Technological Innovations Group (TIG), the technology sales agency in the EMEA region offering integrated automation and control solutions for smart spaces, is pleased to announce that it is now able to offer Power Distribution Units (PDU) from GUDE that integrate with Crestron Home systems. This means users can now remotely control and monitor smart space devices in residential settings. As an official partner of Crestron, GUDE has developed and now offers drivers that allow their IP power str...
Viking Electronics has announced the release of the PA-250-IP high-powered amplifier for unicast and multicast paging. This high-powered paging amplifier adds loud ringing, voice paging, and background music to VoIP SIP hosted phone service or a premise-based PBX. “Building on the success of our IP paging line, this high-powered IP paging amplifier is unique in its usability and efficiency,” said Paul Speltz, Engineer at Viking Electronics PA-250-IP rack-mounted paging amplifier T...
Malwarebytes, a provider of advanced endpoint protection and remediation solutions, announces enhanced integrations and business offerings in its OneView management dashboard to streamline security business operations for Managed Service Provider (MSP) partners. The latest expansion brings management of server products into the cloud console and also integrates directly with ConnectWise Manage business management solution, making it easier for MSPs to streamline billing, service ticketing, and...
Interface Security Systems, a managed service provider delivering business security, managed network, UCaaS, and business intelligence solutions to distributed enterprises, announced the completion of a $60 million equity financing transaction led by its current sponsors SunTx Capital Partners and Prudential Capital Partners. The additional equity capital will help facilitate the company’s growth strategy and strengthen its capabilities, featuring highly differentiated managed services.&n...
LenelS2 has announced the release of the OnGuard security management system version 8.0, empowering security teams with enhanced situational awareness through unified views of the security environment, as well as powerful visualization for data-based insights. OnGuard Version 8.0 OnGuard Version 8.0 provides major updates including integration with the Magic Monitor unified client, rich interactive maps, a new modern reporting engine, cyber security enhancements and more. The OnGuard security...
ComNet, Communication Networks of Danbury, Connecticut, an ACRE company, and a USA-based manufacturer of fiber optic transmission and networking equipment, is expanding the line of Cybersecurity products by adding to its line of intelligent media converters. These intelligent media converters with Link Guardian create a physical layer of protection that limits network traffic to one-way communication between the source and destination networks. The ComNet CNGEUMC4+2(TX, RX)/M is designed to pre...
Alarm.com has developed the first cellular sensor with virtually no range limitations for monitoring valuable property and assets. The Alarm.com Flex IO™, a battery-powered device that is weatherproofed for outdoor durability, uses the latest LTE-M technology to operate anywhere there is LTE coverage and without a panel, hub or even Wi-Fi. The one-of-a-kind sensor works as a standalone solution or as an expansion of a person’s existing Alarm.com-powered system. The Flex IO™ sensor sets up in seconds and can be attached to almost anything to help people keep an eye on doors, gates, sheds, barns, detached garages, guest houses and other access points around their property. Expected battery life In addition, the wired magna-loop input option keeps users informed if freestanding items, like a motorcycle or lawn mower, are moved. “I’m extremely impressed by the Flex IO sensor after testing it as both an outdoor gate sensor and with the wired loop,” said Charles Hadsell, CEO of ePropertyCare. The Alarm.com Flex IO has an expected battery life of more than two years “The use cases for it seem almost limitless. Many of our customers come to us looking for help securing and monitoring things in areas outside the reach of their existing system. The Flex IO sensor is what we’ve needed to solve those challenges. I think it’s going to be a big hit because there’s nothing else like it on the market.” The Alarm.com Flex IO has an expected battery life of more than two years and seamlessly integrates with the existing Alarm.com ecosystem of connected smart home devices. Smart property monitoring Subscribers can stay informed about pertinent activity detected by the Flex IO sensor through real-time notifications and customizable alerts configured through the Alarm.com mobile app. “The Flex IO sensor expands the boundaries of smart property monitoring while redefining the uses for an activity sensor,” said Alison Slavin, co-founder and senior vice president at Alarm.com. “It’s an extremely versatile solution that’s ready for the challenge of what home or business owners want to monitor without being restricted by location.” The Alarm.com Flex IO offers enhanced awareness for property owners, one of the key elements of security. As a standalone solution, Flex IO also can be used in other applications where consumer needs have gone unmet due to range restrictions. The device is currently available through authorized Alarm.com partners. Flex IO is a trademark of Alarm.com.
Alarm.com has released the first commercially available video doorbell that rings without requiring any contact to reduce public health risks and make home visits and deliveries safer for all. The Alarm.com Touchless Video Doorbell is the next generation of video doorbells, combining sleek design with some of the most advanced video intelligence available to consumers for touch-free operation. It is the latest technology innovation from the company that pioneered smart home security. Touchless Video Doorbell The Alarm.com Touchless Video Doorbell eliminates the need to physically press a doorbell button. Anyone coming to the front door simply stands on a doormat placed at a safe distance to ring the chime. Rather than using motion detection common to other doorbell cameras, rapid and accurate person detection activates the Alarm.com Video Doorbell to reduce unimportant interruptions. When a person is detected, the doorbell immediately triggers the existing chime in the home, sends a mobile alert to the homeowner and starts recording a video clip. Homeowners can see and speak with visitors through the Touchless Video Doorbell’s live HD video and two-way audio instead of having to answer the door. Touchless security solution Our Touchless Video Doorbell helps homeowners and visitors alike maintain social distance" “Protecting the health and safety of loved ones and our communities has never been more important,” said Anne Ferguson, Vice President of Marketing at Alarm.com, adding “Particularly in the current environment, our front doors have become an even greater hotbed of activity.” Anne adds, “Our Touchless Video Doorbell helps homeowners and visitors alike maintain social distance and avoid encountering germs, bacteria and viruses that may exist on surfaces around the front door. Adding this touch-free solution to an Alarm.com-powered smart home security system is another way we can stay vigilant and protect one another.” Home automation As an integrated part of the expansive Alarm.com ecosystem, the Touchless Video Doorbell can automatically trigger other device activity through user-defined rules. For example, lights can turn on when the doorbell detects a person. Rapid people detection also helps ensure that inadvertent chimes are not triggered by animals, packages or other non-human objects. The device also features: 150° vertical field of view that gives homeowners a full head-to-toe image of visitors and clear look at packages left on the doorstep. Optimized portrait viewing on mobile so there’s no need to rotate the mobile device. Full HD resolution, HDR, and infrared night vision. Onboard heater for low temperature operation. Live video and saved clip viewing using the Alarm.com mobile app or website. The Alarm.com Touchless Video Doorbell will be available through the company’s robust network of professional security service providers.
Eagle Eye Networks, the globally renowned company in smart cloud video security, has shared the trends that will have the biggest impact on video surveillance, security, and use of analytics, to drive business intelligence and improvement in 2021. Cloud and advanced analytics Customers are asking for the cloud and advanced analytics will transform video surveillance systems into even more valuable business solutions. Compliance requirements are constantly evolving and IT departments are engaging with, and in many cases, owning video surveillance systems and customers are expecting systems to be open and connected. “A number of factors are driving the video surveillance trends in 2021,” said Hans Kahler, Vice President of Operations at Eagle Eye Networks, adding “Innovation from companies like Eagle Eye Networks and our partners is leading and meeting the demands of customers for their video surveillance systems to provide business insights in addition to security.” Combining AI and cloud video surveillance Combine the promise of AI and cloud video surveillance with the volatility, instability, and remote work environment of 2020" Hans Kahler adds, “Combine the promise of AI and cloud video surveillance with the volatility, instability, and remote work environment of 2020 and we have an environment where people are looking for their video surveillance and security systems to deliver more business value than ever before.” He further said, “The acceleration of cloud adoption and use of analytics to provide improved security and drive business improvement will make 2021 a transformative year for the industry.” Video Surveillance and Security Trends for 2021: Customers are asking for Cloud: The shift to the benefits of cloud in the video surveillance space are powerful and undeniable, including major cost savings, heightened data security, remote access and maintenance, flexible storage and retention, scalability, increased stability, and disaster recovery. Analytics and AI turn security systems into business solutions: Video surveillance systems are not just for security anymore, they’re also a valuable tool for business intelligence (BI). While AI has been talked about for several years, its deployment has lagged. This year, we’ll see AI move from the lab to practical adoption. Compliance requirements are constantly evolving: As video surveillance becomes a more widely adopted tool across industries and continents and more industries are using video for compliance purposes, regulating its use is becoming more prevalent. IT departments more engaged and owning video surveillance: IT leaders have not only got involved in the video management system, but have also started owning it. As part of their IT strategy, corporations are leveraging video for business process improvement while reducing unnecessary operational overhead. Demand for open, integrated systems: An open and connected ecosystem makes it possible for businesses and developers to integrate any number of applications on a single video management system (VMS) platform. The VMS platform handles all the heavy lifting of interfacing with the cameras, recording video, securely transmitting and storing video to the cloud, and making video available for use in the integrated applications. The days of vendors ‘locking’ users into their cameras or touting ‘hybrid’ systems (which require upgrades to vendor hardware to get new features) will not be accepted.
