By definition, an edge device is an entry point to a network. In the physical security industry, edge devices are the cameras, sensors, access controllers, readers and other equipment that provide information to the IP networks that drive today’s systems. In the Internet of Things (IoT), edge computing refers to an increasing role of edge devices to process data where it is created instead of sending it across a network to a data center or the cloud. In our market, edge computing takes the...
A complex set of biological, psychological, sociological, contextual and environmental factors are involved when a perpetrator decides to commit an act of workplace violence. In many cases, the perpetrator doesn’t really want to become violent; rather, they are seeking to achieve an outcome and mistakenly believe violence is their only option. An underused approach to preventing workplace violence is to consider the issue from the perspective of the instigator, to seek to understand their...
One factor aggravating concerns about workplace violence in corporate America is the easy availability of firearms. In many states, citizens, including employees, have the right to carry firearms onto a company’s property even though firearms are prohibited in the workplace. In effect, an employee prone to violence may have a firearm as near as their vehicle in the company parking lot. Currently, 23 states in the U.S. have so-called “parking lot storage” laws, which enable em...
What happens after the sale is complete, after the contracts are all signed and sealed? That’s when an abundance of variables can kick in – variables that can mean the difference between a successful security system or a case of buyer’s remorse. The features and value of equipment involved in a security system are well known before the sale closes, as hopefully are the integrator’s and end-user’s expectations about after-sale service. But what is the reality of afte...
ThinkReps LLC, a security manufacturers’ rep firm in the New York Metropolitan area, announces that the company has expanded and added a new team member, Kenneth C. Kraemer to its roster. ThinkReps is a manufacturer's representation firm based in New York and focused on enhancing the sales and market awareness of the best physical security solutions in the industry. The company is committed to providing top notch sales and support to its customer base and continues to raise the bar on sal...
Two giant video surveillance companies have responded to a United States government ban on use of their products included in the 2019 National Defense Authorization Act (NDAA). Both Hangzhou Hikvision Digital Technology Company and Dahua Technology Company are mentioned by name in a section buried in the giant military reauthorization bill. A ban on use of their products will take effect “not later than one year after” the law is enacted. Response From The Manufacturers Hikvision&r...
Unlimited Technology is proud to announce that John Palumbo has been appointed President, effective immediately. As President, John will have responsibility for all the company’s operating units. He will report directly to Chairman Richard Rockwell. John is the former Sr. Vice President of Sales and Marketing for Unlimited and has a track record of consistent success in many different roles with the company including Sales, Strategic Planning, Project Management, Cost Control, Project Executive and integration in North America. Convergence of cyber and physical security "John is a competitive and energetic leader who is known for inspiring teams, operationalizing plans and mobilizing organizations to deliver business results," said Richard Rockwell PSB.com Chairman of the Board. "He understands the challenges and opportunities that exist within the U.S. and global market and he has the right mix of strategic vision, people leadership and grit to ignite future growth for Unlimited Technology, Inc." As Sr. Vice President of Sales, John surpassed all targets on volume, revenue, profit and market share while accomplishing year-over-year improvements in employee engagement. John envisions an increased focus on the convergence of cyber and health awareness on physical security related devices in the immediate future while maintaining Unlimited’s long standing history of ensuring excellent service to our clients.
The U.S. Congress has voted on, and the President has signed, a ban on government uses of video surveillance equipment produced by two of the world’s top manufacturers – Hikvision and Dahua. The provision is buried in the National Defense Authorization Act (NDAA) for fiscal year 2019, which passed the U.S. House of Representatives on July 26 and the Senate on August 1. The President signed the NDAA into law on August 13. The provision was originally introduced as an amendment to the House version of the bill but was not included in the Senate version. However, the provision survived in the final version, negotiated by a conference committee and passed by both houses. The President had previously voiced support for the bill, which authorizes U.S. military spending, and signed it into law two weeks later. Scope Of The Ban The President has previously voiced support for the bill, which authorizes U.S. military spending, and signed it into law two weeks later The ban covers “public safety, security of government facilities, physical security surveillance of critical infrastructure, and other national security purposes.” It bans “video surveillance and telecommunications equipment produced by Hytera Communications Corporation, Hangzhou Hikvision Digital technology Company, [and] Dahua Technology Company (or any subsidiary or affiliate of such entities)..” Hytera Communications is a Chinese digital mobile radio manufacturer. The final bill eliminates specific mention of “white label” technology, which refers to cameras manufactured by Hikvision and/or Dahua but rebranded and labeled by other companies such as Honeywell, Stanley or UTC. However, interpretation of the word “affiliate” could include OEM partners. The ban, which takes effect “not later than one year after … enactment,” applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a "phase-out plan" to eliminate the equipment from government uses. The requirement suggests an opportunity of additional government business for non-Chinese manufacturers and integrators involved in switching out the equipment. Mention of the words “critical infrastructure” in the final bill points to inclusion of another whole category of installations in the ban; that is, facilities operated by non-government entities that are judged to be essential to the functioning of society and the economy. The Security Industry Association (SIA) declined to comment on the bill, citing its complexity and the need to research the potential impact. Both Hikvision and Dahua have issued corporate statements in reaction to the ban. The bill can be viewed in the context of a broader U.S. political backlash against China in general Broader Context Of The Bill The bill’s passage is a setback to the growing profile of Chinese companies in the video surveillance market. It can also be viewed in the context of a broader U.S. political backlash against China in general, as evidenced by the recent acceleration of import tariffs and simmering trade war. The NDAA also targets China in another way: it strengthens the Committee on Foreign Investment in the United States, which reviews the impact of proposed foreign investments on national security.The NDAA is an annual act passed by Congress that authorises U.S. military spending Another view is that Chinese companies invest heavily in research and development, can operate at greater scale and with lower costs, and therefore provide good overall value. For these reasons, many had expected Chinese camera products to increase their presence in the US market. The government ban, at the very least, slows down that transition. The potential is there for it to totally change the face of the industry. The NDAA is an annual act passed by Congress that authorises U.S. military spending and is used as a vehicle for a variety of policy matters. It has been passed annually for more than 50 years. The August 1 Senate vote marks the earliest Congress has passed the defense spending bill since 1978. Ironically, the final bill softened restrictions on China’s ZTE Corp. and Huawei Technologies, two telecommunications companies, because of national security concerns. These restrictions are weaker than in earlier versions of the bill. This article was updated on the 14th August 2018.
