Johnson Controls is announcing exacqVision 20.09, which offers an integrated, cost-effective face mask detection solution that can quickly put information into the hands of facility decision makers to help maintain safe environments for employees and visitors. Based on Artificial Intelligence (AI) analytics versus pixel-based analytics, exacqVision 20.09 with Face Mask Detection offers improved accuracy and a scalable, efficient solution for organizations where public health and safety is a pri...
Davista, a provider of artificial intelligence for physical security and law enforcement, announced the availability of its AI-powered social distancing platform. The solution is designed to help businesses, organizations, and government agencies ensure social distancing efforts to keep individuals safe while promoting a healthy return-to-work. Across the globe, governments, corporate entities, and health and law enforcement agencies are working to find solutions to COVID-19 while making stride...
HID Global, a worldwide provider in trusted identity solutions, unveiled its new HID® ELEMENT product line, the industry’s heavy-duty, fully modular desktop-based card personalization portfolio that establishes a new category for mid-range and high-volume market segments. The portfolio’s enhanced card production capabilities, flexible system architecture and cost-effective deployment model empower organizations to create custom secure ID and financial card production solutions f...
Alcatraz, the developer of secure autonomous access control products, and national security integration provider SAGE Integration have partnered to deliver facial authentication solutions to enterprise businesses to help modernize access control. Headquartered in Kent, Ohio, with a regional office in Atlanta, SAGE Integration will develop and expand Alcatraz’s presence along the East Coast and in Midwestern states. “We’re excited to partner with SAGE Integration to work toget...
Milestone Systems announced a webinar panel discussion of safety and security professionals, including representatives from Nemours Children’s Hospital Health System in Jacksonville, Florida, and The City of Calgary in Alberta, Canada. They will share insights and ideas on how to address change, support their core mission and assist other parts of their respective organizations. The webinar will focus on how these three different organizations are using their video management system to he...
We’ve just endured an event that was unprecedented in recent history. COVID-19 greatly affected our lives: our daily activities, the health and well-being of our families and friends, and business operations as we know it. Now that stay-at-home restrictions have been lifted, organizations are preparing for employees to return to work. Confidence surrounding the return to the office hinges on the employees’ perceptions of how well they will be protected while at work. One thing is ce...
Security solutions are deployed to enhance individual well-being by increasing the safety and security of public and private places. By providing protective devices and services for critical infrastructure sites; schools, hospitals and other institutions; government facilities; residences; mass gatherings; and additional locations, security manufacturers, integrators and service providers enable people to live more securely and better enjoy the benefits of their communities. Security industry professionals, then, serve not only their customers but also society as a whole. Being so entrusted is a privilege, and industry professionals, bearing a responsibility to both their customers and all people who encounter their systems, must always act with the utmost professionalism, care, respect and good faith. SIA Member Ethics Principles Every member organization shall provide its acknowledgement of this requirement upon joiningWith those fundamental concepts in mind, the Security Industry Association (SIA) has announced “SIA Member Ethics Principles,” which are binding on all members of SIA. As a condition of membership, any organization that qualifies for membership in SIA must affirm that they have read and understand the SIA Member Ethics Principles, and by virtue of membership, comply with the Principles. Every member organization shall provide its acknowledgement of this requirement upon joining as a member or renewing its SIA membership. SIA will also publicize the existence of its Principles on its website and encourage its members to promote its compliance with these requirements. Ethical behavior in conducting business In furtherance of the foregoing purposes, the Security Industry Association (SIA) has adopted the following principles of ethical behavior for its members (effective July 1, 2020). SIA member organizations and their employees shall: Act with honesty, integrity and transparency, eschewing fraudulent or misleading business practices and avoiding conflicts of interest. Provide accurate branding, use and cost information in marketing materials, advertisements and interactions with customers and potential customers. Conduct business with appropriate consideration of sustainability and the environmental impact of products and services. Workplace ethics and law enforcement cooperation Oppose prejudice, harassment and abuse in the workplace as well as uses of their solutions that assist or abet prejudice, harassment or abuse. Work with law enforcement in an appropriate manner that enhances public safety while respecting the reasonable expectations of privacy held by customers and individuals whose images or information are captured by security devices. Protect all sensitive personal information that they acquire in accordance with industry best practices. Monitor and mitigate relevant risks as much as reasonably possible, including by securing and hardening networked solutions against cyber threats in accordance with industry best practices. Human rights Ensure that their products, services and solutions are not designed or manufactured in such a manner as to surreptitiously transmit information to third parties for purposes outside the normal and expected scope of security and business operations. Refuse to knowingly design, manufacture, sell or deploy products, services or solutions that have been finally determined by any supranational, national, federal, state or local governmental authority or any self-regulatory entity, whether foreign or domestic, having competent jurisdiction over the applicable member organization to support the infliction of human rights abuses, the restriction of civil liberties, and/or the implementation of other oppressive measures. These principles are not intended to be exhaustive. They are written broadly so that they may be applied in a variety of contexts.
The new contactless DoorBird IP video door station supports the worldwide fight against COVID-19. The model D2101WV has a special sensor technology for contactless ringing developed by Berlin-based manufacturer Bird Home Automation. In the midst of the current pandemic, DoorBird has developed an IP-based door station that meets the demands of the changing world. DoorBird’s new D2101WV model enables contactless ringing, protecting health and increasing safety. Contactless door intercom Visitors, customers and patients can no longer come into contact with viruses and bacteria by touching the doorbell. Buildings with a high number of visitors, such as hospitals, kindergartens, medical offices and other office buildings, can all benefit from this contactless door intercom as it can help contain the spread of the Coronavirus. The integrated module with a special sensor technology detects gestures The integrated module with a special sensor technology detects gestures, such as waving and approaching of the hand, at a distance of 10 centimeters and triggers a bell signal at an IP chime or indoor station. Building automation system The hand gesture can also trigger a preconfigured relay which then opens the door automatically. Other actions can also be performed, for example, sending a push notification to the homeowner's smartphone or an HTTP(S) call to a building automation system, or initiating a SIP call. The modern IP technology also enables communication with visitors via mobile devices. Homeowners can see live video of the entrance area, talk to their guests and open the door from their smartphones and tablets via the DoorBird app. With the DoorBird D2101WV, the contactless access solution has thus become a reality. The smart door intercom will go into series production in the fall of 2020 and can be pre-ordered now.
