Private sector security
Interphone has teamed up with Dahua Technology, a global video surveillance specialist, to help private and public sector organizations create a safer in-building environment and experience as COVID-19 restrictions are lifted. As an accredited Dahua Integrator Partner, Interphone will have access to the latest innovations in thermal access control, temperature monitoring, people counting and flow control, which will be used to develop epidemic safety protection solutions all types of premises....
Cybersecurity expert CrowdStrike has issued a stark warning to British businesses, telling them to crack down on lax remote working policies now or risk catastrophic exposure at the hands of adversaries after lockdown is over. Its latest research, in cooperation with YouGov, has found that over half (52%) of people in the UK working from home do so on their own personal devices, creating potential backdoors into corporate systems for adversaries. CrowdStrike has also seen a 100X increase in COV...
With the MOBOTIX CLOUD, MOBOTIX launches a new cyber-secure cloud video management system that is available via a flexible software subscription. The MOBOTIX VSaaS offering (Video Surveillance as a Service) enables complete video management of local cameras via App. The data is stored in stable cyber secure cloud data centers in regional proximity to the cloud users. "The market launch of the MOBOTIX CLOUD is another important step for us as a complete solution provider for security-relevant vi...
SecurityTrax, an Alarm.com company, has launched an all-new, customizable cloud-based platform that unites the business operations of security and automation providers, including customer relationship management (CRM) and more. The completely redesigned interface streamlines workflows, and provides a single, intuitive and user-friendly experience on any device or web browser. Enhanced APIs let businesses customize the platform to fit their specific operational needs and processes...
Axis Security, the private application access company, unveils the Axis Security Partner Program (ASPP) for VARs, systems integrators, MSSPs, OEM partners and distributors. The program enables Axis channel partners to expand their security offerings to include a cloud-native security and analytics platform that offers organizations simple and secure control of private application access built on a zero-trust model. Securing private applications Axis also signed its first value added reseller,...
Malwarebytes, a globally-renowned advanced endpoint protection and remediation solutions provider, has announced the launch of Malwarebytes Privacy, a next-generation virtual private network (VPN) to protect users’ privacy online. The VPN is the first offering in an emerging suite of privacy products from Malwarebytes, built on a foundation that empowers users with faster speeds and simplified user experiences. Malwarebytes Privacy VPN Featuring a highly-efficient VPN protocol, Malwareb...
Guidepost Solutions, a global renowned company in compliance, investigations and security consulting, has announced the establishment of its National Security Practice and the promotion of former Senior FBI National Security Official, Stephanie Douglas to President of the division. The group will assist companies and law firms in managing and meeting the challenges of complying with the ever-growing and complex array of government regulation in key areas including the Committee on Foreign Investment in the United States (CFIUS), sanctions and export controls, cyber security and more. Douglas will split her time between the San Francisco and Washington, DC offices. Cyber security, sanctions and export controls “Given her distinguished career in the public and private sectors, Stephanie is uniquely situated to assist those operating in the global business landscape,” said Julie Myers Wood, CEO, Guidepost Solutions, adding “Under her leadership, our National Security team will provide expert guidance and support to clients in mission-critical areas of their businesses as they navigate the complexities of building a compliant organization.” Prior to joining Guidepost Solutions, Douglas served as the FBI’s executive assistant director for the National Security Branch, overseeing its global counterterrorism, counterintelligence and intelligence operations. She also served as the FBI’s Chief Intelligence Officer. “The global nature of today’s business can often intersect with national security issues. We hope to work with businesses to better understand and mitigate those areas of concern, both for the client and for the government,” Stephanie Douglas said. US government security officials Douglas is joined by a veteran group of professionals with experience inside key agencies of the United States government, including the White House, Department of Justice, Department of the Treasury, Department of Commerce, Department of Homeland Security, FBI, Homeland Security Investigations and United States Attorneys’ offices around the country. Several still maintain high-level security clearances within the federal government. Douglas further stated, “We are continuing to add talent to our highly qualified team. Kenneth Mendelson joined Guidepost Solutions earlier this year. He has worked for more than 25 years at the intersection of law, information technology and public policy. He specializes in compliance matters related to CFIUS and Team Telecom. And, last month Christopher Kim joined us with over 23 years of investigative and legal experience. Prior to joining Guidepost Solutions, his practice was focused on international financial institutions such as the World Bank Group sanctions matters, internal corporate investigations and monitorships involving the U.S. government.”
Recently, measures are applied in the Netherlands to stop the spread of Coronavirus (Covid-19). Nedap is following the guidance issued by the Dutch government. People’s health is their first priority. All measures were extended since 31st March 2020. They apply until the 28th of April 2020 (inclusive) or if otherwise announced (updates will be communicated at the company website). COVID-19 prevention measures They maintain the measures they have already taken: Employees are working remote as much as possible; people at site will work in shifts; No external visitors in Nedap offices unless agreed with management; No visits of Nedap employees to external events; Highly restricted travel to customers and suppliers. In the meantime, Nedap will continue to support their customers as usual and keep on working closely with the suppliers.
Quantum Corporation today announced new product lines and capabilities which significantly expand its video surveillance and physical security product portfolio. The expanded portfolio includes: A new line of network video recording servers A new line of servers for building management systems and GPU-based video analytics New capabilities for the VS-HCI Series, which the company launched in 2019 to provide hyperconverged infrastructure (HCI) for surveillance recording, video management, and building operations. These expanded product offerings add to Quantum’s existing solutions for shared archive storage for surveillance, based on its StorNext® file system and the recently announced acquisition of the ActiveScale™ object storage solutions. The result is one of the broadest security infrastructure solution portfolios available from any single vendor. With new NVR servers, building management and video analytics QuantumCorp offers the broadest security infrastructure portfolio available. New Network Video Recording Server Line These expanded product offerings add to Quantum’s existing solutions for shared archive storage for surveillanceQuantum’s new line of Network Video Recording (NVR) servers complement the company’s VS-HCI Series and are offered in both mini-tower and rack-mounted form factors to provide customers with a range of affordable, reliable, and high-performance options for surveillance recording and video management. Quantum’s VST mini-tower NVRs are designed to support the surveillance of retail stores, gas stations, small buildings and campuses, and other small implementations, while Quantum’s VS4160 NVR is one of the most dense and highest capacity NVRs available for environments with large retention requirements. New Analytics and Application Servers To support the extreme graphics processing and parallel workload demands of video analytics, Quantum has introduced the VS2108-A analytics server. The VS2108-A can be configured with up to six GPUs in a compact 2U chassis and will accelerate results with leading video analytics software platforms. For access control and building management applications that require a highly available architecture, Quantum is introducing a new highly available application server, the VS1110-A. Quantum’s new VS1110-A Enterprise application server utilizes the same virtual machine (VM) failover capability found in Quantum’s VS-HCI series. Like the VS-HCI series, the VS1110-A server can be monitored remotely via a secure web-based portal, enabling facilities managers, integrators and Quantum support to proactively monitor this system anytime, anywhere. Monitor VS-HCI Series Health Remotely via Secure Web-Based Portal To support the extreme graphics processing and parallel workload demands of video analytics, Quantum has introduced the VS2108-A analytics serverQuantum has enhanced the capabilities of the VS-HCI series with secure, remote monitoring via a web-based portal. The Quantum VS-HCI series provides hyperconverged infrastructure for surveillance recording, video management, and building operations. The highly available architecture scales out as video camera counts increase and makes it easy to manage operations by running multiple physical security workloads on a single platform. Quantum StorNext and ActiveScale Storage for Large Surveillance Archives On March 16, 2020, Quantum announced that it had completed the acquisition of the ActiveScale object storage business from Western Digital. Object storage can be used as a tier for multi-petabyte surveillance infrastructure. Video is typically captured and recorded on higher-performance servers, then archived on object storage-based systems. The combination of Quantum’s StorNext file system and ActiveScale object storage can be a valuable solution for shared archive storage in many surveillance environments. Supporting Quotes “The most important message from Quantum to all of our customers and partners during this unprecedented time is that our top priority is the health and safety of our society, our employees, our communities and all of you. Our next priority is to ensure business continuity and site security,” said Jamie Lerner, President and CEO, Quantum. “Video surveillance plays a vital role in securing infrastructure and critical assets, and in protecting citizens. We’ve applied our years of expertise to build a comprehensive portfolio for surveillance, and we are responding quickly to the needs of our customers.” “Kepler Networks customers are on the front line of change in the surveillance industry, and as video surveillance technology has evolved it has placed unprecedented strain on storage,” said Gavin Bortles, President, Kepler Networks. “Customers who adopt intelligent, scalable storage as the foundation of their new surveillance and security system leave more budget for cameras, analytics, and other tools dedicated to protecting people and property.
