Bugcrowd, the crowdsourced security company, released its 2020 Inside the Mind of a Hacker report, the study to date on the global hacking community. Among the report’s key findings, human ingenuity supported by actionable intelligence of the Bugcrowd platform were found to be critical ingredients to maintaining a resilient infrastructure. AI-powered solutions not enough In fact, 78% of hackers indicated AI-powered cybersecurity solutions alone aren’t enough to outmaneuver cyber a...
Integrated access control system manufacturer Inner Range has announced customers with Concept systems should now migrate swiftly to Integriti as Concept has reached End of Life. Award-winning Integriti is compatible with 95% of Concept hardware so migrating is easy, efficient and extremely cost-effective at only a fraction of the cost of an entire system replacement. Concept technology no longer economical Inner Range first announced Concept was nearing End of Life in January 2019. Some Conc...
March 2020 saw the beginning of worldwide lockdown measures that forced the majority of businesses worldwide to work remotely in response to COVID-19. Organizations quickly pivoted their operations from office environments to work-from-home (WFH) models, significantly impacting productivity, performance, and security. These are among the findings of the ‘2020 Work-from-Home IT Impact Study,’ commissioned by Sectigo and conducted by independent research firm Wakefield Research, which...
Video wall and visual display providers Ultimate Visual Solutions (UVS) has seen a 10 per cent rise in the official quotations and detailed system proposals it has been asked to supply, despite the coronavirus lockdown. UVS Managing Director Steve Murphy said the increase, compared to the same period in 2019, was as a direct result of the full suite of remote access and online demonstration services which it launched at the start of the COVID-19 outbreak. UVS remote demonstration facility He...
The unprecedented global impact of COVID-19 has taken its toll on all of us, but as cases of the virus thankfully recede, employers are now forced to confront how they can enable a safe return to work for employees. For many employers, this means they will have to carry out a COVID-19 risk assessment, redesign workspaces to maintain social distances, carry out more frequent cleaning, manage the transmission risk and find alternatives to touch-based security devices. Protecting workplace occupan...
Returning to work after the global pandemic will not be business as usual, and security systems are an important asset when it comes to helping to keep occupants and buildings safe. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. These foot-traffic patterns can inform settings for a variety of devices – like ventilation and temperature controls – and even he...
Allegion US, a provider of security products and solutions, announces the launch of Schlage® Mobile Access Solutions, a comprehensive, secure and flexible access control solution portfolio. In the age of digital transformation and the evolving mobile economy, providing secure, convenient access is at the forefront of security challenges faced by multifamily properties, businesses and campuses alike. The Schlage Mobile Access Solutions portfolio redefines access control for the mobile world. Mobile credential experience As a complete cloud-based ecosystem, it enables the use of mobile credentials on openings across a property or site, delivering straightforward mobile credential experience for end users and site administrators. Developed by a pioneer in the security space for 100 years, Schlage Mobile Access Solutions is a comprehensive portfolio that provides customers and end users with a premium mobile offering, providing them seamless access to where they live, work and visit: Schlage Mobile Access Credential - The new credential features AES-256 asymmetric credential encryption and works in offline scenarios once downloaded from the cloud. This means it is reliable and even works in environments where internet access is down or cellular service is spotty. Schlage Mobile SDK - Designed for Physical Access Control Software (PACS) providers to easily integrate this Bluetooth mobile credential into their system, which allows seamless credential management and secure delivery/communication with Schlage locks. Schlage Mobile Enabled Control™ Smart Lock - Schlage’s multifamily resident door lock is now mobile enabled and allows properties to offer high-tech, convenient security to residents. Schlage NDE Mobile Enabled Wireless Lock – The wireless cylindrical lock is now mobile enabled, and the new interior push button expands the way the lock operates to include storeroom, office, privacy and apartment functions. Schlage LE Mobile Enabled Wireless Lock - The wireless mortise lock is now mobile enabled and available with an indicator, interior push button or deadbolt to support storeroom, privacy, apartment and office applications. Schlage MTB Mobile Enabled Multi-Technology Reader – The new Schlage MTB Series Readers are now mobile enabled and compatible with 2.4 GHz Bluetooth, 13.56 MHz smart and 125 kHz proximity, allowing the ability to process multiple credential formats simultaneously. They feature a RS-485 interface and out-of-the-box support for Open Supervised Device Protocol (OSDP) for secure bi-directional communication. The MTB series can be simply installed with plug and play mode or commissioned via the ENGAGE app for simplified, in-field configuration. Schlage CTE Controller - Designed to work with a Schlage mobile enabled multi-technology reader, the CTE is an ENGAGE™ enabled, single-opening controller that allows perimeter and common area openings to be managed in a single system along with Schlage Control Mobile Enabled Smart Locks and NDE cylindrical and LE mortise wireless It is ideal for multifamily, commercial mixed use and retail storefront applications. Convenient access control solution Schlage Mobile Access Solutions is ideal for small to medium-sized businesses" While mobile access is not new to the industry, Schlage’s belief in open global standards and interoperability, along with its commitment to cybersecurity, differentiates its portfolio from competition. This ultimately provides customers with better options for control of their security solutions in years to come. “Allegion is always looking for ways to address our customers’ evolving needs with real, sustainable innovation, so we’re excited to launch this comprehensive cloud-based mobile enabled portfolio,” said Brad Sweet, commercial marketing leader at Allegion. “Schlage Mobile Access Solutions is ideal for small to medium-sized businesses, multifamily properties and higher education campuses that want a customizable, interoperable, secure and convenient access control solution.” The launch of Schlage Mobile Access Solutions portfolio is the next wave in Allegion's mission to serve the industry with flexible access control solutions, making seamless, comprehensive security the new standard for businesses, institutions and beyond.
BriefCam, the industry’s provider of Video Content Analytics and VIDEO SYNOPSIS® solutions, announced significant new capabilities to its product portfolio with v5.6.1 of its innovative and extensible video content analytics platform. The new capabilities will help to prevent the spread of COVID-19 and support the safe and responsible re-opening across the globe. Face Recognition and Appearance Similarity New features available in v5.6.1 include: Proximity Identification: For effective contact tracing and enforcing social distancing, v5.6.1 offers the ability to forensically review video to identify individuals who were in proximity to another individual for a determined duration of time, and to combine with Face Recognition and Appearance Similarity capabilities to determine if a person has been in contact with COVID-19 infected individuals. This enables users to quantify the proximity of people across time and location, compare across days and correlate with external data sources to ensure compliance with social distancing mandates. Face Mask Detection: Provides the ability to search for people with or without a face mask, as well as detect and alert on face mask violations in real-time. Occupancy Controller: Enables users to maintain building occupancy requirements by setting rules to count people as they enter and exit a premises across multiple cameras and entry and exit points. When the threshold is met, an alert can be sent to access control solutions, security staff, VMS, or any other destination. Users can understand occupancy detail over time and location through business intelligence dashboards and prove compliance. Accelerating video investigations “Our video analytics platform has greatly expanded in its ability to offer new use cases for accelerating video investigations over the last year,” said Tomer Saar, BriefCam VP, Product. “During this pandemic we are proud to be able to offer organizations and businesses the critical tools through our proximity identification, face mask detection and occupancy controller capabilities to help them reopen their organizations and places of businesses while protecting their employees and customers.” The new innovation available in BriefCam v5.6.1 complements the already powerful and robust analytic capabilities that support additional public health use cases for identifying crowding hotspots and enforcing building or space sanitization practices with a unique combination of people counting, heatmap visual layers, line crossing and real-time alerting. BriefCam v5.6.1 is to be available in June 2020. Proximity Identification with real-time alerting as well as Face Mask Detection analysis and trending capabilities is planned for August 2020.
