BCD International has announced the hiring of Kelly Carlberg to the newly created position of Strategic Alliances Manager - Dell Technologies. Carlberg brings with him, more than 20 years of surveillance and IoT expertise, and specializes in developing relationships and accelerating the use of appropriate indirect channels. Cloud computing expert Carlberg’s industry expertise includes cloud computing, virtualization, information security, identity and access management, policy management...
Paxton has released an online video tutorial which explains how thermal scanning can help buildings installed with Net2 become more COVID-secure. They have also updated the systems software and have six new thermal scan integrations available to boost installer and end-user flexibility. Developing solutions Paxton has been developing solutions throughout 2020, which help reduce the spread of the virus in sites installed with their access control system Net2. While researching relevant updates...
Claroty, the pioneer in operational technology (OT) security, announces new enhancements to the Claroty platform, making it the industry’s first OT security solution to offer remote incident management as a fully integrated capability that spans the entire incident lifecycle. The platform now enables cybersecurity teams to detect, investigate, and respond to security incidents on OT networks across the broadest attack surface area securely and seamlessly from any location. Standard opera...
Dahua Technology, a globally renowned video-centric smart IoT solutions and service provider, has sponsored one white paper and two webinars hosted by Omdia. The theme of the webinars held on October 22nd is ‘Solving security challenges: Next-generation network cameras’. Dahua and Omdia joint webinar Omdia is the new global technology research powerhouse, established in 2019 with the combination of the Informa Tech’s research brands (Ovum, Heavy Reading, and Tractica) and the...
Blind spots in surveillance coverage, incompatible video and access control systems, lack of adequate perimeter measures are some of the common issues that facility directors must address with their security teams. At the end of the day, facility executives need technology that accomplish more with less and that expand situational awareness, overall system functionality, and real-time response capabilities, while generating cost savings. By leveraging technology like thermal imaging, this is pos...
DMP releases its new line of alarm communication radios that are FirstNet Ready™ and approved for use on FirstNet®. FirstNet is built with AT&T in a public-private partnership with the First Responder Network Authority and is the only nationwide, high-speed broadband communications platform dedicated to and purpose-built specifically for America’s first responders and the extended public safety community. It’s the solution to decades-long interoperability and communica...
‘Making things easier’ – Under this maxim, the Panomera multifocal sensor systems by video technology manufacturer, Dallmeier have guaranteed maximum image and analysis data quality with minimum camera units for ten years now. The latest generation of the Panomera S-Series features a completely new design and offers numerous innovations, from the one-man mounting concept to contactless front glass cleaning, and above all, superior video analysis capabilities. Panomera multifocal sensor systems Panomera multifocal sensor systems combine a total overview with multiple detailed zooms in high resolution The Panomera multifocal sensor systems differ from other cameras in that they combine a total overview with an unlimited number of detailed zooms in high resolution. The detail zooms can simply be opened in the overall image with a click of the mouse, like ‘virtual’ PTZ cameras, not only live but also in the recording. This is made possible by the patented use of up to eight sensors with different focal lengths in a single system. In this way, a much greater expanse can be captured with each camera. In the words of the manufacturer, Dallmeier, this results not only in significantly improved operability and overview, but also saves up to 50% or more in operating and infrastructure costs, depending on the application area. Besides the advantages in image capture and operation, the latest Panomera generation is set apart by its superior analysis capabilities, as they combine a precisely plannable/definable image quality (and therewith data quality) with the most advanced analysis technology. Edge analysis with eight quad-core processors In traditional single sensor as well as multi-sensor camera technologies, image resolution and thus also analytical capability diminishes continuously in the direction of the image background. In contrast to this, the cameras of the Panomera S-Series capture a very large expanse or long distances with a minimum resolution over the entire area. Panomera is therefore, able to monitor and analyze complex context with the same high data quality, even over extremely large expanses. If an application requires, for example, a minimum resolution density of 62.5 pixels per meter, according to DIN EN 62676-4, over 50,000 square meters can be covered with just one camera system, which is more than sufficient for common object classifications. SoC generation analysis unit with integrated AI Even at the highest DIN resolution density of 250 pixels per meter, for the identification of unknown persons that can be used in court, one system still manages up to 3,100 square meters. For this purpose, each of the up to eight sensors in a Panomera is equipped with an analysis unit of the latest SoC generation with integrated Artificial Intelligence (AI), so that the analysis can be carried out directly in the camera (on the edge), from people counting through to ‘Appearance Search’. Users can operate the Panomera cameras either with the Dallmeier HEMISPHERE SeMSy Video Management System (VMS) or with any VMS systems that support ONVIF. Featuring ‘Quick-Lock’ rapid fastening system A special ‘Quick-Lock’ rapid fastening system allows the systems to be installed by a single technician Dallmeier engineers placed particular emphasis on functional design. Thus, for example, the ‘Mountera’ mounting concept offers enormous time savings and fewer errors during implementation. A special ‘Quick-Lock’ rapid fastening system allows the systems to be installed by a single technician. The different brackets for wall, ceiling or mast mounting are also completely compatible with each other; they can even be combined with the 180- and 360-degree systems of the Panomera W camera series. Foam packaging for ‘bubble protection’ The manufacturer has also made extensive improvements to the very tasks of unpacking and installations. A one-time handle which is already mounted on the camera in the package and the foam packaging that remains as ‘bubble protection’ reduce the amount of effort required for handling. The camera can be taken out of the packaging and can be transported and set down undamaged without further work steps. As the last, finishing touch, the size of all the Allen keys needed for installation and adjustment is the same, so only one key size is required. Convection cooling, ‘Air Blast’ and ‘Privacy Shield’ The new generation of Dallmeier Panomera cameras also fulfills the requirements relating to architecture and optical integration with a design language, which is applied consistently to all the various individual models. Besides the dynamic appearance, particular attention was also paid to innovative functions. These include a passive cooling system, which renders auxiliary cooling unnecessary for temperatures up to 60 degrees Celsius. A system called ‘Air Blast’, which uses compressed air to clean dust, water and insects off the lens without contact and therefore, without wear is also available as an option. Dallmeier’s ‘Privacy Shield’ is responsible for active and largely visible data protection. It is a remote-controlled blind mechanism with which police or private enterprises can temporarily disable the Panomera systems in a way that is clearly visible with a few clicks of the mouse, during rallies or strikes, for example. Enhanced data protection and security Dieter Dallmeier, Founder & CEO of Dallmeier electronic said, "For ten years, our Panomera customers have demonstrated that solutions with technology ‘Made in Germany’ deliver exceptional results with regard to attaining security objectives while remaining compliant with the most stringent data protection and data security requirements. At the same time, multifocal sensor technology is the intelligent answer to many unsolved problems because it brings precision and plannability to video technology." Dieter adds, "Because Panomera systems not only enhance operation and the attainment of security objectives in video observation and surveillance, most particularly they also provide superior quality data for the increasingly important function of video analysis. The fact that these solutions can then also be implemented for substantially lower overall cost than comparable technologies surprises many of our customers time and time again." Customer testimonials We have been using Dallmeier Panomera technology with great success since 2018" Thorsten Wünschmann, Director, Hanau Public Order Office said, "We have been using Dallmeier Panomera technology with great success since 2018. The major benefit we derive from the Panomera systems consists particularly in that the total overview of a scene is maintained at all times, while operators can zoom into various regions at high resolution even in the recording.” He adds, “This enables us to keep optimum control with minimum strain on the operators, and since only a small number of systems are needed, overall operating costs are low." David Lewis, Head of Security and Stadium Safety, Everton FC football club said, "In the course of our selection process, the Panomera cameras from Dallmeier were able to deliver images of the highest quality time and time again, both in normal daylight conditions and under weak floodlighting, and furthermore not only live also in the recordings with the highest possible resolution quality in all areas of the image.” David adds, “Moreover, with the Panomera cameras we can capture large expanses, such as the entire grandstand area for example, with just a few systems. Ultimately, these were the reasons which convinced us to award the contract for video security at Goodison Park to Dallmeier." Jürgen Vahlenkamp, Managing Director of VTS GmbH and principal contractor for the Panomera installation on the Kölner Seilbahn cable car stated, "We managed very well with the small number of available installation points for video observation with the Panomera. The remarkable lens and sensor concepts mean that we do not fall below the specified resolution even in the more distant image regions.” He adds, “The ideal prerequisite for observation over very long distances! Because of the high-resolution detail views, the operator has the situation under control at all times. He can maintain an uninterrupted overall view of the bearer cables and support pylons while simultaneously analyzing a detail recording of a certain region as necessary. We were able to organize the procedure as safely as possible while the cable car was operating, to the immense satisfaction of our customer."