Aqua Security, the pure-play cloud-native security, announced that its Cloud Native Security Platform is available through Red Hat® Marketplace, an open cloud marketplace that makes it easier to discover and access certified software for container-based environments across the hybrid cloud. Built in partnership by Red Hat and IBM, Red Hat Marketplace is designed to meet the unique needs of developers, procurement teams and IT leaders through simplified and streamlined access to popular enterprise software products, including the Aqua Platform. Prevent suspicious activity The Aqua Platform provides full visibility into application activity, allowing organizations to detect and prevent suspicious activity and attacks, providing transparent, automated security while helping to enforce policy and simplify regulatory compliance. Aqua’s native integration with OpenShift provides a full-stack security solution for the joint customers, automating security controls in CI/CDs like OpenShift Pipelines and enforcing application immutability in production. The Red Hat Marketplace makes it easy for users to find and purchase the Aqua Platform, and they can then use the on-demand deployment capability to install and evaluate Aqua with zero-touch and minimal configuration. Existing customers can also use the same on-demand, zero-touch environment to purchase additional licenses. Growing business efficiently “Enterprise buying patterns are increasingly shifting toward automated, online billing mechanisms that allow companies to leverage existing cloud or services budgets, as well the flexibility to utilize OPEX budgets for software purchases when necessary,” said Dror Davidoff, CEO and co-founder of Aqua. “By working more closely with our industry-leading partners like Red Hat and IBM, we are able to leverage the multitude of sales platforms they offer to help accelerate time-to-value for our joint customers while growing our business efficiently.” Simplifying purchase “We believe Red Hat Marketplace is an essential destination to unlock the value of cloud investments,” said Lars Herrmann, senior director of technology partnerships, Red Hat. “With the marketplace, we are making it as fast and easy as possible for companies to implement the tools and technologies that can help them succeed in this hybrid multi-cloud world. We've simplified the steps to find and purchase the Aqua Platform that is tested, certified and supported on Red Hat OpenShift, and we've removed operational barriers to deploy and manage Aqua on Kubernetes-native infrastructure to secure your applications.” All solutions available through the Red Hat Marketplace have been tested and certified for Red Hat OpenShift Container Platform, allowing them to run anywhere OpenShift runs.
DigiCert, Inc., the world’s provider of TLS/SSL, IoT and other PKI solutions, announced its new DigiCert Automation Gateway. Automation Gateway launches with integration into DigiCert CertCentral® in Q4. This new automation approach is designed to accelerate the adoption of automated certificate issuance, renewal, reissuance and revocation by tackling some of the common concerns with existing offerings. Automation Gateway will provide organizations the confidence to widely deploy automation protocols within their company networks to provide greater agility. Acquiring and deploying certificates Automation Gateway lives on-premises in an enterprise network to securely monitor, automate and process certificate lifecycle events through a controllable proxied connection. It is a communication bridge between DigiCert’s various management and automation tools, such as ACME, to simplify acquiring and deploying certificates. Deployment of this offering is a significant milestone in DigiCert’s vision to promote and enable crypto-agility and shorter certificate lifecycles. Automation is key in managing security events and responding to new threats. Increased web security “DigiCert is dedicated to creating robust management and automation tools that enterprises can use to simplify their security processes and increase web security. With the constant increase in threats, enterprises need agility in how they deploy and manage certificates throughout their organization,” said Jeremy Rowley, Chief of Product at DigiCert. "Many enterprises are wary of fully adopting automated PKI solutions because of the inherent risk of needing to open their network ports to the public internet. Automation Gateway removes that risk with trusted, automated controllers and proxies.” Automation Gateway also offers failover to provide uninterrupted uptime and prevent outages. The gateway automatically replaces missing, expired or revoked certificates on connected devices. Using the gateway, any number of internal servers can be automatically updated. With smart meshed interaction, if one node goes dark in the network, devices may still acquire certificates and continue to function securely. Automation of certificate replacement Previous industry events, such as the transition from SHA-1 to SHA-2, demonstrate the need for a more agile web PKI. In addition, CA/B Forum requirements specify that a certificate must be replaced within 24 hours for key compromise and similar events, and five days if information changes or there is a technical gap in certificate contents. Automation is critical in meeting these requirements. Continued Rowley, “Automation Gateway in CertCentral will offer an intuitive experience, with smart software that remembers organizational security preferences and eliminates the manual configuration currently required for ACME certbot and other clients in use today." CertCentral Automation Tools integration When released later, Automation Gateway will join CertCentral Automation Tools to provide a completely automated certificate management solution. Currently, CertCentral Automation Tools feature the following benefits: Automation and discovery across multiple servers for larger-scale networks The ability to utilize agents for easy to manage, scalable ACME deployments for OV and EV, with DV coming soon Seamless integration with OEM solutions such as F5, Citrix NetScaler, A10 as well as popular server orchestration and management platforms such as Chef, Puppet, ServiceNow and more Customizable automation through APIs to integrate DigiCert tools and a customer’s system Auto-renew configuration via CertCentral console
Alcatraz Founder and CEO Vince Gaydarzhiev will be featured in the Security Industry Association’s (SIA) AcceleRISE 2020 virtual conference on Friday, July 31, 2020. The event highlights rising young security professionals under the age of 40. It is designed for tomorrow’s security providers to share their current successes in the field, gain momentum for the future, and connect with other rising stars in the industry. “Our RISE committee has truly outdone themselves in designing an agenda that is relevant, engaging and valuable to young professionals and their career development,” said Matt Feenan, SIA RISE chair. Disruptive Technologies panel discussion The AcceleRISE 2020 panel discussion is focused on Disruptive Technologies and how emerging technologies are providing new opportunities in the security sector. Gaydarzhiev will present at the AcceleRISE event on Friday, July 31, 2020. Gaydarzhiev’s journey into the security industry came about as a young hardware engineer while working at Apple on hardware prototyping in the iPhone’s FaceID infancy stages. Vince saw how prolific frictionless and secure access control could be managed via a cellphone application. Vince noticed the experience in physical environment was still dependent on badging, turnstiles, and security guards. Gaydarzhiev’s aimed to bring technology to provide more secure access control without the added friction or high personnel costs. Access control platform integration Our goal is to help businesses affordably and seamlessly deliver the highest level of security" Gaydarzhiev went to work developing the Alcatraz Rock platform using 3D facial authentication and AI-based continuous learning and improvement. The Rock works with any access control platform and replaces or augments badging as a credential with facial authentication, 3D sensing, and artificial intelligence to enable highly secure touchless entry into physical locations. The Rock uses passive 3D sensing, machine learning for increased security, and accurate tailgating detection while intelligently enrolling employees as they are badging in, creating a seamless access control experience. Since the Rock also detects masks, it has become the perfect post-COVID solution for businesses that want to deliver touchless security while observing state and local mask mandates. Latest technology for security Apple was not Vince’s first stint with big tech. He has also worked for some of the most renowned tech companies in the world including Planet and NVIDIA where he designed graphically-intensive solutions for Tesla, BMW, and Audi. Because Gaydarzhiev likes to learn just as much as machines, he has earned advanced engineering degrees from Stanford and the University of Southern California and has a bachelor’s in electrical engineering from the University of Central Florida. He lives in San Francisco with his wife and daughter. “I’m honored to be chosen to present at AcceleRISE 2020,” said Gaydarzhiev. “Our customers tell us, and I truly believe, we are revolutionizing access control by delivering a truly autonomous security team on the edge. Our goal is to help businesses affordably and seamlessly deliver the highest level of security with the latest in technology.”