Genetec Inc., a technology provider of unified security, public safety, operations, and business intelligence solutions, announced its plans for Security and Policing 2020, taking place at Farnborough International Exhibition and Conference Center, from 3-5 March 2020 (Stand B19). Genetec will be displaying its suite of solutions that make up a strategic decision support center (SDSC), with experts on hand to give attendees live demonstrations and explain how the technology can help reduce or respond to crime. Genetec Citigraf The Genetec SDSC offering is primarily comprised of the decision support system Genetec Citigraf, the Genetec Clearance digital evidence management platform and Community Connect, a framework that facilitates public-private collaboration. The insights provided ensures teams are more prepared to tackle the challenges within their specific areas of operations Genetec will also be participating in ‘Knife Crime - A 21st Century Approach’, a live immersive experience being organized by the Joint Security and Resilience Center (JSaRC). Here, Genetec will show the value of an intelligence and investigative analysis system in linking related cases and tackling knife crime. Each one of these solutions is further enhanced by Community Connect, a framework that facilitates better collaboration between public and private bodies. When combined they make up the key components of a crime-fighting nerve center that delivers increased operational awareness to law enforcement and security teams. Reducing crime The insights provided by the technology ensures teams are more prepared to tackle the challenges within their specific areas of operations, to create safer communities and reduce crime. “Law enforcement and security teams often find themselves inundated with raw data, from which they are unable to derive actionable information,” said David Petrook, Product Group Director at Genetec. “The Genetec SDSC suite is engineered to enhance how this data is processed, to increase interdepartmental collaboration and preparedness.” The Chicago Police Department was able to reduce shootings by 70% and homicides by 43%" “This gives teams end to end information, from the moment an incident is reported to dispatch, to crime analyst and finally, to front line responders. But most importantly, it works. By deploying these strategies, the Chicago Police Department was able to reduce shootings by 70% and homicides by 43%.” Digital evidence management system Genetec Citigraf is a decision support system that unifies public safety operations across city departments, disseminates timely information, and provides greater situational awareness. Genetec Clearance is a digital evidence management system that facilitates collaboration between agencies, corporate security departments, and the public, all to help close cases faster. Community Connect builds ties between the public and private sector, encouraging community-driven solutions that enhance public safety and liveability. Genetec will be exhibiting on Stand B19.
Pulse Secure, the provider of software-defined Secure Access solutions, announced a new research report that highlights improving hybrid IT, BYOD, access management and IOT security as the top priorities for UK healthcare organizations. 92% report ‘Unauthorized Data Access and Data Leakage’ has led to impactful incidents within the last 12 months. The Q1-2020 State of UK Healthcare Secure Access report by Pulse Secure surveyed more than 60 senior information security and decision-making executives from healthcare organizations in the UK with 1,000 to over 10,000 employees. Improving access control consistency The research examined overall IT spending strategy, incidents, control gaps, operational capacity and technology tools. The report confirms that UK healthcare industry is investing heavily in a hybrid IT strategy with an overwhelming majority expecting to increase investments by greater than 10% with usage predominately going into private cloud (94%) followed by datacentres (88%). One in four respondents said their organization faced impact from malware, privileged user and IOT security incidents The continued uplift in cloud adoption and reinvestment in data center resources has also introduced data breach concerns, as 60% plan to improve access control consistency across hybrid IT environments. While a wide variety of potential secure access exposures were presented to respondents, unauthorized data access, mobile and web exposures, and vulnerable and unsanctioned endpoint device issues plagued UK health institutions. IOT security incidents Correspondingly, one in four respondents said their organization faced impact from malware, privileged user and IOT security incidents. The majority of midsized UK-based service providers cited significant impact with unauthorized application/resource access and use of unauthorized devices, whereas large institutions (those with 5,000 to 10,000 employees) claimed application unavailability/outage as having the highest impact. UK Healthcare providers are embracing mobile computing to improve medical responsiveness The report states, “Despite knowledge of their high impact incidents and access control gaps, a substantial number of respondents are less than confident, notwithstanding large investments in tools and security initiatives. Healthcare organizations’ ability to ‘orchestrate dynamic access authentication and protection’ is also in question, with 68% of respondents expressing little confidence.” UK Healthcare providers are embracing mobile computing and taking advantage of network- and web-connected devices to improve medical responsiveness, delivery and outcomes for their patients. BYOD access enforcement However, a majority (82%) of survey respondents cited mobile computing exposures and weak device access compliance among their top control gaps. Equally concerning is that 70% had nominal confidence in BYOD access enforcement, and 64% expressed similar confidence with IoT devices. As a result, streamlining BYOD and web-based mobile access and enhancing IoT security were expressed among the top priorities for security professionals in healthcare. The vast majority (96%) of respondents expressed a positive outlook towards tool set consolidation The research also illustrated a complex picture of healthcare organizations trying to plug holes and being reactive to threats or changes in IT infrastructures. While the industry seeks to optimize investments, the survey found that UK healthcare IT security practitioners’ use, on average, at least four related tools within each category of secure access. Standardizing integrated platforms The vast majority (96%) of respondents expressed a positive outlook towards tool set consolidation. To this end, over 40% place one or more secure access functions in the hands of managed service providers and plan to increase outsourcing by as much as 7% over the next 18 months. The report states, “With the evolving nature of the sector this is no big surprise with mergers, legacy technologies, modernization and shifts in working patterns and service provision all thrown into a melting pot of change. Healthcare organizations need to think about tool consolidation and standardizing on integrated platforms.” Software Defined Perimeter (SDP) technologies SDP enables trusted access directly between the user and their device to the application and resource Looking at longer term strategy, the report indicates healthy investment to improve access security where the majority (56%) of UK healthcare respondents cited secure access expenditures to rise by 5% to 15% and a third expect spend to increase up to 25%. Of particular note was the interest in Software Defined Perimeter (SDP) technologies, also depicted as Zero Trust Network Access. SDP enables trusted access directly between the user and their device to the application and resource. Like perimeter-based VPN technology, SDP invokes user, device and security state authentication controls before and during an authorized, protected connection. 62% of healthcare security decision makers anticipate an SDP project or pilot within the next 18 months. Security infrastructure consolidation Commenting on the report, Scott Gordon, chief marketing officer for Pulse Secure said, “The findings indicated that while workforce mobility, cloud and IoT security still threaten data privacy and service availability obligations for UK healthcare, these institutions appear to be making appropriate upcoming priorities and investments to reduce secure access risks.” “The report data suggests that hybrid IT adoption and security infrastructure consolidation in the UK healthcare segment is likely over the next few years as new approaches such as Zero Trust Network Access can serve to protect patient care advancements.”
Counter Terror Expo (CTX), UK’s networking event for security professionals from industry, infrastructure, government and policing, has released its inaugural Counter Terror Industry Survey report, summarizing the conclusions of the counter-terror survey conducted by the CTX team in November 2019. The report compiles findings obtained from public and private sector security professionals on the current state of counter-terrorism in the UK. Issues facing the counter-terror industry Survey respondents from police and law enforcement, ambulance, fire and rescue, military and industry were asked questions across a range of issues facing the counter-terror industry. Issues addressed include how successful respondents feel that UK stakeholders are in countering terrorist threats; levels of concern regarding the threat from state and non-state actors; awareness of government counter-terror strategies and their effectiveness; and preparedness levels for attacks among the UK government, business and industry. In the UK we face an evolving terror threat which is changing beyond expectations" The report’s findings provide insight into the views of security professionals, and offer an opportunity for all stakeholders to further understand the current perceptions of counter-terrorism issues, and where partnerships need to focus their efforts. Evolving terror threat “In the UK we face an evolving terror threat which, as the tragic events of 2017 illustrated, is changing beyond expectations,” Scott Fyfe Wilson, Director Crisis Management Solutions (Formerly, National Co-ordinator Protect and Prepare, National Counter Terrorism Policing), commented in the report foreword. “It involves more individuals, including the vulnerable and volatile, in less coherent, more atomized structures connected across the world.” “This larger scale operation utilizes ever more simplistic tactics to attack increasingly soft targets. Although the UK threat level has recently been lowered from “Severe” to “Substantial”, the risk of a terrorist attack remains high. We can only keep our communities safe by working together. A change of mindset is underway: protecting our communities is not a task only for the police, it’s one for all to embrace, businesses, security professionals and the general public.”