Considering how much the modern smartphone has become a common everyday tool and cultural icon, it’s hard to believe it has only been with us for a relatively short space of time. The first Apple iPhone was launched in 2007 and yet in a little over a decade the smartphone has become as essential as our keys or wallet. From its conception as a multi-faceted communications device, it has morphed into something far more integrated in our daily lives. Services such as Apple Pay, Android Pay and PayPal have seen the smartphone become a credible replacement for cash and cash cards, but equally, it is possible to replace access cards and keys as well.Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly The ability to accurately authenticate an individual and the applications this offers for security purposes, is something that the security industry needs to continue to embrace and further promote to our customers. Considerable Advantages Most security professionals understand the potential benefits of using mobile device authentication, with flexibility being the key advantage. Smartphones can easily receive authentication credentials remotely and access can be confirmed or denied instantly. Equally, smartphones already contain many secure options to ensure they are only used by the authorized user – fingerprint and face recognition, as well as pattern authentication and PIN, being prime examples. Unfortunately, there is still a lack of awareness amongst some security operators, customers and the public of these exciting benefits. Potentially there may also be some reluctance, in certain quarters, to trusting a mobile device with physical security. A lack of trust in seemingly ‘unproven’ technology is not unusual, but the security industry needs to demonstrate reliability along with the considerable security and convenience benefits of using it. Trusted Part Of Security Network Many smart devices already securely bind the mobile device with the right person by using 2-factor authenticationMobile device security needs to earn its trust, in much the same way as any other new ground-breaking application. In fairness to the doubters, it’s not hard to imagine how much of a risk a badly protected mobile device could be to any secure network! There are two key obstacles that smartphones need to clear before they can become a trusted part of the security network though. Firstly, that they are secure enough to be trusted as part of a security network, and secondly that they can reliably identify an authorized user in a real-world environment. Many smart devices already securely bind the mobile device with the right person by using 2-factor authentication. For example, this could combine a PIN code with the fingerprint or face of the authorized individual. In areas with particularly high security, you could also implement a wall-mounted biometric reader (fingerprint, facial recognition or iris scan) to add a further level of protection and ensure there is no wrongful use of the mobile device. Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas Security By Location With its many and varied functions, undoubtedly one of the most useful systems on any smartphone is its GPS location tracking. It’s also a perfect tool to assist with security systems interaction.A benefit of using smart device authentication is the cost savings over operating traditional tokens Consider any secure facility – it will feature different levels of access. This can vary from a humble canteen and break-out areas, right through to secured doors around potentially dangerous or highly sensitive areas - such as plant rooms, or even a nuclear facility! Security tokens or access cards are typically rigid in their programming, only allowing access to certain areas. A smartphone, however, can be granted or denied access depending on the location of the request by the individual – GPS literally adds a level of extra intelligence to security. Personal Items Using QR codes seem to be a simple but reliable identity and access control authentication optionMobile devices tend to be guarded and protected with the same concern as your money or your keys. Many of us literally carry our mobile device everywhere with us, so they are relatively unlikely to be misplaced or lost – certainly in comparison to a key card for example. Also, think about how often you use or hold your smartphone – some estimates suggest 2,600 times each day! With that level of interaction, you’ll be aware very quickly if it’s been misplaced, not least because of the inconvenience and cost to replace it. This level of personal connection makes it perfect for use with security systems. Cost Savings Another obvious benefit of using smart device authentication is the cost savings over operating traditional tokens. No more plastic badges, access cards, lanyards, printers and consumables used to administer security. This is something the security industry really needs to shout about! It will come as no surprise to hear that smartphones are exceptionally common too. Figures suggest that in 2015 there were nearly 41m in use in the UK and this is predicted to rise to 54m by 2022. With the UK population being just over 65m, that is a very high percentage of people already carrying this technology. Using a resource that people already have, and which is highly secure, makes unquestionable financial as well as practical sense. GPS location tracking is a perfect tool to assist with security systems interaction Integrated Technology Agreeing on common and shared open protocols has unfortunately been one of the stumbling blocks for the security industry in adapting to a predominantly smartphone authentication approach. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised.Not everyone has an iPhone, but it is such an important segment of the market for customers Mobile technology trends have dictated to the systems that use it. Apple’s earlier (Pre iOS 11) decision to restrict the use of NFC to Apple Pay on its devices has had a profound effect on the implementation of NFC in other applications too. Not everyone has an iPhone, but it is such an important segment of the market that other manufacturers are wary of how customers will be able to use any new technology. We have seen a much bigger focus on using Bluetooth Low Energy technology on mobile devices instead. With providers such as HID Global, STid in France and Nedap in the Netherlands now concentrating on developing Bluetooth Low Energy readers and mobile credential applications, this seems like a highly credible alternative. Along with NFC and Bluetooth Low Energy options, there also seems to be a lot of interest in using QR codes as simple but reliable identity and access control authentication. These can easily be displayed on a screen or printed if necessary, giving great flexibility over the type of technology that is used in the future. Upgrading Existing Security Systems There are strong arguments for many businesses to continue using MIFARE+ systems if they suit operations well We are steadily seeing the signs of smartphone authentication replacing the cards and tokens we have been familiar with. However, many consumers still want options rather than to just be railroaded down one path. A business that has invested in cards or tokens will want to use that technology investment fully. The changes will come when readers are updated – this is when security specifiers and installers need to promote the advantages of dual-technology readers, which offer options to include smartphone authentication into the mix. There is still considerable diversity amongst smart devices, the operating systems they use, and the security technology employed by each. Android, Apple iOS and Blackberry devices all vary with regards to the biometric authentication available, so security administrators may need to be flexible on the types of authentication they accept. Interestingly, card technology has also progressed at an astonishing speed too – with MIFARE+ proving to be a highly cost-effective, practical and secure system that can easily be integrated. There are strong arguments for many businesses to continue using these systems if they suit operations well. NFC (Near Field Communications) technology in mobile phones and smart devices has failed to be the universal success it promised Hybrid Systems A hybrid approach may be the best answer for many security operators. This means those who choose to enjoy the benefits in terms of flexibility and convenience of smartphone authentication can do so, whilst those who are more hesitant can continue to use more traditional methods. A hybrid approach may be the best answer for many security operators Larger organizations may find that the swap over is a slower and more gradual process, whilst smaller start-up businesses may prefer to jump to a smartphone-based approach straight away. If security systems are well integrated but modular in their approach, then it becomes much simpler to evolve as time goes on. Embracing The Benefits Using their app-based systems architecture, smartphones are ideally placed to evolve with security systems in the future. There are many benefits for the security industry and our customers, but we need to remember that this move will involve a culture change for many security operators and users. The security industry needs to be mindful and respectful of any anxiety, but also be positive and promote the considerable benefits mobile authentication offers.