FLIR Systems, Inc. announced availability of the FLIR Occupancy Management Solution for FLIR Brickstream 3D Gen2 to automate occupancy counting within high traffic and capacity-limited areas. To support social distancing guidelines during and following the COVID-19 pandemic, the Occupancy Management Solution provides organizations with an easy-to-use, real-time capacity counting and display tool for multiple entries and exits. Organizations can automate capacity counting for high foot-traffic spaces to maintain social distancing compliance. “Many organizations are manually measuring occupancy, but this process is often inaccurate, cumbersome and expensive,” said Paul Clayton, General Manager, Components Business at FLIR Systems. Automated monitoring solution “FLIR addressed this challenge by introducing a cost-effective, scalable, self-contained, and automated monitoring solution suitable for a variety of locations from grocery stores, stadiums, theaters, transportation hubs, to manufacturing plants, and office spaces.” Current Brickstream 3D Gen2 customers can purchase and add this feature with via a remote firmware upgrade The Occupancy Management Solution is platform agnostic with an integrated IoT architecture, which can be implemented within existing Wi-Fi access points, offering a complete edge-based solution with the Brickstream 3D Gen2 hardware. It provides a simple display dashboard for capacity updates that can be viewed by staff or customers on devices with a web browser. Remote firmware upgrade It may be used as a standalone or integrated into existing perimeter systems, making it ideal for most environments where occupancy must be closely managed. Current Brickstream 3D Gen2 customers can purchase and add this feature with via a remote firmware upgrade. This solution is part of FLIR Systems’ COVID-19 response product portfolio, which includes the FLIR EST camera series, to help organizations improve safety in public places and other high traffic areas. The FLIR Occupancy Management Solution for Brickstream 3D Gen2 is available from FLIR and its global Brickstream distribution partners.
Across the world, the impact of the current pandemic has majorly disrupted how we function in our everyday lives, as a society, and the ways in which we do our jobs. Throughout, our personal safety and wellbeing, as well as that of our families, neighbours and colleagues, has been paramount - and adapting our day-to-day lives to meet social distancing measures has been a learning curve for us all. As we start to reassemble normal life, precautionary measures will continue to be put in place to achieve the universal aim of mitigating the spread of the virus as much as possible. As different countries reach new stages of this process, some parts of the world continue to live and work in lockdown, while some are beginning to open up. This means governments, as well as businesses and organizations, will need to think beyond one-way systems and sanitation stations to contain the risk of infection as more people begin to return to the outside world. Tracing the spread of COVID-19 Of course, this will need to be driven by higher-level support from leaders in government, healthcare and technology to develop innovative ways of tracking and tracing the spread of COVID-19. From contact tracing solutions, to self-reporting apps and thermal screening cameras – governments and businesses across Europe have a new responsibility to seek and reinforce the most effective ways to ensure people’s safety. These measures are particularly pertinent to those reopening their doors as lockdown eases, and those returning to a daily routine of commuting to and serviced office spaces. As more and more people begin to move through public and commercial areas, we will rely more on technology to run in the background to ensure safety and wellbeing is monitored - much like that of the everyday CCTV camera. Thermal temperature screening cameras One piece of technology that we can expect to see as more commonplace is the thermal temperature screening cameras and monitoring system. An example of this kind of device, is D-Link’s recently launched all-in-one, intelligent fever screening kit – which includes a dual-lens thermographic camera, blackbody calibrator, as well as integrated management software. Governments, as well as businesses and organizations, will need to think beyond one-way systems and sanitation stations to contain the risk of infection The premise of temperature screening cameras like this one, is to harness thermal imaging technology coupling it with AI to identify if a person is experiencing elevated temperatures, and raise the alarm automatically when someone at risk of spreading is detected. To monitor the progression or depletion of COVID-19, technologies such as AI facial recognition will play an important role in mitigating the risks of the virus spreading. Thermal cameras that use AI can easily capture and manage employee’s temperature and stop their entrance if a fever is detected. For this reason, such devices are normally installed in a doorway or entrance to a building to quickly detect and identify those displaying symptoms before entering a building. This type of surveillance will be detrimental to the management of COVID-19 in the world of a ‘new normal’ – as companies feel their way out and learn as they go along with people’s health and wellbeing continuing to be center of the mind. Just as lockdown has had an impact on physical as well as mental health, so too will the adjustment to living life post-pandemic. Not only in getting used to and dealing with the emotional and mental pressures of life on the ‘outside’ as they leave lockdown, but they also face the very real risk of contracting the virus and the worries they may have of spreading it. Appropriate installation of temperature screening Companies and organizations have a responsibility in these times to play a supportive role towards employees, such as allowing them to continue working from home until they feel comfortable to work in an office setting. Equally, as restrictions ease, employers have a duty to make the workplace a safe place that is able to uphold the wellbeing of staff, which is where, as we wait for a vaccine, we must make use of the available technology. However, in the case of the thermal camera, in order for it to deliver effective results, it must be installed appropriately. To support this, we have outlined some key points to consider when deploying a temperature screening camera here: Choose a solution that features a blackbody calibrator – a vital part for any temperature screening device. A blackbody calibrator is the basis for accurate calibration of infrared thermography devices and allows the device to accurately detect a fever. Check for facing windows or doorways and heat sources such as radiators as these increase the risk of stray heat or cold sources throwing off readings according to the ISO standard associated with this type of equipment Be wary of weather and changes in climate as the device will need time to acclimatise – in order for readings to be clear individuals coming in from outside must wait five minutes before being screened When mounted, the camera must face individuals head-on and in parallel with their face to capture the inner eye area which is crucial for temperature reading Consider an option using AI which will automatically recognize individuals based on photos in the system Check applicability and legality of temperature screening cameras before deploying There’s a long way to go before life will fully return to normal. In the meantime, and to help everyone along the way, it’s essential that the right measures are in place to protect the physical and mental wellbeing of those we are responsible for. For anyone who is exploring options, know that there is help out there to provide guidance and expertise on the solutions that will be right for you and your business - now, as we go through the remainder of lockdown, and as we slowly move back into everyday lives.