Timely and important issues in the security marketplace dominated our list of most-clicked-upon articles in 2018. Looking back at the top articles of the year provides a decent summary of how our industry evolved this year, and even offers clues to where we’re headed in 2019. In the world of digital publishing, it’s easy to know what content resonates with the security market: Our readers tell us with their actions; i.e., where they click. Let’s look back at the Top 10 articles we posted in 2018 that generated the most page views. They are listed in order here with a brief excerpt. 1. U.S. President Signs Government Ban On Hikvision and Dahua Video Surveillance The ban on government uses, which takes effect ‘not later than one year after … enactment,’ applies not only to future uses of Dahua and Hikvision equipment but also to legacy installations. The bill calls for an assessment of the current presence of the banned technologies and development of a ‘phase-out plan’ to eliminate the equipment from government uses. 2. Motorola Makes A Splash With Avigilon Video Surveillance Acquisition Early clues point to Motorola positioning Avigilon as part of a broader solution, especially in the municipal/safe cities market. The company says the acquisition will enable more safe cities projects and more public-private partnerships between local communities and law enforcement. Motorola sees Avigilon as ‘a natural extension to global public safety and U.S. federal and military’ applications, according to the company. 3. Impact Of Data-Driven Smart Cities On Video Surveillance One of the major areas of technology that is going to shift how we interact with our cities is the Internet of Things (IoT). One benefit will be the ability to use video surveillance to analyze data on large crowds at sporting events The IoT already accounts for swaths of technology and devices operating in the background. However, we’re increasingly seeing these come to the forefront of everyday life, as data becomes increasingly critical. Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency 4. CES 2018: Security Technologies Influencing The Consumer Electronics Market Familiar players at security shows also have a presence at the Consumer Electronics Show (CES). For example, Bosch is highlighting its “Simply. Connected” portfolio of smart city technology to transform security as well as urban mobility, air quality and energy efficiency. Many consumer technologies on display offer a glimpse of what’s ahead for security. Are Panasonic’s 4K OLEDs with HDR10+ format or Sony’s A8F OLED televisions a preview of the future of security control room monitors? 5. SIA Predicts Top Physical Security Trends For 2018 Traditional security providers will focus more on deepening the customer experience and enhancing convenience and service. The rise of IoT also places an emphasis on cybersecurity, and security dealers will react by seeking manufacturers and technology partners with cyber-hardened network-connected devices. 6. High-Speed Visitor Screening Systems Will Improve Soft Target Security The system is more expensive than a metal detector, but about a third the cost of familiar airport body scanners. Labor reduction (because of faster throughput) can help offset the system costs, but “it’s difficult to quantify the improvement in the visitor experience,” says Mike Ellenbogen, CEO of Evolv Technology. 7. How To Prevent ATM Jackpotting With Physical And Cyber Security A new crime wave is hitting automated teller machines (ATMs); the common banking appliances are being rigged to spit out their entire cash supplies into a criminal’s waiting hands. The crime is called “ATM jackpotting” and has targeted banking machines located in grocery shops, pharmacies and other locations in Taiwan, Europe, Latin America and, in the last several months, the United States. Rough estimates place the total amount of global losses at up to $60 million. The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest 8. Why We Need To Look Beyond Technology For Smart City Security Solutions Although technology is necessary for an urban area to transition in to a safe and smart city, technology alone isn’t sufficient. Truly smart cities are savvy cities and that includes how they employ software, sensing, communications and other technologies to meet their needs. 9. How New Video Surveillance Technology Boosts Airport Security and Operations Employing airport security solutions is a complex situation with myriad government, state and local rules and regulations that need to be addressed while ensuring the comfort needs of passengers. Airport security is further challenged with improving and increasing operational efficiencies, as budgets are always an issue. As an example, security and operational data must be easily shared with other airport departments and local agencies such as police, customs, emergency response and airport operations to drive a more proactive approach across the organization. 10. The Evolution Of Facial Recognition From Body-Cams To Video Surveillance The safety and security world bring a complex problem to solve how to pick out a face in a moving and changing environment and compare it to several faces of interest. “One-to-many” facial recognition is a much harder problem to solve.
There’s only so much a corporation can do to counteract the threat of a major incident. You can ask everyone to be vigilant and to report anything suspicious, but you cannot stop someone intent on deliberately starting a fire, threatening a work colleague with a knife or something much worse. And of course, most businesses recognize that even routine events – such as burst pipes, IT system failures, extreme weather event or power outages – can have significant consequences unless they are quickly brought under control. Training Security Officers Governments and organizations across the world are increasingly encouraging businesses to re-assess risks and to plan for and conduct drills for major emergencies. This is driving different agencies and companies to invest in new skills, resources and systems, and encouraging businesses to routinely re-evaluate their emergency response strategies. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents For example: UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents, as part of the UK government’s Action Counter Terrorism program. And organizations including the Association of University Chief Security Officers (AUCSO) and Higher Education Business Continuity Network (HEBCoN) are developing customized training for their members to improve their own response and business continuity plans. Mass Notifications Systems Whether an organization is facing a terrorist attack or a severe weather event, follow up reports consistently identify that the same types of challenges are common to all crisis situations, with similar errors often occurring again and again. Typically, these are centered on three key areas: poor communications, fractured command and control structures, and delayed deployment of resources. Communications skills and technologies clearly play a pivotal role in how effective an organization is in responding to major incidents, particularly when it comes to assessing the situation and its implications, moving people towards safety and providing updates as an incident unfolds. However, when an organization is considering its technology options, emergency response and mass notification systems (MNS) are often touted as the ideal platform to deliver all the required critical communications and ongoing updates. UK police forces are increasingly training security officers in the public and private sectors on how best to react to potential terrorist incidents Emergency Notification System All the incident reporting, command and control, and communications functions have been brought together on a single platform But, if an organization does not know exactly where all its staff or students are, and it cannot see the location and availability of its first responders and other emergency coordinators relative to them and the incident, then how useful is it to send a top-down alert to everyone? And what about fast moving or multi-centre incidents, where previously agreed evacuation procedures, recommended actions or mustering points may need to change if an incident takes an unexpected turn? Many organizations may have been lulled into believing that an emergency notification system will allow them to confidently handle all the communications aspects of virtually any crisis. In reality, too many businesses are still unaware that there are now much more sophisticated and proven technologies where all the incident reporting, command and control, and communications functions have been brought together on a single platform. Using Live Map Tracking The benefit of using these advanced and more integrated approaches – often categorized as mobile distributed command and control systems – is that they enable faster and better decision making in a crisis using real-time feedback and two-way dialogue with those closest to the emergency. And they avoid the risks of any potential delays, miscommunications or mistakes that can happen when an organization is under pressure to respond and often switching between multiple systems. Leading universities and multi-national corporations are already using new mobile/web-enabled platforms to improve their incident response These next generation emergency management platforms have been specifically designed to enable real-time mapping of an organization’s security assets and its users on a single screen and to fully integrate it with a highly targeted geo-fenced notification capability. The mass notification aspect of the system can then be used to advise specific groups on the best actions to take at their location as an incident develops. The use of live map tracking enables real time mapping of an organisation's security assets Segmented Messaging Many leading universities and multi-national corporations are already using these new mobile/web-enabled platforms to plan, manage and improve their incident response, leading to 50% faster reactions and more positive outcomes.During a crisis, users can receive push notifications so the security centre can immediately see their exact location and advise them accordingly The systems have been widely adopted within the higher-education sector, but they are equally applicable to any large company with multiple international sites or those situated in research or corporate campuses where the bulk of assets and people are based in one or more key locations. Typically, systems provide users with a smartphone app that they can use to call for immediate emergency or first aid support when at work, or to report something suspicious which could prevent an apparently minor incident from escalating into a full-scale emergency. During a crisis, users can receive push notifications, SMS and E-mails asking them to open the app if they are not already logged in, so the security center can immediately see their exact location and advise them accordingly. Supporting Dispersed Mustering Now that communications can be more nimble, responsive and flexible this can support the increasing numbers of planners are recognizing the advantages of dispersed mustering. This is a strategy that has been developed to reduce the risk of secondary attacks on unprotected people complying with instructions to evacuate from premises and gather in what are, effectively, exposed locations. It is now acknowledged that evacuees waiting outside for any length of time are more vulnerable to targeted attacks or to injury, from flying glass for example. With dispersed mustering – a strategy made more effective by these new mobile distributed command and control systems - a building’s occupants can be advised not to go outside, but to move to known safe internal locations. People in each specific area can then be kept regularly updated. Many corporations are now using new mobile/web-enabled platforms to improve their incident response Coordination Between Response Agencies The software platforms can be integrated with an organization’s fixed security infrastructure to take real-time sharing of information First responders are permanently logged in, so the emergency operations center can see their exact locations in real-time and can advise what actions to take in mustering people or in setting up and protecting security cordons. Bringing everything together on one platform, with real-time feedback and in a fully integrated system also removes what is often seen as the weakest communication link in managing any major incident: the need to rely on conventional two-way radio as the sole means of communication between the command and control center and its first responders and other team members on the ground. The software platforms can be integrated with an organization’s fixed security infrastructure to take real-time sharing of information to a new level for improved collaboration, coordination and communications between users, the incident management team and external agencies. Improving Emergency Response Strategies One of the most powerful features of some of these new systems is the ability to record and view all alerts, responses and the detailed conversations between first responders, emergency coordinators and other parties. This allows the systems to be used to simulate major incidents involving inputs from the emergency services and other key agencies and to ensure the organization’s crisis management plans have been fully tested against a range of possible incident scenarios.
