Nukleas Ltd. is slated to exhibit the Nukleas Integrated Security Solutions (NISS) consortium, a one stop UK security industry solution for command and control/surveillance requirements, at Security and Policing 2020 security event, taking place in the Farnborough International Exhibition and Conference Center from 3 - 5 March, 2020 on stand E49. Nukleas solutions The NISS consortium combines British industry excellence to provide complementary solutions for a coordinated approach on all types...
At LogiMAT 2020 (Stuttgart Trade Fair Center) from 10 to 12 March 2020, Dallmeier will showcase a broad portfolio of image-based process optimization solutions aimed specifically at customers from the intralogistics sector. One example is camera-based "on-the-fly" volume calculation. One of the great challenges of intralogistics faced by many logistics companies is how to measure a large number of freight goods accurately and efficiently. The purpose is not only to identify incorrect or false i...
Dahua Technology USA Inc., a provider of advanced, video-centric, smart IoT solutions, has introduced a new selection of 5MP IP cameras in its cost-efficient Lite Series, incorporating Smart Motion Detection (SMD) technology for ease of set-up, improved accuracy, and fewer false alarms. Smart Motion Detection (SMD) SMD uses an advanced algorithm to differentiate human and vehicular shapes within a scene and send alarms only when a person or vehicle is detected. SMD can be enabled w...
Barco, a provider of control room solutions, has just released SecureStream, a new media streaming solution to easily and securely share content beyond the control room. Using a very intuitive user interface, control room operators can simply drag and drop video or data sources into a SecureStream channel, allowing the content to be shared with field staff or remote experts. In this way, SecureStream helps authorized people get a complete situational overview, contributing to better and faster d...
Senstar, a global provider of perimeter intrusion detection and video management solutions, is pleased to announce it has achieved General Services Administration (GSA) approval. The GSA is the purchasing department of the U.S. Government and GSA approval is a status used for organizations that have been accepted to sell to federal, state, and local agencies. Through the GSA Advantage (an on-line catalog, information, and ordering system) government customers have the ability to quickly search,...
Aeroturn LLC, a turnstile manufacturer that offers 100% Made In The USA turnstiles, announced that the company is currently manufacturing multiple types of turnstile lanes - all ADA compliant- for five different GSA sites on the northeast, west and east coasts. Businesses, non-profit organizations, and educational institutions can obtain a GSA Schedule Contract to sell products and services to government customers and helps streamline the process. Aeroturn is currently a national preferred manu...
As 72% of organizations plan to implement Zero Trust capabilities in 2020 to mitigate growing cyber risk, nearly half (47%) of cyber security professionals lack confidence applying a Zero Trust model to their Secure Access architecture, according to the 2020 Zero Trust Progress Report released by Cybersecurity Insiders and Pulse Secure, globally renowned provider of software-defined Secure Access solutions. 2020 Zero Trust Progress report The 2020 Zero Trust Progress report surveyed more than 400 cyber security decision makers to share how enterprises are implementing Zero Trust security in their organization and reveal key drivers, adoption, technologies, investments and benefits. The report found that Zero Trust access is moving beyond concept to implementation in 2020, but there is a striking confidence divide among cybersecurity professionals in applying Zero Trust principles. Cyberattacks and enormity of data breaches in 2019 has challenged the veracity of secure access defenses" “The sheer volume of cyberattacks and enormity of data breaches in 2019 has challenged the veracity of secure access defenses, even in well-funded organizations,” said Scott Gordon, chief marketing officer at Pulse Secure. “Zero Trust holds the promise of vastly enhanced usability, data protection and governance. However, there is a healthy degree of confusion among cyber security professionals about where and how to implement Zero Trust controls in hybrid IT environment – which is clearly reflected in respondents’ split confidence levels.” Data protection Of the organizations building out Zero Trust capabilities in 2020, data protection, trust earned through entity verification, and continuous authentication and authorization were cited as the most compelling tenets of Zero Trust. The report also discovered nearly one-third of organizations (30%) are seeking to simplify secure access delivery, including enhancing user experience and optimizing administration and provisioning. Additionally, 53% of respondents plan to move Zero Trust access capabilities to a hybrid IT deployment. Vulnerable mobile and at-risk devices, BYOD and IoT trend More than 40% of survey respondents expressed that vulnerable mobile and at-risk device, insecure partner access, cyber-attacks, over privileged employees, and shadow IT risks are top challenges to secure access to applications and resources. “Digital transformation is ushering in an increase in malware attacks, IoT exposures and data breaches, and this is because it’s easier to phish users on mobile devices and take advantage of poorly maintained Internet-connected devices. As a result, orchestrating endpoint visibility, authentication and security enforcement controls are paramount to achieve a Zero Trust posture,” said Gordon. While 45% are concerned with public cloud application access security and 43% of respondents expressed Bring Your Own Device (BYOD) enablement issues, more than 70% of organizations are looking to advance their identity and access management capabilities. Secure Access for Hybrid IT models Secure Access starts with appropriate and well-maintained user provisioning but requires entity authentication" “Secure Access starts with appropriate and well-maintained user provisioning but requires entity authentication and compliance checks to invoke conditional access – regardless if a user is remote or on a corporate network, if the device is personal or corporate-owned, or if the application is internal or in the cloud,” said Gordon. Workforce mobility and hybrid IT models have placed most workloads beyond the shelter of corporate networks and traditional perimeter defense – which creates significant user access and data concerns. The 2020 Zero Trust Progress Report revealed nearly a third of cybersecurity professionals expressed value in applying Zero Trust to address hybrid IT security issues. Re-evaluating secure access infrastructure “Organizations at all stages of cloud adoption should re-evaluate their access security posture and data privacy requirements as they move applications and resources from on-premises to public and private cloud environments. Applying a Zero Trust model that aligns to hybrid IT migration can allow organizations to realize utility computing economies while creating a non-disruptive way to implement Zero Trust Network Access (ZTNA) functionality when, where and how they require,” said Gordon. The report highlighted that a quarter of organizations seek to augment their current secure access infrastructure with Software Defined Perimeter (SDP) technology (aka Zero Trust Network Access - ZTNA). “Organizations interested in exploring ZTNA should seek a solution that works in parallel with a perimeter-based VPN to gain essential operational flexibility for enterprises and service providers supporting data center and multi-cloud environments,” said Gordon. Hybrid IT deployment Of the respondents considering SDP, a majority (53%) would require a hybrid IT deployment and quarter (25%) would adopt a SaaS (Software-as-a-Service) implementation. “Some organizations are hesitant to implement Zero Trust as SaaS because they might have legacy applications that will either delay, or prevent, cloud deployment. Others might have greater data protection obligations, where they are averse to having controls and other sensitive information leaving their premises, or they have a material investment in their datacenter infrastructure that meets their needs,” said Holger Schulze, founder and CEO of Cybersecurity Insiders.
Automatic Systems, a manufacturer of pedestrian and vehicle entrance control access systems, announces that two of its automatic gates, the BLG 76 and BLG 77, have earned ETL listing to UL 325 standards. These redesigned, full-height automatic vertical lift gates are recognized for their reliability and low cost of ownership, while providing long-term access control to a facility’s perimeter. These BLG7 gates join other Automatic Systems products that are UL or ETL certified for user safety. The ETL Certifications to UL 325 standards for these Automatic Systems gates spell good news for installing dealers and integrators who need to provide their end users with perimeter security while also complying with increasing safety regulations. The UL 325 standards seek to protect people from accidents involving automated gates. To help significantly reduce the risk of injury or death caused by automated gates, it’s important that installers and technicians adhere to the UL 325 standards on each and every gate installation. full-height automatic gate The Automatic Systems BLG 77 gate, ETL listed to ensure user safety, is a reinforced rising fenced barrier that is the preferred alternative to a sliding gate. One of the fastest full height automatic gates on the market, it is capable of opening a passage width of 20 feet in seven seconds and is an ideal solution for high traffic applications that require strict entry control. Automatic Systems redesigned these gates to implement the entrapment protection needed for the UL 325 standard These barriers are used at sensitive sites requiring a high level of security such as ports, airports, logistics companies, and military installations. The BLG 76 rising fenced barrier, which can control a passage of up to sixteen and a half feet wide, is equipped with aluminum fencing. Its fast speed and smaller footprint also make it a solid alternative to a sliding gate. Automatic Systems redesigned these gates to implement the necessary entrapment protection needed to comply with the UL 325 standard. It requires that, after sensing an obstruction, reversing must begin within two seconds. This requirement is intended to keep a person from being entrapped in a stationary position by the gate system. Quick opening and closing speed After the first contact, the gate must reverse and travel a minimum of two inches. If a second contact is detected by a Type A device (inherent sensor), the gate must stop only and not reverse. If a second contact is detected by Type B1 or B2 device (photoelectric sensor or edge sensor), the gate must stop but may also reverse. The ETL Certified Automatic Systems gates also comply with the ASTMF2200 standard. “Automatic Systems is committed to meeting the growing industry gate safety standards required,” says David Enderle, Automatic Systems’ VP of Sales. “We proactively sought these ETL Certifications to deliver the highest level of security and safety to our installers and end users. The BLG7 gate family offers the fastest opening/closing speed with the smallest footprint in the industry. Our ETL Certifications to UL325 standards are indicative of our commitment and ongoing dedication to remaining a trusted and world-leading provider of automated secure entrance control solutions.”
