly high; they can spread through an enterprise network in 18 minutes 48 seconds on average, following the initial cyber-intrusion. Sophisticated cyber weapons Actors tend to use a simple trial and error technique where they test the organization's network So, reacting to threats in real-time is a priority. Bad actors are extremely vigilant and committed to breaking down an organization’s defenses, and speed is essential to finding the threats before they spread. Actors tend to use a simple trial and error technique where they test the organization's network, arm themselves with more sophisticated cyber weapons, and attack again until they find a vulnerability. This has highlighted the need for tools that provide teams with full visibility over the entire technology stack in real-time in order to meet these threats head-on. Traditional solutions are scan-based, which means they don’t scale well and can’t give the security teams context around suspicious activity happening on the network. They lack full visibility when a comprehensive approach is needed. Businesses without proper cyber measures allow themselves to be at risk from a huge list of threats - like the 2018 Moscow World Cup vacation rental scam Malicious Behavior Through leveraging the power of the cloud and crowdsourcing data from multiple use cases, security teams can tap into a wealth of intelligence collated from across a vast community. This also includes incorporating threat graph data. Threat graphs log and map out each activity and how they relate to one another, helping organizations to stay ahead of threats and gain visibility into unknowns. Threat graph data in conjunction with incorporating proactive threat hunting into your security stack creates a formidable 360-degree security package. Managed threat hunting teams are security specialists working behind the scenes facing some of the most sophisticated cyber adversaries through hands on keyboard activity. Threat hunters perform quickly to pinpoint anomalies or malicious behavior on your network and can prioritize threats for SOC teams for faster remediation. In-Depth knowledge Security teams need to beat the clock and condense their responseIt is key for security teams to have an in-depth knowledge of the threat climate and key trends being deployed by adversaries. The TTPs used by adversaries leave are vital clues on how organizations can best defend themselves from real-life threats. Intrusion ‘breakout time’ is a key metric tracked at CrowdStrike. This is the time it takes for an intruder to begin moving laterally outside of the initial breach and head to other parts of the network to do damage. Last year, the global average was four hours and 37 minutes. Security teams need to beat the clock and condense their response and ejection of attackers before real damage is done. Next-Generation solutions When managing an incident clients need to be put at ease by investigations moving quickly and efficiently to source the root of the issue. Teams need to offer insight and suggest a strategy. This can be achieved by following the simple rule of 1-10-60, where organizations should detect malicious intrusions in under a minute, understand the context and scope of the intrusion in ten minutes, and initiate remediation activities in less than an hour. The most efficient security teams working for modern organizations try to adhere to this rule. As the threat landscape continues to evolve in both complexity and scale, adequate budget and resources behind security teams and solutions will be determining factors as how quickly a business can respond to a cyberattack. To avoid becoming headline news, businesses need to arm themselves with next-generation solutions. Behavioral analytics The solution can then know when to remove an adversary before a breakout occurs Behavioral analytics and machine learning capabilities identify known and unknown threats by analyzing unusual behavior within the network. These have the ability to provide an essential first line of defense, giving security teams a clear overview of their environment. With this at hand, the solution can then know when to remove an adversary before a breakout occurs. Attackers hide in the shadows of a network’s environment, making the vast volume and variety of threats organizations face difficult to track manually. The automation of responses and detection in real-time is a lifeline that organization cannot live without as adversaries enhance and alter their strategies. Adversaries continue to develop new ways to disrupt organizations, with cybersecurity industry attempting to keep pace, developing new and innovative products to help organizations protect themselves. These technologies empower security teams, automating processes and equipping security teams with the knowledge to respond quickly. Organizations can set themselves up for success by integrating the 1-10-60 rule into their security measures, giving them an effective strategy against the most malicious adversaries.
In the next three years, software as a service ‘SaaS’ is likely to grow by around 23%. That’s according to reports by Cognizance. It’s growth rests on the adoption of cloud public, private and hybrid. Without the cloud applications can’t truly pervade an organization, nor can operational or customer benefits be derived. But there’s no point in adopting the cloud if it’s not secure - the proliferation of SaaS demands security, none more so in a GDPR world. Large cloud environment But modern applications are difficult to secure. SaaS based, web, mobile, or custom made all work on different platforms and frameworks. It’s a headache managing all the APIs needed to automate and sync tools. This introduces risk. The greater the number of apps the broader the attack surface and therefore the greater the chance there will be blind posts. Keeping up to date with updates and new security policies is never easy There are also added hazards. Applications are always changing. Keeping up to date with updates and new security policies is never easy, but especially hard in a large cloud environment. Failure to adopt changes puts the organization and customers at further risk. But the biggest obstacle is keeping applications and APIs out of harm’s way. It’s a near on impossible task when attack methods and sources are constantly changing. More advanced threats To be specific there are four emerging challenges when it comes to protecting apps. Firstly, managing the good and the bad bots and spotting which is which, secondly securing APIs as IoT adoption intensifies, thirdly the relationship between securing apps and DevOps and ensuring ownership of security, and finally denial of service attacks that use newer tactics such as brute force. Basic security hygiene dictates that security teams refer to the OWASP Top 10. It’s considered the ‘ten commandments’ in security circles, providing a starting point for ensuring the most common threats and vulnerabilities are managed, detected and mitigated. Web Application Firewalls also come into the fray with guidance on testing for the ways hackers exploit vulnerabilities. However, though the basics are good to have in place, there are always more advanced threats to take care of. Bots being a big one. Bot management The more sophisticated bots will go as far as to mimic human behaviorAstonishingly about half of internet traffic is bot generated. Half of it is from bad bots. Discerning the good from the bad isn’t easy though and explains why around 80% of organizations can’t make a clear distinction between the two. Bad bots can do a lot of damage like take over user accounts and payment information, scrape confidential data, or hold up inventory and skew marketing metrics. The more sophisticated bots will go as far as to mimic human behavior and bypass tools like CAPTCHA and even device fingerprinting based protection ineffective. Securing APIs Then there’s the complications derived from machine-to-machine and internet of things (IoT) communications. The more integrated ‘things’, the more data there is, the more events there are report on, and the more activity there is reliant on APIs to make the ‘things’ useful and agile. That’s what makes them a target and the threats to API vulnerabilities include injections, protocol attacks, parameter manipulations, invalidated redirects and bot attacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks. There’s the risk that business will grant access to sensitive data, without inspecting nor protecting APIs to detect cyberattacks Denial of service (DoS) You might think there’s little to add to the swathes of denial of service warnings. Yet when businesses are still being targeted and feeling the ill effects it’s worth mentioning again that different forms of application-layer DoS attacks are still very effective at