HID Global, a worldwide provider in trusted identity solutions, announced its new WorkforceID™ platform that enables a seamless, effortless experience when using identity credentials to access physical and digital workplaces at an office, in the field or on the road. The new ISO27001-certified identity cloud service platform simplifies how employees access what they need to do their jobs, while solving workplace and visitor security, regulatory compliance and a variety of new business challenges as employees are returning to work. WorkforceID inherits the best capabilities from the enterprise-grade HID SAFE™ physical identity access and visitor management software, and combines them with deep customer insights from over 250 organizations around the world, to make a generational leap in unified identity management. Buildings, IT resources access control It brings a completely digital and turnkey deployment for administrators, and removes the complexity of installing, configuring and supporting on-premise software. For employees, contractors and visitors, it provides an ultra-convenient user experience with several streamlined digital workflows, such visitor self-check-in and rules-based access to buildings and IT resources according to employees’ modified work schedules. “WorkforceID solves many of today’s identity management challenges and will also offer unique services to address evolving and specialised work environments, from expediting hospital visits and healthcare worker onboarding to accelerating workplace security audits,” said Brad Jarvis, Vice President and Managing Director of the Identity & Access Management Solutions (IAMS) with HID Global. “We will continue to launch exciting new applications with our WorkforceID platform that will support a growing family of trusted identity solutions for workplaces.” Cloud-based onboarding, visitor badging kiosks The award-winning platform enables organisations to unify, automate and simplify identity issuance and management at a single facility or across any number of distributed office or remote work locations. Its first two available services are employee ID badging and visitor management: HID WorkforceID Credential Manager and ID Badge Issuance: Automates badging across the identity lifecycle including cloud-based onboarding, card printing and offboarding. Administrators know the details of all active credentials, at any location. HID WorkforceID Visitor Manager: Improves the visitor experience through reduced wait times and the ability to use self-service badging kiosks. Administrators can customize the visitor experience and security measures while benefitting from automated policy compliance. “Our mission is to enable a safe, secure and productive workforce,” said Julian Lovelock, Segment Vice President at HID Global. “The WorkforceID platform gives organizations a simple but powerful set of cloud-based applications for managing identities, with a great user experience that takes the manual processes out of adapting to new challenges in today’s work environment.” Renew annual subscriptions online To date, hundreds of organisations are piloting the solution to take advantage of enterprise-grade visitor and credential management in their small and medium businesses. Administrators simply register for a free trial plus easily activate and renew their annual subscriptions online. HID plan to add more tools, features and applications to the WorkforceID platform to deliver deep analytics and reporting capabilities and meet the rapidly expanding credential management requirements of increasingly connected workplaces.
Antaira Technologies is a developer and manufacturer of industrial networking devices and communication solutions for harsh environment applications and is proud to announce the expansion of its industrial networking infrastructure family with the introduction of the IMP-C1000-SFP-bt series. Antaira Technologies’ IMP-C1000-SFP-bt series is a compact, IP30 rated, gigabit Ethernet-to-fiber media converter featuring a 10/100/1000Tx Ethernet port. It supports IEEE 802.3af/at and bt high power PoE that can supply up to 90 watts of power over Ethernet with a dual-rate 100/1000 SFP slot. Requiring distance extension This product is perfectly designed to fulfill industrial applications that require distance extension and high bandwidth capabilities. This small form factor is ideal for saving space in outdoor applications such as factory automation, security, ITS transportation, power/utility, water wastewater treatment plants, and any other extreme ambient weather environments. The IMP-C1000-SFP-bt series has a built-in ‘Link Fault Pass Through’ (LFP) and ‘Far End Fault’ (FEF) function with 48~55VDC redundant power inputs with reverse polarity and overload current protection. The IMP-C1000-SFP-bt-24 has the same feature set, but can be used in applications where a wider power voltage is required (12~55VDC). This product series supports DIN-rail as well as wall-mountable orientations. There are two operating temperature range models in STD: -10°C to 65°C and EOT: -40°C to 75°C.
Now that Europe is taking the first steps towards economic and social recovery after the COVID-19 crisis, it is also time to rethink the future. European politicians and institutions are now joining forces to present a recovery plan that builds on existing plans and ambitions to make the society healthier, more environmentally friendly, more energy efficient and safer. Euralarm calls on policymakers to take measures to increase the security of renovated buildings and to strengthen the cohesion of the European Union. The EU Recovery Plan that is soon expected will push for investments and reform. It will strengthen the EU economy by focusing on common priorities, like the European Green Deal, digitalization and resilience. In recent months, European citizens experienced what it means to be confined to one's home all day. Fire safety requirements With around 250 million homes across the EU that need energy renovation, now more than ever, it is time for the EU to invest in renovating homes, offices, schools and other private and public buildings. The Renovation Wave as part of the Green Deal is therefore welcomed by Euralarm and many other stakeholders. Boosting the rate of deep renovation in all buildings not only improves energy efficiency but also economic growth. Building renovation and retrofit add almost twice as much value as the construction of new buildings Building renovation and retrofit add almost twice as much value as the construction of new buildings. While investing more in renovations, governments and authorities as well as building owners need to pay attention to the implications on the fire safety of buildings because renovations can introduce significant changes in fire safety requirements. Energy efficiency measures With the growing number of electronic and electrical devices in buildings, (e.g. energy storage as part of the energy efficiency measures, electric cars), the fire load in buildings will continue to increase and must be considered in the overall fire safety concept. Regular fire safety reviews - including risk assessment - by certified professionals are today even more crucial and should be prioritised by private and public building owners and operators. As one of the Green Deal proposals the “Renovation Wave” is a unique opportunity to introduce a holistic approach towards fire safety and security when renovating buildings. Safe and secure buildings will contribute to the new European economy as well as the future European ecology. Euralarm therefore calls on EU decision makers to encourage all renovated buildings to be fitted with the latest technologies in terms of fire safety and security. Fire safety systems During the crisis, large parts of the European workforce had no other choice than to work from home, using teleconference and digital co-operation tools to continue their daily work. In just a few months, remote work has accelerated the digitalization of the European economy. With ambitious measures supporting a “Digital Recovery”, the digital transformation can be confirmed and amplified in the short term. In the building industry, they have seen the effects of a slow adoption of digitalization and they welcome an acceleration of the digital transformation. During this crisis, connectivity has proven to be pivotal to remote work. It became clear that wherever the company’s members had remote access to security and fire safety systems, there has been no disruption of service provided. The company continued to ensure the safety of the people and infrastructure. Cybersecurity strategy Pivotal to ensure business continuity, connectivity must be immune to cyber-threats Pivotal to ensure business continuity, connectivity must be immune to cyber-threats. Euralarm recommends to reassess the European cybersecurity strategy. Some sectors of the industry – including services – have specificities that should be taken into consideration when rethinking the cybersecurity strategy. The EU Recovery Plan is a unique opportunity to bring the Single Market back on track and to definitely address unjustified barriers that remain in place for products and for services. In this sector, and despite all the efforts to create European standards for products, systems and services, obstacles remain for cross-border trade, especially for SMEs. It is now time to put an end to these barriers and work together towards a society that shares and cares. Sector-specific measures Again, it is the COVID-19 crisis that demonstrates the crucial need that barriers are definitely removed. Therefore, Euralarm calls on the European Commission to engage in a consultation with stakeholders most affected by these remaining barriers to find sector-specific measures to achieve the long-expected Single Market in Europe.