Last week, the Schedule 84 Suppliers Research Panel participated in reviewing the 2018 contracting year with the GSA Schedule 84 leadership team. Our panel group consists of experienced contractors and consultants meeting for a monthly conference call. Schedule 84 is the GSA Schedules Contract for Total Solutions for Law Enforcement, Security, Facilities Management, Fire and Rescue. Our opinions are part of a research program to provide valuable feedback to the GSA Schedule 84 program and on to the GSA central office. The director of GSA Region 7 Schedules Program, the Schedule 84 Branch Chief and the Category Manager Subject Matter Expert who manages our suppliers' panel gave us their full attention as we discussed the successes of the program, hot topics, problems and the future. We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort and renewed enthusiasm Innovative Review Team We determined 2018 under the Schedule 84 team to be a year of innovative thoughts, cooperative effort, renewed enthusiasm and productive changes building upon the successes of 2017. There was high praise for the accessibility to the Schedule 84 staff. Their consistent quick response to questions and concerns, thinking outside the box and supporting the program by partnering with their contractors was much appreciated. There has been a renewed spirit of partnering to cooperatively bring the best to agency customers. It seems to be working as per the Center Director sales are growing for GSA Schedule 84. Advocating For The Security Industry In my experience, business development starts with the Administrator from Region 7 in Ft. Worth, TX. As the annual Schedule 84 Industry Day at the SSAC begins he is shaking every hand and passing out his cards looking folks right in the eye asking, “how can I help you?” They have the best practices and most organized paperwork. The SSAC director has chosen well in her staff and is hands-on in every endeavor to direct things along when challenges occur or to improve the program. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry It continues with the center’s CASE Manager encouraging the contractors at events, visiting agency customers and promoting the GSA Schedules Program by helping coordinate the partnering. The new 84 Branch Chief is knowledgeable, innovative, tireless and has been heavily involved in advocating for the security industry for adding new technology, meeting with industry associations, understanding the complexity and challenges of Homeland Security Presidential Directive 12 (HSPD12) and advocating for the purchasing Physical Access Control Systems (PACS) utilizing the appropriate standards and the GSA Program among other innovations. As far as the supplier panel, we gave our GSA Schedule 84 team and leaders high praise for 2018. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List Changes In The GSA Program Some changes this year in certain GSA programmes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) developed to assist with solution procurements. This new SIN was added to Schedules 03FAC, 56, 70, 71, 00Corp, 738X and 84. Under Schedule 84 it is SIN 84-500. GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex Essentially this SIN allows agencies procuring under the aforementioned GSA Schedules’ programmes to purchase and the contractor to add items and services not known prior to the task as a Contract Line Item Number (CLIN) not to exceed 33% of the order. For more information and FAQs on OLMs go to www.gsa.gov/olm. This is not to take the place of “Open Market” items for adding products only that are not listed on a company’s GSA Contract. Physical Access Control Products Previously, GSA Schedule 84 consolidated many Special Items Numbers (SINs) to make finding products and services less complex for the agencies. GSA also added new categories or SINs for clearly identifying Physical Access Control Products that appear on GSA’s Approved Product List according to the standards created under FIPS201. These products appear under SIN 246 35-7 after being tested and approved by GSA. To be qualified to install these products under the GSA Program at least one individual from the GSA Contractor company must complete the class and be CSEIP certified before applying for labor SIN 246 60-5. Additionally, the company must demonstrate certain qualifications and have past performance for this type of work. The Security Technology Alliance offers the training class and certification. Certified individuals and approved products are listed at www.idmanagement.gov. Companies listed with SIN 246-35 7 and SIN 246-60 5 may be found by searching at www.gsaelibrary.gsa.gov. Updates To Guidance For Procurement Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide Updates to guidance for procurement of PACS will continue to be posted to the GSA PACS Ordering Guide. The ordering guide posted at www.gsa.gov/firesecurity is a valuable support tool created to assist agencies with understanding the requirements of FIPS201 and procuring a PACS. The guide includes relevant regulations, FAQs, sample systems designs, sample statements of work, a list of key points of contract for additional help and questions. In partnership with GSA and guided by the GSA Ombudsman group, the Security Industry Association and the Security Technology Alliance members and their contractor companies participated in a GSA Reverse Industry PACS Training Day on September 17, 2018. We presented from an industry perspective important fact on PACS system requirements, procurement planning, providing information on resources and further educating with panel discussions, individual presentations and amusing skits to over 300 Government agency staff and acquisition specialists. You can find some of the unedited recording of the PACS Reverse Industry Day Training on YouTube. Some changes included the creation of a new category of products/services Special Item Number (SIN) for Order Level Materials (OLM) GSA Schedules Program A hot topic about the GSA program for 2018 was also an issue for the prior year. The GSA Schedules Program is a streamlined contracting vehicle incorporating specific Federal Acquisition Regulations for more efficiently purchasing commercial items. Companies may apply per a continuous open season for a 5-year contract with three 5-year options to renew. Contractors are vetted for past performance, corporate experience and financial capability. Products and services are considered for offering to Federal, State and Local customers (for Schedule 84) with pricing that is determined to be fair and reasonable through negotiations with GSA. To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor To make the determination for fair and reasonable pricing GSA carefully reviews the commercial practices of the contractor as well as the competition of identical or similar item pricing. The most vocal complaint of concern from the contractors was regarding the consideration of competitor contractors offering identical items with out-of-date pricing or holding a Letter of Supply not authorized by the manufacturer. GSA Pricing Tool Since the GSA utilizes a pricing tool to determine if the pricing offered is competitive, a rogue competitor can cause a pricing action to possibly be rejected due to out of date information even as the manufacturer offers an update of the product. This is an issue on all GSA Contracts that the supplier panel hopes will be reconsidered by GSA policymakers at the central office. Most of us believe the Letters of Supply should only be issued by the manufacturer or with documented specific permission of the manufacturer to a reseller. Manufacturers may want to have a better understanding of the Letter of Supply, how it is considered by GSA and more carefully choose their Government partners for experience and compliance. Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy Overcoming Challenges For The Security Community Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract Another challenge for the security community is regarding the lack of accessibility of participating dealers to GSA eBuy. GSA eBuy is an online Request for Quotation (RFQ) program that is for GSA Contract holders only. Agencies will post their requirements by Special Item Number for at a minimum 48 hours. Contractors may only see RFQs which are posted under the Special items Number(s) that were awarded to their GSA Contract. GSA Participating Dealers may take orders on behalf of a manufacturer if they are authorized under the manufacturer’s GSA Contract. They may also have an online PO Portal to receive orders. But they have no access to GSA eBuy to response to RFQs. Usually, under these arrangements, the manufacturers do not respond directly, so there is a problem using GSA eBuy for opportunities as their GSA Participating Dealers have no access to respond. GSA Schedule 84 Leadership In some instances, a contracting officer may allow an emailed quotation. However, with the use of the electronic ordering system, this has become a common problem we hope to bring to the attention of policymakers. Some changes to the programmes may make the presentation of documentation more effective going forward The GSA Schedule 84 leadership has been helpful to explain the challenges to the agencies to try and resolve such issues. So, what’s up for 2019? GSA modernization is coming. There will be improvements to their tools and more consolidations of SINs and more. There have been discussions of a revival of the GSA Expo. The Expo offered training for contracting staff both Government and private industry. Valuable Tools For Vendor Training Equally important is the networking, meetings and the exhibits of the contractors. Expos have been discontinued since 2012 but smaller events have been growing as well as online webinar training. Webinars are valuable tools for GSA and vendor training, but they do not take the place of being able to meet your customers face-to-face. GSA online eOffer and eMod program have made processing actions more efficient. Some changes to the programmes may make the presentation of documentation more effective going forward. The GSA online website for viewing the items on the GSA Contract and for purchasing items, GSA Advantage could definitely use an update as it has been basically the same for 20 years. Keep an eye on GSA Interact for the latest happenings with GSA.