Antaira Technologies is a developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the INJ-C200G-bt-T. Antaira Technologies’ INJ-C200G-bt-T is an industrial high-power IEEE 802.3bt Type 4 Power over Ethernet (PoE) injector which provides up to 97 watts of power. This compact PoE injector is backwards compatible with IEEE 802.3af/at standards and provides two gigabit Ethernet ports for data. Harsh industrial applications The INJ-C200G-bt-T is IP30 rated, DIN-rail and wall mountable, and supports an extended operating temperature range of -40°C to 75°C, making it ideal for outdoor or harsh industrial applications. This industrial switch series provides high EFT, surge (2,000VDC), and ESD (6,000VDC) protection to prevent any unregulated voltage and can support the power redundancy feature using a dual-power input design with reverse polarity protection. There is also a built-in relay warning function to alert maintenance when power failures occur.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announces that Security Center Omnicast™, its video management system (VMS), has received the UL 2900-2-3 Level 3 cybersecurity certification for the second year in a row. Genetec is currently the only VMS vendor in the world to have achieved this certification. The UL Cybersecurity Assurance Program (UL CAP) is a robust certification program that evaluates the security of network-connectable products and vendor processes. Physical security systems It features standardized, testable criteria from the UL 2900 series of cybersecurity standards for assessing software vulnerabilities and weaknesses in embedded products and systems. The UL 2900-2-3 Standard for Security and Life Safety Signaling Systems was created with three possible levels of certification, ranking with an increasing level of security for each tier, to specifically test physical security systems for cybersecurity robustness. Level 3, for which the Security Center Omnicast™ VMS is certified, is the most advanced. It includes a series of checks including fuzz testing, code and binary analysis, vulnerability assessment, penetration testing, and risk management methodology validation. Cybersecurity certification program “As a global safety science leader, UL is dedicated to promoting safe environments. As part of that mission, the UL Cybersecurity Assurance Program is a robust cybersecurity certification program for network-connectable products, which has to be renewed every year,” said Chris Hasbrook, UL’s vice president and general manager, Building and Life Safety Technologies division. “As a vocal proponent of cybersecurity best practices for many years, we have always given fastidious attention to our own processes and operations. Being awarded this UL 2900-2-3 Level 3 Certification for the second year is another testament to our continuous commitment to cybersecurity,” said Christian Morin, CSO at Genetec Inc.
Acronis, a global provider of cyber protection, released Acronis Cyber Infrastructure 4.0, a significant update to the company’s software-defined infrastructure solution. Featuring more than 350 new capabilities and enhancements, the update helps Acronis partners and end users improve the performance and manageability of their infrastructure while strengthening the security and availability of their data. With 31% of companies reporting daily cyber attacks and half (50%) being targeted at least once a week, organizations can face costly downtime and direct financial losses. Yet too many IT teams and managed service providers (MSPs) still rely on a patchwork of legacy solutions, which is expensive, time-consuming, and complicated to maintain - and the lack of solution integration still leaves gaps in the defences. Software-defined data center Organizations require security, immediate availability, and reliable performance from their infrastructure" As a scale-out, cost-efficient, multi-purpose, and storage solution for cyber protection, Acronis Cyber Infrastructure is a fast and universal building-block for any software-defined data center or edge workload. It uses any industry-standard hardware and combines block, file, and object storage workloads with compute and software-defined network capabilities. “Given the speed of business today, organizations require security, immediate availability, and reliable performance from their infrastructure,” said Serguei “SB” Beloussov, Acronis Founder and Executive Officer. “In delivering on our vision of comprehensive cyber protection, integrating Acronis Cyber Infrastructure is a critical component for many of our customers and partners, which is why the enhancements we’ve made as part of this update are so vital.” Enhancements to storage networking Among the performance-enhancing changes, erasure coding improves writing performance and latency for hybrid and all flash tiers up to 50%. Similarly, enhancements to storage networking have increased the performance of multi-thread workloads - with random reads improving up to 40%. The new update also ensures the safety, accessibility, privacy, authenticity, and security (SAPAS) of an organization’s data, applications, and systems. Among the most notable features included in the update are: Improved manageability Flexible reconfiguration of cluster networking is available with an automated procedure that allows changes to the configuration of network roles or IP addresses in the cluster. Customize S3 geo-replication on the user/bucket level. Improved monitoring for S3 and NFS services. Set storage limits for IOPS and bandwidth for protected workloads and secure stable storage performance. Heightened availability Increase data availability by spreading storage data among new failure domains: room, row, and rack. A failure domain defines a scope within which services might go down together. Enhanced security Management of access to S3 geo-replication is available for buckets with access control lists. Users can enable the access log via Amazon S3 API and get detailed information about the objects in their buckets. Cyber protection strategy In addition to running on industry-standard hardware, it also comes pre-installed on Acronis Cyber Appliance Acronis Cyber Infrastructure is used in Acronis data centers around the world, which support millions of workloads and more than 5,000PB from 500,000 businesses. It is proven technology that enables them to build their cyber protection strategy with confidence. For the full changelog, including all enhancements in Acronis Cyber Infrastructure 4.0, one can refer to the release notes available on the company’s website. In addition to running on industry-standard hardware, it also comes pre-installed on Acronis Cyber Appliance. The full integration of hardware and software delivers a plug-and-play compatibility that ensures fast, hassle-free deployments in any location, and provides seamless support for other cyber protection solutions like Acronis Cyber Protect and Acronis Cyber Cloud. Physical network infrastructure In addition to the version 4.0 enhancement, Acronis Cyber Appliance also delivers new capabilities, including the ability to be added to an existing cluster that’s deployed on another appliance or other hardware. Users can also view any available network interface and connectivity options during the installation, making it a better fit for the physical network infrastructure of an existing data center.
The National Security Inspectorate (NSI) has announced the launch of a new eLearning course to help NSI approved companies understand and apply the requirements of the revised Code of Practice BS 7858:2019 'Screening of Individuals Working in a Secure Environment'. NSI eLearning screening course This introductory eLearning course is available to all who wish to enroll, but is particularly useful for screening administrators and controllers. Accredited by the National Security Institute’s CPD Scheme, the course includes guidance on information and documentation requirements, relevant legislation and regulatory requirements, the difference between personal opinion and fact, and the implications of non-compliance. Upon completion of the course, learners will understand the reasons for screening and will be able to assist in developing an effective screening process. The eLearning course will also help them understand how to apply the requirements in practice. Each learner will receive a personalized certificate of completion. Split into four parts, the eLearning course will take approximately two hours to complete, and learners may log in and out as many times as they wish, saving their progress each time. Understanding requirements of BS 7858:2019 We are very pleased to be able to offer this new eLearning course to our approved companies" Max Linnemann, Head of Certification Services at the National Security Inspectorate said, “We are very pleased to be able to offer this new eLearning course to our approved companies. We are committed to helping our companies keep on top of standards developments and widening their access to training.” Max adds, “Our new eLearning screening course provides a cost-effective and convenient way of understanding the latest requirements of BS 7858:2019, which NSI approved companies in the security systems and guarding services sectors need to be aware of.” Those who would like to find out more information about the course, pricing and how to enroll for the course will be required to contact Maxine Dent, Training, Facilities and Events Coordinator, at the National Security Inspectorate, via email.