Senstar, a provider of video management and perimeter intrusion detection technologies, is pleased to announce the appointment of Fabien Haubert as Managing Director. Mr. Haubert will help Senstar strengthen its position as a global leader of physical security solutions with a focus on addressing the specific needs of key vertical markets. “Senstar is in an exciting period of momentum and growth and I am looking forward to working with our unmatched team of security experts to build on this success,” said Mr. Haubert. “As the security landscape changes, we are committed to evolving our offerings to meet and exceed new challenges with comprehensive, integrated solutions.” Areas of video management Mr. Haubert joined Senstar in 2018 as Vice President, Sales – EMEA, where he has streamlined sales and support organizations and led a significant growth in revenue in the region. Prior to Senstar, Mr. Haubert worked in senior roles with several companies in the areas of video management, IP video surveillance, intrusion detection, access control and system integration. Mr. Haubert has a technical background with an Master of Science degree in Telecom Engineering, as well as a Master of Management and Strategy of International Business degree. He speaks French, English, Spanish, and Italian, and has a working knowledge of Dutch. Mr. Haubert will be relocating from France to Senstar’s Ottawa, Canada headquarters in June 2020.
Dahua Technology, a world renowned video-centric smart IoT solution and service provider, unveils its 2020 core product launch in Intersec Dubai, enabling and accelerating the AIoT transformation. The launch includes the main over-coax technology advancement HDCVI 6.0, AI (WizSense/WizMind) as well as Full-color technology which enables outstanding performance under extreme low light conditions. Advanced AI capabilities A longtime pioneer in the realm of HDCVI that seeks to offer great convenience, best quality and least cost, Dahua Technology launches HDCVI 6.0, boasting industry's first 4K real-time and advanced AI capabilities. 4K Real-time While traditional 4K HD over-coax products only allow 15fps, Dahua Technology’s 4K real-time doubles it, making 30fps a reality in live view. 4K real-time provides a superior visual experience in which tiny details are captured in better clarity within a large monitoring coverage. Moreover, with the help of AI Coding, users won’t have to worry about the storage cost incurred from the clarity enhancement. AI Coding Dahua AI Coding takes video compression to a new level of content-awareness. It puts emphasis on human and vehicle while encoding, significantly improving the streaming quality compared with H.265. At the same time, AI Coding also reduces the bit rate when there is no real target in sight, allowing efficient handling of videos to save HDD storage cost. Two-way Talk In addition, HDCVI 6.0 supports Two-way Talk, which allows real-time communication between camera and recorder with a broadcast-quality audio. A breakthrough innovation in Audio-Over-Coax technology, the Two-way Talk feature does not just satisfy users' demand for auxiliary audio information, it also enables bi-directional audio intercom that can be used to warn off intruders and to verify the actual situation when an incident occurs. Enhanced AI Endowed with Enhanced AI (see section 3 below for more information), HDCVI 6.0 is bringing fresh ideas and new possibilities to the industry and will always provide more economical and convenient solutions to customers. Advanced low light functionality Dahua Technology provides two series of full-color cameras – LED series and Non IR series The demand for cameras to perform in low light environment is on the rise. According to the 2019 IHS video surveillance report regarding global low illumination trend, cameras with advanced low light functionality grows at 20.6% CAGR 2018-2023. In response to this increasing demand, Dahua Technology developed its Full-color Camera, which captures vivid colorful information even in low-light conditions. In places with high crime rate like a park at night or a dark alley, it effectively extracts the color features of the scenes, such as human, vehicle or other objects, providing great help to police officers during the evidence obtaining procedure. Dahua Technology provides two series of full-color cameras – LED series and Non IR series – both adopt large aperture lens that collect higher amount of absorbed light and present a more vivid and colorful image under dark environment. Low light conditions These cameras are capable of 24/7 colorful monitoring that can accurately identify people and objects in low light conditions. Cameras of LED series are equipped with LED that serves as a supplementary light in dark environment. The LED also serves another purpose – to deter intruders – that can significantly reduce crimes. Cameras of Non IR series have no complementary light device, which will not emit light like infrared camera at night. This means that this type of camera does not interfere with ongoing activities and does not contribute to light pollution in the environment. Also, it prevents reflections in rainy days and attraction of small insects, making it an ideal silent security guard in dim places like stores, parking lots and casinos. In addition, the full-color camera can work with AI functions to further enhance the probability and accuracy of target recognition and feature extraction. AI (WizSense/WizMind) WizSense, being easy to use and not pricy to own, is competent enough to meet the needs of most ordinary users To accelerate the AI adoption, Dahua Technology is proud to release WizSense, a series of AI products and complete end-to-end solutions based on deep learning that focus on human and vehicle, providing intelligence, simplicity and inclusivity to users. WizSense, being easy to use and not pricy to own, is competent enough to meet the needs of most ordinary users. Its benefits include: accurate prediction before an event; instant deterrence during an event; quick target search after an event; storage saving while ensuring target details, and privacy protection and defense against attacks. Accurate prediction can be realized through SMD Plus, which analyzes human and vehicle shapes based on motion detection that adopts deep-learning algorithm. It effectively filters out false alarms triggered by raindrops, leaves, pets, insects and light, allowing users to focus on real threats. Face Detection and Face Recognition WizSense also supports Perimeter Protection, which functions in a similar way as SMD Plus in terms of its accurate prediction capability. It allows users to set more flexible rules for different scenarios. While SMD Plus applies to the whole scene by default, Perimeter Protection could be applied to a specific area, especially where the direction of the movement needs to be detected. Aside from recognizing whether the target is a person or a vehicle, WizSense is also equipped with Face Detection and Face Recognition features to aid further identification of targets. By comparing face images with those recorded in the customized database, more business values can be generated through VIP recognition, Black List alarm, etc. Intelligent video analysis Real-time push notifications with trigger type of human or vehicle will be sent to users Moreover, based on intelligent video analysis, WizSense also provides instant deterrence functions. When intrusion has been detected, these features will enable the camera to flash and make alarm sound to warn off intruders and avoid possible crime. At the same time, real-time push notifications with trigger type of human or vehicle will be sent to users, alerting them to verify the situation using video. After an event, WizSense makes it easy for users to do quick and reliable search based on SMD Plus and Perimeter Protection. Features like face image search and face attribute search can effectively improve the efficiency of target searching. It is worth noting that the data storage is ensured with AI Coding as well, which intelligently saves data space while maintaining the image quality of key targets. System integrators and installers While offering abundant functionalities, WizSense also ensures high-level of cybersecurity using encryption algorithms that are certified by TÜV Rheinland, UL (Underwriters Laboratories), etc. Users can rest assured that their privacy will be properly protected using WizSense series products. Furthermore, WizMind is a high-end AI series to be released in Q1 of 2020. While supporting all functions of WizSense, WizMind is also capable of other intelligent functions such as people counting, video structure, ANPR, human face/body privacy protection, large scene monitoring, etc. Designed to create more commercial values for system integrators and installers, WizMind series offers users with end-to-end solutions that can be tailored case by case to satisfy demands of clients. The aforementioned three key technologies work in trinity, resulting in surveillance solutions that can be applied to many situations. Dahua smart solutions You can use this guard to verify a visitor’s identity and warn off intrudersFor example, these products are suitable in dark places where theft and other sorts of crimes are likely to occur, such as a dark street corner or a dimly lit bar. They are also useful in places where it is impossible for security guards to accurately remember various features of people and vehicle, such as crossroads, schools, or entrances of residential areas where people and vehicles frequently come and go. They are also applicable to any place where you want to set specific rules, such as vaults of banks or casinos, entrance of a luxury store, or fence of a zoo. In these situations, Dahua smart solutions serve not only as a sharp eye that diligently monitors 24/7 and clearly records every little colorful details regardless of light condition, but also as a smart guard that can recognize features of each and every people or vehicle in sight. Verify visitor’s identity You can create your own black/white list and your guard will treat the visitor accordingly, triggering the alarm, for example, in a spontaneous manner. You can use this guard to verify a visitor’s identity and warn off intruders. If you are looking for a particular person or plate number when collecting evidence, this guard will take care of it. Overall, Dahua Smart Solutions offers users comprehensive protection as well as personal options to satisfy more diversified needs. For 2020, Dahua Technology is fully loaded with cutting edge technologies and products to provide upgraded services to more users across the globe. With its mission of “Enabling a safer society and smarter living”, Dahua Technology will continue to focus on “Innovation, Quality and Service” to serve its partners and customers around the world.
The Security Industry Association (SIA) has announced that – as part of its efforts to build presence and relationships internationally on issues related to perimeter security – it will partner with the Perimeter Security Suppliers Association (PSSA) to produce a two-day InterAct workshop. SIA CEO Don Erickson will lead a contingent of SIA members, representatives from U.S. government agencies and researchers to join with the United Kingdom-based PSSA in hosting this workshop Jan. 29-30 in Birmingham, England. Hostile vehicle mitigation, blast protection On Wednesday, Jan. 29, presenters from the UK will address topics including hostile vehicle mitigation, blast protection and international trade opportunities. The event is SIA’s initiative to foster international cooperation and addresses the threat of vehicle-based attacks On Thursday, Jan. 30, presenters from the United States will address topics including the size and composition of the American barrier market, IWA versus ASTM test standards, the requirements of the Support Anti-Terrorism by Fostering Effective Technologies Act (SAFETY Act) for offshore manufacturers and anti-terrorist measures on government campuses. Two-day InterAct workshop “This collaborative event is part of SIA’s initiatives to foster international cooperation and addresses the serious threat of vehicle-based attacks,” said Don Erickson, SIA CEO. He adds, “The idea for this event was surfaced during our October 2019 Capitol Hill Symposium on Vehicular Terrorism, so my thanks to Paul Jeffrey, chairman of the PSSA, and Rob Reiter, chairman of SIA’s Perimeter Security Subcommittee, for their many months of work to help develop this partnership event.”
