Network / IP security
SALTO Systems, a globally renowned manufacturer of electronic access control solutions, has received carbon-neutral certification for its factory headquarters in Spain and across all of its operations. Edge electronic access control Carbon neutrality is achieved by calculating a carbon footprint and reducing it to zero through a combination of efficiency measures in-house and supporting external emission reduction projects. SALTO’s renowned edge electronic access control hardware...
Spectra Logic, a provider of data storage and data management solutions, announces the publication of its ‘Digital Data Storage Outlook 2020’. The fifth edition of the report delves into the management, access, use and preservation of the world’s ever-expanding volumes of data, capturing the impact of the Covid-19 pandemic on trends and technology during this unprecedented time in history. Exhibiting technology improvements The report outlines future strategies, technologies...
ASIS International, the globally renowned association for security management professionals, has announced that General Stan McChrystal, US Army (RET), will present a Global Security Exchange Plus (GSX+) keynote address on Military & Law Enforcement Appreciation Day at GSX+. The presentation, titled Leading in a New World, will take place on Wednesday, 23 September. Global Security Exchange Plus “GSX+ offers a unique opportunity to share the insights and guidance from global thought...
Patriot One Technologies Inc., is pleased to announce a development partnership with ecoMine Technologies Corporation (ecoMine) to advance ecoMine’s innovative, low-cost, on-the-spot pathogen screening technology, ecoScreen. ecoScreen screening technology ecoMine’s technology platform, ecoScreen has significant potential in this current pandemic, (especially when it comes to enabling the safe return to work across multiples sectors of the economy) as well as a broad range of other...
Genetec Inc., a renowned provider of unified systems for enhanced security, operations and intelligence, has announced a new series of expert webinars designed of help end users and system integrators to navigate these testing times. The sessions outline ways customers from various industries are repurposing their existing physical security systems to solve specific pandemic related issues. In addition, they cover ways Genetec is evolving its solutions to address critical new requirements. The...
New dates have been announced for Intersec Saudi Arabia, with the Kingdom’s trade fair for security, safety, and fire protection, now scheduled to take place from 15-17 March 2021 at the Riyadh International Convention and Exhibition Center. The three-day event is organized by Saudi-based ACE Group under license from Dubai-headquartered Messe Frankfurt Middle East. The new dates come after extensive feedback and consultation with the venue, exhibitors, visitors, trade partners and associa...
Genetec Inc., a renowned technology provider of unified security, public safety, operations, and business intelligence solutions, announced the latest deep integration to result from its enduring partnership with Bosch Security Systems (“Bosch”). Users of the widely deployed Bosch MAP 5000 intrusion alarm panels can now directly connect to Genetec Security Center through the Intrusion Manager, combining intrusion, video and access control into one intuitive interface. Facility and security managers have traditionally been required to manage intrusion settings and alarms manually through a keypad or via a separate system. This results in inefficient task switching to understand the context of an alarm, longer response times and a disconnected overview of security and operations. Access control records However, integration with Genetec Security Center ensures operators can monitor all intrusion events on dynamic maps alongside other security data such as video footage or access control records. This provides a fuller real-time understanding of what is happening in the facility so that organizations can react faster and contribute to more efficient day-to-day operations. The integration also provides customers with additional intrusion management capabilities. The integration also provides customers with additional intrusion management capabilities This includes the ability to operate all intrusion systems from a central location, an alarm persistence feature that identifies where alarms originated, and a specialized interface to ensure operations can quickly arm specific zones while continuing to monitor the rest of the system. Furthermore, it offers the potential for customers to take advantage of other integrations and modules available within Security Center. Intrusion alarm panels For example, with Genetec Mission Control, users can go beyond monitoring and implement a comprehensive decision support system that ensures each intrusion event is handled in compliance with the organization’s standard operating procedures. “This integration further deepens our long-standing and mutually beneficial relationship with Bosch, bringing true value to our joint customers and partners,” commented Francesco Serra, Vice President, Sales, Europe at Genetec. “While our existing intrusion management features have long helped customers to manage their systems more easily and to catch intruders faster, this new integration allows us to extend those benefits to new areas across Europe.” The Genetec plug-in for the Bosch MAP 500 series intrusion alarm panels is immediately available for installation through approved integrators.
The French authorities have renewed the maintenance contract of the French Coastal Surveillance System, SPATIONAV, building on an over 20 yearlong successful collaboration between the French Navy and Airbus for safer oceans. Since 2002, Airbus develops, deploys and maintains the SPATIONAV system, under the supervision of the DGA (French General Armament Directorate) for the program direction and the SSF (Service de Soutien de la Flotte) for the sustainment, to support the French authorities gather information, direct maritime surveillance and intervention at sea. Maritime navigation security The system provides them with a tactical picture of the maritime situation to prepare and conduct their respective operations related to maritime border protection, search and rescue missions, maritime navigation security, detection of illicit activities and environment protection. With over 6000 kilometers of coasts monitored in real time 24/7 by 750 operators, SPATIONAV is the cornerstone of France’s maritime surveillance operations. It provides the administrations involved in state sea operations with a real time surveillance system It provides the French Navy and the main national administrations involved in state sea operations with a real time surveillance system covering maritime approaches for mainland France and the French West Indies - Guiana zone. Thus, it constitutes a veritable multi-agency operation and command information system for the French Navy, the Coast Guards and the Customs. Cyber secured gateway SPATIONAV’s coastal Recognized Maritime Picture integrates over 10,000 real-time tracks thanks to a vast network of sensors spread over the French coasts (105 sites, 88 radars, 77 AIS stations and 8 equipped Falcons). In addition, the system integrates over 50,000 extra European and International tracks through a cyber secured gateway. The consolidated situation awareness is shared with the entire SPATIONAV community thereby optimising missions at sea. SPATIONAV is based on STYRIS Coastal Surveillance System (CSS). The solution associates core CSS functions as a real-time coastal Recognized Maritime Picture, 24/7 monitoring of areas of interest, advanced tracking and data fusion with some key features among which improved event management and advanced simulation capabilities to support decision making. Command and control tools Ensuring an informed vision of maritime activities in real time is a technological prowess" Specifically, the solution supports operator decision by providing intuitive command and control tools to accelerate decision making and stakeholder coordination, to maintain operator focus and to reduce the workload. Commander Laurent Frayssignes, Spationav program officer, declared: “Ensuring an informed vision of maritime activities in real time throughout the national metropolitan territory is a technological prowess. We value the strong relationship that we have established over the years with Airbus and we count on Airbus team to continuously integrate technological advances to maintain our position at the cutting edge of innovation in the field of Maritime Surveillance." Coastal surveillance missions "Improved and new capabilities will allow us to face new and bigger challenges in terms of protecting our maritime borders and perform coastal surveillance missions.” Evert Dudok, Head of Connected Intelligence at Airbus Defense and Space said: “When security is at stake, territorial waters are critical areas due to the number of potential threats. In such circumstances, well-informed maritime domain awareness as well as fast decision making is needed to successfully protect the coastal borders and this is exactly how Airbus supports the maritime authorities. Our company helps to anticipate the threat, to connect and disseminate and to analyze and understand the situation in order to take the right decision and act at the right time.”