Security video wall technology experts Ultimate Visual Solutions (UVS) have signed a distribution agreement with Zodiac Investment Corp in Vietnam, who will be its exclusive partner in the region. Zodiac was founded in 1991 and is recognized as the country’s high-tech products distributor and audio visual solutions provider, with bases in Hanoi and Ho Chi Minh City. It has completed installations in various fields, including education, government and the military. Data center video wall project The deal follows an initial collaboration between the two companies on several projects, including a demonstration and evaluation system for Zodiac’s demo facilities and a UVS Lucidity video wall controller for a data center video wall project in Hanoi. Steve Murphy, Managing Director of UVS, which has bases in Burnley and London, said: “Vietnam is a rapidly-growing market for us and we are delighted to be working exclusively with Zodiac, who will supply our products to their system integration clients throughout the country.” “Zodiac is dedicated to developing innovative technologies and efficient processes that create new markets and enrich people's lives and is the country’s leading audio visual solution provider.” Exclusive partner of UVS in Vietnam We are excited to be working with UVS and I truly believe that our clients will benefit from this partnership" Deputy General Director Tat Dat Nguyen from Zodiac said: ”We are excited to be working with UVS and I truly believe that our clients will benefit from this partnership. UVS have developed an outstanding reputation for their reliable products and total service and support. As exclusive partner of UVS in the region, we are aware of our responsibility and will try our best to make sure that this partnership will be fruitful.” UVS, which has its headquarters at the Business First Burnley Business Centre, provides video wall displays and audio visual solutions to a range of clients across the UK and the rest of the world. Suite of remote services It has recently launched a suite of remote services, including: Remote diagnostics and remote maintenance for UVS video wall technology which can offer quick analysis and resolution for most issues UVS engineers using remote connection software, which is fully encrypted and which the client has control over, to carry out maintenance For sites where the video wall controller does not normally have an internet connection, UVS is offering to supply a 4G data dongle as part of the contract (managed and paid for by UVS) to allow clients to get internet access as required Assisting clients with reduced cost annual maintenance contracts A live online demonstration facility to provide full video wall technology evaluations for partners and their clients who are in lockdown or self-isolation
Since lockdown came into effect, organizations globally have undergone years' worth of transformations in a matter of months. Whether it’s been to transition their operations online or moving their IT infrastructure to the cloud, there’s no denying that the face of business has changed permanently, experiencing a seismic shift, both operationally and culturally. As we enter the “next normal” there remains a great deal of uncertainty around what the next twelve months holds and how organizations can navigate turbulence in the face of a possible recession. One of the most notable and widely reported trends has been the switch to remote methods of work, or home working. And even with news of some businesses returning to their places of work and office spaces opening at reduced capacity, it’s widely speculated that for some, the home office environment is here to stay. Lower operational costs, greater flexibility and productivity driven For the vast majority, however, working from home is an entirely new process. In fact, a recent survey from IBM revealed that more than 80% of respondents either rarely worked from home or not at all prior to the pandemic. And in turn, more than half are now doing so with their personal laptops and devices. While the benefits of a more remote workforce are well documented – lower operational costs, greater flexibility and productivity driven by being able to access shared workspaces and applications from anywhere, at any time, and on any device – it does represent a sizeable concern in terms of security and data protection. An evolving threat landscape In the IBM survey, it was also revealed that organizations had not implemented any new security policies to help guide their staff when it comes to handling sensitive customer data and password management. And with so many employees logging on from residential networks, through personal devices that may be more easily compromised, the overall attack surface has greatly increased, raising the risk of potential corporate and sensitive data leakage in their new home office settings. The challenge is that bad actors love this new reality, as employees are far more likely to fall victim to a cyberattack when working outside of the office’s firewall. A survey released by INTERPOL, showed that cybercrime had grown at an “alarming pace” as a result of the COVID-19 pandemic, with a particularly large increase in phishing scams/fraud (59%), malware/ransomware (36%), malicious domains (22%), and fake news (14%). And this should be real cause for concern for organizations, because should one employee fall victim to a data breach through a scam or spear phishing attempt, for example, that company will be liable to pay potentially huge fines in line with national data regulatory standards. In April this year, the UK’s data protection watchdog, the Information Commissioner’s Office (ICO) and the EU, did both announce that they would temporarily soften their enforcement of the GDPR. However, this was not a cause for organizations to become complacent and neglect the data protection policies they had worked so hard to implement in their office environments. The momentary change actually means very little in terms of the critical importance of safeguarding private and sensitive data. Don’t slip into bad habits It’s essential that all organizations implement proper audit trails to track and account for any and all data It’s fair to expect that the move to a home office will inevitably make employees feel, well, more at home. And with that might come a relaxation in their approach to data management best practices and the adoption of a few bad habits. One thing to consider about a remote workforce, is it’s highly likely that everything will be saved to a desktop as temporary data or in permanent folders, particularly if access to central, cloud-based workspaces and platforms is impaired or restricted. The issue here is that this can impair an organization’s chain of custody over its organizational and customer data. It’s essential that all organizations implement proper audit trails to track and account for any and all data in their possession. With data stored locally on a device and off-premises, this data immediately becomes harder to audit and presents a significant risk to the organization. It’s crucial that both the organization and its employees understand how to actively clean up this type of environment. Managing documents through centralized cloud-based workspaces, is a much better way to continuously manage data stored. What this all comes down to is a need to account for the significant cultural shift all organizations are experiencing. While certain aspects of our day-to-day working life certainly won’t be business as usual, an area that can’t slip is data management and the safeguarding of private data. Ensuring that privacy is ingrained in all processes, new and existing, and maintaining the mantra that security should be every employee’s top priority is crucial. Give data privacy the time and respect it deserves, make it part of the company’s culture, and a compliant, secure workforce will follow. Basic hygiene and remote solutions = a healthy remote workforce So, what is the best way to ensure a remote workforce is following data management best practices and keeping home offices secure? Primarily it comes down to following many of the basic hygiene practices and guidelines that organizations should already be following. Don’t sit on sensitive data in your home office that is not needed and no longer holds any value to the business. Maintain a full audit trail of any and all data from point of collection, right through to end-of-life and erasure. And ultimately carry out the permanent and irreversible erasure of data when it becomes redundant, obsolete, or trivial (ROT), to reduce your risk – in fact, it’s completely possible to carry out certified data erasure of selected data remotely. Don’t sit on sensitive data in your home office that is not needed Equally, a lot of concerns about ensuring your workforce is following security protocols and maintaining regulatory compliance can be alleviated through tools and processes that you don’t even have to think about. Appropriate methods of data sanitisation can be achieved through automated solutions that can be pushed out by administrators to help continuously protect employees in the background, without the need for a significant shift or change from normal routines. Remote erasure practices also enable the sanitisation of devices that reach end-of-life, these can then be transported to the device processor without the threat of sensitive data being intercepted. In these uncertain times, organizations will undoubtedly be challenged in new ways, but it’s vital that they don’t fall victim to new data management challenges and risk facing wholly avoidable fines from data breaches. Security and achieving compliance have always been about the journey, not the destination, and this is yet another step in that journey. It won’t happen overnight, and it must be a company-wide effort. Employee education is essential, and privacy should be built into every part of the organization across departments, not just across IT or legal departments.