Intersec 2020, a popular security, safety, and fire protection trade show, held under the patronage of HH Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum, opened its doors to the latest security safety solutions and three days of agenda-setting discussion, as global industry sources tip the Middle East security sector for 10% annual growth over the next two years. With more than 1,100 exhibitors from 56 countries, Intersec was officially inaugurated by Major General Expert Rashid Thani Al Matrooshi, Director General of Dubai Civil Defense; Major General Abdullah Ali Al Ghaithi, Director of the General Department of Organizations Protective Security & Emergency at Dubai Police, and Major General Khalifa Ibrahim Al Sulais, CEO of the Security Industry Regulatory Agency (SIRA). Automated security solutions As the region’s premier show for commercial security, Intersec plays a crucial role in shaping the the industry" The delegation met top-level dignitaries and representatives from Dubai Police; Came, a provider of automated security solutions; Netherlands-based Nedap, a specialist in systems for long-range identification, smart parking and vehicle access control; Chinese technology giant Huawei, and Axis Communications, a Swedish manufacturer of network cameras for physical security and video surveillance industries. “As the region’s premier show for commercial security, fire protection and safety, Intersec plays a crucial role in shaping the future of these industries,” said HH Sheikh Mansoor. “Protecting our people and assets is a principal responsibility for the UAE and with the Expo 2020 fast-approaching, the implementation of new best practices and technology will solidify the UAE’s position as a leader in security.” Artificial intelligence and machine learning Andreas Rex, Show Director at Messe Frankfurt Middle East, which organises Intersec, added: “No sector is exempt from technological advancement. The emergence of automation, biometrics, artificial intelligence and machine learning is transforming the face of the security sector and helping to address growing concerns surrounding unmanned aerial, cyber and identity fraud risks. As security risks become more complex, so too must the solutions designed to combat them.” As Intersec 2020 welcomed the global security industry to Dubai, the bullish security sector growth forecast was issued by Business France, the French government organization charged with fostering French exports and promoting inward investment into the country. France, one of 15 international country pavilions at the three-day show at Dubai World Trade Center, is debuting the most advanced technology emerging across seven broad product sectors: commercial security, smart home, cybersecurity, fire and rescue, safety and health, homeland security and policing, as well as perimeter and physical security. Access control systems The Czech Republic pavilion is hosting a similar contingent of companies including COMINFO “The Middle East region represents a particularly attractive market for the safety and security sector, which is expected to grow around 10% per year to 2022,” said Frederic Szabo, Managing Director, Business France Middle East, which is hosting 15 French companies at Intersec – 11 of which specialize in fire and rescue. “Increasing the capabilities of infrastructure, securing power plants and oil complexes, protecting sites and people for major events to come are all excellent reasons for French experts to extend their presence in the region,” added Szabo. The Czech Republic pavilion is hosting a similar contingent of companies including COMINFO, a manufacturer of turnstiles, gates and access control systems, which is leveraging Intersec to launch EasyGate Superb – the world’s slimmest, fully-equipped speed gate for access control. Next-generation security risks COMINFO’s regional launch of EasyGate Superb is one in hundreds of major transformative technology breakthroughs at the fair, where the scale of next-generation security risks and the intelligent technology required to prevent and defend against security threats are being explored by local, regional and global industry leaders at Intersec’s comprehensive conference program. The four-pronged program, which includes the Intersec Arena, the Future Security Summit and Intersec Fire Conference, and the Security Industry Regulatory Agency (SIRA) forum, has drawn experts from more than 50 countries to Dubai. During a keynote address at the Intersec Arena on Sunday, Eng. Khalid Al Hammadi, Chairman of the Security Professionals Association (SPA), the first association for security professionals in the Middle East, announced the launch of SPA for SIRA, the Dubai agency tasked with ensuring the highest standards of security and safety in the emirate. AI and machine learning applications The event showcases the latest innovations and technologies in one of the most important years for the UAE SPA is a platform that allows security professionals to share and enhance their knowledge of industry best practices. “The industry is advancing towards technologies such as AI and machine learning applications, which will be used as part of the security protocols of Expo 2020,” said Eng Al Hammadi. “This is sure to create an array of job opportunities for individuals within the security sector, and SPA for SIRA will be there to act as a platform that bridges the gap between security professionals and regulators, as well as fostering a platform for knowledge exchange and development.” “Participating in Intersec enables our members to interact with a global network of security experts and learn about the latest security applications and trends within the industry. This event showcases the latest cutting-edge innovations and technologies in one of the most important years for the UAE, which will support the safe and secure logistics of Expo 2020 Dubai,” noted Al Hammadi. Digital and physical security At the conference, representatives from 35 governments, trade associations and non-profit institutions spanning the hydrocarbon, banking and finance, municipality, police, customs and healthcare sectors in the Middle East, Europe and the USA will map out the future security agenda over coming days. Digital security challenges, AI implementation, biometric innovations security loopholes in business ecosystems and the integration of digital and physical security to address critical threats are all key topics under the microscope. Held under the patronage of His Highness Sheikh Mansoor bin Mohammed bin Rashid Al Maktoum, Intersec is supported by Dubai Police, Dubai Police Academy, Dubai Civil Defense, SIRA and Dubai Municipality. Intersec is a trade exhibition and conference open to trade professionals only. The show is open from 10am – 6pm on 20 and 21 January and is held in Halls 2-8, Trade Center Arena and Sheikh Saeed Halls 1-3 at Dubai World Trade Center.
Back in the 1960s a lead engineer working in conjunction with the United States Navy for Lockheed’s Skunk Works team coined the acronym KISS, which translated to the design principle ‘keep it simple stupid’. The KISS principle embraces the concept of simplicity, stating that most systems work best if they are kept simple rather than geared up to be more complicated. When it comes to physical security systems, this concept can also play a key element in its overall success. Secure work environments For years the tug of war in the security industry has pitted the need for a secure environment against the desire for technology that is convenient for users. However, finding a happy medium between the two has often seemed elusive. I believe you can design and have operational convenience at the same time as achieving high security" Jeff Spivey, a security consultant and the CEO of Security Risk Management, has this to say about it, “If there is an understanding of the security-related risks and their separate and/or collective impact on the organization’s bottom line business goals, a resolution can be reached.” Jeff also does not think that convenience and high security have to be opposing each other. He says, “I believe you can design and have operational convenience at the same time as achieving high security.” Importance of secure access control The premise is that for organizations and spaces to be truly secure, they must be difficult to access. So, by its very nature, access control is designed to be restrictive, allowing only authorized staff and visitors to access a facility or other secured areas inside. This immediately puts convenience at odds with security. Most people will tolerate the restrictive nature of a controlled entrance using badge, card or biometric because they understand the need for security. When that technology gets in the way of staff traversing freely throughout the facility during the course of a business day, or hindering potential visitors or vendors from a positive experience entering the building, they become less tolerant, which often leads to negative feedback to the security staff. Enhancing corporate security Security consultants like Spivey and security directors all stress that understanding the threats and risk levels of an organization will most likely dictate its physical security infrastructure and approach. All the technology in the world is useless if it is not embraced by those who are expected to use it and it doesn’t fit the culture of the organization. Once employees and customers are educated about what security really is, they understand that they're not losing convenience, they're gaining freedom to move safely from point A to point B. Converged data and information shape new access options Migration of physical access control systems to a more network-centric platform is a game-changer for security technologies The migration of physical access control systems to a more network-centric platform has been a game-changer for emerging security technology options. The expansion of the Internet of Things (IoT), Near-Field Communication devices powered by Bluetooth technology, and the explosion of converged information systems and identity management tools that are now driving access control are making it easier than ever before for employees and visitors to apply for clearance, permissions and credentials. Wireless and proximity readers Advancements in high-performance wireless and proximity readers have enhanced the user’s access experience when presenting credentials at an entry and expediting movement throughout a facility. A user is now able to access a secured office from street-level without ever touching a key or card. Using a Bluetooth-enabled smartphone or triggering a facial recognition technology, they enter the building through a security revolving door or turnstile. A total building automation approach adds extra convenience, as well as seamless security, when access technology is integrated into other systems like elevator controls. A total building automation approach adds extra convenience and seamless security How to Meet Security Concerns at the Entry While security managers are charged with providing their facilities the maximum level of security possible, there is always the human element to consider. But does the effort to make people comfortable with their security system ecosystem come at a cost? Does all this convenience and the drive to deliver a positive security experience reduce an organization’s overall levels of security? And if so, how can we continue to deliver the same positive experience including speed of entry – while improving risk mitigation and threat prevention? Door entrances, barriers Users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through Let’s examine some of the various types of entrances being used at most facilities and the security properties of each. With some entrance types, there is the possibility for security to fall short of its intended goals in a way that can’t be addressed by access control technology alone. In particular, with many types of doors and barriers, tailgating is possible: users can slip through the door or turnstile barriers while they are still open after a credentialed individual has gone through. To address this, many organizations hire security officers to supervise the entry. While this can help to reduce tailgating, it has been demonstrated that officers are not immune to social engineering and can often be “talked into” letting an unauthorized person into a facility. Deploying video cameras, sensors Some organizations have deployed video surveillance cameras or sensors to help identify tailgaters after the fact or a door left open for longer than rules allow. This approach is not uncommon where facilities have attempted to optimize throughput and maintain a positive experience for staff and visitors. Security staff monitoring the video feeds can alert management so that action can be taken – but this is at best a reactive solution. It does not keep the unauthorized persons from entering, and so is not a totally secure solution. Optical turnstiles, speedgates Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself Security staff should carefully evaluate its facility’s needs and consider the technology that is built into the door itself. Not all security entrances work the same way. And, there will always be a balance between security and convenience – the more secure the entry, the less convenient it is for your personnel and visitors to enter your facility. For example, it takes more time to provide 2-factor authentication and enter through a mantrap portal than to provide only one credential and enter through an optical turnstile or speedgate. Perimeter protection So, it is an important first step to determine what is right at every entrance point within and around the perimeter. Remember that convenience does not equate to throughput. Convenience is the ease and speed of entry experienced by each individual crossing that threshold, while throughput relates to the speed at which many individuals can gain access to the facility. A more convenient entry makes a better first impression on visitors and is good for overall employee morale. Throughput is more functional; employees need to get logged in to begin their workday (and often to clock in to get paid), and they quickly become frustrated and dissatisfied when waiting in a long line to enter or exit the premises. Considering form and function when designing a security entrance can ensure that those requiring both high-security and convenience are appeased.