Over the past few years, biometrics has rapidly expanded into consumer applications, like the financial market for customer authentication, to payment services and withdrawing cash from ATMs in high-fraud markets. However, its adoption as an additional authentication factor for physical access control systems (PACS) and other enterprise applications, hasn’t been as rapid. But this is changing. Biometrics offers numerous benefits at the door and throughout the enterprise. With the advent of new anti-spoofing capabilities, and its integration into secure trust platforms that protect privacy and support a variety of RFID credential technologies, biometric authentication is poised to deliver a much higher matching speed and better overall performance. This will dramatically improve an organization's security, while enhancing user convenience.Newer solutions are overcoming these security and convenience hurdles to help realise the full potential of biometrics Challenges For Biometric Authentication Biometrics fuses convenience and security while validating “true identity” versus identity that is associated to the possession of an ID card. As an example, biometrics prevents a user from taking someone else’s card and obtaining access to privileged resources. This adds the human element to traditional methods of authentication, strengthening security by combining something the user “is” with something the user “has” or “knows.” According to the firm ABI Research in its May 2018 study, Biometric Technologies and Applications, the total fingerprint sensor shipments for the entire consumer market is “estimated to reach 1.2 billion worldwide for 2018, thus ensuring its market dominance.”It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader Despite the benefits of fingerprint authentication in numerous consumer applications, there have been impediments to its broader adoption in the enterprise. While price has been one big roadblock, there have also historically been other reasons for its slower-than-expected growth. First, many technologies are still vulnerable to spoofs and hacking. It has been far too easy for fraudsters to create a fake fingerprint and present it to a reader. Equally troublesome, older products have not been able to move users through the doors as fast as a simple ID card and reader. In general, all fingerprint capture technologies are not equal among older products, and there can be significant differences in performance. Developing Technology Performance Newer solutions are overcoming these security and convenience hurdles to help realize the full potential of biometrics. Their development has focused on three key areas: How fingerprint images are captured – if the image can’t be properly captured, the rest of the process fails The implementation of liveness detection to enhance trust – even in the case when the image is properly captured, if it is fake the system cannot be trusted Optimizing performance through a combination of new technology and algorithms, while ensuring interoperability so the performance can be trusted. The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint Optimizing Capture The quality of the captured image is critical, across all types of fingerprints and environments. Many customers choose sensors that use multispectral imaging because it collects information from inside the finger to augment available surface fingerprint data.The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint The skin is illuminated at different depths to deliver much richer data about the surface and sub-surface features of the fingerprint. Additionally, the sensor collects data from the finger even if the skin has poor contact with the sensor, because of environmental conditions such as water or finger contamination. Multispectral sensors work for the broadest range of people with normal, wet, dry or damaged fingers, across the widest range of usage conditions – from lotions or grease to sunlight to wet or cold conditions. The sensors also resist damage from harsh cleaning products and contamination from dirt and sunlight. Liveness Detection Liveness detection is the ability to determine that the biometric data captured by the fingerprint reader is from a real living person, not a plastic fake or other artificial copy. An increasingly visible dimension of biometric performance in commercial applications, liveness detection is critical for preserving trust in the integrity of biometrics authentication. At the same time, it must not impede performance or result in excessive false user rejections.While liveness detection optimizes performance, it is also important to ensure that this performance can be trusted The most trusted multispectral imaging fingerprint sensors with liveness detection provide a real-time determination that the biometric captures are genuine and are being presented by the legitimate owner, rather than someone impersonating them. This capability leverages the image-capture approach of using different colors or spectrum of light to measure the surface and subsurface data within a fingerprint. In addition to this optical system, the biometrics sensor features several core components, including an embedded processor that analyses the raw imaging data to ensure that the sample being imaged is a genuine human finger rather than an artificial or spoof material. Advanced machine learning techniques are used so the solution can adapt and respond to new threats and spoofs as they are identified. While liveness detection and the underlying capture technology optimizes performance, it is also important to ensure that this performance can be trusted. This requires adequate testing to ensure interoperability with template matching algorithms. The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform Trusted Performance The top-performing solutions capture usable biometric data on the first attempt for every user. They also speed the process of determining that the biometric data is not a fake, and they quickly perform template matching to reject impostors and match legitimate users.The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places To trust this performance, though, the focus must be elsewhere: on interoperability with template-matching algorithms. Extensive interoperability testing must be performed by skilled and independent third parties like the National Institute of Standards and Technology (NIST) so that performance data can actually be trusted in all template-matching modes, and not simply a vendor claim. Template Matching Modes Template-on-card and card/mobile + finger modes using “1:1” template-matching profiles authenticates a person’s identity by comparing the person’s captured biometric template with one that is pre-stored in a database. Template-on-device mode for finger-only authentication using “1:N” matching compares the person’s captured biometric template against all stored biometric templates in the system). The card/mobile plus finger mode is one of the fastest-growing two-factor authentication use cases for securing access to both physical and digital places.Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database As an example of how to deliver trusted performance, HID Global uses the top-ranked NIST certified MINEX III minutia algorithm to ensure interoperability with industry-standard fingerprint template databases. This interoperability ensures that today’s systems, which are based on much more powerful hardware than in the past, will perform accurate 1:N identification of a full database in less than a second. Physical Access Control Integration The first requirement for incorporating biometrics into a physical access control solution is a secure trust platform designed to meet the concerns of accessibility and data protection in a connected environment. The platform should leverage credential technology that employs encryption and a software-based infrastructure to secure trusted identities on any form factor for physical access control, access to IT networks and beyond. Cryptography prevents any man-in-the-middle attacks while also protecting the biometric database. This system also must encompass remote management of all readers and users, spanning all onboarding as well as template loading and enrolment activities for supported authentication modes. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems Other important focus areas include configuration and administration, plus all logs, reports and monitoring.New system architectures and data models have been created to protect personal information and maintain user privacy It should be possible to manage biometric readers as groups or individually over the network, and tools should be available to allow system administrators to manage all configuration settings from time and data to language, security and synchronisation. The system should enable continuous live monitoring of authentication, alerts and system health, and provide a rich set of associated reporting tools. There are also backend implementation decisions to be made, including how a biometric authentication system will be seamlessly integrated into third-party systems. This is another major pain point of biometric technology. To simplify deployment, application programming interfaces (APIs) should be available for direct integration of the biometrics authentication solution with the access control infrastructure. Privacy Considerations Properly implemented, biometrics solutions with liveness detection also protect privacy – if you can’t use a fake finger, then even if you did obtain someone’s fingerprint data, it is meaningless. Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords.Strong and updatable liveness protection is critical if biometrics are to eliminate the need to use PINs or passwords Biometrics data must be handled like all sensitive and identifying information, and properly architected system designs will always consider and protect against both internal and external threats and attacks. New system architectures and data models have been created to protect personal information and maintain user privacy. Beyond the encryption of the data itself, there are now many good alternatives available for building highly secure and well protected systems, including the use of multi-factor and even multi-modal authentication to maintain security even if some identifying data is compromised. Today’s modern fingerprint authentication solutions are on a fast track to deliver a unique combination of ease of use, availability and convenience and higher security to physical access control systems. With their latest improvements in liveness detection, system architectures, performance and ability to be easily incorporated into access control solutions, they seamlessly combine security and convenience to make them a viable option when accessing a facility, networks and services. These solutions deliver a higher confidence of “who” is being admitted through the building’s front door, where it really matters.
Global and domestic threats have highlighted the need for tighter security across all verticals. One of the technologies that has redefined situational awareness and intrusion detection is thermal imaging. Once a technology exclusively manufactured for the military operations, thermal cameras today are deployed across hundreds of security applications and continue to see strong demand in existing and emerging commercial markets. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain Technology Overview And Early Adoption What distinguishes thermal cameras from optical sensors is their ability to produce images based on infrared energy, or heat, rather than light. By measuring the heat signatures of all objects and capturing minute differences between them, thermal cameras produce clear, sharp video despite unfavorable environmental conditions. With thermal technology, security personnel can see in complete darkness as well as in light fog, smoke and rain. Originally a military developed, commercially qualified technology, the first thermal cameras for military and aircraft use appeared in the 1950s. By the 1960s, the technology had been declassified and the first thermal camera for commercial use was introduced. However, it wasn’t until the late 1990s - when FLIR Systems introduced a camera with an uncooled thermal detector - when the technology began to see substantial adoption beyond government defense deployments. Installations At Critical Infrastructure Sites In the 2000s, industrial companies were some of the first adopters of thermal, using the technology for predictive maintenance to monitor overheating and machine malfunctions. In the years following the September 11 terrorist attacks in 2001, there was an increase in thermal camera installations across critical infrastructure sites. Stricter security requirements drove the deployment of thermal cameras for perimeter protection, especially in the nuclear power sector. Thermal cameras produce clear video in daylight, low light or no light scenarios and their sharp images result in higher performing analytics In 2010, the U.S. Nuclear Regulatory Committee released its 73.55 policy, which states nuclear facilities must “provide continuous surveillance, observation and monitoring” as a means to enhance threat detection and deterrence efforts onsite. Because thermal cameras produce clear video in daylight, low light or no light scenarios and because their sharp images result in higher performing analytics, thermal cameras quickly became the preferred option for nuclear facilities. Likewise, following the 2013 sniper attack on PG&E Corporation’s Metcalf transmission substation, the Federal Energy Regulation Commission introduced the Critical Infrastructure Protection Standard 014 (CIP-014). The policy requires utilities to identify threats to mission critical assets and implement a security system to mitigate those risks. This statute also led to more thermal installations in the utility sector as thermal cameras’ long-range capabilities are ideal for detection of approaching targets beyond the fence line. The demand from both industrial and critical infrastructure entities, as well as other factors, helped drive volume production and price reduction for thermal, making the technology more accessible to the commercial security marketplace. Commercial Applications In recent years, the increasing affordability of thermal cameras along with the introduction of new thermal offerings has opened the door to new commercial applications for the technology. In the past, thermal cameras were designed for applications with enormous perimeters, where the camera needed to detect a human from 700 meters away. Locations like car dealerships, marinas and construction supply facilities can be protected by precise target detection, thermal analytic cameras providing an early warning to security personnel Today, there are thermal cameras specifically designed for short- to mid-range applications. Developed for small to medium enterprises, these thermal cameras ensure property size and security funds are no longer barriers to adoption. Lumber yards, recreation fields and sports arenas are some of the commercial applications now able to implement thermal cameras for 24-hour monitoring and intrusion detection. Affordable thermal cameras with onboard analytics have become attractive options for commercial businesses Innovation And