Latest insights from the Economist Intelligence Unit’s Global Barometer show that 41% of execs think 5G is now less important than it was before the pandemic. There are numerous reasons why this could be the case, one being that 4G and home broadband has been proven to be up to the job of supporting home working. There’s also no escaping the headlines that surround 5G and political espionage. They read like a script from House of Cards. Presidents, prime ministers, heads of foreign intelligence services and global corporate leaders, providing the colorful characters that are essential in any good political drama. It could well have made some organizations rethink their plans for adopting 5G enabled technologies and wait until there can be more assurances on security. New technologies The latest edict by the UK government is a pretty clear statement. It has promoted many industry insiders to say that it will take years to exchange kit, possibly even a decade for some operators, as they take on the heavy lifting of removing core network components and finding alternative suppliers. The financial impact is huge: operators will have to find additional budget to purchase the kit, conduct validation and integration testing, overhaul their service wrap around offers and factor in the time and cost of retraining employees on new technology. Achieve new ambitions related to driverless cars Despite all this, many carriers have made very public statements that they will progress with 5G as planned, some are even accelerating plans. The insight available to them confirms that there is still a good proportion of businesses and pubic bodies that see its value. It’s a way to propel smart city development and connectivity, and to achieve new ambitions related to driverless cars, and highly automated manufacturing for example. 5G therefore remains a rolling stone and regardless of the core network kit, security needs to be designed in, not bolted on, at every step of network and application design and build. New rules for working The pandemic has shaken up how we live and work. It has brought home the necessity for ultra-fast, affordable and agile communications everywhere. It’s also proved a fertile hunting ground for scammers keen to exploit the public’s thirst for up to the minute news. Click bait has been rife and it still forms one of the most effective ways to distribute malware and ransomware. Unprotected VPNs have added to the risks, as companies scrambled to roll out remote access at mass scale. It overburdened their security infrastructure and created vulnerabilities all in the name of getting home working ramped up quickly. Some companies have learnt the hard way that maintaining patches on software and keeping on top of the security education their employees receive is vital to protect operations from attack. Rural vs urban working The move to home working has also brought to light discrepancies in speed and access to communications, reigniting the rural versus city investment debate. We’ve seen some companies say that employees can now work anywhere, and others downsize their office footprints. This is opening the door for people to swap city living and commutes for more rural locations. 5G roll out plans typically focus on large cities and towns, but is this still the right strategy? I’d suggest that operators need to step back and look at the larger global trends and update their plans. Connected cows and beyond For example, farming and the environment has to be a planning priority now. To meet the needs of a predicted 9 billion people in 2050, farming supply will need to increase by 50%. COVID-19 has brought into sharp focus how precarious the global food supply chain is. In addition, this increase needs to be met with technology to make agriculture more efficient in order to preserve the world’s natural resources while meeting these goals. COVID-19 has brought into sharp focus how precarious the global food supply chain is The vision of the ‘connected cows’ is mooted as a way to solve global food security. As such, farming and the environment are set to gain greatly from technologies and applications enabled by 5G Internet of Things (IoT). But the benefits will only be realised if the connectivity and security is in place. The vast network of IoT sensors that will be used to improve farming inefficiencies, increase welfare standards and reporting, as well as efficiently manage food manufacturing will generate an abundance of data. Highly sensitive data This data will range from highly sensitive sets related to pricing and employees, critical data related to yield management and compliance, to more transactional weather and water sensor data. Ensuring continuity will be essential to not just farming productivity and meeting standards, but also protecting IP or personal information throughout the supply chain and preventing a cyberwar intended to starve people. Corporate espionage is a very real threat to manufacturing at the moment, and as farming becomes more connected, it’s expected this threat will extend as far as the farmyard. Not only that, protests against government handling of policies related to food poverty or overproduction could be done using ‘hacktivism’. It’s easy to buy a hack these days and start an online attack to make your point. So, as farming adopts technology models we usually see in the corporate world of pharma and finance, it too may become a target. Healthcare goes truly national The much talked of vision for the virtual GP accelerated in the pandemic, helping people see a GP without leaving the house. Governments have had a very real glimpse into the importance of connected healthcare in terms of saving money and time. There is now a greater likelihood that nursing teams will be given mobile devices that can access and update patient records in real-time, GPs will scale down consultation space in favour of online appointments, and prescriptions will be automatically filled and delivered at the click of a button. Comprehensive 5G networks can help make more of this happen particularly in remote areas where health care is scarce, of that there is no doubt, and this is before we get into the exciting prospect of remote brain surgery that 5G can facilitate. The pandemic also exposed the precarious nature of online healthcare But the pandemic also exposed the precarious nature of online healthcare. Patient data remains a sitting duck, as illustrated perfectly by breaches we saw across the world both in public and private delivery. At its very worst, nation state attacks pose a significant threat to public health and it’s essential there is local and global collaboration to ensure data is protected. This threat won’t wane. In fact, it is increasing as we drive more innovation and connectivity. Security experts have their work cut out. But it’s not impossible to achieve secure networks and applications, so long as we don’t put profit before people.
Imagine a home surveillance camera monitoring an elderly parent and anticipating potential concerns while respecting their privacy. Imagine another camera predicting a home burglary based on suspicious behaviors, allowing time to notify the homeowner who can in turn notify the police before the event occurs—or an entire network of cameras working together to keep an eye on neighborhood safety. Artificial Intelligence vision chips A new gen of AI vision chips are pushing advanced capabilities such as behavior analysis and higher-level security There's a new generation of artificial intelligence (AI) vision chips that are pushing advanced capabilities such as behavior analysis and higher-level security to the edge (directly on devices) for a customizable user experience—one that rivals the abilities of the consumer electronics devices we use every day. Once considered nothing more than “the eyes” of a security system, home monitoring cameras of 2020 will leverage AI-vision processors for high-performance computer vision at low power consumption and affordable cost—at the edge—for greater privacy and ease of use as well as to enable behavior analysis for predictive and preemptive monitoring. Advanced home monitoring cameras With this shift, camera makers and home monitoring service providers alike will be able to develop new edge-based use cases for home monitoring and enable consumers to customize devices to meet their individual needs. The result will be increased user engagement with home monitoring devices—mirroring that of cellphones and smart watches and creating an overlap between the home monitoring and consumer electronics markets. A quick step back reminds us that accomplishing these goals would have been cost prohibitive just a couple of years ago. Face recognition, behavior analysis, intelligent analytics, and decision-making at this level were extremely expensive to perform in the cloud. Additionally, the lag time associated with sending data to faraway servers for decoding and then processing made it impossible to achieve real-time results. Cloud-based home security devices The constraints of cloud processing certainly have not held the industry back, however. Home monitoring, a market just seven years young, has become a ubiquitous category of home security and home monitoring devices. Consumers can choose to install a single camera or doorbell that sends alerts to their phone, a family of devices and a monthly manufacturer’s plan, or a high-end professional monitoring solution. While the majority of these devices do indeed rely on the cloud for processing, camera makers have been pushing for edge-based processing since around 2016. For them, the benefit has always been clear: the opportunity to perform intelligent analytics processing in real-time on the device. But until now, the balance between computer vision performance and power consumption was lacking and camera companies weren’t able to make the leap. So instead, they have focused on improving designs and the cloud-centric model has prevailed. Hybrid security systems Even with improvements, false alerts result in unnecessary notifications and video recording Even with improvements, false alerts (like tree branches swaying in the wind or cats walking past a front door) result in unnecessary notifications and video recording— cameras remain active which, in the case of battery powered cameras, means using up valuable battery life. Hybrid models do exist. Typically, they provide rudimentary motion detection on the camera itself and then send video to the cloud for decoding and analysis to suppress false alerts. Hybrids provide higher-level results for things like people and cars, but their approach comes at a cost for both the consumer and the manufacturer. Advanced cloud analytics Advanced cloud analytics are more expensive than newly possible edge-based alternatives, and consumers have to pay for subscriptions. In addition, because of processing delays and other issues, things like rain or lighting changes (or even bugs on the camera) can still trigger unnecessary alerts. And the more alerts a user receives, the more they tend to ignore them—there are simply too many. In fact, it is estimated that users only pay attention to 5% of their notifications. This means that when a package is stolen or a car is burglarized, users often miss the real-time notification—only to find out about the incident after the fact. All of this will soon change with AI-based behavior analysis, predictive security, and real-time meaningful alerts. Predictive monitoring while safeguarding user privacy These days, consumers are putting more emphasis on privacy and have legitimate concerns about being recorded while in their homes. Soon, with AI advancements at the chip level, families will be able to select user apps that provide monitoring without the need to stream video to a company server, or they’ll have access to apps that record activity but obscure faces. Devices will have the ability to only send alerts according to specific criteria. If, for example, an elderly parent being monitored seems particularly unsteady one day or seems especially inactive, an application could alert the responsible family member and suggest that they check in. By analyzing the elderly parent’s behavior, the application could also predict a potential fall and trigger an audio alert for the person and also the family. AI-based behavior analysis Ability to analyze massive amounts of data locally and identify trends is a key advantage of AI at the edge The ability to analyze massive amounts of data locally and identify trends or perform searches is a key advantage of AI at the edge, for both individuals and neighborhoods. For example, an individual might be curious as to what animal is wreaking havoc in their backyard every night. In this case, they could download a “small animal detector” app to their camera which would trigger an alert when a critter enters their yard. The animal could be scared off via an alarm and—armed with video proof—animal control would have useful data for setting a trap. Edge cameras A newly emerging category of “neighborhood watch” applications is already connecting neighbors for significantly improved monitoring and safety. As edge cameras become more commonplace, this category will become increasingly effective. The idea is that if, for example, one neighbor captures a package thief, and then