The U.S. Department of Homeland Security (DHS) will be participating at ISC West in a big way. Representatives of the federal department will be taking part in more education sessions this year, and the DHS tech-scouting team will be on hand to view the latest technologies on display at the show. Exhibitors – and anyone else at the show – are invited to the “DHS Town Hall” on March 19 (Thursday) at 3:30 p.m. in meeting room Galileo 1001. The aim is for DHS to engage with the technology community and provide guidance as industry innovation moves forward. In the face of growing operational demands and complex threats, the need for homeland security technology solutions continues to rise. The Department of Homeland (DHS) is seeking new ideas and partners to safeguard public trust, save lives, reduce risks, and protect the flow of commerce and goods for the community. They will share information about the department’s problem sets, capability needs and business opportunities for accelerating technology development to ensure they are keeping pace with the speed of innovation and complex threats. Speaking at ISC West DHS seeks to challenge industry partners to develop technology to enhance security operations across multiple end user missions. The DHS Science and Technology Directorate (S&T) and Cybersecurity and Infrastructure Security Agency (CISA) will jointly speak and exhibit at ISC West. Attendees can meet DHS professionals working in cyber security, critical infrastructure, resilience, aviation security, border and port operations, and first responder capabilities. Attendees are invited to visit the DHS exhibit booth #33040 in the Drones and Robotics Zone. The DHS Town Hall on Thursday, titled “Enhancing Security and Doing Business at the Speed of Life,” will be a “call to action” for show participants to help secure the future. DHS seeks to become more agile and to pursue new pathways to do business in a fast-moving world. Through strategic partnerships, DHS is mobilizing the innovation community to safeguard the public trust. Security sessions DHS will also be participating in these sessions at ISC West, March 17-20 at the Sands Expo, Las Vegas, Nev: You Say It’s Going to Change the World? Tues., March 17, 9:45 a.m., Sands 302. Security relies on anticipating what comes next and staying a step ahead. How will 5G increase secure capabilities and reduce threats from bad actors? How will blockchain secure personal and financial identity and when will quantum computing render all encryption obsolete? How is DHS investing in counter-drones? How does AI change the security landscape? The New Federal Security Landscape – Are You Prepared? Wed., March 18, 1 p.m., Sands 302. The federal security landscape is evolving alongside the private sector. What are the new high-risk areas of concern and how are emerging threats (cyber, UAS) changing the way federal facilities are protected? How are these new risks balanced against traditional ones? How is the Interagency Security Committee (ISC) responding? DHS panelists will discuss. CISA Special Guest Speaker at SIA Interopfest. Wed., March 18, 4 p.m., Sands 701. Daryle Hernandez, Chief, Interagency Security Committee, DHS, Infrastructure Security Division, will provide insights to complement the technology interoperability demonstrations. Enhancing Security Through UAS Technology, A DHS Perspective. Thurs., March 19, 11:30 a.m., Venetian Ballroom. What is DHS doing today to prepare for a future of increased visualization and automation? New questions are emerging around capabilities and vulnerabilities. Emerging technologies like AR, Next Gen Sensors, and UAS, provide the Department of Homeland Security (DHS) with tools to become more responsive and adaptive to new threats.
The UK Government has been working to reduce the risks associated with illegal drone use since a high-profile incident at UK’s Gatwick Airport in December 2018, when a drone sighting triggered a three-day shutdown of the UK’s second busiest airport, disrupting the travel plans of 140,000 people and affecting 1,000 flights. To address growing security threats by drones, the UK Government has released its ‘Counter-Unmanned Aircraft Strategy’. ‘Counter-Unmanned Aircraft Strategy’ This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring" “This strategy sets out our approach to countering the threat the malicious or negligent use of drones can bring,” says Brandon Lewis, the U.K. Minister of State for Security. “It will provide the security the public and drone users require to continue to enjoy the benefits of leisure and commercial drone use and facilitate the growth of the drone industry.” “Given the challenge posed by rapid advances in drone technology and the potential threat, the strategy will provide overarching direction to our efforts,” says Lewis. The strategy focuses on ‘small drones’, those weighing less than 20 kg (44 pounds). Countering malicious use of aerial drones The UK Counter-Unmanned Aircraft Strategy centers on mitigating the highest-harm domestic risks resulting from malicious use of aerial drones. They are: Facilitating terrorist attacks, such as modifying commercially-available drones to conduct reconnaissance or attacks. Facilitating crime, especially in prisons, where drones are currently used to deliver contraband. Disrupting critical national infrastructure, such as airports, where a malicious incursion using a drone can have serious safety, security and economic consequences. Potential use by hostile state actors. Maximizing benefits of drone technology The initiative will also look to build strong relationships with industry to ensure high security standards Over the next three years, the strategy will seek to reduce the risks posed by the highest-harm use of drones while maximizing the benefits of drone technology. It will develop a comprehensive understanding of evolving risks and take a “full spectrum” approach to deter, detect and disrupt the misuse of drones. The initiative will also look to build strong relationships with industry to ensure high security standards. Further, promoting access to counter-drone capabilities and effective legislation, training and guidance will empower the police and other operational responders. Tactical response to drone-based threats Because technology is rapidly evolving, the response needs to keep pace, according to the strategy document. Lewis adds, “We will therefore work to understand how drone-based threats might evolve in the future, both at the tactical and strategic levels.” The strategy will be to build an end-to-end approach to tackling the highest-harm criminal use of drones. It will also work to make it easier to identify malicious drone use against a backdrop of increased legitimate use. Legal drone operators will be required to register with the Civil Aviation Authority (CAA) and to pass an online competency test before flying a drone. Retailers who follow a specific set of safety guidelines when selling drones will be designated ‘DroneSafe’. Unmanned traffic management system The government is working toward future implementation of an unmanned traffic management (UTM) system, which provides a means of preventing collisions between unmanned aircraft and other manned or unmanned aircraft. The current strategy includes early planning for the system. An Industry Action Group will ensure a continuing relationship with the drone industry and help to improve existing counter-drone measures and identify new opportunities, such as use of ‘Geo-Fencing’ to restrict drones from flying in certain areas. Regulating commercial and domestic drones The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace The strategy will seek to communicate the UK’s security requirements to the counter-drone industry and to encourage a thriving sector that is aware of, and responsive to, the needs of government. Regulating drones is the responsibility of two UK government departments. The UK Department of Transport is responsible for safe and lawful use of drones within the UK airspace, while the Home Office has overall responsibility for domestic counter-drone activity. Fast-evolving drone and counter-drone technology Also, the Center for the Protection of National Infrastructure (CPNI) has been involved in reducing the vulnerability of sensitive sites, including airports. New performance measures will track the strategy’s success. Due to the fast-evolving nature of drone and counter-drone technology, the intent is to review and, if necessary, refresh the strategy in three years.