With the new MOBOTIX S74 video system, Konica Minolta is significantly expanding the usage options for Intelligent Video Solutions delivered using its MOBOTIX 7 platform. The new model is a high-performance IoT camera featuring up to four different types of sensor (two visual, one thermal and one movement/sound), which allows for more flexibility than any other MOBOTIX video system. Exceptionally discreet thanks to its concealed camera housing, the S74 can also access camera apps that have already been integrated, for almost indefinite expansion. This makes the video system universally suitable for any imaginable requirement in even the most diverse industrial applications. Identifying vehicles or people To supplement its already well-known 4K UHD modules in numerous lens opening angles, Konica Minolta is presenting a real world-first with the MOBOTIX S74: The Ultra LowLight 4MP Day & Night sensor module with automatic day/night switching. The Ultra LowLight technology can produce brilliant images with faithfully reproduced colors, even in low-light conditions. This is an important feature for applications such as identifying vehicles or people, even in the darkest of areas. The excellent signal-to-noise ratio of 0.19 demonstrates the impressive brilliance of the Ultra LowLight sensors The modules also have shorter exposure times, significantly increasing the sharpness of the object moving through the twilight image. The excellent signal-to-noise ratio (SRV) of 0.19 demonstrates the impressive brilliance of the Ultra LowLight sensors. That corresponds to a light sensitivity that is four-times higher than a 4K UHD module. The camera also has potent backlighting technology. VGA thermal technology Thanks to the optimized Wide Dynamic Range (WDR) function, all MOBOTIX 7 generation cameras can easily cope with challenging light conditions. WDR simultaneously combines different images with different exposure times into one image, automatically brightening areas that are too dark and preventing areas that are too bright. The result is a more accurate, detailed image in all areas. The excellent image quality also applies in thermal applications. With VGA thermal technology and an extended image angle of up to 90° x 69°, even the smallest details can be recognized. Large areas (perimeter protection) and temperature differences can also be captured from great distances. The S74 integrates perfectly into the open MOBOTIX 7 platform, which offers a wide range of MOBOTIX Certified Apps based on Artificial Intelligence and Deep Learning to support security and workflow processes. Specific use cases Customers can use existing apps from the platform instead of installing apps in their own infrastructure, which they would have to manage and continuously update. The pre-installed apps can be trialed free of charge for 30 days and then activated individually using a license, if this is required. However, customers can also develop their own apps for specific use cases and these can be integrated into the open platform. This means they can create "their own" camera to fulfill their specific requirements - giving them the full flexibility and modularity they need. In this way, new camera app solutions are continually being created with unlimited possibilities. Only high-quality professional market and partner solutions are integrated, tested, and certified by MOBOTIX to meet the high demands of quality and cybersecurity. Additional network cameras The S74 video system exclusively consists of rugged, high-quality components, which are made in Germany As image processors and storage are embedded within the IoT camera and the camera operates completely autonomously, there is no extra hardware or software such as servers or recording systems - only the camera itself is required. This intelligent video solution therefore enables customers to reduce server load and storage volume, lowering both capital and operating costs. If the system is expanded with additional network cameras, only additional storage is required. Robustness, reliability, and data security are also core values in the S74. The S74 video system exclusively consists of rugged, high-quality components, which are made in Germany. The camera housing is made of powder-coated aluminum and features weatherproof USB-C sockets. The S74 also provides end-to-end protection against cyber-attacks by hackers and prevents unauthorized entry into the company's network. AI-supported video technology Gary Fletcher-Moore, Head of Sales - Intelligent Video Solutions at Konica Minolta Business Solutions (UK) Ltd states, “With the MOBOTIX S74, we are setting new standards in AI-supported video technology. The system will impress customers thanks to its performance, image quality, robustness and cybersecurity.”
Hanwha Techwin, a global supplier of IP and analog video surveillance solutions, has announced the expansion of its line of public health surveillance technologies with the new Wisenet TNM-3620TDY body temperature detection camera. The multi-purpose device uniquely combines Artificial Intelligence (AI) with a dual-sensor design to securely monitor facility entrances and accurately identify potential health risks. Wisenet TNM-3620TDY camera The Wisenet TNM-3620TDY body temperature detection camera offers two detection modes to discreetly scan people entering a facility. When used in estimated body temperature (EBT) mode, the camera’s 2-megapixel visible light sensor captures and sends AI-based face detection data to its QVGA-class thermal sensor, which simultaneously measures the body temperature of each subject. Temperature monitoring is accurate to within +-0.3⁰ C when used with a blackbody calibration device and the camera will trigger audio/visual alarms and notifications when elevated temperatures are detected. An onscreen display indicates a subject’s temperature measurement, and a color-coded indicator is shown over their face. High-resolution surveillance video The Wisenet TNM-3620TDY camera can also be used as a traditional radiometric device The Wisenet TNM-3620TDY camera can also be used as a traditional radiometric device, with the visible sensor providing high-resolution surveillance video to assist in identifying people and activities. In this mode, onboard video and audio analytics are available to detect area intrusion, line crossing, loitering, and temperature detection. A spot temperature measurement feature also enables operators, via a web viewer, to obtain targeted temperature measurements by isolating specific areas within an image. Keeping customers and employees safe The TNM-3620TDY joins Hanwha Techwin’s full suite of solutions for helping businesses adapt during the COVID-19 pandemic, comply with new public health guidelines and keep customers and employees safe. “Business owners and managers of public spaces need flexible options for remaining open and operating efficiently,” said Ray Cooke, Vice President, Products, Solutions, and Integration, Hanwha Techwin America. Integrated with Wisenet 7 System on Chip (SoC) Ray adds, “With this new camera and all our solutions for occupancy level monitoring, face mask detection and social distancing measurement, Hanwha Techwin gives them a choice of health and safety technologies they can tailor to their operations.” The new TNM-3620TDY is based on Hanwha Techwin’s Wisenet 7 System on Chip (SoC), the core technology driving its enhanced image quality and advanced cyber security protection capabilities. The camera has a Micro SD/SDHC/SDXC slot that allows up to 256 GB of video data to be stored at the edge. This method of recording is useful in the event of a network disruption, enabling video evidence that potentially might have been lost to be easily and quickly retrieved when a connection is restored. Seamless connection to VMS, NVR and video decoder The TNM-3620TDY camera can also complement a facility’s existing COVID-19 safety protocols The camera can connect to a VMS, NVR or video decoder, or be used as a standalone device to comply with healthcare privacy concerns. The camera’s face detection area can be customized, for example to target the eye region, to prevent false positives from a warm forehead. The TNM-3620TDY camera can also complement a facility’s existing COVID-19 safety protocols, as people with detected elevated temperatures can be discreetly asked to enter a separate screening area for secondary screening with an FDA-approved clinical thermometer temperature reading. IEC 60601 certification The TNM-3620TDY is compliant with a series of technical standards for the safety and essential performance of medical electrical equipment published by the International Electrotechnical Commission (IEC). In addition, Hanwha Techwin has completed the Food and Drug Administration’s (FDA) facility registration process, with device registration for FDA 510(k) clearance in progress. The TNM-3620TDY supports H.265, H.264 and MJPEG compression formats, as well as WiseStream II, Hanwha Techwin’s compression technology which dynamically controls encoding, balancing quality and compression, according to movement in an image. Users can improve network bandwidth efficiency by up to 75% when combining WiseStream technology with H.265 compression.