Advancements Innovation and advancements in the core technology have also spurred growth in thermal camera deployment, providing faster image processing, higher resolution, greater video analytic capabilities and better camera performance. In particular, affordable thermal cameras with onboard analytics have become attractive options for commercial businesses that need outdoor, wide area protection. Car dealerships, marinas and construction supply locations all store valuable merchandise and materials outside. Without protection, these assets are vulnerable to vandalism and theft. However, by providing precise target detection, thermal analytic cameras provide an early warning to security personnel so that they can intervene before a crime is committed. By helping to deter just one incident, the thermal solution delivers a clear ROI. New Market Opportunities Not only are there more thermal cameras in use today than ever before, but there are also more thermal sensors being integrated with other multi-sensor systems, driving the adoption of thermal in new markets. For large perimeter surveillance applications, thermal is repeatedly being integrated with radar and drones to expand situational awareness beyond the point of fixed cameras. Users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment In the commercial market, thermal imagers are combined with optical sensors, analytics and LED illuminators into one solution that integrates with central monitoring station platforms. By bringing these technologies together, users get immediate, accurate alerts of approaching targets and evidentiary class video for target assessment. The result is a lower number of false positives, reducing the total cost of ownership for the solution. These multi-sensor solutions also feature two-way audio capabilities, which enable remote security officers to act as “virtual guards” and speak to intruders in real-time to dissuade them from illegal activity. The introduction of solutions that integrate all these state-of-the-art technologies under one unit reduces the amount of capital and infrastructure needed for deployment. Consequently, more small businesses and alarm monitoring companies can implement advanced perimeter security technologies like thermal sensors, some for the very first time. Thermal cameras have gone from military defense devices to widespread commercial security cameras Multi-Sensor Thermal Solutions Multi-sensor solutions featuring thermal are quickly gaining traction and opening the door to new business opportunities for the security channel. One of the primary reasons for the strong market interest in these systems is they enable integrators to increase their recurring monthly revenue (RMR). With intense price competition and eroding margins on CCTV equipment, integrators have to rely on RMR to grow their businesses. Offering remote video monitoring services and virtual guarding technologies is one of the best ways to do so. Additionally, there is a clear demand for it. Central stations are continually looking for new technologies to offer their customers and businesses are interested in economical alternatives to physical guards. In conclusion, thermal cameras have gone from military defense devices to widespread commercial security cameras that are a substantial segment of the outdoor security protection market. From nuclear power plants to construction locations, thermal technology is being implemented to secure sites around the globe.
Security professionals working to provide the appropriate level of security and safety in schools need not just the right training but also the correct products. To provide the most robust product offerings for schools, ASSA ABLOY has partnered with School Guard Glass to develop complete attack-resistant door openings that comply with the 5-aa10 test standards recommended by the FBI’s Active Shooter Report. These attack-resistant openings are economically designed using hollow metal door and frame construction with accompanying ASSA ABLOY hardware. This ensures maximum security without sacrificing usability or aesthetics. Further, the solution ensures you never sacrifice fire and life safety as a result of implementing dangerous secondary locking devices. Withstands Intense Physical Attack The attack resistant openings are rigorously tested to ensure they can withstand an intense four-minute physical attack with the use of hand tools and after being shot 60 times with 7.62 NATO rounds. While the door or glass may not stop a bullet from penetrating the opening, the attack-resistant door assembly will remain intact so as to prevent an attacker from breaching the opening. "Protecting the students, faculty and staff in our communities across the country is a core commitment we at ASSA ABLOY share with all schools," said Ron Baer, Director of Business Development - K-12 at ASSA ABLOY Door Security Solutions. "Deploying an opening that can withstand and repel a physical assault is a simple, affordable solution that makes schools safer from the moment they are installed."
As an innovator in airport security, Oakland International Airport (OAK) announced that it has installed the Evolv Edge, a physical threat detection and prevention system powered by artificial intelligence, to streamline its employee screening program. This installation enhances OAK’s security posture by protecting against metallic and non-metallic threats while simultaneously improving operational efficiency. Physical Threat Detection System OAK is committed to applying advanced, innovative solutions to complex security operations OAK is committed to applying advanced, innovative solutions to complex security operations. The TSA acknowledged this commitment by selecting OAK as a TSA Innovation Site, a prestigious distinction that promotes improved efficiency and allows the airport to try technologies to benefit its growing passenger and employee base. As the second busiest airport in northern California, passenger travel at OAK is on pace to surpass the 13.2 million travelers that passed through the airport last year. To accommodate this growth, more and more employees are being hired to work at OAK. Therefore, OAK began researching innovative solutions related to employee inspection methods and equipment. Evolv Edge provides OAK with the ability to screen employees for metallic and non-metallic threats with a fast, non-invasive process. Designed with built-in wheels for portability, OAK can easily move the system throughout the airport allowing maximum efficiency for its employee inspection program. Non-Invasive Employee Screening With Edge, organizations, such as OAK, can adapt a risk-based security approach while balancing security with positive experience With this installation, OAK continues to be at the forefront of security through its use of modern technologies to combat today’s evolving threat landscape. By replacing traditional physical screenings with Evolv Edge’s precision, mobility and multi-threat detection capabilities, OAK can control access and respond to different threat scenarios quickly and efficiently. With Edge, organizations, such as OAK, can adapt a risk-based security approach while balancing security with positive experience. “With today’s threat landscape, the security perimeter has expanded beyond traditional checkpoints,” said Mike Ellenbogen, CEO of Evolv Technology and a 20-year veteran in aviation security. “Evolv Edge’s flexibility and portability provides Oakland International Airport with an added layer of security when it comes to employee screening. Oakland International Airport is always at the forefront of innovation, and we will continue working closely with their team to ensure success and safety.”