Securing New Ground, the security industry’s annual executive conference this week in New York, offered food for thought about current and future trends in the security marketplace. Highlights from SNG 2019 included keynote remarks from security leaders at SAP, Johnson Controls and the Consumer Technology Association, discussions on how CSOs mitigate security risks, topic-focused thought leadership roundtables and a lively networking reception. Top trends observed at the event include cybersecurity, data privacy, facial recognition and artificial intelligence. A "View from the Top" session covered the need for companies to consider responsible use and ethics around technology; responsibility should extend throughout the organization. A panel of security leaders emphasized the need to understand the diversity of risks that end users face. As the Internet of Things (IoT) expands connectivity, the inputs, outputs and "attack surface" also expand. It's critical to have security "baked" into products themselves, and also to undertand the mission of the organization being protected, the context and correlation. Technologies transforming security market Keynote speaker Gary Shapiro, President and CEO of the Consumer Technology Association, listed the many technologies that will impact the consumer electronics market – and the security market – in the near future: artificial intelligence (AI), voice recognition, the transition to 5G and self-driving cars.As the Internet of Things expands connectivity, the inputs, outputs and "attack surface" also expand “What we're seeing today is a huge turning point in where the world is going,” said Shapiro, whose organization presents the giant CES trade show each year in Las Vegas. “It’s not just about jobs and technology, but who we are and how we address fundamental human rights.” Privacy is a component of human rights, but “in the world of AI, there is a tradeoff between innovation and privacy”. Balance between security standards Shapiro sees Europe as representing one extreme of privacy, epitomized by General Data Protection Regulation (GDPR), which he sees as stifling innovation. Meanwhile, China is pushing innovation using massive amounts of data with no regard to privacy. The United States, therefore, should look for a balance that acknowledges the inevitability of innovation while respecting privacy and realizing it is “always situational.”With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place" Too much concern for privacy comes at a cost, Shapiro said. “Privacy zealots are killing facial recognition, step by step by step,” he said. “Regulators should not throw away the baby with the bathwater. Every technology in history has been used to cause evil and to do good. Throughout history any new technology could have been banned and made illegal.” Shapiro offered encouraging words to the security marketplace, even in the wake of large tech firms such as Amazon entering the market. “With new technologies, biometric ID and cybersecurity issues, your business is in a strong and growing place,” he said. “There is opportunity. There will be increasing new things people want, and always new threats. People will want what you're providing, which is physical and technology security in their facility.” Scott Schafer, Chairman of the Board of the Security Industry Association (R), interviewed Steve Jones, CEO, Allied Universal, on stage about the importance of merging technology with security officers Allied Universal CEO Steve Jones discussed holistic approach Steve Jones, CEO, Allied Universal, was interviewed on stage about the importance of merging technology with security officers for a holistic approach to securing a facility. “Today, customers are asking us to look at their facility holistically and asking: What is my best approach?” said Jones. A holistic approach includes protecting people, the facility, intellectual property (IP), and how to handle visitors. Manguarding perspective on security Allied Universal looks at security from a manguarding perspective and also from a technology perspective, based on their daily experience managing security for 40,000 customer sites across the United States and Canada.Allied Universal has a new handheld technology platform that uses AI “We are in a unique position in the channel,” said Jones. “We know the stats at any customer site. We know the last time there were repairs on cameras, which card reader is malfunctioning, how long the systems company takes to respond to a call. We are at these locations 24/7 and have an intimate relationship with customer. We are a significant influencer in the decision-making process. We have an opportunity to have a voice, and to build a business around it.” Predictive security “We are looking for technology that will enhance the security of the customer,” said Jones, including situational awareness and analysis of data to predict patterns. Allied Universal has a new handheld technology platform that uses artificial intelligence (AI) to analyze data, predict outcomes, and prescribe optimum responses. Workforce development – hiring and training new employees – is a big issue for Allied Universal, which last year interviewed more than a million applicants to find around 100,000 employees. They are targeting every demographic, and last year hired 33,000 veterans. The company is using technology to help with the massive recruiting effort, including AI to analyze applicant qualifications and a computer-generated avatar to conduct the first online interview. Future security challenges Jones sees the rapid increase in the homeless population in the United States as one of the biggest security challenges of coming years. The rapid increase in the US homeless population is one of the biggest security challengesMany businesses face the prospect of homeless individuals living in front of their buildings, possibly using drugs or approaching customers. “It has become a real threat,” he said. “When they are living in front of your buildings, in many cases, there are ordinances that allow them to be there so the police will not get involved. It falls on the facility owner and private security to address the problem. Given the large homeless population we have now during good economic times, I don’t know what it will look like in an economic downturn.” Human side of security An SNG session on the human side of security observed that people are the biggest source of vulnerability. Companies should foster a "safety climate" in which security is integral to operations and viewed as something that helps employees rather than create hassles. Human resources is now a technology field and should work together with security to achieve shared goals. At the consumer and small business level, cybersecurity must also be top-of-mind and built into a security companies' DNA. SNG attendees heard about opportunities to move beyond providing products and devices to providing experiences, by partnering with customers to protect what matters most to them. While a bit of inconvenience comes along with security, products should be built in a way that is easy to use, with security baked in. The results are systems people are comfortable engaging with every day. Securing New Ground is presented by the Security Industry Association (SIA).
Sepura’s Italian partner GEG has donated vital critical communications equipment to an emergency hospital in Italy, to aid the country’s medical support during the COVID-19 outbreak. COVID-19 health facility The rapidly deployed Fiera di Bergamo hospital is situated in an event venue in Bergamo, the worst affected region in Italy and is managed by staff from a nearby permanent hospital. The facility was constructed in just a week, supported by private and corporate donations and volunteer support from the region. The facility comprises 142 beds including over 70 intensive care beds and access points for both ambulances and helicopters. As a mark of the community endeavor behind the construction, the canteen is being run by the locally-based Michelin-starred chef Vittorio Cerea, with his family volunteering to provide meals to the emergency staff. Sepura SC21 TETRA radios To ensure that all medical staff, logistic support and volunteers can communicate effectively, GEG have donated a complete critical communications system to the site, comprising of 50 Sepura SC21 TETRA radios, programming software and a TETRA base station from DAMM to provide the local network. The radios have been provided with individual battery chargers and belt clips to reduce the amount of contact with hands and to reduce the risk of cross contamination. For the control room, GEG have provided a desk mounted SRG3900, multiple charging units and desktop programming devices to ensure that the radios are correctly set up for emergency use. Training to radio fleet administration GEG also delivered training to all radio fleet administration staff on basic radio use After performing a full site inspection and installing the base station, GEG also delivered training to all radio fleet administration staff on basic radio use, including switching between talk groups and making full duplex calls. Ian Gotti, Sales Area Manager for GEG said, “Communication is particularly important in this environment, as many of the key workers in this highly pressured environment are not used to working together; on site there are member of both the Italian and Russian armies, volunteers from international emergency response and civil protection organizations, nurses and medical staff from all across Italy and many maintenance staff across site covering many functions.” He continued, “We are proud for GEG to have played our part in enabling Italy to fight back against the coronavirus and we stand with the emergency teams on the frontline that are providing the expert medical help patients desperately require.” TETRA radio communication systems Due to the protective masks worn on the mouth, communication over a critical communications device was the only available solution to the workers. The Sepura radios allow for a very quick configuration and programming of the fleet and also an efficient way to link the fleet to the control room which was vital in this situation. The radios have the additional advantage of being easy to clean and sanitize, capable of functions with minimal use of hands and provide guaranteed secure coverage even in the deepest parts of the building. Enhancing communications Victor Rodrigues, Strategic Account Director for Sepura said, “GEG have many years’ experience in selling TETRA systems into environments such as hospitals and it is a tribute to their dedication that the system was up running so quickly to support the emergency operation. We pass our best wishes to the medical staff on the frontline.”
VIVOTEK, the global IP surveillance provider, has deployed its IP surveillance cameras in the residential project “New Borovaya,” constructed by A-100 Development, one of the largest developers of residential and commercial real estate in Belarus. This deployment has been carried out by long-standing distributor DataStream DEP, and has successfully put into action the high-quality products and brand value of VIVOTEK. On land with a total area of more than 100 hectares, a whole district is being actively developed in line with the most modern European trends of improved urban living environments. Based on the principle of SMART and SOCIAL, the “New Borovaya” project is one of the most innovative and upscale developments in Minsk, the capital of Belarus. In order to ensure public safety and protect private property, А-100 Development pays special attention to the security of the huge residential complex. Bullet network cameras To meet the demanding requirements of the project, including high-quality imagery, reliable equipment from a global brand, excellent technical characteristics and optimal price, the distributor DataStream DEP had complete confidence in recommending VIVOTEK’s IP surveillance solutions. VIVOTEK is honored to have this decade-long strategic partnership with A-100 Development VIVOTEK’s IB8369A and IB8367A bullet-type network cameras were selected for video surveillance of streets, playgrounds and outdoor parking, while the FD8369A-V dome type cameras were chosen for the entrances of residential buildings. A single data transmission network has been built at the facility, which unites all cameras and provides easy-access to any camera. Surveillance solutions Commenced in 2014, development of the "New Borovaya" project will last for 10 years. In the first two quarters, solutions based on VIVOTEK IP surveillance cameras were implemented, the success of which has led developer А-100 Development to proudly place VIVOTEK solutions in its marketing materials, and confidently declare the reliability of this brand during both operation and for further cooperation. VIVOTEK is honored to have this decade-long strategic partnership with A-100 Development and looks forward to providing its latest surveillance solutions again in the near future.