the entire network of neighbors will receive a notification and a synopsis video showing the theft. Or if, say, there is a rash of car break-ins and one neighbor captures video of a red sedan casing their home around the time of a recent incident, an AI vision-based camera could be queried for helpful information: Residential monitoring and security The camera could be asked for a summary of the dates and times that it has recorded that particular red car. A case could be made if incident times match those of the vehicle’s recent appearances in the neighborhood. Even better, if that particular red car was to reappear and seems (by AI behavior analysis) to be suspicious, alerts could be sent proactively to networked residents and police could be notified immediately. Home monitoring in 2020 will bring positive change for users when it comes to monitoring and security, but it will also bring some fun. Consumers will, for example, be able to download apps that do things like monitor pet activity. They might query their device for a summary of their pet’s “unusual activity” and then use those clips to create cute, shareable videos. Who doesn’t love a video of a dog dragging a toilet paper roll around the house? AI at the Edge for home access control Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring Home access control via biometrics is one of many new edge-based use cases that will bring convenience to home monitoring, and it’s an application that is expected to take off soon. With smart biometrics, cameras will be able to recognize residents and then unlock their smart front door locks automatically if desired, eliminating the need for keys. And if, for example, an unauthorized person tries to trick the system by presenting a photograph of a registered family member’s face, the camera could use “3D liveness detection” to spot the fake and deny access. With these and other advances, professional monitoring service providers will have the opportunity to bring a new generation of access control panels to market. Leveraging computer vision and deep neural networks Ultimately, what camera makers strive for is customer engagement and customer loyalty. These new use cases—thanks to AI at the edge—will make home monitoring devices more useful and more engaging to consumers. Leveraging computer vision and deep neural networks, new cameras will be able to filter out and block false alerts, predict incidents, and send real-time notifications only when there is something that the consumer is truly interested in seeing. AI and computer vision at the edge will enable a new generation of cameras that provide not only a higher level of security but that will fundamentally change the way consumers rely on and interact with their home monitoring devices.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centers on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximizing benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximizing the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
There is a growing trend towards more outsourcing of the monitoring function among security companies. Technology developments are accelerating and increasing the need for monitoring companies to invest. The barriers to entry are higher than ever. These are some of the trends covered in a discussion at Securing New Ground 2019 titled ‘Monitoring: New Models and New Monetization Strategies’. A panel of monitoring company executives addressed topics centered on how the industry is changing and evolving. New entrants in the monitoring space New entrants in the monitoring space face barriers to entry, in particular the need for more investment"“New entrants in the monitoring space face barriers to entry, in particular the need for more investment in infrastructure and expertize,” said Spencer Moore, Vice President of Sales and Marketing, Rapid Response Monitoring. ”Because of the expense of new technologies, more full-service monitoring companies are outsourcing the monitoring function to existing wholesale monitoring companies.” “The cost of entry has gone up, and companies are trying to preserve capital,” agreed Jim McMullen, President/COO at COPS Monitoring. “Larger companies are realizing wholesale monitoring does a better job from a customer service viewpoint. We are more focused on monitoring and the quality of service. It takes a lot of money to keep up with the cyber world,” added McMullen. Wholesale monitoring companies Wholesale monitoring companies are finding that they need petabytes of storage space, among other expensive requirements. “The trend is toward technology evolving quicker, and that often requires investment and training in a monitoring center,” said Daniel Oppenheim, CEO of Affiliated Monitoring. “Because trying out new technology is so important, wholesale monitoring centers often find that they serve as a ‘laboratory’ to experiment with newer technologies. Limited trials often expand later to broader outsourcing of a company’s monitoring services”, said Oppenheim. Automated Secure Alarm Protocol “What people miss out on is that monitoring is quite complex, and there are specialized services and skillsets, and barriers to entry from a regulatory perspective,” said Moore. Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service Adding value to the monitoring function is The Monitoring Association’s ASAP-to-PSAP service. The national service saves time, improves accuracy and increases efficiency in communications between monitoring centers and public safety answering points (PSAPs). The service uses the Automated Secure Alarm Protocol (ASAP). Public Safety Answering Points Up to 60 PSAPS have joined the program, although the low number is misleading, given that a single PSAP could represent the ‘City of Houston’. (There are an estimated 6,000 total PSAPs nationwide). It has taken six to eight years to develop the program from its genesis to where it is today, when more participation is finally creating a critical mass. Technology is fundamentally changing monitoring companies. “We used to be a services company powered by a little bit of technology, but we’re now moving toward a technology services company,” said Moore. Critical ‘filtering service’ Monitoring provides a critical ‘filtering service’ between public requests for emergency service and those tasked with providing the services. In effect, monitoring centers work with manufacturers to make them more resilient to false alarms. Monitoring companies also provide a human touch in a time of need, and emotional empathy. Today, emergency information is being transmitted to PSAPs electronically, which saves time and money. The current low-taxation environment means there are fewer resources for municipal governments, so cost savings make a difference. Monitoring, a specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset Increasingly, monitoring is becoming a business that requires a more specialized skillset. Regulation, and the need for increasing investment, is driving consolidation. “With a decreasing number of monitoring companies, there are fewer customers for software developers and other tools. Less outside innovation makes it more likely monitoring centers will have to ‘go it alone’ and develop software and other tools internally,” said Oppenheim. Importance of monitoring systems “In effect, consolidation will serve to limit technology choices, and to increase the need to in-source a lot of expertize”, agrees Moore. Tying monitoring systems into other software systems is another continuing challenge. “People want our system tied into their system,” said McMullen. “I have two people who focus full time to tie our systems into other systems. There will be more computers talking to computers.”
Qumulex is a new startup with a mission to provide physical security integrators a transition path to embrace the technology of the cloud and a subscription-based business model. Qumulex’s products seek to provide capabilities to embrace the cloud without an integrator having to turn their back completely on the ‘transactional revenue’ of installing new systems. As the transition happens, Qumulex offers a product line that supports any mix of systems from on-premises to the cloud. The flexible deployment model – enabling a cloud installation, an on-premise installation or any combination – is one of the ways Qumulex seeks to differentiate itself in the market. Installing fully on-Premise system The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected The system is designed so that an integrator can install a fully on-premise system and then later ‘flip a switch’ and transition to a cloud model, says Tom Buckley, VP Sales and Marketing. The Qumulex initial 1.0 system launch is currently entering its final beta test. Full commercial availability is expected in the first quarter of 2020, which the company will highlight in a bigger 20x20 booth at ISC West next year. The Qumulex cloud-based platform uses a gateway device located on-premises to which local cameras are connected. Ensuring cybersecurity, the gateway provides a ‘firewall’ of sorts to avoid any cybersecurity threat from entering an enterprise through a vulnerable IP camera. The system is designed to be ‘cloud-agnostic’ and to work with any public or private cloud, using Docker software and ‘containers,’ a standard unit of software that packages code and all its dependencies so an application runs quickly and reliably from one computing environment to another. At launch, the Qumulex system will use the Google cloud. Greater situational awareness The open platform approach will enable users to assemble best-of-breed solutions Another point of differentiation for the new platform is a unified access control and video surveillance environment – both are part of the same program. Access control can drive video events and vice versa for greater situational awareness. A unified system avoids having to integrate separate systems. A big emphasis for Qumulex is ease of use. They have designed the user interface to be as simple and intuitive as possible, using consumer-oriented systems such as Nest and the Ring Doorbell as a model of simplicity. Finally, the open platform approach will enable users to assemble best-of-breed solutions. Keeping it simple, the system offers native integration with only the major camera manufacturers that represent most of the market: Axis, Hanwha, Arecont, Panasonic, Vivotek and Sony. Longer-Term storage Other cameras can be included using the ONVIF interface. On the access control side, the system will initially be compatible with Axis door controllers, Allegion wireless door locks and ASSA ABLOY Aperio wireless door locks. Future versions of the software will seek to integrate HID Edge and Vertx and eventually Mercury panels. The gateway device may incorporate only a solid-state drive (SSD) for buffering Qumulex is taking a ‘mobile-first’ approach. The software is designed as a ‘progressive web app,’ which means is it is adaptable to – and fully functioning in – any smart phone, mobile device, laptop, or on a desktop computer with multiple monitors. The gateway device may incorporate only a solid-state drive (SSD) for buffering, or as many hard drives as the customer wants for storage. Short-term storage is available in the cloud, but local hard drives may be used for longer-term storage which can get expensive given the monthly fees of cloud storage. Using third-Party server To manage the variety of scenarios, Qumulex will offer a line of gateways and recorders, or a customer can use a third-party server along with Qumulex, which is an open system. Qumulex will use a manufacturer’s representative sales model and has already signed up 11 rep firms covering the United States (the initial target of the launch). The company has been spreading the word among integrators, too, first at the ISC West show last spring, when 98 integrators saw demonstrations of the system at a suite in the Palazzo. Another 48 integrators saw the system at ESX in Indianapolis in June. At the recent GSX show in Chicago, Qumulex had a booth on the show floor, where they scanned 450 badges that yielded 176 unique integrators. Entering the physical security market Qumulex just closed a second round of funding, which does not include any ‘institutional’ money Buckley estimates there are around 10,000 total security integrators in the United States that sell products similar to theirs at their price point. They are working to build their database to reach out to those integrators. (Exacq had more than 4,500 dealer/integrators before it was sold to Tyco/Johnson Controls.) Qumulex is the third company to enter the physical security market by the same team that launched two other successful startups in the last 20 years: Exacq Technologies (sold to Tyco in 2013) and Integral Technologies (sold to Andover Controls in 2000). Both previous companies were built around a need to help the integrator community transition to newer technologies. Qumulex just closed a second round of funding, which does not include any ‘institutional’ money. The first round of investment involved only the founders, and the second round added some ‘angel’ investors to the mix. The funding allows more flexibility and control over the company’s timeline and the evolution of the product’s feature set, free of outside mandates, says Buckley.