Renowned temperature monitoring expert, AMETEK Land, has launched a new human body temperature screening system to help prevent the spread of infectious diseases like COVID-19. Developed over 10 years by AMETEK Land experts, the VIRALERT 3 provides real-time infrared thermal imaging from a safe social distance, scanning for elevated temperatures that could indicate infection. The VIRALERT 3 is the first of its kind, providing a camera and a temperature-controlled reference source on a single mounting. Using automatic face detection, it locates the best areas for temperature detection, taking a reading that’s accurate to within 0.5oC, then calculating core body temperature through a rapid test procedure of approximately two seconds. Thermal imager camera The VIRALERT 3 is easy to use, and can be left to operate automatically, with audible and visual alarms It provides an effective solution for scanning visitors at entry points into hospitals and healthcare facilities, commercial areas, education facilities and public spaces, transportation entry points, offices and manufacturing locations, and sports and leisure sites. Designed to screen visitors at an entry point without slowing the flow of people, the VIRALERT 3 scans temperatures without any person-to-person contact, keeping both parties safe from disease transmission. The VIRALERT 3 is easy to use, and can be left to operate automatically, with audible and visual alarms alerting when high temperatures are discovered. To ensure the highest levels of accuracy and reliability, it has a blackbody calibration source fitted on the same platform as the integrated thermal imager/visual camera. This makes for a compact system that won’t get in the way of queueing people and can be easily wall-mounted. Infrared measurement instruments The VIRALERT 3 builds on AMETEK Land’s proven expertise in temperature technology. The company has been developing high-accuracy infrared measurement instruments since 1947, and has been creating human body temperature screening systems since responding to the SARS outbreak of 2003. Set-up is simple; with no complex software configuration required, the system can be up and running within 30 minutes of delivery.
Research carried out by a renowned Cyber Security company, Intruder has revealed that on average, an exposed Mongo database is breached within 13 hours of being connected to the internet. The fastest breach recorded was carried out 9 minutes after the database was set up. MongoDB database program MongoDB is a cross-platform document-oriented database program that consistently ranks in the top 5 most-used databases worldwide. It is used by a wide range of organizations all over the globe to store and secure sensitive application and customer data. There are 80,000 exposed MongoDB services on the internet, of which 20,000 were unsecured. Of those unsecured databases, 15,000 are already infected with ransomware. Honeypots to check on data breaches Intruder set up a number of unsecured MongoDB honeypots across the web, each filled with fake data. After seeing how consistently database breaches were occurring, Intruder planted honeypots to find out how these attacks happen, where the threats are coming from, and how fast it takes place. Intruder set up a number of unsecured MongoDB honeypots across the web, each filled with fake data. The network traffic was monitored for malicious activity and if password hashes were ex-filtrated and seen crossing the wire, this would indicate that a database was breached. Countering rising cases of cyber-attacks Intruder's latest research shows that Mongo databases are subject to continual attacks when exposed to the internet. Attacks are carried out automatically and indiscriminately and on average an unsecured database is compromized less than 24 hours after going online. At least one of the honeypots was held to ransom within a minute of connecting. The attacker erased the database’s tables and replaced them with a ransom note, requesting payment in Bitcoin for recovery of the data. Cyber-threat from unknown global sources Attacks originated from locations all over the globe, though attackers routinely hide their true location, so there’s often no way to tell where attacks are really coming from. The fastest breach came from an attacker from Russian ISP ‘Skynet’ and over half of the breaches originated from IP addresses owned by a Romanian VPS provider. Chris Wallis, Founder and Chief Executive Officer (CEO) of Intruder stated, “It's quite possible that some of the activity recorded was from security researchers looking for their next headline or data for their breach database. However, when it comes to a company’s security reputation, it often doesn’t matter whether the data is breached by a malicious attacker or a well-meaning researcher.” He adds, “Even if security teams can detect an unsecured database and recognize its potential severity, responding to and containing such a misconfiguration in less than 13 hours may be a tall order, let alone doing so in less than 9 minutes. Prevention is a much stronger defense than cure.”
Exabeam, the Smarter SIEM company, and Armis, a provider of agentless enterprise IoT security, announced a partnership that will enable IT cybersecurity teams to identify unmanaged and IoT devices and to monitor their behavior for malicious activity from a single platform. Attackers increasingly target unmanaged, connected devices to gain access to an organization’s corporate network. The integration of Exabeam and Armis solutions classifies managed, unmanaged, and IoT devices connecting to the corporate network and allows security analysts to detect lateral movement and other advanced threats. Unmanaged and IoT device security alerts are also enriched with contextual data and prioritized by risk score to focus analyst efforts on the riskiest incidents and to increase their efficiency and effectiveness. behavioral analytics solution Exabeam recognises the importance of expanding SIEM to unmanaged and IoT devices" The partnership extends the visibility of the Exabeam Security Management Platform (SMP) into IoT devices to identify anomalies and enable security teams to more efficiently detect, prioritize and investigate threats across a broader range of devices. Specifically, it enables Exabeam Entity Analytics, a behavioral analytics solution that leverages both machine learning and behavioral modeling, to identify complex threats on devices, as well as extend detection and investigation of advanced threats to IoT devices. The integrated solution imports alerts and data about IoT devices from Armis into the Exabeam SMP to extend visibility beyond managed IT assets. Prioritize security alerts Exabeam then places Armis security alerts in the context of Exabeam Smart TimelinesTM to enhance analyst productivity by automating tedious investigations with machine-built timelines and ensuring sophisticated attacks involving lateral movement don’t go undetected. By identifying both managed and unmanaged assets connected to the network in this way, users can prioritize security alerts and initiate rapid investigation. “Exabeam recognizes the importance of expanding SIEM to unmanaged and IoT devices, and integrating with a leading agentless device IoT security vendor will provide significant value for organizations that manage infrastructure, industrial facilities, manufacturing and smart cities,” commented Trevor Daughney, VP, Product Marketing, Exabeam. effective security strategies “By partnering with Armis, we help security teams improve their operational efficiency by automating the detection and investigation of attacks using IoT devices.” Armis and Exabeam let organizations safely adopt new devices to drive their business with stronger security" “Organizations are increasingly looking for security solutions that can integrate cybersecurity defense across every kind of connected device in their organization,” said Christopher Dobrec, VP of Product Marketing at Armis. “As the adoption of unmanaged and IoT devices continues to accelerate, it’s vital that the effectiveness of security strategies extends to secure those devices. Together, Armis and Exabeam let organizations safely adopt new devices to drive their business with stronger security and better risk management.” complete asset inventory “Security attacks aren’t limited to devices like laptops and servers. For organizations like ours, it’s imperative for our security team to have visibility into our complete asset inventory, including IoT devices from point of sale terminals to industrial controllers in our manufacturing operations,” said Exabeam customer Rhett Nieto, IT security chief, FEMSA. “In some organizations, IT is responsible only for the desktop, laptops and server rooms, while business units take care of CPS, such as industrial controls, operational technology, industrial IoT (IIoT), public cloud and line of business (LOB)-centric SaaS applications,” commented John Watts, a Gartner analyst, in the June 2020 Gartner report: How to Respond to the 2020 Threat Landscape. configuration management database The report further mentions, “An IT-focused configuration management database (CMDB) only discovers and tracks IT assets, whereas a security team needs a comprehensive asset inventory. Without this view, threats are missed, and vulnerable assets are not addressed. This requires a partnership between IT and the LOBs to ensure that an adequate inventory of all assets is available and current.”