The statistics are staggering. The death tolls are rising. And those who now fear environments that were once thought to be safe zones like school campuses, factories, commercial businesses and government facilities, find themselves having to add the routine of active-shooter drills into their traditional fire drill protocols. The latest active shooter statistics released by the FBI earlier this year in their annual active-shooter report designated 27 events as active shooter incidents in 2018. The report reveals that 16 of the 27 incidents occurred in areas of commerce, seven incidents occurred in business environments, and five incidents occurred in education environments. Deadly active-shooter events Six of the 12 deadliest shootings in the country have taken place in the past five years Six of the 12 deadliest shootings in the country have taken place in the past five years, including Sutherland Springs church, Marjory Stoneman Douglas High School, the San Bernardino regional center, the Walmart in El Paso and the Tree of Life Synagogue in Pittsburgh, which have all occurred since 2015. Although these incidents occurred in facilities with designated entry points common to churches, schools and businesses, the two most deadly active-shooter events since 2015 were the Route 91 Harvest music festival shooting in Las Vegas that left 58 dead and the Pulse nightclub killings in Orlando where 49 perished. As Christopher Combs, special agent in charge of the FBI field office in San Antonio, Texas, said during a news conference following the August 31 mass shooting in Odessa, Texas that claimed seven lives: “We are now at almost every two weeks seeing an active shooter in this country." Active shooter incidents Between December 2000 and December 2018, the FBI’s distribution of active shooter incidents by location looks like this: Businesses Open to Pedestrian Traffic (74) Businesses Closed to Pedestrian Traffic (43) K-12 Schools (39) Institutions of Higher Learning (16) Non-Military Government Properties (28) Military Properties—Restricted (5) Healthcare Facilities (11) Houses of Worship (10) Private Properties (12) Malls (6) What the majority of these venues have in common is they all have a front entrance or chokepoint for anyone entering the facilities, which is why any active-shooter plan must include a strategy to secure that entry point. Situational awareness in perimeter and door security Preventing people with the wrong intentions from entering the space is the goal" According to Paul Franco, an A&E with more than 28 years of experience as a consultant and systems integrator focusing on schools, healthcare and large public and private facilities, that while active shooter incidents continue to rise, the residual effect has been an increase in situational awareness in perimeter and door security. “Certainly, protecting people and assets is the number one goal of all our clients. There are multiple considerations in facilities like K-12 and Healthcare. Preventing people with the wrong intentions from entering the space is the goal. But a critical consideration to emphasize to your client is getting that person out of your facility and not creating a more dangerous situation by locking the person in your facility,” says Franco. High-security turnstiles “Schools today are creating a space for vetting visitors prior to allowing access into the main facility. Using technology properly like high-security turnstiles offer great benefits in existing schools where space constraints and renovation costs can be impractical.” What steps should they be taken when recommending the proper door security to ensure the building is safe As a consultant/integrator, when discussions are had with a client that has a facility in a public space like a corporate building, government center or industrial facility, what steps should they be taken when recommending the proper door security to ensure the building is safe and can protect its people and assets? For Frank Pisciotta, President and CEO of Business Protection Specialists, Inc. in Raleigh, North Carolina, a fundamental element of his security strategy is making appropriate recommendations that are broad-based and proactive. Properly identifying the adversaries “As a consultant, my recommendations must include properly identifying the adversaries who may show up at a client’s door, the likelihood of that event occurring, the consequences of that event occurring, determining if there are tripwires that can be set so an organization can move their line of defense away from the door, educating employees to report potential threats and creating real-time actionable plans to respond to threats. A more reactionary posture might include such thing as target hardening such as ballistic resistant materials at entry access points to a facility,” Pisciotta says. Veteran consultant David Aggleton of Aggleton & Associates of Mission Viejo, California recommends that clients compartmentalize their higher security areas for limited access by adding multiple credential controls (card + keypad + biometric), along with ‘positive’ access systems that inhibit tailgating/piggybacking such as secure turnstiles, revolving door and mantrap if your entrances and security needs meet the required space and access throughput rates. Integrated solution of electronic access control Defining a single point of entry in some public facilities is becoming the new standard of care according to many A&Es and security consultants, especially in a school environment. This approach allows a concerted effort when it comes to staffing, visitor monitoring and an integrated technology solution. The bottom line remains: most buildings are vulnerable to a security breach A proactive stance to securing a door entryway will use an integrated solution of electronic access control, turnstiles, revolving doors and mantraps that can substantially improve a facility’s security profile. The bottom line remains: most buildings are vulnerable to a security breach, so it’s not a matter of if there will be a next active shooter tragedy, it’s only a matter of where. Enhancing access control assurance “There is no easy answer to this question,” says Pisciotta referring to how a secured entrance can deter an active shooter. “There have been at least two high-profile incidents of adversaries shooting their way into a facility through access control barriers. So, if the threat so dictates, a ballistic resistant might be required.” He concludes: “There is obviously no question that turnstiles, revolving doors and man traps enhance access control assurance. Electronic access control is easy to integrate with these devices and providing that credentials are secure, approval processes are in place, change management is properly managed and the appropriate auditing measures in place, access control objectives can be met.”