Derwent London, a FTSE 250 Index British-based property development and investment firm with a property portfolio worth £4.9 billion, acquired the White Chapel Building in central London in December 2015. The firm is renowned for using design-led approaches to create inspiring office space and began a two-phase project to regenerate the eight-storey commercial building. The White Chapel Building Derwent London’s complete refurbishment of the building meant they required a new security system Situated on an acre of land opposite Aldgate East Tube station, the White Chapel Building is valued between £100million and £200million and is home to various well-known brands including international mobile call company, Lebara, and global architecture and design firm, Perkins+Will. The lower floors, which are still being completed, are due to become home to a major new photography museum, Fotografiska. Derwent London’s complete refurbishment of the building meant they required a new security system that delivered solutions for all their own and potential tenants’ needs. These included: Intelligent IP-based access control system. Tenant access to assigned floor/s and approved areas only. Efficient system to manage visitors. Ability to restrict unapproved visitors to lobby area. Installation of 35 CCTV cameras with remote monitoring facilities. Panic button and lock-down facilities in case of emergency. Latest Industry Standards Antron Security is an installer of bespoke security solutions and provides security installations for past 28 years Antron Security project managed the design and installation of the access control and security system for the White Chapel Building and acted as the ‘go to’ contact for client, Derwent London. Antron Security is an installer of bespoke security solutions and has been providing security installations to organizations for the past 28 years. Taking care of the supply, design, installation and maintenance of security systems, Antron Security is NSI approved - meaning all staff and systems installed need to comply with the latest industry standards and are regularly inspected. Inner Range provided the core access control and intruder detection system that enabled Antron Security and Derwent London to build the bespoke solutions they needed. Inner Range is a pioneer of integrated access control and intruder detection systems. It’s been a world leader in the design and manufacture of intelligent security solutions since it was established in 1988. More than 130,000 Inner Range systems have been installed in over 30 countries. Inner Range’s award winning integrated security systems offer smart building management at local, national and global levels. “The flexibility of the Integriti system makes it future-proof as we can continue to meet the ever-changing requirements of the landlord and tenants via Inner Range’s ability to integrate with third party systems and devices such as lifts, intercoms, lighting and building management devices.” Jamie Crane, Commercial Director at Antron Security. Provides Core Security Integriti allows around 2,000 people troublefree access to their approved parts of the building Inner Range’s award-winning access control system, Integriti, provides the core security solution for the White Chapel Building. The intelligent system integrates with a host of thirdparty products to become a PSIM system, managing not only security and building automation but also people and business continuity processes. In this instance, Integriti allows around 2,000 people troublefree access to their approved parts of the building, as well as managing visitors efficiently and allowing security managers to monitor events easily and remotely. Key Integrations 35 CCTV cameras to allow security managers to view live and recorded events across the site. This includes remote monitoring, if security managers are off site. Access via four IDL Fastlane lobby turnstiles to ensure only permitted persons can access areas beyond the reception and lobby area. Lift integration – Tenants and visitors can only access approved floors using security credentials on their access card or smartphone. Central Security Team Smartphone access - Tenants and staff were set up to use their smartphones to open doors and other smart devices with the HID Mobile Access ‘Twist and Go’ mobile app. The Integriti system can read and check security credentials from users’ mobile phones to determine whether they are allowed access. BluePoint passes can be read by Integriti at entrance turnstiles and lifts to ensure visitors can access areas agreed by the ‘host’ A BluePoint visitor pass system was installed and integrated with Integriti to ensure a secure, reliable and trusted method of managing visitors. It allows ‘hosts’, such as tenants, to issue temporary passes for their visitors without needing to pass every request through a central security team. The passes can be issued on paper or via email. They can also be issued as Apple Wallet or Google Pass credentials. These appear on the visitor’s smartphone with a QR code without the visitor having to search their phone for them. Location and time-based information included in the pass ensure it appears when and where it is needed. The BluePoint passes can be read by Integriti at entrance turnstiles and lifts to ensure visitors can access areas agreed by the ‘host’. Integriti Features Easy to use Smartcard entry system integrated for access via doors, lifts and entrance turnstiles. Cards issued to 500 users initially. Panic button and lock down procedures for emergency situations. Gigabytes of on-board memory at controller hardware level to ensure the system maintains complete functionality even if offline. Seamless IP-based multi-controller system architecture options. Easy plug-and-play in UniBus, an innovative in-cabinet bus which allows the connection of expansion modules, communications modules, and door and reader modules to extend the range and scope of the Integriti system. Productive And Efficient Staff Trouble-free tenant access to their approved parts of the building. The improvements in access and security means reception staff are more productive and efficient. Security managers are able to monitor events easily and remotely. More accurate reporting on who is where in the building helps with health and safety as well as security activities. The Integriti system allows the landlord to manage operational costs more effectively while providing tenants with a more secure working environment.