The modern working world has evolved dramatically over the last few decades - from how and when we work, to the places we work from. Widespread internet connection advances, alongside the growth of cloud-based shared working platforms, have not only created the possibility for increasingly flexible working arrangements, but also fueled a desire to do so – particularly among millennials. The preference for flexible working has now created a widespread need for more agile workforces, saddling IT departments around the world with the task to maintain ‘business as usual’ without compromising corporate privacy. With flexible working forecasted to stay for the long haul and passwords increasingly under scrutiny, evaluating alternative secure authentication methods to keep companies’ data and networks safe is important to protect these ‘new normal’ ways of working. The end of the humble password? A recent report by Raconteur found that the most common method of authentication for securing the digital aspects of workplaces is passwords. Unfortunately, however, between phishing, hacking and simple guesswork, passwords are easily compromised – a problem that is only getting worse, with IT professionals reporting an increase in phishing attacks in the last few years. Once compromised, passwords can be used to enter untrusted apps or websites and, worst and most commonly of all, give rise to even greater data breaches. Between phishing, hacking and simple guesswork, passwords are easily compromised Alongside security concerns, 6 in 10 people worry about forgetting their passwords and, according to a recent Balbix study, 99% of people reuse the same password across different work accounts. This, undoubtedly, is a side effect of the increasingly complex character requirements implemented by many enterprises. This stress and effort leads to frustrated employees, but, more worryingly, forgotten passwords can also cost IT departments millions of dollars a year. In our flexible, hyper-connected world, it is clear then that the humble password is no longer effective. Additional or alternative layers of authentication are needed to help enterprises maintain their workplace security in a more convenient and cost-effective way. Smarter workplace authentication with biometrics Often, hacking incidents involve the use of stolen credentials. One authentication solution that could bring an end to these large-scale hacking attacks is biometrics, as unique biological traits are extremely hard to steal and spoof. In addition to being a more secure method to authenticate users and prevent fraud in companies’ networks, it is also possible to layer biometric modalities to create a highly convenient and secure multi-modal authentication solution for sensitive areas or information. Spoofing two biometric modalities, such as fingerprint and iris, in the same attack is virtually impossible, but that doesn’t mean this level of security needs to impair the UX. After all, you can put your finger on a touch sensor, while at the same time glancing at a sensor. For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees at secured access and entry points. It can also be used to add frictionless layers of additional security to any aspect of current security systems, such as key fobs or USB sticks, or to access personalized settings or employee accounts when using shared devices, such as a printer system. This way, beyond playing a role in securing the modern workplace, biometrics can also give employees greater flexibility and convenience over how, when and where they work. Privacy and biometrics - explained Many employers and employees worry about safeguarding privacy in the workplace. Considering biometric data is highly personal, it is no wonder, then, that many are concerned about collecting this data for the purpose of workplace security and what liabilities this may expose them to. For businesses, biometrics can be used in a wide variety of use cases, from securing laptops and applications to authenticating employees Employers must adhere to the relevant workplace privacy laws, such Europe’s GDPR, and this duty extends to biometrics, of course. But, providing biometrics is implemented in line with best practice, it can actually protect employees’ privacy far more effectively than its predecessor, passwords. When employers use an on-device approach, their employees can rest assured no one will be able to access or steal their biometric data, as all biometric data is stored and processed on the device - whether that is a laptop, smartphone, USB stick or key fob. Removing the need for data to ever enter the cloud, this also removes the technical and legal complexities of managing a biometric database and, if a key fob is lost for example, all parties can rest assured there is no chance of anyone else being able to use it. A win-win. Precisely because biometric data is so difficult to steal and spoof, adding biometric authentication to end-point devices can considerably reduce data breaches to keep both sensitive employee and corporate data safe and secure. Reimagining workplace security As people work more flexibly, systems are shared more frequently, and attacks get smarter, it is clear to see that passwords alone are no longer enough to secure the modern-day workplace. Adding biometric authentication to end-point devices can considerably reduce data breaches Now is the time to reassess the physical and logical access control infrastructure. To keep personal and corporate data safe, it is crucial to add new and additional authentication methods to the security infrastructure. Luckily, the benefits of biometrics are often far simpler to realize than many enterprises imagine. The beauty of biometrics is its combination of both security and convenience. Compared to other forms of authentication, biometrics offers considerably stronger protection and an enhanced UX that can easily be integrated into existing enterprise security infrastructure – without the need for huge biometric databases to manage or fear. So, whether to replace outdated passwords or as part of a multi-modal authentication system, biometrics can play an important role in pushing workplace security into a new era for both physical and logical access control.
Motion detection is a key feature of security systems in residential and commercial environments. Until recently, systems have relied heavily on closed circuit television (CCTV) and passive infrared (PIR) sensors, which both require significant investment and infrastructure to install and monitor. Developments in wireless technology are increasing home security possibilities. Few years ago, these developments led Cognitive Systems to discover that the wireless signals surrounding oneself can be used to detect motion. Known in the wireless industry as WiFi sensing, this technology brings many benefits that other motion detection solutions have not been able to provide. The working of WiFi sensing At Cognitive Systems, the company has used WiFi sensing technology to develop a motion detection solution called WiFi Motion™, which measures and interprets disruptions in RF signals transmitted between WiFi devices. When movement occurs in a space, ripples in the wireless signals are created. WiFi Motion interprets these ripples and determines if an action, such as sending a notification, is needed. Enabling this functionality in a space is incredibly simple. With a software upgrade to only one’s WiFi access point (or mesh router), motion sensing capabilities are layered into one’s WiFi network. Existing connected WiFi devices then become motion detectors without detracting from their original functions or slowing down the network. Using artificial intelligence (AI), WiFi Motion establishes a benchmark of the motionless environment and learns movement patterns over time, which could be used to predict trends. This allows unusual movement patterns to be detected with greater accuracy while decreasing the potential for costly false alerts. WiFi Motion requires no line-of-sight or installation WiFi sensing and other home monitoring solutions All of these capabilities are made possible by WiFi sensing and together create a motion detection system that provides unparalleled accuracy, coverage, privacy and affordability compared to other solutions on the market. PIR integration is far more complex and imposes electronic and physical design restrictions compared to WiFi sensing. In terms of placement, PIR systems are difficult to install, requiring line-of-sight and a device in every room for localization. WiFi Motion requires no line-of-sight or installation and is also a scalable solution compared to PIR. Much like cameras, PIRs can only cover so much space, but WiFi Motion can cover the entire home and even detect motion in the dark and through walls, without adding additional devices to the home. WiFi Motion detects less distinguishing context than cameras and microphones, but more context than regular PIR sensors for the perfect balance of privacy and highly accurate motion detection. Privacy solution While cameras have been the security solution for years, WiFi Motion offers a more affordable solution that can rival the privacy and coverage capabilities of even the most high-end cameras. With such a wide coverage area, one might think that WiFi sensing infringes on privacy, but actually, the opposite is true. With WiFi Motion, the contextual information collected cannot be used to identify a specific individual, unlike cameras which can clearly identify a person’s face or microphones, which can identify a person’s voice. It is different from other smart home security options that use cameras and microphones because it only senses motion using WiFi signals - it doesn’t “see” or “listen” like a camera or microphone would. This provides opportunities for added security in spaces where privacy might be a concern and installing a camera may not be a comfortable solution, such as bathrooms and bedrooms. The data collected is also anonymized and highly encrypted according to stringent industry privacy standards. Existing connected WiFi devices then become motion detectors Additional WiFi sensing applications Since WiFi sensing technology requires no additional hardware or subscription fees, it is much more affordable than other motion detection solutions. It can be used as a standalone solution, or it can be easily layered into more complex systems. This ease of integration, scalability and relatively low cost brings a lot of potential for various applications. Motion detection can trigger other smart devices in the network to turn lights on or off In eldercare, for example, WiFi sensing can be used to help seniors live comfortably in their homes for as long as possible. With the increasing aging population and high costs associated with care homes, the market for this application is considerable. Caregivers can use an app to monitor movement in their loved one’s home and be alerted about unusual movement patterns that could indicate a concern. For smart homes and other environments that have a network of smart devices, the artificial intelligence (AI) component of the technology allows for improvements to automated features. Motion detection can trigger other smart devices in the network to turn lights on or off or make adjustments to the temperature in a room. Security for the commercial sector For office buildings and other commercial properties, it is easy to see how all of these features could be scaled up to offer a highly accurate and cost-effective motion sensing and smart device automation solution. Cognitive Systems is closely involved with the development of WiFi sensing technology, working with various industry groups to establish standards and help it reach its full potential. WiFi Motion is merely the tip of the iceberg in terms of motion sensing possibilities, but its applications in the world of security are undeniably compelling. It is an exciting time for the wireless industry, as one works with stakeholders in the security space to explore everything this technology can do.