A networked surveillance system has been installed at Petwood Hotel in Lincolnshire, the former home of members of 617 Squadron, more famously known as The Dambusters, during World War 2. The hotel, situated in the village of Woodhall Spa, was originally built in 1905, as a country house for a wealthy Baroness, and after serving as a military convalescence hospital during World War 1, was converted into a hotel in 1933. Located among magnificent lawns and landscaped gardens, the Grade II-listed hotel has 53 bedrooms, a Squadron Bar filled with World War II memorabilia, a restaurant and terrace bar, and function rooms. Dahua Smart PSS viewing platform The system at the Petwood Hotel comprises 12 HFW5431-ZE bullet cameras, four HDBW5431-ZE dome cameras, and 13 HDBW2421R-ZS mini dome cameras. Images are recorded and processed on to a central server, while viewing is managed by a Dahua Smart PSS viewing platform. Some 29 Dahua bullet, dome and mini-dome network cameras have been installed by Videcom Security around the hotel. Externally, cameras monitor the car parks, where previously there were incidents of damage to vehicles. With the new system, however, the source of any damage can be quickly located, so helping with guests’ insurance claims. Other cameras are positioned so that the hotel’s management has coverage of the entire perimeter. Perimeter protection Inside, cameras are located in public areas such as reception, the bar area and function rooms Inside, cameras are located in public areas such as reception, the bar area and function rooms. They are designed to help resolve payment discrepancies and to deter any unwarranted behavior. Images from the cameras go back to a secure room in the hotel’s separate office block, while staff at reception is able to view live images. “The Dahua system delivers all the benefits we were looking for,” said George Kane, General Manager at the Petwood Hotel. It is reliable, easy to use, and provides excellent quality recorded images, which can be accessed quickly and easily. The cameras are discreet and sensitively installed in and around the listed building. Video surveillance system The technology is great and Videcom Security have handled the project well and sensitively, considering the building is more than 100 years’ old and the hotel remained open throughout the period of installation. “The new surveillance system has been brilliant. The high image quality will enable us to resolve any liability issues in the car parks, while the system reassures guests and staff about internal and external security,” said Danny Harsley, Northern Engineering Manager at Videcom Security. Danny adds, “The Dahua equipment was ideal for this project and, as we have found on many other projects, was easy to install and commission. It’s also a great system to use.”
As a multi-faceted community with several buildings, public safety services, healthcare facilities, schools, childcare, barracks, a commissary and a visitor’s center, a typical U.S. Military base is a city in itself. Beyond the protection of armed forces personnel, the base is responsible for the safety of many civilians and civil servants. With such high standards and complex needs, U.S Military bases recognize the need for intelligent security systems that enable proactive monitoring, provide fast and smart forensics and comply with NDAA Section 889. Challenges faced by the US Military Base Inadequate situational awareness - The size and diversity of the military base pose a challenge. Past security measures led to gaps in coverage, leaving the base vulnerable to both internal and external threats. In addition, the COVID-19 pandemic created the need for increased situational awareness. Without a real-time and dynamic understanding of the environment, it became increasingly difficult to enforce preventative measures to control and mitigate the risk of transmission. Slow incident response time - Speed is critical. Within the confines of the military base, the consequences of slow incident response time can be devastating and even sometimes deadly. The longer it takes for the Security Operation Center (SOC) to gather, understand, and analyze the details of the incident, the greater the threat becomes. It became clear that responding to an Active Shooter, vehicle breach, or an assault, required immediate action that wasn’t available through their existing technology. Limited real-time analytic capabilities - The base wanted to prevent incidents from occurring rather than reacting after an incident has occurred. The traditional method of receiving an emergency call and responding after the fact was too costly. The US Base needed a platform that would provide the security team with automation notifications and alerts based on anomalies and rule-violations that were captured on video. NDAA-889 compliance - All military bases must meet the NDAA-889 compliance which states that the U.S. Government has banned specific telecommunications and video surveillance equipment utilising chips manufactured in China. Government contractors must help agencies remove/ replace banned equipment by Aug 12, 2021. Why Ava? One U.S. Military Base recently turned to Ava for an end-to-end intelligent security solution that would meet its full range of needs. Their requirements were a platform that was: Proactive - When there is a need to respond to a threat, the response needed to be immediate. Precise - On a base of this size, it was critical to pinpoint the exact location and nature of a security event in seconds - not hours or days. Simple - The system needed be straightforward to implement, manage and use within the existing infrastructure and cameras. Ease of use saves time and lives. Scalable - The system needed to be able to scale to thousands of cameras. Protecting military personnel and staff at the base Using Ava, operators can add maps of all the US Military Bases’ locations to gain situational awareness and insights Ava understood that the ability to protect military personnel and civilians that run the US Military Base is of utmost importance with even seconds being critical. Ava’s wicked-fast and smart forensic searches and powerful analytics transform the manually intensive examination of massive surveillance footage into accurate and useful results within mere minutes. Security operators are using powerful appearance, event, or image search functions to narrow down and track people or objects of interest. Using Ava, security operators can add maps of all the US Military Bases’ locations to gain situational awareness and insights. Each map can be configured and includes camera views, alarm views, as well as the ability to track people and objects as they move around the campus. Only Ava could meet their challenges by providing: Advanced Situational Awareness: Powered by Ava’s Smart Presence, the company’s use of AI and machine learning allows security personnel and operators to detect anything unusual at any time. Ava Aware VMS understands perimeters and behaviours, identifies, classifies, and tracks people of interest, vehicles, or other objects to send alerts before threats escalate. Operators now receive immediate alerts on unidentified loud noises including the exact source of the sound through microphones. The US Military Base’s security teams are now able to stop threatening actions, before there is damage to property or people. Rapid Incident Response: Powered by Ava’s Spotlight, video streams change dynamically to bring only the relevant feeds to the attention of the operator. Real-time alerts and notifications show up on the video wall to describe the incident, the time, and place it occurred. Using Ava’s Smart Search, the base is able to search by event and similarity to perform appearance and image detection powered by machine learning capabilities to comb through countless hours of video within seconds. Real-time Analytics: Ava provided the US Military Base with threat detection and notifications in real-time and uses intelligent algorithms and self-learning to detect abnormal behavior. The platform will alert the base’s security operators in real-time. It will intelligently highlight what’s relevant from all of the US Base’s cameras, in real-time, all the time. NDAA Compliant - Ava’s video hardware is TAA (Trade Agreement Act) Compliant, enabling any base to be fully NDAA 889 compliant. Ava’s solution provided operational efficiencies, such as: Seamless integration with existing cameras - Whether a military base is replacing all or some of their cameras, Ava Aware VMS easily integrates into and enhances existing cameras with the same AI capabilities. Now, existing ONVIF cameras are enhanced with analytics such as object detection, people and vehicle count, similarity based searching and more. By linking all existing cameras into a larger, AI-based video analytic platform, the base can leverage these powerful analytics across ‘all the cameras, all the time’. Access Control Integration - Ava’s solution easily integrates into access control, remote monitoring, and existing infrastructure. Monitoring the entire military base can be done as part of a single video management system. Scalable - The platform can easily be clustered to meet the growing needs of a base, from hundreds to thousands of cameras. Deployment simplicity - Ava’s system is designed for overall simplicity and readiness for deployment. With security cameras that were ready to go, fully loaded with out-of-the-box Ava Aware software, the base could easily replace cameras in a phased implementation, minimizing installation time and eliminating downtime. Ava’s simplified licensing/pricing model further simplified deployment. Plug and play configuration Plug and play configuration removes the need for user names and passwords The same simplicity extends to maintaining scalable management within a base’s group configuration policies. Plug and play configuration removes the need for user names and passwords, pre-configuration steps, and default settings. And finally, the base chose the Ava system for its general ease of use. Security operators now have access to detailed camera information, activity logs, and advanced video adjustments in a single, user-friendly screen view. Set up for success with intelligent video security The US Military Base is now set up for success with an end-to-end intelligent video security system that will scale with their needs. Highlights include: Camera installation, which will put the base into full compliance with NDAA-889. The US Military Base now has the highest level of security, to protect against the vulnerabilities of the connected world. The equipment has end-to-end encryption, factory-installed certificates, and records detailed audit trails of both operators and administrators to assist with any other compliance requirements. Security operators have gone from having ‘data overload’ to easily and quickly accessing ‘actionable insights’ to drive more confident and proactive security decisions. By leveraging powerful analytics, the base’s operators are able to respond in real-time and investigate incidents faster and with fewer resources. Operators are able to act on the system’s identification of objects, events, anomalies, and similarities that detect issues as they unfold. Furthermore, operators also have full occupancy insight to manage the flow of people and traffic across the base, in support of COVID-19 rules and regulations. Ava Smart Presence includes a people and vehicle counter to track objects in real-time, allowing for historical analysis and reporting. Configurable maps of all locations provide instant situational awareness and insights. The US Military Base seamlessly integrated the new system with existing access controls and non-banned cameras to cost-effectively meet the mandate and fully leverage analytics across the entire security system. Security teams at the base can trust in a powerful security solution that doesn’t inadvertently contain technology that poses a new threat. Whether enhancing existing cameras with advanced video analytics, replacing the entire video security system to meet the NDAA mandate, or creating a solution from scratch, the U.S. Military and supporting agencies can benefit from Ava’s secure cameras and leverage Ava’s powerful analytics for the highest levels of proactive security.