BlueVoyant, a cybersecurity services company, announces a strategic partnership with UK-based third-party risk management consultancy, DVV Solutions, to deliver BlueVoyant’s Cyber Risk Management (CRx) services to DVV Solutions’ global customer base. This will be delivered primarily through BlueVoyant’s Vendor Risk Management (CR3) solution, which provides risk identification, analysis and threat remediation. Through DVV Solutions, BlueVoyant will generate, triage, prioritize and communicate security updates to DVV customers, providing actionable intelligence as part of its Vendor Risk Management service. Supply chain vulnerabilities This allows BlueVoyant to actively reduce DVV Solutions’ clients' exposure to the real threats their businesses face, instead of solely identifying the threats without context. Frequently, organizations do not have the in-house skills or resources to address these supply chain vulnerabilities, with assessment and identification being very labor intensive. DVV Solutions can help its customers to maximize their investment in third-party risk management programs Now, as a BlueVoyant partner, DVV Solutions can help its customers to maximize their investment in third-party risk management programs, utilizing BlueVoyant’s CR3 managed services offering. This provides customers with access to unmatched visibility and expertise, to meet the desired vendor risk management requirements, while improving their own cyber risk postures, and those within their vendor ecosystems. Security monitoring services Robert Hannigan, Chairman at BlueVoyant International, comments: “The knock-on effect of COVID-19 has led to squeezed financial margins and a reduction in the resources available to tackle third-party risk in the supply chain; just as the pandemic widens the attack surface. Our CR3 solution will provide the desired level of risk analysis and remediation for DVV Solutions’ customers and their vendor ecosystems, enabling them to effectively quantify, manage, and remediate third-party security risks.” Sean O’Brien, Managing Director of DVV Solutions, adds: “Partnering with BlueVoyant is a natural extension of our third-party risk management and security monitoring services. As businesses and their vendor ecosystems have changed throughout an unprecedented 2020, we have seen a sharp uptick in the requirement for managed services, as supply chains become increasingly complex. Organizations therefore require a managed service-based third-party risk management solution to cut through the noise, helping them to prioritize the most pertinent supply chain risks.” Risk management program “By utilizing our collective team of risk experts in this managed service model, customers will quickly improve the return-on-investment from their third-party risk management program. This will also enable them to re-allocate resources towards what’s important: eliminating control gaps, raising security standards and reducing overall risk,” added O’Brien. BlueVoyant will also deliver its Cyber Risk Management for Investors (CRi) solution BlueVoyant’s CR3 service complement DVV Solutions’ dedicated third-party risk management services portfolio. This portfolio includes on-site/virtual audits, risk assessments, questionnaires, security ratings, continuous monitoring, cyber risk maturity consultancy and regulatory compliance services. BlueVoyant will also deliver its Cyber Risk Management for Investors (CRi) solution, as part of DVV Solutions’ mergers and acquisitions (M&A) consultancy. This service effectively identifies cybersecurity risk throughout the investment process, such as pre- and post-investment and acquisition. Mitigating cyber risks This provides the desired expertise to assess, quantify, and mitigate cyber risks associated with a potential transaction or an investment portfolio. This level of due diligence is becoming an increasingly important pillar of the Environmental, Social and Corporate Governance (ESG) frameworks that many organizations are adhering to. Robert Hannigan concludes: “Organizations are now realizing the responsibilities they have in actively identifying and managing cyber risks throughout their vendor ecosystems, and how this directly impacts operational resiliency and financial stability. Our CR3 services enables an increasing number of customers and prospects across the UK and Europe to address these issues, building upon DVV Solutions’ existing managed services portfolio.”
Several major players vigorously employ biometric recognition technologies around the globe. Governments use biometrics to control immigration, security, and create national databases of biometric profiles. Being one of the most striking examples, the Indian Aadhaar includes face photos, iris, and fingerprints of about 1.2 billion people. Financial institutions, on their part, make use of biometrics to protect transactions by confirming a client's identity, as well as develop and provide services without clients visiting the office. Besides, biometric technology ensures security and optimizes passenger traffic at transport facilities and collects data about customers, and investigates theft and other incidents in retail stores. Widespread use of biometrics Business, which suddenly boosted the development of biometrics, is an active user of biometric technology Business, which suddenly boosted the development of biometrics, is another active user of biometric technology. Industries choose biometric systems, as these systems are impossible to trick in terms of security, access control, and data protection. Being in demand in business, these three tasks are also relevant for the industry. However, the use of biometrics at industrial sites is discussed unfairly seldom. Therefore, it is the face identification that is the most convenient there, as workers often use gloves, or their hands may be contaminated, and the palm pattern is distorted by heavy labor. All these features make it difficult to recognize people by fingerprints or veins and significantly reduce identification reliability. Therefore, industries seek facial recognition solutions. Thus, let us demonstrate the application of face recognition technology at different enterprises, regardless of the area. Facial recognition use in incident management Facial biometric products are known to automate and improve the efficiency of security services by enriching any VMS system. These systems provide an opportunity of instantly informing the operator about recognized or unrecognized people, and their list membership, as well as save all the detected images for further security incident investigation. Furthermore, some sophisticated facial biometric systems even provide an opportunity to build a map of the movements of specific people around a site. Besides, it is relevant not only for conducting investigations but also in countering the spread of the COVID-19 virus. Identifying and tracking COVID-19 positive cases Therefore, if an employee or visitor with a positive COVID-19 test enters a facility, the system will help to track his/her movement and identify his/her specific location. It will also help to take the necessary measures for spot sanitary processing. Thus, the introduction of biometric facial recognition at the industrial enterprise can improve and speed up the incidents’ response and investigations without spending hours watching the video archive. Access control system to secure physical assets The right access control system can help industries secure physical and informational assets The right access control system can help industries secure physical and informational assets, cut personnel costs, and keep employees safe. Facial recognition systems may enrich access control systems of any company by providing more security. As biometric characteristics, by which the system assesses the compliance of a person with the available profiles in the database, cannot be faked or passed. The human factor is also reduced to zero, due to the fact that while identity documents can be changed, the inspector can make a mistake or treat his/her task carelessly, be in collusion with an intruder, the biometric system simply compares a person in front of the camera with the biometric profiles database. Biometric facial identification software For example, RecFaces product Id-Gate, a specialized software product for reliable access control to the site, checks the access rights by using biometric facial identification alone or in conjunction with traditional IDs (electronic passes, access keys, etc.), which means that there is almost a zero probability of passing to the site by someone else's ID. The access control system’s functionality allows one to strictly account the number and time of all the facility’s visitors and also track their movement. When unauthorized access is attempted or a person from the stop list is detected, Id-Gate sends an automatic notification to the access control system and operator. Enhanced data and information security Even despite the division of access to different industrial enterprise areas, the security service needs to provide independent information system security. Employees with the same facility access rights may have different access rights to data. However, in that case, a personal password is not enough, as an employee may forget it, write it down and leave it as a reminder, tell a colleague to do something for him/her during the vacation, or just enter it at another person’s presence. Password-free biometric authentication systems make the procedure user-friendly and secure Password-free biometric authentication Password-free biometric authentication systems make the procedure user-friendly and secure. Such systems usually provide an option of two-step verification when successful password entry is additionally confirmed by biometric recognition. Hence, it is particularly relevant due to the current lockdown in many countries. To sum up, the application of biometric technologies solves several issues of the industry, such as: Optimizes and partially automates the work of the security service, as it provides reliable identification and verification of visitors/employees, reduces the amount of time spent on finding a person on video and making a map of his/her movements, without spending hours on watching video archive in case of investigation. Provides a high level of reliability and protection from unauthorized access to the enterprise and the information system. Provides a two-step verification of the user/visitor (including password and biometric data) and almost eliminates the risk of substitution of user data/ID.