Identiv, Inc. announced the availability of Hirsch Velocity Software with Contact Tracing. Available via download for Hirsch customers, the free feature has been launched to support worldwide office re-openings with improved health and safety management tools. Based on the Centers for Disease Control and Preventions’ (CDC) recommendations, contract tracing is a key strategy for preventing further spread of the novel coronavirus (COVID-19). Hirsch Velocity Software with Contact Tracing is a means of proactively and reactively protecting visitors. If a person enters a building and is later found to be symptomatic of an illness, Velocity can pull a report of everyone who entered the same door who can then be notified to either get tested or self-quarantine. The feature is free, easy to download, and simple to implement into existing Velocity physical access control system (PACS) platforms. Manage access control While this is useful during the days of COVID-19, it can also be used for other applications, such as seasonal influenza" “While this is useful during the days of COVID-19, it can also be used for other applications, such as seasonal influenza,” said Mark Allen, Identiv GM, Premises. “This means your office can be proactive in responding to potential outbreaks, while simultaneously providing your employees with the peace of mind that there are measures in place to keep them safe.” Hirsch Velocity Software provides the security and functionality expected from high-end systems with the ease-of-use found in entry-level packages. Velocity is an integrated platform that manages access control and security operations in thousands of different facilities, from single high secure rooms to multi-building, multi-location campuses with the most stringent security compliance. Prevent unwanted access With Velocity, users can control doors, gates, turnstiles, elevators, and other equipment, monitor employees and visitor behavior, prevent unwanted access, maintain compliance, and provide a robust audit trail. The latest version of the software platform is designed to deliver the highest level of security, interoperability, and backwards compatibility, and it accommodates the evolution of security technology.
Rodrigue Zbinden, CEO at Morphean, discusses the business benefits from merging video surveillance and access control technologies as demand for ACaaS grows. The big question facing businesses today is how they will use the data that they possess to unlock new forms of value using emerging technologies such as the cloud, predictive analytics and artificial intelligence. Some data is better utilized than others: financial services were quick to recognize the competitive advantages in exploiting technology to improve customer service, detect fraud and improve risk assessment. In the world of physical security, however, we’re only just beginning to understand the potential of the data that our systems gather as a part of their core function. Benefits of ‘Integrated access control’ The first thing to look for is how multiple sources of data can be used to improve physical security functionsWhat many businesses have yet to realize is that many emerging technologies come into their own when used across multiple sources of data. In physical security, for example, we’re moving from discussions about access control and CCTV as siloed functions, to platforms that combine information for analysis from any source, and applying machine learning algorithms to deliver intelligent insights back to the business. ‘Integrated access control’ then looks not just to images or building management, but to images, building management, HR databases and calendar information, all at the same time. And some of the benefits are only now starting to become clear. The first thing to look for, of course, is how multiple sources of data can be used to improve physical security functions. For example, by combining traditional access control data, such as when a swipe card is used, with a video processing platform capable of facial recognition, a second factor of authentication is provided without the need to install separate biometric sensors. CCTV cameras are already deployed in most sensitive areas, so if a card doesn’t match the user based on HR records, staff can be quickly alerted. Making the tools cost-Effective In a similar vein, if an access card is used by an employee, who is supposed to be on holiday according to the HR record, then video data can be used to ensure the individual’s identity and that the card has not been stolen – all before a human operator becomes involved. This is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business functionThese capabilities are not new. What is, however, is the way in which cloud-based computing platforms for security analytics, which absorb information from IP-connected cameras, make the tools much more cost effective, accessible and easier to manage than traditional on-site server applications. In turn, this is driving growth in ‘access control as a service’ (ACaaS), and the end-to-end digitalization of a vital business function. With this system set up, only access control hardware systems are deployed on premise while the software and access control data are shifted to a remote location and provided as a service to users on a recurring monthly subscription. The benefits of such an arrangement are numerous but include avoiding large capital investments, greater flexibility to scale up and down, and shifting the onus of cybersecurity and firmware updates to the vendor. Simple installation and removal of endpoints What’s more, because modern video and access control systems transmit data via the IP network, installation and removal of endpoints are simple, requiring nothing more than PoE and Wi-Fi. Of all the advantages of the ‘as a service’ model, it’s the rich data acquired from ACaaS that makes it so valuable, and capable of delivering business benefits beyond physical security. Managers are constantly looking for better quality of information to inform decision making, and integrated access control systems know more about operations than you might think. Integrating lighting systems with video feeds and access control creates the ability to control the lightsRight now, many firms are experimenting with ways to find efficiencies and reduce costs. For example, lights that automatically turn off to save energy are common in offices today, but can be a distraction if employees have to constantly move around to trigger motion detectors. Integrating lighting systems with video feeds and access control creates the ability to control the lights depending on exactly who is in the room and where they are sitting. Tracking the movement of employees Camera data has been used in retail to track the movement of customers in stores, helping managers to optimize displays and position stocks. The same technology can be used to map out how employees move around a workspace, finding out where productivity gains can be made by moving furniture around or how many desks should be provisioned. Other potential uses of the same data could be to look for correlations between staff movement – say to a store room – and sales spikes, to better predict stock ordering. What makes ACaaS truly exciting is it is still a very new field, and we’re only just scratching the surface of the number of ways that it can be used to create new sources of value. As smart buildings and smart city technology evolves, more and more open systems will become available, offering more ways to combine, analyze and draw insights from data. Within a few years, it will become the rule, rather than the exception, and only grow in utility as it does.