Paxton Access Ltd. (Paxton) has announced new additions to their renowned Net2 access control product line, helping installers make their customers’ buildings more COVID-secure. The latest version of Net2 – v6.04 has been in rapid development since May 2020 and is now ready for installers to download. Net2 – v6.04 The latest version features Net2 Occupancy Management, which allows enterprises to limit the number of people in any given area, either barring access or sending an email or text to the building manager when a space nears capacity. It works across multiple areas of a site and can be set to operate a one-in, one-out system to support social distancing measures. In addition to this update, installers who want to use thermal scanning to help limit the spread of the virus can do so with three new thermal scan integrations. Making buildings more COVID-secure We understand the important part that access control plays in managing the flow of people around a building" Adam Stroud, Chief Executive Officer (CEO) at Paxton Access Ltd. stated, "We understand the important part that access control plays in managing the flow of people around a building in order to support a hygienic environment. In addition, controlling the density of people in any given area is a valuable tool to help businesses of all types to become 'COVID-secure'." Adam adds, “Net2 is one of the best-selling access control systems and so we have developed the new Occupancy Management feature to meet this specific need. For new and existing Net2 customers we hope that this new functionality helps the efforts that we are all making to observe social distancing and keep people safe." Occupancy Management with Net2 v6.04: Ensure users maintain a safe social distance by setting and controlling the maximum number of people in any given area. Real-time visual reports - see live occupancy levels in a clear, web-based visual report from smartphone, tablet, PC or widescreen wall display. Dynamic control of entry permissions - set alerts and prevent user access when maximum capacity is neared or reached. Simplified area management - set and manage multiple areas simultaneously, with specific occupancy levels per area. Support continuous flow of people movement with one-in-one-out user access when people numbers are high. Thermal scan hardware Paxton has also tested a range of thermal scan hardware and the company’s free 45-minute webinars will take installers through what is available and how to apply it. Paxton references solutions from Hikvision - Face Recognition Terminal (Minmoe), Dahua Technology - Thermal Temperature Station and ZKTeco – SpeedFace to help ensure health and wellbeing in high security areas and identify people that could be at risk, quickly. Net2 integrations with Hikvision, Dahua, and ZKTeco solutions Paxton has validated Net2 integrations with Hikvision, Dahua, and ZKTeco Paxton has validated Net2 integrations with Hikvision, Dahua, and ZKTeco. However, Net2 can work with most thermal devices that utilize a Wiegand output. Paxton has been running their ‘Guide to COVID-secure Buildings’ webinars to help get the U.S. back to work safely. Installers receive a live 45-minute webinar that will take them through the CDC and OSHA guidelines, as well as a free end-user guide to help their customers understand the access control solutions available when updating their buildings. ‘Guide to COVID-secure Buildings’ webinars Gareth O’Hara, the Chief Sales Officer at Paxton Access Ltd. said, “We’ve had a great response from customers so far, with hundreds joining us in the first couple of weeks. The webinar provides installers with practical access control solutions that businesses need now.” He adds, “The new Occupancy Management feature in Net2 has been eagerly anticipated and we are looking forward to getting it out there to help with social distancing on sites around the world. We are continuing to develop Net2 in line with installer feedback to provide even more flexibility for COVID-secure buildings, so watch this space.” Paxton’s latest webinar, the Guide to COVID-secure Buildings with Net2 started on June 30 and runs twice weekly.
COVID-19 and the resultant lockdown saw an unprecedented demand for cloud-enabled technologies across Europe. Such services enabled people to stay connected and allowed some businesses to relocate personnel and continue to operate successfully. With enterprise-focused video conferencing mobile app downloads showing a weekly 90% increase in comparison to pre-COVID-19 figures, it’s clear that cloud services have proven invaluable in these challenging times. Now, as the benefits to business of cloud technology become apparent, and the grip of COVID-19 begins to loosen, senior decision makers must consider the learnings from the past few months and look to apply them to boost productivity, streamline costs or become more agile in the long term. Digital transformation presents some enticing advantages for those companies that have been slow to adapt. The physical security industry, traditionally video surveillance cameras (CCTV) and access control, will have witnessed how cloud infrastructure is not only cost effective and safe, but is a force multiplier for connecting platforms, services and people with potent business benefits. The future is VSaaS and ACaaS In today’s modern, connected world, dated technologies are giving way to their cloud-enabled successors, video surveillance as-a-service (VSaaS) and access control as-a-service (ACaaS). In this context, cameras and readers are added to a network as IoT devices that bring security systems up to date and represent a vital component in any modern, cyber-secure digital strategy. Frictionless access control has meant touch free access to buildings But better security is just one benefit of a much greater system that can bring real value. Built in analytics, for example, that utilize the data from network video cameras and smart access control devices, produce valuable business insights that help to inform and automate decision making. In the recent pandemic, frictionless access control has meant touch free access to buildings; while occupancy tools have helped retailers adhere to strict government guidelines on social distancing. And as more security equipment becomes connected to the wider IT network, the advantages have not been lost on the IT industry that is expressing more than a passing interest in the adoption and management of such systems. Morphean recently conducted a survey of 1000 IT decision makers across the UK and Europe, with the purpose of providing clarity around their security purchasing intent in the 2020s. Findings revealed that as many as 84% of IT managers are currently using or considering VSaaS or ACaaS systems, pointing to an appreciation of the convergence of physical security and IT security, and a willingness to embrace systems when integrated with IT in the cloud. An adaptable business model with recurring revenues Of course, it is not just the IT industry that is changing mindsets towards hosted physical security. As a result of COVID-19, end customers are demanding it too and found it easier to scale at speed when business circumstances changed. Rather than being tied to fixed IT infrastructure on premises, a hosted solution offered greater dexterity as operational challenges around the pandemic arose. Businesses were able to customize and scale quickly to meet ongoing need without the need for large upfront capital investment, instead, paying for the convenience as-a-service out of operational expenditure as a monthly cost. This is the proven business model of cloud, yet the security industry has been slow to adopt it. One key challenge is the way in which the prevalent business models in the sector operate. VSaaS is still alien to installers and integrators used to selling hardware on narrow margins, reliant on existing financial arrangements with distributors to fund new equipment. Transitioning to sales cycles based on monthly licences rather than up-front purchases won’t be easy, but the security channel must learn how if it is to remain competitive and drive new business opportunities. This recurring revenue model will be interesting for the physical security industry who will have witnessed uncertainty and, in some cases, a downturn in revenues as decisions around capital expenditure were put on hold during the crisis. Instead, convenient and recurring monthly payments will have put the installer on a firmer footing and guaranteed ongoing vendor support backed by the latest software updates and firmware upgrades to ensure delivery of a high quality service that’s always up to date and online. What is driving your digital strategy? VSaaS and ACaaS provide a flexible and fluid security and business solution Cloud is here to stay. Its resilience and ability to connect the world during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. VSaaS and ACaaS provide a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. CEOs and CIOs within the physical security reseller industry must learn the lessons and apply the learnings to drive their businesses forward in the ‘new normal’ where hosted security solutions must surely play a major part to expand their offering to a wiser customer base. Cloud-enabled physical security solutions represent an investment into improving security and operations, and a chance to forge new business relationships to face the challenges of an ever changing world.