Since lockdown came into effect, organizations globally have undergone years' worth of transformations in a matter of months. Whether it’s been to transition their operations online or moving their IT infrastructure to the cloud, there’s no denying that the face of business has changed permanently, experiencing a seismic shift, both operationally and culturally. As we enter the “next normal” there remains a great deal of uncertainty around what the next twelve months holds and how organizations can navigate turbulence in the face of a possible recession. One of the most notable and widely reported trends has been the switch to remote methods of work, or home working. And even with news of some businesses returning to their places of work and office spaces opening at reduced capacity, it’s widely speculated that for some, the home office environment is here to stay. Lower operational costs, greater flexibility and productivity driven For the vast majority, however, working from home is an entirely new process. In fact, a recent survey from IBM revealed that more than 80% of respondents either rarely worked from home or not at all prior to the pandemic. And in turn, more than half are now doing so with their personal laptops and devices. While the benefits of a more remote workforce are well documented – lower operational costs, greater flexibility and productivity driven by being able to access shared workspaces and applications from anywhere, at any time, and on any device – it does represent a sizeable concern in terms of security and data protection. An evolving threat landscape In the IBM survey, it was also revealed that organizations had not implemented any new security policies to help guide their staff when it comes to handling sensitive customer data and password management. And with so many employees logging on from residential networks, through personal devices that may be more easily compromised, the overall attack surface has greatly increased, raising the risk of potential corporate and sensitive data leakage in their new home office settings. The challenge is that bad actors love this new reality, as employees are far more likely to fall victim to a cyberattack when working outside of the office’s firewall. A survey released by INTERPOL, showed that cybercrime had grown at an “alarming pace” as a result of the COVID-19 pandemic, with a particularly large increase in phishing scams/fraud (59%), malware/ransomware (36%), malicious domains (22%), and fake news (14%). And this should be real cause for concern for organizations, because should one employee fall victim to a data breach through a scam or spear phishing attempt, for example, that company will be liable to pay potentially huge fines in line with national data regulatory standards. In April this year, the UK’s data protection watchdog, the Information Commissioner’s Office (ICO) and the EU, did both announce that they would temporarily soften their enforcement of the GDPR. However, this was not a cause for organizations to become complacent and neglect the data protection policies they had worked so hard to implement in their office environments. The momentary change actually means very little in terms of the critical importance of safeguarding private and sensitive data. Don’t slip into bad habits It’s essential that all organizations implement proper audit trails to track and account for any and all data It’s fair to expect that the move to a home office will inevitably make employees feel, well, more at home. And with that might come a relaxation in their approach to data management best practices and the adoption of a few bad habits. One thing to consider about a remote workforce, is it’s highly likely that everything will be saved to a desktop as temporary data or in permanent folders, particularly if access to central, cloud-based workspaces and platforms is impaired or restricted. The issue here is that this can impair an organization’s chain of custody over its organizational and customer data. It’s essential that all organizations implement proper audit trails to track and account for any and all data in their possession. With data stored locally on a device and off-premises, this data immediately becomes harder to audit and presents a significant risk to the organization. It’s crucial that both the organization and its employees understand how to actively clean up this type of environment. Managing documents through centralized cloud-based workspaces, is a much better way to continuously manage data stored. What this all comes down to is a need to account for the significant cultural shift all organizations are experiencing. While certain aspects of our day-to-day working life certainly won’t be business as usual, an area that can’t slip is data management and the safeguarding of private data. Ensuring that privacy is ingrained in all processes, new and existing, and maintaining the mantra that security should be every employee’s top priority is crucial. Give data privacy the time and respect it deserves, make it part of the company’s culture, and a compliant, secure workforce will follow. Basic hygiene and remote solutions = a healthy remote workforce So, what is the best way to ensure a remote workforce is following data management best practices and keeping home offices secure? Primarily it comes down to following many of the basic hygiene practices and guidelines that organizations should already be following. Don’t sit on sensitive data in your home office that is not needed and no longer holds any value to the business. Maintain a full audit trail of any and all data from point of collection, right through to end-of-life and erasure. And ultimately carry out the permanent and irreversible erasure of data when it becomes redundant, obsolete, or trivial (ROT), to reduce your risk – in fact, it’s completely possible to carry out certified data erasure of selected data remotely. Don’t sit on sensitive data in your home office that is not needed Equally, a lot of concerns about ensuring your workforce is following security protocols and maintaining regulatory compliance can be alleviated through tools and processes that you don’t even have to think about. Appropriate methods of data sanitisation can be achieved through automated solutions that can be pushed out by administrators to help continuously protect employees in the background, without the need for a significant shift or change from normal routines. Remote erasure practices also enable the sanitisation of devices that reach end-of-life, these can then be transported to the device processor without the threat of sensitive data being intercepted. In these uncertain times, organizations will undoubtedly be challenged in new ways, but it’s vital that they don’t fall victim to new data management challenges and risk facing wholly avoidable fines from data breaches. Security and achieving compliance have always been about the journey, not the destination, and this is yet another step in that journey. It won’t happen overnight, and it must be a company-wide effort. Employee education is essential, and privacy should be built into every part of the organization across departments, not just across IT or legal departments.