bringing application services down. Even the greatest application protection is worthless if the service itself can be knocked down This includes HTTP/S floods, low and slow attacks (famous examples being Slowloris, LOIC, Torshammer), dynamic IP attacks, buffer overflow, Brute Force attacks and more. The IoT botnets are the culprits and have made application-layer attacks so popular that they have become the preferred DDoS attack vector. Even the greatest application protection is worthless if the service itself can be knocked down. Continuous security It may seem easy to say but for modern DevOps, agility is valued at the expense of security. We see time and again examples of where development and roll-out methodologies, such as continuous delivery, mean applications are exposed to threats each time they are modified. There’s no doubt it is extremely difficult to maintain a valid security policy and protect sensitive data in dynamic conditions without creating a high number of false positives. But we now find that this task has gone way beyond the capability of humans. Organizations now need machine-learning based solutions that map application resources, analyse possible threats, and create and optimise security policies in real time. Reaching this level in security planning should be a big wake-up call that security automation is an essential not a nice to have. Running security plans The board needs to know that investment is critical to protect their profits It’s critical that the security solution your company adopts protects applications on all platforms, against all attacks, through all the channels and at all times. The board needs to know that investment is critical to protect their profits. As such there are six things they need to know: Application security solutions must encompass web and mobile apps, as well as APIs. Bot management solutions need to overcome the most sophisticated bot attacks. DDoS mitigation must be an essential and integrated part of application security solutions. A future-proof solution must protect containerized applications, severless functions, and integrate with automation, provisioning and orchestration tools. To keep up with continuous application delivery, security protections must adapt in real time. A fully managed service should be considered to remove complexity and minimise resources. No amount of human power will beat the bots. That last point is the most critical. Skill is essential in designing and running security plans and policies that work. But the plans can’t be executed without automated tools. There are just too many decisions to make in a split second. Combining both is the path to an effective app protection strategy and a stronger brand to boot.
Edge devices (and edge computing) are the future. Although, this does seem a little cliché, it is the truth. The edge computing industry is growing as quickly as technology can support it and it looks like we will need it to. IoT Global Market The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 according to a recent Forbes article titled, “10 Charts That Will Challenge Your Perspective of IoT’s growth”. IoT devices are not the only edge devices we have to deal with as the total number of connected edge devices includes the likes of devices like security devices, phones, sensors, retail sales devices, and industrial and home automation devices. The IoT (Internet of Things) industry alone will have put 15 billion new IoT devices into operation by the year 2020 The sheer number of devices begins to bring thoughts of possible security and bandwidth implications into perspective. The amount of data that will need to be passed and processed with all of these devices will be massive. There needs to be consideration taken by all business owners and automation engineers into how this amount of data and processing will be conducted. Ever-Expanding Edge Devices Market As the number of edge devices in the marketplace and their use among consumers and businesses rises, the need to be able to handle the data from all of these devices is no longer going to be suitable for central server architectures. We are talking about hundreds of billions and even trillions of devices. According to IHS Markit researchers’ study, there were 245 million CCTV cameras worldwide. One has to imagine there are at least 25% of that many access control devices (61.25 million devices) based on a $344 million market cap also calculated by IHS Markit’s researchers. If all the other edge devices mentioned earlier are considered then one can see that trying to route them all through servers for processing is going to start to become difficult if it hasn’t already, -which arguably it already has, as is evidenced by the popularity of cloud-based solutions amongst those businesses that already use a lot of edge devices or are processing a lot of information on a constant basis. Cloud Computing The question is whether cloud computing the most effective and efficient solution as the IoT industry grows The question is this; is cloud computing the most effective and efficient solution as the IoT industry grows and the amount of edge devices becomes so numerous? My belief is that it is not. Taking the example of a $399 USD device that is just larger than the size of a pack of cards and runs a CPU benchmarked at the same level as a mid-size desktop. This device has 8GB RAM and 64GB EMMC built-in and a GPU that can comfortably support a 4K signal at 60Hz with support for NVMe SSDs for add-on storage. This would have been unbelievable five years ago. As the price of edge computing goes down, which it has done in a dramatic way over the last 10 years (as can be seen with my recent purchase), the price to maintain a central server that can perform the processing required for all of the new devices being introduced to the world (due to the low cost of entry for edge device manufacturers) becomes more expensive. This introduces the guarantee that there will be a point where it will be less expensive for businesses, and consumers alike, to do the bulk of their processing at the edge as opposed to in central server architectures. Cloud computing is now being overtaken by edge computing, the method of processing data at the edge of the network in the devices themselves Edge Computing There are a plethora of articles discussing and detailing the opposition between the two sides of the computing technology coin, cloud computing and edge computing. The gist of it is that “cloud computing” was the hot new buzzword three years ago and is now being overtaken by “edge computing.” The truth is that cloud computing is a central server architecture hosted at someone else’s location. Edge computing is going to be a necessary development in the technology industry Edge computing is the method of processing data at the edge of the network (in the devices themselves) and allowing for less resources required at a central location. There is certainly a use case for both, however the shift to edge computing amongst the general public and small to mid-sized businesses will not be a surprise to those players, who have been paying attention. One article titled, “Next Big Thing In Cloud Computing Puts Amazon And Its Peers On The Edge” by Investor’s Business Daily takes the stance that edge computing is going to completely displace centralized cloud computing and even coins the phrase, “Cloud computing, decentralized” to explain edge computing. It speaks for the stance that most experts in technology seem to be taking, including Amazon Web Services’ VP of Technology, Marco Argenti according to the same article. We know that edge computing is going to be a necessary development in the technology industry, and it is happening as I write this, and quickly at that. Cost Efficiency Of Edge Processing As time goes on, the intersection between the prices of network bandwidth, edge processing and maintaining super powerful central servers will cause edge processing to be the most efficient and cost-effective way to maintain a scalable network in any environment, including datacenters. Owning a central server or utilizing edge computing become the better options As it currently stands, most residential users can only achieve a 1Gbps WAN (internet) connection, and small to medium-sized business can’t get much more but seem to get much less, based on my personal experience. When more than 1Gbps needs to be processed, cloud computing becomes very expensive at which point, owning a central server or utilizing edge computing become the better options. Then you look a total cost of ownership and when the cost of edge computing is less expensive than the cost of maintaining central server architectures, edge computing becomes the single best option. So, I’ll say it again, edge devices (and edge computing) are the future.