The task of protecting shared spaces, such as offices and schools, has become increasingly complex, particularly with ever-rising political tensions and the difficulties of assessing threats for schools, workplaces and law enforcement. Given the randomness of when and where a violent person may strike, those who manage facilities need an emergency plan, as well as robust training, detection and awareness. To gain more insights into dealing with such threats, we interviewed John Torres, President of Security and Technology Consulting, Guidepost Solutions. Guidepost Solutions is a global team of investigators, security and technology consultants, and compliance and monitoring experts. They provide security design and consulting, investigations, and compliance and monitoring leadership for critical client needs. Torres has extensive investigative and security experience. Previously, he served as the Special Agent in Charge for Homeland Security Investigations in Washington, D.C. and Virginia. His background includes more than 27 years of experience providing investigative and security management for the U.S. Departments of Homeland Security and Justice, including serving as the Acting Director and the Deputy Director of U.S. Immigration and Customs Enforcement. Q: Why is it difficult for schools, workplaces and law enforcement to assess threats of violence? How can they differentiate between a threat and a non-threat? Torres: With mobile technology and social media, threats are more than just physical. Schools are often not screening student social media accounts and are restricted in what they can and cannot monitor due to privacy laws. Proactive business and educational institutions are working closely with law enforcement, providing training and increasing awareness of potential threats or abnormal behavior. Proactive business and educational institutions are working closely with law enforcementEmerging tools include software that allows monitoring of students’ school-issued email and file storage accounts. Communications software and apps provide real-time notification of emergency messages to students, parents, employees and the community to provide critical instructions during an emergency. The combination of training and new tools has enabled trends and threatening language to be identified and appropriate authorities notified. Q: What tools and/or insights can Guidepost Solutions add to the mix? What are the elements of a “comprehensive risk assessment?” Torres: Comprehensive risk assessments include adopting a tiered approach to assessing the school or office and the surrounding environment. A typical approach includes site perimeter review, identifying gates, fencing, vehicle barriers etc., the parking lot, building exterior, interior paths of travel and individual classroom measures. Review and observation of systems including mass notification, video surveillance, access control, intrusion and visitor management, etc. are critical to ensure that they are equipped to maintain functionality in the event of power loss etc. As an insight, always engage with people, they have the knowledge of each unique facility. Elements we can add to the mix include assessments, physical security improvements and mass notification systems, as well as emergency response training, operational policies and procedures, and behavior analysis. Q: How can the elements of a risk assessment be translated into recommendations of specific technologies or processes (such as video surveillance and/or access control)? Torres: Risk assessments often drive and identify the need for technologies to be implemented into the security programs of schools, business or places of mass gathering, such as stadiums, convention centers and houses of worship. Risk assessments often drive the need for technologies to be implemented into places of mass gatheringRisk assessments help identify weaknesses in security procedure and then often support phased security enhancement programs as funds become available for investment. Each entity is different, and stakeholders should be included. For example, video surveillance may be a priority at one location but controlling the main point of entry may be more important at another. Technology and process recommendations must meet the operational needs and support the goals of the security team and operational managers. Q: How can the risk of an incident be mitigated and lives protected? Torres: While multiple steps are helpful, all of them in combination are key to implementing a comprehensive security plan. They include: Assessments – physical, cyber and procedural Physical Security Improvements – visitor management, fencing and barriers, locks and cameras Emergency Response Training – law enforcement coordination; muscle memory response Mass Notification Systems – current software, clear concise directives, testing Operational Policies and Procedures – termination, evacuation, communication, intervention Behavioral Analysis. Q: What are the elements of behavior analysis? Torres: They include things like changes in appearance and behavior, including social media behavior, and isolation from family or friends. They also include studying or taking pictures of potential targets, and real or perceived bullying. An individual may advocate violence or hate, and/or consume violent extremist information/propaganda. He or she may talk about traveling to places that sound suspicious, and/or have an obsession with weapons. Q: What is the role of training? Torres: Training is critical regarding emergency situations in schools, be it a fire drill, earthquake, lockdown, active shooter situation, etc. Training and drills educate those present, including employees and staff, with information about actions that may save lives and reduce casualties in a real emergency. Training should hold people responsible and set standards for acceptable behavior. Training is critical regarding emergency situations in schoolsThere should be a plan that is implemented, including practice and drills. You should also provide training and communication skill building classes. Develop intervention strategies. Work with HR and legal (and others as appropriate). Finally, document everything. Q: What challenges still remain? Torres: Cultural and behavioral change remains at the forefront of schools and businesses when addressing safety and security measures. A large percentage of violent acts may be preventable if a bystander shares his/her concerns with the proper authorities. According to the FBI, perpetrators exhibited behavioral indicators in 93% of incidents. And bystanders had prior knowledge in 81% of school attack incidents and 80% of terrorist-inspired behaviors or activities before an attack. Q: What progress are you seeing? Torres: With each tragedy that occurs, leaders are engaging with safety and security head on. There is a shift in schools and businesses to engage with professionals that can help them understand what they do not know. Simple things such as improved communication and enforcement of policies and procedures can have a tremendous positive impact on an organization’s security posture. Assessments and technology upgrades are important and effective, but it all starts with acknowledging the need to provide and maintain safe and secure environments for students, employees and the community.