Today’s environment has evolved into something that according to some may seem unexplainable. But in the context of video surveillance, this is something that we understand. Allow me to shed some light and understanding in terms of security and why it truly is a necessity. Security is not a luxury, it is a necessity. An essential practice now peaking the interests of all businesses small and large. A video surveillance system is a cost effective option that does not require monitoring fees. As business slows, temporarily shuts down or closes, an increase in vacant properties is inevitable. This pandemic will continue to put severe pressure on many businesses around the country. With so many considered non-essential, it is really sad to see how many must shutter their doors and lay off employees. Keeping an eye out for suspicious activity using a commercial grade surveillance system that supports advanced analytics, may end up saving your potential customers thousands of dollars down the road. Demand for video surveillance and security products We can certainly draw on the conclusion that security is a “need” more so than a “want”. Times like this just further cement that thought process. In today’s economic spiral, people aren’t actively looking for lighting controls or home theaters. What they look for is a way to keep their loved ones safe, protect their homes, businesses and property. Video surveillance technology provides added security for you, your family and your business In my opinion, you will see video surveillance and security product sales skyrocket in the coming months and years. It has been reported that response times for first responders may be impacted as a result of COVID-19, leaving those with bad intent more time to ransack a property knowing that law enforcement may be slow to respond. Criminals will always take advantage of the situation. All we can do as a community is use common sense, stay vigilant through these odd times and watch out for one another. For some of us that may mean mitigating risks with technology. Affordable video monitoring solutions Having a solution that can quickly and securely share video footage may be the difference between identifying a perpetrator and becoming a victim. Ella, a video search platform developed by IC Realtime, makes every second of video instantly searchable and shareable, either with the authorities or your neighborhood social apps. Plus it is compatible with any RTSP streaming device. To wrap this up, it’s not about pointing out the obvious, it’s really about bringing awareness as to how technologies can be implemented to provide peace of mind without breaking the bank. Video surveillance technology is a way to do that and provide added security for you, your family and your business.
The safeguarding of premises through the monitoring of entrance and exit points has traditionally been a very manual aspect of security. Human operators have been relied on to make decisions about who to admit and deny based on levels of authorization and the appropriate credentials. The access control business, like many industries before it, is undergoing its own digital transformation But the access control business, like many industries before it, is undergoing its own digital transformation; one where the protection of premises, assets and people is increasingly delivered by interconnected systems utilising IoT devices and cloud infrastructure to offer greater levels of security and protection. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification, right through to complex networks of thermal cameras, audio speakers and sensors. These systems, connected through the cloud, can be customized and scaled to meet the precise requirements of today’s customer. And it’s the ease of cloud integration, combined with open technologies and platforms that is encouraging increasing collaboration and exciting developments while rendering legacy systems largely unfit for purpose. Remote management and advanced diagnostics Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution.Cloud technology and IoT connectivity means remote management and advanced diagnostics form an integral part of every security solution. For example, as the world faces an unprecedented challenge and the COVID-19 pandemic continues to cause disruption, the ability to monitor and manage access to sites remotely is a welcome advantage for security teams who might otherwise have to check premises in person and risk breaking social distancing regulations. The benefits of not physically having to be on site extend to the locations within which these technologies can be utilised. As an example, within a critical infrastructure energy project, access can be granted remotely for maintenance on hard to reach locations. Advanced diagnostics can also play a part in such a scenario. When access control is integrated with video surveillance and IP audio, real-time monitoring of access points can identify possible trespassers with automated audio messages used to deter illegal access and making any dangers clear. And with video surveillance in the mix, high quality footage can be provided to authorities with real-time evidence of a crime in progress. Comprehensive protection in retail The use of connected technologies for advanced protection extends to many forward-looking applications. Within the retail industry, autonomous, cashier-less stores are already growing in popularity. Customers are able to use mobile technology to self-scan their chosen products and make payments, all from using a dedicated app. From an access control and security perspective, connected doors can be controlled to protect staff and monitor shopper movement. Remote management includes tasks such as rolling out firmware updates or restarting door controllers, with push notifications sent immediately to security personnel in the event of a breach or a door left open. Remote monitoring access control in storage In the storage facility space, this too can now be entirely run through the cloud with remote monitoring of access control and surveillance providing a secure and streamlined service. There is much to gain from automating the customer journey, where storage lockers are selected online and, following payment, customers are granted access. Through an app the customer can share their access with others, check event logs, and activate notifications. With traditional padlocks the sharing of access is not as practical, and it’s not easy for managers to keep a record of storage locker access. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers. The elimination of manual tasks, in both scenarios, represents cost savings. When doors are connected to the cloud, their geographical location is rendered largely irrelevant. Online doors and locks enable monitoring capabilities and heightened security for both operators and customers They become IoT devices which are fully integrated and remotely programmable from anywhere, at any time. This creates a powerful advantage for the managers of these environments, making it possible to report on the status of a whole chain of stores, or to monitor access to numerous storage facilities, using the intelligence that the technology provides from the data it collects. Open platforms powers continuous innovation All of these examples rely on open technology to make it possible, allowing developers and technology providers to avoid the pitfalls that come with the use of proprietary systems. The limitations of such systems have meant that the ideas, designs and concepts of the few have stifled the creativity and potential of the many, holding back innovation and letting the solutions become tired and their application predictable. Proprietary systems have meant that solution providers have been unable to meet their customers’ requirements until the latest upgrade becomes available or a new solution is rolled out. This use of open technology enables a system that allows for collaboration, the sharing of ideas and for the creation of partnerships to produce ground-breaking new applications of technology. Open systems demonstrate a confidence in a vendor’s own solutions and a willingness to share and encourage others to innovate and to facilitate joint learning. An example of the dynamic use of open technology is Axis’ physical access control hardware, which enables partners to develop their own cloud-based software for control and analysis of access points, all the while building and expanding on Axis’ technology platform. Modern access control solutions range from simple card readers to two factor authentication systems using video surveillance as a secondary means of identification Opportunities for growth Open hardware, systems and platforms create opportunities for smaller and younger companies to participate and compete, giving them a good starting point, and some leverage within the industry when building and improving upon existing, proven technologies. This is important for the evolution and continual relevance of the physical security industry in a digitally enabled world. Through increased collaboration across technology platforms, and utilising the full range of possibilities afforded by the cloud environment, the manufacturers, vendors and installers of today’s IP enabled access control systems can continue to create smart solutions to meet the ever-changing demands and requirements of their customers across industry.