There’s a lot of hype around the term ‘digital transformation.’ For some, it’s the integration of digital technology into everyday tasks. For others, it’s the incorporation of innovative processes aimed at making business optimization easier. In most cases, digital transformation will fundamentally change how an organization operates and delivers value to its customers. And within the security realm, the age of digital transformation is most certainly upon us. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality. No longer are the cloud, Internet of Things (IoT) and smart cities foreign and distant concepts full of intrigue and promise. Enhancing business operations We’re increasingly seeing devices become smarter and better able to communicate with each other These elements are increasingly incorporated into security solutions with each passing day, allowing enterprises the chance to experience countless benefits when it comes to enhancing both safety and business operations. The term ‘connected world’ is a derivative of the digital transformation, signifying the increasing reliance that we have on connectivity, smart devices and data-driven decision-making. As we become more familiar with the advantages, flaws, expectations and best practices surrounding the connected world, we can predict what issues may arise and where the market is heading. We’re increasingly seeing devices become smarter and better able to communicate with each other through the IoT to achieve both simple goals and arduous tasks. Within our homes, we’re able to control a myriad of devices with commands (‘Hey Google...’ or ‘Alexa...’), as well as recall data directly from our mobile devices, such as receiving alerts when someone rings our doorbell, there’s movement in our front yard or when a door has been unlocked. Analytics-Driven solutions The focus is now shifting to the business impacts of connectivity between physical devices and infrastructures, and digital computing and analytics-driven solutions. Within physical security, connected devices can encompass a variety of sensors gathering massive amounts of data in a given timeframe: video surveillance cameras, access control readers, fire and intrusion alarms, perimeter detection and more. As the data from each of these sensors is collected and analyzed through a central platform, the idea of a connected world comes to fruition, bringing situational awareness to a new level and fostering a sense of proactivity to identifying emerging threats. The connected world, however, is not without its challenges, which means that certain considerations must be made in an effort to protect data, enhance structured networking and apply protective protocols to developing technology. Physical security systems We can expect to see the conversations regarding data privacy and security increase as well As the use of connected devices and big data continue to grow, we can expect to see the conversations regarding data privacy and security increase as well. Connectivity between devices can open up the risk of cyber vulnerabilities, but designing safeguards as technology advances will lessen these risks. The key goal is to ensure that the data organizations are using for enhancement and improvements is comprehensively protected from unauthorized access. Manufacturers and integrators must be mindful of their products' capabilities and make it easy for end users to adhere to data sharing and privacy regulations. These regulations, which greatly affect physical security systems and the way they're managed, are being implemented worldwide, such as the European Union's General Data Protection Regulation (GDPR). In the United States, California, Vermont and South Carolina have followed suit, and it can be expected that more countries and U.S. states develop similar guidelines in the future. Technology is already a part of our day-to-day lives, with smart devices in our homes and the ability to perform tasks at our fingertips now a reality Automatic security updates Mitigating the concerns of the ‘connected world’ extends beyond just data privacy. IoT technology is accelerating at such a pace that it can potentially create detrimental problems for which many organizations may be ill-prepared - or may not even be able to comprehend. The opportunities presented by an influx of data and the IoT, and applying these technologies to markets such as smart cities, can solve security and operational problems, but this requires staying proactive when it comes to threats and practicing the proper protection protocols. As manufacturers develop devices that will be connected on the network, integrating standard, built-in protections becomes paramount. This can take the form of continuous vulnerability testing and regular, automatic security updates. Protocols are now being developed that are designed to ensure everything is encrypted, all communications are monitored and multiple types of attacks are considered for defensive purposes to provide the best security possible. IoT-Connected devices Hackers wishing to do harm will stop at nothing to break into IoT-connected devices Built-in protection mechanisms send these kinds of systems into protection mode once they are attacked by an outside source. Another way for manufacturers to deliver solutions that are protected from outside threats is through constant and consistent testing of the devices long after they are introduced to the market. Hackers wishing to do harm will stop at nothing to break into IoT-connected devices, taking every avenue to discover vulnerabilities. But a manufacturer that spends valuable resources to continue testing and retesting products will be able to identify any issues and correct them through regular software updates and fixes. ‘IoT’ has become a common term in our vocabularies and since it’s more widely understood at this point and time, it's exciting to think about the possibilities of this revolutionary concept. Providing critical insights The number of active IoT devices is expected to grow to 22 billion by 2025 — a number that is almost incomprehensible. The rise of 5G networks, artificial intelligence (AI) and self-driving cars can be seen on the horizon of the IoT. As more of these devices are developed and security protocols are developed at a similar pace, connected devices stand to benefit a variety of industries, such as smart cities. Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches Smart cities rely on data communicated via the IoT to enhance processes and create streamlined approaches to ensuring a city is well-run and safe. For example, think of cameras situated at a busy intersection. Cameras at these locations have a variety of uses, such as investigative purposes in the event of an accident or for issuing red-light tickets to motorists. But there are so many other possible purposes for this connected device, including providing critical insights about intersection usage and traffic congestion. These insights can then be used to adjust stoplights during busy travel times or give cities valuable data that can drive infrastructure improvements. Physical security market The impact of connected devices on cities doesn’t stop at traffic improvement. The possibilities are endless; by leveraging rich, real-time information, cities can improve efficiencies across services such as transportation, water management and healthcare. However, stringent protections are needed to harden security around the networks transmitting this kind of information in an effort to mitigate the dangers of hacking and allow this technology to continuously be improved. Whether you believe we’re in the midst of a digital transformation or have already completed it, one thing is certain: businesses must begin thinking in these connectivity-driven terms sooner rather than later so they aren’t left behind. Leveraging smart, connected devices can catapult organizations into a new level of situational awareness, but adopting protections and remaining vigilant continues to be a stalwart of technological innovation within the physical security market and into the connected world.
Gallagher Security, a division of Gallagher Group, a privately-owned New Zealand company, is a global presence in integrated access control, intruder alarm and perimeter security solutions. Gallagher entered the global security industry in the 1990s with the purchase of security access control business Cardax. In the last several decades, the company has leveraged its experience in electric fence technology to develop a variety of innovative solutions used to protect some of the world's most high-consequence assets and locations. Solving business problems Among Gallagher’s recent innovations is the Security Health Check, a software utility that enables customers to run an automated check on their Gallagher Command Centre security system. To get an update on the company, we interviewed Richard Huison, Gallagher’s Regional Manager for the U.K. and Europe, who says he has a passion for technology and solving business problems. Huison says working in the industry for more than 20 years has shown him you can never stop evolving and adapting. Q: What are Gallagher's points of differentiation versus competitors? Huison: Gallagher’s strengths are in solving business problems outside of the normal access control and intrusion detection solutions. Enforcing company policy through compliance and competency is what really matters to business continuity. Using Gallagher Command Centre to oversee the security, health and safety and compliance brings true business value to the client who benefits from reduced costs and risk to the success of their growth and strategy. Q: What is the biggest challenge for customers in the security market, and how does Gallagher help to meet that challenge? Huison: A great solution fit is key. Where most fail is choosing a solution that does not meet the needs of the client in 10 to even 20 years’ time. As businesses evolve and grow, so must the security solution. In a recent conversation, a client had to replace a 300-door access control system that was no longer supported. ‘Why Gallagher?’ they asked. The answer: ‘If you had chosen Gallagher 10 years ago, we would not be having this conversation.’ Ensuing the system you choose is legacy-compliant is king. Gallagher’s brand is well known for protecting Critical National Infrastructure Q: Please describe Gallagher's geographic presence in the UK and Europe. Huison: Gallagher’s brand is well known for protecting Critical National Infrastructure. They choose to adopt our solutions because we meet the highest levels of resilience against cyber-attacks. Our ability to modernize legacy systems ensures the maximum return on investment with minimal disruption to business continuity. Gallagher solutions cover a broad mix of verticals, with strengths in high security, education and large corporate entities. Our Channel Partner network is continually growing so more clients can benefit from the diverse and powerful Gallagher Command Centre software. Q: Describe how Gallagher is typically integrated into larger systems. Huison: Our systems offer the flexibility of being standalone or globally networked via our Multi-Server environment. Most integration happens logically where data is pushing into our Command Centre database. The single point of truth allows for minimal data errors and efficiencies around manual input. The total cost of ownership is greatly reduced in allowing the system to work for the client and not the other way round. Over and above this, Integration into other solutions brings that rich data back to one software front end. Q: What is Gallagher's biggest challenge and how will the company seek to meet that challenge? Huison: Our biggest and continual opportunity is being a relentless innovator. We are not short of ideas and how we are bucking the trends with our solutions. Broadcasting these messages is not always easy in the digital age. This is why Gallagher is investing heavily in more shows, publications and specific vertical conferences globally. Q: What is the market's biggest misconception about Gallagher? Huison: Our brand is known for perimeter solutions with our monitored Pulse Fence. What many forget is we have a very powerful access control and integrated intrusion detection solution that meets Government standards around the world. We are unique in that all three can be controlled via one software platform that is cyber-resilient and infinitely configurable to suit many verticals. Q: What is your message to the security market? Huison: Many see Gallagher as only suitable for large and complex sites. I openly challenge our audience, speak to us and you may find we can provide an Enterprise Level solution that is delivered on budget and provide an outstanding return on investment for the client. Our pedigree of 80 years shows we never stop innovating and building that trusted advisor status with many lifelong clients.
As the deal/no deal prospects of Brexit are tossed in a whirlwind of UK and EU politics, the uncertainty of the back-and-forth has broadly impacted general economic trends, and by extension, the physical security market. The new deadline for a Brexit agreement is October 31, already postponed six months from the scheduled April 12 departure date. Numbers show that Britain’s GDP shrank in the second quarter, possibly reflecting fewer exports because of Brexit uncertainty. And beyond the current indecision lies the long-term impact of a possible change in trading status between the United Kingdom and continental Europe. Other issues include capital flow and labor mobility. Brexit uncertainty leading to security concerns Loss of shared information with the EU will make the UK less safe “Companies … are unclear about their future,” comments Martin Warren of the Institute of Chartered Accountants in England and Wales. “Companies are making decisions now about jobs, supply chains, headquarters and asset locations, incurring significant, and possibly unnecessary, cost and upheaval.” Warren fears the destructive effects of a ‘no deal’ outcome and hopes politicians will break the deadlock and restore business confidence. Security implications of Brexit extend beyond economics. Loss of shared information with the EU will make the UK less safe. Extradition across EU borders will be more difficult, and exchange of data such as fingerprints and vehicle registrations is at risk. The Irish border after Brexit is of particular concern to security professionals. Countering threat of international terrorism Robert Hall of London First and Alison Wakefield of Security Institute say the security impact of departing the EU will be long lasting and profound. “In security terms, the UK will still have to contend with international terrorism, transnational crime and the global movement of people, all challenges that require wide scale cooperation.” They add that leaving the EU will require “a significant investment in people, resources and databases to cope with the anticipated volumes of traffic through ports, airports and tunnels.” Analyst company IHS Markit earlier commented about the impact on the security industry of Brexit’s drag on the UK economy, “Access control, intruder and fire alarm markets typically track construction rates closely and are forecast to be affected most. However, a large cut to infrastructure spending would be just as damaging to the video surveillance market.” UK security companies Prefer ‘soft exit’ from EU If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to WTO trade rules If a ‘soft exit’ trade deal is not negotiated, the UK would have to revert to World Trade Organization (WTO) trade rules, which means tariffs on trade between the UK and the EU, says IHS Markit. There are five British-based access-control and intruder-alarm vendors supplying the European market in significant quantity – each with revenue exceeding $10 million. IHS Markit estimates these companies combined account for less than 10 percent of total European, Middle-Eastern and African (EMEA) market revenues for both industries. Uncertain future of UK security marketplace Asset protection specialist VPS Security Services has warned that the ongoing Brexit saga will likely lead to a rise in vacant commercial and residential properties as developers and investors are more reluctant to move forward with their UK real estate strategies. Seemingly endless machinations and shifting proposals are making the eventual outcome of Brexit very much a guessing game. Uncertainty translates into a volatile and changing outlook, and the eventual impact on the broader economy is an open question. As a reflection of that economy, the security marketplace will inevitably feel the economic impact, too, not to mention the new security challenges likely to ensue.