Princeton Identity Inc., provider of the fastest, simplest and most secure biometric security systems on the market, announced that its customer, Brevillier Village, is reporting a huge increase in brand awareness resulting from publicity of its status as the nation’s first senior residential and healthcare facility to deploy iris recognition technology as part of a comprehensive physical security system. Located just outside Erie, PA, Brevillier Village has been the subject of local and international press coverage during the past year due to public fascination with its cutting-edge approach to security. The Princeton Identity IOM Access solution allows staff and residents with normal mental acuity to unlock exterior doors to exit the building by gazing into wall-mounted iris readers positioned near each exit, while restricting residents with dementia from opening the doors and leaving the building unsupervised. Two reader ‘heads’ are located at each monitored doorway – one positioned for standing residents and the other for those in wheelchairs Easy Registration Of Iris Credentials The system makes it possible for both non-dementia and dementia residents to live comfortably in the same building as part of a mixed population. Non-technical personnel at Brevillier Village can easily register new residents to the system and, if a resident begins to experience cognitive decline, his or her iris credentials can be deactivated, allowing them to remain living in the familiar surroundings of their own apartment rather than move to a fully locked facility. The Princeton Identity solution piggybacks onto the Assa-Abloy Securitron access control infrastructure that was already in place at Brevillier Village, with each iris scan logging as an ‘event’ within the access control system. Two reader ‘heads’ are located at each monitored doorway – one positioned for standing residents and the other for those in wheelchairs. These are connected to integrated control units that communicate over Ethernet cabling back to the server room. Brand awareness for Brevillier Village has skyrocketed and, in 2017, it was honored for the first time with the region’s prestigious Erie’s Choice Award for Best Retirement Facility Better Access Control System Than Keypad Dan Desrocher, the facility’s Director of Development, says that “If there’s any question about who left the building at a given time, we can look at who had their iris scanned and then check surveillance video to make sure that they are the only person who went through the door. From a security standpoint, this is far more information than was available using the keypad system we had in place, for which everyone shared the same code.” Brevillier administration places a high value on security, regarding it not only as an operational imperative but as a point-of-differentiation in the highly competitive senior living and healthcare market. The investment in technology is paying off. Brand awareness for Brevillier Village has skyrocketed and, in 2017, it was honored for the first time with the region’s prestigious Erie’s Choice Award for Best Retirement Facility, beating out a much larger facility that had won for the past ten years in a row. No Need To Remember Keypad Codes Mark Clifton, Princeton Identity’s CEO, says, “This project highlight some of the advantages in deploying iris recognition in healthcare and assisted-living facilities. There are no keypad codes to remember, it doesn’t require a free hand and it’s touchless, making it completely sanitary.” Brevillier’s Dan Desrocher adds, “We’re using the technology to keep people in, rather than keep people out, but we could definitely use the other way too. With an iris reader, residents would no longer have to fumble for a key fob to get into a building. The convenience factor is huge.”
Liberty University, a private university in Central Virginia, provides a comprehensive curriculum with a Christian background for more than 110,000 students enrolled across the University’s 17 colleges, schools, and online programs. The safety and security of students and faculty is a priority and has resulted in the implementation of state-of-the-art physical security measures. The LaHaye Fitness and Recreation Center located on Liberty University’s Lynchburg campus is a prime example. The large facility, which occupies approximately 165,000 square feet, houses five basketball courts, an indoor track, a weight room, group exercise classrooms, raquetball and volleyball courts, soccer fields, and a rock wall in addition to a lounge and cafe. More than just an athletics facility, the LaHaye Fitness and Recreation Center is a hub for social interaction that opens at 5am and closes at 11:30pm every day. The access control solution allows students to use one universal card throughout the campus, including LaHaye Fitness and Recreation Center ID Badge With Access Control Credentials Every student enrolled at Liberty University is provided with an identification badge with embedded access control credentials to gain access to various Liberty facilities. The access control solution, provided by RS2, allows students to use one universal card throughout the campus, including LaHaye Fitness and Recreation Center, which is outfitted with four lanes of Speedlane 300 optical turnstiles from Boon Edam to control and document the approximately 30,000 users who enter the facility every week. Previously, Liberty students would simply hand their badge to a staff worker, who would swipe it for verification, and then allow the student into the facility. The old process presented numerous challenges including the inability to adequately deny entry, expedite entry to the gym during busy hours and more. The new array of Speedlane 300 turnstiles alleviates all of those issues and more by providing three dedicated lanes for entry and one lane for egress. Monitoring Recreation Center Visitors “We can lock the turnstile gates, disable them, hold them open, grant access along with numerous other operational options, to keep traffic flowing while providing security,” said Samuel Seaborn, Associate Director, Operations, at Liberty University. “The turnstiles integrate with Liberty’s access control system to monitor who is coming into the rec center and when, and helps ensure that only students and people with proper access are allowed into the facility.” With 30,000 average weekly users entering and exiting the facility, Liberty is already looking to expand the LaHaye Fitness and Recreation Center with satellite facilities located around the campus. To maintain the level of safety throughout their campus, protect the university from liability issues, and integrate with their current access control systems, Liberty hopes to outfit any new installations with Boon Edam turnstiles, which have been well received by students and staff. In today’s environment, we’re even more concerned with properly protecting our students, and Boon Edam turnstiles help us do that" Easy To Use Turnstiles “When they were installed, the students remarked on the futuristic design of the turnstiles,” continued Seaborn. “Everyone adapted to them quickly, because they’re so easy to use.” Liberty has also been happy with the service Boon Edam provides for maintenance and other issues. If there are any issues with the badge reader or if an internal component was malfunctioning, the integrator for Boon Edam products, Jamie Dalton at Mech-Elect, of Wake Forest, NC, has responded quickly. “The Boon Edam turnstiles are so simple to use, and they really help with traffic flow. In today’s environment, we’re even more concerned with properly protecting our students, and Boon Edam turnstiles help us do that,” concludes Seaborn. “When we expand our recreational facilities, as well as other facilities, we’re definitely looking to Boon Edam for our entrances and exits.”