Today’s security leaders encounter many challenges. They have to operate with reduced budgets and face challenging and evolving risks on a daily basis. Security leaders are often ignored and only called upon when needed or in disaster situations. Many don’t have an ongoing relationship with the C-suite because the C-suite doesn’t understand the value they bring to the whole business. In order to resolve these challenges, a security leader can apply a risk-based approach to their security program. According to dictionary.com, risk is “exposure to the chance of injury or loss; a hazard or dangerous chance”. Risk is broader than a security concern and involves the entire business. Through utilizing a 3R model - considering resources, risks and resolutions - a security leader can evaluate the output from the model to build the foundation of a strong plan. This allows the leader to make security decisions based on a quantified risk measure. A business determines what resources it wants to protect, what risks it needs to protect the resources from and what resolutions it can put in place to mitigate the risk. Decisions are based on measurable evidence. Free online risk assessment tools are available to provide a fast, easy way to determine an organisation's basic security risks through an investigative approach The 3 Rs The first step in the 3R model is to figure out what resources need protection. This could be physical - such as buildings, critical infrastructure or valuable equipment, knowledge-based - such as intellectual property, or organizational - such as people or governance structure. Understanding the business will help the security leader develop a list of critical elements. Look for tangible resources such as buildings and machinery, and intangible resources like reputation, knowledge and processes. Second, determine what the resources need to be protected from. Anything that threatens harm to the organization, its mission, its employees, customers, partners, its operations or its reputation could be at risk. These can include contextual risks (workplace safety or natural disasters), criminal risks (theft or cybercrime) or business risks (compliance or legal issues). Anything that threatens harm to the organisation, its mission, its employees, customers, partners, its operations or its reputation could be at riskFree online risk assessment tools are available to provide a fast, easy way to determine an organization's basic security risks through an investigative approach. The tools ask several questions and determine risk based on an organization’s location and the answers provided. Security leaders can also work with security companies and consultants that offer risk assessments to determine their company’s needs, and then offer solutions based on that assessment. The third objective is to determine how businesses can best protect the identified resource. The last of the 3 Rs - resolutions - are those security activities that enable the business to mitigate the impact of security risks. Resolutions can potentially prevent a security incident from occurring, contain the impact to resources if an event does occur and also assist the organization in recovering from an impact more quickly or easily. The first step in the 3R model is to figure out what resources need protection, this could physical such as buildings or critical infrastructure The Path Forward Understanding what risks a business faces in totality provides an opportunity for the security leader to collaborate with other department heads. This gives security leaders an opportunity to engage with functions outside their norm as well as a chance to demonstrate their subject matter expertise. A risk-based approach also helps security leaders fully understand an organization’s needs and concerns, which they can communicate to the C-suite to help them make better business decisions. Metrics can also help business leaders understand the cost/benefit of resolutions C-suite and executives help define an acceptable level of security risk tolerance to resources and make quality, educated decisions about mitigating security risks. Through collaborating with security leaders using a risk-based approach and the 3R model, metrics and reports show the impact of security expenses, and there is a transparent view of security risk. The final decision about how to mitigate and resolve risks is up to the business owner of the resource and the risk stakeholders. To obtain funding, show the risk and value of resources exposed to potential impact. Then present the recommended resolution that reduces the potential level of impact and the associated cost benefit savings. By providing this information, security leaders can ensure that the business owners can make an educated decision. Measuring Success A risk-based approach aligns the security mission with the organization’s mission. Security leaders should have these conversations with their business leaders on a regular basis. Understanding the thresholds of risk tolerance and showing when incidents or activities are trending outside of acceptable boundaries will help business leaders make educated decisions. The 3R model also helps a business to track occurrences, quantify the direct and ancillary impact and make continuous adjustments to the security program Determining a baseline of acceptance gives a foundation for security leaders to point out when the organization is not meeting its own requirements. Metrics can also help business leaders understand the cost/benefit of resolutions and demonstrate when costs may be trending outside of acceptable boundaries. The 3R model also helps a business to track occurrences, quantify the direct and ancillary impact and make continuous adjustments to the security program. It is important to note that this process is not stagnant, and needs to be constantly revisited. Examining risks, resources and resolutions in a systematic way will help security leaders understand what they are protecting Defining Risks And Vulnerabilities Continuous conversations using the 3R model also help business leaders understand what security risks could interfere with meeting business objectives. It also aligns the total cost of ownership for the security program with the business value of the resources at risk. The approach puts the security risk decisions in the hands of the ones impacted by those risksAnd it defines the security role as risk management, not just task management. The approach puts the security risk decisions in the hands of the ones impacted by those risks…the “owners” of the resources. Examining risks, resources and resolutions in a systematic way will help security leaders understand what they are protecting, what they are protecting it from, and how they can help prevent, contain or recover against a specific risk. Followers of this approach are in a better position to ask for funding because they can clearly define and quantify risks and vulnerabilities. Applying these principles will equip security leaders with the knowledge needed to have better dialogue with colleagues in other departments, encouraging more proactive discussions about security.