The COVID-19 global pandemic will have a profound and lasting impact on the physical security industry. It will boost adoption of new technologies to address new types of threats. It will map out a path for new involvement of physical security technologies in areas of public health. It will raise new notions of privacy and turn previous thinking about privacy on its head. And the aftermath of the pandemic will give rise to all these changes in a breathtakingly accelerated timeframe. In the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace. Security and the futureIn the wake of the pandemic, change will come faster than ever, and the industry will be more challenged than ever to keep pace These were some of the thoughts I heard recently in a panel discussion titled “Crisis and the Everyday,” which was part of Genetec’s Connect’DX virtual trade show, April 20-21. The virtual conversation – emphasising both in form and content the current topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry. “In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security. “How do you support the business and, more broadly, societies and communities?” The new normal for security The “new normal” for security will include addressing biological risks alongside our traditional emphasis on physical risk and digital risk. “Some industry sectors are being challenged in a way I have not seen in my lifetime,” said Brekke. “But they are learning fast.” “We should take a look at where we have been and where we are going,” said Brekke, whose firm develops comprehensive strategies to align security organizations with corporate missions. “This is a point in time that has never existed, and a time to take a fresh look at what security is to the corporation and greater community. It’s more a mindset than a specific set of tasks. “We just need to take a fresh look from a mix of perspectives.” “Crisis and the Everyday" was part of Genetec’s Connect’DX virtual trade show Infrared cameras and access control technologies New technologies to address the pandemic are enabling some nations around the world to track how people come and go and who they are exposed to. Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing. But what will such use of these technologies mean in the long term? Technologies like infrared cameras are being used to detect body temperatures, and access control helps to monitor occupancy and social distancing “We will see whether people will become more comfortable with this technology,” said Ken Lochiatto, President and CEO, Convergint Technologies, a service-based security integration company. “Tools are in hand, and coming soon, that will allow us to be more proactive, to step in and measure the health of colleagues, for example,” said Lochiatto. “There are a lot of questions that will have to be addressed, and a lot of discussion will have to happen. Coronavirus will knock down the barriers (to the use of newer technology) in the short term, but where will it settle two years from now?” Manufacturer philanthropy Security product manufacturers are expanding their scope beyond law enforcement and emergency management and stepping forward to help with the public good. “Technology in the security space is moving faster than the political establishment is thinking about,” adds Lockiatto. “We have to manage it as an industry so the government will not step in. We need to manage the discussion.” An accelerated timeline will raise the stakes even further. “All the questions that would have taken longer to answer will be answered in the next 6-8 months. For the security industry, it will drive even greater need for products,” said Lochiatto. “The biggest question is ‘Where does this all go?’” said Brekke. “What is the new normal? What is the future, and how do we prepare our companies for it? What does technology look like in the future? There isn’t just one particular set of questions, just a constant stream of ‘What’s next?’” Public health versus individual liberty The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection, especially as it pertains to sharing medical information. “There will be a new balance between public health and safety as a whole versus individual liberties,” said Brekke. “Technology providers need to be at the table talking about the solutions. We should all be engaged in government affairs to balance the discussion and add our own perspectives. As a society and country, we have to come to a different perspective on this.” The current environment of disruption will shift the playbook and rebalance the tradeoff between privacy and protection “There are not enough ethics and guard rails,” said Jonathan Ballon, Vice President and General Manager, Intel Corp. “The majority of people are not afraid enough. They should be afraid; we need more regulation. We need to establish an ethical code of conduct for use of technology in these situations. We need to eliminate bias, respect individuals, and ensure people are being treated fairly. “In the next several years, there will be a lot of experimentation in the quest to get to a future state we can see and almost grasp. There will be black eyes and bruises on the path to getting there.” From smart security to more intelligent technology After the pandemic, the innovation climate will befit new technology adoption. “Platforms are only limited by our imaginations, and it creates an extraordinary opportunity and drives a lot of economic value,” said Ballon. “Long-term, the future is extremely bright. Companies should ensure that they are resilient and take advantage of another period of technology adoption, which we see coming out of every economic downturn.” After the pandemic, the innovation climate will befit new technology adoption Another evolution in the market is a transition from “smart” systems to more “intelligent” ones. Intelligence includes the ability to “learn” using tools such as deep learning and artificial intelligence. “Systems are going from smart to intelligent to autonomous, including systems that can operate within the constraints we have established,” said Ballon. Pierre Racz, president and CEO of Genetec, offered some words of caution about the growth of artificial intelligence in his keynote presentation, “AI Hype Self Defense.” Racz sought to provide guidance on the limits of the technology and urged the online audience to be skeptical of technology that “works best when you need it least.” “Science and technology are morally neutral,” he said. “How we use them is not.” Intelligent automation over artificial intelligence Specifically, Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm”. AI systems don’t know anything that isn’t included in their input data – for better and for worse. Racz contends that artificial intelligence “doesn’t exist” and provides the “reasoning power of an earthworm” “A properly designed system can be useful [only] if you engineer around the false positives, false negatives and the unanticipated training set biases,” said Racz. For example, because AI is based on probabilities, it doesn’t perform as well when identifying improbable things. In lieu of “artificial intelligence,” Racz recommends the term “intelligent automation” (IA), which describes using a machine (computer) for heavy computational lifting and keeping a human in the loop to provide intuition and creativity. “Do not misinterpret crafty guessing for intelligence or thinking,” Racz warns. “AI doesn’t exist, but real stupidity exists. And we must design our systems taking into account the legitimate fears of the public we serve.”
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilizing the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualization and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
ISC West is being affected only minimally by the COVID-19 coronavirus, which is having an impact on international business travel, specifically to and from China. One consequence of coronavirus travel restrictions is a decision by Reed Exhibitions International not to proceed with a dedicated pavilion for Chinese companies at ISC West, March 17-20. In the main hall, however, some Chinese companies will remain in the show and staff their exhibit booths with U.S. office personnel and resources. Importantly, the ISC West event is moving forward as planned. Several trade show organizers globally have canceled events because of fears of spreading the disease. For example, the Mobile World Congress in Barcelona was canceled at the end of February. “Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customers relative to personal health and safety, and the very challenging business predicament for these companies,” says Will Wise, Group Vice President, Security & Gaming Portfolio, Reed Exhibitions. Minimal Impact Our clear focus is on the health and safety for our entire ISC community, and empathy and compassion for our Chinese customersThe ISC West team and Reed Exhibitions International colleagues in China have been working diligently to assess the status of all ISC West exhibitors from China, given the travel restriction, says Wise. Among show attendees, Chinese travel restrictions will have a negligible impact. In past years, only a tiny fraction of attendees traveled to Las Vegas from China for the show. Immediate action by the U.S. government as soon as the world became aware of the COVID-19 coronavirus has enabled a controlled business and health and safety dynamic that will allow the show to proceed as planned. The U.S. took quick action to put major travel restrictions in place, including no incoming flights/travel from China. “The status is ever-evolving and we’ll be keeping the expo floor plan updated,” says Wise. The China pavilion In previous years, the China pavilion had hosted 50 or more companies as part of what was formerly known as “Global Expo,” located in the Venetian Ballroom adjacent to the Sands Convention Center. In 2019, the slate of companies in the Venetian Ballroom expanded to include some domestic exhibitors as well as the international companies. Importantly, the ISC West event is moving forward as plannedThis year, Venetian Ballroom exhibits will continue without the participation of Chinese companies. There will be international exhibitors from countries outside China as well as some domestic companies, including the Emerging Technology Zone, where new startups will highlight their latest innovations. The Security Industry Association (SIA) New Product Showcase will also be featured in the Venetian Ballroom, as well as a VIP international lounge. Additionally, a new pavilion highlighting Loss Prevention and Supply Chain companies will be featured, and there will be an educational theater offering free sessions on topics such as drones and robotics. Reed Exhibitions strongly urges exhibitors and visitors to refer to the guidelines and protocols as suggested by the World Health Organization and local /national public health authorities to contain and mitigate against any further spread of the virus. Suggested precautions include frequent hand washing (including alcohol-based hand rubs) and maintaining a three-foot distance between oneself and other people, particularly those who are coughing, sneezing and have a fever.