Latest insights from the Economist Intelligence Unit’s Global Barometer show that 41% of execs think 5G is now less important than it was before the pandemic. There are numerous reasons why this could be the case, one being that 4G and home broadband has been proven to be up to the job of supporting home working. There’s also no escaping the headlines that surround 5G and political espionage. They read like a script from House of Cards. Presidents, prime ministers, heads of foreign intelligence services and global corporate leaders, providing the colorful characters that are essential in any good political drama. It could well have made some organizations rethink their plans for adopting 5G enabled technologies and wait until there can be more assurances on security. New technologies The latest edict by the UK government is a pretty clear statement. It has promoted many industry insiders to say that it will take years to exchange kit, possibly even a decade for some operators, as they take on the heavy lifting of removing core network components and finding alternative suppliers. The financial impact is huge: operators will have to find additional budget to purchase the kit, conduct validation and integration testing, overhaul their service wrap around offers and factor in the time and cost of retraining employees on new technology. Achieve new ambitions related to driverless cars Despite all this, many carriers have made very public statements that they will progress with 5G as planned, some are even accelerating plans. The insight available to them confirms that there is still a good proportion of businesses and pubic bodies that see its value. It’s a way to propel smart city development and connectivity, and to achieve new ambitions related to driverless cars, and highly automated manufacturing for example. 5G therefore remains a rolling stone and regardless of the core network kit, security needs to be designed in, not bolted on, at every step of network and application design and build. New rules for working The pandemic has shaken up how we live and work. It has brought home the necessity for ultra-fast, affordable and agile communications everywhere. It’s also proved a fertile hunting ground for scammers keen to exploit the public’s thirst for up to the minute news. Click bait has been rife and it still forms one of the most effective ways to distribute malware and ransomware. Unprotected VPNs have added to the risks, as companies scrambled to roll out remote access at mass scale. It overburdened their security infrastructure and created vulnerabilities all in the name of getting home working ramped up quickly. Some companies have learnt the hard way that maintaining patches on software and keeping on top of the security education their employees receive is vital to protect operations from attack. Rural vs urban working The move to home working has also brought to light discrepancies in speed and access to communications, reigniting the rural versus city investment debate. We’ve seen some companies say that employees can now work anywhere, and others downsize their office footprints. This is opening the door for people to swap city living and commutes for more rural locations. 5G roll out plans typically focus on large cities and towns, but is this still the right strategy? I’d suggest that operators need to step back and look at the larger global trends and update their plans. Connected cows and beyond For example, farming and the environment has to be a planning priority now. To meet the needs of a predicted 9 billion people in 2050, farming supply will need to increase by 50%. COVID-19 has brought into sharp focus how precarious the global food supply chain is. In addition, this increase needs to be met with technology to make agriculture more efficient in order to preserve the world’s natural resources while meeting these goals. COVID-19 has brought into sharp focus how precarious the global food supply chain is The vision of the ‘connected cows’ is mooted as a way to solve global food security. As such, farming and the environment are set to gain greatly from technologies and applications enabled by 5G Internet of Things (IoT). But the benefits will only be realised if the connectivity and security is in place. The vast network of IoT sensors that will be used to improve farming inefficiencies, increase welfare standards and reporting, as well as efficiently manage food manufacturing will generate an abundance of data. Highly sensitive data This data will range from highly sensitive sets related to pricing and employees, critical data related to yield management and compliance, to more transactional weather and water sensor data. Ensuring continuity will be essential to not just farming productivity and meeting standards, but also protecting IP or personal information throughout the supply chain and preventing a cyberwar intended to starve people. Corporate espionage is a very real threat to manufacturing at the moment, and as farming becomes more connected, it’s expected this threat will extend as far as the farmyard. Not only that, protests against government handling of policies related to food poverty or overproduction could be done using ‘hacktivism’. It’s easy to buy a hack these days and start an online attack to make your point. So, as farming adopts technology models we usually see in the corporate world of pharma and finance, it too may become a target. Healthcare goes truly national The much talked of vision for the virtual GP accelerated in the pandemic, helping people see a GP without leaving the house. Governments have had a very real glimpse into the importance of connected healthcare in terms of saving money and time. There is now a greater likelihood that nursing teams will be given mobile devices that can access and update patient records in real-time, GPs will scale down consultation space in favour of online appointments, and prescriptions will be automatically filled and delivered at the click of a button. Comprehensive 5G networks can help make more of this happen particularly in remote areas where health care is scarce, of that there is no doubt, and this is before we get into the exciting prospect of remote brain surgery that 5G can facilitate. The pandemic also exposed the precarious nature of online healthcare But the pandemic also exposed the precarious nature of online healthcare. Patient data remains a sitting duck, as illustrated perfectly by breaches we saw across the world both in public and private delivery. At its very worst, nation state attacks pose a significant threat to public health and it’s essential there is local and global collaboration to ensure data is protected. This threat won’t wane. In fact, it is increasing as we drive more innovation and connectivity. Security experts have their work cut out. But it’s not impossible to achieve secure networks and applications, so long as we don’t put profit before people.
An impact of the COVID-19 pandemic has been to accelerate change. In 2020, the security industry was among many others that sought to adapt to shifting norms. In the process, we grabbed onto new opportunities for change and, in many cases, re-evaluated how we have done business for decades. If necessity is the mother of invention, perhaps crisis is the mother of acceleration. This article will reflect on how these themes impacted the physical security industry in 2020, based on content we published throughout the year, and with links back to the original articles. Sensitive data leakage Since the lockdown came into effect, organizations globally have undergone years' worth of transformations in a matter of months. Whether it has been to transition their operations online or moving their IT infrastructure to the cloud, there’s no denying that the face of business has changed permanently, experiencing a seismic shift, both operationally and culturally. As we enter the ‘next normal’ there remains a great deal of uncertainty around what the next 12 months holds and how organizations can navigate turbulence in the face of a possible recession. One of the most notable and widely reported trends has been the switch to remote methods of work, or home working. With so many employees logging on from residential networks, through personal devices that may be more easily compromised, the overall attack surface has greatly increased, raising the risk of potential corporate and sensitive data leakage in their new home office settings. Security and data protection are larger issues than ever. Good cybersecurity hygiene Criminals will use the crisis to scam people for money, account information and more" With a majority of the world working from home, businesses had to respond to this changing landscape. While it used to be that in-person networking events and sales pitches secured new projects or opportunities, the current landscape pushes businesses to be more creative in how they reach their customers. For example, with ISC West being postponed, many companies have turned to online resources to share new product demonstrations and other company news. Others are hosting webinars as a way to discuss the current climate and what it means for the industry. Without the proper precautions, working from home could become a cybersecurity nightmare, says Purdue University professor Marcus Rogers. “Criminals will use the crisis to scam people for money, account information and more,” he says. “With more people working from home, people need to make sure they are practicing good cybersecurity hygiene, just like they would at work. There is also a big risk that infrastructures will become overwhelmed, resulting in communication outages, both internet and cell.” Work-Life balance In a typical office with an on-premise data center, the IT department has complete control over network access, internal networks, data, and applications. The remote worker, on the other hand, is mobile. He or she can work from anywhere using a VPN. Until just recently this will have been from somewhere like a local coffee shop, possibly using a wireless network to access the company network and essential applications. There are many benefits of working remotely with productivity right up the top of the list There are many benefits of working remotely with productivity right up the top of the list. By reducing the unproductive time spent commuting and traveling to meetings, we are able to get much more done in a day. Add to this the reduction in stress and improved work-life balance and it makes for an impressive formula of happier, healthier and more motivated colleagues. And it’s still easy to measure results no matter where someone is working. Video conferencing platforms Trade shows have always been a basic element of how the security industry does business - until the year 2020, that is. This year has seen the total collapse of the trade show model as a means of bringing buyers and sellers face to face. The COVID-19 pandemic has effectively made the idea of a large trade show out of the question. The good news is that the industry has adapted well without the shows. A series of ‘on-line shows’ has emerged, driven by the business world’s increasing dependence on Zoom and other video conferencing platforms. The fact is, 2020 has provided plenty of opportunities for sellers to connect with buyers. Some of these sessions have been incredibly informative – and conveniently accessible from the comfort of a home office. Online training courses Online training has grown in popularity this year, and the change may become permanent Online training has grown in popularity this year, and the change may become permanent. “We have seen unprecedented international demand for our portfolio of online training courses ranging from small installation companies to the largest organizations, across a wide range of sectors,” says Jerry Alfandari, Group Marketing Manager of Linx International Group, a UK training firm. “More than ever, businesses are looking to ensure they have the skills in-house to coordinate their response to the changing situation. Individuals are also taking this time to upskill themselves for when we return to ‘normal’ by bringing something with them they didn’t have before. Perhaps unsurprisingly, people are still seeking to better themselves for what will be, eventually, a competitive market.” Virtual trade show ‘Crisis and the Everyday’ was part of Genetec’s Connect’DX virtual trade show last spring. The virtual conversation – emphasizing both in form and content the topsy-turvy state of the world – included interesting insights on the current pandemic and its near- and long-term impact on the industry. In the middle of this pandemic, there is an opportunity to help security reinvent itself “In the middle of this pandemic, there is an opportunity to help security reinvent itself,” said Brad Brekke, Principal, The Brekke Group, one of the panelists. “Amid the business disruption, we should ask ‘what’s the new playbook?’ It’s an opportunity for security to look at ourselves now and look at a business plan of what the future might look like. We need to align with the business model of the corporation and define our role more around business and not so much around security.” Cloud-Based platform As a cloud-based platform for service providers in the security, smart home and smart business markets, Alarm.com adapted quickly to changing conditions during the coronavirus pandemic. In the recent dynamic environment, Alarm.com has kept focus on supporting their service provider partners so they can keep local communities protected. “We moved quickly to establish work-from-home protocols to protect our employees and minimize impact on our partners,” says Anne Ferguson, VP of Marketing at Alarm.com. The Customer Operations and Reseller Education (CORE) team has operated without interruption to provide support to partners. Sales teams are utilizing webinars and training resources to inform and educate partners about the latest products, tools, and solutions. Alarm.com’s partner tools are essential for remote installations and support of partner accounts.