Many exhibitors at GSX 2019 saw the show as a success, despite slower booth traffic on the second and third days. According to show sponsor ASIS International, there were more than 20,000 registrants from 125 countries around the world, including those who attended the conference as well as the exhibition. Exhibitors definitely put their best feet forward, enthusiastically promoting their technology breakthroughs, but how convincing were they? The comments from at least one attendee – a large corporate end user who represents a key demographic for show organizers – bluntly suggest that healthy skepticism was on display side-by-side with the promotional energy in play.On this floor, there are some lies being given out. Ask the tough questions, make the exhibitors show you" “On this floor, there are some lies being given out,” said Rudy A. Wolter, CTO, Security and Investigative Services for Citigroup, a financial services corporation. He advised fellow attendees to “listen for them, ferret them out, ask the tough questions. Make [the exhibitors] show you.” “Don’t be afraid to ask these men and women questions,” added Wolter. “Don’t be afraid to challenge them. If you don’t challenge them, they’re not getting any better which means we aren’t getting any better. At the end of the day, they’re the leaders; they’re the ones making change; they’re the ones touching systems; they’re the ones helping integration.” Banking security with Verint At Citigroup, Wolter oversees 1,300 bank branches in North America that use Verint systems, including 23,000 cameras tied into a single command center. Skepticism aside, Wolter also provided evidence that even tough customers can be brought around. Specifically, he is sold on Verint: “When you have a problem, this company listens,” he told attendees at a Verint gathering on the show floor. New at GSX 2019 is the Verint Video Investigator, which is software that empowers investigators to quickly find the data they need to identify security threats in near real-time. In all, Verint serves in excess of 2,300 individual financial institutions, with tens of thousands of branches. Wolter was one of several end users willing to sing their praises publicly. Other GSX exhibitors were also proud to have their own real-world success stories. Placing the emphasis on outcomes At GSX, I heard more than once that outcomes are more important than technologies. Customers don’t want to hear about technologies, but rather about what those technologies can do for them. Avigilon, now a subsidiary of Motorola Solutions, is another company that is focused on outcomes rather than technology per se. “Instead of focusing on megapixels and terabytes, the end user is focused on perimeter security, loss prevention and risk management,” says John Kedzierski, Sr. VP of Video Solutions at Motorola Solutions. “We are working to provide that outcome." The end user is focused on perimeter security, loss prevention and risk management" How operators work to ensure outcomes is another aspect that is changing, says Kedzierski. “Watching video is obsolete,” he says. Using Avigilon’s new system, the operator instead is looking at color-coded hexagons; one color means motion, another means an analytic event. Operators click on various hexagons to view video. Also at GSX 2019, Avigilon featured its new H5A camera line, with expanded object classification analytics, detailed object detection, and tracking in crowded scenes; and focused on the Avigilon Blue cloud system. They are working to make every camera capable of detecting faces, which can be matched to a watch list. How technology addresses marketplace changes Addressing the changing marketplace was another GSX theme. As the workplace changes, ASSA ABLOY Americas is adapting its technology to address new employment practices such as "hot-desking," and remote and mobile workers, says Peter Boriskin, Chief Technology Officer. Systems have to be able both to protect assets and also to provide flexibility to accommodate the changing workforce, he said. Corporate acquisitions are directly expanding the capabilities that ASSA ABLOY brings to the market. For example, they recently acquired Luxer One, a locker company that enables secure delivery of packages without customers needing to stand in line or wait for service. Deliveries can be made in seconds. Peter Boriskin of ASSA ABLOY Americas led a booth tour, including new power capabilities gained in the acquisition of LifeSafety Power Another recent ASSA ABLOY acquisition is LifeSafety Power, which is expanding the company’s capability to provide proactive data on wired systems by tracking power usage. For example, a spike in current might mean a problem with a component. Compiling “intelligent triggers” enables creation of a dashboard to provide analytics of wired systems. ASSA ABLOY has also been devising predictive analytics of wireless locks to predict battery life, for instance, and to address other maintenance challenges. “We want to know what’s going on at a door without visiting it,” says Boriskin. New exhibitors make their mark New exhibitors were part of the GSX mix. One new exhibitor was Vaion. It’s their first trade show after launching at IFSEC in London in June. Vaion combines a small camera portfolio with on-premise servers and software managed through the cloud for an end-to-end solution. Tormod Ree, co-founder and CEO, calls it a “hybrid cloud delivery model”. Vaion is also a “more proactive security model,” said Ree. Video is analyzed for anomalies, and the server “learns” what is normal and not normal. The system provides alerts and notifications, occupancy counting and traffic control, among other features. And “overlays” are employed to present information on a map. Vaion can highlight video that is more likely to be relevant and prioritize feeds that have more activity. Vaion designs the hardware, which is manufactured in Taiwan. Vaion was a first-time exhibitor at GSX 2019 with their end-to-end video system; Tomod Ree is co-founder and CEO Gunshot detection technology EAGL Technology displayed their “Firefly” gunshot detection technology at GSX 2019. Based on technology originally developed for use in the military for sniper detection, the U.S. Department of Energy adapted it to civilian uses after the Sandy Hook School shooting. Boaz Raz, CEO, said the technology is the “most advanced and affordable, wireless for use indoors or outdoors, and it can control doors and cameras”. It doesn’t “listen” for gunshots like some competitors; rather it measures energy for “6 sigma” accuracy (almost 100%). Defining, and redefining, end-to-end solutions End-to-end solutions were all the rage at GSX 2019, but Allied Universal was one exhibitor that pondered what, exactly, is an end-to-end solution? It means different things to different people. For example, a video company’s end-to-end solution would not include access control. When Allied Universal claims to offer an end-to-end solution, they mean it in the broadest definition of the term, including all security systems deployed for a customer as well as the important human element (i.e., manguarding). “The industry’s emphasis on ‘end-to-end’ doesn’t encompass a full solution,” says Mike Mullison, Allied Universal’s Chief Information Officer. “When somebody uses the term end-to-end, you have to ask: What’s at both ends?” The lines between cyber and physical threats are blurring. Clients want full-service solutions" “The lines between cyber and physical threats are blurring,” adds Mullison. “Clients want full-service solutions.” Allied Universal is adding new technology elements to its offering, and Mullison says “the next phase of growth will be fueled by technology.” Allied Universal recently introduced the Heliaus product, a smart phone app that accesses an analytics engine to predict outcomes and prescribe optimum responses. It literally puts technology in a security guard’s hand. One customer has found that use of the technology resulted in a 20% reduction in safety and security incidents. The latest in access control among exhibitors In addition to video, access control had a big profile at GSX 2019, as evidenced by ASSA ABLOY America and many other companies. Another example is SALTO Systems, featuring its new NEO cylinder for wireless access control and the SALTO Virtual Network (SVN); the SVN-Flex extends and increases the number of updating points directly to the door. The SVN-Flex extends and increases the number of updating points directly to the door The compact SALTO NEO Cylinder is designed for doors where fitting an electronic escutcheon is not possible or required and can be installed on standard doors, server racks, gates, cabinets, electric switches, or sliding doors. Low energy consumption results in 110,000 cycles with just one set of batteries. Other SALTO products are SALTO KS (Keys as a Service); SALTO BLUEnet Wireless for Bluetooth RF-driven real-time control of doors; the XS4 One Deadlatch stand-alone electronic lock; and JustIN Mobile, which replaces the need for an access card by securely sending a mobile key Over the Air (OTA) to an iOS or Android device from SALTO’s ProAccess SPACE management software. The next step in integration A new company reflecting the GSX emphasis on integration is Security and Safety Things (SAST), which is still in launch mode but expects to have its first pilot customers in the Q4. The first camera vendors embracing the SAST platform will have cameras for sale at ISC West in the spring. SAST is creating an Internet of Things (IoT) platform for the next generation of security cameras. The SAST App Store will allow developers to build and market new applications, similar to today’s app stores for smartphones.SAST is creating an IoT platform for the next generation of security cameras “SAST is a technology platform, but it is also a business platform and a relationship platform,” said Emmanuel Ventadour, VP Sales and Marketing. For app developers, SAST also provides non-technical commercial services (i.e., easing their route to market.) Hartmut Schaper, CEO, emphasizes the “openness” of the company. Even though they are a spinoff of Bosch, they are treating every camera manufacturer equally, he says. For integrators, the use of apps can expand their field of play. Apps will empower integrators to use video for more business processes – not just security – and expand their reach with customers, says Schaper. From skepticism to sales There were plenty of product claims at GSX to feed the skepticism of even the toughest of potential customers. Fortunately, product claims were only the beginning of conversations with attendees at this year’s show. No doubt manufacturers were put through their paces more than once, and a few of them even came out on the other side with potential new business to show for their efforts. That’s the true measure of success at GSX 2019, or any trade show. Click here to read our reviews from Day One and Day Two of the show.