Whether it is video analytic platforms to monitor traffic patterns or cameras deployed to help law enforcement ensure public safety, many cities are looking at advancements in video technology. Upgrade costs and technology compatibility issues are often front-and-center when it comes to blending new technology with existing infrastructure. For example, if the city law enforcement officials want to improve video camera image quality, which can improve the evidentiary value of footage in prosecutions, they may look at newer HD or IP-based video systems. Upgrading to a hybrid DVR system Applications include perimeter monitoring, public parking, city transportation, square/town safetyTo stretch a tight budget, a migration plan to an IP-based camera system could be phased in over time by centering the upgrade on a new hybrid DVR system. This way, both existing analog and newer IP-based cameras can be hooked into the system. For example, Hikvision’s Smart City Solutions include systems for government services, transportation and traffic management, or any combinations of these. Applications include perimeter monitoring, public parking, city transportation, square/town safety and temporary surveillance. Data capture form to appear here! Heart of City strategy Dahua Technology, a video-centric smart IoT solution and service provider, has introduced its ‘Heart of City (HOC)’ strategy, which is in line with the top-level design experience from hundreds of city projects. The strategy is based on the maturity of five technologies – artificial intelligence (AI), big data, cloud computing, IoT and 5G. The combination will enable the evolution of smart city 3.0 and bring great changes to our life, according to Dahua. A 300-plus camera city center video surveillance scheme in the UK city of Lincoln has been installed and commissioned using Dahua's cameras, monitors and switching equipment A 300-plus camera city center video surveillance scheme in the UK city of Lincoln has been installed and commissioned using cameras, monitors and switching equipment from Dahua Technology. The design of the new all-wireless encrypted system was based around delivering flexible technology, reducing the total cost of ownership, ease of installation, lower maintenance requirements, smart edge analytics and remote connectivity. Future-proof radio network design Environmentally friendly aspects of the project included specifying lower-energy equipment, integrating remote support and recycling hardware wherever possible. The council employed independent consultants Lever Technology Group to help them ensure they had a robust and future-proof radio network design. The installation of the new IP full HD system and network is part of Lincoln’s smart city strategy – Vision 2020 – which seeks to drive innovation in the city and harness new technologies to improve the lives of citizens. One of the results is the provision of free Wi-Fi in the city, working alongside the Dahua cameras using the same IP wireless network. Wearables for city surveillance Wearables are another new aspect of city surveillance system. For example, FLIR Systems, Inc. has announced FLIR TruWITNESS, a wearable sensor platform designed for city-level security and public safety operations. TruWITNESS combines video, audio, location data, Internet of Things (IoT) capabilities, and cloud and management software in one solution, allowing organizations to reach a new level of situational awareness. TruWITNESS is worn on an individual’s body or mounted inside vehicles and is designed for any public safety organization that requires on-scene, real-time mobile surveillance TruWITNESS is designed for any public safety organization that requires on-scene, real-time mobile surveillance. Worn on an individual’s body or mounted inside vehicles, TruWITNESS includes visible-video, audio, global navigation satellite system (GNSS), gyroscope, accelerometer and magnetometer sensors. These sensors combine to send alerts and stream data to a central command center in real-time to ensure full situational awareness and global event handling. Featuring FLIR Neighbor Aware inter-device connectivity, TruWITNESS acts as an IoT device, triggering nearby TruWITNESS devices, fixed and motorized Pan-Tilt-Zoom (PTZ) security cameras, and other connected sensors to act upon an alarm event. TruWITNESS becomes a key component of FLIR Systems’ Video Management System, United VMS, which command centers use to manage video surveillance. United VMS combines video, audio, and other related data and makes it available for real-time situation management and forensic purposes. Video analytics for crowd monitoring Crowd monitoring video analytics solutions monitor vast areas instantly alerting police of any overcrowding areasCrowd monitoring video analytics solutions continuously monitor vast areas instantly alerting police of any overcrowding areas. Qognify’s crowd monitoring video analytics solution was successfully used during the Maratha Morcha in the city of Kolhapur, India, on October 15th, 2016. The system monitored approximately one million protestors through 165 cameras installed across city. Smart threshold alerts were streamed directly into the control room while the crowd was building up, so that action could be taken before the crowd density reached dangerous levels, alleviating crowd safety and stability. At the core of the solution is Situator, Qognify’s advanced PSIM/Situation Management solution, which manages a myriad of security systems and sensors, including Qognify’s video management solution, from a newly built state-of-the-art Command and Control Center. Security operators and officials have advanced situational awareness of what is happening in their city and where. Automated, pre-defined Standard Operating Procedures (SOPs) were designed, in the local language Marathi, for handling routine security incidents as well as disaster management, ensuring that the most effective response is initiated, and procedures are executed in a consistent manner. Maintaining law, order and safety Qognify also implemented its Safe City solution in Navi Mumbai, a planned township that was established to handle the population overflow from the overcrowded and ever-growing city of Mumbai, India. Together with CIDCO (City and Industrial Development Corporation, the agency established for managing the new city) and system integrator WIPRO, Qognify designed an integrated and holistic solution that helps Navi police to maintain law, order and safety. Qognify’s Video Management Solution controls hundreds of surveillance