As the new Chief Executive Officer of Milestone Systems, Thomas Jensen pledges to continue the company’s focus on protecting people and assets and to help organizations gain insight and optimize their business processes. Seeking to fulfill Milestone’s mission to ‘Make the World See,’ Jensen will maintain Milestone’s approach of being an open video management system (VMS) platform and having an open company culture. End-User communities “I will also be working to expand Milestone’s VMS into new areas and applications —for example, to monitor beach erosion as the climate continues to warm up around the world,” says Jensen. “I believe the future of VMS is about bridging the gap between security and applications that go beyond security.” Jensen’s previous experience in the IT industry contributes to his understanding of the entire channel Jensen’s previous experience in the IT industry contributes to his understanding of the entire channel. His experience as a generalist – extending beyond IT – enables understanding of the business side of things in addition to the skills, strengths and motivations of the people who work at Milestone, its channel, partner networks and the end-user communities. People-First approach “One crucial thing my career taught me is the importance of your team members,” he says. “A former manager once told me that success is the sum of the success of your team. And, luckily, Milestone already has a strong culture and people-first approach. This is one of the things that attracted me to this job.” The new CEO plans to spend his first 90 days building relationships and getting to know the company and the team members. He will be present in conversations with all Milestone people as well as partners and system integrators. “I want to ensure there is continuity and resilience so that my joining Milestone is a seamless transition,” Jensen says. “Furthermore, my focus will be to further build on the strengths of Milestone to create long-term sustainable growth.” Video-Enabled insights Jensen sees security through two lenses: on one hand, protecting people and property, and on the other, providing video-enabled insights for public and private companies to be able to make better decisions. On the protection side, businesses have room to grow as technologies move to provide more affordable, more powerful, and more interoperable solutions. A transformative element in the future evolution of video management is the cloud Regarding video-enabled insights, there is great potential, and Milestone is forging deeper relationships with partners and system integrators of important verticals such as cities, education, transportation, and retail. A transformative element in the future evolution of video management is the cloud, which will advance the deployment of technologies across the board. Best software integrations “I will be spending time working with our organization and partners to evolve Milestone’s cloud strategy and cloud partnerships to address the opportunities that lie ahead,” says Jensen. “I also think that Milestone’s belief in being open and giving integrators and end-users the freedom to choose the best software integrations available in the market is a philosophy that we've held dear from the very beginning — and this will become critical in the future as VMS solutions continue to evolve.” Safer business environment As the COVID-19 pandemic has raged on, Milestone Systems has continued its operation as usual, deploying safety measurements as needed to protect both employees and the partners they work with. COVID-19 has impacted everyone, every business and every government and organization around the world, says Jensen. We’re working with our partners to design a safer business environment with VMS-enabled solutions" “I think it taught us all a lesson in empathy and how we need to respect differences in behavior, regulations and compliance, customs and even each other,” he says. “At Milestone, we’re working with our partners to design a safer business environment with VMS-enabled solutions for social distancing, queue management, and contact tracing.” Creating security solutions “The past 50 years of digital technology and the past 20 years of IP technology have taught us that technologies eventually converge, and in some cases merge,” says Jensen. “Sometimes functions merge and channels converge, other times it’s the networks that come closer together, but none of this is absolute and universal.” “This is why we need to listen and learn from each other and be respectful of differences in the industry and the channel—particularly cultural and regional differences.” Jensen adds: “The technology company of the future — which I believe Milestone is becoming — will not dictate solutions but will instead partner with IT and security stakeholders to create security solutions that meet each customer’s unique challenge and environment.”
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centers on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximizing benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximizing the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
Global MSC Security announced that it has been appointed by the City of Edinburgh Council to consult on a planned upgrade of its video surveillance system from analog to IP, as Edinburgh progresses towards its vision to become one of the world smartest capital cities. Working with the Council, Global MSC Security will use its public sector expertise to oversee the preparation of a tender specification of a fully integrated public space surveillance operation. Upgrading public realm CCTV surveillance system The appointment of Global MSC Security follows the announcement that the City of Edinburgh Council is investing over £1 million in its public realm CCTV (including housing blocks, transport network and Council buildings) and has also secured £712,000 from the 'Scotland's 8th City, the Smart City' European Regional Development Fund Strategic Intervention in support of an upgrade to its CCTV infrastructure, as part of its smart city program. Global MSC Security has a wealth of expertise in public space surveillance, having consulted on dozens of local authority CCTV surveillance projects, including The Royal Borough of Windsor and Maidenhead, Central Bedfordshire, Buckinghamshire, Herefordshire, North Somerset, Barnet, Bristol City, Dorset, Neath and Port Talbot, Mid Devon and Maidstone and Luton Councils. Installing new IP cameras, VMS and encoders Global MSC Security will ensure the City of Edinburgh Council is able to upgrade its public space cameras, VMS and encoders Global MSC Security will ensure the City of Edinburgh Council is able to upgrade its public space cameras, video management system (VMS) and encoders, with the right technology at the best price and implemented smoothly. Global MSC Security’s Managing Director, Derek Maltby stated “We offer a wealth of experience in specifying public space surveillance systems for local authorities. Global MSC Security is proud to be involved in what is a major initiative not only for the City but Scotland and its position as a leader in smart services and society.” Resilient and secure city surveillance system He adds, “This important and essential infrastructure upgrade represents a significant investment, and the resulting system will provide the Council with a function-rich, future-proof, highly resilient and secure surveillance system.” Derek further stated, “However, for any organization making the switch from analog to IP, it is vital that the transition is managed in the correct way, to maximize resources and optimize system performance. That begins with a robust tender specification, which is where our expertise lies.” The tender specification is expected to be released by the City of Edinburgh Council in February 2021 and the contract awarded in September.