Many venues are using access control, video surveillance systems, sensors, and additional hardware solutions as part of a broader security strategy. By utilizing so many disparate systems, corporate security teams are left with information “silos” that create inefficiencies and hamper communication. This abundance of hardware has left teams with too much data or too many tools, to manage effectively. Armored Things offers a software solution. The company’s “spatial intelligence platform” currently collects more data than other security intelligence solutions, utilizing a broader range of sources and fusing data together rather than integrating it. The platform currently focuses on taking in data from WiFi, access control, and video surveillance systems and applying machine learning to deliver customers features such as real-time predictive analytics to prevent incidents like bottlenecks or overcrowding. Spatial Intelligence is an approach to physical security that enables users to collect, manage, and interpret data in a single platform. Combine machine learning with data The term can best be used to describe how digital transformation has affected physical security. Spatial Intelligence in its infancy looked like video surveillance data combined with machine learning to produce video analytics. The spatial intelligence solutions of today can combine machine learning with data of any source, type, and size to deliver value across a large organization, not just the security team, says the company. Armored Things’ Spatial Intelligence platform unifies data from information silos to support data-driven decisions around operations and security. By fusing data from multiple sources, we can produce more consistent and useful insights for our customers” A suite of analytics, reporting and visualization tools helps customers gain a real-time understanding of people and flow in their space. By removing the guesswork of everyday decisions, the product enables customers to make data-driven decisions at a moment’s notice, according to the company. Armored Things is more than a data management tool. “By fusing data from multiple sources (rather than only cameras or only WiFi), we can produce more consistent, accurate, and useful insights for our customers,” says Kevin Davis, Chief Security Officer at Armored Things. "Being able to collect the data is the first step, but turning it into actionable intelligence is where Armored Things excels.” IP cameras and other IoT-enabled devices The range of data sources includes IP cameras and other IoT-enabled devices and even outside data sources like bus schedules and weather reports. Armored Things has built a team of public safety and technical experts with the mission to keep people safe where they live, work, and play. By leveraging emerging technology to enhance physical security, the company built the software-centric Spatial Intelligence Platform for large organizations to enhance the safety and operations of their space. Schools and education facilities are among the customers that can benefit. The leadership at Armored Things cares deeply about school safety, so the recent epidemic of campus violence has definitely been a large topic of conversation, according to the company. “By delivering our products to a greater number of customers, Armored Things hopes to continue making schools a safe place to learn and gather,” says Davis. Recently, there was a significant bottleneck lasting nearly 30 minutes at the Syracuse-Clemson soccer game. Unifying data into one platform Digital transformation is disrupting the way our customers think about physical security,” Using Armored Things technology and providing real-time data to security and operations personnel could have identified the bottleneck as it began to form. This would have notified relevant personnel, who could have taken steps to mitigate the problem before it turned into a security risk. Keeping the security infrastructure simple is imperative to success. Integrating a software solution into the security strategy shouldn’t complicate existing operations, says the company. “Armored Things Spatial Intelligence Platform can bring your security and operations into focus by unifying all of your data into one platform for ease of use,” says Davis. For this reason, the team chose to integrate not only with customers’ existing security infrastructure but with non-traditional data sources (e.g. WiFi, event schedules, ticketing) as well. “By combining and analyzing a more diverse dataset, Armored Things can help our customers make better decisions with deeper data-driven insights,” says Davis. "Digital transformation is disrupting the way our customers think about physical security,” says Davis. “As a team, our aim is to help our customers adapt to the digital age, as they transition from hardware to software-centric security solutions. Fostering organizational change is difficult, and our team hopes to make the transition process easier for our customers.”
During the Parkland, Florida, school shooting in 2018, the shooter was caught on a security camera pulling his rifle out of a duffle bag in the staircase 15 seconds before discharging the first round. However, the School Resource Officer didn’t enter the building because he wasn’t confident about the situation, and the Coral Springs Police Department had no idea what the shooter even looked like until 7 minutes and 30 seconds after the first round was fired. If the video system had included technology to recognize the gun threat in real time, alerts could have been sent to the security team. An announcement could have been made right away for all students and faculty in Building 12 to barricade their doors, and law enforcement could have responded a lot faster to a real-time feed of timely and accurate information. Automatically Recognizing Gun Threats Actuate offers such a technology, which the company says enables existing security cameras to automatically recognize gun threats and notify security in real-time. The technology is centred around a convolutional neural network (CNN) that aims to replicate how a human brain would process information. This neural network is trained to recognize what hands holding a firearm look like from hundreds of thousands of images in a proprietary data set. The technology is centred around a CNN that aims to replicate how a human brain would process information Over time, the system is able to mathematically calculate what a gun threat in a security camera feed looks like with a high degree of accuracy (well over 99% detection accuracy within the first 5 seconds), according to Actuate. “Active shooter situations are often marred by chaos and confusion,” says Sonny Tai, Chief Executive Officer of Actuate. “People are in fight-or-flight response and prioritize immediate survival instead of reaching for their phones and calling 911. When the 911 calls are made, callers often provide delayed, conflicting, and inaccurate information, inhibiting law enforcement’s ability to respond.” Enhances Law Enforcement Response Tai says Actuate helps to clear up that chaos and confusion. He says: “It provides visual intelligence of the location of the shooter, what they look like, what direction they’re heading, and what they’re armed with. This real-time information enhances law enforcement response and enables building occupants to make critical decisions that maximize survivability." AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage Tai is a Marine Corps veteran and a social entrepreneur who co-founded Actuate with the mission of addressing America’s gun violence epidemic. The start of the company stems from Tai’s upbringing in South Africa, where gun violence rates are some of the highest in the world. Growing up, several of his family friends were personally impacted, resulting in a lifelong passion for the issue of gun violence. In early 2018, Tai interviewed dozens of law enforcement leaders across the country and found that their biggest challenge in gun violence response was the lack of timely and accurate information. Actuate mitigates that challenge and enables both first responders and security staff to respond more rapidly, he says. More Than 99% Accuracy In Detecting Weapons Actuate's solution is completely AI-based, says Ben Ziomek, Chief Product Officer. AI methods including deep learning enable high levels of accuracy in detecting weapons in real-time camera footage. “Legacy, non-AI based solutions generally rely on older methods like motion detection, which is not reliable in differentiating between objects such as phones and firearms,” says Ziomek. “Our AI solution lets us achieve more than 99% accuracy in detecting weapons with an exceptionally low false-positive rate.” Ziomek runs engineering, data science, and operations for Actuate. Before joining the firm, he led teams of AI engineers and data scientists at Microsoft, leveraging AI to identify high-potential startups globally. Actuate is a software-only solution that plugs into existing security camera hardware and software, including video management systems (VMS). Existing capabilities of a customer’s VMS does initial, basic analysis and then routes the remaining video to Actuate’s processing units for AI analysis. Alerts can then be sent back however a customer wants, including through a VMS. Actuate can also feed information into a PSIM or command-and-control system if requested by a customer. Equipping Customers With AI Tools As an early-stage company, Actuate is pursuing customers through multiple routes, including directly to end-users and via security integrators, distributors, and dealers. They are currently deployed at diverse customer sites including schools, office buildings, industrial facilities, and public buildings, says Ziomek. Our current focus for the company is to get our technology into the hands of as many customers as possible “Our current focus for the company is to get our technology into the hands of as many customers as possible,” says Ziomek. “We are working closely with customers across segments and industries to equip them with the tools they need to make their spaces safer. We’re currently working on educating the market on our offerings, as this technology is very new to many security organizations.” There are no privacy or compliance concerns because Actuate stores no customer data until a weapon is detected, and even then the data is not cross-indexed with any sensitive information, says Ziomek.