Interface Security Systems, a pioneering managed services provider that delivers managed network, business security and business intelligence solutions to distributed enterprises, recently provided Thrive Restaurant Group, one of Applebee’s largest franchisees in the US, with scalable network, communications and security services. Business security systems platform The new solutions include a next-generation secure SD-WAN architecture with network upgrades, 4G/LTE wireless capability, unified communications as service (UCaaS) with cloud-based VoIP and a secure and standardized business security systems platform. As a significant update to Thrive’s outdated legacy systems, the new Interface solution unclogs productivity bottlenecks and gives the flexibility the restaurant chain needs to address changing customer preferences. Managing multiple network and voice providers We needed a partner we could count on to manage our network, voice, and security for all locations" With 81 restaurants across the United States, Thrive found itself struggling with challenges common to many geographically distributed businesses, including managing multiple network and voice providers, dealing with outdated CCTV hardware, and a lack of accountability from vendors. “With 81 restaurants across ten states, we needed a partner we could count on to manage our network, voice, and security for all locations,” explains Brian Houchin, Director of IT for Thrive Restaurant Group. Troubleshooting technical issues When it came to managing vendors, Thrive simply had too many. Troubleshooting technical issues was challenging as it was difficult to pin accountability on a specific vendor. In addition, tracking invoices, service credits and administering multiple vendors was an inefficient and time-consuming exercise every month. Outdated hardware and changing regulations also posed a challenge. Unreliable CCTV equipment left the restaurants, employees and customers vulnerable to security risks on-premises. Constantly evolving Payment Card Industry (PCI) compliance rules meant Brian Houchin had to devote hours of his limited bandwidth to keep up with the latest changes and updates, so that Thrive could avoid major penalties and security threats. With the COVID-19 pandemic significantly disrupting Thrive’s business, restaurant staff found it challenging to handle sudden spikes in call volumes, as they had to work with a legacy phone system that was not scalable. The lack of 4G wireless coverage, outside of the restaurant premises made curbside pickup and take-out services impossible to manage. Secure, scalable network and communications Thrive turned to Interface to implement a secure, scalable network and communications backbone that would unclog the productivity bottlenecks and give the flexibility the restaurant chain needed to cater to changing customer needs. Interface implemented a next-generation secure SD-WAN architecture with network upgrades to guarantee seamless connectivity between all of Thrive’s locations. To deliver a better guest experience for customers calling in with their orders and enabling curbside pickup and payment, Interface rolled out a 4G/LTE wireless network that also doubled up as a backup when the primary network failed. UCaas with cloud-based VoIP implemented With managed network services from Interface, Brian and Thrive never have to worry about PCI compliance With managed network services from Interface, Brian and Thrive never have to worry about PCI compliance. Interface also implemented unified communications as service (UCaaS) with cloud-based VoIP and auto-attendant features for Thrive’s locations to seamlessly route high volumes of customer calls to their dedicated order center. “We wanted to take the call-in experience out of the individual restaurants and put it into the hands of professionals who weren’t in a hurry to get off the phone,” explains Brian Houchin, adding “The VoIP service from Interface lets us take additional orders, dramatically improving our customer experience and increasing revenue.” Deploying secure video surveillance platform To solve the limitations of Thrive’s legacy CCTV infrastructure, Interface delivered a secure video surveillance platform with easy remote viewing from any location and simplified access management to boost restaurant security. Thrive’s partnership with Interface has allowed the restaurant group to focus more on their growth strategy and long-term plans. By consolidating their SD-WAN, UCaaS, CCTV and 4G/LTE services with Interface, Thrive gets real accountability without having to deal with the vendor run-around. Perhaps the greatest advantage is Thrive’s ability to aggressively expand, confident that Interface’s 24/7 managed services will always be ready to support their growth. “We’ve had a chance to test out multiple vendors for network, communications and business security and Interface definitely has provided us the best experience,” concludes Houchin.
Car theft is a huge risk for car sales offices, and this is especially an issue for the premium brands. Luxury car giant Eden Auto Premium BMW built a new site in Bordeaux, France, where they house and sell new and second-hand cars, as well as having a car park for customers. That amounts to a lot of cars that need protecting. They researched and compared different technologies and selected Hikvision products to meet their needs. These were then ably installed by reseller Faurie Telecom (Group Convergence), with Hikvision’s help, and the help of French distributor ITESA. The BMW reseller wanted a standalone system to streamline their security operation. Originally they used a night security agent, which was a costly solution. They needed to be able to integrate the security solution into a third party monitoring system, managed by Securitas, in order to reduce manpower costs. Perimeter protection systems The site posed a number of technical challenges. The team also needed to counter some crafty thinking from intruders, who were even resorting to hiding underneath cars during the day, when they can slip in unnoticed. They then could wander around the closed garage, avoiding detection by perimeter protection systems activated only at night. This meant the solution needed to focus on providing real-time, active image at night. With a lot of flags flying on the site, false alarms were a particular issue - these would set them off regularly With a lot of flags flying on the site, false alarms were a particular issue - these would set them off regularly. The complexity of the site also gave a lot of potential for false alarms, which needed to be minimised to reduce overall costs. The solution was made up from Hikvision products, providing a converged system, with seamless monitoring. Central to the system was Hikvision’s Security Radar (DS-PR1-60) for intrusion detection at night. Speed dome PTZ camera The Radar has a large coverage area, and performs excellently at night, whatever the weather. This means that false alarms are kept to a minimum. Radar has the added benefit that it can position humans and vehicles on a map, making it very useful for tracking purposes. This is where the DarkFighter IR Network Speed Dome PTZ camera (DS-2DF8225IX-AEL) comes in. The radar cameras are linked with this for auto tracking. If an event is detected, the control center automatically receives an alarm and can use the PTZ’s auto-tracking function to track any intruders. DarkFighter cameras are also designed to excel at night, so are ideal for this solution. Although radar has promising accuracy rates, the team needed to carefully configure it. The site environment proved a complex installation, with a lot of metal that can cause false alarms for the radar. Seamless security solution We were very satisfied with the innovative products and onsite service provided by the Hikvision team" The local team drafted in expertise from Hikvision HQ’s R&D and technical teams to complete the installation to a high quality and low false alarm rate. The system is coordinated using a AcuSensecamera (DS-2CD2686G2-IZS AcuSense 4K NVR (DS-7716NXI-I4) and a POE Switch (DS-3E0510P-E). Finally, HikCentral provides a user-friendly VMS experience, designed especially to integrate all the different Hikvision products, to make a seamless security solution. Christophe Chamand, from Faurie Telecom, says: “We were very satisfied with the innovative products and onsite service provided by the Hikvision team. From presales and order to technical support and aftersales service, Hikvision has been with us throughout the process, ensuring a successful installation and a happy customer.” With an innovative, converged security solution, BMW has been able to streamline its security, even at night. So intruders sneaking in and hiding during the day are out of luck.