Specialist property developer and investor, Kajima Properties’ new project development at 77 Coleman Street in the City of London is a luxury multi-tenant office set over seven floors. BNP Paribas acts as the managing agent, while the redevelopment was designed by architect, Buckley Gray Yeoman. The prominent London location is a minute’s walk from Moorgate Tube station and the Elizabeth Line. The redevelopment included installing elegant external facades as well as creating floors of new office space, and 16,000 sq. feet of retail, leisure and restaurant space. The site offers exceptional internet reliability and speed for tenants, and is one of just 22 buildings in the UK to achieve a platinum connectivity rating by WiredScore, the Mayor of London’s digital connectivity rating scheme. Seamless access control system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system BNP Paribas and Kajima Properties wanted a seamless and highly efficient access system to allow bona fide users and visitors easy access through reception and lifts to their desired location. This needed to be underpinned, but not impinged by, a robust security management system including CCTV to keep people and the building safe. They wanted to keep any waiting time in reception to an absolute minimum to avoid crowding, including good access for disabled users, and for all entry to be touchless. Tenants and reception staff would need an efficient, secure and easy to use system for managing visitors. While an entry phone and door automation would be required for anyone arriving out-of-hours, or at the rear of the property, such as for deliveries and trades people with equipment. Bespoke security solutions Finally, a key part of the brief was for any installed equipment, such as turnstiles and lifts, to be in keeping with the sophisticated, minimal look and feel of the building. The Team Antron Security project managed the design, supply and installation of the access control and security system for 77 Coleman Street and acted as the ‘go to’ contact for client, Kajima Properties and BNP Paribas. Antron Security is a globally renowned installer of bespoke security solutions and has been providing security installations for the past 29 years. Taking care of the supply, design, installation and maintenance of security systems, Antron Security is NSI approved, meaning all staff and systems installed comply with the latest industry standards and are regularly inspected. Integriti access and security management system Inner Range provided the core access and security management system, Integriti, which enabled Antron Security to build the bespoke solutions needed for 77 Coleman Street in London, UK. Inner Range is a globally renowned company in the design and manufacture of intelligent security solutions since 1988. More than 150,000 Inner Range systems have been installed in over 30 countries till date. The company’s flagship product, Integriti, offers enterprise-level intelligent security and integrated smart building controls for single sites through to global estate portfolios. Seamless, touchless entry for tenants Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles The building’s 2000+ regular users are issued secure proximity cards, carrying encrypted information about when and where the user is allowed to go. Cards are presented to readers embedded in bespoke Integrated Design Limited (IDL) entry turnstiles, which also allows them to be read by the KONE lift integration. The high level lift integration with ‘destination control’ means the lift software takes into account where each of the building’s four lifts are, where the user’s ‘home floor’ is, as well as where other users are going/due to go, and instantly calculates the quickest lift for the new user. Antron Security and IDL collaboration The user is immediately directed to the most efficient lift via a display screen on the turnstile. If users are able to go to more than one floor, they can update their preference in the lift itself. For the turnstiles in the reception area, Antron Security and IDL worked closely with the vision set out by the architect to create a high-performing system that was in keeping with the sleek, minimalist design of the building. A bespoke set up of slim ‘speed lane’ turnstile pedestals, together with a separate glass gate were an ideal solution for a reception area where space is limited but security provisions and good disabled access are needed. IDL’s Glassgate 200 opens away from the user, and closes behind, preventing tailgaters and all IDL items are manufactured in the United Kingdom. Readers for proximity cards and QR codes were set into the speed lanes to create a seamless flow through the reception area. Fully integrated visitor management system Inner Range’s Integriti also allowed Forge’s Bluepoint visitor management system to integrate with IDL’s turnstiles and the KONE lifts. For visitors to access tenanted floors within the building, the following has to take place: A tenant creates the meeting via Bluepoint. An email is generated and sent to the visitor’s inbox where they can create a mobile QR code pass and save it to their smart phone wallet. When the visitor arrives, they scan their QR code on their smart phone at the reception desk, at which point their QR code becomes valid on the Integriti access control system. The visitor is then able to enter via IDL’s speed lane turnstiles, and they are directed by the KONE lift display (which is set into the speed lane) to which lift car they need. To leave, the visitor presents their QR code at the speed lane turnstile, which tells the system they’re leaving. The QR codes are only valid for one entry and one exit, and only on the appointment date and at the planned appointment time. Afterwards, the QR code becomes invalid and is deleted from the system. The QR code gives the visitor the ability to access everything they will need, from the entry turnstile and lift through to any locked doors en route. The integration between Integriti and Forge’s Bluepoint visitor management system was achieved with an XML read/write interface, as well as API integration between a SQL database and a cloud-hosted VMS database based on Microsoft Azure cloud services platform. BTP XIP intercom system A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team A BTP XIP intercom system was installed to allow visitors out-of-hours to contact the security team, or for deliveries and trades people to use in order to access doors at the rear of the building. The XIP system uses an ethernet distribution network, which means the system can be expanded easily, and it’s possible to install long-distance connections that data networks can’t reach. Hikvision CCTV cameras installed CCTV cameras from Hikvision’s ‘superior’ range have been installed throughout the site to create a hard-wired IP closed circuit television system. They are integrated with the Integriti access control system, which allows for intelligent ‘cause and effect’ monitoring. System protocols automatically bring up specific camera feeds for security managers to view in response to alerts, and footage can be viewed holistically along with other information on from Integriti, such as if a door has been left open. Intelligent access control Inner Range’s Enterprise product, Integriti, provides seamless integration with a multitude of other smart building management systems, underpinned by robust security. This includes encrypting all communications through every device and interface, and providing intruder detection to European standard EN50131. Integriti helps building managers create greener, more energy efficient sites by tracking how tenants use the building, and amending heating and lighting settings as a result. Integriti also provides trace reporting, that can identify a user’s movements if they have become unwell and identify who else has been near them. System benefits for users Touch-free entry to the building via the speed lanes and lifts. No unnecessary stops for users and visitors on their way into the building. Less crowding in the lift areas. Easy to use visitor management system. Robust security that doesn’t impinge on access. Sleek and minimal design in keeping with the building design. Jamie Crane, Commercial Director at Antron Security, stated “The flexibility of Inner Range’s Integriti access control system and Forge’s Bluepoint visitor management allowed us to incorporate high-level lift integration (known as ‘destination control’).” He adds, “Together, they create a future-proof solution as we can continue to meet the ever-changing requirements of the landlord and tenants via our ability to integrate with third party systems and devices such as lifts, intercoms, lighting and building management devices.”
Leonardo delivered the first two M-345 jet trainer aircraft to the Italian Air Force, which to-date has ordered 18 units from a total requirement for up to 45 aircraft. The new type of jet trainer aircraft, designated T-345A by the Italian Air Force, will gradually replace the 137 MB-339s which have been in service since 1982. M-345 jet trainer aircraft Marco Zoff, Leonardo Aircraft Managing Director, said “Building on our heritage and expertise in jet trainers, the M-345 will allow our customers to achieve a significant improvement in training effectiveness while at the same time reducing operating costs. This first delivery to the Italian Air Force is a key milestone, the result of a longstanding and productive team working closely together with the operator.” The new M-345 jet trainer aircraft, designed to meet basic and basic-advanced training requirements, will complement the in-service M-346, which is used for advanced pilot training. Integrated training system Leonardo’s integrated training system developed around the M-345 platform is representative of the company’s technological leadership in training pilots to fly current and future generation aircraft. The system benefits from experience with, and technology developed for, the M-346, which includes a ‘Live Virtual Constructive’ capability. This allows aircraft which are flying live training missions to incorporate simulated ‘friend’ or ‘foe’ elements into scenarios, allowing the pilot to be exposed to the full range of possible operational situations. M-345 HET (High Efficiency Trainer) The new M-345 HET (High Efficiency Trainer) reduces the time required for air forces to train pilots The M-345 is a high-performance aircraft which supports a pilot’s transition from basic trainers to latest-generation fighters. The Italian Air Force’s acquisition of the new aircraft is an important step forward in the modernization of its fleet, with the M-345 replacing the MB-339A in Air Force’s second and third military pilot training phases. The M-345 has also been chosen as the new aircraft of the Italian Air Force’s acrobatic team, the ‘Frecce Tricolori’. The new M-345 HET (High Efficiency Trainer) reduces the time required for air forces to train pilots. It also gives trainees the chance to fly an aircraft that features higher performance characteristics than other basic/advanced trainer aircraft currently in service around the world. Delivering high quality training at low cost The performance of the M-345 allows it to carry out the most demanding mission types found in a training syllabus, delivering high quality training at significantly lower cost. The M-345 cockpit architecture is the same as that of frontline fighters. The aircraft is also able to perform operational roles, thanks to an extended flight envelope, with a high-speed maneuvering capability even at high altitudes, modern avionics systems, high load capacity and performance. Health and Monitoring Usage System The M-345 is designed with a long life-cycle and a two-level approach to maintenance The M-345 is designed with a long life-cycle and a two-level approach to maintenance, eliminating the need for expensive general overhauls. The aircraft’s Health and Monitoring Usage System (HUMS) also contributes to a lower cost of ownership. A sophisticated on-board training simulator confers a number of benefits. For instance, M-345 pilots are able to plan maneuvers before live training, allowing for higher efficiency during flight. Mission Planning and Debriefing Station Trainees are also able to fly in formation with other pilots in the air and those training on the ground in simulators, via a real-time data-link. The aircraft’s Mission Planning and Debriefing Station (MPDS) allow trainees to analyze the missions they have just flown. The M-345’s engine is a Williams FJ44-4M-34 turbo fan optimized for military and aerobatic use. The cockpit is based on HOTAS (Hands-On-Throttle-And-Stick) controls and features a glass cockpit with a three-color MFD (Multi-function Display) touch screen. The aircraft’s heads-up display is mirrored on a fourth screen in the rear seat.