Custom Consoles announces the completion and delivery of Steelbase Lite desks and a MediaWall video monitor display mounting system for the Agricultural Development Bank of Ghana (ADB). Commissioned by Virtual InfoSec Africa, the new installation is situated at ADB's headquarters in Ghana's capital city, Accra. "We were looking for a production partner with a good understanding of video technology, able to produce robustly built and ergonomically efficient control room furniture," says Bondzie Acquah, VP Operations at Virtual Infosec Africa. “With its long experience of the security business and proven ability to meet the demands of heavy industry, Custom Consoles was the logical choice both for the desks and the display mounts. Based on SteelBase Lite and MediaWall, we were able to integrate a complete system into a compact 8 by 5-meter room while at the same time ensuring that all staff could function safely and effectively. Computer equipment is housed in ventilated desk frames with easy front and rear access via black-finished lockable doors for routine technical maintenance." Video display screens Largest of the two desks is a 5.1-meter wide by a 1-meter front-to-back four-bay in-line unit designed for simultaneous use Largest of the two desks is a 5.1-meter wide by a 1-meter front-to-back four-bay in-line unit designed for simultaneous use by up to four operators. Two 24-inch video display screens are mounted in front of each work position on individually adjustable support arms. The desk is located 70 centimeters forward of a 5.2-meter wide MediaWall giving a clear view of eight 55-inch Samsung video display screens mounted in a four wide by two high configuration. Front to back depth of the MediaWall is just 50 centimeters. The second desk is a single-bay dual-screen unit measuring 1.5 meters wide by 1-meter front-to-back. This is configured for use by a supervisor. Both desks are finished in rust-colored Marmoleum with black PVC edging and silver anodized aluminum legs. The supervisor's desk faces a 76-centimeter high printer support unit with a 60 by 60-centimeter top surface, height-adjustable shelf and integral cable tray. Control room consoles "SteelBase, SteelBase Lite and MediaWall continue to be in strong demand for a very wide range of process control, security and corporate applications," says Custom Consoles' Sales Manager Gary Fuller. "We are very pleased to have worked with Virtual InfoSec Africa on this project and look forward to partnering with them in the future." A variant of Custom Consoles' long-established SteelBase series, SteelBase-Lite is a compact structured desking system which can be configured from 1.2-meter wide powder-coated modules and Marmoleum finished work surfaces, providing a self-assembly hard-wearing ergonomic solution for control room consoles. Panels and ventilation SteelBase Lite comes complete with two VESA mounts per module, mounted on height adjustable beams SteelBase Lite comes complete with two VESA mounts per module, mounted on height adjustable beams. Additional design features of the SteelBase Lite range include hinged removable access doors, 19-inch equipment racking, heavy cable management, power distribution panels and variable-speed ventilation fans. Worktops can be configured to suit individual client requirements. All elements of SteelBase and SteelBase Lite are guaranteed against component failure for five years of normal use. SteelBase-Lite is designed to conform to ISO 9241 part 5, ISO 11064 Part 4 and EN 527 Parts 1, 2 and 3. MediaWall monitor displays First announced in 2006, Custom Consoles' MediaWall allows flat-screen monitor displays of practically any width to be constructed from standard horizontal and vertical support elements. MediaWall can be used as a fully self-supporting structure or coupled directly to the studio wall. Individual screens can be positioned so that the edges meet exactly to form a continuous horizontal display limited only by the boundary of the monitor panel. All wiring is fully concealed and can enter or leave the structure at any desired point. MediaWall is available in any required element widths.
SMARTContactless, a value-added distributor for contactless solutions, ABS Technology and STid have been selected by INIT Innovation in Transportation Inc., a US provider of intelligent transportation systems for public transit, to create new cellphone access control for its employees and visitors. STid Mobile ID, pictured, from the access control product company STid, is a Bluetooth access control reader. Common supported credential technologies are MIFARE, MIFARE DESFire EV1/EV2, NFC and STid’s cellphone credentials using smartphone and Bluetooth for communications. The solution includes a free cellphone app, the latest multi-technologies Architect Blue readers, and offline and online programming tools. Mobile Access INIT Innovation in Transportation Inc. has installed numerous STid’s Architect Blue readers at doors and entrances to secure their new Corporate head offices. Employees and visitors use STid’s patented identification mode features and can access the building or other sensitive entrances within the offices, without taking their smartphones out of the pocket or bag. Jamie Thomas, Systems Engineer for ABS technology in Virginia Beach, Virginia, says of the STid Mobile ID: “This Bluetooth reader has so much technology built into it; it’s future proof, easy to install and program.” Feedback on the cellphone access has been positive and INIT USA Inc. is exploring the STid Mobile ID’s options to remotely assign and revoke cellphone credentials to employees and visitors over the air. Access control solution INIT USA Inc. Director of IT, David Page said: “As a provider of innovative technology to our public transit customers, INIT desired an access control solution which mirrored our innovative technology solutions, matched our company culture, and was simple to install and administer. In addition, we wanted the ability to start with a small proof of concept and eventually grow it as this type of technology inevitably transitions to a fundamental employee expectation instead of a bleeding edge innovation.” RFID reader solutions Robert Gailing, President of SMARTContactless, STid’s US Distributor said: “STid is really leading the market with innovative RFID reader solutions for security-minded professionals and end-users. The new STid Mobile ID reader solution, with its five methods of cellphone credential presentation using the smartphone and customizable distance to 60 feet, there is virtually nowhere the reader cannot be utilized throughout any access control deployment.” According to Vincent Dupart, CEO of STid, this new implementation is a testament of the growing smartphone adoption that merges security and convenience. “We are pleased that both INIT USA Inc. employees and managers are enjoying the experience. We are also proud to work with strategic partners like SMARTContactless, offering high-quality customer support to promote our cellphone access solution. The ability to use smartphones for high-security access control is becoming increasingly important, as these devices are part of our everyday lives in the business workplace.”
Boon Edam Inc., a provider of security entrances and architectural revolving doors, announces that 32-41 West Street, a retail headquarters building in Reading, United Kingdom, has upgraded the building’s entrance with an energy-saving revolving door and an array of optical turnstiles for increased lobby security. Nestled in Reading, Berkshire, in the United Kingdom, 32-41 West Street serves as a home to 580+ employees working in over 130,000 sq. ft. of office space. In 2018, Morey Smith Architects were hired to redesign the headquarters building, including an office expansion, as well as a new café and staff gym. Revolving door solution The building entry and atrium were to also undergo an upgrade, with architects designing with aesthetics and high-quality functionality in mind. First, the entrance to the building was outfitted with a unique revolving door solution. Architects combined features of two revolving door models to create the ultimate entrance Architects combined features of two revolving door models to create the ultimate entrance. They mixed the all-glass look of the Crystal TQ with the minimal metal framing of the TQA to create an automatic entrance that would add to the prestige of the building while also saving on energy and creating a comfortable environment inside. The revolving door was also connected to the building’s access control system so that it could be locked afterhours and still allow access to employees with an authorized credential. Tall glass barriers For security into the atrium, architects didn’t want to impose on the open, airy feeling of the building’s large atrium. As a result, Morey Smith installed an array of Speedlane Swing optical turnstiles with tall glass barriers to deter and detect tailgating into the office space. The turnstiles were placed near a reception desk so that staff are able to respond to alarms, as well as grant access to authorized visitors through the use of a BoonTouch remote control panel. James Cox, Area Sales Manager for Boon Edam UK mentions, “Boon Edam optical turnstiles are always a popular choice for corporate offices, not only for security reasons but because they’re aesthetically nice to look at which is ideal for an open environment building.”