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognize that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unless they are quickly brought under control. Training Security Officers Governments and organizations across the world are increasingly encouraging businesses to re-assess risks and to plan for and conduct drills for major emergencies. This is driving different agencies and companies to invest in new skills, resources and systems, and encouraging businesses to routinely re-evaluate their emergency response strategies. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents For example: UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents, as part of the UK government’s Action Counter Terrorism program. And organizations including the Association of University Chief Security Officers (AUCSO) and Higher Education Business Continuity Network (HEBCoN) are developing customized training for their members to improve their own response and business continuity plans. Mass Notifications Systems Whether an organization is facing a terrorist attack or a severe weather event, follow up reports consistently identify that the same types of challenges are common to all crisis situations, with similar errors often occurring again and again. Typically, these are centered on three key areas: poor communications, fractured command and control structures, and delayed deployment of resources. Communications skills and technologies clearly play a pivotal role in how effective an organization is in responding to major incidents, particularly when it comes to assessing the situation and its implications, moving people towards safety and providing updates as an incident unfolds. However, when an organization is considering its technology options, emergency response and mass notification systems (MNS) are often touted as the ideal platform to deliver all the required critical communications and ongoing updates. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents Emergency Notification System All the incident reporting, command and control, and communications functions have been brought together on a single platform But, if an organization does not know exactly where all its staff or students are, and it cannot see the location and availability of its first responders and other emergency coordinators relative to them and the incident, then how useful is it to send a top-down alert to everyone? And what about fast moving or multi-centre incidents, where previously agreed evacuation procedures, recommended actions or mustering points may need to change if an incident takes an unexpected turn? Many organizations may have been lulled into believing that an emergency notification system will allow them to confidently handle all the communications aspects of virtually any crisis. In reality, too many businesses are still unaware that there are now much more sophisticated and proven technologies where all the incident reporting, command and control, and communications functions have been brought together on a single platform. Using Live Map Tracking The benefit of using these advanced and more integrated approaches – often categorized as mobile distributed command and control systems – is that they enable faster and better decision making in a crisis using real-time feedback and two-way dialogue with those closest to the emergency. And they avoid the risks of any potential delays, miscommunications or mistakes that can happen when an organization is under pressure to respond and often switching between multiple systems. Leading universities and multi-national corporations are already using new mobile/web-enabled platforms to improve their incident response These next generation emergency management platforms have been specifically designed to enable real-time mapping of an organization’s security assets and its users on a single screen and to fully integrate it with a highly targeted geo-fenced notification capability. The mass notification aspect of the system can then be used to advise specific groups on the best actions to take at their location as an incident develops. The use of live map tracking enables real time mapping of an organisation's security assets Segmented Messaging Many leading universities and multi-national corporations are already using these new mobile/web-enabled platforms to plan, manage and improve their incident response, leading to 50% faster reactions and more positive outcomes.During a crisis, users can receive push notifications so the security centre can immediately see their exact location and advise them accordingly The systems have been widely adopted within the higher-education sector, but they are equally applicable to any large company with multiple international sites or those situated in research or corporate campuses where the bulk of assets and people are based in one or more key locations. Typically, systems provide users with a smartphone app that they can use to call for immediate emergency or first aid support when at work, or to report something suspicious which could prevent an apparently minor incident from escalating into a full-scale emergency. During a crisis, users can receive push notifications, SMS and E-mails asking them to open the app if they are not already logged in, so the security center can immediately see their exact location and advise them accordingly. Supporting Dispersed Mustering Now that communications can be more nimble, responsive and flexible this can support the increasing numbers of planners are recognizing the advantages of dispersed mustering. This is a strategy that has been developed to reduce the risk of secondary attacks on unprotected people complying with instructions to evacuate from premises and gather in what are, effectively, exposed locations. It is now acknowledged that evacuees waiting outside for any length of time are more vulnerable to targeted attacks or to injury, from flying glass for example. With dispersed mustering – a strategy made more effective by these new mobile distributed command and control systems - a building’s occupants can be advised not to go outside, but to move to known safe internal locations. People in each specific area can then be kept regularly updated. Many corporations are now using new mobile/web-enabled platforms to improve their incident response Coordination Between Response Agencies The software platforms can be integrated with an organization’s fixed security infrastructure to take real-time sharing of information First responders are permanently logged in, so the emergency operations center can see their exact locations in real-time and can advise what actions to take in mustering people or in setting up and protecting security cordons. Bringing everything together on one platform, with real-time feedback and in a fully integrated system also removes what is often seen as the weakest communication link in managing any major incident: the need to rely on conventional two-way radio as the sole means of communication between the command and control center and its first responders and other team members on the ground. The software platforms can be integrated with an organization’s fixed security infrastructure to take real-time sharing of information to a new level for improved collaboration, coordination and communications between users, the incident management team and external agencies. Improving Emergency Response Strategies One of the most powerful features of some of these new systems is the ability to record and view all alerts, responses and the detailed conversations between first responders, emergency coordinators and other parties. This allows the systems to be used to simulate major incidents involving inputs from the emergency services and other key agencies and to ensure the organization’s crisis management plans have been fully tested against a range of possible incident scenarios.
The task of protecting shared spaces, such as offices and schools, has become increasingly complex, particularly with ever-rising political tensions and the difficulties of assessing threats for schools, workplaces and law enforcement. Given the randomness of when and where a violent person may strike, those who manage facilities need an emergency plan, as well as robust training, detection and awareness. To gain more insights into dealing with such threats, we interviewed John Torres, President of Security and Technology Consulting, Guidepost Solutions. Guidepost Solutions is a global team of investigators, security and technology consultants, and compliance and monitoring experts. They provide security design and consulting, investigations, and compliance and monitoring leadership for critical client needs. Torres has extensive investigative and security experience. Previously, he served as the Special Agent in Charge for Homeland Security Investigations in Washington, D.C. and Virginia. His background includes more than 27 years of experience providing investigative and security management for the U.S. Departments of Homeland Security and Justice, including serving as the Acting Director and the Deputy Director of U.S. Immigration and Customs Enforcement. Q: Why is it difficult for schools, workplaces and law enforcement to assess threats of violence? How can they differentiate between a threat and a non-threat? Torres: With mobile technology and social media, threats are more than just physical. Schools are often not screening student social media accounts and are restricted in what they can and cannot monitor due to privacy laws. Proactive business and educational institutions are working closely with law enforcement, providing training and increasing awareness of potential threats or abnormal behavior. Proactive business and educational institutions are working closely with law enforcementEmerging tools include software that allows monitoring of students’ school-issued email and file storage accounts. Communications software and apps provide real-time notification of emergency messages to students, parents, employees and the community to provide critical instructions during an emergency. The combination of training and new tools has enabled trends and threatening language to be identified and appropriate authorities notified. Q: What tools and/or insights can Guidepost Solutions add to the mix? What are the elements of a “comprehensive risk assessment?” Torres: Comprehensive risk assessments include adopting a tiered approach to assessing the school or office and the surrounding environment. A typical approach includes site perimeter review, identifying gates, fencing, vehicle barriers etc., the parking lot, building exterior, interior paths of travel and individual classroom measures. Review and observation of systems including mass notification, video surveillance, access control, intrusion and visitor management, etc. are critical to ensure that they are equipped to maintain functionality in the event of power loss etc. As an insight, always engage with people, they have the knowledge of each unique facility. Elements we can add to the mix include assessments, physical security improvements and mass notification systems, as well as emergency response training, operational policies and procedures, and behavior analysis. Q: How can the