Your Homes Newcastle (YHN) manages more than 26,000 properties on behalf of Newcastle City Council. They are piloting an innovative fire detection system in partnership with OpenView Security Solutions, the UK’s largest privately-owned independent security company and a national supplier of fire, electrical and mechanical services to the public and private housing sector. MOBOTIX thermal imaging cameras have been installed in 3 multi-story blocks across the city to continually monitor temperatures in the buildings’ bin chute rooms. The thermal cameras will send an alarm to OpenView’s central control center and the fire service immediately if an unexpected heat pattern is detected. The early detection system provided by the OpenView now means that residents can be reassured of much faster response times from the fire service in the event of an incident, minimizing the potential impact on occupants and their properties, so that they and their homes are far safer as a result. Risks and Challenges Ensuring safety of residents through early detection and prevention of potential fires To be able to react quickly to verify a fire situation Alerting the fire service within seconds of a potential fire so they can respond rapidly Keeping residents safe and minimizing damage to property in the event of a fire The risk to lives and property caused by rapid spread of a fire in high-density apartment blocks Solution provided by MOBOTIX and OpenView MOBOTIX M16 thermal cameras installed in bin chute rooms of 3 YHN multi-story blocks Thermal technology continuously monitors temperature, triggering an alarm if an unexpected heat pattern is detected Operators in OpenView’s central control room assess and monitor the situation Fire service instantly alerted ready for rapid response MOBOTIX cameras integrated into existing infrastructure with no disruption to residents Potential risk to lives and property minimized through early fire detection Installation of thermal imaging cameras YHN has installed thermal imaging cameras in 3 of its 45 multi-story blocks across the cityYour Homes Newcastle (YHN) manages community and public housing on behalf of Newcastle City Council. Set up in 2004, the organization oversees more than 26,000 properties for the council. With fire safety in tower blocks having been in the spotlight since the Grenfell Tower tragedy in 2017, YHN took the decision to pilot an innovative fire detection system. In a trial partnership with OpenView Security Solutions, the UK’s largest privately-owned independent security company and a national supplier of fire, electrical and mechanical services to the public and private housing sectors, YHN has installed thermal imaging cameras in 3 of its 45 multi-story blocks across the city. “The tragic events at Grenfell Tower have undoubtedly put fire safety in multi-story blocks under a microscope, but we have been trialling new measures in our multi-story properties for some time,” says David Langhorne, YHN’s Assets and Development Director. ONVIF compliant thermal cameras OpenView Security designed and installed an early fire detection system using MOBOTIX dual M16 thermal cameras, featuring one thermal and one optical sensor. MOBOTIX thermal sensors measure minute differences in mid-wavelength infrared radiation emitted from an object or body based on its temperature, allowing them to pick up temperature differences of 0.05 of a degree within a temperature range of -40 to +550 degrees Celsius. The ONVIF compliant MOBOTIX cameras contain a powerful CPU that can deliver up to 3 video streams simultaneously The ONVIF compliant MOBOTIX cameras contain a powerful CPU that can deliver up to 3 video streams simultaneously and fulfill the H.264/ONVIF standard, making it easy to combine them with other systems to create unique solutions to real-world problems. By integrating the cameras into YHN’s existing infrastructure, which uses OpenView installed equipment, it was possible to implement the new system without any disruption to residents. Alerts central control room in case of fire Operators are able to monitor images from the thermal lens to pinpoint the exact location of hotspotsThe MOBOTIX M16 cameras were installed in bin chute rooms, where they continually monitor the temperature, sending an alert to the OpenView’s central control room instantly if an unexpected heat pattern is detected. Operators are then able to monitor images from the thermal lens to pinpoint the exact location of hotspots, such as smouldering fires, as well verify the situation via a live feed from the optical lens. An alarm is also raised with the fire service within seconds of a potential fire, making them ready to respond rapidly to a potential emergency situation. According to Andy Ward, Sales Director of OpenView Security Solutions, the innovative fire protection solution enables housing providers to ensure a safer environment for residents and minimize the incidence of false alarms: “It now forms part of our expanding portfolio of fire and life safety solutions, which is one of the fastest growing areas of our business, and consolidates our leading position in the public and private housing sectors.” Faster response times from fire service The early detection system provided by the OpenView now means that residents can be reassured of much faster response times from the fire service in the event of an incident, minimizing the potential impact on occupants and their properties, ensuring that they and their homes are far safer as a result. We have wet and dry risers, central alarm systems, smoke alarm activated bin chute fire dampers and bin room sprinklers"“This trial system is one of many fire safety measures currently in place in the blocks we manage across the city. We also have wet and dry risers, central alarm systems, smoke alarm activated bin chute fire dampers and bin room sprinklers,” Langhorne explains. “We pride ourselves on being innovative, so it was an easy decision for us to test something that had not yet been adopted elsewhere,” he adds. Meeting requirements of integrator and end-users Frank Graham, MOBOTIX Regional Sales Manager UK & Benelux, said of the partnership with YHN and OpenView: “We are very happy to be working so closely with both YHN and OpenView in the development and provision of an innovative solution for such a serious issue. “MOBOTIX cameras have inbuilt intelligence to meet all the requirements of integrator and end-users alike and we look forward to a longstanding and fruitful partnership with both organizations moving forward.”
Vicon Industries, Inc., designer and manufacturer of video surveillance and access control software, hardware and components has announced that The Cathedral of Saint John the Divine, the largest Cathedral and fifth largest church building in the world, recently completed installation of a Vicon Valerus video management system to secure the Cathedral and surrounding 11.3-acre complex in Manhattan. Valerus VMS As the seat of the Episcopal Diocese of New York, the Cathedral is the site of daily religious services, community programing and social outreach. It also plays host to a busy schedule of art exhibitions, concerts, receptions, public and private events and visiting dignitaries, who have included Nelson Mandela, The Most Reverend Desmond Tutu and President Bill Clinton.The new Valerus system combines over 70 Vicon high-resolution IP cameras, a Valerus application server and multiple recording servers The new Valerus system, installed by the Long Island office of ITsavvy, an IT products and technology solutions provider, combines over 70 Vicon high-resolution IP cameras, a Valerus application server and multiple recording servers. The system’s wide range of cameras include models with powerful zoom that provide detailed coverage of surrounding city streets, and others chosen for their ability to perform well in the low and challenging light inside the Cathedral. Vicon IP Cameras Cameras also provide coverage of the Cathedral’s’ exterior, administrative and residential buildings that support the Bishop, clergy and Diocese, a world-class textile conservation laboratory, visitor center, information booths and surrounding grounds and gardens. The Valerus system is vital for providing safety for all visitors, staff, residents and students, as well as protecting the property and its many valuable artifacts. Cameras are particularly helpful in protecting the Cathedral from liability in slip-and-fall incidents Cameras are particularly helpful in protecting the Cathedral from liability in slip-and-fall incidents. They also document, for the police, any incidents that arise from the Cathedral’s service to the mentally unstable and indigent. Live and recorded video from the Valerus system is frequently shared with NYPD and local security forces from Columbia University and other neighboring institutions. Crime Prevention and Incident Management Keith Hinkson, Director of Security at The Cathedral of Saint John the Divine, says, “The searching feature is so much easier on Valerus, and we can see up to 99 cameras on one screen. This is huge for an institution like ours. I can go from one camera to the next with no trouble whatsoever.” “Vicon is incredibly proud that a world-class institution as prestigious as The Cathedral of Saint John the Divine has entrusted its security to an end-to-end Vicon solution, including our latest Valerus software. Our participation in this project illustrates that Valerus can deliver security effectively to the most high-profile of installations,” said Bret McGowan, Vicon’s Senior V.P. of Sales and Marketing.