The Smart Cities Mission is an innovative initiative by the Government of India to drive economic growth and improve the quality of life of people. It aims to achieve this by enabling local development and harnessing technology as a means to create smart outcomes for citizens. A hundred cities across the country were shortlisted by the government, which were to be promoted as ‘Smart Cities’. Vadodara was selected among those 100 cities to be developed as a smart city in India, to enhance economic growth, and improve the quality of life of people by enabling local area development, deploying smart solutions and harnessing technology. Optimizing city traffic management Vadodara Smart City Limited wanted to heighten safety for its citizens and visitors, along with optimising traffic management With a population of approximately 2.39 million, Vadodara is the third largest city of Gujarat, and a major industrial, cultural and educational hub of western India. The city is compact and crowded, with a vibrant cultural life that draws a lot of traffic. It is vulnerable to situations of overcrowding, road accidents, criminal activity, and natural disasters. Vadodara Smart City Limited wanted to heighten safety for its citizens and visitors, along with optimizing traffic management, without disrupting daily lives. To this end, they sought a state-of-the-art, open platform that could expand in phases, in sync with the city’s growth. Unified Video Computing Platform As Vadodara’s expansion plans are underway, so too are discussions about growing the city-wide surveillance system. As part of the initial process, a project team comprising Smart City officials, Videonetics, and technology partners did an extensive research to mark out key areas and traffic junctions across the city. Going a step further, Videonetics developed a solution based on its Unified Video Computing Platform (UVCP) for the entire city, so that its people, property, and assets remain secure. State-of-the-art AI & DL powered Intelligent VMS and Video Analytics to provide continuous viewing and recording, enabling security operators and law enforcement to proactively identify, and effectively respond to, events to mitigate their impact. Specifically, now the law enforcement authorities can automatically detect overcrowding, unattended baggage, and perimeter intrusions, even under the cover of darkness. Automatic Number Plate Recognition (ANPR) system across 15 traffic junctions in Vadodara, to identify suspected/ unwanted vehicles and non-standardized number plates, as well as to generate detailed reports on vehicle movements, and much more. Command Control Centre, to provide a bird’s eye view to operators, about what is happening across the city. From traffic control to citizen security, operators remain alert and ready. With greater situational awareness, municipality officials are proactively responding to incidents such as garbage overfill, incidents of water-logging, traffic congestions, hazardous debris on roadways, illegal parking, and more. Video surveillance systems Videonetics’s solution manages over 550 IP cameras throughout the city of Vadodara Under the project, video surveillance was deployed along public ways, in urban passenger transport stations, municipal buildings, traffic junctions, entry and exit connecting roads to city, and more. To date, Videonetics’s solution not only manages over 550 IP cameras throughout the city of Vadodara, but also proactively identifies and effectively responds to events, to mitigate their impact. Furthermore, the video surveillance system helps in the maintenance of peace in the city, in upholding law and order, and providing better policing services. The key results are: 1. Increased safety and security with 24x7 monitoring of city area, 2. Faster crime investigations, 3. Traffic police having in-depth knowledge on vehicle count and movement, and 4. Swift action by on-site traffic police, as they get alerts on traffic congestion, unwanted/ hot-listed vehicles, and so on. City surveillance Moreover, Videonetics’s solution has also been able to help the police in monitoring celebration of festivals and VIP movement in the city, and building a security net for its citizens. Overall, it has been successful in ensuring the safety and security in the city of Vadodara, and has played an important role in becoming a smart and connected city.
The prestigious Jewel complex at Singapore’s Changi Airport is receiving the highest standards of perimeter protection, thanks to the manufacturer of road blockers, bollards and vehicle barriers, ATG Access. Singapore's Changi Airport, which has scooped the title of the world's best airport for seven years running, has strengthened its position with the launch of Jewel – a mixed-use, lifestyle hub for visitors. Taking more than four years and $1.25 billion to build, Jewel covers 1.46 million square feet and includes sky gardens, the world’s largest indoor waterfall, aviation lounges, restaurants and over 300 shops. The extension to Changi Airport aims to position the facility as a leading, competitive, and safe international airport for its millions of visitors. As such, it needed the very best in perimeter security. Tested lift-out bollards In order to meet client specification, ATG worked with its local partner in Singapore to test and certify the lift-out product As the main airport site is fully operational 24/7; the security measures placed around the terminal needed to be installed quickly and effectively. With this in mind, ATG Access utilized its reputable shallow mount technology, which delivers maximum security with minimum disruption. More than 1,000 impact-tested Shallow Mount Bollards and Shallow Mount Lift-out Bollards, requiring a foundation depth of just 112 mm, were deployed around the airport. To ensure the security products complemented the aesthetics of the terminal and surrounding areas, they were coated in varying shades of silver to suit. In order to meet client specification, ATG worked with its local partner in Singapore to test and certify the lift-out product, meaning it was one of the first impact tested lift-out bollards in the industry. Critical national infrastructure Following this, all of the products were developed at ATG’s manufacturing facility in Singapore. Gavin Hepburn, Managing Director at ATG Access, said: “With over 66 million passengers traveling through the airport each year; the new and iconic Jewel project required outstanding perimeter security measures to protect the asset and its passengers. Changi airport has taken its security very seriously over the last eight years, ensuring all terminals are protected from potential terrorist attacks or security breaches - after airports have been identified by security services as critical national infrastructure. This project has been our third biggest perimeter project to date, after Hamad International Airport Project (Doha) and Jubail Industrial Project, KSA, and we are proud to have been selected as their security provider.”
Patriot One, developer of the PATSCAN Multi-Sensor Covert Threat Detection platform, is pleased to announce a collaboration partnership with Los Angeles Football Club (LAFC), part of Major League Soccer (MLS), to pilot its PATSCAN platform at Banc of California Stadium. Threat and intrusion detection “We are excited to announce this PATSCAN pilot deployment project with another U.S. major sport franchise,” said Martin Cronin, Patriot One CEO and president, adding “In the New Year, our installation team will begin work with the Los Angeles Football Club and Banc of California Stadium on this important game safety initiative. MLS fans will enjoy an added layer of security while attending their favorite team’s home games in Southern California”. Martin further said, “Our vision is to not only to create a world safe from acts of violence, but also to help save a way of life people have come to expect in their normal everyday lives, and that includes participating in professional sports and entertainment activities with their fellow fans.” PATSCAN Multi-Sensor Covert Threat Detection The PATSCAN Multi-Sensor Covert Threat Detection platform will ship in January 2020 to the security team at LAFC The PATSCAN Multi-Sensor Covert Threat Detection platform will ship in January 2020 to the security team at Los Angeles Football Club, where they will be joined by Banc of California Stadium security and Patriot One implementation engineers to begin the integration and pilot deployment project. Specific location of the Platform’s deployment will not be disclosed. “Customer safety is our number one priority at Banc of California Stadium,” said LAFC Vice President of Information Technology Christian Lau. “We are excited to work with Patriot One to give customers an extra layer of security while attending events at our world-class venue in the heart of Los Angeles.” Stadium security Following the initial pilot deployment of the PATSCAN platform with LAFC at an undisclosed location within Banc of California Stadium, Patriot One will work with the team and stadium management to broaden deployment throughout the complex.
Airports, power plants, and data centers house mission-critical assets essential to everyday life. Without adequate physical security, these operations are at risk of intrusion and sabotage. The shutdown of any one of these critical infrastructure facilities would affect hundreds of thousands of people. Securing these entities from a physical breach starts by protecting the perimeter. While critical infrastructure sites pose their challenges for perimeter intrusion detection systems, new technologies, and solution integrations are addressing these pain points and enabling better detection, deterrence, and real-time response in the case of a threat. Trending technologies amplifying perimeter security Here are six trending technologies amplifying perimeter security for critical infrastructure: First-class thermal cameras - FLIR thermal cameras continue to remain the industry standard for 24-hour perimeter monitoring and are seeing strong adoption throughout the critical infrastructure sector. Greater thermal resolution, longer detection ranges, sophisticated edge analytics, and ONVIF compliance continue to distinguish premium choice FLIR thermal cameras from low-end options. Radiometric thermal cameras for business intelligence - Thanks to the emergence of artificial intelligence (AI) and machine learning technologies, critical infrastructure customers are looking for a return on investment beyond the traditional functionality of their security cameras. Electrical substations, for example, are deploying thermal cameras for intrusion detection and predictive maintenance. These sites are installing radiometric thermal cameras, integrated with temperature trending software, to identify issues with assets before a component malfunctions, overheats, or fails. Being able to prevent even one electrical fire can save the customer thousands if not millions of dollars in damages, liabilities, and insurance claims, well worth the cost of the solution. Radar for redundancy - Critical infrastructure facilities are deploying radar solutions to expand coverage beyond the fence line. Providing continuous coverage, a radar conducts a full 360-degree scan of a property every one to two seconds. Radio waves are undeterred by rain, fog, or other adverse weather conditions that hinder standard surveillance cameras, making them an ideal solution for rugged environments. Users are also increasingly pairing radar with thermal cameras to ensure redundancy and reduce false positives. If both the radar and thermal camera are alerted to the same event, remote operators can see it is likely a true alarm. Cyber-hardened features - Because network cameras and sensors are now standard for enterprise-class deployments, the need for perimeter security has extended beyond physical security to edge devices. In this digital age, it is imperative that cybersecurity precautions are put in place to safeguard the network and devices from cyber breaches. FLIR has focused its research and development in cybersecurity. Today, all new lines of FLIR cameras are built with cyber-hardened features. Standard cybersecure protocols for FLIR cameras include running penetration tests, eliminating backdoor accounts, removing default passwords, and enforcing end-to-end encryption through secured TLS connections. 4K and UHD video - While thermal and radar sensors improve detection, other devices are needed for threat assessment and identification. The emergence of HD, Ultra HD, and 4K cameras offers end users a heightened level of detail, optimal for evidence capture and investigation procedures. Critical infrastructure customers are beginning to upgrade their visible cameras for higher resolution models, and for this reason, are opting for the latest FLIR Quasar and Ariel cameras. These cameras are attractive options, as they offer low predictable bit rate, improved wide dynamic range, and enhanced image stabilization features that enable crisp video quality, ideal for video analytics and suspect identification. Drones - For critical infrastructure sites like oil and gas refineries, dispatching security personnel to respond to an intrusion alert isn’t always easy, as these sites are often either remote or difficult to access. In order to improve response times, critical infrastructure sites are integrating unmanned aerial vehicles (UAV), or drones, with their overall security system. Upon a verified alarm, the drone is dispatched to the area of interest to provide additional surveillance. By equipping a drone with both an optical and thermal payload, operators can quickly get eyes and ears on the scene to assess the threat.