elements of a risk assessment be translated into recommendations of specific technologies or processes (such as video surveillance and/or access control)? Torres: Risk assessments often drive and identify the need for technologies to be implemented into the security programs of schools, business or places of mass gathering, such as stadiums, convention centers and houses of worship. Risk assessments often drive the need for technologies to be implemented into places of mass gatheringRisk assessments help identify weaknesses in security procedure and then often support phased security enhancement programs as funds become available for investment. Each entity is different, and stakeholders should be included. For example, video surveillance may be a priority at one location but controlling the main point of entry may be more important at another. Technology and process recommendations must meet the operational needs and support the goals of the security team and operational managers. Q: How can the risk of an incident be mitigated and lives protected? Torres: While multiple steps are helpful, all of them in combination are key to implementing a comprehensive security plan. They include: Assessments – physical, cyber and procedural Physical Security Improvements – visitor management, fencing and barriers, locks and cameras Emergency Response Training – law enforcement coordination; muscle memory response Mass Notification Systems – current software, clear concise directives, testing Operational Policies and Procedures – termination, evacuation, communication, intervention Behavioral Analysis. Q: What are the elements of behavior analysis? Torres: They include things like changes in appearance and behavior, including social media behavior, and isolation from family or friends. They also include studying or taking pictures of potential targets, and real or perceived bullying. An individual may advocate violence or hate, and/or consume violent extremist information/propaganda. He or she may talk about traveling to places that sound suspicious, and/or have an obsession with weapons. Q: What is the role of training? Torres: Training is critical regarding emergency situations in schools, be it a fire drill, earthquake, lockdown, active shooter situation, etc. Training and drills educate those present, including employees and staff, with information about actions that may save lives and reduce casualties in a real emergency. Training should hold people responsible and set standards for acceptable behavior. Training is critical regarding emergency situations in schoolsThere should be a plan that is implemented, including practice and drills. You should also provide training and communication skill building classes. Develop intervention strategies. Work with HR and legal (and others as appropriate). Finally, document everything. Q: What challenges still remain? Torres: Cultural and behavioral change remains at the forefront of schools and businesses when addressing safety and security measures. A large percentage of violent acts may be preventable if a bystander shares his/her concerns with the proper authorities. According to the FBI, perpetrators exhibited behavioral indicators in 93% of incidents. And bystanders had prior knowledge in 81% of school attack incidents and 80% of terrorist-inspired behaviors or activities before an attack. Q: What progress are you seeing? Torres: With each tragedy that occurs, leaders are engaging with safety and security head on. There is a shift in schools and businesses to engage with professionals that can help them understand what they do not know. Simple things such as improved communication and enforcement of policies and procedures can have a tremendous positive impact on an organization’s security posture. Assessments and technology upgrades are important and effective, but it all starts with acknowledging the need to provide and maintain safe and secure environments for students, employees and the community.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
During the Parkland, Florida, school shooting in 2018, the shooter was caught on a security camera pulling his rifle out of a duffle bag in the staircase 15 seconds before discharging the first round. However, the School Resource Officer didn’t enter the building because he wasn’t confident about the situation, and the Coral Springs Police Department had no idea what the shooter even looked like until 7 minutes and 30 seconds after the first round was fired. If the video system had included technology to recognize the gun threat in real time, alerts could have been sent to the security team. An announcement could have been made right away for all students and faculty in Building 12 to barricade their doors, and law enforcement could have responded a lot faster to a real-time feed of timely and accurate information. Automatically recognizing gun threats Actuate offers such a technology, which the company says enables existing security cameras to automatically recognize gun threats and notify security in real-time. The technology is centred around a convolutional neural network (CNN) that aims to replicate how a human brain would process information. This neural network is trained to recognize what hands holding a firearm look like from hundreds of thousands of images in a proprietary data set. Over time, the system is able to mathematically calculate what a gun threat in a security camera feed looks like with a high degree of accuracy (well over 99% detection accuracy within the first 5 seconds), according to Actuate. “Active shooter situations are often marred by chaos and confusion,” says Sonny Tai, Chief Executive Officer of Actuate. “People are in fight-or-flight response and prioritize immediate survival instead of reaching for their phones and calling 911. When the 911 calls are made, callers often provide delayed, conflicting, and inaccurate information, inhibiting law enforcement’s ability to respond.” Enhances law enforcement response Tai says Actuate helps to clear up that chaos and confusion. “It provides visual intelligence of the location of the shooter, what they look like, what direction they’re heading, and what they’re armed with,” he says. “This real-time information enhances law enforcement response and enables building occupants to make critical decisions that maximize survivability." AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage Tai is a Marine Corps veteran and a social entrepreneur who co-founded Actuate with the mission of addressing America’s gun violence epidemic. The start of the company stems from Tai’s upbringing in South Africa, where gun violence rates are some of the highest in the world. Growing up, several of his family friends were personally impacted, resulting in a lifelong passion for the issue of gun violence. In early 2018, Tai interviewed dozens of law enforcement leaders across the country and found that their biggest challenge in gun violence response was the lack of timely and accurate information. Actuate mitigates that challenge and enables both first responders and security staff to respond more rapidly, he says. More than 99% accuracy in detecting weapons Actuate is a software-only solution that plugs into security camera hardware and software, including VMSActuate's solution is completely AI-based, says Ben Ziomek, Chief Product Officer. AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage. “Legacy, non-AI based solutions generally rely on older methods like motion detection, which is not reliable in differentiating between objects such as phones and firearms,” says Ziomek. “Our AI solution lets us achieve more than 99% accuracy in detecting weapons with an exceptionally low false-positive rate.” Ziomek runs engineering, data science, and operations for Actuate. Before joining the firm, he led teams of AI engineers and data scientists at Microsoft, leveraging AI to identify high-potential startups globally. Actuate is a software-only solution that plugs into existing security camera hardware and software, including video management systems (VMS). Existing capabilities of a customer’s VMS does initial, basic analysis and then routes the remaining video to Actuate’s processing units for AI analysis. Alerts can then be sent back however a customer wants, including through a VMS. Actuate can also feed information into a PSIM or command-and-control system if requested by a customer. Equipping customers with AI tools Our current focus for the company is to get our technology into the hands of as many customers as possible"As an early-stage company, Actuate is pursuing customers through multiple routes, including directly to end-users and via security integrators, distributors, and dealers. They are currently deployed at diverse customer sites including schools, office buildings, industrial facilities, and public buildings, says Ziomek. “Our current focus for the company is to get our technology into the hands of as many customers as possible,” says Ziomek. “We are working closely with customers across segments and industries to equip them with the tools they need to make their spaces safer. We’re currently working on educating the market on our offerings, as this technology is very new to many security organizations.” There are no privacy or compliance concerns because Actuate stores no customer data until a weapon is detected, and even then the data is not cross-indexed with any sensitive information, says Ziomek.
A used car lot owner had re-occurring issues with intruders cutting holes in the perimeter fence during night-time hours and vandalizing or burglarizing the area. The intruders would not enter the small office building, so the security system was never triggered. The customer did own a video surveillance system and it would record criminal activity but it did not prevent or deter crime. Integrating motion detectors Using the existing intrusion alarm panel (Interlogix NX8-v2 panel) and the existing video system, the system integrator introduced two OPTEX Visual Verification Bridges and four OPTEX Redwall SIP-3020 Outdoor PIR motion detectors. The motion detectors were installed over the two main perimeter light poles pointing into the lot with IP cameras located directly above each of the motion detectors. Access to camera visual With the two Visual Verification Bridges installed, the integrator can provide operators immediate access to eight live cameras during every alarm event. The Redwall SIP-3020 provided up to 30m of distance coverage and 20m width, complete with anti-masking and vandal tampers. With this simple but effective solution, the integrator was able to provide their customer with immediate visual verification of alarm sensors, only when the alarm panel is armed. Wireless key fobs were provided so the dealer can arm and disarm the system from outside the gate helping to eliminate false alarms during arming and disarming. Reduced false alarms Since the completion of this installation, there have been several nuisance alarms caused by cats that were immediately disregarded. Due to the visual verification solution there was no intrusion and the client has not had any vandalism or crime since. Per the customer’s request, the OPTEX Bridge has been installed on three additional car lots.
