Oil & Gas Security
Dahua Technology, a front-runner video-centric smart IoT solution and service provider, is proud to announce that the Dahua Global Virtual Innovation Center is now available to its global customers. By demonstrating its latest technologies, products, and solutions through an online virtual showroom, the center can support customers in designing excellent security systems. Due to the drastic impact of COVID-19, people are having difficulties in gaining access and experiencing the development of...
The six new cameras added to the Wisenet X PTZ PLUS range have been developed by Hanwha Techwin to enable users to capture evidence grade images of activity occurring in large open area applications. The ability of the new 2MP, 6MP, and 4K Wisenet X PTZ PLUS cameras to operate effectively in environments such as airports, car parks, industrial estates, stadia, and city centers, is enhanced by a long list of technically advanced features, which include AI-based object tracking, precise PTZ contr...
Hanwha Techwin America, a global supplier of IP and analog video surveillance solutions, unveiled two new Wisenet X series NVRs that support the industry’s first video playback and recording of up to 8K super-high-resolution images. 8K recording can cover large areas with sufficient pixel density to allow operators to zoom in digitally and investigate image details in real-time or forensically and still retain a clear image. Recording capacity And storage The new NVRs in the Wisenet X se...
Johnson Controls, the front-runner for smart, healthy, and sustainable buildings, announced new Environmental, Social, and Governance (ESG) commitments, science-based targets as well as a net zero carbon pledge to support a healthy, more sustainable planet over the next two decades. The company’s and customers’ emissions reduction will be driven by Johnson Controls’ OpenBlue technologies and innovations which leverage big data and artificial intelligence to optimize buildings s...
We are several weeks into 2021, and it is already shaping up to be an eventful year. The happenings and trends from 2020 will likely carry over into the new year, but in a fast-moving industry such as ours, there will also be additional trends to watch. Looking toward the year ahead, we asked this week’s Expert Panel Roundtable: What will be the biggest security trends in 2021?
MSA Safety Incorporated announced it has acquired U.K.-based Bristol Uniforms in an all-cash transaction valued at approximately $60 million. The acquisition strengthens MSA's position as a front-runner in fire service PPE products while providing an avenue to expand its business in the U.K. and key European markets. Headquartered in Bristol, U.K., Bristol Uniforms is a foremost innovator and provider of protective apparel to the fire and rescue services sector, with annual revenue of approxima...
The COVID-19 pandemic has changed the way we live our lives and the way we do business. Restrictions have been implemented to protect our health, affecting us as individuals and the operations of our healthcare systems, companies, organizations, and schools, as well as public and private institutions. Many new behaviors, such as physical distancing, virtual meetings, and improved hygiene measures, will most likely linger as we gradually get back to normal. With smart solutions, we can help each other stick to the new routines. The COVID-19 pandemic has changed the way one lives their lives and the way one does business. Restrictions have been implemented to protect ones health, affecting one as individuals and the operations of the healthcare systems, companies, organisations and schools, as well as public and private institutions. Many new behaviours, such as physical distancing, virtual meetings and improved hygiene measures, will most likely linger as one gradually gets back to normal. With smart solutions, one can help each other stick to the new routines. Axis tried and tested solutions are designed to increase security and maximise business performance and operational efficiency. In addition, they offer improved safety – never more important than in times of a pandemic. They allow us to carry on with ones daily business while protecting ourselves and the people around us. Solutions range from touchless access to buildings, public address systems for voice messages and reminders, remote communication to keep physical distance to crowd and occupancy management to monitor and control the flow of people. They also include live streaming and broadcasting to keep operations running, as well as remote services to manage sites from a distance - solutions that support safe behaviours over time. Touchless access control With AXIS Visitor Access there is no need to open doors, visitors will get a QR code instead of an access card to be allowed into a building A system for touchless access control makes it easier to comply with physical distancing and increased hygiene requirements. With AXIS Visitor Access there is no need to physically open doors to trusted visitors or buzz them in – visitors will get a QR code instead of an access card to be allowed into a building. They can be granted access at specific times, and should someone change the schedule or cancel, it is possible to revoke or adjust their access as needed. This way, one is always completely in control, knowing when the visitor has arrived and left the building. Public address systems With public address systems, you can manage messages and updates in environments like schools, retail stores, hotels, public buildings and city environments. These include scheduled regular reminders, event-triggered announcements or live voice messages when a situation arises that requires immediate action. It is, for example, possible to run a recurrent message in scheduled intervals to remind people to wash their hands and use hand sanitizers as well as to keep physical distance or to stay at home when they are feeling sick. Event-triggered announcements can be used to tell people that an entrance now has become an exit and that they need to enter through another door, or to inform them that the maximum number of people allowed in a certain area has been reached and that they cannot enter right now. Live voice messages are used when a situation arises that requires immediate action, for example, to remind people to keep physical distance when a room or site is getting too crowded. Remote communication To meet the requirements of physical distancing, it is possible to communicate remotely and get a visual status, grant access from a distance and make live announcements. Axis network door stations let you speak with visitors face-to-face from remote locations, offering secure, hassle-free access to premises for employees and known visitors. Door stations can be used as information points or as emergency phones within a larger area like a city, park, or a school or as a flexible alternative to traditional front desk receptions. They also allow hospital staff to monitor and communicate with patients without having to enter the room. This means fewer changes into protective clothing and reduced use of protective equipment for the staff – without compromising patient safety. Have a look at Axis cooperation with the Nemours Children's Hospital in Orlando, Florida, to see how it works. Crowd control AXIS People Counter counts the number of people who enter and exit a building or site, and when they do it By not allowing too many people in one place at the same time, it is easier to follow physical distancing restrictions. Systems for people counting, crowd control and occupancy estimation help manage visitor traffic. For example, by setting thresholds it’s possible to handle how many people are allowed in a certain space at a time. They can also be used to trigger actions, such as cleaning, stopping the flow of people, calling for extra staff to manage queues etc. AXIS People Counter counts the number of people who enter and exit a building or site, and when they do it. By analysing the numbers, it is easy to plan accordingly, make informed decisions, take immediate action, improve services and operational efficiency. It can also be used to trigger an action – for example, to set up a number-based alert to trigger the desired action when a certain number of people have entered the premises. Occupancy estimation AXIS Occupancy Estimator provides real-time data on how many people are present in a building or site. It is possible to synchronise multiple units within a building and add additional cameras anytime. Remote configuration, management and monitoring make it easy to view statistics from several cameras and locations at the same time, while AXIS Queue Monitor is a cost-efficient application for queue management and analysis. It provides real-time data that can help identify where bottlenecks occur, understands service-cycle timing and improves visitors' overall experience in stores, hotels, public buildings, banks etc. Live streaming and broadcasting Always a practical solution, but especially useful when there are travel and meeting restrictions in force, live streaming and broadcasting make it possible to share information with a broader audience in auditoriums, classrooms and places of worship, for example, while adhering to requirements for physical distancing. And since it minimises unnecessary travel, this is also environmentally sustainable. Remote services Axis Secure Remote Access simplifies the installation of remote access to surveillance systems Remote services make it easier to follow physical distancing restrictions and avoid unnecessary visits to a site, using remote connection, planning and device management. Security installers and system administrators can avoid a physical visit to the site but still successfully design a surveillance system, connect to remote cameras, manage devices, upgrade firmware or renew certificates. AXIS Device Manager is a highly effective on-premise tool that promotes physical distancing by allowing remote monitoring of all devices. Security installers and system administrators can manage all major installation, security and maintenance tasks remotely. It is compatible with most Axis network cameras, access control and audio devices, and allows for management of multiple sites from one central location, including updates of product firmware and certificate management and renewal. The Axis Secure Remote Access is a service that significantly simplifies the installation of remote access to surveillance systems. It is a technology that makes it possible for a smartphone or PC client to access Axis network cameras when the client and the cameras are located on different local networks. Connecting to remote cameras can be a challenge, especially when the cameras are located behind routers or firewalls. Once enabled it is automatically configured and removes the need for manual port-forwarding and router configuration. Impact for the short- and long-term Axis offers innovative and available solutions that increase security and maximise business performance and operational efficiency, and, above all, allow one to carry on with ones daily business while protecting oneselves and the people around – today and tomorrow.