Though it has been statistically proven that taking a plane is no riskier than taking a bus, people do have reasons to put extra caution on air travel safety, especially in a time replete with terrorist threats. A major line of defense must be the various sections of the airports, which, as a gateway to the outside world and transportation hub of the city, has always been on the top of the safety list of the government and all related authorities. Dahua’s Airport Solution is an intelligent security system to help ensure the safety of the airports. Elements Of An Effective Solution First of all, an effective solution requires a complicated collaboration of multiple (sub)systems such as monitoring system, alarm system, access control system, network transmission system and management platform. As is known to all, the more steps and players it takes, the higher likelihood for a mistake to occur. Secondly, airports include a variety of places such as terminal areas, parking lots, office areas, freight areas, front desk areas (including the square in front of the terminal building), the flight areas, hangars, the perimeter area and so on, each of which operate on vertical management system. Yet due to the diversity of places and the complexity of personnel & cargoes coming in and going out in huge flow, there are too many risky elements to control. Thirdly, it’s not only about accuracy but also about swiftness when it comes to airport security. Safety should bring efficiency and not the other way around. For example, in April 2017, a drone flew into Chengdu Airport, resulting in the runway closing down for 80 minutes, the loss of which was estimated as at least 10 million dollars, not to mention collateral damages in the broad sense. Dahua’s Airport Solution is a unified security system combining multifunctional HD surveillance cameras with deep-learning AI Unifying A Security System Designed to solve all the difficulties mentioned above, Dahua’s Airport Solution is a unified security system combining multifunctional HD surveillance cameras with deep-learning AI that can analyze the big data to get the target, be it a car, a face or a series of numbers. In terms of vehicle management: you can adopt all-in-one cameras to capture and recognize license plates of vehicles accessing the airport. This will trigger the alarm when detecting illegal, stolen, blacklisted, hit-and-run, crime-related and other suspects’ vehicles. Covering the whole route of a vehicle, from entrance highway, to parking lots and then to exit, the surveillance system can effectively assist security guards and police to keep a smooth service, and respond quickly when things go wrong, even if it’s just something from the car that was left behind due to carelessness. In terms of passenger management, the same full coverage of the security system also applies to this, from someone stepping off the car to one’s entering terminal building and checking-in area and all the way to the last step to the boarding gate. The HD surveillance cameras endowed with deep-learning AI have world-leading accuracy in face recognition and e-passport verification. Any suspect, should they show up in the airport area, will at once trigger the alarm. Guarding The Airport Perimeter Dahua’s Airport Solution also takes care of another crucial part of airport that is the perimeter area. One must resort to special equipment like thermal imaging cameras to keep the safety of the said area. An example of this is Dahua’s solution for one specific airport, which covers a perimeter of 30 km and boasts an annual throughput of 30,000,000 people and 8,000,00 tons of cargo. According to the thermal imaging calculation form below: Dahua chose to use a 100mm lens with a resolution of 640 x 512 and set the installation height at 5M, which detects 1.8m x 0.5m, showing people from within 3000m. The perimeter will be well covered for intruder detection purpose with 10 cameras. The intelligent analysis of IVS (intelligent video system) requires 10 x 10 pixels, under which condition, each thermal imaging camera can detect and analyze objects from within 400m. There is in total 12km of perimeter length in need of such cameras, so Dahua chose to place 30 there, totalling 40 thermal imaging cameras to solve the problem. Advantages Of Using Dahua Tech It should be noted that Dahua’s thermal imaging technology has the following advantages: PTZ function, long distance surveillance (which can detect a vehicle 8.8 km away), long distance zoom, binocular lens (optical and thermal imaging lens), and strong intelligence (which can detect intrusion). Compared to alternate perimeter protection equipment on the market today, such as vibration fiber sensor and IR beam sensor, thermal imaging camera has higher accuracy and less false alarm while directly providing video to verify. Dahua has established stable cooperation with world-renowned platforms like Genetec, Milestone, Avigilon, AXXON, ISS, infusing Dahua’s Airport Solution with more possibilities. Supported by strong R&D resources and good working relationships earned in multiple previous collaborations with partners, Dahua can ensure seamless integration whether it’s front-end IPC or back-end NVR, fulfilling different demands of clients and building a sound security system for the airport. In future, Dahua will keep investing in R&D of cutting-edge technologies into the realm of civil aviation video surveillance solutions. With a mission of “Safer Society, Smarter Living”, Dahua will continue to focus on “Innovation, Quality, and Service” to serve partners and customers around the world.
The Spearfish West Africa base is located in Nigeria and will serve both new and existing clients across the fast-growing regional security market. Spearfish West Africa opened in Abuja, Nigeria earlier this year as a wholly-owned subsidiary of UK parent Spearfish Security. The new facility will provide localised consultancy and support to clients, managing risks and threats to personnel and facilities. The company specialises in supporting those facing security challenges in countries such as: Benin, Burkina Faso, Cape Verde, Gambia, Ghana, Guinea, Ivory Coast, Liberia, Mali, Mauritania, Niger, Nigeria, Saint Helena, Senegal, Sierra Leone, São Tomé and Príncipe and Togo. Spearfish's corporate client base includes companies in the finance, hospitality and manufacturing sectors Delivering Security And Risk Managers Dan Hooton, managing director of Spearfish Security, said: "We are excited to open this office having worked extensively in the region for the past six years, delivering full time Security & Risk Managers to organizations operating in Nigeria. Having a permanent presence in West Africa reinforces our commitment to clients in this part of the world. It also ensures we can meet the needs of smaller organizations who may require support on an ‘as need’ basis, as well as larger clients looking to benefit from shared services.” Spearfish works closely with organizations in the Corporate and International Development sectors. Its corporate client base includes companies in the finance, hospitality and manufacturing sectors, while its experience in the development sector covers health, energy, agriculture, climate change and women’s empowerment. With Nigeria in the midst of an economic downturn, tied to the fall in crude oil prices, the country's security situation has deteriorated in recent years" Designing Security Strategies Spearfish's vast security and commercial experience enables it to deliver practical strategy and execution to organizations on a retained or per-project basis. Clients often engage the company to provide hands-on guidance for accommodation or trip management for employees; or to craft security strategies for offices or transportation programs. “With Nigeria in the midst of an economic downturn, tied to the fall in crude oil prices, the country's security situation has deteriorated in recent years,” continued Hooton. “As the Nigerian military and its international partners continue to disrupt Boko Haram in the country's northeast, other jihadist groups, such as al-Qaeda and Islamic State, are active across the Sahel, particularly in Mali, taking advantage of poor governance. This threat has also spread to nearby Niger and Burkina Faso, spurring the G5 counterterrorism partnership into action in 2018.” Growth In Foreign Aid Across West Africa The risk of kidnap remains high throughout West Africa, largely from militant groups, but also from criminals seeking ransom, as in Nigeria's Delta region. At the same time, West Africa has also seen a rapid influx of foreign aid with growing numbers of charities, companies, NGOs and government agencies deploying in the region. Spearfish West Africa will be well-placed to serve this changing marketplace and offer clients peace-of-mind, enabling them to focus fully on their own operations.