camerasAs a planned township, Navi Mumbai officials have the benefit of operating in a modern environment, allowing them to maximize Qognify’s Safe City solution. The Qognify Situator is an advanced Situation Management platform, and Qognify’s Video Management Solution controls the hundreds of surveillance cameras throughout the city. Role of standards in smart cities “Standards can assist in successfully deploying a comprehensive [safe cities] system with multiple technologies into a single, cohesive entity,” said Per Björkdahl, Chair of the ONVIF Steering Committee. “With the ability to integrate various sensors and data from many different devices synthesized through one interface, government officials and law enforcement are afforded a more complete picture of their city’s security.” Deployment of facial recognition technology Live video streaming within the smart and safe city’s infrastructure means video’s capabilities can go beyond simple evidence recording and evolve into a tool that allows operations teams to monitor and remediate against incidents as they are happening. Facial recognition technology can be added on to any video surveillance camera that is recording at a high quality This can be taken one step further with the deployment of facial recognition via live streaming video. Facial recognition technology can be added on to any video surveillance camera that is recording at a high enough quality to identify faces. The technology works by capturing video, streaming the live video back to a control center and matching faces against any watch lists that the control center owns. Importantly, the data of people who aren’t on watch lists is not stored by the technology. This technology can work to make the city safer in a number of ways. For example, facial recognition could spot a known drug dealer in a city center where they weren’t supposed to be, or facial recognition could identify if a group of known terror suspects were visiting the same location at the same time, and this would send an alert to the police.
After a period of rapid international expansion, the next step for Ajax Systems is to set deeper roots in each market and become more sustainable. The manufacturer of wireless security equipment will continue to extend the range of Ajax products and capabilities by responding to local requests. Smart home management options and automation scenarios will be a significant focus for the next year. Wireless security equipment The systems are resistant to false alarms, regularly update over the air Established in 2011 in Kyiv, Ukraine, Ajax Systems produces wireless security equipment for end users and small-medium-sized businesses. Ajax is a complete eco-system. The devices are ready to work out of the box. There are 24 devices for protecting residential and commercial properties from intrusion, fire, and floods as well as a set of automation modules. Users treat them as gadgets that make their homes smarter. Ajax wireless systems are easier to maintain, configure, and monitor for installers as well as for security companies, according to Ajax. The systems are resistant to false alarms, regularly update over the air, and can be easily expanded to cover premises of any size. IoT-based security systems “Our IoT-product approach to security systems, gadget-like industrial design, and user-friendly interfaces disrupted the market in 2016,” says Valentine Hrytsenko, Chief Marketing Officer at Ajax Systems. “After receiving global recognition in the security market, the company grew 80-fold.” Today, Ajax IoT-based security systems protect more than 200,000 people in 80 countries around the world from break-ins, fires, leaks and other threats. “Our mission is to reshape security and make it a common attribute of every household,” says Hrytsenko. Ajax wireless systems are easier to maintain, configure, and monitor for installers Ajax smart technology Ajax smart technology features a combination of reliable hardware and intelligent software. A proprietary Jeweler two-way radio protocol allows placing devices at a distance of up to 2000 meters from the hub in an open space. The system is encrypted, resistant to jamming and code grabbing. Ajax detectors feature false alarm-preventing algorithms: Haze Flow, ZOE, LISA, SmartDetect. The hubs run on a real-time operating system, Malevich OS that processes the commands and sends the alarms. Ajax Cloud service helps to control the system from anywhere in the world using native apps. Easy and seamless installation Ajax features system scalability, flexible management of administrative rights" Easy installation facilitates Ajax on-boarding. The company says 67% of Ajax users purchase additional security devices within the first six months. And an average system configuration consists of nine items. “We focus primarily on the residential, small and medium-sized businesses,” says Hrytsenko. “In the residential segment, Ajax covers the needs to detect break-ins, prevent fires and floods. Ajax devices are visually appealing to fit any home and business interior seamlessly. For the small and medium-sized business, Ajax features system scalability, flexible management of administrative rights, informative notifications, professional maintenance software, as well as integration of the security camera streams for centralized monitoring.” Route-to-market approach Ajax Systems’ route-to-market approach is two-fold. First, they develop strategic partnerships with the local professional security equipment distributors in each country. From the distributors, Ajax equipment goes to the installers, system integrators, security companies, etc. In addition, Ajax seeks to build brand recognition and actualize the concept of security by weaving it into the daily routine of a general audience. “We form a good understanding of their security needs,” says Hrytsenko. As with any new technology, there is an adoption curve for both B2B and B2C clients. Thus, the educational challenge is persistent for Ajax from country to country. Ajax Systems’ route-to-market approach is two-fold Wireless security systems “On a professional market, new products are often met with understandable suspicion,” says Hrytsenko. However, a huge misconception is that user-friendly equipment is either hard to customize or unreliable. Not true, he says. After testing in five accredited laboratories, Ajax devices successfully earned Grade 2 certification for compliance with the requirements of the international standard EN50131-1:2006. Grade 2 is the highest reliability grade a wireless security system can get.