The Security Industry Association (SIA) has named five young security professionals as the recipients of the 2021 SIA RISE Scholarship, a program offered through SIA’s RISE community, which supports the education and career development goals of young industry talent. Through this scholarship program, open to SIA student members and RISE members who are employees at SIA member companies each awardee will receive a $3,000 scholarship to use toward continuing education and professional development courses, SIA program offerings and/or other academic or education programs. Scholarship funds can be used to expand knowledge in the areas of business, human resources (HR), information technology (IT), marketing, sales, project management, security engineering, and/or risk management. Young security professionals “The 2021 SIA RISE Scholarship awardees are an extraordinary group of young security professionals who represent tomorrow’s industry leaders,” said SIA CEO Don Erickson. “SIA is proud to help foster the careers of these talented honourees, and I look forward to seeing their many accomplishments and successes to come.” Winners for the 2021 SIA RISE Scholarship Nadim Hammoud, Software Developer, Feenics As a key member of the software development at Feenics, Nadim Hammoud has contributed to multiple new features in production and bug fixes, built proofs of concept for prospective clients, and contributed new tests to the automated testing of the company’s web API. Hammoud plans to use the SIA RISE Scholarship funds toward a computer and network security course and certification in AI He has a strong interest in the latest technologies, including cloud computing and machine learning. Prior to his time at Feenics, Hammoud served as a teaching assistant at Carleton University and held engineering and software development positions at Bertrandt and Tactical Technologies Inc. He holds bachelor’s degrees in computer science and biomedical and mechanical engineering from Carleton University. Hammoud plans to use the SIA RISE Scholarship funds toward a computer and network security course, a professional certification in the field of artificial intelligence, and attendance at industry events. Olivia Peralta, Account Executive, Allegion In her role as an account executive at Allegion, Olivia Peralta works with teams around the world to plan and sell access control projects – from teaching the company’s security software to implementing hardware installations hosted on the cloud for physical security end-users. Prior to her time at Allegion, she served as an account executive at ISONAS Access Control and completed communications internships at Western Resource Advocates and the Oregon Natural Desert Association. She holds bachelor’s degrees in environmental sciences and communication and environmental studies from Northern Arizona University and a continuing education certification from Colorado Water Education’s Water Educator Network and is IPVM University Access Control certified. Peralta plans to use the scholarship funds toward earning SIA’s Certified Security Project Manager certification and pursuing an education that bridges the gap between strategy, design, and product delivery. Matthew Rios, Regional Sales Manager, Axis Communications Rios plans to use the scholarship funds toward completing the EC-Council MasterClass Certified Ethical Hacker certification In his role at Axis Communications, Matthew Rios promotes the use of IP video and Axis cameras to integrators, distributors, consultants, and end-users and maintains fluid and enthusiastic relationships with current and prospective customers. Prior to his time at Axis Communications, Rios held sales management roles at Hanwha Techwin America, Honeywell, and R&D Lock and Alarm. He holds master’s and bachelor’s degrees in cybersecurity from Fordham University and a bachelor’s degree in the homeland and corporate security from St. John’s University. Rios plans to use the scholarship funds toward completing the EC-Council MasterClass Certified Ethical Hacker certification. Mary Sharp, HRA, Stanley Access Technologies As a key member of the HR team at Stanley Access Technologies, Mary Sharp is responsible for over 220 professional hourly, non-union service and install technicians and provides support on major change management and organization redesign efforts and issues pertaining to team cohesiveness, dynamics, and management. Prior to her time at Stanley Access Technologies, she held HR and administrative roles at Stanley Healthcare, Infrasource Underground Construction, and Frontline Private Security. She holds a bachelor’s degree in ethics and public policy from the University of Iowa. Sharp will use the scholarship funds toward obtaining the Society for Human Resource Management’s SHRM-CP certification. Trevor Zuerlein, System Designer, VTI Security Zuerlein plans to use the scholarship funds to pursue further education in IT, become a member of (ISC)², and to earn CISSP credentialTrevor Zuerlein started at VTI Security in 2017 as a security systems technician and now serves as a system engineer; Zuerlein is skilled in access control security systems, security cameras, computer repair, computer science, technical writing, and AC/DC electronics. Before his time at VTI Security, he held IT and sales roles with Time Warner Cable, Mead Lumber, and Archer Daniels Midland Company. Zuerlein holds an associate’s degree in information technology from Central Community College. He plans to use the scholarship funds to pursue further education in the IT field, become a member of (ISC)², and work toward his goal of earning the Certified Information Systems Security Professional credential. Networking events SIA RISE is a community that fosters the careers of young professionals in the security industry. In addition to awarding the annual SIA RISE Scholarship, SIA RISE offers fun networking events for young professionals, created the RISE Microlearning Series of mini-webinars on top professional development topics, hosts career growth webinars and trade show education tracks. Mentorship program The recently launched the Talent Inclusion Mentorship Education (TIME) mentorship program for early and mid-career professionals in the security industry and presents the annual AcceleRISE conference, an essential experience designed to ignite new thinking, strengthen leadership and sharpen business acumen in young security talent. RISE is available to all employees at SIA member companies who are young professionals under 40 or have been in the security industry for less than two years.
Following the release of FLIR United Video Management System 9.0 (United VMS) in August 2020, FLIR announced the global availability of United VMS 9.0.1 with new advanced features. The latest platform update offers further streamlined access to system status and alarms around the clock for security teams to react to threat activities faster while enjoying improved reporting and cybersecurity functionality. Included advancements The advancements include updates to the FLIR Latitude VMS Software as well as Horizon and FLIR Meridian Network Video Recorders (NVR), featuring: The ability to access video and alarms from anywhere at any time using EZ Client for mobile devices, the FLIR web-based, feature-rich application Streamlined control center operations with Quick View, the new optimized video scene tracking capability Access to system events for improved cybersecurity within the United VMS reporting tool, as well as the sign-off reporting and the capability to produce custom reports Additional bug fixes and other general software enhancements Enhancing the Health Monitor tool The United VMS 9.0.1 updates enhance the Health Monitor tool improvements that were launched with United VMS 9.0, which proactively monitors system health and alerts security personnel to issues before downtime occurs. This offers the ability to securely access video assets to receive event alerts anywhere and anytime, improves efficiency, and increases peace of mind. Supporting cameras and VMS Through an open platform solution, the system efficiently supports various visible cameras, thermal cameras, radars, and a combination of all three. Further, United VMS can accurately match any size installation while improving cost efficiencies through scalability and centralized management—no matter if the system supports a single location or multiple sites across the globe. The United VMS pricing structure provides extensive flexibility for deployment, including customizable software service agreements for simplified business continuity, further enabling critical facilities to make the most of this open platform solution while future-proofing its security system. Download for free Customers that previously purchased United VMS 9.0 can now download the update to United VMS 9.0.1 for free, other existing customers can contact FLIR support to get their system upgraded.