G4S is the globally renowned integrated security company with operations in approximately 85 countries. At the core of the business is G4S Integrated Security, which combines expertise, security professionals, technology and data analytics. G4S Integrated security G4S delivers integrated security around the world with the last six months having brought significant change for the company. The sale of the conventional cash business has enhanced strategic, commercial and operational focus and strengthened the company’s financial position. G4S is transforming, with an intensified focus on integrated security solutions strategy. They are winning business faster and growing stronger than ever before. Through the launch of the global G4S Academy, the organization is offering an opportunity to share knowledge and work more collaboratively with customers. Sector specific solutions and a global approach to risk and investment in technology are delivering clear benefits to customers and differentiating G4S’s offering in the security market. Below are some examples of G4S Integrated Security delivered to customers around the world. G4S Americas In the United States, one of G4S Americas’ Security and Risk Operations Center helps prepare for, monitor and respond to threats from one central location. The Security and Risk Operations Center, based in Florida, provides integrated security solutions by seamlessly combining monitoring capabilities, data analytics, enterprise risk intelligence and global response services. Through actionable data and valuable insights, G4S experts are able to identify threats early and respond quickly. Their technology enabled intelligence-gathering and data analytics enable customers to know immediately when incidents occur. They also allow the organization to support customers by optimizing spend, mitigating risk and enhancing their security programs. G4S Europe & Middle East The diverse team of highly-trained security professionals has adapted to the changing security climate At a Critical National Infrastructure site in southwest England, G4S’s connected security professionals use technology and data to assess threats, manage incidents, and keep a large workforce safe. The diverse team of highly-trained security professionals has adapted to the changing security climate and conduct automated fever screening, as people enter their site. Specially trained security professionals use the best technology, including G4S’s proprietary software RISK360, on this complex, long-term project. G4S RISK360 proprietary software G4S RISK360 proprietary software allows the team to manage incidents, instantly share information, and detect patterns and trends. The training of connected security professionals is tailored to the site. They are setting the gold standard on securing critical infrastructure. In 2019, the Singapore Government asked the industry to prioritize technology over manpower through ‘Outcome Based Contracting’. G4S won an important contract to secure 62 schools using the Threat, Vulnerability, and Risk Assessment (TVRA) Solution. Threat, Vulnerability, and Risk Assessment Solution TVRA risk-based solution combines access control, biometric time and attendance with patrol and response The TVRA (Threat, Vulnerability, and Risk Assessment) risk-based solution combines access control, visitor management systems, biometric time and attendance with patrol and response, incident reporting, and remote CCTV monitoring. G4S security professionals and Security Risk Operations Center are in control of the situation, at all times, using cutting edge technology and data analytics. These are just some of the ways by which G4S is securing the world. G4S Africa In South Africa, G4S security integration of risk consulting, security professionals and technology, for a global FMCG brand, is underpinned by the organization’s data analytics. G4S security professionals protect valuable goods that are delivered all over the country. From the G4S Security and Risk Operations Center near Johannesburg, experts use G4S RISK360 proprietary software to enable secure and reliable deliveries. The security software provides critical data and analysis that is then used to monitor and deploy resources to the highest risk areas. This data is continually shared with the customer, laying the foundation for a partnership that is building a more secure future.
The sailings may take as little as 22 minutes, but carrying almost 4.5 million holidaymakers and Islanders to and from the Isle of Wight every year is a huge challenge. It is perhaps not surprising therefore to discover that Wightlink has invested in the latest video security technology to help them do so safely and efficiently. The team at award-winning ferry operator Wightlink knows more than a thing or two about giving Islanders a frequent and punctual service to mainland Hampshire, as well as offering visitors an easy way to enjoy a taste of Island life. Providing ferry services Through its forerunners, Wightlink has been providing ferry services to and from the Isle of Wight for more than 160 years. As the cross-Solent ferry operator, Wightlink in a normal year would complete approximately 45,000 sailings over three routes with the help of a fleet of ships which includes six vehicle and passenger ferries and two passenger-only FastCats. Hanwha Techwin Europe’s Managing Director Bob (H.Y.) Hwang Ph.D., recently traveled to Portsmouth to see first-hand how Wisenet cameras are being used to assist Wightlink in almost every aspect of their day-to-day operations. Bob was accompanied by Jeff (Chae Won) Lee, the company’s Sales Director and Senior Strategic Sales Manager, Jon Hill. High definition images Wightlink’s crew are also making good use of the high definition images captured by the weather-proof cameras Over 260 Wisenet cameras have already been installed around Wightlink’s Portsmouth and Lymington facilities, as well as on three of the company’s ships. With safety of paramount importance, some of the cameras are being used to help verify any health & safety incidents which might occur in one of the terminals or onboard the ships. On the bridge, Wightlink’s crew are also making good use of the high definition images captured by the weather-proof cameras mounted at the bow and stern of the ships, which are assisting them with great precision to dock safely and efficiently. In addition, cameras supporting ANPR have also been deployed at various locations to ensure the smooth flow, identification and tracking of vehicles through every stage of their journey. IP network video surveillance The day was organized by Jim Kernahan, Managing Director of Trellisworks, a system integrator with extensive experience of designing, installing and maintaining IP network video surveillance, wireless and mobile network solutions. “The visit provided an excellent opportunity for Bob (H.Y.) Hwang and his colleagues to see how the Wisenet cameras were being put to good use,” said Jim. “However, our prime objective was to meet with members of the Wightlink team to explore how Trellisworks and Hanwha Techwin can continue to work in partnership to assist them in capitalizing on the latest advances in technology.” Hybrid energy ferry Stuart James, Wightlink’s Marketing and Innovation Director, who has the task of devising and driving the company’s strategy of continual improvement by wisely investing in new technologies and systems, provided a guided tour of the company’s Portsmouth harbor facilities and its newest and environmentally-friendly hybrid energy ferry, Victoria of Wight. We were able to generate a number of good ideas on how we can build on the success of the existing cameras" “I was pleased to host the visit and take the opportunity to express our appreciation and satisfaction with how well Trellisworks and Hanwha Techwin have been working together for our benefit,” said Stuart. “Most importantly, we were able to generate a number of good ideas on how we can build on the success of the existing cameras.” The discussions which followed on from the tour focused on how the latest technology might assist Wightlink to further enhance safety and security by supporting on shore staff and the ships’ crews, as well as ensuring every passenger has the best possible customer experience. Video security solutions Among the options considered were specialist video applications, such as passenger counting and queue management which can be run on-board Wisenet cameras and AI Deep Learning solutions. Commenting on the visit, Bob (H.Y.) Hwang said: “We are very grateful to Stuart for providing us with a great insight into Wightlink operational requirements and also to the company’s CEO, Keith Greenfield, who kindly took the time to greet us.” “We are understandably delighted that a prestigious and superbly well-run company such as Wightlink has placed its trust in Hanwha Techwin to provide effective and future proof video security solutions. We are looking forward to working ever more closely with Trellisworks, which is a member of our STEP partnership program, to ensure together we are always able to exceed Wightlink’s expectations.”
Round table discussion
The emergence of smart cities provides real-world evidence of the vast capabilities of the Internet of Things (IoT). Urban areas today can deploy a variety of IoT sensors to collect data that is then analyzed to provide insights to drive better decision-making and ultimately to make modern cities more livable. Safety and security are an important aspect of smart cities, and the capabilities that drive smarter cities also enable technologies that make them safer. We asked this week’s Expert Panel Roundtable: What are the physical security challenges of smart cities?
Ten years is a long time, but it seems to pass in an instant in the world of security. In terms of technology, 2010 is ages ago. Changes in the market have been transformative during that decade, and we called on our Expert Panel Roundtable to highlight some of those changes. We asked this week’s panelists: What was the biggest change in the security industry in the 2010-2019 decade?
Securing large campus environments can be particularly demanding and requires a range of technology solutions. In effect, a campus may represent a dozen or more individual facilities to be secured, in addition to protecting the overall environment. Seeking more insight into the number and variety of needs of securing a campus, we asked this week’s Expert Panel Roundtable: What are the security challenges of protecting large campus environments?
Network monitoring: Manufacturers & Suppliers
- Dahua Technology Network monitoring
- Axis Communications Network monitoring
- Vicon Network monitoring
- AMAG Network monitoring
- Video Storage Solutions Network monitoring
- Sony Network monitoring
- Hikvision Network monitoring
- IDIS Network monitoring
- BCDVideo Network monitoring
- Messoa Network monitoring
- LILIN Network monitoring
- Surveon Network monitoring
- Bosch Network monitoring
- Vanderbilt Network monitoring
- eneo Network monitoring
- VIVOTEK Network monitoring
- TruVision Network monitoring
- Panasonic Network monitoring
- Hanwha Techwin Network monitoring
- Luxriot Network monitoring