Check Point has introduced CloudGuard Cloud Native Security, a fully-automated cloud platform that enables customers to seamlessly protect all of their cloud deployments and workloads, and manage security through a single pane of glass. CloudGuard streamlines and simplifies cloud security, preventing the most advanced 6th generation cyber-attacks from impacting organizations’ cloud environments, and enables them to take full advantage of the speed and agility of cloud. Rapid migration to the cloud is the biggest cause of breakages in enterprise security architectures, according to the SANS 2020 Cybersecurity Spending Survey, with over half of respondents citing increased use of public clouds as the leading cause of security disruption. The COVID-19 pandemic has magnified this, as companies scramble to support mass remote working. Their current security controls cannot cope with the speed, scale and complexity of cloud deployments, leaving them vulnerable to attacks and breaches. Security across cloud implementations “Cloud security can be challenging; however, the real challenge is multi-cloud, as IDC data continually shows that over 80% of organizations have multiple cloud providers. The goal is one set of policies to rule them all,” said Frank Dickson, Program Vice President, Security & Trust at IDC. “Check Point's multi-cloud security platform looks to unify security across private and public cloud implementations, essentially making cloud security agnostic of the resident software define compute environment.” Check Point CloudGuard addresses these challenges, delivering comprehensive and easy to manage cloud security platform. It gives frictionless deployment and control of the advanced security protections to any cloud environment and workload, and enables security processes to be automated to meet DevOps’ demands for rapid deployment and agility. “Security is continually cited as a barrier to enterprise cloud deployments, because traditional security controls are not agile enough to handle the cloud’s speed and scale,” said Itai Greenberg, VP of Product Management, Check Point. “CloudGuard solves this problem, giving organizations the advanced cloud-native security across their cloud estates, together with holistic visibility and easy, automated management and enforcement of security policies.” CloudGuard’s Unified Cloud Native Security Fully integrated security with advanced threat prevention: Prevents APTs and zero-days from infecting clouds and workloads with unified security, and workload runtime protection, including firewalling, IPS, Application Control, IPsec VPN, Antivirus and Anti-Bot, powered by the industry’s real-time, cloud-based threat intelligence. High-fidelity cloud security posture management: CloudGuard gives unified, at-a-glance visibility across organizations’ multi-cloud environments, enabling continuous analysis and control of their cloud security posture from CI/CD to production environments. Automated security for any workload in any cloud: CloudGuard delivers true cloud-agnostic security, enabling organizations to automatically secure any workload, anywhere with auto-provisioning, auto-scaling and automated policy updates. It enables holistic, single-console security management as well as run time protection for serverless and container-based applications, in multi-cloud environments. Supporting Partner and customer quotes: “Check Point CloudGuard has been a saving grace for Gas South. It is the only solution that gives us secure, stable, complete access to our critical applications and services in Azure,” said Rajiv Thomas, Senior Systems Engineer, Gas South. “When deploying a multi-cloud environment, you need to have a consistent tool that plays across all the platforms,” said Sreeni Kancharla, VP & Chief Information Security Officer, Cadence. “Using the cloud-agnostic CloudGuard service, I only need to train an individual on one set of tools and he can manage our total cloud environment very effectively.” Ann Johnson, Corporate Vice President, Cybersecurity Solutions Group at Microsoft Corp. said, “Where people often thought about security as a solution to deploy on top of existing infrastructure, events like COVID-19 showcase the critical need for truly integrated cloud security for organizations of all sizes. Solutions like CloudGuard running on Microsoft Azure help to empower our customers through a unified platform which has become a business imperative as more organizations embrace cloud-based protections.”
In St. Petersburg, a set of Dahua thermal body temperature monitoring system was installed at the entrance of JSC Concern Okeanpribor to help the company with preliminary body temperature screening of employees and visitors during the pandemic. The equipment can quickly and accurately detect people with elevated body temperatures, one of the key symptoms of COVID-19, providing the organization with an additional layer of protection for its employees. JSC Concern Okeanpribor is a company engaged in the production of sonar systems and shipbuilding stations to meet the needs of the country’s naval force and national economy. It is also listed as one of the ‘backbone enterprises’ of the Russian Federation. Temperature monitoring solution To provide its employees with safe working conditions under COVID-19, JSC Concern Okeanpribor hopes to use the Dahua thermal body temperature monitoring system to assist their daily temperature screening work and minimize the chances of infection with the strictest measures possible, while not ignoring privacy and respect. The Dahua thermal body temperature monitoring solution was installed at the checkpoint of JSC Concern Okeanpribor, consisting of: Thermal body temperature monitoring camera DH-TPC-BF5421P-T Calibration equipment (blackbody) DSS software Accessories (2 tripods, 2 adapters for a tripod) Hand-Held scanners The Dahua thermal body temperature monitoring system is a part of the VideoNet security systems at the facility The implementation of this solution was completed by Skyros Corporation, a gold partner of Dahua Technology in the Northwest Federal District, together with a well-known Russian software developer for security systems – VideoNet. The Dahua thermal body temperature monitoring system is a part of the VideoNet security systems at the facility. The Dahua Thermal Body Temperature Monitoring Solution provides a non-invasive way to help organizations check body temperatures of a group of people at the same time, which is faster than hand-held scanners and can be done at a safer distance. That’s why this solution is accepted and adopted by JSC Concern Okeanpribor and other security experts during the pandemic and recovery. Moreover, the most important factor why it was chosen is its accuracy. Reducing false alarms With a blackbody, the solution uses a hybrid thermal imaging camera to achieve highly accurate temperature monitoring of ± 0.3 ℃, which is essential in detecting people with abnormal temperatures. At the same time, the camera’s built-in face detection enabled by advanced AI technology can improve the overall measurement accuracy with better positioning of the measuring point on the face. This approach significantly reduces false alarms caused by a variety of hot objects that may accidentally or intentionally appear in the monitored zone. It can also detect the temperatures of people wearing medical masks. This solution also includes a special version of Dahua DSS software, which can handle temperature alarms This solution also includes a special version of Dahua DSS software, which can handle temperature alarms. If the set temperature threshold is exceeded, this could be an indication that the system has detected a person with fever and should be checked by a medical professional. In this case, the camera will send an alarm message to this software, allowing the operator to take appropriate measures. Conduct preliminary detection Featuring long distance, non-contact and fast detection speed, the Dahua Thermal Body Temperature Monitoring Solution allows JSC Concern Okeanpribor to conduct preliminary detection of people entering their building who are exhibiting fever, thus effectively limiting cross-infection caused by physical contact, saving manpower and material resources, enabling efficient passage of people at the entrance, as well as enhancing protection for the operation of the whole company. The solution has been widely used in China and many parts of the world during the pandemic and corresponding recovery. Its effectiveness for mass scanning especially in public places such as shopping centers, office buildings, airports, train stations, subway, as well as in hospitals and educational institutions has been proven by its applications all over the world. In one transportation hub for instance, the system detected more than 100 passengers with abnormal temperature. After conducting medical tests, 60 of them were confirmed positive for COVID-19.