Energy is the pulse of day-to-day life, but the drive for net zero will require a massive change in the way one creates and use it. With new technologies and complex integration needed, it is increasingly clear that there is one important factor in making the future integrated energy systems work: data. That is the thinking behind the 14 January All-Energy/Dcarbonise webinar sponsored by UK Research and Innovation (UKRI) and chaired by Laura Sandys CBE, Chair of the Government’s Energy Data Taskforce and Non-Executive Director, SGN & Energy System Catapult and with an impressive panel of speakers from BEIS, Ofgem, UKRI, Grid Edge and Kaluza. Distributed energy Already, smart technology is entering our homes, and companies are using big data to respond better to consumer preferences. In the new energy future, distributed energy will clearly play a role. People are learning that digital technologies can make distributed energy the cheapest and cleanest form of energy. Local energy systems UKRI’s Prospering from the Energy Revolution program is pioneering the data-enabled systems approach to unlock the benefits of smart local energy systems. These systems improve the efficiency of existing infrastructure, capture value, and provide local jobs, helping to distribute prosperity; while society gains clean, cheap energy delivered in ways that suit modern net zero lives, lived locally. Speakers Dinker Bhardwaj, Head of Data Policy, Smart Energy, Department for Business, Energy and Industrial Strategy (BEIS) Steven Steer, Head of Data, Ofgem Rob Saunders, Challenge Director, Prospering from the Energy Revolution, UKRI Dr. Jim Scott, Co-founder and Chief Product Officer, Grid Edge Valts Grintals, Senior Flexibility Analyst, Kaluza Discussion panel and topics “Having held 26 webinars in a six-month period in 2020, viewed live or on-demand 17,100 times, we are breaking our followers in gently with just one webinar in January,” explained Portfolio and Event Director, Jonathan Heastie of Reed Exhibitions. The session brings together the government, the energy disruptors, and the regulators to discuss: How could better energy data satisfy both households and industry? What policies and regulations are needed to support innovative data-based solutions to provide new services? How can one ensure these innovations benefit diverse consumers, and protect everyone against emerging risks? What data frameworks are needed to enable local infrastructure investment and innovation at scale and pace in different places? Acknowledgment Jonathan Heastie continued, “We are grateful to UKRI for their on-going sponsorship. Their earlier webinar, ‘UKRI’s Road to Net Zero: Investing for Innovation’ held as part of our November All-Energy/Dcarbonise Virtual Summit is available for on-demand viewing.” “We look forward to welcoming their speakers and our audience on 14 January and, in the meantime, wish you all a happy holiday period and hope for some degree of normality to return in the New Year.” “We will be staging All-Energy and the co-located Dcarbonise at Glasgow’s SEC on 18 and 19 August. The Call for Papers is open on the All-Energy website at www.all-energy.co.uk with a closing date of 31 March 2021.”
The video-based fire detection Aviotec IP starlight 8000 from Bosch can now be used in environments without visible light. With the help of newly developed AI algorithms for video analytics, Aviotec's firmware version 7.72 is now able to reliably detect smoke and flames even with pure infrared lighting. Up to now, it was already possible with Aviotec to reliably detect flames and smoke in difficult lighting conditions down to a minimum of 2 Lux. Expanded field of application There are many applications in dark environments in which the new version of Aviotec offers an optimal solution for customers. Wherever there is a high fire hazard or a high fire load, for example in logistics and production, Aviotec in combination with IR-lighting is a suitable fire protection system to detect fires as they occur. Operators of warehouses that contain packaging material and are not illuminated at night or warehouses that have no lighting at all can benefit from this, for example, so that the risk of fire is significantly reduced from the outset due to lack of electricity. Power-over-Ethernet (PoE) Power-over-Ethernet (PoE) does not require the installation of power lines for Aviotec. In conjunction with IR lighting, Aviotec's new firmware version also reduces the risk of fire in industries that work in two shifts and do not use conventional lighting at night. Aviotec also offers a reliable solution for aircraft hangars, where visible interior lighting has been deliberately omitted for reasons of burglary protection outside working hours. The same applies to archives with particularly valuable documents and correspondingly high fire load. In all these cases, Aviotec ensures a particularly fast and reliable fire detection, since fires can be detected directly at the source of the fire without the need for the smoke to reach a fire detector. Video-based fire detection Aviotec can be used in almost all areas of fire protection, whether in daylight or poor lighting conditions "From daylight to poor lighting conditions to situations where there is no visible light at all - since the market launch of Aviotec in 2016, we have continuously been setting new benchmarks in video-based fire detection,” comments Soeren Wittmann, Product Manager at Bosch Building Technologies. "This means that this promising technology can now be used in almost all areas of fire protection." Additional benefits of video surveillance and analysis The intelligent video analytics is directly integrated into Aviotec. In all environments, the installed cameras can be used simultaneously for fire detection and video surveillance, further reducing the installation and operating costs considerably. VdS and CSIRO TS010 certified solution As the first solution for video-based fire detection, Aviotec has already passed the demanding test procedure of VdS Schadenverhütung GmbH in 2018. Not only functionality and reliability were confirmed, but also the high immunity against false alarms. In addition, Aviotec IP starlight 8000 received certification according to the Australian standard CSIRO TS010 for video-based fire detection systems in April 2019. The firmware version 7.72 of Aviotec IP starlight 8000 is now available. Operators of existing Aviotec solutions can upgrade their system to the new version by a free firmware update.
Security personnel must be able to quickly detect unauthorized vehicles and individuals at critical infrastructure sites. Without intrusion detection, entities like electrical substations can be subject to physical attacks. 88 percent of substations experience at least one break-in every year and 10 percent see more than 20 intrusions in the same time frame, according to CIGRE, a global electricity industry organization. To safeguard remote substations from external threats, electric utilities are relying on durable thermal cameras for superior monitoring and protection. Remote substation security The failure of a key substation caused by a security breach would have a debilitating effect on homeowners, businesses, and mission-critical infrastructure. While physical security is a top priority for utilities, designing, installing, and operating a perimeter system requires skill. Remote location, limited network connectivity, minimal lighting, internal security audits, and compliance with North American Electric Reliability Corporation are some of the challenges that both substation security directors and system integrators face. Perimeter Intrusion Detection System (PIDS) Since its arrival on the mainstream security scene a few decades ago, thermal security cameras have quickly become the optimal solution for remote substation perimeter security, due to their ability to monitor perimeters day and night in adverse weather conditions as well as in harsh environments.Thermal cameras measure the minute differences in heat signatures emitted by objects and people to produce high-contrast images and reliable intrusion detection. They enable security personnel to detect an intruder before they ever reach the perimeter for early intervention. Sensor quality FLIR's perimeter cameras offer the widest selection of lenses and detection ranges, adaptable to both large and small deployments As the industry front-runner in advanced thermal technology, FLIR provides the best sensor quality available. FLIR’s total security solution featuring a diverse suite of perimeter cameras offers the widest selection of lenses and detection ranges, adaptable to both large and small deployments. FLIR’s track record of success is just one of the reasons why utilities choose FLIR cameras time and again. Design recommendations When deploying thermal cameras at substations, there are several factors to consider to optimise performance. Here are some tips from the FLIR experts.Identify What One Needs to Protect: Assess the substation’s unique needs, define one's threats, and determine which area one needs to monitor. For rural or small substations miles away from the nearest city, position one's cameras so one has a solid view of the outside perimeter. If anyone approaches, one wants to have ample warning. For substations in urban areas that are next to public lands and walkways, it may not be cost-effective to look out as pedestrians can easily generate nuisance alerts. In these scenarios, thermal cameras that survey the interior of the substation may be the better option. Make the Most of Existing Infrastructure: Thermal cameras must be mounted at a minimum of 12-15 feet above the ground. However, some substation fences are only 6-8 feet tall. In this case, consider mounting cameras on telephone poles or tower structures. Utilizing these existing structures instead of digging new trenches can save one both time and money. Select the Right Camera for your Application: For small substations that are less than an acre, deploying a couple of FLIR Elara™ FC-Series ID cameras, which feature onboard analytics, along the fence line will often do the trick. For short to mid-range needs, the FLIR Elara FB-Series is a great, economical option. Install a visible camera or a camera that provides both thermal and optical imagers, like FLIR Saros™ DH-390 Dome at the gate, to monitor general traffic. For larger substations (around two acres) that are high-value sites, consider deploying a mix of FLIR FC-Series ID cameras with the FLIR Saros™ DM-Series to cover the fence line. Additionally, mount a pan-tilt camera with both visible and thermal streams, such as the FLIR Elara™ DX-Series or FLIR Triton™ PT-Series, to look around the perimeter for superior monitoring and threat assessment. Choose the accurate software As a final consideration, choose the right software to streamline management, operations, and functionality. For large applications where customers need to manage surveillance, access control, radar, and other disparate systems on one platform, consider command and control software. For enterprise-level surveillance operations, a video management system is optimal and for small applications using just a few cameras, a network video recorder is sufficient. Regardless of the size of the project, partner with an expert team that can help assess, design, installs, and program the right system for one's application.
The explosion of artificial intelligence used to enhance business processes, propel innovative products, and further automation has touched essentially every industry to date. The security sector, notable for its maturity and complexity, is not exempt from the AI tidal wave. In fact, quite the opposite, the security sector and more specifically the domain of video surveillance have seen an emergence of AI-powered solutions both hardware and software. The widespread adoption of IP cameras, cloud computing capacities, and smart sensors have paved the way for new AI products and solutions to function at scale. AI-powered video analytics One application of artificial intelligence for the video surveillance sector is the use of video analytic solutions to analyze video streams in order to extract pre-determined objects, behaviors, or situations. To give some examples, AI video analytics can be used to monitor perimeter crossing for border control, detect fevers or masks in airports or public spaces, arms detection in casinos, or be used to filter out alarms triggered by benign movements versus real intrusions. This application of artificial intelligence leans on its specific branch, machine learning, which uses a complex series of AI models to analyze the content of the video flow, autonomously identifying and classifying the videos according to predefined rules. Adopting technology AI video analytics yields promising benefits, a reduction in operational costs, and an increase in safety, and a decrease in risk When AI video analytics are used effectively, they yield very promising benefits. A jump in video flow analysis from an average of 10% by humans to 100%, a reduction in operational costs, and an increase in safety, and a decrease in risk. The use of AI video analytics for surveillance sounds simple enough, however, there are several perceived factors inhibiting security organizations from adopting the technology. Adopting AI into your video surveillance operation The security industry is capital intensive, complex in its IT structure, and diverse in situational business needs. Therefore, resulting in a perception of high effort, time, and costs required to successfully integrate AI into your video surveillance operation. However, these effort constraints can be debunked due to the flexibility of video analytic solutions. Three areas that deter security organizations from adopting AI Existing capital A surveillance operation contains a network of cameras that film with a range of video qualities. AI video analytics can analyze a range of videos from low to high resolution in thermal, infrared, and visible formats AI video analytics often operate on smart cameras that have the appropriate video image quality for the capacity of content analysis. The costs involved in overhauling legacy camera systems, converting videos into higher quality, or waiting until the current camera network is ready to be replaced in order to integrate AI is expensive, time-consuming, and often unfeasible. However, not all AI video analytic solutions need to be deployed on edge with smart cameras. Instead, video analytics can be deployed both directly on to the camera or have server-based integration maintaining and scaling to your existing camera network. AI video analytics can also analyze a range of videos from low to high resolution in a variety of formats: thermal, infrared, visible. Complex IT structure A single central command center or in-house security network operates in a multi-manufacturer environment. This means cameras, video management systems, and technology partners can be provided by several manufacturers therefore increasing the complexity of successful IT workflows and integrations. Theft or perimeter infringement can take place in a matter of minutes, therefore the transfer of information between solutions is required to function at top speed. To overcome this complexity, the successful integration of solutions in a multi-manufacturer environment is assured through industry enforced standards set by non-profit organizations. This allows for third-party solutions such as AI video analytics to be easily integrated into the bulk of software and hardware technologies. Diversity in security needs To obtain high performance in a diverse security setting is inherently built into AI video analytic machine The objective of a surveillance operation can vary greatly from one organization to another. Retailers prioritize theft detection, while city governments may be concerned about arms detection or people counting. The capacity for AI to function with high performance, meanwhile adapting to several organization’s security needs requires algorithms to be trained accordingly. To obtain high performance in a diverse security setting is inherently built into how AI video analytic machine learning model’s function. AI can be trained to adapt to different environments and uses progressive learning to increase performance overtime. A collaborative effort between security experts, data scientists, and business strategists will ensure high performance and an appropriate application of AI to fit each organization’s specific needs. Surveillance innovation moving forward While for some video surveillance organizations, the costs and time associated with successfully integrating AI into their network may seem daunting, there are ways to adapt new technology into an existing operation with minimal effort. The emerging presence of smart cameras and IoT products will only accelerate the adoption of AI moving forward. If your organization is looking to enhance its operation with emerging technologies, now can be the time.
COVID-19 has already had a huge impact on the global economy. According to Statista, GDP growth globally will drop from around 3% to 2.4% - equivalent to a drop of around $35 trillion worldwide. In sectors like oil and gas, the impact is particularly acute: IHS Markit predicted that the reduction in oil consumption due to COVID-19 has led to a first-half surplus of 1.8 billion barrels of crude oil. The macroeconomic trends around these worldwide sectors point to harsher economic conditions and recession. For companies in the oil and gas sector running complex operations around the world, this will lead directly to tougher trading environments and a lot of necessary belt-tightening when it comes to costs around operations. Indirectly, the potential recession could cause more civil unrest and security threats for them as well. To cope with these potential challenges, companies will have to look at how they can maintain security for their operations and prevent risks as much as possible. Taking a contextual approach to physical security With these two goals in mind, looking at threat intelligence data should be considered. Threat intelligence refers to a set of data that can be used to judge current and future trends around risks, from everyday crime or political changes through to larger events like civil unrest, terrorism or the current pandemic. Based on data around these issues, companies can make better decisions on how they invest and manage their security posture in advance. Behind this overall approach, however, there are a significant number of moving parts that have to be considered. This includes where the data comes from, how it is used, and who is using the data. Companies can make better decisions on how they invest and manage their security posture The first consideration for threat intelligence is where data comes from. Typically, companies with large oilfields or refinery operations will have large investments in physical security to protect these environments, and part of this spend will include intelligence on local market, political and security conditions. Using this forecast data, your security leadership team can ensure that they have the right resources available in advance of any particular problem. This data can come from multiple sources, from social media data and crowdsourced information through to government, police and private company feeds. This mass of information can then be used to inform your planning and decision making around security, and how best to respond. However, one issue for oil and gas companies with distributed operations is how much data they have to manage over time. With so many potential sources of information all feeding back in real time, it’s hard to make sense of what comes in. Similarly, companies with international teams may have different sets and sources of data available to different parts of their organizations - while each team has its own view of what is going on, they may be missing out on contextual data from other sources held by neighbouring teams or by the central security department. Without a complete picture, it is easy to miss out on important information. Making threat intelligence smarter To solve this problem - and to reduce the costs around managing threat intelligence data - centralizing your approach can make it easier to provide that context to all your teams and stakeholders. Rather than letting each team set up and run their own threat intelligence approach, centralizing the data and letting each team use this can reduce costs. More importantly, it can improve the quality of your threat intelligence approach overall. By applying a combination of algorithms and security analysts to evaluate threat intelligence centrally, you can improve the quality of the data that you have coming into the organization in the first place. This approach provides higher quality data for decision making. However, a centralized approach is not enough on its own. Local knowledge and analysis is always useful. Consequently, alongside any centralization approach you have to have better filtering and search capabilities, otherwise you risk teams not being able to get the information that is particularly relevant and timely to them. This approach of bringing together centralized management of data feeds with more powerful tools for local teams to find what they want and get that access in real time represents the best of both worlds. Planning ahead Scenarios vary from a best case return to pre-crisis revenues of $50 to $60 per barrel by 2021 or 2022 According to consultancy firm McKinsey, the oil and gas sector faces an enormous challenge over the next few years. Scenarios vary from a best case return to pre-crisis revenues of $50 to $60 per barrel by 2021 or 2022, through to a worst case scenario where demand never returns and the industry has to undertake managed decline around some assets and look for new market opportunities in others. Whatever scenario plays out in the real world, security for existing assets will be a continued requirement. Planning ahead using threat intelligence data will be essential whatever happens. To help reduce costs and improve data quality, centralizing this approach will help. Without this mix of global oversight and local detail, companies will find their operations hampered and wrong decisions are made. It’s only by applying threat intelligence data in the right context that security teams will be able to keep up with the challenges of the future.
The oil and gas market is driven by a number of technology trends, political issues, waves of supply and demand, and regulations. At times, it seems like the market is in a constant state of ebb and flow, with business affected by traditional drivers, such as government mandates and operational efficiencies, and other non-traditional markers, like challenging weather conditions (consider the 2017 hurricane season as an example). Additionally, the global economy continues to grow, propelling increased energy demand. But like nearly every other market today, the oil and gas market is on the brink of a sea change. According to Deloitte’s 2018 outlook on oil and gas, “the digital revolution is here.” The sheer volume of information and data generated by digital devices, such as those associated with the Internet of Things, will allow producers to leverage rich data and combine it to deliver smart, efficient solutions. The rise of digital technologies is unleashing new ideas across the oil and gas industry and even though we are in the beginning stage of being able to harness the power of these types of technologies, innovative ideas are emerging — all designed to support the core business, reduce internal investments, deliver products faster, boost efficiencies, and enhance safety. Maximized Operations And Increased ROI This ongoing growth propels energy producers to embark on extensive exploration and production activities to meet increased demand This is welcome news because there are a number of challenges facing the oil and gas industry, from improving reserve replacement and ensuring workplace safety to reducing operating costs and limiting downtime. All of these objectives must be achieved while maximizing operations and increasing overall return on investment. Never has it been more crucial for critical infrastructure organizations to demonstrate a focus on safety, security, and collaboration. Here's why: Growth and demand According to the U.S. Energy Information Administration, world energy consumption will grow by 56 percent between 2010 and 2040. This ongoing growth propels energy producers to embark on extensive exploration and production activities to meet increased demand. As energy-centric organizations look to emerging markets or remote regions to source production, safety becomes even more mission-critical to their success. Compliance Continuous demand is only one challenge; compliance with industry and government regulations is another significant hurdle that must be maintained or there is risk of production shutdowns. For example, the Department of Homeland Security’s Chemical Facility Anti-Terrorism Standards (CFATS) impose comprehensive federal regulations for high-risk chemical facilities, requiring organizations to conduct vulnerability assessments. This is just one of many regulatory procedures sites must follow to conform to environmental protections, safety precautions, and safe handling of hazardous materials. As energy-centric organizations look to emerging markets or remote regions to source production, safety becomes even more mission-critical to their success Threat Protection, Mitigation, And Collaboration In addition to meeting the requirements of regulatory procedures, mitigating risk in this industry propels leaders to develop stringent strategies to ensure robust protection of people, property, and assets, effective and efficient response to incidents when they occur, and procedures and protocols to ensure business continuity in emergency situations. Energy providers require comprehensive safety planning and technology systems that can augment the capabilities of on-site and remote personnel. In recent years, video solutions have become the standard for monitoring facilities, assets, and employees, and now these organizations require enterprise-class solutions that can help gather intelligent data that allows for enhanced security and safety efforts but also focus on processes that enhance operational efficiencies. Cyber-attacks are becoming increasingly more complex and sophisticated in the oil and gas market IT security is also a concern. Cyber-attacks are becoming increasingly more complex and sophisticated in the oil and gas market. An IT breach can cause operational havoc, risk to the public, and damage to an organization’s brand. Adopting a continuous improvement approach to a security strategy safeguards and helps protect valuable company information and reduces the likelihood of an incident. Also, collaboration between IT and physical security leaders and the correlation of both departments' data makes it much easier to identify a potential breach before havoc ensues. The Digital Age With the rise of the digital revolution and the demand for data to improve insight, oil and gas producers and businesses need to find new ways to capture data, correlate it as needed, and then leverage it to make the most informed decisions. Software platforms are being used in a wide variety of applications to provide a single pane-of-glass view that allows operators to gain critical insight into operations. By collecting intelligence from digital sensors, such as video surveillance cameras, open-source Web intelligence, building systems, crowdsourcing, weather sensors, mobile devices, and more, operators can detect potential risks and manage and respond to situations more efficiently. Furthermore, information can be shared easily with multiple agencies, employees, citizens, and first responders — especially valuable in the event of a safety incident where rapid response is paramount. By creating a single enterprise-wide view across disparate systems and technologies, organizations experience improved response times, lowered operational costs, and increased employee safety. Cyber, traditional security, digital devices, and situational awareness technologies combine to deliver an integrated, automated, and adaptive architecture to efficiently mitigate advanced threats in real time or forensically Traditional Command Centers Intelligent solutions, such as those derived from the idea of artificial intelligence, help organizations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command center technologies within the oil and gas industry, fusing critical data input from emergency calls and responder activity to enhance situational awareness. With traditional command centers relying mostly on call and radio updates, visibility can be limited, but new digital platforms enable operators to oversee a situation and engage with and direct the response force. Overall, these types of automated functions deliver a simplified and modernized operating environment. The Future Is The Intelligent SOC Oil and gas facilities can implement a proactive approach to safety and better mitigate threats and protect assets All of these digital solutions are designed to take center stage within the Intelligent Security Operations Center (ISOC). To combat advanced, multi-stage threats, oil and gas facilities are transforming the traditional SOC into the next-generation unified ISOC with an integrated platform for detection, investigation, communication, and response. Cyber, traditional security, digital devices, and situational awareness technologies combine to deliver an integrated, automated, and adaptive architecture to efficiently mitigate advanced threats in real time or forensically. Energy providers operate in challenging, fast-moving environments in which opportunities, requirements, and regulations can vary widely, change quickly, and evolve significantly over time. As the idea of the digital age continues to transform this market, new technologies will be more widely used to improve business operations from exploration and extraction to transportation and distribution. With the right technology, strategic partnerships, and enhanced situational awareness, oil and gas facilities can implement a proactive approach to safety and better mitigate threats and protect assets, while continuing to focus on achieving business goals that will sustain supply and demand for years to come.
The cloud is here to stay. Its resilience and ability to connect the world during the COVID-19 pandemic has proved its worth, even to the uninitiated who have now witnessed first-hand the value of connected systems. Video and access control as a service provides a flexible and fluid security and business solution to meet the demands of a rapidly evolving industry, where the changing threat landscape means investing in the cloud is an investment towards success. This article will look back at our articles in 2020 about the growing popularity of cloud solutions for physical security, with links to the original content. Product offering While most people agree on the definition of “cloud,” there are several points about the terminology that may require clarification. Private cloud or public cloud? VSaaS or unlimited storage for video? Beyond the basics, the terms become foggy, reflecting a variety of notions about how cloud services fit into the broader physical security marketplace. As cloud usage becomes more popular, it’s important that marketers be precise in their terminology, and that integrators and end users be diligent in understanding the specifics of available product offerings. Different meanings “The cloud has many different possible connotations, depending on the context,” says Yu Hao Lin of Rasilient Systems, one of our Expert Roundtable panelists. For example, corporate CIOs will more likely understand the cloud to be a private cloud platform. As such, the public cloud is a ubiquitous term while the private cloud is more specified. Cloud system security Security of cloud systems is an ongoing discussion in the industry, especially how cloud system cybersecurity compares to that of on-premise systems. Our Expert Panel Roundtable weighed in on this question. “While both kinds of security systems serve their purpose, it can be argued that the streamlined updates that are commonplace with cloud-based solutions may put them at more of an advantage when it comes to data security,” says panelist Eric Widlitz of Vanderbilt Industries. “Also, most reputable cloud-based solutions are running in secured data centers by companies such as Google, Microsoft, or Amazon, so you also get to take advantage of all the security layers they have protecting your data.” Hybrid cloud video security solution A growing list of cloud players reinforces the importance of the cloud in the future of physical security There are several relatively new companies pushing cloud in a big way. Verkada is fast-growing company currently currently focusing to deliver an all-in-one hybrid cloud video security solution powered by edge processing inside the camera. The growing list of cloud players reinforces the importance of the cloud in the future of physical security. Combining AI and cloud video One company investing in the cloud is Eagle Eye Networks, which has raised $40 million of Series E funding from venture capital firm Accel to finance the realization of their vision to combine AI and cloud video. The money will allow Eagle Eye to continue its steep growth curve and leverage AI on its true cloud platform to reshape video surveillance. “The investment will make video surveillance smarter and safer for end-users,” says Ken Francis, President. Eagle Eye offers an application programming interface (API) to enable the integration of best-in-breed third-party AI and analytics systems to leverage the video. Eagle Eye is also investing in its own AI development and hiring additional development and customer service personnel. Hirsch Velocity Cirrus and MobilisID Identiv introduced the Hirsch Velocity Cirrus cloud-based Access Control as a Service (ACaaS) solution and MobilisID smart mobile physical access control solution. Hirsch Velocity Cirrus is an optimal solution for both end-users and integrators, with lower upfront costs, reduced maintenance, enhanced portability, and the future-proof assurance of automatic security updates and feature sets. MobilisID is a smart mobile physical access control solution that uses Bluetooth and capacitive technologies to allow frictionless access to a controlled environment without the need to present a credential. Advantages and disadvantages Advantages of cloud-based physical security technologies are many, when supporting staffThe advantages of cloud-based physical security technologies are many, and have wide-ranging applications for all areas of the transport sector; across stations, transport hubs, and vehicles. When used to support staff and complement existing processes, such systems can prove invaluable for transport professionals in helping to create a safer working environment, promoting confidence among personnel and passengers, and assuring passengers who are fearful about the current pandemic that all possible precautions are being taken during their journey. 5G supporting cloud-based applications 5G is the first communication environment that is cloud-native. As such, 5G networks will support cloud-based applications in a way that 4G, 3G and 2G can’t support. For instance, sensors (e.g. in a manufacturing plant) often have small internal storage and rely on synced devices (e.g. gateways) to interact with the cloud. Soon, these sensors will be able to work more efficiently, interacting with the cloud via the ultra-low latency and the edge computing capabilities supported by 5G networks. Increasing use of IoT Unlike current IoT services that make performance trade-offs to get the best from these existing wireless technologies, 5G networks will be designed to bring the high levels of performance needed for the increasing use of IoT. It will enable a perceived fully ubiquitous connected world, with the boosted capacity offered by 5G networks transferring exponentially more data at a much quicker rate.
The mission of the North American Electric Reliability Corporation (NERC) is to ensure the reliability of the North American bulk power system (BPS). While electric utility companies are responsible for administering the day-to-day operations of the electric grid, regulators such as NERC and the Federal Energy Regulatory Commission (FERC) are charged with the overall responsibility of ensuring reliability and security. NERC develops and enforces Reliability Standards, annually assesses seasonal and long-term reliability, monitors the bulk power system through system awareness, operates the Electricity Information Sharing and Analysis Center (E-ISAC) and educates, trains and certifies industry personnel. Normal everyday operations of the system are the responsibility of utility owners and operators. Protecting critical infrastructure An attack by a disgruntled former employee, ideologically motivated activist, or a criminal could inflict significant damage Currently, a significant reliability threat to the U.S. grid is associated with squirrels and balloons, and not religiously inspired terrorists. However – and more applicable to grid operators – we have recently seen noteworthy interest in disabling or destroying critical infrastructure. Coordinated attacks can target the grid, and an attack by a disgruntled former employee, ideologically motivated activist, or a criminal stumbling across a “soft target,” could inflict significant damage. With an interconnected grid of over 450,000 miles of high voltage transmission lines (100 kV and higher) and over 55,000 substations (100 kV and larger), the targets of opportunity are endless. Data capture form to appear here! According to the Department of Energy, the number-one cause of most power outages in the U.S. is bad weather, which costs the economy between $18 billion and $33 billion every year in lost output and wages, spoiled inventory, delayed production and damage to grid infrastructure. The number-one cause of most power outages in the U.S. is bad weather, which costs the economy between $18 billion and $33 billion every year Large power transformers A large power transformer (LPT) is an enormous, custom-built piece of equipment tailored to customers’ specifications. They usually are not interchangeable with each other, and they are not produced for spare-part inventories; so if one blows, a lot of companies and homes could be without power for more than six months. They are not cheap, either. According to EEP (Electrical Engineering Portal), $10 million is a fairly average cost, but that doesn’t include transporting the gargantuan piece of equipment or installing it, which usually adds an additional 35 percent to the bill. Protecting power grids is essential to deliver electricity that serves millions of consumers. Transmission substations are a component of the power infrastructure that presents unique security challenges. These important facilities often sit out in the open, in remote locations, and were historically protected by little more than cameras or chain-link fences. According to EEP, $10 million is a fairly average cost for a large power transformer NERC/CIP guidelines The North American Electric Reliability Corporation’s Critical Infrastructure Protection (NERC/CIP) guidelines address security needs of electrical substations. Every facility has a baseline requirement for perimeter security protection around the site, although medium- and high-impact sites will have more stringent requirements. The geography surrounding sites – Is it an urban area or rural? Does the surrounding elevation provide additional lines of sight? – also impacts the types of systems they require. Electricity coming from coal, nuclear or hydroelectric plants goes to local utilities The U.S. power grid is divided into three sections: The Eastern Interconnection for states east of the Rocky Mountains, The Western Interconnection for states from the Pacific Ocean to the Rocky Mountains, and the smallest—the Texas Interconnected system—covering most of Texas. Electricity coming from coal, nuclear or hydroelectric plants goes to local utilities and they distribute power to homes and businesses, to millions of personal devices, lights, refrigeration, computers, and to other “loads,” that tap it. Inherited challenges According to the American Society of Civil Engineers (ASCE), the nation’s electric infrastructure is “nothing but a patchwork system” that has evolved wildly since the first substation was erected by Thomas Edison in 1882, on New York City’s Pearl Street. Contributing to the challenges of securing the grid are the crazily disparate ages and capacities of the grid’s equipment. There are many possible targets, too. Approximately 300 control centers around the country monitor voltage and watch the data from SCADA (supervisory control and data acquisition) systems, which are placed at transformers, generators and other critical areas. Ideally, this allows engineers to monitor the data for signs of trouble and then communicate with each other to deal with whatever is happening to the grid, but SCADA has cybersecurity issues.
Intelligent solutions, such as those derived from artificial intelligence, help critical infrastructure organizations make sense of vast amounts of data. These integrated applications, such as advanced video analytics and facial recognition, can automatically pinpoint potential breaches and significant events, and send alerts to the appropriate personnel, departments, and agencies. These solutions can be powerful in unifying disparate command center technologies, fusing critical data input from emergency calls and responder activity to enhance situational awareness. Electrical substations are particularly vulnerable (and in need of extra security) due to their role in power distribution and the nature of their equipment. The challenge power utilities worldwide are facing is finding an affordable solution, which can help detect, deter and facilitate an informed response to a substation security event. Data capture form to appear here! U.S. regulations In the United States, this need is furthered by the physical security mandate CIP-014 issued by the North American Electric Reliability Corporation (NERC), calling for identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address. CIP-014 identification of security issues, vulnerability assessments and deployment of appropriate processes and systems to address CIP-104 specifically calls for implemented security plans that include measures to deter, detect, delay, assess, communicate, coordinate and respond to potential physical threats and vulnerabilities. Manufacturers of video and other systems are designing products to serve the critical infrastructure market. For example, Dahua Technology offers explosion-proof cameras with a combination of rugged reliability and superior optics that is a fit for surveillance of explosive and corrosive environments, including chemical plants, refineries, and other facilities in the oil and gas industry. This explosion-proof series of cameras are housed in enclosures that are certified to the ATEX and IECEx standards for equipment in explosive atmospheres. Each explosion-proof camera features Dahua’s Starlight technology for ultra low-light sensitivity and high-definition sensors that deliver clear images in real-time. They are IP68-rated to prevent water and dust ingress. Each explosion-proof camera features Dahua’s Starlight technology for ultra low-light sensitivity and high-definition sensors that deliver clear images in real-time Video footage in extreme temperatures Another manufacturer, Videotec, offers a range of cameras and housings that provide video footage regardless of aggressive external factors, such as ice cold, scorching heat, desert sand, the force of sea or wind, total darkness, pollution, corrosion and even explosive agents. SightSensor thermal systems enable a utility to detect and respond to substation security incidents across multiple sitesSightLogix smart thermal camera systems have been deployed to protect substations for electric utilities and other critical infrastructure facilities. SightSensor thermal systems enable a utility to detect and respond to substation security incidents across multiple sites, ranging from copper theft to vandalism while also meeting regulatory compliance. At each substation facility, Thermal SightSensors are positioned along the perimeter, and are paired with a high-resolution pan-tilt-zoom camera for alarm assessment. When a Thermal SightSensor detects an intruder, the target’s location information is sent over the network to a SightTracker PTZ controller, which automatically zooms and steers PTZ cameras to follow the intruder. The target’s location is also displayed on a topology site map to provide real-time situational awareness. Alarms are sent to the utility’s 24-hour security operations center, which will contact law enforcement in real time when unauthorized intrusions are detected. Integrated intrusion detection and lighting systems The Senstar LM100 hybrid perimeter intrusion detection and intelligent lighting system is simplifying security at one U.S. electrical utility company. For years, the utility company had integrated its perimeter intrusion detection and lighting systems. The company has now installed the Senstar LM100 which provides detection and lighting in one product and saves them over $80,000 per site. The savings are a result of the reduction of electrical requirements, conduit, grounding, and associated labor, as well as the removal of certain equipment from project scope that are required for the two-system integration. The Senstar LM100’s perimeter LED-based lighting acts as an initial deterrent. If an intruder persists and an attempt to cut, climb or otherwise break through the fence is detected, the closest luminaire begins to strobe, and an alert is sent via a security management system. The intruder knows immediately they have been detected and that their exact location is known by security and others in the vicinity.
Singapore’s Changi Airport Group, one of the most innovative and technologically advanced airports in the world, has selected Genetec, Inc., a foremost technology provider of unified security, public safety, operations, and business intelligence solutions to enhance and upgrade its security system. The three-year project, which is expected to be completed by the end of 2023, will see Genetec™ Security Center, a unified security platform that blends IP security systems within a single intuitive interface, underpinning the airport’s security operations, with a specific focus on the video surveillance system across its terminals. The contract was awarded to Genetec following a rigorous competitive tender process. “Increasingly, our airport customers are understanding the deep business insights Security Center is capable of delivering, its ability to inform and create value for multiple areas of an airport business operation and improve the overall passenger and employee experience,” said Giovanni Taccori, Commercial Lead Transportation, APAC at Genetec, Inc.
A £317m contract to develop the next generation of radar for the Royal Air Force's (RAF) Eurofighter Typhoons will sustain hundreds of jobs and develop technologies for the UK’s Future Combat Air System. BAE Systems and Leonardo have been awarded a contract to develop the Active Electronically Scanned Array (AESA) European Common Radar System Mark 2 (ECRS Mk2) to a standard ready to be integrated on to RAF Typhoons. ECRS Mk2 multi-functional array It will sustain more than 600 highly skilled jobs across the country, including more than 300 at Leonardo's site in Edinburgh, over 100 electronic warfare specialists at the company’s site in Luton, and 120 engineers at BAE Systems' site in Lancashire. The ECRS Mk2 is a multi-functional array (MFA) that will give UK Typhoons an Electronic Warfare capability, in addition to traditional radar functions, including wide band Electronic Attack. ECRS Mk2 will equip RAF pilots with the ability to locate, identify and suppress enemy air defences using high-powered jamming It will equip RAF pilots with the ability to locate, identify and suppress enemy air defences using high-powered jamming. They can engage targets while beyond the reach of threats even when they’re looking in another direction and operate inside the range of opposing air defences, remaining fully protected throughout. This game-changing capability will replace the mechanically-scanning radar that RAF Typhoons are currently equipped with and will ensure the UK retains the freedom to deliver air power wherever and whenever it is needed. It also enables Typhoon to link up with future data-driven weapons to combat rapidly evolving air defences, ensuring that UK Typhoons can continue to dominate the battlespace for years to come. Authority comments Andrea Thompson, Managing Director Europe & International for BAE Systems’ Air sector, said, "This capability will allow Typhoon to take its place in the future battlespace for decades to come, maturing key technologies for future combat air systems and ensuring interoperability." "As well as securing highly-skilled jobs, it will sustain the key skills needed to keep the UK at the forefront of the global Combat Air sector. We look forward to continuing to work alongside the Eurofighter nations and our industry partners to ensure Typhoon delivers the needs of today and answers the challenges of tomorrow.” Mark Hamilton, Senior Vice President Electronic Warfare, Leonardo said, “This contract is great news for the UK, which will get the world’s most capable fighter radar and great news for British engineering. Inventing, developing and building advanced technology here in the UK allows us to understand and meet the specific requirements of our Armed Forces and to secure export orders all around the world, boosting the whole UK economy.” AESA technology AESA has more transmit-receive elements than other radars, making Mk 2 the most capable fighter The new radar will be based on Active Electronically Scanned Array (AESA) technology and will provide game-changing capabilities based on a revolutionary MFA. It has significantly more transmit-receive elements than other radars, making Mk 2 the most capable fighter AESA radar in the world, maintaining the same power and precision of traditional radars but also enabling the simultaneous operation of its wide-band Electronic Warfare functionality. New sensor integration BAE Systems, the UK’s prime contractor for the Typhoon, will integrate the new sensor which will be developed by Leonardo, the UK’s defence electronics champion. Both companies are currently working as part of a four-nation development program alongside Eurofighter consortium partners in Germany, Spain, and Italy on a baseline version of the AESA radar. The ECRS Mk2 is a completely new approach designed to meet the operational needs of the RAF and future export customers. The UK's commitment follows a similar commitment from Germany and Spain to deliver their own national requirements for an AESA radar.
Leonardo in the UK has delivered the first of four complete baseline counter-drone systems to the Royal Air Force in support of the next stage of its Counter-Unmanned Aerial System (C-UAS) research and development program. The ORCUS system is now playing a key role in a wide-ranging testing and evaluation campaign which will improve the Air Force’s understanding of how it can employ technology in response to the threat posed by hostile drones. The RAF will also maintain the ORCUS system as an upgraded national standby capability, to be rapidly deployed anywhere in the country in support of emergency services in the event of a drone-based crisis. Rogue drones threat Counter-Unmanned Aerial System (C-UAS) study program is considered highly important to the security of the nation The threat posed by rogue drones is being taken extremely seriously by the Ministry of Defense and therefore the C-UAS study program, managed by Defense Equipment & Support Future Capability Group, is considered highly important to the security of the nation. Leonardo is working hard to ensure that the program continues to be delivered, despite the disruption caused by the global coronavirus pandemic. Evaluating capabilities The modular systems provided by Leonardo for the study will allow the RAF to evaluate a range of capabilities including advanced radar, electro-optic and radio frequency sensors, and an electronic attack countermeasure. In due course, further systems will be integrated for testing and evaluation. Throughout, RAF Force Protection operators will be examining the most effective ways to detect, track, identify, and defeat rogue drones. In the long-run, the research and development program will inform the requirements for a core RAF counter-drone capability, intended to protect air bases around the UK. C-UAS systems Elements of Leonardo’s C-UAS equipment were previously operated by the RAF Force Protection Force in 2018 and 2019, following drone sightings at Gatwick and Heathrow airports, allowing airport operations to resume. Leonardo offers its scalable and modular C-UAS systems to military and civil customers internationally. The Company has been contracted for C-UAS equipment for the Italian Army and Air Force and is in discussions with other potential customers worldwide.
STANLEY Security, one of the UK’s security providers, is pleased to announce it will be providing its round the clock safety monitoring and emergency response management services to Blackline Safety customers across the UK and Europe. Blackline Safety is a supplier of wirelessly connected gas detection and lone worker monitoring products. Blackline’s technology monitors for atmospheric hazards and the wellbeing of personnel working alone, whether in populated areas, indoors within complex facilities or remotely. Safety monitoring services A key part of its service is live 24/7 monitoring and wireless gas detection, helping teams working in hazardous environments by responding to emergencies in real-time and managing efficient evacuations. STANLEY Security will take over the role of safety monitoring services for Blackline in the UK Under this new partnership, STANLEY Security will take over the role of safety monitoring services for Blackline in the UK, Netherlands and Belgium this month, with a further seven countries in Europe throughout 2020. STANLEY Security will additionally provide backup support for Blackline’s Calgary-based Safety Operations Center, increasing protection for the Blackline’s North American customers. Smooth transition of monitoring and response services The choice of partners was, in a large part, due to both companies being BS 8484:2016 accredited and has made the transition of 24/7 monitoring services near seamless. BS 8484:2016 is the Code of Practice for the Provision of Lone Worker Services, which advises on best practice when seeking a solution to reduce and/or eliminate the risk to staff operating away from the ability of colleagues to provide direct assistance. Blackline Safety Europe is the only manufacturer of gas detectors to achieve this standard. To further ensure the smooth transition of monitoring and response services, STANLEY Security has established a continuous training program for employees across Europe. The training not only ensures operatives have in-depth knowledge of Blackline’s emergency response protocols, products and features, but are kept up to date at all times.
ARST is a public transportation company in Cagliari, Italy. The company operates a massive fleet of about 800 public buses throughout the island of Sardinia. During the vehicle modernization process, the company decided to deploy new centralized CCTV systems to enhance the security level of passengers and drivers. Challenges First of all, the low-definition images captured by the original surveillance equipment cannot meet the company’s advanced monitoring needs. Second, the bus driver could not achieve point-to-point communication with the command center in real-time. In addition, in case of an accident, there was no emergency button on the bus before to report the emergency to the command center. Solution To help ARST revamp its bus security system, a customized Dahua mobile solution consisting of more than 3,000 cameras and 750 MXVRs, Panic Buttons, DSS integrated platform as well as other accessories was employed. The data collected from the front-end cameras are integrated in the control room via DSS4004, where emergency calls, geo-localization of vehicles, and statistics can be managed. Video recorder MXVR6212 supports real-time vehicle location tracking and monitoring, GPS and video can be uploaded via a wireless network Each bus is equipped with a Penta-hybrid video recorder MXVR6212, 4, 6, or 8 HAC-HDBW2241F cameras and panic buttons. The main features of the systems are data encryption, people counting, hot spot, router 3G/4G, dynamic management of the LCD monitor on board, and geo-localization via the DSS app. As the first mobile XVR adopting HDCVI/AHD/TVI/CVBS/IP signals, MXVR6212 can achieve 1080P high-definition real-time recording. It supports real-time vehicle location tracking and monitoring, and all information such as GPS and video can be uploaded via a wireless network – 3G/4G/WIFI. In addition, the device can also support the connection of various accessories, such as card readers, fuel sensors, and emergency buttons. Furthermore, it has passed EN50155/ISO16750 to meet the requirements for mobile use. Other than the city bus, this device can be used in various applications, such as school buses, taxis, police cars, trains, trucks, etc. Mobile camera The 2MP HAC-HDBW2241F-M-A mobile camera is designed with a shock-proof compact case, which makes it convenient to be installed and adaptable to various applications. Boasting the strengths of the Dahua self-developed HDCVI technology, the camera offers high-quality images and ensures real-time transmission. Also, it adopts a high-performance sensor to provide incomparable performance even under extreme lowlight environment. The Starlight feature allows capturing of more details and recognizing accurate colors at night or in scenes with limited illumination. DSS platform At the control room, Dahua DSS platform was utilized to control and manage the mobile devices deployed on the bus. It displays real-time location, speed, direction of mobile device, playback device’s history location, and supports alarm for over-speeding, entering, and leaving the E-FENCE. Aside from central management, the Business Intelligence feature of Dahua DSS platform also allows the user to export Heat Map reports and people counting statistics, helping operator companies to optimize the driving route to generate more profit. Benefits With upgraded Dahua system, the command center can communicate with every single vehicle of ARST Bus Company in real-time, enabling them to deliver instructions to the driver, allowing the driver to report immediately to the command center in case of an emergency through the panic button, and ensuring the safety of passengers and drivers. The Dahua mobile solution with high-definition monitoring performance reduces theft and robbery on buses and enables bus companies to collect accurate information about traffic flows and automatically download data to assist efficient and profitable operations. The Dahua mobile solution mounted onboard has been proven to be highly efficient and reliable, which were also applied in two other Italian bus companies: AMAT Bus Company in Taranto and AMTAB Bus Company in Bari.
Abdullah A. M. Al-Khodari Sons Company is a multifaceted contracting company in Saudi Arabia. This company conducts business in diverse sectors such as civil engineering, roads and bridges, railways, buildings and infrastructure, water and waste water treatment, oil-gas and pipelines. It has 25 construction sites across Middle East. Managing time-attendance, shifts, overtime and leaves of 20,000 employees at different locations was a challenging process for them. They wanted a centralized time-attendance solution that would enable them to manage attendance data from a central location and speed up the payroll process. Project Highlights Time-attendance solution for 25 construction sites Access control solution for 25 sites Centralized attendance management for 20,000 employees Managing time-attendance data Al-Khodari is engaged in wide spread construction activities with 60 construction sites in the Middle East Al-Khodari is engaged in wide spread construction activities with 60 construction sites in the Middle East. Managing time-attendance, shifts, leaves and overtime of 20,000 employees at different locations is very time consuming and a tedious task. Previously, the customer was using Hand geometry solution, which was very time consuming. Workers also found it difficult to place their palms in the proper position. Managing time-attendance data of all employees on a central level was also becoming difficult for the company. Furthermore, the head office was using a different time-attendance solution in comparison to other sites. The head office processed the salary of employees after receiving an attendance summary from each of their branches. The process of salary calculation with respect to working hours and overtime of each employee took around 10 days. Moreover, there were chances that the attendance data was inaccurate, leading loss of efficiency and employee dissatisfaction. To overcome such challenges, the company required a centralized time-attendance and access control solution which could be managed and controlled from the head office. Faster and accurate salary calculation After discussing all of their problems and requirements Matrix offered web based COSEC CENTRA time-attendance and access control solution for their multi located branches across the Middle East. It automated all time-attendance processes right from recording entries to processing salaries. COSEC CENTRA access control solution allows controlling access on three simultaneous dimensions – user, zone and time. COSEC CENTRA server is installed at the head office to where attendance data of all locations are collected Optical fingerprint based time-attendance and access control terminal COSEC DOOR FOP was installed to mark the attendance and get access using fingerprint credentials. As per assigned access rules and time-attendance policies, access is allowed or denied, and event data would be pushed from all devices to the COSEC CENTRA server in real-time. COSEC CENTRA server is installed at the head office to where attendance data of all locations are collected centrally. Various types of time-attendance reports and charts can be generated for faster and accurate salary calculation. Error free time-attendance Time required for salary calculation reduced by 30% Productivity increased by 20% Control of all sites through a live monitoring window Error free time-attendance and overtime data Database management of all employees Centralized report generation Products installed COSEC DOOR FOP - optical fingerprint and RF card based door controller COSEC ENROLL FINGER - fingerprint enrollment station COSEC LE PLATFORM - web based application software platform COSEC LE TAM - time-attendance and leave management module COSEC LE ACM - access control module COSEC LE USER10000 - 10000 user license for LE platform
Round table discussion
Protecting the oil and gas market is key to a thriving economy. The list of security challenges for oil and gas requires the best technology solutions our industry has to offer, from physical barriers to video systems to cybersecurity. We asked this week’s Expert Panel Roundtable: What are the security challenges of the oil and gas market?
They call it “critical” for a reason. The so-called “critical infrastructure” is composed of the basic services that citizens have come to depend on, and which are necessary to support society and ensure national stability. The term includes high-visibility segments such as airports, refineries, transportation, wastewater, nuclear reactors, electric utilities, pipelines, and more. Because these functions are so critical, the stakes of providing security are higher than for any other market. We asked this week’s Expert Panel Roundtable: What are the security challenges of critical infrastructure facilities?
A clear image is the desired end-result of video systems – or is it? In a growing number of applications, it’s not the image itself, but rather what information can be gained from the image, that is most important. We asked this week’s Expert Panel Roundtable to comment on some of the ways information from video is valuable to end users. Specifically, we asked: In what applications does information derived from video images provide more value than the images themselves?
How To Ramp Up Perimeter Security With License Plate Reader TechnologyDownload
Solve Access Control Challenges in the Healthcare SectorDownload
Getting the Most Value From Software Subscription AgreementsDownload
Shifting Trends in Operation Centers and Control Rooms for 2021Download