HID Mobile Access integration with HRMIS means management can view all staff records on one platform A government department in Malaysia sought to upgrade their access control system and integrate the new system with their internal human resource system, HRMIS. With the proliferation of smart devices in the country, the agency took advantage of the “bring your own device” (BYOD) trend by moving their access control system to an innovative mobile solution. Public Service Human Resources This government department in Malaysia is one of Malaysia’s federal government offices. The department is responsible for the development and implementation of public service human resources in the country. Their functions include planning, development and management of all areas pertaining to human resources for the public sector, to ensure that Malaysia’s public agencies have the human capital and infrastructure to function at optimal efficiency and effectiveness. As the functions of the agency continue to expand in breadth and scope, in accordance with the demand for the public services in the country, their staff has steadily grown over the past years. And, similar to other organizations, an increase in personnel also means an increase in management challenges. Improving Security With Integrated Access Control By early 2015, this department had a total of 350 civil servants under its employ. Looking to upgrade its time and attendance system that was tied to a card-based access control system, they sought a new, innovative solution to provide a better user experience for its staff. According to the facility officer in government department of Malaysia, the old access control system had been in place since 2002, and it was a perfect time to upgrade based on current technological developments. "We’ve had a card-based access control system at our entrance for a while, one which has served us well since the requirements we had were very basic,” said the officer. “However, with new technology comes new ways for us to improve our system. It is time for us to embrace change.” Minimizing Security Threats From Lost Cards Improving security was another goal this department wanted to accomplish with a new solution. With a card-based system, a misplaced access card could result in a security threat – anyone who picked up a lost card could gain access to the department. Also, due to their small form factor, the loss of cards often went unnoticed and was reported late. Thus, another requirement of the new access control system was that it had to minimize the possibility and magnitude of security threats from lost and misplaced cards. The department also wanted a solution that can be integrated into their HRMIS human resources portal The department also wanted a solution that can be integrated into their HRMIS human resources portal, so information about staff attendance and schedules could be viewed online under a unified platform. “In addition to improving the user experience, we also wanted to tie our previously siloed systems together to provide the management with better information about our staff’s time in and out of the office. This would allow us to have the complete picture of each staff member’s availability for better manpower allocation,” said this officer. HID Mobile Access Control System The government department in Malaysia procured the services of Prymax Technologies Sdn Bhd, an HID Global partner that provides ICT system integration in the education, government and private sectors. After assessing HID Global’s products and solutions, they chose to deploy HID Mobile Access to enhance its access control system at their building’s entrance. The solution includes HID Mobile IDs and multiCLASS SE RP40 mobile enabled readers, as well as a VertX EVO V2000 reader interface and a network gateway controller. The deployment took less than three months. With more and more staff bringing and using their own smart devices to the office, this department embraced the BYOD trend fully through its new access control system. By deploying HID Mobile Access, the department enabled the staff to use their own mobile phones to replace cards for office access. Connected Smart Devices The multiCLASS SE RP40 mobile enabled card readers support Bluetooth and work with both iOS and Android devices, as well as a range of credential technologies. The readers are connected to the VertX EVO V2000 controller via a TCP/IP network wired with CAT6 cabling to processes all access control decisions in real-time. At the entrance, the staff member can conveniently tap their mobile device to the reader or use HID Global’s patented “Twist and Go” gesture technology, an option configurable by department’s IT staff. "The HID Mobile Access solution provides and exceeds the level of security we were looking for, while improving the convenience of our staff" The users’ HID Mobile IDs and access rights are provisioned over-the-air to end-user mobile devices via the intuitive HID Mobile Access Portal administration, and can be revoked remotely by the administrators in case the devices are lost or stolen. HID Mobile Access also communicates with their HRMIS portal and relays staff attendance data to the server. Their staff can now view and remark on attendance, as well as send records online through the portal. Integrated Resource Management Solution “The majority of our staff welcomes the change, citing the convenience of using their own mobile phones to check in at work is a great improvement over carrying yet another card for this purpose. From the management perspective, using mobile devices to verify a staff member’s attendance ensures that we are getting the real attendance records, as it completely eliminates card skimming. Also, since reporting is done on a browser, the administrators can generate reports easily at any time,” said the facility officer. HID Mobile Access integration with HRMIS also means that management can view of all staff records on one platform, streamlining the evaluation and allocation of personnel for projects. This also provides management with unprecedented insights into staff productivity to identify highly productive workers. “Like any other government agency around the world, we take security very seriously. Hence, any solution we deploy has to fulfill a stringent set of requirements. The HID Mobile Access solution not only provides and exceeds the level of security we were looking for, but it also does so while improving the convenience of our staff members. We are very pleased with the results of this project,” said the officer.
AThe IVX, Inc. is a revolutionary technology startup founded by industry veterans from Cisco, Jupiter and Motorola. The company is dedicated to providing innovative, high performance, fully integrated solutions for the public safety sector that effectively manage collaboration among multiple agencies and improve crisis management response time. The IVX enables real-time surveillance data collection, synchronization and collaboration across the private and public safety sectors. Public Safety Challenge In the wake of recent mass shootings and terror attacks on high profile cities, public safety is once again at the top of the agenda. The growing number of higher specification surveillance cameras and the huge amount of data they generate, combined with longer data retention periods and real-time response requirements, are pushing the boundaries of what traditional storage approaches can handle. With these market conditions building, The IVX set off to look for an alternative solution for video surveillance. From proprietary to open source to private and public cloud solutions, The IVX tried different approaches, but they failed to deliver the necessary performance and cost efficiency. Both NetApp and EMC solutions required expensive software licenses and would incur hardware and maintenance costs, while open source software lacked reliability, software manageability and support. Additionally, encryption and data security concerns are still inhibiting the widespread use of the public cloud for surveillance solutions. Promise Solution At The IVX After testing and conducting proof of concept, The IVX concluded that Promise Technology’s purpose-built hyperconverged infrastructure – VskyCube – was the only solution to meet all of their current needs while providing a path for the future. By using the VSky Cube software defined approach, The IVX can deploy and launch surveillance services with just a few clicks VSkyCube pre-integrates computing, storage, and networking into hyperconverged nodes, giving a pre-integrated and adaptable cluster with a unified pool of resources that can be deployed, adapted, scaled, and managed quickly and easily. It is specifically optimized for video surveillance workloads and brings the benefits of the hyper-scale datacenter to the market. By using the VSky Cube software defined approach, The IVX can deploy and launch surveillance services with just a few clicks. They also have the ability to manage, monitor, scale and adjust compute, storage and networking resources all in the same web interface with the centralized management software, VSkyView. As the number of cameras and the amount of video they capture continue to increase, the IVX can dynamically scale out to multiple PB for 24x7x365 intensive workloads without interruption, thanks to Promise’s software-defined cloud storage – VskyStor. And, most importantly, all sensitive data is protected by RAID and RAIN. High resilience and high availability features prevent drive and server failure, making for uninterrupted video capture and access. Promise Solution Business Benefits With 24/7 support from Promise Technology, The IVX has successfully delivered surveillance services through a virtual private cloud on top of VSkyCube. The IVX can now handle 250 TB of HD surveillance video data, and is enjoying a 20-40% reduction in budget that was previously going to things such as hardware and software licensing and operating costs.VSkyCube is the only enterprise-class surveillance infrastructure that delivers the highest levels of performance, resiliency and data protection, all without the cost, complexity and skills typically required by virtualized environments. Anson Chen, Vice Chairman and Co Founder of The IVX Inc. said: “VSkyCube is an advanced hyperconverged system with all of the enterprise storage features we need. It is a perfect fit for solution providers like us who need a reliable solution that can grow over time, and allow us to maximize budgets. Promise Technology delivered on everything they promised! The close collaboration and timely support from Promise’s global teams help us provide excellent service to our customers.”
Round table discussion
Utilities are an important element of critical infrastructure and, as such, must be protected to ensure that the daily lives of millions of people continue without disruption. Protecting utilities presents a unique range of challenges, whether one considers the electrical grid or telecommunications networks, the local water supply or oil and gas lines. Security technologies contribute to protecting these diverse components, but it’s not an easy job. We asked this week’s Expert Panel Roundtable: What are the security challenges of protecting utilities?
The concept of how security systems can contribute to the broader business goals of a company is not new. It seems we have been talking about benefits of security systems beyond “just” security for more than a decade. Given the expanding role of technologies in the market, including video and access control, at what point is the term “security” too restrictive to accurately describe what our industry does? We asked the Expert Panel Roundtable for their responses to this premise: Is the description “security technology” too narrow given the broader application possibilities of today’s systems? Why?
Hospitality businesses work to provide a safe and pleasant customer experience for their guests. Hotels offer a “home away from home” for millions of guests every day around the world. These are businesses of many sizes and types, providing services ranging from luxury accommodations to simple lodging for business travelers to family vacation experiences. Hospitality businesses also include restaurants, bars, movie theaters and other venues. Security needs are varied and require technologies that span a wide spectrum. We asked this week’s Expert Panel Roundtable: What are the security challenges of the hospitality market?
How To Drive B2B Security & Operations With Smart SurveillanceDownload
Wireless Security: Cut Costs Without Cutting CornersDownload
Hybrid Hyperconverged Systems Benefit Growing Storage and Retention NeedsDownload