In five states in the Western United States, 200 video surveillance cameras keep are keeping watch to provide early warning of wildfires. In the near future, the number of wildfire surveillance cameras will be growing dramatically. Soon there will be more than 1,000 of the cameras in California alone, keeping watch on thousands of acres at risk of destructive events like last year’s deadly Camp and Woolsey wildfires. It is a striking example of how video surveillance technology can be used effectively beyond the realm of corporate or institutional security. The wildfire surveillance cameras are providing extra eyes to avoid a disaster before it can happen. ALERTWildfire surveillance cameras The ALERTWildfire surveillance cameras are installed through a consortium of universities – the University of Nevada, Reno; the University of California San Diego; and the University of Oregon. Dozens of partners also participate in ALERTWildfire, including the National Forest Service, other government agencies, utilities and other private companies, state and local fire departments, and NGOs (non-governmental organizations). Wildfire surveillance cameras can provide early warning when a fire starts and help firefighters respond quicker “It takes a lot of people, pushing in the same direction, to deploy cameras rapidly,” says Graham Kent, University of Nevada, Reno. “We are connected into the community, which is a positive thing.” The wildfire surveillance cameras can provide early warning when a fire starts and help firefighters and first responders scale the resources needed to respond. The cameras also monitor fire behavior until it is contained, enhance situational awareness during evacuations, and ensure fires are monitored appropriately through their demise. Axis Q6055-E PTZ network cameras ALERTWildfire currently uses Axis Q6055-E outdoor-ready pan-tilt-zoom network cameras that provide 1080p HDTV signals, 32x zoom and low-bandwidth compression. (Earlier versions of similar Axis camera models were also installed previously.) The camera’s robust aluminum casing can withstand temperatures up to 140 degrees F, although the cameras are positioned on the tops of towers where temperatures from wildfires are not a factor. In addition to surveillance cameras, each installation site includes a range of equipment including hard power or solar power (on about a third of installations), both with battery backups. Resilient, hardened microwave/fiber networks carry video signals from the cameras to servers at University of Nevada, Reno, which makes them available on the Internet. Geolinks, an ALERTWildfire partner, provides resilient Internet connectivity to mountaintops throughout the West. Firefighters can even watch fires on their mobile devices while they are en route to a fire breakout site Mobile Surveillance Dispatchers around the West have access to video from the cameras, and fire management can move the camera views through their iPhones. Firefighters can even watch fires on their mobile devices while they are en-route to a fire. Cameras are located currently in California, Nevada, Idaho, Washington and Oregon. There have been 85 cameras in place for five years or so, and the number of cameras has more than doubled since the beginning of 2019. The accelerated installation schedule is courtesy of a new policy of using existing infrastructure for cameras rather than creating it from scratch. The large number of cameras on the horizon for California is being funded by utility companies such as Pacific Gas & Electric (PG&E), Southern California Edison and San Diego Gas and Electric. AI in video surveillance The public can view the camera feeds and often call 911 to report early warnings of fires The public can view the camera feeds and often call 911 to report early warnings of fires, thus providing a kind of crowdsourcing, a fire-warning version of “Neighborhood Watch.” In the future, artificial intelligence (AI) could be used to monitor the video feeds to provide early warning. For now, the system is largely used by 911 dispatchers to confirm reports of fires. “Cell phones are so ubiquitous, people call in fires before the AI could react,” says Kent. “We could never beat 911.” A model for early detection of wildfires is in operation in San Diego, where San Diego Gas and Electric manages an emergency center that uses sophisticated real-time modeling to predict fire events based on weather conditions, vegetation, etc., tracked on a threat map. The system enables firefighting resources to be deployed quickly at the first hint of fire and thus to avoid a larger, sweeping wildfire event. Enhancing surveillance for quick wildfires detection “If you can get on top of it quickly enough, it makes all the difference,” says Kent. “In the case of extreme conditions, 10, 20 or 30 minutes can make a big difference.” Other locations are looking to replicate the San Diego model to discover and confirm fires quickly and then reposition assets to respond. Phos-Chek long-term fire retardant, applied by air from a fixed or rotor-wing aircraft, is used to slow or stop the spread of wildland fires. Our successes have led to a demand to get more cameras out right now" Installing more cameras to provide early warning of wildfires is “a grave need in the Western states,” and the system is likely eventually to be deployed in other areas, too. Wildfires can be a challenge in non-Western states such as Florida and Oklahoma, and a similar approach could also be used to provide early warning of other emergencies, such as tornados. “Once we do the West, we will be looking to do the rest of the United States,” says Kent. Increasing demand for video cameras Currently, the biggest challenge is keeping up with demand. “Our successes have led to a demand to get more cameras out right now,” says Kent. “Funding isn’t the largest issue. The money is there to do it, but we have to be able to scale up quickly, working with partners. It’s a wild ride.” Key words for success of the ALERTWildfire system are “location, location, location” combined with “coverage, coverage, coverage,” adds Kent. “We can solve 90 percent of the problem with coverage.”