IBM and Daimler announced that they have expanded their agreement and Daimler will implement an intelligent cloud solution and migrate its global after-sales portal to the IBM public cloud. This will allow Daimler to drive innovation, while also benefiting from one of the industry's most open and secure public clouds for business. The global after-sales portal is key for Daimler's market activities, supporting workshop processes in the retail sector. In order to meet the growing demands of the portal core products, the company was looking for a new technical platform to improve agility and scalability, while maintaining a high level of security. Protection of sensitive data The platform, based on the IBM Cloud Kubernetes Service, is designed to allow the client to transform the application into a modern and scalable microservices architecture. Hosting its portal on IBM public cloud will help Daimler scale as needed and quickly introduce new offerings to help meet the needs of its users. At the same time, the data will be transferred and stored in the IBM public cloud, which is protected by comprehensive security capabilities, such as IBM Hyper Protect Services, accommodating Daimler's highest requirements for the protection of sensitive data. Encryption "As organizations redefine their operations by adopting public cloud, they're able to drive innovation and modernize their infrastructures, while still prioritizing security," said Howard Boville, Senior Vice President, IBM Cloud. "IBM public cloud provides industry-leading encryption capabilities that give our clients exclusive control of their keys and data, delivering our highest level of protection for our clients' sensitive data; a key requirement for business across all highly regulated industries." Leveraging IBM public cloud will offer a significant number of advantages; it is designed to be highly scalable, and therefore the efficient administration of the services can help to lower subsequent costs. Furthermore, critical services in the IBM Cloud's multi-zone regions achieve 99.99% platform availability, thus providing reliable operation.
A used car lot owner had re-occurring issues with intruders cutting holes in the perimeter fence during night-time hours and vandalizing or burglarizing the area. The intruders would not enter the small office building, so the security system was never triggered. The customer did own a video surveillance system and it would record criminal activity but it did not prevent or deter crime. Integrating motion detectors Using the existing intrusion alarm panel (Interlogix NX8-v2 panel) and the existing video system, the system integrator introduced two OPTEX Visual Verification Bridges and four OPTEX Redwall SIP-3020 Outdoor PIR motion detectors. The motion detectors were installed over the two main perimeter light poles pointing into the lot with IP cameras located directly above each of the motion detectors. Access to camera visual With the two Visual Verification Bridges installed, the integrator can provide operators immediate access to eight live cameras during every alarm event. The Redwall SIP-3020 provided up to 30m of distance coverage and 20m width, complete with anti-masking and vandal tampers. With this simple but effective solution, the integrator was able to provide their customer with immediate visual verification of alarm sensors, only when the alarm panel is armed. Wireless key fobs were provided so the dealer can arm and disarm the system from outside the gate helping to eliminate false alarms during arming and disarming. Reduced false alarms Since the completion of this installation, there have been several nuisance alarms caused by cats that were immediately disregarded. Due to the visual verification solution there was no intrusion and the client has not had any vandalism or crime since. Per the customer’s request, the OPTEX Bridge has been installed on three additional car lots.
Check Point has introduced CloudGuard Cloud Native Security, a fully-automated cloud platform that enables customers to seamlessly protect all of their cloud deployments and workloads, and manage security through a single pane of glass. CloudGuard streamlines and simplifies cloud security, preventing the most advanced 6th generation cyber-attacks from impacting organizations’ cloud environments, and enables them to take full advantage of the speed and agility of cloud. Rapid migration to the cloud is the biggest cause of breakages in enterprise security architectures, according to the SANS 2020 Cybersecurity Spending Survey, with over half of respondents citing increased use of public clouds as the leading cause of security disruption. The COVID-19 pandemic has magnified this, as companies scramble to support mass remote working. Their current security controls cannot cope with the speed, scale and complexity of cloud deployments, leaving them vulnerable to attacks and breaches. Security across cloud implementations “Cloud security can be challenging; however, the real challenge is multi-cloud, as IDC data continually shows that over 80% of organizations have multiple cloud providers. The goal is one set of policies to rule them all,” said Frank Dickson, Program Vice President, Security & Trust at IDC. “Check Point's multi-cloud security platform looks to unify security across private and public cloud implementations, essentially making cloud security agnostic of the resident software define compute environment.” Check Point CloudGuard addresses these challenges, delivering comprehensive and easy to manage cloud security platform. It gives frictionless deployment and control of the advanced security protections to any cloud environment and workload, and enables security processes to be automated to meet DevOps’ demands for rapid deployment and agility. “Security is continually cited as a barrier to enterprise cloud deployments, because traditional security controls are not agile enough to handle the cloud’s speed and scale,” said Itai Greenberg, VP of Product Management, Check Point. “CloudGuard solves this problem, giving organizations the advanced cloud-native security across their cloud estates, together with holistic visibility and easy, automated management and enforcement of security policies.” CloudGuard’s Unified Cloud Native Security Fully integrated security with advanced threat prevention: Prevents APTs and zero-days from infecting clouds and workloads with unified security, and workload runtime protection, including firewalling, IPS, Application Control, IPsec VPN, Antivirus and Anti-Bot, powered by the industry’s real-time, cloud-based threat intelligence. High-fidelity cloud security posture management: CloudGuard gives unified, at-a-glance visibility across organizations’ multi-cloud environments, enabling continuous analysis and control of their cloud security posture from CI/CD to production environments. Automated security for any workload in any cloud: CloudGuard delivers true cloud-agnostic security, enabling organizations to automatically secure any workload, anywhere with auto-provisioning, auto-scaling and automated policy updates. It enables holistic, single-console security management as well as run time protection for serverless and container-based applications, in multi-cloud environments. Supporting Partner and customer quotes: “Check Point CloudGuard has been a saving grace for Gas South. It is the only solution that gives us secure, stable, complete access to our critical applications and services in Azure,” said Rajiv Thomas, Senior Systems Engineer, Gas South. “When deploying a multi-cloud environment, you need to have a consistent tool that plays across all the platforms,” said Sreeni Kancharla, VP & Chief Information Security Officer, Cadence. “Using the cloud-agnostic CloudGuard service, I only need to train an individual on one set of tools and he can manage our total cloud environment very effectively.” Ann Johnson, Corporate Vice President, Cybersecurity Solutions Group at Microsoft Corp. said, “Where people often thought about security as a solution to deploy on top of existing infrastructure, events like COVID-19 showcase the critical need for truly integrated cloud security for organizations of all sizes. Solutions like CloudGuard running on Microsoft Azure help to empower our customers through a unified platform which has become a business imperative as more organizations embrace cloud-based protections.”
Round table discussion
Public spaces provide soft targets and are often the sites of terrorist or active shooter attacks. Public spaces, by definition, require easy accessibility and unrestricted movement. Given that openness, what security technologies can provide real results? We asked this week’s Expert Panel Roundtable: How is technology innovation impacting the security of public spaces?
Artificial intelligence is on the verge of changing the face of multiple industries – from healthcare to entertainment to finance, from data security to manufacturing to the cars we drive (or that will drive themselves!) In the physical security market, AI has garnered a lot of attention as a buzzword and as a harbinger of things to come. We asked this week's Expert Panel Roundtable: What security markets are most likely to embrace artificial intelligence (AI)?
The physical security industry is embracing the cloud in a big way. Cloud-based systems – which involve accessing a shared pool of information technology resources via the Internet – are much higher-profile in the video and access control markets, and large and small companies are getting on the cloud bandwagon. We asked this week's Expert Panel Roundtable: What factors are contributing to growth in cloud systems in the security market?