Everbridge, Inc., globally renowned provider of critical event management solutions, has announced that it has been selected by Peru’s Ministry of Transportation and Communications (MTC) to power the nation’s Sistema de Mensajería de Alerta Temprana de Emergencia (Sismate), Peru’s Early Warning Emergency Messaging System. The news marks the completion of contract negotiations with the MTC that Everbridge had initially disclosed in September, without naming the country. The win reinforces Everbridge’s position as the global leader in population warning systems with contracts in the Americas, EMEA, and APAC regions. Critical messages to mobile phones After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident After the Sismate is deployed, it will be activated once Peru’s National Institute of Civil Defense detects a major incident. The system, powered by Everbridge Public Warning, will send critical messages to mobile phones before, during and after the emergency. Sismate alerts can also be used in drills and to provide support in search and rescue operations. The Sismate is designed to serve over 37 million people including Peru’s 33 million residents and 4 million annual visitors. “This technology marks a milestone in risk and disaster management at the national level, which will be consolidated by combining joint efforts between various institutions and citizens,” explained Deputy Minister of Communications, Virginia Nakagawa to El Economista. National warning system “Everbridge is honored to support Peru with its national warning system,” said David Meredith, Chief Executive Officer at Everbridge. “Peru joins a growing number of countries that have chosen to partner with Everbridge to implement a nationwide system to protect their population and visitors amid an escalating threat environment.” The Everbridge Platform has been deployed by more local, state, and national governments across the globe than any other solution, offering the ability to reach over 500 million people in more than 200 countries. In addition to Peru, Everbridge Public Warning has been deployed to reach the mobile populations on a country-wide scale in Sweden, Iceland, the Netherlands, Singapore, Greece, and a number of the largest states in India, and is currently being implemented in Australia. Everbridge Public Warning system Everbridge is the first population alerting provider to support four EU countries in conjunction with the recent EU mandate requiring member countries to have a population-wide alerting system in place by June 2022. Everbridge Public Warning represents the only multi-channel solution which allows countries to deploy their preferred combination of emergency communications methods. The Everbridge population warning system communicates across all phases of an incident, leverages location intelligence (static location, last known location, and expected location). It provides directed two-way communications, and enables countries to combine both speed of delivering alerts with the broadest reach to cover the full population and visitors.
Located in the Southern Vietnamese metropolis of Ho Chi Minh City, the Deutsches Haus office tower is a symbol of cooperation between Germany and Vietnam. Opened in September 2017, it is the country’s first building to earn LEED (leadership in energy and environmental design) Platinum environmental certification and serves as a cultural, commercial and diplomatic hub in the region. Next to the Consulate General of the Federal Republic of Germany the 25-story building with a 40,000-square-meters floor area is home to regional offices of international firms such as VISA, Adidas, Schneider Electric, and Bosch Vietnam. As premium amenities, Deutsches Haus also features a gourmet cafe, multifunctional conference and events area, health club, and rooftop restaurant. Creating a challenging security environment Deutsches Haus needs to meet the highest security demands: All security systems, including security guard teams From a security manager’s perspective, this multi-use blend of diplomacy, business, and leisure facilities – in a building fully accessible to the public – creates a challenging security environment. As the seat of the Consulate General of the Federal Republic of Germany, Deutsches Haus needs to meet the highest security demands: All security systems, including security guard teams, have to be approved by the Federal Foreign Office of Germany. Adding to the challenge, Deutsches Haus is located opposite from the Consulate General of the United States of America – and in close vicinity to the Consulate General of France and the British Consulate General – on a busy intersection between two main streets. Therefore, monitoring pedestrians and automobile traffic on the building’s perimeter is just as crucial to end-to-end security as tracking public and high-security areas on the inside. Detecting security events automatically In search of an adequate video security solution, the team at Deutsches Haus knew that high-definition cameras alone would not suffice. The reason: When several hundred cameras are required to secure an area of this size, personnel tend to be overwhelmed by the amount of video feeds. After only 20 minutes, the average operator misses 90 percent of important scenes, as studies have proven. Bosch experts covered the building and its perimeter with network security cameras For this reason, modern IP security cameras feature Intelligent Video Analytics – using algorithms and AI-based image recognition – to support operators by detecting security events automatically. Bosch experts covered the building and its perimeter with network security cameras featuring built-in Intelligent Video Analytics. Indoor areas like the entrance doors, reception area, lobby, café, as well as parking garages and corridors to the fire escape staircases are monitored by over 170 DINION IP starlight 7000 HD and FLEXIDOME IP panoramic 7000 MP cameras. Alerting security personnel of illicit behavior The building’s elevators are also protected by Bosch cameras. Thanks to built-in-intelligence, IP cameras automatically alert security personnel of illicit behavior, for instance persons accessing restricted areas. The building’s perimeter and parking lot are safeguarded outdoor-approved AUTODOME IP starlight 7000 HD cameras with pan-tilt-zoom (PTZ) capabilities. Integrated with a third-party solution to open barriers for authorized vehicles, the cameras can automatically track moving objects such as cars and pedestrians – and warn personnel of threats – with their 30x zoom lens while obtaining images under low light conditions via Bosch starlight technology combined with Intelligent Video Analytics. As a key requisite, the networked cameras are able to withstand the city’s four-month rain period and prove resistant to vandalism. Enhancing safety of building occupants The staff can easily announce and notify a building guest about a forgotten purse which was left in the café PAVIRO, the Public Address and Voice Evacuation system of Bosch was installed in the building for the safety of building occupants. The PAVIRO solution makes it possible for occupants to feel safe in the building while enjoying high quality music and excellent Public Address speech intelligibility. The staff can easily announce and notify a building guest about a forgotten purse which was left in the café. To make building evacuations as efficient as possible, the PAVIRO solution provides phased evacuation: automated messages direct occupants to immediate safety. Next to this, building occupants and guests can also enjoy high-quality music in the rooftop restaurant, café, health club and event areas which of course contributes to the nice building atmosphere. Providing government-Grade security For the building owner, PAVIRO can establish long-term cost-saving and minimize total cost of ownership. The system is especially eco-friendly because less amplifiers are needed due to power-load sharing of the amplifier architecture, which in turn requires fewer batteries. Since opening day, the Bosch system has provided government-grade security at Deutsches Haus in Ho Chi Minh City. “I am proud to have Bosch both as a tenant and as a brand who secures Deutsches Haus with their high quality and reliable video security cameras and sound systems,” added Ryan Lower, Property Director, Colliers International – Deutsches Haus. While meeting the challenge of securing diplomatic and enterprise assets in a publicly accessible building, the future-proof solution provides an important reference in this dynamic market.
Round table discussion
Along with the integration of security and other systems in an enterprise environment comes a need to centralize monitoring and control of the unified network. A control room is at the center of managing integrated systems, providing the focal point to collect information from a variety of sensors, analyze the data, and then respond appropriately. The technologies that drive these functions are changing and evolving, thus increasing the efficiency and efficacy of systems. We asked this week’s Expert Panel Roundtable: What’s new in command-and-control systems, and what is the impact?
The high cost of thermal imaging cameras historically made their use more likely in specialized law enforcement and military applications. However, lower pricing of thermal imaging technologies has opened up a new and expanding market for thermal cameras in the mainstream. We asked this week’s Expert Panel Roundtable: What are the new opportunities for thermal cameras in mainstream physical security?
The new school year is a good time to reflect on the role of security in protecting our schools. From video to access control to some newer technologies, our Expert Panel Roundtable found plenty to talk about when we asked this week’s question: How does security technology make our schools safer?
3 Reasons To Migrate To A New Access Control SystemDownload
Schooling the Market on Education SecurityDownload
Lawrence, Massachusetts Deploys FLIR Video System For SafetyDownload