FLIR PT Series cameras were used in a surveillance project to detect and monitor illegal fishing and poaching activities along the Spanish Galician coast. The FLIR thermal imaging cameras combined with maritime video analytics from Gradiant were ideal for spotting illegal vessels on a 24/7 basis and at a long range. The vastness of the Galician coastline and the multitude of fishing and farming activities call for a more automated surveillance approach. Fishing, shellfish harvesting, and marine aquaculture - mainly mussel farming in inshore waters are important economic activities in Galicia (northwest of Spain). Local public authorities strictly control these activities to prevent exploitation, fish stock depletion and resulting economical losses. They are fighting a constant battle against this unfair and illegal competition that affects thousands of professionals who make a living from the fishing and seafood industry. Challenges of coastal monitoring Illegal fishing and poaching has an enormous impact on the environment and food safety Illegal fishing and poaching of seafood resources also has an enormous impact on the environment and food safety; especially during periods of toxic algal bloom (red tides), when fishing conditions are hazardous for public health. The detection of unauthorized fishing and shellfish harvesting is of paramount importance for the Galician authorities. However, monitoring and protecting all of Galicia’s inshore and offshore fisheries, shellfish harvesting areas, and marine aquaculture farms is a challenging task. Galicia has 1,200 km of coastline. Its protection involves the surveillance of activity in 122 ports, including around 5,000 fishing boats, 400 beaches dedicated to shellfish harvesting, and 47 mussel aquaculture farms, with a total of more than 3,000 bateas (floating mussel farms). Long-range thermal imaging Moreover, most illegal activity takes place at night, making it extra difficult for law enforcers to detect any type of vessel. The Galician climate does not help either. With an average of 128 days per year of rain, visibility conditions are usually not ideal for surveillance operations. Manned surveillance patrols can only do so much; they are hindered by the climate and visibility conditions, making it impossible (from a practical and financial standpoint) for coast guards to cover the entire Galician coastline. In 2017, the Galician Coast Guard started a project to test video surveillance of the coastline based on thermal imaging cameras. The pilot included the use of FLIR’s PT Series multi-sensor camera, combined with maritime video analytics software from Gradiant (Pontevedra, Spain). Multi-sensor installation FLIR thermal images were enhanced by Gradiant’s intelligent video analytics software for maritime applications The multi-sensor installation was extensively tested on two different locations along the Galician coast. One set-up was used to monitor illegal vessels on coastal waters at short/medium range, while another set-up was used for long-range monitoring. The PT Series thermal cameras allowed the Galician Coast Guard to monitor the required area over a long range on a 24/7 basis, even at night and in adverse weather conditions. In addition, the FLIR thermal images were enhanced by Gradiant’s intelligent video analytics software for maritime applications. This software is specifically adapted for monitoring coastal environments and allowed the coast guard to detect, track and geo-localise people and vessels, including small wooden and plastic boats. Visible-light camera The software enabled the thermal cameras to detect objects and people despite adverse maritime conditions, such as high waves, low contrast due to low light, fog and rain, reflections on the sea surface, camera vibrations, and the presence of distractors, such as birds and vessel wakes. The FLIR PT Series is a high-performance multi-sensor pan/tilt security camera, incorporating an uncooled thermal camera with sensitivity of <35mK and a visible-light camera with 36x optical zoom. While the thermal camera is used to detect threats over a long range based on their heat signatures, the visible-light camera can be used for verification and identification. Long-range surveillance The requirements for this long-range application were extremely challenging for any thermal camera" “FLIR is the reference for long-range surveillance applications with thermal imaging,” says José Antonio Rodríguez, Head of Video Analytics at Gradiant. “The thermal performance of the camera and the fact that this technology is easy to set up makes it ideal for this type of application. In addition, FLIR supported us from the start for lens selection, calibration of the system and much more.” “The requirements for this long-range application were extremely challenging for any thermal camera,” says Nikitas Koutsourais, Product Marketing Manager at FLIR Systems. “Thanks to the FLIR PT Series’ unique thermal sensitivity of less than 35mK, we could provide the best image performance in the market.” IP video streaming Two different configurations were used in this application. The long-range surveillance station used a FLIR PT-606 camera, and was able to detect a rubber inflatable boat at 4,000m. Despite its narrow field of view, this camera allowed for wide coverage thanks to the high-precision pan/tilt unit. The camera was able to sweep a wide field of view span in a pre-programmed sequence of pan/tilt presets. The port surveillance station used a PT-625, offering a good compromise between detection range and field of view with a single pan/tilt preset. The integration of the video analytics software with the camera was easy thanks to IP video streaming and the camera’s ONVIF compliant interfaces for pan/tilt control. Long-range surveillance typically requires the use of lenses with a narrow field of view, which is a problem when you want to monitor wide areas. Coastal protection applications The FLIR thermal cameras provided the Galician coastguard with increased situational awareness However, the video analytics from Gradiant was able to take advantage of the Preset Sequencing mode of the FLIR PT Series. This allowed the coastguard to cover a wide field of view with a single camera and to perform video analysis on each pan/tilt preset. The FLIR thermal cameras provided the Galician coastguard with increased situational awareness and allowed them to respond much quicker to illegal fishing activities. The pilot project was performed in a realistic surveillance environment along the Galician coast and generated very positive results. The combination of a multi-sensor system with Gradiant’s maritime video analytics proved to be effective to deal with the intricate Galician coast lines and a lack of open view. In addition, this technology combination is a cost-effective alternative, making automated surveillance applications accessible for fish farm companies worldwide. Extremely rugged systems Finally, the PT-Series are extremely rugged systems, which makes them ideal for coastal surveillance, especially in an extremely humid environment such as the Atlantic coast of Spain. The system’s vital core is well protected against dust and water ingress, and complies with IP66 requirements.
Since the spread of COVID-19 started in Denmark, the Danish government has closed all restaurants, bars and other business areas. In order to comply with the back-to-business policies of the government, Arkaden Food Hall, a popular food court located in Odense, needs to keep the number of guests within a specific limit per square meter – 308 people in their case. Being responsible for their customers and staff, the Food Hall deployed the People Counting and Flow Control Solution from Dahua Technology, to ensure a smooth and safe reopening after the pandemic. People count solution With 14 food stalls and 2 bars, the Food Hall has two entrances. The people count from these two entrances needs to be combined and displayed on screens to determine if there is any more room for customers to enter or will have to temporarily wait at the door. The solution consists of: 2 Entrances with 5 Series IPC (HDW5442E-ZE) 2 DPB18-AI 2 DHL32-F600 1 DSS Pro License 64 Channels + BI Module People counting and flow control The Dahua AI-powered people counting camera can automatically and accurately calculate the real-time number of people entering the restaurant, avoiding congestion and helping to mitigate the spread of the pandemic. The DSS PRO platform with People Counting and Flow Control, together with monitors and DPB18A helps send different videos/pictures and editable content for guests to see. When the number of guests exceeds the set value, the platform and monitors will notify and display ‘the limit is reached’ on the digital signage at the entrance of the Food Hall, reminding incoming customers to wait at the door. In addition, the people counting cameras are simple and easy to install, which allowed the installer to complete the entire project in just 1 day. Enhancing the safety level The People Counting solution has given us statistics and data about the behavior of our customers" “The People Counting solution has given us statistics and data about the behavior of our customers, which saves us a lot of resources since we do not have to physically count the number customers at the door. Furthermore, we can provide them with important information at the entrance using the monitors. We are very happy with our cooperation.” “There seem to be lots of innovative solutions out there that we would be more than happy to try out since we feel this will benefit us to be smarter and more efficient in many ways,” said Sanne Brigsted, Business Development Manager of the Food Hall. Faced with the impact of COVID-19, the Dahua People Counting and Flow Control Solution enhances the safety level and competitiveness of business establishments like Arkaden Food Hall, while creating a comfortable dining environment for their guests. Restaurant management efficiency Most importantly, it has helped the restaurant to successfully achieve its primary task of reopening its food hall by allowing an operator to monitor the customer traffic in real time so that timely security measures can be taken before the place becomes packed with customers. With this smart system, no additional employees are needed to count customers manually at the door, which can significantly reduce labor costs and improve restaurant management efficiency. Moreover, its monitor can serve as a notice board to inform customers or as a multi-purpose advertising screen with event marketing and planning based on the DSS Pro's intelligent data analysis, providing a platform with huge expansion potential and creating business opportunities for the restaurant.
Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, announced that Anaheim Union High School District (AUHSD), one of the largest school districts in California, has strengthened its security infrastructure with a district-wide solution that includes 1,250 Hanwha Techwin Q series cameras across 20 different locations. Anaheim Union High School District Located just outside of Los Angeles, AUHSD is a public-school district serving portions of the Orange County cities of Anaheim, Buena Park, Cypress, La Palma and Stanton and has an estimated 2,900 employees in 20 different facilities. In total, it serves approximately 29,000 students from grades 7 to 12. Despite its size and expanse, the district was lacking a robust security camera system that could allow administrators to monitor or document incidents on campus. “Other than a few sites with some DVR-based systems, we did not have any security cameras,” explained Erik Greenwood, Chief Technology Officer for AUHSD. IP security cameras installed AUHSD decided to strengthen its security infrastructure with a district-wide solution Additionally, as the district continued to grow, so did the seriousness of some of its security issues. After several security incidents and school shootings at other campuses across the U.S., the district faced mounting concerns from the community. AUHSD decided to strengthen its security infrastructure with a district-wide solution that would include IP security cameras at its center. AUHSD officials collaborated with school principals, administrative staff, and local police departments to identify key areas where cameras should be placed, such as gathering points for students and the buildings’ main entrances and exits, as well as what specifications the system should have to produce viable footage for law enforcement. Wisenet Q series 4MP cameras The district brought on CA-based integrator, HCI Systems Inc., which recommended Hanwha Techwin’s QNV-7080R 4MP Network IR Vandal-Resistant Cameras. The Wisenet Q series 4MP cameras enable high-resolution monitoring with clear images, and the innovative hallway view feature maximizes the area of surveillance in narrow locations, such as school corridors. In addition, these Q series cameras are equipped with IR function, enabling clear, sharp images in dimly lit environments and during the night. Robust set of technical specifications According to Greenwood, the Hanwha cameras were chosen as the key part of the system for several reasons. He said, “We had a very robust set of technical specifications in our RFP, and the image quality, frame rate and light specifications of the Hanwha cameras matched our requirements.” In addition to their rich feature set, the Hanwha camera configuration presented a streamlined solution. Greenwood further stated, “We didn't have a large quantity of different camera models which meant we didn’t need to keep stock of all sorts of lenses and other accessories. The committee liked that approach from a troubleshooting and ongoing maintenance standpoint.” Vandal resistance The vandal-resistant features of the Hanwha cameras were also a big factor in their decision process The vandal-resistant features of the Hanwha cameras were also a big factor in their decision process since the camera domes can easily be cleaned or swapped without having to replace the entire camera. The Hanwha cameras were installed throughout the district in entrances, exits, exterior restroom doors, staff work areas and in general meeting areas. They are helping the district keep eyes on campus vandalism, graffiti, any other potential threats and, in some cases, even monitoring certain personnel issues, such as inappropriate use of school equipment. Campus surveillance When an incident is reported, administrators can quickly access and review the security footage to see what happened. In all, Greenwood said, “It's been a great project that involved everyone and the new cameras have some great qualities.” Now that the installation is complete, AUHSD is taking a closer look to see where there may still be some blind spots and exploring where they might benefit from potential expansion.
Toyota Argentina has been operating in the country for 26 years. It represents 40% of the exports of automotive companies in 2019 and currently has an annual production capacity of 141,000 units, exporting 75% of its production to 22 Latin American countries and to the Caribbean. Toyota’s Zárate plant in Argentina, which was closed due to COVID-19, is ready to reopen with new regulations to ensure the security of its employees. Given the need to apply a health protocol against the pandemic and resume a safe operation, Toyota Argentina carried out an analysis of the new technologies on the market and chose the Dahua Thermal Body Temperature Monitoring Solution for its high quality and high cost-performance value. Safety at the factory Due to the large number of people entering and leaving the factory every day, the automaker required a safe and efficient solution to help them control the commuting staff (including 1,500 employees that take buses, 900 employees that use parking lots and 700 contractors) without delays, while complying with the new government regulations. The solution included 4 sets of Dahua Thermal Body Temperature Monitoring equipment (DHI-NVR4216-I + TPC-BF-5421 + Blackbody). They were installed in different entrances, providing a non-invasive way to check the body temperature of their employees at the same time, ensuring that the temperature of the people entering the plant is normal. Maximising employee security “This situation took us from having two production shifts before the pandemic to one production shift only, having to rise the number of buses to bring employees and contractors to the plant, as well as applying additional security measures in dining rooms, common areas, and production line for social distancing and cleaning and hygiene measures,” said Alberto Martín López, Corporate Security Manager at Toyota Motor Corporation. The training of personnel was also conducted to allow them to be familiar with the equipment"“Before this implementation, every shift entered and leave the plant in 30 minutes. Now, maintaining a rhythm of fluid access and social distancing, we do it in 45 minutes but in a more secure way, ensuring a competitive timing and maximizing our employees’ security,” explains López regarding the immediate benefit of the solution in the daily operation of the company. Production resuming “The installation and calibration was relatively quick. The Zárate Plant was operational in 3 days, with the addition of some infrastructure improvements on the entry/exit areas, since work was carried out in semi-open places and the impact of climate changes had to be reduced. In this period, the training of personnel was also conducted to allow them to be familiar with the equipment and to ensure the equipment’s usage life,” he added. The Dahua Thermal Body Temperature Monitoring equipment is faster than hand-held scanners In addition, López also mentioned that “The current COVID-19 protocol was also implemented, randomly testing staff that reaches about 100 tests daily. These types of new technologies facilitate and maintain a safe production operation and care for our employees and contractors, allowing us to comply with the demand of our customers.” Business security The Dahua Thermal Body Temperature Monitoring equipment is faster than hand-held scanners and can screen massive number of employees at a safe distance, enabling efficient entry/exit access for employees. It provides security guarantee for Toyota Argentina’s reopening and routine operations, while meeting the government’s business resumption requirements. "This technology allows companies to return to business in an orderly manner and be compliant with the measures dictated by official entities. This reinforces Dahua Technology's commitment to provide solutions that aid prevention measures during this pandemic. The objective is to be able to continue offering solutions that facilitate community care by supporting the economic business resumption of industries,” says Franky Su, Dahua Technology Country Manager for Argentina & Uruguay. Specific solutions and products might vary depending on the different regulations and measures for COVID-19 in each country.