One of the key problems in airport security is the sheer size of the perimeter and a large number of incidents are in fact linked to unauthorized access onto the airfield, either runways or where aircrafts are being loaded or refueled posing an extremely high risk. Most airports will combine multiple sensors and technologies to protect the actual perimeter fence and even beyond the perimeter fence, to warn of potential threats. OPTEX LiDAR sensor integration with RSA module Some airports have found the level of information generated by the perimeter security systems quite challenging to deal with and they wanted to decrease the number of events so operators could focus on what was critical. The Airport development team at Genetec integrated the OPTEX LiDAR sensor into their Restricted Security Area (RSA) Surveillance module, an extension of the Genetec Security Center platform with the purpose to unify data from the sensor and camera to present more meaningful information to the operators. Restricted Security Area Surveillance module The RSA module has been designed specifically with a view to providing wide area protection The RSA module has been designed specifically with a view to providing wide area protection and integrating with wide area surveillance technology, including radar, fiber optic and laser detection devices. The solution allows security staff to determine the level of threat for each area, map them, and utilize OPTEX technologies to identify and locate quickly and precisely the point of intrusion. For instance, with Fiber optic fence sensor, zones can be 100m-200m long and will identify people cutting through a fence, crawling under or climbing over. Newer fiber technologies provide point location. Another way to pin-point exact intruder location is with OPTEX LiDAR technologies or with Radar. ‘Fuse’ data into a single event A particularly intelligent feature of the system is its ability to ‘fuse’ data (known as ‘target fusion’) coming from multiple sources and confirm an event as a single (i.e. the same) activity rather than a multiple threat. For instance, using the X&Y coordinates provided by OPTEX REDSCAN sensors, RSA allows to map exactly the path of the intruders or moving vehicles, fuses the path from one camera to the other and considers it as one event, one target and tracks it precisely on the map. Intelligent Tracking and event categorization This gives a more meaningful picture to the operator and presents events in a unified and intelligent way. This helps support the security team in making the right decisions. The deeper integration of OPTEX’s technologies into Genetec’s RSA platform enables intelligent tracking and event categorization, making it a very precise security system for airports.
Calipsa, a provider of deep-learning powered video analytics for false alarm reduction, announces that its false alarm filtering platform is being used by Richmond, British Columbia-based Radius Security. Radius Security is the security systems and monitoring branch of Vancouver Fire and Security and the first Canadian monitoring center to adopt the cloud-based Calipsa technology. Calipsa’s false alarm reduction technology uses artificial intelligence with deep learning technology to filter out false alarms with a 99.5% accuracy rate. Recognizing genuine alarms Calipsa’s technology recognizes genuine alarms caused by human or vehicle movement, while filtering out notifications resulting from nuisance factors such as animals, lighting, weather or foliage. With our Redhanded Human Detection solution, our focus is on catching criminals in the act" Aleksei Bulavko, research, development and production manager at Radius Security, said the Calipsa technology would further enhance his company’s reputation as a top-tier monitoring station. “With our Redhanded Human Detection solution, our focus is on catching criminals in the act,” he said. “Calipsa enables us to do this at a greater capacity, meaning an even faster police response time for our customers.” False alarm filtering platform Brian Baker, vice president, Americas, Calipsa, said the false alarm filtering platform will enhance Radius Security operators' efficiency by enabling them to concentrate on genuine alarms. “Also, Calipsa’s cloud-based technology requires Radius Security to install no hardware devices,” he said. “Initial installation and future upgrades are quickly and remotely integrated with station operating software and customer cameras without incurring on-site installation costs.” Calipsa’s false alarm reduction software is easily scalable, making it ideal for any growing monitoring station and customer business. A platform dashboard enables station managers to monitor the software’s performance, including detecting idle cameras that may need replacement or repositioning.
One of the largest public train operators in the United Kingdom, Southeastern Rail Network, now relies on a smart video security solution from Bosch Security Systems to secure twelve train depots, including five unmanned locations, against theft and intrusion. The fully digital video surveillance system presents a significant upgrade to the British train operating company, which provides train services between London, Kent and parts of East Sussex and transports 6, 40,000 passengers each weekday on its 392 trains. built-in Intelligent Video Analytics Powered by cameras featuring built-in Intelligent Video Analytics, the solution was installed and configured to the specific requirements at the train depots by Bosch integration partner, Taylor Technology Systems Ltd., over the course of six months. Video security system relies on machine learning algorithms to automatically sound alarms on security threats Fully operational at all twelve locations, the video security system relies on machine learning algorithms to automatically sound alarms on security threats, such as intruders and perimeter breaches. Beyond security applications, the system also tracks important metadata on the arrival times of trains, while also monitoring deliveries at the train depots, among other AI-assisted functions that it carries out. IP-based cameras with Starlight technology The cameras portfolio installed across the twelve depots replaces an analog legacy solution with IP-based security cameras from the Flexidome, Dinion, and Autodome product lines of Bosch Security Systems. These smart cameras include Bosch’s Intelligent Video Analytics capabilities as a built-in feature, ensuring that the most relevant video data can be precisely applied to the requirements of the train depots. Because night-time security and surveillance is critical, especially at the five unmanned train depots on the network, the Bosch cameras rely on Starlight technology to provide full intelligent analytics at night and in low light levels. The Starlight technology supports color filtering down to a light level of only 0.0077 lux, so as to deliver detailed monochrome images where other cameras show no image at all, and guard against intruders and unauthorized entry around the clock. Featuring digital ‘trip wire’ to counter false alarms Highly resilient against false alarms, the smart cameras can detect movement at the perimeters of the train depots using a digital ‘trip wire’. In case of a security breach, the system alerts Southeastern Rail Network’s watch personnel, who can view live camera footage, as well as recordings of incidents for heightened situational awareness and total perimeter security. Instead of relying on the pre-configured capabilities, such as vehicle tracking and more, security personnel can also use the built-in camera trainer function to ‘teach’ new functionality, such as detecting certain types of objects or situations. Remote video recordings storage with Divar recorders Recordings from the depots are safely stored and managed remotely with Divar recorders in encrypted format As an integral part of this end-to-end Bosch security solution, recordings from the depots are safely stored and managed remotely, using Divar all-in-one recorders in encrypted format. When looking at the bigger picture, the video security solution adopted by Southeastern Rail Network is part of an industry-wide evolution from cameras as mere video capturing devices to smart sensors capable of collecting rich metadata. Insights beyond security This metadata unlocks unique insights beyond security, including video analytics at the train depots that support applications such as monitoring deliveries to onsite buildings, providing access to personnel and logging the arrival and departure times of incoming trains. The system thereby not only ensures that all train depots remain fully guarded and protected 24/7 against criminal access, but also provides a data-based foundation to keep efficiency gains and cost savings on track in the long run.
Round table discussion
The emergence of smart cities provides real-world evidence of the vast capabilities of the Internet of Things (IoT). Urban areas today can deploy a variety of IoT sensors to collect data that is then analyzed to provide insights to drive better decision-making and ultimately to make modern cities more livable. Safety and security are an important aspect of smart cities, and the capabilities that drive smarter cities also enable technologies that make them safer. We asked this week’s Expert Panel Roundtable: What are the physical security challenges of smart cities?
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Network monitoring: Manufacturers & Suppliers
- Dahua Technology Network monitoring
- Axis Communications Network monitoring
- Vicon Network monitoring
- AMAG Network monitoring
- Video Storage Solutions Network monitoring
- Sony Network monitoring
- Hikvision Network monitoring
- IDIS Network monitoring
- BCDVideo Network monitoring
- Messoa Network monitoring
- ExacqVision Network monitoring
- LILIN Network monitoring
- Surveon Network monitoring
- Vanderbilt Network monitoring
- Bosch Network monitoring
- eneo Network monitoring
- VIVOTEK Network monitoring
- TruVision Network monitoring
- Luxriot Network monitoring
- March Networks Network monitoring
10 Step Guide to Staying Ahead of Emerging Security ThreatsDownload
2021 Trends in Video SurveillanceDownload
Exploring New Vertical Markets for Professional Security SystemsDownload
Capture New Opportunities With Computer Vision And Video AnalyticsDownload