The Society for the Protection of Ancient Buildings (SPAB) deploys unique security solution to protect medieval chapel as important restoration work begins Axis Communications, globally renowned firm dealing in network video technology, has been working alongside The Society for the Protection of Ancient Buildings (SPAB) to bring a medieval property back to life so that one day it can be used as a home. Deploying Axis network cameras The Society for the Protection of Ancient Buildings, a UK charity organization, based out of London, sought a unique solution to protect a circa C15 chapel in need of restoration and deployed a network camera solution to monitor the site remotely for intruders and to act as a deterrent against theft of materials. The SPAB is dedicated to protecting and repairing historic buildings, and recently purchased former chapel St Andrews The SPAB is dedicated to protecting and repairing historic buildings, and recently purchased former chapel St Andrews near Maidstone, Kent, with the aim of breathing life back into the structure. In recent years its main roles have been advice, training and campaigning. However, the recently purchased building, its first new repair project in almost 50 years, will allow the SPAB to teach others the practical skills required to care for such a building, while also returning a historic building to the housing market. Protecting and securing historic buildings The Axis solution has negated the need to have a security resource on site to protect the premises. The video surveillance and intrusion detection system has already successfully identified intruders entering the grounds of the building. Additionally, the network cameras can document the restoration work as it takes place on a daily basis and have also been useful in detecting local wildlife to provide the Kent Wildlife Trust with an idea of the range of animals with homes around the location, including many foxes. The technologies used included: Four AXIS Companion Bullet LE cameras, delivering HD video quality with built-in IR illumination for effective surveillance in darkness An AXIS Companion Cube camera with a built-in microphone and mini-speaker to effectively deter intruders AXIS Companion Recorder, providing a wireless access point for mobile devices. Network camera surveillance The image quality of the cameras is fantastic, especially at night" Matthew Slocombe, director of the Society for the Protection of Ancient Buildings, commented, “The image quality of the cameras is fantastic, especially at night when it is, of course, usually more difficult to identify potential threats. We are grateful to Axis Communications for providing this work and equipment free of charge, it means we can put our resources into saving St Andrews, Boxley – a truly special building.” The SPAB believes that ensuring the future of our culturally and historically important buildings can improve our environment and wellbeing. Because this drive to create a better world is in line with Axis’ ethos of innovating for a smarter, safer world and doing good in the community, the cameras were donated for the purposes of securing the premises during the conservation works. Efficient intrusion detection David Needham, UK & Ireland Sales Manager at Axis Communications, said “We felt we wanted to get involved with this project as we recognized an organization that was trying to help others and do good in the community, which is core to our values as a business. Since the installation, the cameras have identified young adults entering the building’s grounds, but not harming the property. It’s also seen local residents stopping and challenging people looking to enter unlawfully. This has meant there is no need to deploy security personnel to secure the site, saving the Society for the Protection of Ancient Buildings time and money.”
Based in Muscat, Oman, the Oman Electricity Transmission Company (OETC) owns and operates the main electricity transmission network, transferring electricity from generating stations to distribution load centers in all governorates of the Sultanate of Oman. Asset and public protection Protecting the company’s assets while ensuring the safety of the public is central to ensuring business continuity for OETC and reliable distribution of electricity to over 4.6 million people. With 90 grid stations in remote locations, identifying and responding to unauthorized intrusions in a timely way was challenging. OETC required a robust perimeter security system to deter intruders, manage risk, and protect the public “It can take up to an hour to reach some of our sites after an alarm is triggered. By then it’s too late, the intruder is gone,” says ESC Gulf Project Lead. Members of the public were also entering the sites to have picnics, unwittingly risking injury or even death. After a fatality when someone interfered with an electricity transformer, it was clear the OETC required a robust perimeter security system to deter intruders, manage risk, and protect the public from harm. Monitored pulse fencing solution The Gallagher solution OETC work in partnership with an established local consultant ESC Gulf who provide a wide range of services including design, tender evaluation and project implementation support. During tender submission stages, security contractors Majees Technical Services and Mustafa Sultan Enterprises, proposed a Gallagher Security monitored pulse fencing solution to protect OETC’s remote sites. Upon contract award the certified contractors installed the system, while Gallagher provided support and oversight of the installation and commissioning works. Using Gallagher’s effective and reliable fencing solution, perimeter breach attempts are deterred by an energized pulse, delivering a short but safe shock. The monitored wires detect unauthorized entry or exit and trigger instant alerts. Gallagher Z20 Disturbance Sensor Gallagher Z20 Disturbance Sensor heightens perimeter security by ensuring continuous monitoring and motion detection The Gallagher Z20 Disturbance Sensor in use at the gate heightens perimeter security by ensuring continuous monitoring and detection of vibration or movement of the gate when it is closed, and the system is in an armed state. Gallagher delivers robust perimeter security systems suited to the most rigorous requirements of high security sites. The ability of Gallagher technology to easily integrate with CCTV cameras, automated lighting and a remote monitoring system, further ensures a safe and secure environment. A world class solution, Gallagher perimeter products are designed to comply with international safety and electromagnetic compatibility standards. These standards set out the safety requirements for the design, installation, and operation of pulse fencing and associated equipment. Gallagher perimeter control solutions Saving money while keeping people safe Gallagher perimeter control solutions are now under construction or completed at 70 of the remote grid station sites – including over 25 kilometers of monitored pulse fencing. Unauthorized entry to these sites has been reduced to zero. OETC now has peace of mind that assets at its remote sites are protected, while being secure from unauthorized access – ultimately keeping people safe from harm. Gallagher’s accurate and responsive security monitoring systems have also resulted in significant cost savings and business efficiencies for OETC. “OETC were employing up to six guards on each grid station at a significant cost,” says ESC Gulf Project Lead. “With a fully monitored solution, the number of guards has been reduced and they have been redeployed on other tasks”. Gallagher security solutions are successfully supporting OETC’s mission to transmit and dispatch electricity safely, reliably, securely and economically. ESC’s Gulf Project Lead concludes “Gallagher provides a great amount of support to all stakeholders and both OETC and ESC Gulf are very pleased with the outcome of this project.”