Places of leisure, where one spends one’s downtime, are public by design. Unlike a bank vault or power plant, they actively invite visitors. One can’t just lock them down and hope no one turns up. Equally, to ensure user and property safety, access must not be a free for all. Managing risk - separating authorized from unauthorized people and locations - is part of every site manager’s daily routine. Intelligent locking makes this workload a whole lot easier. Intelligent keys combine the powerful features of electronic access control with the convenience and familiarity of mechanical keys. In hugely diverse leisure settings across Europe, they already help managers do more with less. Everyone treasures their leisure. The right access solution can help one do it safely without putting a burden on those responsible for one’s security. We treasure our leisure. The right access solution can help us do it safely without putting a burden on those responsible for our security. Controlling access to outdoor sites and visitor attractions Obviously, for many leisure attractions, wired electronic security is not an option. Locations may be remote - far beyond the reach of mains electricity. Assets themselves may be outside. Thankfully, cabling is not essential for effective intelligent access control. Robust, battery-powered locking, backed by intuitive admin software one can access from anywhere, matches or exceeds the functionality of traditional wired access control. Padlocks built to withstand climate extremes integrate within one’s system exactly like standard interior locks. Intelligent electronic key systems are also budget friendly. Making the switch from mechanical security is not an all-or-nothing decision. The best intelligent key systems let one roll out gradually, as needs evolve and budgets allow. For example, the Llyn Brenig Reservoir and Visitor Center in Wales attracts tens of thousands of tourists every year. Both mechanical and electromechanical locking protect a site which houses critical infrastructure and watersports facilities - with disparate security needs. Here electromechanical locking brings long-term cost savings to site owners Welsh Water, because locks no longer need to be changed when keys are lost. Permissions are simply deleted from the system software. In 2015, Twycross Zoo launched a £55 million, two-decade development plan. High on the agenda was a new intelligent key solution to replace a mechanical master-key system which was labor-intensive to administer. The new system’s flexibility has put zoo security managers in full control of their site. Only staff with the necessary authority and training can access animal enclosures. Carrying one programmable key able to open doors, windows and padlocks makes the security team’s rounds easier It’s simple for system administrators to issue time-defined user keys. These can permit vets or zookeepers access to enclosures for a specific time period outside regular hours - for example, in an emergency. When the period expires, the key no longer works and site integrity is automatically restored. Access control in the museum sector When Edvard Munch’s painting “The Scream” was stolen from an Oslo museum in 1994, thieves left a note which read: “Thanks for the poor security”. Securing museums - open spaces with priceless contents - presents one of security’s biggest challenges. Around 50,000 artworks are stolen every year, according to some estimates. Adding further complexity, many museums are located within historic properties. The building itself may be integral to the attraction - and come with strict heritage protections. Any new locking installation must make minimal mess. For this reason, wireless is increasingly the preferred choice. Wireless access systems based on robust, key-operated locking, rather than cards and other keyless credentials, combine a familiar technology (the metal key) with the intelligence to keep staff and collections safe. Carrying one programmable key able to open doors, cabinets, windows and padlocks makes the security team’s rounds easier. It also minimizes the number of keys in circulation - with obvious security benefits. Companion software makes key tracking straightforward: one always knows who exactly is carrying credentials, can refine or amend those permissions quickly and order a full audit trail on demand. And these locks are discreet enough to maintain the property’s appearance. Museum access control in action London’s Design Museum needed access control designed to protect high-value assets and exhibits. Devices here protect a contemporary site with three galleries, a restaurant/café and an events space, with 100 permanent staff and hundreds (sometimes thousands) of daily visitors. The building has multiple door sizes and must meet British Standards compliance. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries Electromechanical locks now control access through 56 doors, forming part of a security ecosystem which incorporates traditional mechanical locks, too. Using intuitive management software, security managers ensure every staff member accesses only the right areas. Contractors are issued with temporary programmable keys, which saves time formerly wasted escorting them around the building. The system the Design Museum chose - CLIQ® from ASSA ABLOY - also enables integration with third-party cloud-based solutions, for control via a single, central management interface. The delicate balance between protecting a precious building and guarding its contents sets a major challenge. Security and access control must be “subtle, but ever present,” according to one former moderator of the Museum Security Network. Invasive installation, showy or inappropriately designed devices and components cannot be considered. This was the checklist facing France’s Musée Maurice Denis: the museum is inside a listed 17th-century monument, so they turned to CLIQ access control technology for a solution. Drawing on extensive experience in the heritage sector, ASSA ABLOY delivered security without disrupting the building aesthetic. Installation was easy and wire-free, because encrypted electronics inside CLIQ locks are powered by the standard batteries inside every programmable key. No further power supply is needed at the door. Around 70 robust, hard-wearing cylinders and padlocks now secure doors and windows inside and outside the main building; waterproof padlocks protect CCTV camera housing on the exterior. Every employee receives access to relevant areas via a single CLIQ key, which administrators program with only the appropriate permissions. Insurance compliance is another major concern in the heritage sector. Indeed, insurers for 17th-century warship Vasa demand Sweden’s highest level of locking: Class 3. Yet the Vasamuseet’s access system must also allow 1.2 million annual visitors to move around freely, while keeping exhibits safe. To upgrade an existing mechanical system, around 700 interior door cylinders were equipped with CLIQ Remote electromechanical technology. Museum staff used to carry heavy chains with ten or more keys. Now facility managers can amend the access rights of everyone’s single CLIQ key at any time, even remotely, using the CLIQ Web Manager. It’s easy to issue contractors such as carpenters with access rights scheduled to end automatically as soon as their work is complete. Security for shopping and indoor leisure sites The electronics inside CLIQ locks are powered by the standard battery inside every key, not mains electricity According to one study completed two decades ago, one spends 87% of one’s time indoors. The number is probably higher now - and includes a huge chunk of one’s leisure time. Large retail multiplexes like Festival Place in the UK are a popular destination. Here over 170 shops, a cinema, sports center and restaurants have an ever-changing roster of permanent staff, cleaners and out-of-hours contractors. Every person requires secure entry on demand. The public also needs open access for 18 hours every day. Yet a single lost mechanical key could become a security problem for all users and tenants. Installing 100 CLIQ electromechanical cylinders drastically cut the burden of mechanical key management. Now, cleaners and maintenance workers carry an intelligent key which unlocks specific doors for a pre-defined time period. Using simple online admin software, site managers can immediately de-authorize and reissue a lost key or amend any key’s permissions. Generating a comprehensive audit trail - who accessed which lock, and when - takes a couple of mouse clicks. CLIQ also cuts Festival Place operational costs. The electronics inside CLIQ locks are powered by the standard battery inside every key, not mains electricity. Installation was wireless, a huge saving on potentially expensive electrical work. At Festival Place and wherever one gathers to enjoy leisure - indoors or outside - CLIQ enables easy access control for all openings with just a simple, single, programmable key. To learn how you can put CLIQ® intelligent key technology to work in agile, flexible, secure public services, download a free introductory guide at https://campaigns.assaabloyopeningsolutions.eu/eCLIQ
Perusahaan Gas Negara (PGN) is a company in Indonesia for the transportation and distribution of natural gas. The total length of distribution pipelines of this company is 3,187 km, serving around 84 million customers. As the owner and operator of four transmission pipelines, PGN is responsible for guaranteeing security along the entire chain of conservation and distribution of gas and for delivering products and services in accordance with the needs of consumers. Securing gas supply lines During the transport phase, the gas is pushed through the pipelines at very high pressure. When it reaches the end-users, however, its delivery pressure must be adjusted so that it falls within an acceptable range (as detailed in the contractual delivery specifications). This is to prevent consumers from being exposed to the full transport pressure reached within the pipeline. A meter and regulator station is used to regulate the Natural Gas outlet pressure, and reduce it to an acceptable value. To this end, PGN has developed a meter and regulator station (the Master Control Station) that works via remote control, directed from the control room. This project plays an active role in the PGN's commitment to achieving Operational Excellence in process management, with the focus on optimizing safety, improving efficiency and on maximizing reliability throughout the gas supply chain operations. PTZ cameras and remote monitoring To guarantee reliability and security of the control function, it is necessary to monitor the process using specialized CCTV equipment for hazardous zones. 10 PTZ units from the MPXHD series have been chosen for the realization of this surveillance system, because of their reliability in providing perfect video footage and their compliance with the security standards for operation in hazardous areas. The PTZ units are used to directly monitor the metering and regulating operations remotely from the master control room.
Round table discussion
The first half of 2020 has been full of surprises, to say the least, and many of them directly impacted the physical security market. The COVID-19 pandemic created endless new challenges, and the physical security market has done our part to meet those challenges by adapting technology solutions such as thermal cameras and access control systems. In the second half of 2020, we can all hope for a return to normalcy, even if it is a “new normal.” In any case, technology will continue to play a big role. We asked this week’s Expert Panel Roundtable: Which technologies have the greatest potential to disrupt the security industry in the second half of 2020?
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
The new year is several weeks old, so it is safe to say that many of our New Year resolutions have fallen by the wayside. Despite the limited success of our personal resolutions, the new year is a great time to take stock, look ahead, and plan to make 2020 the best year yet. Thinking about our industry as a whole, we asked this week’s Expert Panel Roundtable: What should be the security industry’s “New Year’s resolution?”
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload