Aqua Security, the pure-play cloud native security solutions company, has published new research from Team Nautilus revealing that a significant majority of companies that move to multi-cloud environments are not properly configuring their cloud-based services. According to the new findings from Aqua Security’s ‘2021 Cloud Security Report: Cloud Configuration Risks Exposed’, these misconfigurations, for example leaving bucket or blog storage open, can open companies up to crit...
Videonetics, the world’s first AI & Deep Learning-powered Unified Video Computing Platform (UVCP) provider, has announced the integration of its Intelligent VMS 3.0 software with Perimeter Intrusion Detection System (PIDS) of Future Fibre Technologies (FFT). Technology integration The technology integration will empower users to monitor zone alarms and videos from a centralized system, providing further situational awareness, maximizing preparedness and response to perimeter breach o...
According to a recent wide-ranging article on data security in Computer Weekly: “physical security is key to maintaining the resilience and effectiveness of data centers… businesses end up exposing themselves to a range of risks in this area of security is ignored.” A lack of investment in the physical security of servers undermines the cyber-security of data assets and vice versa. Appropriate physical security controls manage risk by minimizing unauthorized access to server...
Clavister, a globally renowned company in high-performance cyber security solutions, has announced the launch of the latest generation of Clavister NetShield Virtual, highly regarded as one of the world's fastest virtualized solution for securing 5G networks. With data rates of over 600 Gbps on a single Intel Xeon-based server, Clavister sets a new high-water mark for 5G Security capacity. Virtualized solution for 5G networks With the proliferation of virtualization, there has been a steady i...
Bosch has introduced the new Autodome IP starlight 5100i IR moving camera with a new 1/1.8 inch sensor offering 4-megapixel resolution and 30x optical zoom. It offers HDR X combined with starlight technology and dual illumination – integrated IR and white light – to capture images that can distinguish individuals or objects for identification or proof. Complemented with built-in Artificial Intelligence (AI), the camera, when idle, supports operators with object detection in areas of...
Offering enhanced security and personalized access control, Nortek Control has launched its new Linear BT135-W Access Control Reader and Linear BT125-W Access Control Reader. The new readers integrate Bluetooth Low Energy (BLE) technologies, providing users intelligent, contactless and secure access control in a slim design, which fits seamlessly into any office or building environment. Furthermore, the new Linear readers provide dealers and end-users several options to customize access control...
With resistance to attack and extreme weather, wire-free installation, and battery-powered operation, the new SMARTair i-gate Electronic Padlock is built for use almost anywhere. This new device in the SMARTair wireless access control range enables facility managers to add real-time control to non-electrified gates, cupboards, cabinets, closets, crates, and more, wherever they are and whatever the climate. SMARTair i-gate Electronic Padlock For many organizations, security and access needs to not stop at the perimeter door. Yet, finding reliable locking devices that are easy to operate with an electronic access system can be difficult. Gates and outbuildings are hard to reach with cabling. Access devices may not have the resilience required for reliable operation outdoors. The i-gate is built to meet these challenges. “The new SMARTair i-gate Electronic Padlock helps our customers extend wire-free control to new access points,” said Félix Morán, SMARTair Product Manager at ASSA ABLOY Opening Solutions EMEA. Adaptable locking devices It can be instantly moved to wherever a resistant, adaptable locking device is needed" Félix Morán adds, “It can be instantly moved to wherever a resistant, adaptable locking device is needed. Site managers no longer need to worry about outbuildings, gates, cupboards and more, because they can monitor and control access to them electronically, remotely and in real time, when needed.” Upgrading an existing padlocked closure involves simply swapping the devices and integrating i-gate Padlock into an existing or new SMARTair wireless access control system. No drilling or wiring is required. The SMARTair i-gate Padlock is available in a contemporary black finish with stainless steel shackle. Remote control via SMARTair Web Manager Exterior and interior openings previously unsuited to electronic access control can now be controlled and monitored from a familiar software interface, including remotely from the SMARTair Web Manager. The SMARTair i-gate is compatible with any SMARTair system management option – Standalone, for basic access control functionality, Update on Card, Openow, for access management and unlocking via smartphone, and Pro Wireless Online, for real-time management of every door and system user. Compatible with standard proximity credential technologies The new SMARTair i-gate padlock is robust enough for almost any climate conditions. It has a watertight cover (IP68 rating) and an internal cylinder with Durability EN 15684 Class 6 Certification. It is battery-powered and works with all standard proximity credential technologies, including MIFARE, DESFire, and iCLASS, as well as Bluetooth Low Energy (BLE). When combined with Openow, the mobile solution for SMARTair, users no longer need to carry separate card or fob credentials. Instead, their phone stores secure virtual keys that can be issued, amended, or canceled at any time. Mobile access No one wastes time collecting or validating an access card, because they can unlock the new SMARTair i-gate Padlock with a smartphone. With Openow, if one is carrying a phone, they are already carrying their keys.
Actuate, the globally renowned provider of automation and intelligence software for smart security camera systems, has announced that it has closed its Series A financing of US$ 8 million to expand the capabilities of its computer vision technology and build on the company’s growing portfolio of customers. The funding round was led by Tribeca Venture Partners and joined by Scribble Ventures, OCA Ventures, and Context Ventures, with additional support from existing investors, including Bling Capital, Upside Partnership, and Tensility Venture Partners. Critical layer of intelligence About 90% of organizations have security cameras, yet many cameras are unmonitored and most data goes unused, which can endanger lives and lead to significant economic losses. Actuate is adding a critical layer of automation and intelligence to support data-driven security decisions and enhanced vigilance. The company’s AI-powered computer vision software turns any security camera into an intruder- and threat-detecting smart camera that dramatically reduces the time it takes for security teams and law enforcement to respond to issues. AI-powered computer vision technology The Actuate solution integrates with any existing security camera without additional hardware The Actuate solution integrates with any existing security camera without additional hardware, providing organizations with safer, cost-efficient and end-to-end security automation. The software identifies safety and security threats in real time, reducing false positives by as much as 99%. When threats are detected, alerts are issued automatically, in order to help security teams respond quickly to gun presence, intruders, social distancing violations, loitering, and other security events. Security management solutions Actuate’s analytics are trusted by hundreds of customers nationwide and deployed at over 1,000 sites, including schools, offices, military facilities, construction sites, affordable housing, high-end residential buildings and industrial facilities. “We unfortunately live in a world where active shooter events and public safety threats continue to make headlines year after year, pointing to the critical need for faster, more accurate, and privacy-conscious security management solutions,” said Sonny Tai, the Chief Executive Officer (CEO) of Actuate. End-to-end security automation Sonny Tai adds, “Actuate empowers security staff at the places we live, work, shop, and depend on with end-to-end security automation, helping them to do their jobs better and improve safety outcomes. As we culminate a year of exponential growth, this support from our investors will be instrumental in driving the adoption of our security management platform and growing the range and accuracy of our privacy-conscious AI.” In leveraging the new funding to expand its solution’s capabilities, Actuate is enhancing its behavior detection technology, which allows the software to detect adverse events or accidents, such as slip-and-fall incidents, and is also further developing its all-in-one security management platform. Real-time video analytics and automation With its unique AI software, Actuate is bringing physical security into the age of automation" “With its unique AI software, Actuate is bringing physical security into the age of automation,” said Brian Hirsch, Managing Partner of Tribeca Venture Partners, adding “Actuate’s end-to-end platform, powered by unique IP, solves a myriad of security and building management challenges, across organizations through real-time, video-based analytics and automation.” “With professionals and students returning to offices and schools, we see a huge opportunity for Actuate’s solution to help manage social distancing concerns, while cost-effectively protecting against security and safety events that can not only hurt the bottom line, but also puts lives at risk. We’re proud to support the company in its mission to ensure a safer, more peaceful future for all.” Security monitoring service “We started deploying Actuate’s AI models this year and the difference in both accuracy and technical support has been palpable, so seeing Actuate’s venture funding success comes as no surprise,” said Blake Ballard, Director of Operations for Louisiana-based security company, Global Monitoring Solutions. Blake Ballard adds, “Security teams rely on technology and tools that work proactively to ensure safety at all times. Utilizing Actuate’s exceptional platform and top-notch team has enabled us to provide a much more reliable security monitoring service to our customers, making them the only solution we’d work with.”
The new FLEXIDOME IP starlight 8000i X series cameras offer enhanced image quality for low-light scenes and fast-moving objects, thanks to two resolution offerings of 2- or 4-megapixels and next-level HDR X and starlight X technologies. HDR X and Starlight X technologies HDR X enables the cameras to optimize video capture in scenes with fast-moving objects with a dynamic range up to 144 dB, ensuring perfect exposure, while reducing motion-related artefacts and blur in the daytime. The new Starlight X technology helps to significantly improve image quality during the day and excels in near-dark scenes, ensuring color images down to 0.0061 lux due to its custom optics, Bosch advanced image processing algorithms, and noise suppression. The camera’s new 1/1.8 inch sensor further improves image quality across all light levels. Capitalizing on the significantly improved image quality of the X series, the camera’s built-in Artificial Intelligence (AI), which features Intelligent Video Analytics and Machine Learning (Camera Trainer), offers more relevant data-supporting predictive solutions in mission-critical applications. FLEXIDOME IP starlight 8000i X series The new X series extends the outdoor fixed camera portfolio of the FLEXIDOME IP starlight 8000i family The new X series extends the outdoor fixed camera portfolio of the FLEXIDOME IP starlight 8000i family, by delivering an ideal mix of resolution, light sensitivity, dynamic range, and frame rate all at once for mission-critical applications that demand the highest image quality combined with actionable insights, 24/7. In extreme low-light scenes, starlight X technology provides clear and relevant images with color filtering down to 0.0061 lux. Motion-optimized HDR X technology has a dynamic range of up to 144 dB, ensuring perfect exposure, while eliminating motion-related artefacts and blur in scenes with challenging lighting conditions and fast-moving objects or vehicles in tunnels and on roadways. Exceptional image quality and robust design The camera’s exceptional image quality is backed by a comprehensive, robust design that is water and dust resistant, with an IP66 and IP6K9k rating, and is vandal resistant with IK10+ housing. It withstands temperatures ranging from -50 to +60°C (-8 to +140°F). The high-quality, dual-layer coating of the camera also protects against corrosion (IEC 60068-2-52 1344h), making the X series ideal for challenging outdoor applications. Built-in AI supports predictive solutions All FLEXIDOME IP starlight 8000i cameras come with built-in AI featuring Intelligent Video Analytics and Camera Trainer to support predictive solutions. This built-in AI enables these cameras to understand what they see and attach a layer of metadata to video feeds to convert video data into actionable insights, helping users anticipate unforeseen events and prevent them from happening. Intelligent Video Analytics is highly resistant to false triggers caused by demanding weather conditions, such as snow, wind, rain, hail, and water reflections, and environments subject to vibration, such as on bridges. It provides automatic object detection over large distances, making it ideal for mission-critical applications such as perimeter protection of airports, parking lots, critical infrastructures, government buildings, border patrol, ship tracking, and traffic monitoring. Combined with Starlight X technology, this built-in AI provides more rich data, even in extreme low-light situations. Camera Trainer, based on machine learning, enables system integrators to tailor Intelligent Video Analytics to detect objects or situations that matter most to their customers. Remote device management Bosch remote device management is a combination of tools like Project Assistant and Configuration Manager Bosch remote device management is a combination of tools like Project Assistant and Configuration Manager, and services for secure, transparent, and cost-effective device management throughout a product’s life. The innovative remote wireless configuration and commissioning functionality of the FLEXIDOME IP starlight 8000i range enables installers to work smarter while onsite. When commissioning, installers typically must climb up and down ladders or hire lift equipment to reach cameras at high levels. With any FLEXIDOME IP starlight 8000i camera, commissioning can be done entirely wireless, no need for ladders or lifts. Bosch Project Assistant app Installers can use the Bosch Project Assistant app installed on a wireless tablet or smartphone to adjust the pan, tilt, roll, and zoom (PTRZ) and set the required field of view without touching the camera or lens. The new X series cameras, as with all Bosch cameras, connects securely to the Bosch Remote Portal, a cloud-based service offering device management with daily or advanced configuration and set up and continuous health monitoring from any offsite location. Bosch’s Green Way approach Any PTRZ adjustments required post installation for new store layouts or altered high-risk zones, for example, can be conducted remotely to save time, costs, and effort. System integrators can work remotely with customers to perform services, such as changing configuration settings or installing firmware updates, ensuring systems meet the highest reliability standards. The remote device management and wireless commissioning process minimizes the number of commutes, resulting in sustainable business practices that are economically viable, socially responsible, and environmentally friendly. This approach is called Bosch’s Green Way promise.
ASIS International, the association for security management professionals, has opened registration for Global Security Exchange (GSX) 2021, a hybrid event taking place 27-29 September that will offer a digital experience on the GSX online platform as well as an in-person event at the Orange County Convention Center (OCCC) in Orlando, FL. Online and digital experience “Building resilience among security professionals begins with knowledge, and GSX is where global security professionals turn to up their security game,” said John A. Petruzzi, Jr., CPP, 2021 President, ASIS International. “GSX is a particularly powerful tool for security professionals, and I am excited that we are able to offer up the GSX 2021 experience to global participants both in an in-person and an online digital format.” Safety protocols ASIS International’s top priority is the health and safety of GSX stakeholders – attendees, exhibitors, speakers, sponsors, staff, and vendors. The OCCC is one of the largest venues in the U.S. to receive the Global Biorisk Advisory Council® (GBAC) STAR™ accreditation, recognized as the third-party gold standard in cleanliness and disease prevention. The OCCC is collaborating with Orlando Health – a premier, established healthcare system – to create a medical concierge program for conventions. The OCCC will continue to evaluate its response and consult with health and industry experts to ensure the implementation of rigorous bio-risk protocols in response to the ongoing health emergency. Collaboration with Safe Expo ASIS is also pleased to announce its partnership with Safe Expo, the preeminent service provider for pre-event health planning support, onsite implementation, and post-event health monitoring, as an additional precaution to ensure a safe and healthy environment for those attending GSX 2021 in person. For those planning to attend GSX 2021 in person, please get familiarised with the event’s health and safety protocols on the event website. Cybersecurity management GSX will offer security professionals the tools to tackle cybersecurity attacks and physical security challenges If security is an endless game of offense and defense, the stakes have never been higher. As quickly as new threats are thwarted, new vulnerabilities are exposed, with cybersecurity attacks growing more organized by the day and physical security experiencing unprecedented challenges of its own. New risks require new rules of engagement—and GSX will offer security professionals the tools they need to stay at the top of their game. GSX All-Access Pass The GSX All-Access Pass unlocks six themed learning theatres and 80+ live sessions, including inspiring education sessions, expert-led tracks, exhibitor presentations, timely General Sessions, and digital content available before, during, and after the on-site event. All-Access Pass registrants will be able to access GSX sessions through 31 December and are eligible to receive up to 21 CPEs towards recertification. The full session lineup will be revealed in May. In-Person opportunities at GSX If one plans to attend GSX in person, they’ll have lots of opportunities to visit a vibrant trade show, to connect with industry leaders to discuss today’s most critical issues, get an advance look at the latest innovations, and gain powerful strategies that will foil attacks compromising their organization’s safety. Digital learning at GSX For those attending digitally, ASIS has further refined its industry-leading approach. From the first digital kickoff event on 15 September until 31 December, GSX registrants will be able to connect to the global security community and thought leadership at every turn. Tune in to live-streamed events from two learning theaters during 27-29 September, engage in live Q&As and speaker interviews during preview and encore events, and know what is happening each step of the way through the GSX platform.
In the past, security managers were primarily concerned with global terrorism. That has changed with the COVID-19 pandemic threatening the health of passengers at airports. Even if the number of passengers remains at a low level in many airports, surveillance won’t become any less complex. In fact, the opposite is true. Hygiene regulations raise new requirements for passenger processing and control. Reason enough for security managers to rethink airport security methods and evaluate how smart surveillance technologies can help meet new (and old) challenges better and more efficiently. Smart Airport Surveillance Smart Airport Surveillance combining IoT security cameras and AI video analytics help airport security managers to systematically monitor and understand passenger behavior, gain valuable insights from video data and improve security and operations, automatically and in real time. CCTV camera systems are already in use at all airports worldwide. Why not use existing infrastructure to get more out of video data? For example, smart cameras can ensure social distance according to hygiene regulations or improve the visitor experience, by reducing waiting times at security checkpoints. IoT cameras with AI video analytics IoT cameras equipped with AI video analytics can do much more than just video IoT cameras equipped with AI video analytics can do much more than just video. Ajay Kattige, Solutions Consultant at Security & Safety Things, said “We at Security & Safety Things aim to bring the latest AI technology to IoT cameras, enabling them to perform more and sophisticated tasks in airport security measures.” He adds, “We make adding powerful features to surveillance cameras as easy as installing apps on smartphone.” Airport security management Despite the threat of COVID-19, the fight against terrorism remains a key objective in airport security management. Where thousands of people gather, signals indicating terrorist activity are easily overlooked. When it comes to reliably detecting unattended luggage or people with weapons in crowds, video surveillance involving human operators reaches its limits. Smart video cameras can support humans in recognizing threats early and even perform tasks autonomously. AI-Lost camera app AI-Lost is an AI camera app designed to detect lost objects abandoned in specific areas, such as airports, stations and public spaces. AI video analytics integrated in the app enables airport security cameras to detect objects, such as suitcases and bags, not moved for a period of time (therefore, suspected of containing explosives) and notify security personnel. The video below shows how human behavior that deviates from ‘normal’ patterns can be detected by security cameras in real time, ranging from minor disputes between people to vandalism. Similarly, aggressive or violent behavior in airports can be detected early. AI-Loitering app to detect suspicious behavior AI video analytics help detect even inconspicuous individuals based on specific behavior patterns Terrorist attacks often have a prelude, people stay in one place for a period of time to scout the situation without being noticed by security staff. AI video analytics help detect even inconspicuous individuals based on specific behavior patterns. AI-Loitering is a camera app that detects odd behavior of people lingering around certain areas for a long period of time. Gun Detection Real App for weapons detection Gun Detection Real App for security cameras recognize in real time, if someone holds a gun and automatically triggers alarm. AI video analytics integrated in the camera app is able to distinguish weapons from harmless objects, such as smartphones, keys, pens or umbrellas. In very complex buildings, such as airports, it’s an ongoing challenge to keep restricted areas free from unauthorized people. Each security gate that is opened unintentionally triggers alarms leading to security routines shutting down airport operations for a period of time. Smart video surveillance combined with passenger information systems can help prevent these types of incidents. AM Line Crossing For instance, AM Line Crossing solution allows airport security managers to set up security zones in public areas where, for example, passengers are automatically notified, when approaching restricted areas. Connected to digital information systems, smart cameras not only recognize people entering defined areas, but also automatically guide them to their destination. In tall airport buildings, conventional smoke and fire sensors mounted under the ceiling are limited because they detect and report threats too late. Optical sensors, such as security cameras equipped with AI video analysis, can detect smoke and fire from long distances and automatically take timely action. AI-Fire and AI Smoke apps for flame and heat detection AI-Fire detects flames at significant distances in areas unsuitable for traditional fire alarms For example, AI-Fire detects flames at significant distances in areas unsuitable for traditional fire alarms, such as huge indoor areas in airports or stations. Combined with AI Smoke, another AI app for security cameras, airport security managers get a powerful early warning system that reliably detects and analyses all stages of fire progression. Waiting in long queues at boarding and security checkpoints challenges passengers' patience and can seriously damage travel experience. Airport staff has to take the rap, when negative passenger emotions are released. AI video technology to avoid long queues AI video technology can help avoid waiting lines and hassle. If queues get too long, smart surveillance systems automatically give instructions to staff or inform visitors via digital displays in the waiting area. At Budapest Airport, for example, visitor management works with an existing camera system equipped with smart software applications. Video data is analyzed in real time, so that waiting times can be predicted with 96 percent accuracy. These numbers are communicated via displays, for example, to direct visitors to other checkpoints. Protect passengers & airport staff against COVID-19 Social distancing is the key to preventing or at least slowing down the transmission of COVID-19 from person to person. Where many people come together, surveillance is needed to ensure appropriate behavior. The same applies to make sure that people wear masks wherever mandatory. IoT cameras, equipped with the latest technology and AI, can help detect behavior and characteristics that do not comply with regulations. Security & Safety Things and partners offer easy-to-install AI solutions to help flatten the curve of COVID-19 virus transmission.
Pyronix launches its latest security peripheral, the MCEXTERNAL-WE outdoor wireless magnetic contact. Perimeter security This tough, tamperproof and weatherproof contact extends perimeter protection applications to secure sheds, garages, gates, and more, with remote voice push notification alerts via the smart device apps, HomeControl2.0 and ProControl+. “We’re very pleased to add this perimeter protection option to the range, as this really extends perimeter protection use case applications of the system as a whole,” Laurence Kenny, Pyronix Marketing Director, said. Easy to fit and voice recognition Featuring an IP66 rating, this highly discreet and versatile Grade 2 device is easy to fit and calibrate while delivering reliable performance with reduced false alarms, even with gaps of up to 70mm between contact and magnet. MCEXTERNAL-WE has been designed to offer maximum coverage and flexibility for multiple purposes Connect the MCEXTERNAL-WE to security cameras to provide perimeter protection with voice push notifications and instant video verification of any intrusion via ProControl+. “The MCEXTERNAL-WE has been designed to offer maximum coverage and flexibility for multiple purposes, whether securing an outbuilding or a gate,” Laurence said. Voice and video- verification He continued: “We’re delighted to add this outdoor contact to the range, as a system can now offer both volumetric coverages of an area using our outdoor XD detectors, as well as a specific outbuilding and perimeter defense with the MCEXTERNAL-WE.” “By adding this to our app-enabled systems, the user will be notified via a voice push notification to their app whenever the contact is triggered – letting them know of a break-in or to simply tell them that their gate has been opened.” “If the contact has been linked to one of our cameras, say the LightCamera, the user will also receive Full-HD video verification and active defense capabilities via ProControl+; increasing not only the level of interactivity and value our security system provides users, but also upsell opportunities for our installers.” Wireless installation Built from quality plastics for satisfying installation, the MCEXTERNAL-WE also provides a wireless range of 300m in open space and outstanding 2-year battery life. Extend perimeter protection applications with the tough, tamperproof, and weatherproof MCEXTERNAL-WE. Secure from the outside in.
Enclosures containing electronics, communications or cabling infrastructure offer a simple attack point for cyber breaches and an opportunity for a physical attack on the hardware. Yet, many of these assets are housed within enclosures that provide minimal security features to offer a deterrent to any would-be attacker. This has always just been a pet hate. Walking down the high street of a town anywhere in the United Kingdom, you can often see open street communication cabinets. You can actually look directly inside at the equipment. And if I was a bad guy, I could quite easily just put my foot into their enclosure and quite quickly take out their infrastructure. Charged service for enclosures This seems crazy when a US$ 2 magnetic contact on a door can quickly tell you whether your enclosure is open or shut, and can be vital in keeping your network alive. Moreover, the operators of these systems, whether it is telecoms or internet providers, are providing a charged service to their customers, so they should really be protecting their enclosures. Why has that security level not been so readily taken into the outside world, into the unprotected environment? More sobering, if you contrast this security approach to the approach taken in the data center world, an environment that already has multiple stringent security protocols in place, you get a very different picture. For instance, security devices can capture snapshots of anyone who opens a cabinet door in a data room, so it is recorded who has opened that door. While that is just one simple example, it begs the question. Why has that security level not been so readily taken into the outside world, into the unprotected environment? In my mind, a lot of it boils down simply to education. Network connection, easy point of cyber attacks Our preconceived idea about cyber security is some big corporation being knocked out or held to ransom by, again in our mind, someone sitting at a laptop, probably with their hood up over their head, typing away in the darkness, attacking us through the internet. But how the would-be criminal is going to come at us is just like in sport. They attack at the weakest point. Networks can be deployed in the outside world in many ways, such as cameras monitoring the highways. That means those locations will have a network connection. And that can be a point of attack in a non-secure outside world. Enclosures can be broken into by attackers Many people think, ‘That is okay because I’m going to take that ethernet device that my cameras are connected to and I’m going to put it inside an enclosure.’ However, what people do not realize is that the only thing that the enclosure is doing is protecting the ethernet device from Mother Nature. Because, without proper security, those enclosures can be broken into pretty easily. Many of them are just a single key that is not in any way coded to the device. Twofold cyber security People need to realize that cyber security is twofold. It can be carried out by hacking the network or physically breaking Therein lays the problem. People need to realize that cyber security is twofold. It can be carried out by hacking the network or physically breaking into the weakest physical point. And so, a simple boot through the open door of an enclosure can vandalise the devices inside and take down a small or large part of a network. And by definition, this meets the criteria for a cyber-attack. So, how do we go about tackling this problem? Well, security is a reaction marketplace. And for enclosures, there’s not, at present, a plethora of solutions out there for to counter these types of attacks. It can be challenging to find what you’re looking for through a quick Google search compared to searching for more traditional security protection measures. Deploying smart sensors and detectors But, under Vanderbilt and ComNet, we are currently taking our knowledge and experience from system installation and compiling it together. We’re bringing different products from different parts of our business to make a true solution. For instance, we have sensors for enclosures that detect anything from gas or smoke to open doors, detectors that will tell you if someone is trying to smash open your enclosure with a sledgehammer, or that someone is trying to lift your enclosure off of its mount. More importantly, as is not really a one-size-fits-all solution, we have developed a menu structure available that allows customers to pick and choose the ones that will best fit their own requirements.
Since the start of the pandemic, almost a quarter of UK businesses have been forced to temporarily close, pause trading, or work remotely, with very little notice. Now nearing the 12th month of the crisis, the country is currently enduring its third national lockdown, with an unspecified timeframe. Most workers are being urged to remain at home and only venture out for essential travel. This means a huge number of premises across the board, from recreational venues such as theaters, pubs and leisure centers, to office buildings, and storage facilities, will remain empty. It’s likely that security has been scaled back, so many buildings could be vulnerable to attack for the foreseeable future. Just recently we’ve seen empty pubs in London targeted by opportunistic illegal rave organizers. Physical security strategy Even rural areas aren’t exempt from the problem, as burglars have reportedly targeted beauty salons, etc Even rural areas aren’t exempt from the problem, as burglars have reportedly targeted beauty salons, food stores and vehicle hire premises this winter. Vandalism and burglary remain very real threats, therefore it is vital that facilities managers and property owners ensure the physical security of these empty buildings is maintained to the highest standard to protect property and the assets within. Below we outline key considerations when evaluating a physical security strategy for an empty building. Assess the risk We would urge facilities managers and building owners to carry out regular, thorough checks of the building and the perimeter to assess any obvious factors which would elevate the risk of attack. This includes assessing the location. Is the crime rate high? How visible is the property? Are the contents of the property on show? How secure is the access or perimeter boundary? View the premises from a potential intruder’s perspective, and when you can’t be at the site in person, use photographs, notes and drawings to identify potential weaknesses. For example, there may be high security fencing at the front of the premises, but make sure it is not at risk of being compromised at the back. Conducting regular maintenance Retain and maintain quality Inspecting the fence line may seem obvious and straightforward, but it needs to be a deliberate, scheduled event Conducting regular maintenance is even more essential while premises are left empty, as it is much easier for any issues to appear and escalate undetected. We highly recommend regularly inspecting your fencing for disrepair or damage as this can affect the perimeter’s integrity. Alternatively, choosing high quality galvanized and preferably powder coated steel fencing with a 25-year guarantee will offer longer-lasting protection against rust and corrosion. Inspecting the fence line may seem obvious and straightforward, but it needs to be a deliberate, scheduled event. Take time to check the perimeter on both sides. As you inspect the fencing, keep an eye out for any attempted breaches and note if foliage, weather conditions, or topography changes have affected security integrity. Check all fixtures and fittings are in good working order, look for damage and corrosion, and clear all litter and debris away. Huge security risk Quality investments In a time when businesses are already stretched, it can be tempting to opt for quick, inexpensive fixes. However, poorly executed design or cheap, low quality products can lead to costly, long-term remediation or worse, significant loss to the business. Make wise, informed decisions and specify solutions based on your organization’s security needs first and foremost. While generic steel palisade is a popular option, owing to its intimidating aesthetic, it is easily compromised. Steel palisade fencing has inherent weaknesses that undermine performance. Its wide pales can obstruct surveillance, while the bolted construction is a huge security risk. Simply removing or breaking the lower fixing on one or two pales would allow them to swing aside to give repeated access to the site without leaving an easily visible sign that the perimeter has been breached. It’s a false economy, as the initial lower price is offset by the costs and inconvenience incurred by regular repairs. Performance classification system The standard works via a performance classification system, and even considers the tools that an intruder may use Specifying a higher quality product that’s fit for purpose makes more sense both in the short and long term, and it adds little to the original cost. Fortunately, there are a number of security accreditations that facilities managers and building owners can refer to when specifying security measures at their site, helping them choose effective solutions to combat the risks the property faces. Proven performance Certifications and approvals, such as The Loss Prevention Certification Board’s (LPCB) LPS 1175 and the British Standards Institution’s (BSI) PAS, prove a product has been thoroughly tested to a specific standard. They prove the strength and durability of the item in multiple different situations. It is worth noting also that investing in effective perimeter protection can actually deliver a positive return by reducing the incidence of burglary and vandalism, and their associated costs. The technical evaluation work carried out by LPCB is extremely thorough. The product is subjected to rigorous quality audit processes, to certify the security products tested by BRE deliver verified levels of protection. All LPS 1175 rated products are vigorously tested before receiving an accreditation. The standard works via a performance classification system, and even considers the tools that an intruder may use. Intrusion detection system Our law enforcement teams are stretched to capacity and coping with reduced workforces due to illness By predicting a likely toolset, specifiers can construct multiple defensive layers to maximize how much time a facility has to respond to an attack. Different levels of security are crucial for the ‘5D defense’ concept, whereby a quintet of security assets work together to prevent access to your site, resulting in a strategy that will: Deter, Detect, Deny, Delay and Defend unwanted access from intruders. 360° security There is no single solution when it comes to securing a building. Every situation must be considered on an individual basis, starting with a full risk assessment. We recommend an integrated approach where appropriate. Along with a secure perimeter, this might also include effective lighting in shaded areas and at doors, gates, and vulnerable windows, Perimeter Intrusion Detection Systems (PIDS) and well-placed CCTV. These measures can hinder entry and escape, or increase the chance of discovery and detection. Domestic burglaries While domestic burglaries have become less attractive as many of our homes are now occupied around the clock, commercial properties have become increasingly more vulnerable. Our law enforcement teams are stretched to capacity and coping with reduced workforces due to isolating and illness. Therefore it has never been so important for building owners and facilities managers to assess the properties they’re responsible for to ensure they’re protected effectively in the event of an attack.
In the UK, one burglary occurs every 106 seconds. This means by the time you've finished reading this article, at least three will have taken place. Selecting robust physical security options to protect property boundaries and homes is essential to limit crime rates and deter opportunistic intruders. With 58% of burglaries said to take place while the homeowner is in, it seems that even the second wave of lockdowns, and an increased number of people confined to their homes, won't do much to eliminate the risk of burglary. Prioritise security for peace of mind Security is paramount, and in the case of new build projects, should be considered from the very beginning of the design process, not as an afterthought. When it comes to securing pre-existing buildings, there are countless security options which will ensure the perimeter is robust enough to withstand opportunistic attacks. It's also worth noting that security features don't have to be complicated. There are plenty of high-tech digital systems flooding the market, which can go a long way to reduce the risk of burglary and will provide peace of mind to the end user. However, this article will demonstrate how traditional security measures, such as high-quality perimeter fencing, can ensure practical safeguarding of properties for years to come. Selecting robust physical security options to protect property boundaries and homes is essential to limit crime rates Timber! There are a number of different materials which can be specified to create a strong boundary. From metal railings, to timber fence panels, they will each help deter criminals somewhat. Wooden fence panels are a popular choice for their appearance, and the right product and installation can help to increase security.Our timber acoustic fencing can also reduce noise by up to 32dB and has a solid face with no hand or footholds, while still retaining the attractive natural timber aesthetic of a typical garden fence. However, maintenance is key, and one of the first thing burglars will notice is the condition a fence is in, rather than a particular style. Therefore, old, broken or rotten fence panels are a green light for opportunistic thieves. These can be easily broken or bypassed with minimal effort. When specifying fences as part of a new build housing development, we would suggest opting for high-quality timber, as this will ensure that it is protected against rot. Look for products with an extended guarantee or those that don't need additional treatment over the years. The condition of the fence should still be regularly inspected, and simple methods such as clearing piles of leaves away from the base of the boundary can help to prevent rot which weakens the timber. Securing fence panels The recent rising cost of timber has led to a dramatic increase in fence panel theft, and panels that can be lifted from the posts are an easy target. Mitigate this risk by screwing the fence panels into the posts. This makes it much harder for the panels to be removed from the posts and creates a more secure barrier. Concrete posts do offer benefits, but we always advise on timber posts for any fencing. They're strong, just like concrete, but they continue the same natural theme as the rest of the fence. Moreover, if you screwed the panels to concrete posts, they would most likely crack and become damaged, and then be at risk to the elements. Astute design Design is also important. Installing fence rails on the inside of properties to prevent them from being used as climbing aids is highly recommended. Even better, using panels without rails on high-end developments is a clever tip if you want a secure fence with a high-spec look. Security features don't have to be complicated High fences with solid panels and no gaps in between make it considerably harder for potential burglars to climb over. They also offer better privacy to conceal rear garden areas from intruders, and are much sturdier than other alternative panels. One common mistake is designing in features such as trees or children's climbing frames too close to the boundary. These can be used by burglars as climbing aids when attempting to scale the fence, making access easy. Investigate the surrounding area, which flanks the outside of the property boundary, as an unfortunately placed bin or bench can also help criminals gain entry. If the removal of these items is not possible, designing in a spiky bush can help deter intruders. It's also worth noting that gardens with numerous large features such as bushes or sheds can also negatively impact the level of security. A clear line of sight across the entire garden is highly recommended where possible. If this view is blocked, it's considerably easy for intruders to hide undetected. Front gardens While tall, solid fence panels are recommended for rear gardens to prevent intruders from being able to see in and climb over, the opposite is true for front gardens. For street-facing gardens, a low fence or hedge is recommended to provide a clear view from the house. It also makes it much harder for intruders to hide from passers-by or neighbours, who can raise the alarm during a burglary. Another useful security technique to consider is a gravel drive. These create noise, which means the homeowner will know when it is in use. Pair this with a strong boundary fence, the likelihood of burglary dramatically decreases. This article only scratches the surface in unveiling the sheer volume of effective home security options on offer to protect homes and gardens. These investments can help minimize the risk of traumatic break-ins, while also simultaneously boosting the aesthetic of the property and its surroundings.
Artificial intelligence (AI) is more than a buzzword. AI is increasingly becoming part of our everyday lives, and a vital tool in the physical security industry. In 2020, AI received more attention than ever, and expanded the ways it can contribute value to physical security systems. This article will revisit some of those development at year-end, including links back to the originally published content. In the security market today, AI is expanding the use cases, making technologies more powerful and saving money on manpower costs - and today represents just the beginning of what AI can do for the industry. What it will never do, however, is completely take the place of humans in operating security systems. There is a limit to how much we are willing to turn over to machines - even the smartest ones. Beyond video analytics "Apply AI to security and now you have an incredibly powerful tool that allows you to operate proactively rather than reactively," said Jody Ross of AMAG Technology, one of our Expert Roundtable Panelists. AI made its initial splash in the physical security market by transforming the effectiveness of video analytics AI made its initial splash in the physical security market by transforming the effectiveness of video analytics. However, now there are many other applications, too, as addressed by our Expert Panel Roundtable in another article. Artificial intelligence (AI) and machine learning provide useful tools to make sense of massive amounts of Internet of Things (IoT) data. By helping to automate low-level decision-making, the technologies can make security operators more efficient. Biometrics with access control Intelligent capabilities can expand integration options such as increasing the use of biometrics with access control. AI can also help to monitor mechanics and processes. Intelligent systems can help end users understand building occupancy and traffic patterns and even to help enforce physical distancing. These are just a few of the possible uses of the technologies - in the end, the sky is the limit. AI is undoubtedly one of the bigger disrupters in the physical security industry, and adoption is growing at a rapid rate. And it’s not just about video analytics. Rather, it is data AI, which is completely untapped by the security industry. Bottom line: AI can change up your security game by automatically deciphering information to predict the future using a wide range of sources and data that have been collected, whether past, present, and future. That’s right. You can look into the future. Smarter perimeter protection Now, Intrusion Detection (Perimeter Protection) systems with cutting-edge, built-in AI algorithms to recognize a plethora of different object types, can distinguish objects of interest, thus significantly decreasing the false-positive intrusion rate. The more advanced AI-based systems enable the users to draw ROIs based on break-in points, areas of high-valuables, and any other preference to where alerts may be beneficial. AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store Similarly, AI Loitering Detection can be used to receive alerts on suspicious activity outside any given store. The loitering time and region of interest are customizable in particular systems, which allows for a range of detection options. Smart security is advancing rapidly. As AI and 4K rise in adoption on smart video cameras, these higher video resolutions are driving the demand for more data to be stored on-camera. AI and smart video promise to extract greater insights from security video. Meeting urban needs Complex, extensive camera networks will already require a large amount of data storage, particularly if this is 24/7 monitoring from smart video-enabled devices. Newer edge computing will play an important role in capturing, collecting, and analyzing data. There are many more types of cameras being used today, such as body cameras, dashboard cameras, and new Internet of Things (IoT) devices and sensors. Video data is so rich nowadays, you can analyze it and deduce a lot of valuable information in real-time, instead of post-event. In smart cities applications, the challenge of identifying both physical and invisible threats to meet urban citizens’ needs will demand a security response that is proactive, adaptable and dynamic. Optimize security solutions As we look ahead to the future of public safety, it’s clear that new technologies, driven by artificial intelligence (AI), can dramatically improve the effectiveness of today’s physical security space. For smart cities, the use of innovative AI and machine learning technologies have already started to help optimize security solutions. In sports stadium applications, AI’s role in getting fans and spectators back after the COVID pandemic is huge, through capabilities such as social distance monitoring, crowd scanning/metrics, facial recognition, fever detection, track and trace and providing behavioral analytics. Technologies such as AI-powered collaboration platforms now work alongside National Leagues, Franchises and Governing Bodies to implement AI surveillance software into their CCTV/surveillance cameras. AI surveillance software In many ways, it’s the equivalent of a neighborhood watch program made far more intelligent through the use of AI This is now creating a more collaborative effort from the operations team in stadiums, rather than purely security. AI surveillance software, when implemented into the surveillance cameras can be accessed by designated users on any device and on any browser platform. One of the biggest advantages of using AI technology is that it’s possible to integrate this intelligent software into building smarter, safer communities and cities. Essentially, this means developing a layered system that connects multiple sensors for the detection of visible and invisible threats. Integrated systems mean that threats can be detected and tracked, with onsite and law enforcement notified faster, and possibly before an assault begins to take place. In many ways, it’s the equivalent of a neighborhood watch program made far more intelligent through the use of AI. Fighting illicit trade Using technology in this way means that thousands of people can be screened seamlessly and quickly, without invading their civil liberties or privacy. AI’s ability to detect visible or invisible threats or behavioral anomalies will prove enormously valuable to many sectors across our global economy. Revolutionary AI-driven technologies can help to fight illicit trade across markets. AI technologies in this specific application promise to help build safer and more secure communities in the future. AI can support the ongoing fight against illicit trade on a global scale in a tangible way. For financial transactions at risk of fraud and money laundering, for example, tracking has become an increasing headache if done manually. As a solution to this labor-intensive process, AI technology can be trained to follow all the compliance rules and process a large number of documents - often billions of pages of documents - in a short period of time.
The coronavirus pandemic had a monumental impact on all aspects of the business world, including the security industry. However, amid the gloom and doom, many security professionals also saw opportunity: New ways the industry’s products could be applied to address the challenges of coping with the virus. This article will review some of those opportunities, based on our reporting throughout the year and including links back to the original articles. During and after the pandemic, security systems are an important asset when it comes to helping to keep occupants and buildings safe as employees return to work. For example, video analytics can provide insight into how spaces have previously been used and can help to predict where and when occupants encounter each other or congregate. Role of thermal cameras These foot-traffic patterns can inform settings for a variety of devices - like ventilation and temperature controls - and even help owners create social distancing plans and monitor personal protective equipment (PPE) compliance. Thermal surveillance, a mainstay of traditional physical security and outdoor perimeter detection, began being deployed early in the pandemic to quickly scan employees, contractors and visitors as part of a first line of defense to detect COVID-19 symptoms. These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices These systems provide flexibility and can offer integrations with multiple VMS platforms and access control devices. Thermal cameras can be a tool for detecting fever, but any use of the technology for this purpose is full of qualifications and caveats. Importantly, how the camera system is configured makes all the difference in whether temperature readings are accurate, and the downside of inaccurate readings is obvious - and potentially deadly. Temperature detection systems FDA guidelines limit how the cameras are used, not to mention guidance from other regulatory/government bodies such as the CDC. One of our Expert Roundtable panelists compares the market to a “wild west scenario,” and almost all the panelists are clear about how customers should approach the market: Buyer beware. There are many companies jumping into selling temperature detection systems to the state, local governments, hospitals, airports and local businesses, but do they know how to drive one? Anyone can get behind a car and drive it into a wall by accident. The same can happen with a temperature detection system. Customers need to know what questions to ask to ensure they maximize the accuracy of body temperature detection systems. Rise of contactless Spread of the novel coronavirus has jolted awareness of hygiene as it relates to touching surfaces such as keypads. No longer in favor are contact-based modalities including use of personal identification numbers (PINs) and keypads, and the shift has been sudden and long-term. Both customers and manufacturers were taken by surprise by this aspect of the virus’s impact and are therefore scrambling for solutions. Immediate impact of the change includes suspension of time and attendance systems that are touch-based Immediate impact of the change includes suspension of time and attendance systems that are touch-based. Some two-factor authentication systems are being downgraded to RFID-only, abandoning the keypad and/or biometric components that contributed to higher security, but are now unacceptable because they involve touching. "Users do not want to touch anything anymore,” says Alex Zarrabi, President of Touchless Biometrics Systems (TBS). Facial recognition system Another contactless system that benefits from concerns about spread of COVID-19 is facial recognition. New advancement in software, specifically in the areas of algorithms, neural networks and deep learning and/or artificial intelligence (AI), have all dramatically improved both the performance and accuracy of facial recognition systems, further expanding its use for an increasing number of applications. A low-tech solution - the face mask - became a leading preventative measure during the pandemic. But, a high-tech solution is necessary to ensure that everyone is wearing them. Cameras powered by artificial intelligence can now identify whether or not people entering a facility are wearing facemasks and help enforce adherence to mask mandates. This technology is proving to be a cost-effective solution that reduces risks of confrontations over masks policies and gives managers the data they need to document regulatory compliance and reduce liability. Smart video analytics Other technology approaches, including artificial intelligence (AI), were also brought to bear during the pandemic. The German data analytics powerhouse G2K, for example, has developed a Corona Detection and Containment System (CDCS) that is ready for immediate use in record time. Detection takes place in combination with AI-supported data analysis to specifically identify virus hotspots and distribution routes, as well as to identify other potentially infected persons. One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated One specific AI application fuels the reopening of the world and successfully keeps the spread of the virus abated. A “collaborative security” application includes a synthesis of smart video analytics, facial recognition, object identification/detection, and thermal cameras that can support the reopening of businesses globally when installed within those facilities frequented by customers. Enforcing social distancing Several applications have been successful to date and will increase in usability in the foreseeable future, creating “smart cities” working together towards a safer, more secure world. The site of one pilot program is the 250,000-square-foot HID Global facility in Austin. For the pilot program, 80 HID Location Services readers were installed in a wide area in the facility, including a variety of environments. Initially 30 badges and 30 fobs, all BLE-enabled, were issued to employees. If a badge identifies another nearby beacon (suggesting a social distancing failure), it emits a blinking LED light, which can be seen by the offending co-worker. To ensure social distancing, a Bluetooth Low Energy (BLE) beacon is emitted from an employee’s fob (or from a badge that has the same functionality). The beacon communicates peer-to-peer with a beacon emitted by another employee’s fob or badge to alert if the location of the two employees is less than six feet apart. For contact tracing, the beacons communicate via a nearby “reader” (a BluFi BLE-to-Wi-Fi gateway) to the Bluzone cloud-based software-as-a-service. COVID-19 White Papers In addition, we published several White Papers in 2020 that addressed various aspects of the coronavirus pandemic. They included: The top five security lessons learned that apply across all industries navigating COVID-19. Using video analytics to keep staff, visitors and customers safe by enforcing social distancing. How antimicrobial treatment on door handles and levers can reduce disease spread. How companies can put in extra precautions that will continue to grow and adapt with their environment over the long-term. Determining the practicalities and capabilities of today's thermal cameras to accurately detect body temperature.
Close collaboration with customers has been a hallmark of the physical security industry for decades. And yet, less ability to collaborate face-to-face to discuss customer needs has been a consequence of the COVID-19 pandemic. “True innovation, which comes from close collaboration with customers, is more difficult to achieve remotely,” said Howard Johnson, President and COO, AMAG Technology, adding “Not being able to visit in person has not been helpful. Kurt John, Chief Cyber Security Officer at Siemens USA, adds “We need to plan intentionally with a strategic approach for collaboration and innovation.” Securing New Ground virtual conference Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry Security experts from three manufacturers reflected on the impact of COVID-19 on the physical security industry at a ‘View from the Top’ session, during the Securing New Ground virtual conference, sponsored by the Security Industry Association. Their comments covered business practices during the pandemic and the outlook for technology innovation in response. “We had to pivot quickly on business models and create a cross-portfolio team task force to discuss how we can leverage technologies to help customers [during the pandemic],” said John, adding “We are having outcome-based conversations with customers about their businesses and operations, and how we can combine short-term benefits with long-term growth and flexibility.” But some of those conversations are happening from a distance. Results-oriented approach in remote work environment After the pandemic took hold, Siemens shifted rapidly to remote work and embraced other infrastructure changes. “We had to refocus and lead with empathy, flexibility and trust,” said John, adding “We gave our staff flexibility to set their hours and used a results-oriented approach.” There is also a social element missing in the work-from-home model. “Virtual coffee machines do not replace being there in person,” said Pierre Racz, President and CEO, Genetec, adding “Small talk about the weather is important psychological elements.” Positives in using multi-factor identity management He predicts that, in the future, office hours may be reduced, but not floor space, with space needed for in-person collaboration and long-term social distancing. Employees will come to the office to do collaborative work, but can work from home to accomplish individual tasks that may be ‘deferred’ to after-hours, when the kids have been fed. When the pandemic hit, Genetec had resumed 95% of their operations within 36 hours, thanks to their use of multi-factor identity management. They did not suffer from malware and phishing issues. “Multi-factor is really important so that well-engineered phishing campaigns are not successful,” said Pierre Racz. Shift to ‘Zero Trust’ model All three panelists noted a coming skills gap relating both cyber security and systems integration Remote working technologies are shifting to a ‘zero trust’ model, in which access to systems is granted adaptively based on contextual awareness of authorized user patterns based on identity, time, and device posture. For example, an office computer might have more leeway than a home computer and a computer at Starbucks would be even less trusted. The approach increases logical access security while providing users their choice of devices and apps. Skills gap in cyber security and systems integration A growing skills gap has continued throughout the pandemic. “Where we have vacancies, we have struggled to find candidates,” said Howard Johnson. All three panelists noted a coming skills gap relating both cyber security and systems integration. New technologies will clearly require new skills that may currently be rare in the workforce. Cyber security will become even more important with growth in new technologies such as AI, machine learning, 5G and edge computing. A workforce development plan is needed to address the technologies and to enable companies to pivot to new business needs, said John. Adoption of temperature sensing solutions From a technology viewpoint, Johnson has seen attention shift to the reception area and portal, away from touch technologies and embracing temperature sensing as a new element. There have also been new requests for video and audio at the portal point, to create methods of access and egress that do not require security personnel to be present. “Some customers are early adopters, and others are waiting for the market to mature before investing,” Howard Johnson said. “Security companies have been faced with the need to respond rapidly to their customers’ needs during the pandemic, but without seeming like ‘ambulance chasers’,” said Pierre Racz. In the case of Genetec, the company offered new system capabilities, such as a 'contamination report', to existing customers for free. Move to a hybrid and flexible work environment In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach" An immediate impact of the pandemic has been a reduction in required office space, as more employees have worked from home, raising questions about future demand for office space. “The pendulum tends to swing to the extremes,” said Kurt John, adding “In the new normal, the pendulum will swing back to the middle with more flexibility and a hybrid approach.” “Users will be much more careful about letting people into their space, which requires more policies and procedures,” said Lorna Chandler, CEO, Security by Design, who participated in a panel at Securing New Ground about how the pandemic is changing commercial architecture and access control. “Users should also be careful in the rush to secure premises from COVID-19 that they don’t violate HIPAA laws or create other potential liabilities,” adds Chandler. Continuum of mechanical and electromechanical devices Mark Duato, Executive Vice President, Aftermarket, ASSA ABLOY Opening Solutions, said a “Continuum of mechanical and electromechanical devices is needed to protect premises and ensure convenient operation of an access control operation.” “First and foremost, the immediate reaction to the impact of COVID-19 is to rush to educate and invest in technologies to increase the ability to analyze people,” said Duato, who also participated in the access control panel. Shift to touchless, frictionless access control “The move to touchless, frictionless access control “is really a collaboration of people, process and technology,” said Valerie Currin, President and Managing Director, Boon Edam Inc., adding “And all three elements need to come together. Touchless and frictionless have been in our market for decades, and they’re only going to become heightened and grow. We’re seeing our business pivot to serve markets we have not served in the past." More and more data is a feature of new systems, but is only helpful when it is analyzed. “We all live in a world of data, or IoT and sensor technology,” said ASSA ABLOY’s Mark Duato, adding “But we don’t want to be crushed by data. Data is only helpful when you can reduce it to functional benefits that will help us innovate. We have to take the time to squeeze the value out of data.”
An intelligent network of 20 Axis EN fire panels from fire and life safety systems manufacturer, Advanced, have been installed at HaDo Centrosa Garden in the heart of Ho Chi Minh City, Vietnam. HaDo Centrosa Garden is a 70,000 sq. m development of eight 30-story luxury residential towers and 115 townhouses, located in the heart of Vietnam’s Ho Chi Minh City. The upscale condominium complex’s facilities will include a swimming pool, tennis and basketball courts, fitness center, rooftop gardens, a park, school, library and commercial center. System with high-speed networking capabilities Vietsafe and KP Technology were confident in Axis EN’s ability to deliver the seamless networking needed A key requirement for this large-scale complex was a system with high-speed networking capabilities, to enable instantaneous sharing of communications between panels. To meet this need, fire protection companies Vietsafe and KP Technology chose 20 Advanced Axis EN fire alarm control panels, alongside 3,000 addressable devices, for installation in the eight residential towers. With many successful installations of Advanced products undertaken by both companies, Vietsafe and KP Technology were confident in Axis EN’s ability to deliver the seamless networking needed, while its ease of installation, testing, commissioning and operation would ensure minimal issues once the panels were on site. Axis EN fire alarm control panels installed Le Manh Dung, Director of Vietsafe, said “An Axis EN fire system was the clear choice for a project of this nature. Advanced is well respected in the fire industry, and its solutions are straightforward in terms of installation and operation, thanks to features such as built-in isolators for sequence addressing, which considerably reduces installation time.” Axis EN is EN54 parts 2, 4 and 13 approved and its panels can be used in single-loop, single-panel format or easily configured into high-speed, multi-loop networks of up to 200 nodes covering huge areas. Advanced’s reputation for ease of installation and configuration, as well as its wide peripheral range make its products customizable to almost any application. False alarm management and reduction Pham Thanh Phong, Director of KP Technology, said “As a key partner to KP Technology, Advanced is a fire system supplier we can trust, to deliver high-performing, high-quality solutions that are easy to install and to use. Features such as Axis EN’s false alarm management and reduction capabilities are extremely useful in high-rise residential sites, such as HaDo Centrosa Garden.” Pham Thanh Phong adds, “Repeated false alarms are not only intrusive, they can also lead to complacency and delayed reactions to real fire alarms. Having the ability to refine and configure protection so specifically, and according to the requirements of specific areas within a building, helps to keep unwanted alarms to a minimum and reduces disruption and risk for residents.” AlarmCalm software and MxPro 5 fire system AlarmCalm software comes as standard with any Axis EN and MxPro 5 fire system AlarmCalm software comes as standard with any Axis EN and MxPro 5 fire system, taking advantage of Advanced’s high-speed robust panels and networks to offer a best-in-class solution for managing verification and investigation delays to outputs. It allows the false alarm management strategy for a site to be refined precisely and to take account of occupants’ needs and area usage. It also includes the optional AlarmCalm button, a loop device that allows residents or trained staff to indicate whether they believe a signal in their area is due to a false alarm. Axis EN fire system Tin Le Than, Advanced’s Sales and Business Development Manager for South East Asia, said “As a modern, vibrant complex for thousands of people living and working in the center of Ho Chi Minh, the fire protection for the HaDo Centrosa Garden development is a key priority.” Tin Le Than adds, “As an industry-renowned solution, the Axis EN fire system will deliver complete peace of mind to the building owners and residents of the complex. I am pleased to have been able to support our fantastic partners at Vietsafe and KP Technology with the equipment needed to fulfill their requirements.” Global projects Advanced, owned by FTSE 100 Company, Halma PLC, protects a wide range of sites across South East Asia including the Hong Kong-Zhuhai-Macau Bridge, University of Macau and Hong Kong Central Library. Halma is a global group of life-saving technology companies with a clear purpose to grow a safer, cleaner, healthier future for everyone, every day.
Digital Barriers, a globally renowned provider of edge-intelligent surveillance and security technologies, reveals its collaboration with the Future Farms Cymru project, run by North Wales Police. Real-time surveillance solutions Digital Barriers has equipped a farm in North Wales with its real-time surveillance solutions, to demonstrate the role that sophisticated technologies can play in cutting the cost of rural crime, estimated by the National Farmers Union to have reached 54 million pounds in 2019. Rural areas and farmland can be inherently difficult environments to secure. However, Digital Barriers’ scalable and flexible solutions are designed to work in demanding conditions, such as remote and vulnerable locations. AI-based edge analytics Digital Barriers’ video streaming capability and AI-based edge analytics can provide reliable and secure monitoring Proven and trusted within the military and defense domain, Digital Barriers’ state-of-the-art video streaming capability and AI-based edge analytics can provide reliable and secure monitoring, thereby protecting people, places, and assets. The first technology being showcased as part of Future Farms Cymru project is a live streaming body worn camera for the enhanced protection of lone workers. If an incident occurs, the wearer can press the urgent assistance button, which transmits video and a live GPS location back to a designated monitoring center, providing immediate response. EdgeVis Shield The second is EdgeVis Shield, a combination of easy-to-deploy ground sensors that can be used to secure vast perimeters, including farmland containing high value assets. The autonomous system automatically detects when irregular behavior occurs around a perimeter, sending alerts and live video, if a trespasser or vehicle approaches. PC Dewi Evans of the North Wales Police Rural Crime Team commented on the announcement, “In recent years, we are increasingly seeing rural communities and businesses being targeted by criminals. Therefore, it is vital that rural businesses employ the right security methods to protect their assets. Criminals need to know that the farm they’re targeting could be equipped with this cutting-edge technology and they will be almost certainly caught.” Countering rise in rural crime Neil Hendry, Vice President EMEA at Digital Barriers, said, “I am happy that our technology is being used on the front line in the fight against rural crime. The COVID-19 pandemic has adversely affected businesses of all shapes and sizes, with farmers struggling to protect themselves against criminal activity.” Neil Hendry adds, “Future Farms Cymru is an important initiative, and we are delighted to be able help shape and support the future food and farming policy, with our robust video surveillance technology.”
The MiQro Innovation Collaborative Centre (C2MI), the largest electronics systems research and development center in Canada, has announced that they recently selected Honeywell for its new thermal screening and risk self-assessment process, at its Bromont, Quebec location, to better sustain operations and to help improve the well-being of building occupants and visitors. Thermal cameras installed C2MI is an internationally known micro-electronics research center that requires 24/7 laboratory access for its team and collaborators. The COVID-19 pandemic challenged its standard operations and ability to provide laboratory access, while limiting potential virus exposure. Honeywell worked with C2MI to install a thermal camera solution to screen elevated skin temperatures and risk self-assessment, in order to streamline building access control, without the need for human interaction. Healthy Building Kiosk thermal sensors Using AI, the Healthy Building Kiosk thermal sensor monitors for trends and leverages variables Using artificial intelligence (AI), the Healthy Building Kiosk thermal sensor monitors for trends and leverages variables, such as the outdoor temperature to provide more accurate readings. If an elevated skin temperature is detected, the staffer or visitor is referred for testing, before being authorized access to the center. The solution allows C2MI security staff to focus on other critical tasks and gives building users shared accountability. C2MI and Honeywell collaboration C2MI and Honeywell are continuously working to refine the technology, in order to create a more efficient and safer access control. C2MI will see a return on investment in less than one year, when calculating the cost of a security personnel dedicated to managing staff access control. “We’ve worked with C2MI to create a custom solution to improve the efficiency of building access and support a return to more normal operations,” said Laura Laltrello, Vice President and General Manager of North America services for Honeywell Building Technologies. 24/7 operations simplified Laura Laltrello adds, “With the implementation of the new Healthy Building Kiosk at the entrance, C2MI’s 24/7 operations are simplified, while allowing the security staff to focus on other critical tasks. We’ve also deployed a continuous improvement process with C2MI to refine the solution to best suit its needs and manage issues such as queuing.” “As a center of collaboration and innovation, C2MI faced two challenges in the past year: the ability to sustain operations, while also taking steps to help make our staff and researchers safer,” said Marie-Josée Turgeon, General Manager for C2MI. Streamlining building access control Our collaboration with Honeywell has allowed us to streamline building entry" Marie-Josée Turgeon adds, “Our collaboration with Honeywell has allowed us to streamline building entry and remove the semi-manual process of individuals’ skin temperature reading, to help provide a safer environment for our teams.” C2MI also implemented health protocols aligned with local guidelines and recommendations, such as a work-from-home (WFH) policy, limiting the number of people in the cafeteria and conference rooms, encouraging social distancing, optimizing disinfecting and cleaning, as well as mandatory procedural mask wearing. Honeywell Healthy Buildings solutions Honeywell’s Healthy Building solutions are part of a comprehensive effort to quickly develop innovative solutions that will help critical sectors of the global economy to recover, without the need to replace existing infrastructure at high costs. Honeywell’s Healthy Building solutions also provide a holistic view of a building’s health, based on the key factors, such as indoor air quality (IAQ), occupant flow, personal protective equipment (PPE) analytics, thermal screening, skin temperature monitoring, social distancing and sanitation efficacy.
Merrion Vaults, an Ireland-based provider of safe deposit boxes, has selected biometric identity verification technology from Iris ID. Merrion Vaults rents safe deposit boxes, like those found at banks, but with a significant difference, customer identities are authenticated through highly accurate iris readers, in order to enhance security. Private safe deposit boxes Merrion Vaults operates private safe deposit boxes in Glasgow and Edinburgh, in Scotland, Nottingham, Liverpool and Newcastle, in England and Dublin, in Ireland. Seamus Fahy, Director, Merrion Vaults, said the iris readers are replacing fingerprint recognition systems for authenticating customer identity. Fahy believes the choice of contactless iris readers was well timed, with the ongoing COVID-19 pandemic. Seamus Fahy stated, “The initial customer reaction to the Iris ID readers has been excellent. The customers love it.” Fingerprint readers It’s a simple, easy process for them to swipe an access card and then look into the reader with nothing to touch" He adds, “It’s a simple, easy process for them to swipe an access card and then look into the reader with nothing to touch. The entire process takes a few seconds to complete. Using the fingerprint reader, customers would forget which finger they registered with or would press too hard or too lightly on the reader. If they couldn’t get access, we’d have to check their names and passwords, and then re-register them. It was a hassle.” According to Fahy, the Iris ID readers are part of a tight security plan that includes video surveillance, access control, turnstiles, intrusion alarms and panic buttons, as well as seismic and water sensors. Employees monitor cameras at each facility and in a system-wide control room in Dublin, Ireland. Iris recognition system Mohammed Murad, Vice President of Iris ID feels the iris recognition system allows rapid and highly accurate authentication of Merrion Vaults customers, due to each person’s unique iris patterns. Mohammed Murad said, “The accuracy, speed and convenience of the Iris ID system are critical for a business that identifies its customers using biometrics. Our system also provides another critical layer of security, ensuring only Merrion customers gain access to the vault. No two people, including identical twins, have the same iris patterns.” Iris iCAM7S system readers The Iris iCAM7S system readers provide a mirror interface with color-alignment indicators guiding customers through the authentication process while capturing iris images at distances of up to 15 inches. Fahy adds that many banks in the United Kingdom are discontinuing safe deposit box service, creating an opportunity for private vendors to fill the gap. Merrion Vaults plans to open new facilities in Belfast, Northern Ireland, Reading and Bristol, England and Barcelona, Spain in 2021. Longer-term plans include locations in cities across the U.S. Merrion Vaults partners with Aditech, which uses dial-in capabilities to remotely configure and set up the system and test it with Merrion Vault’s IT department.
With a mission to recognize the faces of the people entering/exiting premises of the Government Institution in Indonesia, and analyze their attributes in real-time, the authority needed an extremely robust and ‘highly secured’ facial recognition system. Due to heavy footfall at the premise, it was difficult for staff to manually record information of visiting people and verify their identity on a daily basis. Sometimes, they faced challenge in verifying them due to changes in appearance or features of the visitors. Videonetics MeraFace Videonetics MeraFace, the advanced facial recognition software was selected after a thorough technical evaluation Videonetics MeraFace, the advanced facial recognition software was selected after a thorough technical evaluation by the partner, as well as government decision-makers. The software was selected for its highest accuracy in recognizing and detecting faces in varied lighting conditions, thereby providing additional attributes of gender, age, and emotions, and comprehensive statistical reporting. Operating 24x7 for 365 days, on one of the busiest premises, with a heavy footfall of VIPs, citizens, media, and government officials, Videonetics MeraFace was deployed at strategic locations with high human traffic flows, including entry and exit points, and lift lobby area of the institution. Key features of Videonetics MeraFace include: Video streams from IP cameras are processed at MeraFace to detect faces in real-time and operators find a probable match with the registered faces. In case, any face that is not registered but has been captured and stored in the system can also be found anytime. Operators have been keeping records of registered faces and attributes of the person’s face for future search and investigation. Powered by AI & Deep Learning framework, MeraFace analyzes and delivers more information, such as gender, age, emotion, eventually helpful for officials to make accurate visitors’ analysis. Now, operators can identify and classify VIP, suspected, blacklisted people in real-time with easy clicks and send the instant notification to the staff, for any swift action. At the time of any suspicious activity, operators can quickly investigate a person’s face in the given videos or collection of face images. Moreover, this feature has been phenomenally successful as an investigation tool, for conducting post-incident analysis. Scalable facial recognition system Videonetics MeraFace has proven to be a reliable and scalable system for the government authority, by delivering fast and highly accurate results. With the system, the security staff can recognize and detect faces in real-time. Furthermore, MeraFace has helped in appointing a smaller number of security guards around the entrance or exit of the premise, thanks to an automated facial recognition system of identifying and validating information. The risk of human errors in face matching has also been eliminated. “Videonetics has not only delivered a perfect facial recognition solution, but also delivered on its reputation of providing outstanding training and support, to us and customer. Our customer has invested in the future-proof technology that has the ability to grow with their needs,” stated Alfred Bisuk, Technical Manager, Lamjaya Inovasi Komputindo.
ClanTect and ePm have signed a partnership agreement for the sale and servicing of ClanTect’s next generation Motion Detection systems (also referred to as ‘heartbeat’ detection systems) for the United Arab Emirates (UAE). Detecting humans in vehicles ClanTect’s systems are used to detect the hidden presence of people inside vehicles and are deployed within a wide range of organizations in the Border Security, Prisons and Critical Infrastructure markets. Customers include globally renowned organizations, such as the UK Border Force and Frontex, the European Border and Coast Guard Agency and Her Majesty’s Prison Service in the United Kingdom. Tens of thousands of clandestine operatives and fugitives are detected by ClanTect each year, with hundreds of lives being saved. Ultra-sensitive sensors Its ultra-sensitive sensors can detect even the faintest of movements, from anywhere within a vehicle ClanTect’s systems are based on sound and vibration technology. Its ultra-sensitive sensors can detect even the faintest of movements, from anywhere within a vehicle. The system is extremely fast (approx. 60 seconds for a vehicle search), it is very easy to use, the search process is fully automated, and, unlike X-Ray and some other technologies, it is completely safe for both the operator and for the stowaway. ClanTect’s system is extremely accurate. It utilizes a unique ‘blocking’ capability, which eliminates any nearby surrounding noise from outside of the vehicle. Compact 2nd generation systems With the launch of their 2nd generation systems, ClanTect provides smaller and more compact devices, which are now fully wireless, thereby making them easy to deploy in ad-hoc outdoor roadside locations, even in windy weather conditions. Professor Steve Daley, Managing Director of ClanTect commented, “Our systems can enable the UAE authorities to meet some of today’s most pressing security challenges, such as human trafficking, the protection of critical infrastructure and the security of custodial facilities.” Protection of critical infrastructure Steve Daley adds, “We have also ensured that our systems have been thoroughly tested to meet the challenging environmental conditions faced in the UAE.” Hadi R Omer, Director of Sales & Marketing (Systems & Solutions) at ePm said, “Here at ePm, we have been serving the needs of government and commercial customers since the 1980’s, including the Ministry of Interior, Abu Dhabi Police, Dubai Police, UAE Armed Forces, Dubai Customs, and ADNOC. We feel that ClanTect’s technology perfectly complements our existing portfolio of security products and offers tremendous operational capabilities for public and private sector organizations across the UAE.”
Round table discussion
When technology performs a required task effectively, there is little reason to upgrade to the ‘next big thing’. In this regard, the physical security market is notoriously slow to change. Much of yesterday’s most robust and dependable equipment is still in place at thousands of customer sites, still performing as well as the day it was installed. However, there comes a point when any technology becomes outdated. We asked this week’s Expert Panel Roundtable: Which security technologies are becoming outdated or obsolete?
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
Artificial Intelligence: Understanding Its Place In Physical SecurityDownload
Delivering Smart, Secure and Healthy Retail Environments with the CloudDownload
Protecting Your Data Against Physical ThreatsDownload
Achieving True Situational Awareness In Operation Centers With Computer Vision & AIDownload