Progress is being made with the installation of HENSOLDT’s ASR-S (Aerodrome Surveillance Radar, Series) for air traffic control modernization at German military airfields. ASR-S aerial surveillance radar With a further ASR-S system having recently been handed over to the German procurement authority BAAINBw and the Air Mobility Training Center in Celle-Wietzenbruch, 17 of 20 radar systems in total have now been supplied to and accepted by the customer. Following the successful final acceptance test, program manager Thomas Oswald handed the latest radar over to the training centre commander, Colonel Jörn Rohmann. The ASR-S aerial surveillance radar systems are being provided by sensor specialist HENSOLDT The ASR-S aerial surveillance radar systems are being provided by sensor specialist HENSOLDT under a 250-million-Euro contract awarded by the BAAINBw are intended to replace older radar systems that have been used to date for military air traffic control. Military airspace surveillance The new radars are being used for approach control at the airfields themselves and for airspace surveillance within a radius of more than 100 kilometers (60 NM) in order to safely coordinate military flight movements with civil air traffic. As a facility for all branches of the armed forces, the Air Mobility Training Center, which is subordinate to the German Army Training Command in Leipzig, facilitates testing of and training in different methods and processes in cooperation between ground forces and aircraft. Air traffic control and identification system HENSOLDT provides air traffic control and identification systems for military and civilian applications on a global scale. For example, the company has received orders for a complete approach control system for the Swiss Air Force as well as for different ASR versions for the German civil air traffic control authority DFS, Australia, the UK and Canada. HENSOLDT’s ASR-S radar is improving air traffic control and air surveillance at the airfields of the German Armed Forces.
Percepto has announced that the company has launched its market-leading industrial on-site autonomous drone solution in Singapore, through partnership with Certis - the leading advanced integrated security services organization. On-site autonomous drone solution In October 2018, Certis announced that it has expanded its industry-leading ops-tech capabilities to deliver Security Plus (Security+) solutions. Today, Certis’ Security+ combines advanced security, facilities management and customer service into a single holistic service, supported and underpinned by technology. Percepto, the provider of the most advanced global Drone-in-Box solution for industrial sites, is a recipient of the Frost & Sullivan Global Enabling Technology Leadership Awards. Percepto CEO, Dor Abuhasira comments on entering the Singaporean market: “Percepto is proud to be selected by Certis to be its premier Autonomous Drone solution partner.” Singapore is breaking new ground in the commercialisation of innovative drone solutions" Abuhasira continues: “Singapore is breaking new ground in the commercialisation of innovative drone solutions, aided by the clear published regulations on the drone activity permit application by the local authority.” Integrated security with Security+ “As a technology-driven company, Certis now provides an integrated approach to advanced security, facilities management and guest services through what we now call Security+. In partnership with Percepto, we are pleased to introduce this technological solution, that enables us to reimagine new concepts of operations for our customers,” said Ms Fong Ying Ching, Vice President, Certis Technology. Percepto drones are equipped with high-definition and thermal cameras to enable day and night operation and can perform in hostile weather conditions including rain, snow and dust. When deployed in-the-field they take-off on-demand or at scheduled times and navigate pre-defined routes. Percepto cloud management system Once the mission has been completed the drone returns to its base station - a highly secure enclosed weather-proof box - where automated post flight checks and fast battery charging are completed, ensuring the drone is primed for the next flight. The system is controlled through Percepto’s cloud management system The system is controlled through Percepto’s cloud management system and it is also the only drone-in-a-box solution that is powered by computer vision and AI and provides communications over LTE. As a result, these drones provide aerial security for total surveillance monitoring and response. Industrial drones The partnership between Percepto and Certis signifies a major development for the use of industrial drones in Singapore in areas of security, surveillance and safety, maintenance, inspection, mapping and operations.
ASSA ABLOY Project Specification Group, a unit of ASSA ABLOY Opening Solutions UK & Ireland, has partnered with ColladoCollins Architects to leverage the benefits of its Openings Studio BIM software to make significant time and cost savings on the former Shredded Wheat factory project. The project, a thriving new commercial and residential development based in Welwyn Garden City in Hertfordshire, will consist of over 643 units and more than 7,100 doorsets. Encompassing a sensitive refurbishment of former Shredded Wheat factory buildings, the project is part of a huge development that includes over 1,200 units in total. Opening Studio BIM software Openings Studio is a BIM software tool that was developed to significantly improve the process of door scheduling Using ASSA ABLOY’s Openings Studio software, ColladoCollins has been able to save weeks of time and manpower when specifying and managing ironmongery schedules for the project. Openings Studio is a BIM software tool that was developed to significantly improve the process of door scheduling, visualization and more. Users are able to focus on the design, installation and management of door openings – all within an information-rich environment. Easy door installation and management Specifying as many as 7,100 doorsets can be an extremely time-intensive task. Using traditional methods, information would be provided in countless separate schedules and documents, which would require a Revit operator to manually create and update, with someone else to then check for errors. Then, as the project develops, information may become out of date and therefore require individual doors to be flagged up and re-sent for advice. The time and manpower that goes into this process is not only inefficient, but also ineffective, with the prospect of human error still a prominent possibility. Software integration For these reasons, ColladoCollins began to work closely with ASSA ABLOY Project Specification Group to integrate Openings Studio with their own Revit model, allowing the firm to be able find all the relevant information and ironmongery schedules in a single place, delivered in one document. Martin Russell, Project Leader at ColladoCollins, comments: “Moving to BIM was a natural progression for us, and as market leaders, ASSA ABLOY was the obvious choice to assist us.” Integration of door hardware ASSA ABLOY's inputs have vastly improved the integration of door hardware within the former Shredded Wheat Factory project"“Utilizing the advice from Eric Spooner, BIM Manager at ASSA ABLOY, as well as the Openings Studio software itself, we have managed to free up our team from tirelessly working through door hardware schedules. This means we can focus on architecture and aesthetics, knowing the specification and integration of the ironmongery is in hand and will seamlessly feedback into the project within the allotted timescales. “The information and advice provided by ASSA ABLOY has vastly improved the integration of door hardware within the former Shredded Wheat Factory project. With a project of this size, sharing information can be quite a task – from large file sizes to sourcing relevant information. The prompts from Openings Studio make transforming information clear, concise and generally easy to follow. BIM software tools “At ColladoCollins, we pride ourselves on designing and delivering high quality buildings with a sensitive, sustainable approach, utilizing a strong design ethos with a strong technical background while understanding the commercial challenges facing our clients. Openings Studio enhances our ability to provide this service and we would seize the opportunity to work with ASSA ABLOY on similar projects in the future.” Eric Spooner, BIM Manager at ASSA ABLOY, adds: “As Openings Studio flags up any queries and automatically updates in live time, it is easy to see any discrepancies and changes within the schedules. By re-sharing the model information, it then also allows us at ASSA ABLOY to view the changes and feedback to architects – allowing us to work in close collaboration at every stage of a project.”