Mayflex, the distributor of Converged IP Solutions, has installed Thermal Elevated Temperature Screening Solutions from Hikvision to improve the health and safety of their employees and visitors during the COVID-19 pandemic. The system works by automatically checking the forehead skin temperature in real time as employees pass by, maintaining a 2m gap in accordance with UK Government social distancing advice. If a person is over a normal temperature threshold, an audible and visual alarm is given and they will be asked to verify their body temperature using a medical thermometer. If in the future face masks become mandatory, the system can also verify if a visitor or employee is wearing a mask. Temperature screening at warehouse and office James Vian, Technical and Training Manager said “The temperature screening solution has been installed in our main reception as well as the warehouse entrances at both the Head Office and our Environ House warehouse. The system includes the Hikvision Thermographic Bullet and Turret Cameras with the addition of the Hikvision Blackbody Calibrator that increases the accuracy of the readings from ±0.5oC to ±0.3oC.” Andy Cooper, Supply Chain Director at Mayflex said “It’s a non-contact means of quickly and consistently measuring the skin temperature of a person’s forehead, whilst maintaining social distancing in line with current Government guidelines. In doing so, we can reduce the likelihood of someone with an elevated temperature coming into contact with other building occupants. This also reduces the possibility of losing an entire shift for 14 days, ensuring that we can deliver on our customers’ needs even in these challenging times.” Andy concluded “It gives me confidence that we are doing everything we can to ensure the wellbeing of staff and protecting the business during the Coronavirus Pandemic.”
Asian Banker magazine recently selected Qatar National Bank for having the “Best Biometrics Initiative, Application or Program in Qatar” for its use of iris recognition systems from Iris ID in some QNB branch ATMs. The bank is the one of the largest financial institution in the Middle East and Africa, with branches, subsidiaries and associate companies in 31 countries on three continents. Biometric Eyes (IRIS) Scan ATM program The deployment of QNB’s Biometric Eyes (IRIS) Scan ATM program, a first-of-its-type in Qatar, is part of the bank’s commitment to innovative solutions to deliver premium services to customers in a safe, fast and convenient way. Mohammed Murad, Vice President, Global Sales and Business Development, Iris ID, congratulated QNB on the award. “QNB should be applauded for staking out a futuristic, leadership position when it comes to improving the security, convenience and safety of its customers as they access their accounts via bank ATMs” he said. “The ease and speed of our contactless iris-based recognition system makes it ideal for use in the financial industry. Our contactless systems have taken on added importance with the worldwide spread of the COVID-19 virus.” Iris ID authentication systems The bank launched its use of the Iris ID biometric solution in ATMs in late 2016. The system enables QNB customers to access their accounts at ATMs without the need of a bank card or PIN. To use the Iris ID solution the bank’s customers, participate in a one-time registration at a QNB branch office. The two-minute process involves taking a digital photo of the iris, which is converted into a small template stored in a secure database. At the ATM, customers need only a second to look into a built-in reader and have their iris pattern confirmed. In addition to the QNB deployment, Iris ID authentication systems are currently used worldwide for access control, time and attendance, national ID programs, border crossings, voter registration and many other applications.
National Bank of Umm Al Qaiwain (the Bank) is a Public Shareholding Company incorporated in Umm Al Qaiwain by Amiri Decree Number (1) on January 5, 1982, issued by His Highness, the Ruler of Umm Al Qaiwain and commenced its operations with effect from August 1, 1982. The Local government of Umm Al Qaiwain is the largest shareholder and promoter of the bank. The bank is engaged in providing retail and corporate banking services through a network of 14 branches in U.A.E. The Bank carries out Islamic banking operations through Islamic Banking window established in 2005 across its branch network. They were searching for a fool-proof solution that would help them in managing the Time-Attendance and overtime calculation. With offices spread over 14 locations in UAE, management of attendance data was a daunting task. centralized attendance data management All manual work for report generation was eliminated outrightly, simplifying the salary procedure Thus, centralized attendance data management and maintaining a complete record of their employees were a part of their key requirements. Moreover, their payroll processing deployed a software - RAMCO, wherein the attendance data was manually entered. After a comprehensive discussion with the customer, Matrix offered a centralized platform - COSEC CENTRA, to manage all the data centrally. Door controllers - COSEC VEGA FAX installed in all the office entrances. These door controllers are integrated with the central platform that pushes the event data to the server. Furthermore, the Matrix platform is integrated with the payroll system - RAMCO. All manual work for report generation was eliminated outrightly, simplifying the salary procedure. After implementing Matrix solutions, NBQ witnessed drastic changes while following their processes. Customized attendance policy formation Effortless attendance management of multiple locations from the Head Office was prominently one of them. The shift allocation and shift correction processes were streamlined. Their solution included some advanced features like customized attendance policy formation and real item alert on attendance related event & auto-scheduled reporting. This, in turn, ensured efficient employee database management improving productivity. Products and solutions offered: COSEC VEGA FAX A complete Time-Attendance and Access Control solution with a blend of aesthetics, size, connectivity, reliability and ease-of-use. Designed for large enterprises with multi-location organizations. COSEC CENTRA PLT A web-enabled application server that controls the entire system from anywhere in the world. It is the heart of the entire solution and acts as a bridge between applications and the devices. COSEC CENTRA TAM An enterprise-grade solution, designed for organizations the Time-Attendance and Leave Management processes like recording entries and exits, salary processing, etc.
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
The physical security industry is embracing the cloud in a big way. Cloud-based systems – which involve accessing a shared pool of information technology resources via the Internet – are much higher-profile in the video and access control markets, and large and small companies are getting on the cloud bandwagon. We asked this week's Expert Panel Roundtable: What factors are contributing to growth in cloud systems in the security market?
Office security: Manufacturers & Suppliers
Automatic Vehicle Identification: State Of The Industry 2020Download
How Analytics Engines Mitigate Risk, Ensure Compliance And Reduce CostDownload
11 Considerations For Embedded System RFID ReadersDownload