The University of Birmingham educates over 30,000 students, with more than 6,000 doors providing access to student accommodation. Gallagher’s integrated access control solution is responsible for providing operational continuity and creating a safe and secure environment for residents. The University recently completed its new state-of-the-art student accommodation development, Chamberlain, which consists of a 19-storey tower and three low-rise blocks. An essential requirement was an integrated access control system, reducing the need for keys. Timothy Owen, General Manager of Student Accommodation at the University says, “We wanted to move away from using keys as students are prone to losing them and trying to manage thousands of locks and associated keys was a constant administration and financial drain.” In order to minimize the complexity of managing a new system, the University required a solution that integrated with, or was an extension of, their existing campus access control and accommodation management systems. “We need to maintain control over access to our buildings, while ensuring a duty of care to our residents and staff so that they can go about their business as required,” says Timothy. “Fundamentally, we needed a system that gives both us and our resident’s confidence in the security of the accommodation.” Gallagher Command Center, together with the Aperio wireless locking technology, was selected as the University’s choice Aperio wireless locking technology A large and complex estate with buildings of different construction and age, the University needed a solution that was flexible enough to accommodate their unique requirements. Gallagher Command Center, together with the Aperio wireless locking technology by ASSA ABLOY Access Control, was selected as the University’s preferred choice, meeting their security needs in a cost effective way while still delivering to the overall specification. Timothy says, “The completion of our new state of the art Chamberlain development was extremely close to the date of the first student arrival, so the team had to be dedicated and work flexibly to ensure it was ready in time – which it was.” Gallagher Command Center integration The Gallagher Command Center integration allows for the access key and student ID to be combined into one card, offering a number of benefits to both students and staff. Previously the accommodation arrival process required students to arrive at the University with their contracts and queue up so that a member of staff could sign them in manually and hand them the keys to their accommodation. From there students could head to their room. “Arrivals is always a busy time but with the help of the Gallagher solution we’ve not only improved the student experience but also the administration process,” says Timothy. “Now the student ID and accommodation key is encoded on to one card so it can be posted out in advance and access to the room automatically granted via the accommodation management system. Students no longer need to queue for keys, can get to their rooms instantly, and spend more time enjoying their arrival experience.” Secure, authorized access control The simple act of swiping an access card automatically checks the student in and an attendance report can be instantly generated The simple act of swiping an access card automatically checks the student in and a report can be generated to show who has arrived and who hasn’t, allowing staff to follow up accordingly. If the room is no longer required it can be quickly and easily re-allocated to another student, resulting in improved occupancy rates. Using Gallagher Command Center together with the University’s accommodation management system allows staff to check on the well-being of students by monitoring the use of their access card. Student security and tracking The University also houses students under the age of 18, and one of the safeguarding requirements is that the University can monitor their whereabouts on a daily basis. Timothy adds, “This can be difficult to achieve with many students to track, but Gallagher Command Center can easily confirm the time and location of our resident’s last door access, providing peace of mind that students who may be uncontactable are in fact on site.” University staff are also seeing positive improvements since the installation of the new system – particularly at the start of the year. The arrivals process is now less congested and more relaxed. The team have far fewer issues than with physical keys, enabling them to spend more time on the overall student experience. Since the installation of the first 800 bedrooms at Chamberlain, the University has already extended the system by a further 900 at Mason, with plans in place for an additional 1500 bedrooms this summer. Combined access and student ID card “Replacing keys with a combined access and student ID card has reduced our operational costs as we now have far fewer keys to purchase and store,” explains Timothy. “The student experience has improved and staff are now free to deal with urgent matters and offer a more personal service. We can easily create reports to help us audit access and have generally provided a much more modern and secure place to live and work.”
Round table discussion
There will be more artificial intelligence, more machine learning, video systems with more capabilities, and all of it will add greater value to our solutions. Those are among the expectations of our Expert Panel Roundtable as they collectively look ahead to the remainder of 2019. One unexpected prediction is that AI will not prove to be a game changer – at least not yet. We asked this week’s Expert Panel Roundtable: What will be the biggest surprise for security in the second half of 2019?
The definition of a standard is “an authoritative principle or rule that usually implies a model or pattern for guidance, by comparison with which the quantity, excellence, correctness, etc., of other things may be determined.” In technology markets, such as physical security, standards are agreed-upon language, specifications or processes that are used across the board by multiple stakeholders to enable easier interconnectivity and smoother operation of systems. We asked this week’s Expert Panel Roundtable: How are standards shaping change in the physical security market?
ISC West 2019 is in the industry’s rear-view mirror, and what a show it was! The busy three days in April offered a preview of exciting technologies and industry trends for the coming year. We asked this week’s Expert Panel Roundtable: What was the big news at ISC West 2019?
IP security solutions: Manufacturers & Suppliers
- Dahua Technology IP security solutions
- Arecont Vision IP security solutions
- Hikvision IP security solutions
- Pelco IP security solutions
- LILIN IP security solutions
- IDIS IP security solutions
- VIVOTEK IP security solutions
- Vicon IP security solutions
- Messoa IP security solutions
- Illustra IP security solutions
- UltraView IP security solutions
- Bosch IP security solutions
- MOBOTIX IP security solutions
- FLIR Systems IP security solutions
- Hanwha Techwin America IP security solutions
- Teleste IP security solutions
- DRS IP security solutions
- Oncam IP security solutions
- BCDVideo IP security solutions
- Vanderbilt IP security solutions